Information & Communication Technology Shaimaa El-Adl Mostafa Mahdy Hesham Hatem CHAPTER 1 Components of a computer system Computer Software (section5) Hardware Input devices (section1) Output devices (section2) Storage devices (section3) Processing devices (section4) ➢ Hardware. • Physical components of a computer system • Devices that make up the computer ➢ Software. • Programs for controlling the operation of a computer • Programs for processing of data Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 1 Special thanx to: Nada Dessouky & Shaimaa Hesham Section 1 Input devices Manual input devices Direct data entry devices User enters information manually Information is automatically input by a reader ➢ Manual input devices • Keyboard • Numeric keypad Only numeric data, examples: • Inserting personal identification number (PIN) for credit/debit cards • When using an ATM machine Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 2 Special thanx to: Nada Dessouky & Shaimaa Hesham • Pointing devices Selection on a graphical user interface, selection from a list or menu Mouse Touch pad Tracker ball In most PCs On laptop For use by people with computers limited motor skills e.g. young children or people with disabilities • Remote control • Joystick / Driving wheel • Simulators • Playing games • Touch screen Selecting from a limited list of options Quick to select options Replaces keyboard & mouse Improved hand/eye coordination Allows the user to use zoom and pinch & draw on screen Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 3 Special thanx to: Nada Dessouky & Shaimaa Hesham • Light pen Used to point or select or draw on CRT screens More accurate than touch screen but not as accurate as graphics tablet • Digital cameras / video cameras Takes pictures, records videos and stores them on internal memory or memory card • Web cam Inputting moving pictures from a fixed position into a computer • Microphones • Scanners Entering hard copy images into a computer Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 4 Special thanx to: Nada Dessouky & Shaimaa Hesham ➢ Direct data entry devices • Optical Character Reader (OCR) Uses: • Convert scanned image to a text file which can be edited (processed) by another software package such as word processors, spreadsheets, databases etc. How it works: • • Scan the document Recognize characters by identifying patterns of white and black pixels Advantages: ✓ Can be used to read any printed / handwritten text Disadvantages: ✓ Inaccurate when reading handwritten text ✓ Might take time to read/recognize text • Optical Mark Reader (OMR) Uses: • Multiple choice exam answers • Questionnaires • Attendance registration How it works: • • • Dedicated scanner device shines a beam of light onto the form Light is reflected back to sensors Marks reflect less light so sensors used to identify position of marks Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 5 Special thanx to: Nada Dessouky & Shaimaa Hesham Advantages: ✓ Saves time ✓ Accurate; avoid human error Disadvantages: ✓ Can only be used in case of choices (not text) ✓ If mark is not dark enough it might not be detected ✓ If mark does not fill the box it might not be detected ✓ If a mark is not erased properly it might be detected ✓ Must have pre-set forms (expensive) Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 6 Special thanx to: Nada Dessouky & Shaimaa Hesham • Magnetic stripe readers vs Chip readers and PIN pads Reader Uses Data stored when used in banking applications Magnetic stripe readers Chip readers and PIN pads At POS terminals, ATMs and in security applications • • • • Benefits • Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem unique account number bank ID expiry date Shoulder surfing cannot take place Faster payment process 7 • • • • unique account number PIN code bank ID expiry date • • more secure due to PIN not easily scratched / damaged / bent not affected by magnetic fields • Special thanx to: Nada Dessouky & Shaimaa Hesham • Radio frequency identification reader (RFID) : o tag can be read from a distance of several meters A tag has two parts: o Microchip that stores information o Antenna that is used to receive and transmit data How it works: ▪ The RFID reader sends radio waves / signal to the RFID antenna in the tag ▪ The radio waves received by the tag’s antenna activate the microchip ▪ Tag sends radio wave / signal back to the reader ▪ The antenna will send the information in the chip to the reader ▪ The reader sends data to the computer Advantages ✓ No line of sight or contact necessary; tag can be read from a distance ✓ Data stored on chip ✓ It is very robust and reliable technology ✓ Very fast read rate Disadvantages It is possible to hack data transmitted by a tag More expensive than a barcode or chip