Uploaded by Khawla Mubarak

notes 2024

advertisement
Information &
Communication
Technology
Shaimaa El-Adl
Mostafa Mahdy
Hesham Hatem
CHAPTER 1
Components of a computer system
Computer
Software
(section5)
Hardware
Input
devices
(section1)
Output
devices
(section2)
Storage
devices
(section3)
Processing
devices
(section4)
➢ Hardware.
• Physical components of a computer system
• Devices that make up the computer
➢ Software.
•
Programs for controlling the operation of a computer
•
Programs for processing of data
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
1
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 1
Input devices
Manual input devices
Direct data entry devices
User enters information manually
Information is automatically input
by a reader
➢ Manual input devices
• Keyboard
• Numeric keypad
Only numeric data, examples:
•
Inserting personal identification number (PIN) for
credit/debit cards
•
When using an ATM machine
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
2
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• Pointing devices
Selection on a graphical user interface, selection from a list or menu
Mouse
Touch pad
Tracker ball
In most PCs
On laptop
For use by people with
computers
limited motor skills e.g.
young children or people
with disabilities
• Remote control
• Joystick / Driving wheel
•
Simulators
•
Playing games
• Touch screen
Selecting from a limited list of options
Quick to select options
Replaces keyboard & mouse
Improved hand/eye coordination
Allows the user to use zoom and pinch & draw on screen
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
3
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• Light pen
Used to point or select or draw on CRT screens
More accurate than touch screen but not as accurate as graphics tablet
• Digital cameras / video cameras
Takes pictures, records videos and stores
them on internal memory or memory card
• Web cam
Inputting moving pictures from a fixed position into a
computer
•
Microphones
• Scanners
Entering hard copy images into a computer
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
4
Special thanx to:
Nada Dessouky & Shaimaa Hesham
➢ Direct data entry devices
• Optical Character Reader (OCR)
Uses:
•
Convert scanned image to a text file which
can be edited (processed) by another
software package such as word processors,
spreadsheets, databases etc.
How it works:
•
•
Scan the document
Recognize characters by identifying patterns of white and black pixels
Advantages:
✓ Can be used to read any printed / handwritten text
Disadvantages:
✓ Inaccurate when reading handwritten text
✓ Might take time to read/recognize text
• Optical Mark Reader (OMR)
Uses:
• Multiple choice exam answers
• Questionnaires
• Attendance registration
How it works:
•
•
•
Dedicated scanner device shines a beam of light onto the form
Light is reflected back to sensors
Marks reflect less light so sensors used to identify position of marks
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
5
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Advantages:
✓ Saves time
✓ Accurate; avoid human error
Disadvantages:
✓ Can only be used in case of choices (not text)
✓ If mark is not dark enough it might not be detected
✓ If mark does not fill the box it might not be detected
✓ If a mark is not erased properly it might be detected
✓ Must have pre-set forms (expensive)
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
6
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• Magnetic stripe readers vs Chip readers and PIN pads
Reader
Uses
Data stored
when used in
banking
applications
Magnetic stripe
readers
Chip readers and
PIN pads
At POS terminals, ATMs and in security applications
•
•
•
•
Benefits
•
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
unique account number
bank ID
expiry date
Shoulder surfing cannot
take place
Faster payment process
7
•
•
•
•
unique account number
PIN code
bank ID
expiry date
•
•
more secure due to PIN
not easily scratched /
damaged / bent
not affected by
magnetic fields
•
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• Radio frequency identification reader (RFID) :
o tag can be read from a distance of several meters
A tag has two parts:
o Microchip that stores information
o Antenna that is used to receive and transmit data
How it works:
▪ The RFID reader sends radio waves / signal to the RFID
antenna in the tag
▪ The radio waves received by the tag’s antenna activate the
microchip
▪ Tag sends radio wave / signal back to the reader
▪ The antenna will send the information in the chip to the reader
▪ The reader sends data to the computer
Advantages
✓ No line of sight or contact necessary; tag can be read from a
distance
✓ Data stored on chip
✓ It is very robust and reliable technology
✓ Very fast read rate
Disadvantages
 It is possible to hack data transmitted by a tag
 More expensive than a barcode or chip reader system
Uses:
• Attendance tracking instead of check-in queue
• tracking stock, passports, automobiles
• automatic passport control gates at airport
• contactless payments
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
8
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• Near Field Communication (NFC) reader
o contactless transmissions of information, including payment for items
using a smartphone or transmission of information between smartphones
o NFC requires the sender and receiver to be closer together than in RFID
which makes it more secure
o NFC devices can act both as a receiver and reader
Advantages of payment by contactless card
▪
▪
▪
▪
Customer doesn’t have to worry about PIN being shoulder surfed
Customer doesn’t have to worry about PIN being typed incorrectly
Faster transaction so less queuing/waiting time
Not damaged by overuse
Disadvantages of payment by contactless card
▪
▪
▪
▪
▪
The card may be read accidently
Only small amounts can be withdrawn
More chance of fraud if card is stolen/lost (no PIN required)
More expensive readers and cards
Devices can read the cards wirelessly to steal money
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
9
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• Bar code Reader
Uses:
•
•
•
code numbers from products
library books (ISBN)
membership numbers
How it works:
•
•
•
illuminating the code with red light
a sensor detects the reflected light
according to the intensity of the reflections (white reflects more light
than black) the code is detected
Advantages:
✓ Can be read upside down
Disadvantages:
 If scratched / dirty might be read inaccurately
 Cannot store information
• Quick Response Scanner (QR)
The codes in the pattern contain a small amount of data; such as
website URLs and contact details.
Advantages:
✓ They can be read from many angles
✓ Can contain links to more information about the products
✓ It contains information about the product
✓ Can be read by any device with a camera and suitable software
Disadvantages:
 QR codes can be used to transmit malicious codes & cause hacking
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
10
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• Biometric readers
o examples:
▪ Fingerprint scanners
▪ Retina scanners, Iris recognition
▪ Face recognition
▪ Voice recognition
Advantages:
✓ unique as no two people have the same fingerprint
✓ difficult to be copied
✓ impossible to be lost or forgotten
Disadvantages:
 but expensive equipment
 takes time to scan
 needs a lot of storage space
 security issues related to storing people’s biometric data
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
11
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 2
Output devices
• CRT monitor
•
Applications where space is not a problem.
• TFT monitor
•
Applications where space is limited such as small
offices.
•
LCD & LED
• Touch screen
Selecting from a limited list of options
• Multimedia Projector
Displays data from computers, pictures from
televisions and video/DVD recorders
•
training presentations
•
advertising presentations
•
home cinema
• Speakers
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
12
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• Printers
Printer
Laser printer
Inkjet printer
Dot matrix printer
low
high speed
high
high
low speed
low
Noise
Speed
Quality
Running cost
Lowest (toner)
Initial cost
Images
Dirty
environment
Stationery
Copies
Ink
high
medium
medium
medium speed
high
highest (changing
cartridges
frequently)
lowest
most suitable
not suitable
not suitable
most suitable
separate sheets
no
Toner
separate sheets
no
Droplets
continuous
carbon copies
Ribbon
Medium (ink ribbon)
high
not suitable
• Graph plotter / Wide format printer
•
large printouts such as A0
•
continuous printouts
•
high quality accurate printouts
example:
•
CAD applications
•
graphs
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
13
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• 3D printer
•
makes three dimensional solid objects from a design on computer
•
software slices the model into hundreds of layers
•
printer builds objects layer by layer (using material provided)
•
binds layers together
Uses:
•
Organs created from patient’s own body cells
•
Car parts
•
Architecture models
•
Dental parts
•
surgical and diagnostic aids
•
development of prosthetics and medical products
•
tissue engineering, artificial blood vessels
•
design of medical tools and equipment
Advantages:
✓ Products can be customized easily on request
✓ Speed of producing the product is faster than making it by hand
✓ Cheaper than making it by hand due to labor costs
✓ Quality is consistent
✓ Minimizes waste
Disadvantages:
 Cost of buying the printer is expensive
 The size of the component is limited to the size of the printer
 If the initial design is incorrect, it is harder to correct
 Requires skilled programmers/operators therefore the initial costs
could be higher
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
14
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 3
Storage devices and media
Memory &
Storage
Main Memory (used by
computer system)
RAM
ROM
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
Backing Storage (used to
store files for later use)
Magnetic
Optical
15
Solid State
Cloud storage
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Main memory
RAM
(Random Access Memory)
ROM
(Read Only Memory)
Read & write
• Read only
Volatile (loses its memory
• Non-Volatile (does not
when switched off)
lose its memory when
• Large capacity
switched off)
• High access speed
• Small capacity
Used to store data and files
Used to store instructions
currently in use
to start up the computer
•
•
Properties:
Use:
Main memory (RAM) provides speed which makes it suitable for storing data
currently in use, but it does not provide permanence which does not make it
suitable for storing data for later use.
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
16
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Backing storage
Backing storage devices provide permanence and are used to
1. store data for later use
2. backup data
Backup is an extra copy of important files stored away from the
original copy in case of damage or loss of original copy.
This may happen due to:
•
hacker deleting the data
•
virus damaging data
•
corruption of hard disk
•
user accidentally deleted the data
3. transfer data from computer to another
They are divided into 3 types:
i.
i.
Magnetic
ii.
Optical
iii.
Solid state
iv.
Cloud storage
Magnetic backing storage
➢ Fixed hard discs
Properties:
•
very fast access to data
•
not portable
•
high capacity
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
17
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Used to store:
•
operating systems
•
software
•
working data
➢ Portable hard discs
Properties:
•
large capacity
•
portable
•
more expensive than other forms of
removable media
Used to store:
•
very large files which need transporting from one computer to
another
➢ Magnetic tapes
Properties:
•
large storage capacity
•
slow access speed - uses serial access for
reading and writing (in sequence)
•
high transfer speed
•
drive not commonly available
Used to store:
•
backups of file servers for computer networks
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
18
Special thanx to:
Nada Dessouky & Shaimaa Hesham
ii.
Optical backing storage
Properties:
•
portable
•
can be broken or scratched (not
very robust)
Used to store:
•
CDs (compact disc): large files (but smaller than 1Gb) such as music and
general animation
•
DVDs (digital video disc): very large files (several Gb) such as films
•
both CDs and DVDs: can be used to store computer data
•
CD ROM
DVD ROM
CD R
DVD R
CD RW
•
•
•
•
Uses
by software companies for
distributing software programs
by music companies for
distributing music albums
by book publishers
by film distributors
prevent deleting /
editing data
recording of music downloads
from the internet
•
recording of films and television
programs
•
very useful for keeping files that
need to be edited
DVD RW
Properties
single ‘burning’ of data
updating of information
and ability to record
over old data
•
Blu-ray
•
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
for storing HD / 3D movies
•
19
capacities of 25Gb,
50Gb and 100 Gb
possible to playback
video on a disc while
simultaneously
recording HD video
Special thanx to:
Nada Dessouky & Shaimaa Hesham
iii.
Solid state backing storage
Properties:
•
smallest form of memory
•
portable
•
more robust than other forms of storage
•
more expensive than other forms
•
can be easily written to and updated
➢ Memory sticks/Pen drives
Properties:
•
Can store up to many Gb
Uses:
•
to transport files and backup data from computer to computer
➢ Flash memory cards
Uses:
•
in digital cameras, palmtops, mobile phones, MP3 players
Types:
▪
SD card
o Most commonly used
o Compatible with most devices
▪
xD card
o mainly used for cameras
o limited capacity (photos are not high quality)
o not compatible with a lot of devices
▪
CFast card
o faster transfer speed
o used in gaming devices
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
20
Special thanx to:
Nada Dessouky & Shaimaa Hesham
➢ Solid state drives
Uses:
•
same as hard disk but in portable devices
Size / weight
Robustness
Access / transfer
speed
Power consumption
Price
Lifespan
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
HDD
Hard Disk Drive
Bigger , heavier
Moving parts, can
be damaged
Slower
SSD
Solid State Drive
Smaller, lighter
No moving parts,
robust
Faster
Higher
Less
longer
Lower
More
shorter
21
Special thanx to:
Nada Dessouky & Shaimaa Hesham
iv.
Cloud storage
Cloud is large group of remote networked servers which allows centralized data
storage
Some of the advantages and disadvantages:
✓ Files stored in the cloud can be accessed from any device/any place
with internet access
✓ Don’t have to pay for large computer/mobile storage capacity
✓ Only pay for the storage you use as much of the space on the hard
disk may be wasted
✓ Easier to add storage capacity on the cloud (unlimited storage
capacity)
✓ Ability to synchronize files across multiple devices (automatically if
requested) easily
✓ Backups are automatic on the cloud
✓ User does not have to worry about security measures as service
provider manages securing the data
✓ Less risk of loss / damage
 If the internet connection is unstable/slow there will be a problem
accessing/downloading files on the cloud
 Cloud storage can be expensive if extra storage capacity is required
 Easier to hack the cloud as the data is stored for a long period of
time on servers
 Data is controlled by the storage service provider; customers should
choose a trusted company
 Risk of fire , floods etc. at the server can cause data loss
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
22
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 4
Processing devices
• Motherboard
It is a printed circuit, allows the processor and the other hardware to
communicate, it contains several sockets and slots to connect other
components
• Central processing unit (CPU)
The processor or central processing unit (CPU) is the part of a computer
that:
o Carries out software instructions (Control Unit; CU)
o Performs calculations (Arithmetic Logic Unit; ALU)
• Graphics card
Allows the computer to send graphical information to a monitor, TV or
projector (connected to the motherboard)
• Sound card
Allows the computer to produce sounds from speakers and input sound from
a microphone (connected to the motherboard)
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
23
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 5
Software
➢ Application Software [NEVER USE BRAND NAMES]
Programs that allow the user to carry out specific tasks
•
Word processing Used for typing
[example: MICROSFOT WORD]
•
Presentation design Used for creating presentations
[example: MICROSOFT POWERPOINT]
•
Web page design Used in creating web sites
[example: MICROSOFT FRONTPAGE]
•
Database Used for storing records
[example: MICROSOFT ACCESS]
•
Spreadsheet Used in calculations, finances and accounts
[example: MICROSOFT EXCEL]
•
Desk-top publishing (DTP) Used in making magazines, flyers, posters
•
Graphics package/photo editing software Used in editing pictures
•
Video editing software
•
Music / video player
•
Web browser
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
24
Special thanx to:
Nada Dessouky & Shaimaa Hesham
➢ System software
Programs that control and manage the computer’s hardware and run the
applications software
• Operating systems
Operating system is the most important program that runs on a device.
The main tasks of operating system:
1) Provides user interface (The user interface is the means by which the
users interact with the particular machine, device or with the whole
system)
2) Loads & runs application software (allows other programs to be
installed and used)
3) Manages error messages
4) Manages Security
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
25
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Types of operating system:
(GUI) Graphical User
Interface
(CLI) Command line
Interface
Dialogue based
Interface
Gesture based
Interface
Microsoft Windows
DOS prompt
Siri, Cortana
In some cars
Wii, Kinect
In some cars
1) User interacts with
computer through
voice commands
1) User interacts with
computer through
physical gestures
Example
Features
WIMP
1) Character based
1) Windows to display
(use only text)
data
interface.
2) Icons for programs 2) The user types a
and files
command (using
3) Menus for user to
keyboard), followed
select options
by enter, if it is
4) Pointers to make
typed accurately, it
selections
and
is executed
initiate actions
(performed).
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
26
Special thanx to:
Nada Dessouky & Shaimaa Hesham
✓ It is easier to learn ✓ Doesn’t take up a
and use (no need for
lot of RAM/memory
experienced users).
space
✓ GUI is more user
✓ Faster to run (no
friendly; with CLI
graphics to load)
the commands have ✓ Flexible; no preto be memorized
defined functions
✓ Allows scrolling &
(the user can type
zooming
any command)
Advantages / ✓ Clicking icons is
✓ More control over
disadvantages
faster than typing
the computer; no
commands
commands are
✓ Variety of input
protected
devices
 Commands have to
be memorized
 Commands need to
be typed in; timeconsuming and high
risk of errors.
Any user
Experienced users
Used by
who type commands
accurately
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
27
✓ Hand free
commands
✓ Suitable for people
with physical
disabilities
 May lead to errors
due to different
vocal accents
 Expensive to
develop
 Affected by
background noise
 Limited range of
commands
✓ Easy to use
✓ No mechanical
devices needed
✓ No physical contact
required
 Limited range of
commands
 Can pick up
unintentional
movements
 User has to be near
camera or sensor
 Not suitable for
people with
physical disabilities
While driving and
physically disabled
users
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• Compiler
Translate a program written by a programmer (High Level Language; HLL) into
a machine code (code understood by the computer).
• Linker
Link more than one object file and combine them into single program
• Device driver
It enables any hardware device to communicate with the operating system,
when a device is connected to a USB port the operating system looks for the
appropriate driver
• Utilities
It helps to manage and maintain computer resources for example -> antivirus,
anti-spyware, disk repair, security, file management, screen saver, disk
defragmenter
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
28
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Types of computers
Desktop
Laptop
Tablet
Size /
footprint
Portability
smaller
Not portable
more portable
Processing
power /
available
functions
keyboard
less
physical
physical
(built-in)
possibility
of repair /
upgrade
storage
Smartphone Smartwatch
touchscreen
touchscreen
(higher risk of
typing
mistakes)
(higher risk of
typing
mistakes)
(higher risk of
typing mistakes)
medium
medium
low
no
touchscreen
more difficult
high
high
built-in
camera
no
no
yes
yes
(convenient to
use)
likely to
have with
you all time
no
no
no
yes
yes
easy to use
on the go
not possible
no
possible but
not
convenient
yes
yes
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
29
Special thanx to:
Nada Dessouky & Shaimaa Hesham
CHAPTER 2
Networks
Networks
Network
setup
Types of
networks
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
Effects of
networks
Network
requirements
Benefits
30
Risks &
security
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 1
Network setup
Types of networks
•
•
•
Network requirements
•
WAN
LAN
• LAN(with cables)
• WLAN
Intranet
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
31
Devices
• General
• Bridge
• Network card
• LAN
• Hub
• Switch
• WLAN
• Wireless access
point
• WAN (internet)
• Router
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Types of networks
➢ WAN (Wide Area Network)
• Public network
• Connecting unlimited number of computers
• Far away from each other
• WAN consists of connected LANs
• Internet is the largest WAN in the world
➢ LAN (Local Area Network)
LAN
Properties
WLAN
•
•
•
Private network
Connecting limited number of computers
Close together in location.