reader system Uses: • Attendance tracking instead of check-in queue • tracking stock, passports, automobiles • automatic passport control gates at airport • contactless payments Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 8 Special thanx to: Nada Dessouky & Shaimaa Hesham • Near Field Communication (NFC) reader o contactless transmissions of information, including payment for items using a smartphone or transmission of information between smartphones o NFC requires the sender and receiver to be closer together than in RFID which makes it more secure o NFC devices can act both as a receiver and reader Advantages of payment by contactless card ▪ ▪ ▪ ▪ Customer doesn’t have to worry about PIN being shoulder surfed Customer doesn’t have to worry about PIN being typed incorrectly Faster transaction so less queuing/waiting time Not damaged by overuse Disadvantages of payment by contactless card ▪ ▪ ▪ ▪ ▪ The card may be read accidently Only small amounts can be withdrawn More chance of fraud if card is stolen/lost (no PIN required) More expensive readers and cards Devices can read the cards wirelessly to steal money Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 9 Special thanx to: Nada Dessouky & Shaimaa Hesham • Bar code Reader Uses: • • • code numbers from products library books (ISBN) membership numbers How it works: • • • illuminating the code with red light a sensor detects the reflected light according to the intensity of the reflections (white reflects more light than black) the code is detected Advantages: ✓ Can be read upside down Disadvantages: If scratched / dirty might be read inaccurately Cannot store information • Quick Response Scanner (QR) The codes in the pattern contain a small amount of data; such as website URLs and contact details. Advantages: ✓ They can be read from many angles ✓ Can contain links to more information about the products ✓ It contains information about the product ✓ Can be read by any device with a camera and suitable software Disadvantages: QR codes can be used to transmit malicious codes & cause hacking Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 10 Special thanx to: Nada Dessouky & Shaimaa Hesham • Biometric readers o examples: ▪ Fingerprint scanners ▪ Retina scanners, Iris recognition ▪ Face recognition ▪ Voice recognition Advantages: ✓ unique as no two people have the same fingerprint ✓ difficult to be copied ✓ impossible to be lost or forgotten Disadvantages: but expensive equipment takes time to scan needs a lot of storage space security issues related to storing people’s biometric data Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 11 Special thanx to: Nada Dessouky & Shaimaa Hesham Section 2 Output devices • CRT monitor • Applications where space is not a problem. • TFT monitor • Applications where space is limited such as small offices. • LCD & LED • Touch screen Selecting from a limited list of options • Multimedia Projector Displays data from computers, pictures from televisions and video/DVD recorders • training presentations • advertising presentations • home cinema • Speakers Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 12 Special thanx to: Nada Dessouky & Shaimaa Hesham • Printers Printer Laser printer Inkjet printer Dot matrix printer low high speed high high low speed low Noise Speed Quality Running cost Lowest (toner) Initial cost Images Dirty environment Stationery Copies Ink high medium medium medium speed high highest (changing cartridges frequently) lowest most suitable not suitable not suitable most suitable separate sheets no Toner separate sheets no Droplets continuous carbon copies Ribbon Medium (ink ribbon) high not suitable • Graph plotter / Wide format printer • large printouts such as A0 • continuous printouts • high quality accurate printouts example: • CAD applications • graphs Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 13 Special thanx to: Nada Dessouky & Shaimaa Hesham • 3D printer • makes three dimensional solid objects from a design on computer • software slices the model into hundreds of layers • printer builds objects layer by layer (using material provided) • binds layers together Uses: • Organs created from patient’s own body cells • Car parts • Architecture models • Dental parts • surgical and diagnostic aids • development of prosthetics and medical products • tissue engineering, artificial blood vessels • design of medical tools and equipment Advantages: ✓ Products can be customized easily on request ✓ Speed of producing the product is faster than making it by hand ✓ Cheaper than making it by hand due to labor costs ✓ Quality is consistent ✓ Minimizes waste Disadvantages: Cost of buying the printer is expensive The size of the component is limited to the size of the printer If the initial design is incorrect, it is