•
Connected using cables
•
Connected using radio
waves
➢
Comparison
Tripping over cables
Hacking
Transfer speed
Add devices
Can connect smart devices
Allows portability during use
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
Yes
More difficult
Higher
More difficult
No
No
32
No
Easier
Lower
Easier
Yes
Yes
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Wi-Fi
Two types of radio waves
Suitable use
Full scale networks
Range
Transfer speed
Number of connections
Security
Needs router/access point
Wider
Higher
More
Encryption & password
Yes
Bluetooth
Data transfer between
devices
Smaller
Lower
Less
Pairing
No
• How devices connect using Bluetooth
o
o
Bluetooth enabled on both devices
One device scans for any Bluetooth devices in range
o
o
o
o
It sends signal (radio waves) which is received by the other device
The other device sends a signal back
Pairing takes place
Data converted to radio waves to be sent
➢ Intranet / extranet
•
•
•
•
Similar to Internet but private
restricted to a certain organization
access controlled by username & password
extranet is when an employee is accessing the internal network (intranet)
remotely (e.g. employee working from home, suppliers, customers, partners)
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
33
Special thanx to:
Nada Dessouky & Shaimaa Hesham
INTERNET
Privacy
Access
Public
Not restricted
Amount of information
Reliability of
information
Moderated / policed
Type of information
More
Less reliable
Security
Less
Control of data
No (anyone can add
material)
Not required
Network administrator
Purpose
No
General
Share files,
communicate (email,
conference) with
anyone
INTRANET
Shared content
Restricted access
Data shared
Yes
Yes
Within organization
Communication
Within organization
Security
More secure
Ownership
Owned by single
organization
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
34
INTRANET/EXTRANET
Private
Restricted to members
of organization
Less
More reliable
Yes
Related to needs of
organization
More (controlled by
username & password)
Yes
Required to handle
access rights /
permissions / passwords
Share files, communicate
(email, conference)
within organization
EXTRANET
part of a company’s
intranet
Yes
Yes
With
customers/suppliers
With
customers/suppliers
Can lead to security
issues
Can be used by several
organizations
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Network Requirements
1) Hardware:
• General
1. Network Interface Card (NIC)
▪
Placed inside the device
To be able to connect to any network device (wired or
wireless)
Contains MAC address
▪
▪
▪
Device with only two ports
Used to connect two networks together
So they can function as a single network
▪
▪
2. Bridge
• LAN
1. Hub
▪
▪
▪
Device with multiple ports.
A hub is a ‘dumb’ device: When data is received at one
port, it is sent to all connected computers.
Connects computers together
2. Switch
▪
▪
▪
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
Like a hub (device with multiple ports)
But a more ‘intelligent’ device: data is sent only to its
destination
(using MAC address)
Connects computers together
35
Special thanx to:
Nada Dessouky & Shaimaa Hesham
How to setup
o
Connect the computers to the hub/switch
o
o
o
Install the network software onto the computers
Set up usernames, passwords and access rights
Set up file/printer sharing
• WLAN
1. Wireless access point
▪
▪
▪
▪
Device that provides wireless connection to devices
By connecting to an existing wired network
Converts radio waves to data which can be sent
through cables and vise versa
Or connecting to an existing wireless range (called a
repeater)
How to setup
o
o
o
Password is preset in the WAP settings
Wi-Fi enabled on devices
Devices scan for Wi-Fi connections within range
When Wi-Fi signal is detected the device requests connection
(to the WAP)
Signal (radio waves) sent from device to WAP
WAP responds with signal requesting password
User enters password on device
o
If password matches the password preset on the WAP, the
o
device connects to the Wi-Fi network (connection
established)
Data converted to radio waves to be transmitted
o
o
o
o
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
36
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• WAN (internet)
1. Router
Purpose of a router
1. Connects LAN to internet
2. Stores MAC and IP of connected devices
IP address
MAC address
It identifies the device on the
Internet (globally)
It identifies the device inside
a network (locally)
can be changed
cannot be changed
assigned when connecting to a
network
(by ISP; internet service
provider)
assigned when hardware is
manufactured
(by manufacturer)
e.g.: 172.16.1.40
e.g.: 8D-A7-12-4G-TH-CD
3. Send & receive data packets
o Every message is divided into data packets; each
contains:
1. Sender’s IP address
2. Receiver’s IP address
3. How many packets make up the whole message
4. Identity number of each packet
5. Part of the message
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
37
Special thanx to:
Nada Dessouky & Shaimaa Hesham
How a router works
1. A router receives/sends data packets
2. Checks the destination IP address
• If IP is inside this network
o Uses the MAC address to send to correct computer/device
• If IP is outside this network
o Data packet is sent to the appropriate router
o It uses a routing table which lists all the different routes to
other networks
o Uses the IP address to work out the best/quickest route
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
38
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 2
Effects of networks
Effects of networks
•
•
Benefits
Risks & security
Accessing websites
• Wikis
• Blogs
• Forums
• Social networking
websites
Communicating
• fax
• e-mail
• instant messaging
• video conference
• audio conference
• web conference
• internet telephony (VOIP)
•
•
•
•
•
•
•
•
•
•
•
•
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
39
Virus
• Anti-virus
Hacking
• Authentication
• Firewall
• Encryption
Phishing
Smishing
Pharming
Vishing
Shoulder surfing
Card cloning
Spyware (key logging SW)
• Anti-spyware
Non-policed internet
SPAM
Stealing personal info online
• E-safety
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Network benefits
➢ Accessing websites:
A website is a group of webpages created using HTML, stored in a server and
accessed by typing a URL in a browser
• HTML
▪
▪
Hyper Text Markup Language
Language used to create/design webpages
• Server
▪
▪
centralized storage
accessed by multiple users
• URL
▪
▪
Uniform Resource Locator
a reference (an address / a link) to access a resource on the
Internet
o WWW
▪
▪
▪
▪
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
World Wide Web (WWW)
Massive collection of webpages created using HTML
Accessed using the internet / part of the internet
Is a service on the internet
40
Special thanx to:
Nada Dessouky & Shaimaa Hesham
o HTTP:
▪
▪
Hyper Text Transfer Protocol
set of rules for transferring the webpage from the
webserver to the viewer’s browser
User’s
browser
(to view)
Webpage
Webserver
o HTTPS/SSL:
▪
▪
▪
Hyper Text Transfer Protocol Secure version
same as HTTP, but where everything transferred
between webserver and user’s computer is encrypted
using the SSL (Secure Socket Layer)
SSL is a security protocol (set of rules) developed
for sending information securely over the Internet
▪
The webpage is secured by SSL when
o the URL starts with "https"
o a padlock is displayed in the browser
Webpage
Webserver
(Encrypted connection)
User’s
browser
(to view)
o FTP:
▪
▪
File Transfer Protocol
set of rules for transferring files between a file
server and a user’s computer (client)
Fileserver
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
Files
41
User’s
computer
(to store)
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• Browser
▪
software used to access webpages
1. user types URL
2. browser converts URL to IP address of server
3. request sent to server
4. servers responds by sending HTML code of requested webpage
5. browser converts received HTML code to webpage design
6. webpage viewed by user
Examples of websites:
• Blogs: (e.g. Blogger, LiveJournal, Tumblr and WordPress)
▪
▪
▪
▪
▪
▪
▪
Website (Short for web log)
an online diary or journal (ideas, opinions, information)
single author
can be updated by author
others can comment on these posts and on each other’s comments
(takes the form of discussions)
posts ordered from most recent to oldest (reverse chronological
order)
blog owner can set their blog for private or public access
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
42
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• Moderated vs un-moderated forums
▪
▪
A forum is a webpage where ideas and views on a particular issue
can be exchanged
Moderated forum has an admin who is responsible for:
• Reviewing posts
• Approving or rejecting posts
which means moderated forums will have:
• More reliable information
• No off-topic posts
• No inappropriate content
• Delay to publish a post until it is reviewed
• Users can be banned for posts they write
• Wikis: editable multi-author website (e.g. Wikipedia)
•
▪
Users participate in the creation of the content by :
1) posting information about many topics
2) reviewing and editing each other’s posts
▪
posts not in chronological order
Social networking websites: (e.g. Facebook)
▪
▪
▪
▪
▪
▪
Can share opinions, views, videos, photographs
Easy to communicate with friends all over the world
Can easily search for old friends
Easy to plan events
Easy to advertise
Make new friends with common interests
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
43
Special thanx to:
Nada Dessouky & Shaimaa Hesham
➢ Communication
• Conference
1. Video conferencing:
o
o
o
o
o
o
two or more people
at different places
online at the same time
using the same program
where they can all see and hear each other
used in meetings
Advantages:
✓ saves time and cost of travel
✓ suitable for physically disabled
✓ meetings can be held at short notice
✓ suitable in bad weather conditions
✓ no need for a conference room
✓ no risk of losing important documents during travel
Disadvantages:
 time zone difference make it difficult to agree on
meeting time
 high risk of misunderstanding
 cannot sign documents
 problems in internet connection may interrupt the
meeting
2. Web conferencing:
o used in presentations, training and online courses
o participants online at the same time
o presenter controls what the participants can see/hear
▪ commonly consists of a presentation being displayed with
the presenter explaining (audio)
▪ participants view the presentation and listen to the
presenter
o presenter has a control panel to decide when participants can
interact
o a chat box is provided for participants to type in their questions
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
44
Special thanx to:
Nada Dessouky & Shaimaa Hesham
3. Audio conferencing:
o participants can only hear each other
o can be carried out over standard telephone lines or over internet
o the organizer of the conference is given 2 PINs by the phone
company (one for the organizer and one for the participants)
o at the time of the conference the organizer dials the conference
phone number and enters his PIN to start the conference
o then the participants dial the same number and enter their PINs
to join the conference
Required hardware
Require internet
Internet usage /
bandwidth
To join you need
Use
Video conference
Webcam / speaker
/ mic at all
participants
Yes
High so high risk
of delay / lag /
quality issues
Username &
password
Online meetings
Web conference
May only require
webcam / mic at
presenter side
Yes
Lower so lower risk
of delay / lag /
quality issues
Invitation link
Audio conference
Phone
Training / lectures
/ presentations
Phone meetings
Possible
Lowest
Pin code
• Internet telephony / VOIP
A service that enables people to use the Internet as the transmission
medium for telephone calls by converting sound into digital packets
Also called VOIP (Voice Over Internet Protocol) (e.g. Skype).
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
45
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Risks and Security
 Virus
▪
▪
▪
▪
A program that can replicate itself
and attaches itself to other programs
Can delete or corrupt data stored on the computer
Can slow down computer performance / fill up memory
✓ How to avoid virus:
1. Use anti-virus software (must be updated)
•
•
•
•
•
checks every file the user opens or downloads
scan any removable media before use
scan e-mail attachments
stores virus codes and downloads new, updated definition files
for new viruses
when an antivirus program scans a file it compares the file with
the list of known viruses, if it matches, the antivirus will try to
clean the file if possible, if not the user is given choice to delete
or quarantine the file (file is moved to a hidden directory, the
user does not have access to the quarantined file)
2. don’t download programs from untrusted sites
3. don’t open attachments from e-mails from unknown senders
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
46
Special thanx to:
Nada Dessouky & Shaimaa Hesham
 Hacking
▪
▪
▪
Unauthorized access to a computer system
to misuse data (steal, change, delete)
for identity theft
✓ How to avoid hacking:
1. Authentication
Making sure that the person using the computer is who he claims to
be (ensuring the identity of the person using the computer).
Methods of authentication:
i.
Username & password:
o Username is a unique set of characters used to identify
the user
o Password is a confidential set of characters only the
user knows. Password should be:
▪ Changed frequently
▪ Strong:
• Contains letters and numbers
• Letters uppercase & lowercase
• Contains symbols
• Long (more than 8 characters)
• Difficult to guess
• Doesn’t contain personal info (nickname,
birthday)
▪ Easy to remember by the user
▪ Never written down or given to anyone
 but passwords can be forgotten / guessed / stolen
ii.
Magnetic stripe cards / Chip cards / smart cards
o stored on the card is a unique ID to identify the user
 but ID cards can be stolen or lost
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
47
Special thanx to:
Nada Dessouky & Shaimaa Hesham
iii.
Biometrics / zero login
o unique as no two people have the same fingerprint
o difficult to be copied
o impossible to be lost or forgotten
 but expensive equipment and takes time to scan
 needs a lot of storage space
 security issues related to storing people’s biometric data
o examples:
▪ Fingerprint scans
▪ Retina scans, Iris recognition
▪ Face recognition
▪ Voice recognition
o Zero-login: when biometrics are combined with behavior
patterns (like location, how user swipes screen) to
increase security; changes detected in these patterns
can lock user out
iv.
Physical token
o often in the form of a numerical
display device
o a one-time passcode is generated
and sent to the token
o the user enters the passcode to gain
access to the system
v.
Electronic token
o A one time passcode that is generated and sent to a
trusted device such as a mobile phone; which is then
entered to authenticate the user
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
48
Special thanx to:
Nada Dessouky & Shaimaa Hesham
vi.
Digital certificate
o like a passport, a digital certificate provides identifying
information about the website / email sender to ensure
they are authentic
o can be verified because it was issued by an official
certification authority
o it contains:
▪ the name of the certificate holder
▪ a serial number
▪ expiration date
▪ the digital signature of the certificate-issuing
authority (CA) so a recipient can verify the
certificate is real
Two-factor authentication
o When multiple authentication methods are used together
to increase security
2. Firewall
Software or hardware to prevent unauthorized access through
the network, prevent unwanted programs, block unwanted sites
▪ By controlling incoming and outgoing traffic
▪ Acts as a barrier between the computer and external network
▪ by keeping a list of allowed IPs and a list of blocked IPs
▪ in case of unknown access user is asked for permission
 firewall can affect the operation of the computer and stop some
uploads / some legitimate software can be blocked by the firewall
 may need to be shut down at times to upload files therefore
making computer unsafe
 if firewall installed on router it will not secure computer from
other computers in the same network
▪
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
49
Special thanx to:
Nada Dessouky & Shaimaa Hesham
✓ To protect data in case of hacking:
1. Encryption
▪
▪
▪
Encoding / scrambling data using encryption key
so that only the authorized people can understand
as only they have the decryption key to decode it
 Encryption can’t prevent hacking or deleting or changing data
 But it prevents a hacker from understanding data if stolen so it
can’t be used against the owner.
 Phishing
▪
▪
▪
▪
▪
Sending fake e-mails
identical to the bank's e-mails (looks legal)
requesting personal confidential information in reply to the email
or containing a link to direct the user to a fake website to enter personal
confidential information
leading to identity theft
✓ How to detect phishing:








E-mail contains spelling mistakes
General not personal (the bank knows your name)
No digital certificate attached to the e-mail
E-mail claiming the user won a competition they didn’t enter
Requesting personal confidential information
Contains suspicious links
Contains suspicious attachments
Urging for quick action
✓ How to avoid phishing:
1. Don’t reply to any e-mail requesting personal information
2. Be cautious when clicking on links in an email or downloading
attachments
3. Report the e-mail address that sent the e-mail
4. Be cautious of messages requesting urgent reply
5. Contact the bank to ensure the mail is fake
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
50
Special thanx to:
Nada Dessouky & Shaimaa Hesham
 Smishing
▪
▪
▪
▪
Short for SMS phishing
Sending fake SMS on a mobile phone , it often contains a URL or a
telephone number inside the text message
The recipient will be asked to log on to the website or make a phone call,
and asked to supply personal details such as card number / password
The sender of the SMS might not be a phone number
 Vishing
▪
▪
phishing via voice messages
used to leave voice messages that trick the user into providing personal
sensitive information
 Pharming
▪
▪
▪
▪
Redirecting a website's traffic to a hacker's identical website without
their knowledge
by installing malicious code (virus) on user's computer
to collect confidential personal information entered like passwords,
banking information, etc
leading to identity theft
✓ How to detect pharming:
 URL will change
✓ How to avoid pharming:
1. Concentrate to ensure URL is not changing while accessing website
where confidential info will be entered
2. Ensure the URL begins with https and padlock is displayed
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
51
Special thanx to:
Nada Dessouky & Shaimaa Hesham
 Key logging (spyware)
▪
▪
▪
▪
▪
▪
▪
Program installed by hackers on user's computer
to record keystrokes typed on the keyboard
stores them in a file
transfers it back to the hacker
without user’s knowledge
a method of stealing information like passwords, banking information, etc
leads to identity theft / card fraud
✓ How to avoid spyware:
1. Use anti-spyware (must be updated)
2. Use on-screen keyboard / dropdown when entering confidential
information
 Shoulder surfing
▪
Spying on someone while they use ATM or other electronic device to obtain
their personal identification number (PIN), password, etc.
 Card cloning
▪
Also known as skimming, this technique involves attaching a data skimming
device to the card reader slot to copy information from the card.