harder to correct Requires skilled programmers/operators therefore the initial costs could be higher Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 14 Special thanx to: Nada Dessouky & Shaimaa Hesham Section 3 Storage devices and media Memory & Storage Main Memory (used by computer system) RAM ROM Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem Backing Storage (used to store files for later use) Magnetic Optical 15 Solid State Cloud storage Special thanx to: Nada Dessouky & Shaimaa Hesham Main memory RAM (Random Access Memory) ROM (Read Only Memory) Read & write • Read only Volatile (loses its memory • Non-Volatile (does not when switched off) lose its memory when • Large capacity switched off) • High access speed • Small capacity Used to store data and files Used to store instructions currently in use to start up the computer • • Properties: Use: Main memory (RAM) provides speed which makes it suitable for storing data currently in use, but it does not provide permanence which does not make it suitable for storing data for later use. Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 16 Special thanx to: Nada Dessouky & Shaimaa Hesham Backing storage Backing storage devices provide permanence and are used to 1. store data for later use 2. backup data Backup is an extra copy of important files stored away from the original copy in case of damage or loss of original copy. This may happen due to: • hacker deleting the data • virus damaging data • corruption of hard disk • user accidentally deleted the data 3. transfer data from computer to another They are divided into 3 types: i. i. Magnetic ii. Optical iii. Solid state iv. Cloud storage Magnetic backing storage ➢ Fixed hard discs Properties: • very fast access to data • not portable • high capacity Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 17 Special thanx to: Nada Dessouky & Shaimaa Hesham Used to store: • operating systems • software • working data ➢ Portable hard discs Properties: • large capacity • portable • more expensive than other forms of removable media Used to store: • very large files which need transporting from one computer to another ➢ Magnetic tapes Properties: • large storage capacity • slow access speed - uses serial access for reading and writing (in sequence) • high transfer speed • drive not commonly available Used to store: • backups of file servers for computer networks Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 18 Special thanx to: Nada Dessouky & Shaimaa Hesham ii. Optical backing storage Properties: • portable • can be broken or scratched (not very robust) Used to store: • CDs (compact disc): large files (but smaller than 1Gb) such as music and general animation • DVDs (digital video disc): very large files (several Gb) such as films • both CDs and DVDs: can be used to store computer data • CD ROM DVD ROM CD R DVD R CD RW • • • • Uses by software companies for distributing software programs by music companies for distributing music albums by book publishers by film distributors prevent deleting / editing data recording of music downloads from the internet • recording of films and television programs • very useful for keeping files that need to be edited DVD RW Properties single ‘burning’ of data updating of information and ability to record over old data • Blu-ray • Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem for storing HD / 3D movies • 19 capacities of 25Gb, 50Gb and 100 Gb possible to playback video on a disc while simultaneously recording HD video Special thanx to: Nada Dessouky & Shaimaa Hesham iii. Solid state backing storage Properties: • smallest form of memory • portable • more robust than other forms of storage • more expensive than other forms • can be easily written to and updated ➢ Memory sticks/Pen drives Properties: • Can store up to many Gb Uses: • to transport files and backup data from computer to computer ➢ Flash memory cards Uses: • in digital cameras, palmtops, mobile phones, MP3 players Types: ▪ SD card o Most commonly used o Compatible with most devices ▪ xD card o mainly used for cameras o limited capacity (photos are not high quality) o not compatible with a lot of devices ▪ CFast card o faster transfer speed o used in gaming devices Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 20 Special thanx to: Nada Dessouky & Shaimaa Hesham ➢ Solid state drives Uses: • same as hard disk but in portable devices Size / weight Robustness Access / transfer speed Power consumption Price Lifespan Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem HDD Hard Disk Drive Bigger , heavier Moving parts, can be damaged Slower SSD Solid State Drive Smaller, lighter No moving parts, robust Faster Higher Less longer Lower More shorter 21 Special thanx to: Nada Dessouky & Shaimaa Hesham iv. Cloud storage