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
52
Special thanx to:
Nada Dessouky & Shaimaa Hesham
 Internet not policed
Reasons:
o freedom of speech would be affected
o very difficult to enforce rules over the internet because laws differ
from country to country
o very expensive to police internet; extra police force has to be set up
o many users are anonymous (use fake accounts) so difficult to track
o everything people do is being watched therefore privacy is lost
o internet is so big it is hard to keep track on all the activity
Results:
o presence of illegal materials
o presence of inappropriate websites
o presence of discussion groups containing hatred, racism, etc
o copyright laws are broken
o presence of unreliable information
✓ to make sure information is reliable:
1. Make sure the same information is found on multiple websites
2. Make sure the author is well qualified on the topic
3. Make sure the website is updated recently
4. If the website is reputable and well known source of
information it is reliable
5. The end of the URL indicates the type of the website (.edu is
more reliable than .com)
6. Avoid websites with excessive advertisements
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
53
Special thanx to:
Nada Dessouky & Shaimaa Hesham
 SPAM
▪
▪
▪
▪
Electronic junk mail sent randomly,
often unwanted advertising,
fills up mail inbox preventing important messages from being received
may contain viruses, spyware or phishing attacks
✓ How to detect SPAM:




Sent to many people
Contains advertisements
Spelling mistakes
E-mail claiming the user won a competition they didn’t enter
✓ How to avoid SPAM:
1. Anti-spam / spam filter
2. Don’t open any links in the e-mail
3. Block / report the sender e-mail address
4. Don’t use your e-mail to register on untrusted websites
5. Don’t subscribe in newsletters
6. Be cautious when clicking on links or downloading attachments within
emails
 Stealing personal info online
•
Personal info:
o
o
data relating to a living individual/person
data that can be used to identify a person
o Personal info can be
Sensitive
Confidential
•
Religion/philosophical beliefs
•
Passwords
•
•
Political views/opinions
Criminal record
•
•
Bank accounts
PIN codes
•
Health/medical record
•
Address
•
Genetic data/DNA
•
Date of birth
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
54
Special thanx to:
Nada Dessouky & Shaimaa Hesham
✓ E-safety
• Why?
▪
protects personal data from people who should not have access to it
▪
▪
prevents personal data being used against owner
Protects sensitive data
▪
Reduces risk of blackmail / rumors / identity theft / stalking /fraud
▪
Make sure data is being used for purpose that it was collected for
• How?
1. Make sure websites visited start with https and display padlock
2. When using social networking websites:
i.
Block or report anyone who acts suspiciously or uses inappropriate
language
ii.
Keep private and personal data secret (privacy settings)
iii.
Don’t enter private chat rooms
iv.
Never arrange to meet someone you met online
v.
Don’t accept friend requests from people you don’t know
vi.
Don't give out personal information e.g. address, phone number
vii.
Don't open/click on suspicious links/adverts on social media
viii.
Don’t share current location
3. When using online games:
i.
Watch out for cyber-bullying (someone who sends intimidating
messages)
ii.
Avoid use of webcams / audio chatting
iii.
Don’t use real name
iv.
Don’t share personal info like address, phone, etc.
v.
Play the games with the firewall operational
vi.
Play only with authorized versions of games purchased from the
correct sources and for which you have a license
vii.
Keep the game software up to date.
viii.
When disposing of your gaming device ensure all of your personal
information has been deleted.
ix.
Report abusive users
4. Read license agreement of any software or subscription before clicking “I
agree”
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
55
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• Difficult because
•
•
Users give information freely
Users don’t read the terms and conditions before agreeing to them,
•
therefore allowing data to be used
Data protection laws are local but networks are global
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
56
Special thanx to:
Nada Dessouky & Shaimaa Hesham
CHAPTER 3
Applications & Effects of ICT
Section 1
Applications
1. Control & measuring systems
Preset
Sensor
Analogue
reading
ADC
Digital
Processor
data
DAC
Actuator
➢ Sensors:
Sensors are used to measure physical quantities.
Sensor
Temperature
Light
Pressure
Moisture
Humidity
Water-level
Movement
Proximity
Wind speed
Wind direction
Contact
Sound
pH
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
What it detects
Temperature
Light / dark
Pressure (e.g. someone standing on it)
Concentration of water in soil
Concentration of water in air
How full / empty a container is
Movement nearby
How close / far something is
Speed of wind blowing
Direction of motion of wind
If the door is closed
Presence of sound
Acidity
57
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Control
device
➢
Analog data: Continuous data, can take any values in a range
➢
Digital data: Discrete data, binary (0/1)
➢ Analogue-to-digital converter (ADC):
Sensors measure analogue data and the processor can only process digital data so
it needs an ADC to convert analogue data to digital data.
➢ Digital-to-analog converter (DAC):
Converts digital signals from the processor to analog data to control a device.
Advantages of using control systems rather than humans:
1) More accurate readings
2) More frequent readings
3) Can work 24 hours without breaks or shifts
4) Faster response than humans
5) Can work in conditions dangerous or unsuitable for humans
6) Can take more than one reading at the same time
Control System Examples
System
Washing machine
Burglar alarm
Greenhouse
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
Sensors
Temperature
Pressure
Contact
Contact
Pressure
Motion
Sound
Temperature
Humidity
Moisture
Light intensity
58
Control devices
Heater
Motor / actuator
Buzzer
Pump
Alarm
Heater / cooler
Sprinkler
Light source
Special thanx to:
Nada Dessouky & Shaimaa Hesham
2. Banking applications
Transactions which can be carried out from bank website:
✓
✓
✓
✓
Check balance
Transfer money from account to account
Change personal information
View transaction details / bank statement
Transactions which cannot be carried out from bank website:





Withdraw cash
Deposit cash
Cash a cheque
Open a new account
Close an existing account
ATM vs visiting bank branch
✓
✓
✓
✓
✓


ATMs are more widely available than bank branches
ATMs are available when banks are closed
ATMs offer choice of language (useful if travelling)
Can use ATM of any bank to withdraw cash
Don't have to wait in line in ATM like in bank branches
Not all services are available in ATM
There is a daily limit on amount of cash withdrawn from ATM
ATM transaction options
✓
✓
✓
✓
✓
✓
✓
Withdraw cash
Deposit cash / cheque
Check account balance
Printing mini statements
Mobile recharge (top up)
Bill paying
Money transfer
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
59
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Online banking vs phone banking
Risk of defraud
Waiting on hold
Cost (especially if travelling)
Cost for bank
Choice of languages
Risk of misunderstanding & mistakes
Problem in internet connection may
cause transaction to be done twice
or not at all

✓
✓
✓
✓

Online banking
Higher
No
lower
lower
(mainly initial)
yes
higher
 yes
✓




✓
Phone banking
Lower
yes
higher
higher
(employee shifts)
no
lower
✓ no
Online banking
Customer advantages
Customer disadvantages
✓ saves time and cost of transportation
✓ available 24 hrs
✓ suitable for physically disabled people
who find it difficult to leave their homes
✓ available from anywhere (while
travelling)




Bank advantages
Bank disadvantages
✓ saves cost of rent (fewer branches)
✓ saves cost of salaries (fewer employees)
✓ wider range of customers (disabled /
far-away / 24 hrs availability)
✓ less risk of physical robbery
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
risk of hacking and defraud
users need good Internet connection
higher risk of making mistakes
cannot withdraw or deposit cash
 initial cost of creating secure website
 need to train employees
 cost of system maintenance
60
Special thanx to:
Nada Dessouky & Shaimaa Hesham
ATM (automatic teller machine) – initial steps
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
61
Special thanx to:
Nada Dessouky & Shaimaa Hesham
ATM - Cash withdraw
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
62
Special thanx to:
Nada Dessouky & Shaimaa Hesham
ATM - Cash deposit
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
63
Special thanx to:
Nada Dessouky & Shaimaa Hesham
ATM - Check balance
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
64
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• EFTPOS (Electronic Fund Transfer at Point Of Sale)
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
65
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Processing of bank cheques
•
Bank cheque is verified by making sure it is:
o Not fake
o Signed
•
Information from bank cheques are collected:
o Information printed
▪ Account number of payer
▪ Bank & branch code of payer
▪ Cheque serial number
o Information handwritten
▪ Amount
▪ Due date
▪ Name of recipient
▪ Signature of payer
•
When the due date of the cheque has arrived:
o The bank makes sure that the amount of money is available in the
payer’s account
o Decrease the balance of the payer’s account
o Increase the balance of the recipient’s account
o Send bank statements to both customers
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
66
Special thanx to:
Nada Dessouky & Shaimaa Hesham
3. Booking systems
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
67
Special thanx to:
Nada Dessouky & Shaimaa Hesham
4. Applications in retail
Stock control
Products table
Barcode
Product
name
Price
Suppliers table
Supplier ID
Quantity
in stock
Reorder
level
Supplier name
Reorder
quantity
Supplier
ID
Contact details
(telephone/address/e-mail)
Updating stock file when product is sold:
• The barcode is scanned by the barcode reader (or typed in manually)
• The products table is searched to find this barcode
• When found:
o The corresponding number in stock is decreased by the amount sold
Checking whether reorder is necessary:
• Number in stock is compared with reorder level
• If number in stock is less than reorder level:
o Reorder is necessary
Reordering products that are low in stock:
• The reorder quantity corresponding to the product is read
• The supplier ID corresponding to the product is read
• The supplier table is searched for this supplier ID
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
68
Special thanx to:
Nada Dessouky & Shaimaa Hesham
• When found:
o The corresponding contact details are used to contact the supplier
o The quantity to be ordered was previously read from the products
table
o Products are flagged as ordered
When products reordered are received:
• Flags are removed
• Number in stock is updated
Online shopping
Customer advantages
Customer disadvantages
✓ saves time and cost of transportation
✓ available 24 hrs
✓ suitable for physically disabled people
who find it difficult to leave their homes
✓ can shop from abroad
✓ wider variety of products
✓ easy to compare prices





Shop advantages
Shop disadvantages
saves cost on rent (fewer branches)
saves cost of salaries (fewer employees)
method of advertisement
wider range of customers (disabled /
far-away / 24 hrs availability)
✓ less risk of physical robbery
 loss of customer loyalty
 initial cost of secure website
 need to train employees
✓
✓
✓
✓
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
risk of hacking and defraud
quality not guaranteed
cost of shipping/customs
difficult to refund
needs Internet connection & credit card
69
Special thanx to:
Nada Dessouky & Shaimaa Hesham
5. Robotics in manufacturing
Advantages of using robots in manufacturing:
Increase in production (robots don’t need breaks like humans)
Consistency in production (exact same product every time)
Monthly salaries for human workers are saved
Dangerous tasks are carried out without the need of life insurance for
humans
✓ Fewer mistakes / greater accuracy
✓
✓
✓
✓
Disadvantages of using robots in manufacturing:




High initial cost of robots
Training workers who will be still present after robots are introduced
High running cost of maintenance of robots
Robots cannot react in unexpected situations
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
70
Special thanx to:
Nada Dessouky & Shaimaa Hesham
6. Monitoring and tracking
Automatic number plate recognition system (ANPR)
It is used to read the number plates on cars
Car park example:
•
•
•
•
•
•
•
A sensor detects a vehicle
It sends a signal to the processor to instruct the camera to capture an
image for the car
A program is used to isolate the number plate from the image
The brightness and contrast is adjusted to separate each character in
the plate
Each character is recognized using OCR then it is stored in the database
The car park barrier is raised and the driver receives a ticket showing
the date and time
When the driver returns they insert their ticket to calculate the charge
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
71
Special thanx to:
Nada Dessouky & Shaimaa Hesham
7. Emerging technologies
Global Positioning Systems (GPS)
•
System used to detect the position of the user
•
Signals (radio waves) sent from device to satellite
•
Signals (radio waves) sent from satellite to device
•
Device calculates the distance from satellite
•
At least 3 satellites are used
•
Location is determined
Satellite navigation
•
GPS is main a component of satnav
•
used in routing to destinations
examples:
o
o
o
o
o
o
in cars
by walkers to locate position on hills/mountains
by runners to calculate distance run
by farmers for tractor navigation
in satellite navigation systems for ships
in tracking aircraft
Geographic Information System (GIS)
•
Adds layers of data to maps
•
Allows the user to analyze data according to location (in order
to take decisions)
•
Allows users to create interactive queries
•
Users can edit map data
•
Works with GPS
Uses:
•
weather forecasting
•
sales analysis
•
crime patterns
•
traffic information
•
disease spreading
•
population forecasting
•
land use planning
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
72
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Virtual reality
•
Simulated digital world
•
It uses headset to allow 360 view of digital world & suits, gloves, joystick to
interact
•
Isolates user from reality
Augmented reality
•
Virtual objects / info overlaid
onto real world environments
•
Not isolated from
surroundings
•
Requires only smartphone
Artificial intelligence (AI)
•
It is a technology by which a program updates itself automatically through
learning from its own experience
•
The ability of a computer to perform tasks similar to learning and decision
making in humans
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
73
Special thanx to:
Nada Dessouky & Shaimaa Hesham
8. Applications in modeling
A model is created prior to creating a real thing in order to test / avoid
errors in reality, examples include:
•
CAD (modeling buildings or machinery)
•
simulations (modeling situations and training people before being
placed in the real scenario)
•
financial models (calculations of expected profit or loss to avoid
financial losses in a project)
Benefits:
•
Fewer errors in final version of real item as errors would have been
resolved in model
•
Saves money as it saves on resources
•
Safer to run a computer model rather than risking human life
•
Different scenarios/what ifs can be carried out which may happen in
real life/to experiment
•
Some situations will be very difficult to test in real life
Challenges:
•
Models can only test situations which are expected / in reality some
situations might come up that were not expected
•
Humans in a model will not react the same way they will do in a reallife dangerous situation
•
Creating models consume time, delay in start of creating the real
thing
•
Models usually require specialist / specialist software to be done
(cost)
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
74
Special thanx to:
Nada Dessouky & Shaimaa Hesham
9. Expert systems
An expert system is a system that stores the knowledge of a human expert, so
that it can later be asked questions & give answers to them.
Some examples of Expert systems
•
Medical system
•
Car fault diagnostics
•
Plant species identification
•
Rock identification
•
Mineral exploration
•
Chess games
•
Weather forecasting
•
Tax calculation
Advantages:
•
Help the expert give more accurate results
•
More consistent results; not affected by emotional reasoning
•
Faster to produce results
•
Uses data from many experts so contains more knowledge than single expert
•
Cheaper than employing multiple experts
•
Updating expert system is cheaper and more frequent than regularly
training experts
Disadvantages:
•
Lack common sense in the decision making process
•
Initial cost of creating the system
•
If the knowledge base or rules base contain errors it will mislead the expert
to an incorrect result
•
Must be regularly updated
•
Experts must be trained to use it
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
75
Special thanx to:
Nada Dessouky & Shaimaa Hesham
How to use an expert system
•
Questions about the ... (depending on the application) are asked by the
system
•
Answers to these questions are entered by the user through the
interactive user interface (inputs depend on the application)
•
Inference engine uses the information in the knowledge base and rules
base to find results
•
The results will be output to the user on the user interface
(suggested/possible/probable ... (depending on the application) are
displayed on the screen)
•
The explanation system will explain how the expert system arrived at its
conclusion
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
76
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 2
Effects of ICT
At home
Health & Safety
Legal effects
➢ At home
Effects of microprocessor-controlled devices at home (on
people's lifestyle)
✓ More leisure time
✓ More time to work (full time instead of part time)
✓ Can leave home while household tasks (cooking & washing) are being
done by equipment
✓ More secure lifestyle (due to presence of automatic alarms)
✓ Can control appliances (e.g. heating systems) using smart phone while
outside home
✓ Timers on home cooling / heating systems can be set to come home to
a suitable temperature without leaving it on the whole time
✓ Automatic lighting systems can reduce risk of injury
 People have become lazy as they are more dependent on equipment
 Lack of exercise
 Manual household skills are lost
 Un healthy lifestyle due to dependency on ready meals
 Cost of purchase and maintenance of devices
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
77
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Smart homes
✓ Can control devices remotely (while outside the home)
o Switch on/off devices before getting home or after leaving
✓ Smart fridge can send reminders to buy products when running out
✓ Security systems connected to the internet enable monitoring the
home while outside
✓ Smart television enables streaming of content to watch at any time &
playing online games
 Needs stable internet connection
 High initial cost & maintenance of devices
 Must have a smart phone with internet connection
 Risk of viruses installed on devices may cause malfunction
 Risk of hacking devices like burglar alarms/security cameras/people
can view your house/switch off the alarm
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
78
Special thanx to:
Nada Dessouky & Shaimaa Hesham
➢ Health & Safety
Health problems and prevention:
Health
problems
Eye strain
Cause
Prevention
Staring at computer screens for a
long time
Back pain
Sitting in a wrong position in front
of the computer for a long time
Neck pain
Looking up or down at the screen
Long use of mouse
(pain in wrist)
Repetitive
Strain
Injuries
(RSI)
Long use of keyboard
(pain in wrist)
Repetitive clicking on mouse
(pain in fingers)
Long typing on mobile phone or PDA
or use of joystick
(pain in thumb)
Ozone
irritation /
respiratory
problems
Sitting too close to a laser printer
for a long time
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
79
Use anti-glare screen
Use flat screens
Improve surrounding lighting
Reduce screen brightness
Maintain appropriate distance
between screen and eyes
Take regular breaks
Sit in an upright position
Use ergonomic chair
Take regular breaks
Sitting on an adjustable chair
so screen is at eye level
Take regular breaks
Use wrist rest
Use ergonomic mouse
Take regular breaks
Use ergonomic keyboard
Use hand exercises
Use voice commands
Take regular breaks
Use hand exercises
Use voice commands
Take regular breaks
Use hand exercises
Use voice commands
Take regular breaks
Proper room ventilation
Laser printer placed in
printer room
Change type of printer
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Safety problems and prevention:
Safety problems
Tripping over cables
Risk of electric shock
Prevention
Keep wires in underground ducts
Keep wires well insulated
Avoid drinks in presence of computers
Don’t overload sockets
Avoid overheating of equipment
Do not cover the cooling vents on
computer equipment
Have CO2 fire extinguishers
Keep computers in a U-shape and wellspaced to enable easy exit
Use strong desks / use large desks /
secure equipment to wall or floor or
desk
Risk of fire
People trapped in emergencies
Injuries due to equipment falling
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
80
Special thanx to:
Nada Dessouky & Shaimaa Hesham
➢ Legal effects
▪ Copyright law
A law to prevent software from being sold, copied, distributed or updated
any without its owner's (author) permission.