Cloud is large group of remote networked servers which allows centralized data storage Some of the advantages and disadvantages: ✓ Files stored in the cloud can be accessed from any device/any place with internet access ✓ Don’t have to pay for large computer/mobile storage capacity ✓ Only pay for the storage you use as much of the space on the hard disk may be wasted ✓ Easier to add storage capacity on the cloud (unlimited storage capacity) ✓ Ability to synchronize files across multiple devices (automatically if requested) easily ✓ Backups are automatic on the cloud ✓ User does not have to worry about security measures as service provider manages securing the data ✓ Less risk of loss / damage If the internet connection is unstable/slow there will be a problem accessing/downloading files on the cloud Cloud storage can be expensive if extra storage capacity is required Easier to hack the cloud as the data is stored for a long period of time on servers Data is controlled by the storage service provider; customers should choose a trusted company Risk of fire , floods etc. at the server can cause data loss Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 22 Special thanx to: Nada Dessouky & Shaimaa Hesham Section 4 Processing devices • Motherboard It is a printed circuit, allows the processor and the other hardware to communicate, it contains several sockets and slots to connect other components • Central processing unit (CPU) The processor or central processing unit (CPU) is the part of a computer that: o Carries out software instructions (Control Unit; CU) o Performs calculations (Arithmetic Logic Unit; ALU) • Graphics card Allows the computer to send graphical information to a monitor, TV or projector (connected to the motherboard) • Sound card Allows the computer to produce sounds from speakers and input sound from a microphone (connected to the motherboard) Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 23 Special thanx to: Nada Dessouky & Shaimaa Hesham Section 5 Software ➢ Application Software [NEVER USE BRAND NAMES] Programs that allow the user to carry out specific tasks • Word processing Used for typing [example: MICROSFOT WORD] • Presentation design Used for creating presentations [example: MICROSOFT POWERPOINT] • Web page design Used in creating web sites [example: MICROSOFT FRONTPAGE] • Database Used for storing records [example: MICROSOFT ACCESS] • Spreadsheet Used in calculations, finances and accounts [example: MICROSOFT EXCEL] • Desk-top publishing (DTP) Used in making magazines, flyers, posters • Graphics package/photo editing software Used in editing pictures • Video editing software • Music / video player • Web browser Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 24 Special thanx to: Nada Dessouky & Shaimaa Hesham ➢ System software Programs that control and manage the computer’s hardware and run the applications software • Operating systems Operating system is the most important program that runs on a device. The main tasks of operating system: 1) Provides user interface (The user interface is the means by which the users interact with the particular machine, device or with the whole system) 2) Loads & runs application software (allows other programs to be installed and used) 3) Manages error messages 4) Manages Security Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 25 Special thanx to: Nada Dessouky & Shaimaa Hesham Types of operating system: (GUI) Graphical User Interface (CLI) Command line Interface Dialogue based Interface Gesture based Interface Microsoft Windows DOS prompt Siri, Cortana In some cars Wii, Kinect In some cars 1) User interacts with computer through voice commands 1) User interacts with computer through physical gestures Example Features WIMP 1) Character based 1) Windows to display (use only text) data interface. 2) Icons for programs 2) The user types a and files command (using 3) Menus for user to keyboard), followed select options by enter, if it is 4) Pointers to make typed accurately, it selections and is executed initiate actions (performed). Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 26 Special thanx to: Nada Dessouky & Shaimaa Hesham ✓ It is easier to learn ✓ Doesn’t take up a and use (no need for lot of RAM/memory experienced users). space ✓ GUI is more user ✓ Faster to run (no friendly; with CLI graphics to load) the commands have ✓ Flexible; no preto be memorized defined functions ✓ Allows scrolling & (the user can type zooming any command) Advantages / ✓ Clicking icons is ✓ More control over disadvantages faster than typing the computer; no commands commands are ✓ Variety of input protected devices Commands have to be memorized Commands need to be typed in; timeconsuming and high risk of errors. Any user Experienced users Used by who type commands