It gives the owner of the copyright the exclusive right to make copies of
the work
Only the owner can give permission for others to use the work
Support the original producers of the work
Example: Windows copyrights belong to Microsoft.
Methods by which companies try to protect copyrights:
•
Serial number / product key
To be entered by user while installing (which was supplied with the
original copy of the software)
•
License agreement
The user will be asked to click ‘OK’/’I AGREE’ to terms before the
software continues to install.
•
Holograms
Used on the packaging to indicate that this is a genuine copy.
•
Some software will only run if the CD, DVD or memory stick /
dongle is actually in the drive; this stops illegal multiple use and
network use of the software.
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
81
Special thanx to:
Nada Dessouky & Shaimaa Hesham
▪ Data Protection Act
Data protection Act is a law to protect personal data handled by
organizations (example: school, hospital, club) from misuse:
•
Do not keep data longer than required
•
Do not collect data that is not required
•
Do not pass on the data to anyone without the owner’s permission
•
Only certain employees can view the data and handle it
•
Keep the data safe and secure (encryption, firewall, password)
•
Only use the data for the reasons given to the owner
•
Keep the data up to date
➢ Netiquette
Short for internet etiquette, set of rules that need to be respected when
communicating over the internet, examples:
•
Don’t be abusive
•
Don’t send spam or repeatedly send the same information to the
same person
•
Respect peoples’ privacy, don’t share personal information about
anyone without permission
•
Don’t use capital letters; it’s considered shouting
•
Don’t plagiarize, always acknowledge source of any information /
quotations / images used
•
Check spelling and grammar, gives a good impression
•
Posts made are usually public so be careful of any comments being
shared
•
Don’t send inappropriate content, disturbing for others and not
respectful
•
When sending emails confirm the recipient to make sure the email
is not delivered to someone else
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
82
Special thanx to:
Nada Dessouky & Shaimaa Hesham
CHAPTER 4
Software Lifecycle
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
83
Special thanx to:
Nada Dessouky & Shaimaa Hesham
➢ Analysis
 Why?
Gathering information about the current existing information system:
•
identify inputs, outputs and processing in the existing system to fulfill
them in the new system
•
identify problems with the system to avoid them in the new system
Agreement with the customer about:
•
requirements to fulfill them in the new system
•
budget analysis
•
timeline
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
84
Special thanx to:
Nada Dessouky & Shaimaa Hesham
 How?
Method
Interviewing employees,
managers
Advantages
✓ Collecting detailed
information
✓ Questions can be
changed based on
responses
✓ Can see body
language; less risk of
misunderstanding




Disadvantages
Time consuming
Not anonymous
(unreliable
responses)
Expensive due to
analyst time
Analyst & employee
must be available at
same time
Distributing questionnaires to
employees
✓ Collecting wide
variety of responses
✓ Responses can be
anonymous (reliable
responses)
✓ Cheaper than
interviews
✓ Not time consuming;
can be filled any time
Observing or monitoring
employees while working
without interference
 Most people are
✓ No waste of employee
distracted or
time
uncomfortable or
✓ Reliable information;
don't work as usual
the analyst will
while being watched
observe the system in
 Not all problems
person instead of
may appear during
taking opinions
the observation
Document study: Collecting
and examining documents
produced (like receipts or
reports), manuals of the
current system.
✓ Details about paper
work cannot be
obtained by other
methods
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
85
 Careless / vague
answers
 Misunderstanding of
questions
 Questions not
flexible
 Time consuming
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Design
 Why?
Taking decisions based on which the system will be created
 How?
Database file structure
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
Processing
Input methods
86
Output methods
Special thanx to:
Nada Dessouky & Shaimaa Hesham
➢ Development & testing
 Why?
Development: The system is created from the designs
Testing is done to make sure the system works as expected
 How?
Stages:
Unit test:
each module of the
system is tested alone
System test:
the whole system is
tested
Data used:
Normal:
data inside the
acceptable range
Abnormal:
data outside the
acceptable range / data
of wrong datatype
Extreme:
data on the limits /
borders / boundaries of
the acceptable range
Live (real):
data with known outputs
from the previous
system; the same data
is input to the new
system to make sure
outputs are the same
Reason:
To make sure normal &
extreme are accepted
and abnormal is
rejected
To make sure outputs of
the new system are
identical to outputs of
the old system
Improvements could be needed as a result of testing:
If testing results are not as expected, modifications may need to be done to
design and/or development.
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
87
Special thanx to:
Nada Dessouky & Shaimaa Hesham
➢ Implementation
 Why?
Replacing the old system with the new system
 How?
Method:
Direct changeover:
Remove the old system
completely and use the
new one at once
Parallel running:
Use both systems
together for a while then
remove the old system
Phased implementation:
Replace the old system by
the new part by part
Pilot running:
Replace the old system by
the new branch by branch
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
Advantages & Disadvantages:
✓ Cost: low cost
• Time: fast replacement
 Training: no time to train employees on the new
system
 Risk: if the new system is faulty data will be lost
 Cost: high cost of running two systems
✓ Time: new system fully working immediately
✓ Training: have time to train employees on the new
system
✓ Risk: if the new system is faulty no data will be lost
• Cost: medium cost
 Time: takes time until new system is fully working
✓ Training: have time to train employees on the new
system
• Risk: if the new system is faulty part of the data
will be lost
• Cost: medium cost
 Time: takes time until new system is fully working
✓ Training: have time to train employees on the new
system
• Risk: if the new system is faulty part of the data
will be lost
88
Special thanx to:
Nada Dessouky & Shaimaa Hesham
➢ Documentation
 Why?
User documentation
For the user to help him:
•
interact with the system
•
deal with any simple problems faced while using the system
Technical documentation
For another programmer to help him:
•
fix the system in case of any malfunction
•
update the system if more functionality is needed
 How?
User documentation
Contains:
•
how to print, save, load , run , install etc (use the system)
•
error messages
•
frequently asked questions
•
trouble-shooting guide
•
glossary of terms
Technical documentation
Contains:
•
program flowcharts / algorithm
•
system flowcharts
•
file structures
•
program coding / listing / language
•
list of variables
•
validation routines
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
89
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Both contain:
•
software and hardware requirements
•
purpose of the system
•
limitations of the system
•
input & output formats
•
sample runs
➢ Evaluation
 Why?
To make sure users are satisfied with the system; make sure the system:
•
Appropriate
o meets need of users
o match original requirements
•
is easy to use
o users are able to interact with the system easily
o users need minimal training
•
is efficient
o operates quickly
o reduces running cost
•
has no problems
o has no suggested improvements
 How?
•
Interviews and questionnaires with the users to collect their opinions
and responses after using the system
•
Comparing the system with the original requirements
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
90
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Types of software
➢ Customized software
•
Specially designed for the company so it meets their needs
•
Less functions in the software making it easier to use
•
Customized support from the system creator
•
The software only has the features needed by company therefore uses
less memory
•
Can be changed when the company needs
➢ Off-the shelf software
•
Cheaper to purchase as there are no development costs
•
More reliable as any error will have been tested
•
Regular upgrade more easily obtained
•
More support as many users
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
91
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Chapter 5
Practical Related
Section 1
Database
Data types
•
Numeric
o Integer
o Decimal
•
Currency
•
Text / alphanumeric
•
Date
•
Boolean (a field with 2 options)
Why telephone number is text?
o May begin with 0
o Not needed in any calculations
o Could contain + or –
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
92
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Database structures
1) Flat file database
Consists of only 1 file where all data is stored.
Supermarket
Barcode
Prod Name
No in
Reorder
Supp
Supp
stock
Level
ID
name
Supp tel
3748502051
Lindt
100
80
1
Peter
7842452
4802385285
FerreroRocher
60
50
2
Bill
6453453
5892328592
Bounty
55
50
1
Peter
7842452
5893452345
Kinder
45
40
3
Chris
5635473
5023463852
KitKat
65
60
3
Chris
5635473
5839567392
Hershey’s
60
50
1
Peter
7842452
5683065794
Toblerone
70
60
2
Bill
6453453
Problem:
In flat file databases data is repeated; the personal details of every supplier
are repeated with each of his products.
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
93
Special thanx to:
Nada Dessouky & Shaimaa Hesham
2) Relational database
Consists of 2 or more tables with relations between them; relations are created
by taking the primary key from a table and adding it to another table as a
foreign key.
Primary
Barcode
3748502051
Foreign
Products
key
Prod Name
Lindt
key
No in
Reorder
stock
Level
Supp ID
100
80
1
4802385285 FerreroRocher
60
50
2
5892328592 Bounty
55
50
1
5893452345 Kinder
45
40
3
5023463852 KitKat
65
60
3
5839567392 Hershey’s
60
50
1
Primary
key
Problem solved:
By separating the product details and supplier details into
2 tables and creating a relation between them by adding
the Supplier ID to the product table as a foreign key.