accurately Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 27 ✓ Hand free commands ✓ Suitable for people with physical disabilities May lead to errors due to different vocal accents Expensive to develop Affected by background noise Limited range of commands ✓ Easy to use ✓ No mechanical devices needed ✓ No physical contact required Limited range of commands Can pick up unintentional movements User has to be near camera or sensor Not suitable for people with physical disabilities While driving and physically disabled users Special thanx to: Nada Dessouky & Shaimaa Hesham • Compiler Translate a program written by a programmer (High Level Language; HLL) into a machine code (code understood by the computer). • Linker Link more than one object file and combine them into single program • Device driver It enables any hardware device to communicate with the operating system, when a device is connected to a USB port the operating system looks for the appropriate driver • Utilities It helps to manage and maintain computer resources for example -> antivirus, anti-spyware, disk repair, security, file management, screen saver, disk defragmenter Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 28 Special thanx to: Nada Dessouky & Shaimaa Hesham Types of computers Desktop Laptop Tablet Size / footprint Portability smaller Not portable more portable Processing power / available functions keyboard less physical physical (built-in) possibility of repair / upgrade storage Smartphone Smartwatch touchscreen touchscreen (higher risk of typing mistakes) (higher risk of typing mistakes) (higher risk of typing mistakes) medium medium low no touchscreen more difficult high high built-in camera no no yes yes (convenient to use) likely to have with you all time no no no yes yes easy to use on the go not possible no possible but not convenient yes yes Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 29 Special thanx to: Nada Dessouky & Shaimaa Hesham CHAPTER 2 Networks Networks Network setup Types of networks Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem Effects of networks Network requirements Benefits 30 Risks & security Special thanx to: Nada Dessouky & Shaimaa Hesham Section 1 Network setup Types of networks • • • Network requirements • WAN LAN • LAN(with cables) • WLAN Intranet Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 31 Devices • General • Bridge • Network card • LAN • Hub • Switch • WLAN • Wireless access point • WAN (internet) • Router Special thanx to: Nada Dessouky & Shaimaa Hesham Types of networks ➢ WAN (Wide Area Network) • Public network • Connecting unlimited number of computers • Far away from each other • WAN consists of connected LANs • Internet is the largest WAN in the world ➢ LAN (Local Area Network) LAN Properties WLAN • • • Private network Connecting limited number of computers Close together in location. • Connected using cables • Connected using radio waves ➢ Comparison Tripping over cables Hacking Transfer speed Add devices Can connect smart devices Allows portability during use Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem Yes More difficult Higher More difficult No No 32 No Easier Lower Easier Yes Yes Special thanx to: Nada Dessouky & Shaimaa Hesham Wi-Fi Two types of radio waves Suitable use Full scale networks Range Transfer speed Number of connections Security Needs router/access point Wider Higher More Encryption & password Yes Bluetooth Data transfer between devices Smaller Lower Less Pairing No • How devices connect using Bluetooth o o Bluetooth enabled on both devices One device scans for any Bluetooth devices in range o o o o It sends signal (radio waves) which is received by the other device The other device sends a signal back Pairing takes place Data converted to radio waves to be sent ➢ Intranet / extranet • • • • Similar to Internet but private restricted to a certain organization access controlled by username & password extranet is when an employee is accessing the internal network (intranet) remotely (e.g. employee working from home, suppliers, customers, partners) Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 33 Special thanx to: Nada Dessouky & Shaimaa Hesham INTERNET Privacy Access Public Not restricted Amount of information Reliability of information Moderated / policed Type of information More Less reliable Security Less Control of data No (anyone can add material) Not required Network administrator Purpose No General Share files, communicate (email, conference) with anyone INTRANET Shared content Restricted access Data shared Yes Yes Within organization Communication Within organization Security More secure Ownership Owned by single organization Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 34 INTRANET/EXTRANET Private Restricted to members of organization Less