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
94
Suppliers
Supp
Supp
ID
name
Supp tel
1
Peter
7842452
2
Bill
6453453
3
Chris
5635473
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Primary key
Foreign key
•
Advantages of Relational database:
o Data is only stored once/avoids data duplication
o Less storage space
o Easier to edit records
o Easier to add/delete records
o Complex queries / reports can be carried out using several tables
•
Advantages of flat file database:
o All records are stored in one table.
o Easier to understand/use
o Easier to sort and filter data
o Easier to setup (less ICT experience needed)
•
Primary key vs foreign key
o Primary key is unique
o Primary key is used to identify a record
o Foreign key is used to link tables
o A table can have only one primary key but multiple foreign keys
o Any database (relational or flat-file) can contain primary key
o Only relational database can contain foreign key
o Primary key cannot be blank
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
95
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Checks to minimize errors
Make sure data entered
is:
Prevents:
Does not prevent:
Done by:
Validation
Verification
Logic
Identical to data source
Illogical entries
Incorrect logic entries
Computer
Copying/typing errors
Errors in data source
User / user & computer
➢ Verification checks
• Double data entry
User enters data twice and computer compares the two entries to make sure
they are identical.
• Visual check
User visually compares data entered with data source to make sure they are
identical.
•
Proof-reading is NOT verification check
o Reading the document after typing to check for spelling, grammar,
punctuation mistakes
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
96
Special thanx to:
Nada Dessouky & Shaimaa Hesham
➢ Validation checks
Check
Range check
Length check
Format check
Lookup check
Presence check
Type/character
check
Check digit
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
Description
Make sure numbers entered
are within specific limits
Make sure the exact correct
number of characters have
been entered; not more & not
less
Make sure letters, numbers,
specific symbols are in their
specified positions
Make sure data entered is one
of the specified options
Make sure the field is not left
blank
This checks to see if the data
entered is of the correct type
(i.e. letters only or numbers
only)
Certain calculation performed
on the numbers of a barcode
and the result must be equal
to the check digit
97
Example
Numeric fields
Date fields
In practical:
• Between 0 and
100
• >=0
• <10
Telephone number
Candidate number
Centre number
Centre number
Gender (M or F)
Title (Mr or Ms or Dr)
In practical:
• M or F
• Red or Blue or
Green
Key fields
In practical:
• Not NULL
Price can only contain
numbers
Name can only contain
letters
Barcode
ISBN
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 2
Spreadsheet
Search
direction
Built-in error
handling
Lookup array
must be
before return
array
Lookup array
must be
sorted
ascending
•
VLOOKUP
HLOOKUP
XLOOKUP
LOOKUP
Vertical
Horizontal
Both
Both
No
No
Yes
No
Yes
Yes
No
No
No
No
No
Yes
Formula vs function
o Formula:
▪ Can be simple calculations/mathematical operations
▪
Can be easily typed by user
▪ Can contain a function
o Function:
▪
▪
•
Built into the software
Have a pre-defined name
Naming cells/ranges:
o Easily referring to cells
o Simplifies formulas
o Easy to refer to cells without using cell references
o Don’t have to set absolute cell manually (a names range will not change
when replicating)
•
•
Absolute cell reference ($A$2) when replicated the cell reference will not
change
Relative cell reference (A2) when replicated the cell reference will change
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
98
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 3
Webpage design
•
Relative vs absolute file path:
Relative file path
•
Absolute file path
displays only file name
displays file name and path
means all files are saved in same
means files are not saved in same
folder
folder
Files should be saved in one
folder to be ready for publishing
Will only work on one computer
as other computers will not have
the website (should be relative
not absolute)
the same file path
Web development layers
o Content layer (htm)
Creates the structure of the web page including images, tables,
text, hyperlinks
o Presentation layer (css)
▪
▪
Defines the format of a web page through styles including
colours, fonts, borders
o Behaviour layer
▪ created using coding / scripting language; to control interactive
content
•
Hyperlink:
•
o A link from text or image to redirect the user to another position on
the same page, another webpage, an email
Anchor:
o
A position on the webpage that a hyperlink will point to
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
99
Special thanx to:
Nada Dessouky & Shaimaa Hesham
•
Bookmark:
o saved shortcut to direct the user to a certain website (favorites)
•
Class:
o It is defined in a stylesheet using a dot (e.g. .right)
o It is used in adding or changing properties without having to create
new style
•
Head section of htm contains:
o Page title
o Stylesheet link
o Default target frame
o Metadata
▪ Charset: defines the character set used by a web page (the
▪
•
type of characters displayed)
Page description: a suitable description of the web page
▪
Keywords: keywords are used by search engines to find
websites matching a user’s search.
▪
Viewport: the user’s visible area of the web page
▪
Author: name of the webpage creator
Body section of htm
o Tables
o Images
o Hyperlinks
o Videos
o Text
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
100
Special thanx to:
Nada Dessouky & Shaimaa Hesham
•
Attached stylesheets vs inline styles
Attached stylesheet
separate from the web page; can be
Inline styles
within each web page
applied to multiple pages
edited in one file
edited by changing each web page
placed in the head section of the web
can be anywhere in the web page
page
Lower priority
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
Higher priority
101
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 4
Word processing
•
•
Gutter: Extra margin on one side to allow for binding or stapling a book
Widow: When the last line of a paragraph is separated on the next page
•
Orphan: When the first line of a paragraph is separated on the previous
page
•
Breaks:
To avoid orphans/widows
To improve layout of the document
To enable to start a new chapter on a new page
o Page break: pushes text to next page
o Column break: pushes text to next column
o Section break: To allow for the change of orientation of pages in the
document
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
102
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 5
Presentation
•
Master slide:
o Ensures consistency
o Saves time of repeating formats adjustments on different slides
•
Evaluate presentation:
positive points:
o Font colour contrast with background colour
o Font size is big enough to be easily read
o Titles centre aligned and in larger font
o Text displayed as bullets not paragraphs
o Not too much text on one slide
o Presence of animation and transition makes the presentation
interactive
o Title font larger than bullet font
o Presence of title slide as first slide (title and subtitle)
o Consistency of slides
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
103
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 6
General
Generic file formats are files that can be used in different types of application
software
Examples:
Term
Stands for
Definition and function
A file format used for text that contains formatting; can
.rtf
Rich text format
contain tables, images, etc
can be opened in any word processor
A file format used for plain text that contains no
.txt
Text file
formatting, no images or tables
can be imported into any text editor/ word
processing/DTP package
A file format used to hold tabular data, e.g. spreadsheet
.csv
Comma Separated
or database table. It stores it as a text file using commas
Values
(or semi-colons) to separate data items.
can be imported into any spreadsheet or database
File containing design of the webpage created using Hyper
.htm
HyperText Markup
Text Markup Language
can be opened by any web browser and on web-design
software
Contains style definitions (to define how to display HTML
.css
cascading
stylesheet
elements), can be attached to each webpage to avoid
including styles in HTML
can be opened in any text editor and on web-design
software
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
104
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Makes it possible to display formatted text and graphics
.pdf
Portable document
in the same layout on any device screen
format
can be opened in any document format reader on any
device
Container that holds any type of data stored in a
.zip
Archive file
compressed format
.rar
formats
Used to save storage in the computer and reduce
attachment sizes on email
Best Use
JPG
GIF
PNG
Joint photographic
expert group
Graphics
Interchange Format
Portable network
graphics
Simple animations
(moving images)
Transparent images,
icons, graphics
Lossless
Lossless
Websites (fast
loading)
photography
Lossy
Compression
(loses quality when
compressed)
(does not lose
quality when
compressed)
(does not lose
quality when
compressed)
High Resolution Use
Good
No
Okay
Colour
Millions
256
PNG 8 - 256, PNG
24 - Millions
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
105
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 8
Corporate house style
Corporate house style is way a company is presented to customers; including color
scheme, font, logo, etc. These items are applied to all company’s documents,
presentations, webpages, e-mails…
Benefits:
•
Consistency
•
Brand recognition
•
Reduces time spent in formatting documents
•
Reduce errors of typing/forgotten elements
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
106
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 9
Audience needs
The design of any ICT product (poster, presentation, website, etc) is
affected by the audience targeted:
o Different size/style of font for the title
o Clear font color for title/text
o Clear fonts for the title/text
o Text well distributed
o Contrasting colours for font and background colour
o Up-to date information
•
Children:
o Simple language
o Bright colors
o Cartoons / navigation
o Small amount of text
•
Teenagers:
o Compatibility with mobile devices
o Attractive colors
o Relying on media rather than text
o Casual tone of speech
•
Adults:
o Pastel colors
o Formal language
o Compatibility with mobile devices
•
Elderly:
o Basic contrasting colors
o Large, bold text
o Not too much text
o Simple interface
o Access to help
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
107
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Section 10
E-mail
•
To: main recipients of the e-mail
•
Cc: Carbon copies: addresses receive a copy of the e-mail with the main recipients
knowing
•
Bcc: Blind Carbon copies: addresses receive a copy of the e-mail without the main
recipients knowing
•
Attachment: Files sent with the e-mail
•
Forward: sending the e-mail to someone else
•
Reply: sending an e-mail back to the sender
•
Reply all: sending an e-mail to all addresses in the "To" and "Cc" of the original email
Shaimaa El-Adl & Mostafa Mahdy
Hesham Hatem
108
Special thanx to:
Nada Dessouky & Shaimaa Hesham
Download