More reliable Yes Related to needs of organization More (controlled by username & password) Yes Required to handle access rights / permissions / passwords Share files, communicate (email, conference) within organization EXTRANET part of a company’s intranet Yes Yes With customers/suppliers With customers/suppliers Can lead to security issues Can be used by several organizations Special thanx to: Nada Dessouky & Shaimaa Hesham Network Requirements 1) Hardware: • General 1. Network Interface Card (NIC) ▪ Placed inside the device To be able to connect to any network device (wired or wireless) Contains MAC address ▪ ▪ ▪ Device with only two ports Used to connect two networks together So they can function as a single network ▪ ▪ 2. Bridge • LAN 1. Hub ▪ ▪ ▪ Device with multiple ports. A hub is a ‘dumb’ device: When data is received at one port, it is sent to all connected computers. Connects computers together 2. Switch ▪ ▪ ▪ Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem Like a hub (device with multiple ports) But a more ‘intelligent’ device: data is sent only to its destination (using MAC address) Connects computers together 35 Special thanx to: Nada Dessouky & Shaimaa Hesham How to setup o Connect the computers to the hub/switch o o o Install the network software onto the computers Set up usernames, passwords and access rights Set up file/printer sharing • WLAN 1. Wireless access point ▪ ▪ ▪ ▪ Device that provides wireless connection to devices By connecting to an existing wired network Converts radio waves to data which can be sent through cables and vise versa Or connecting to an existing wireless range (called a repeater) How to setup o o o Password is preset in the WAP settings Wi-Fi enabled on devices Devices scan for Wi-Fi connections within range When Wi-Fi signal is detected the device requests connection (to the WAP) Signal (radio waves) sent from device to WAP WAP responds with signal requesting password User enters password on device o If password matches the password preset on the WAP, the o device connects to the Wi-Fi network (connection established) Data converted to radio waves to be transmitted o o o o Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 36 Special thanx to: Nada Dessouky & Shaimaa Hesham • WAN (internet) 1. Router Purpose of a router 1. Connects LAN to internet 2. Stores MAC and IP of connected devices IP address MAC address It identifies the device on the Internet (globally) It identifies the device inside a network (locally) can be changed cannot be changed assigned when connecting to a network (by ISP; internet service provider) assigned when hardware is manufactured (by manufacturer) e.g.: 172.16.1.40 e.g.: 8D-A7-12-4G-TH-CD 3. Send & receive data packets o Every message is divided into data packets; each contains: 1. Sender’s IP address 2. Receiver’s IP address 3. How many packets make up the whole message 4. Identity number of each packet 5. Part of the message Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 37 Special thanx to: Nada Dessouky & Shaimaa Hesham How a router works 1. A router receives/sends data packets 2. Checks the destination IP address • If IP is inside this network o Uses the MAC address to send to correct computer/device • If IP is outside this network o Data packet is sent to the appropriate router o It uses a routing table which lists all the different routes to other networks o Uses the IP address to work out the best/quickest route Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 38 Special thanx to: Nada Dessouky & Shaimaa Hesham Section 2 Effects of networks Effects of networks • • Benefits Risks & security Accessing websites • Wikis • Blogs • Forums • Social networking websites Communicating • fax • e-mail • instant messaging • video conference • audio conference • web conference • internet telephony (VOIP) • • • • • • • • • • • • Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 39 Virus • Anti-virus Hacking • Authentication • Firewall • Encryption Phishing Smishing Pharming Vishing Shoulder surfing Card cloning Spyware (key logging SW) • Anti-spyware Non-policed internet SPAM Stealing personal info online • E-safety Special thanx to: Nada Dessouky & Shaimaa Hesham Network benefits ➢ Accessing websites: A website is a group of webpages created using HTML, stored in a server and accessed by typing a URL in a browser • HTML ▪ ▪ Hyper Text Markup Language Language used to create/design webpages • Server ▪ ▪ centralized storage accessed by multiple users • URL ▪ ▪ Uniform Resource Locator a reference (an address / a link) to access a resource on the Internet o WWW ▪ ▪ ▪ ▪ Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem World Wide Web (WWW) Massive collection of webpages created using HTML Accessed using the internet / part of the internet Is a service on the internet 40 Special thanx to: Nada Dessouky & Shaimaa Hesham o HTTP: ▪ ▪ Hyper Text Transfer Protocol set of rules for transferring the webpage from the webserver to the viewer’s browser User’s browser (to view) Webpage Webserver o HTTPS/SSL: ▪ ▪ ▪ Hyper Text Transfer Protocol Secure version same as HTTP, but where everything transferred between webserver and user’s computer is encrypted using the SSL (Secure Socket Layer) SSL is a security protocol (set of rules) developed for sending information securely over the Internet ▪ The webpage is secured by SSL when o the URL starts with "https" o a padlock is displayed in the browser Webpage Webserver (Encrypted connection) User’s browser (to view) o FTP: ▪ ▪ File Transfer Protocol set of rules for transferring files between a file server and a user’s computer (client) Fileserver Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem Files 41 User’s computer (to store) Special thanx to: Nada Dessouky & Shaimaa Hesham • Browser ▪ software used to access webpages 1. user types URL 2. browser converts URL to IP address of server 3. request sent to server 4. servers responds by sending HTML code of requested webpage 5. browser converts received HTML code to webpage design 6. webpage viewed by user Examples of websites: • Blogs: (e.g. Blogger, LiveJournal, Tumblr and WordPress) ▪ ▪ ▪ ▪ ▪ ▪ ▪ Website (Short for web log) an online diary or journal (ideas, opinions, information) single author can be updated by author others can comment on these posts and on each other’s comments (takes the form of discussions) posts ordered from most recent to oldest (reverse chronological order) blog owner can set their blog for private or public access Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 42 Special thanx to: Nada Dessouky & Shaimaa Hesham • Moderated vs un-moderated forums ▪ ▪ A forum is a webpage where ideas and views on a particular issue can be exchanged Moderated forum has an admin who is responsible for: • Reviewing posts • Approving or rejecting posts which means moderated forums will have: • More reliable information • No off-topic posts • No inappropriate content • Delay to publish a post until it is reviewed • Users can be banned for posts they write • Wikis: editable multi-author website (e.g. Wikipedia) • ▪ Users participate in the creation of the content by : 1) posting information about many topics 2) reviewing and editing each other’s posts ▪ posts not in chronological order Social networking websites: (e.g. Facebook) ▪ ▪ ▪ ▪ ▪ ▪ Can share opinions, views, videos, photographs Easy to communicate with friends all over the world Can easily search for old friends Easy to plan events Easy to advertise Make new friends with common interests Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 43 Special thanx to: Nada Dessouky & Shaimaa Hesham ➢ Communication • Conference 1. Video conferencing: o o o o o o two or more people at different places online at the same time using the same program where they can all see and hear each other used in meetings Advantages: ✓ saves time and cost of travel ✓ suitable for physically disabled ✓ meetings can be held at short notice ✓ suitable in bad weather conditions ✓ no need for a conference room ✓ no risk of losing important documents during travel Disadvantages: time zone difference make it difficult to agree on meeting time high risk of misunderstanding cannot sign documents problems in internet connection may interrupt the meeting 2. Web conferencing: o used in presentations, training and online courses o participants online at the same time o presenter controls what the participants can see/hear ▪ commonly consists of a presentation being displayed with the presenter explaining (audio) ▪ participants view the presentation and listen to the presenter o presenter has a control panel to decide when participants can interact o a chat box is provided for participants to type in their questions Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 44 Special thanx to: Nada Dessouky & Shaimaa Hesham 3. Audio conferencing: o participants can only hear each other o can be carried out over standard telephone lines or over internet o the organizer of the conference is given 2 PINs by the phone company (one for the organizer and one for the participants) o at the time of the conference the organizer dials the conference phone number and enters his PIN to start the conference o then the participants dial the same number and enter their PINs to join the conference Required hardware Require internet Internet usage / bandwidth To join you need Use Video conference Webcam / speaker / mic at all participants Yes High so high risk of delay / lag / quality issues Username & password Online meetings Web conference May only require webcam / mic at presenter side Yes Lower so lower risk of delay / lag / quality issues Invitation link Audio conference Phone Training / lectures / presentations Phone meetings Possible Lowest Pin code • Internet telephony / VOIP A service that enables people to use the Internet as the transmission medium for telephone calls by converting sound into digital packets Also called VOIP (Voice Over Internet Protocol) (e.g. Skype). Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 45 Special thanx to: Nada Dessouky & Shaimaa Hesham Risks and Security Virus ▪ ▪ ▪ ▪ A program that can replicate itself and attaches itself to other programs Can delete or corrupt data stored on the computer Can slow down computer performance / fill up memory ✓ How to avoid virus: 1. Use anti-virus software (must be updated) • • • • • checks every file the user opens or downloads scan any removable media before use scan e-mail attachments stores virus codes and downloads new, updated definition files for new viruses when an antivirus program scans a file it compares the file with the list of known viruses, if it matches, the antivirus will try to clean the file if possible, if not the user is given choice to delete or quarantine the file (file is moved to a hidden directory, the user does not have access to the quarantined file) 2. don’t download programs from untrusted sites 3. don’t open attachments from e-mails from unknown senders Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 46 Special thanx to: Nada Dessouky & Shaimaa Hesham Hacking ▪ ▪ ▪ Unauthorized access to a computer system to misuse data (steal, change, delete) for identity theft ✓ How to avoid hacking: 1. Authentication Making sure that the person using the computer is who he claims to be (ensuring the identity of the person using the computer). Methods of authentication: i. Username & password: o Username is a unique set of characters used to identify the user o Password is a confidential set of characters only the user knows. Password should be: ▪ Changed frequently ▪ Strong: • Contains letters and numbers • Letters uppercase & lowercase • Contains symbols • Long (more than 8 characters) • Difficult to guess • Doesn’t contain personal info (nickname, birthday) ▪ Easy to remember by the user ▪ Never written down or given to anyone but passwords can be forgotten / guessed / stolen ii. Magnetic stripe cards / Chip cards / smart cards o stored on the card is a unique ID to identify the user but ID cards can be stolen or lost Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 47 Special thanx to: Nada Dessouky & Shaimaa Hesham iii. Biometrics / zero login o unique as no two people have the same fingerprint o difficult to be copied o impossible to be lost or forgotten but expensive equipment and takes time to scan needs a lot of storage space security issues related to storing people’s biometric data o examples: ▪ Fingerprint scans ▪ Retina scans, Iris recognition ▪ Face recognition ▪ Voice recognition o Zero-login: when biometrics are combined with behavior patterns (like location, how user swipes screen) to increase security; changes detected in these patterns can lock user out iv. Physical token o often in the form of a numerical display device o a one-time passcode is generated and sent to the token o the user enters the passcode to gain access to the system v. Electronic token o A one time passcode that is generated and sent to a trusted device such as a mobile phone; which is then entered to authenticate the user Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 48 Special thanx to: Nada Dessouky & Shaimaa Hesham vi. Digital certificate o like a passport, a digital certificate provides identifying information about the website / email sender to ensure they are authentic o can be verified because it was issued by an official certification authority o it contains: ▪ the name of the certificate holder ▪ a serial number ▪ expiration date ▪ the digital signature of the certificate-issuing authority (CA) so a recipient can verify the certificate is real Two-factor authentication o When multiple authentication methods are used together to increase security 2. Firewall Software or hardware to prevent unauthorized access through the network, prevent unwanted programs, block unwanted sites ▪ By controlling incoming and outgoing traffic ▪ Acts as a barrier between the computer and external network ▪ by keeping a list of allowed IPs and a list of blocked IPs ▪ in case of unknown access user is asked for permission firewall can affect the operation of the computer and stop some uploads / some legitimate software can be blocked by the firewall may need to be shut down at times to upload files therefore making computer unsafe if firewall installed on router it will not secure computer from other computers in the same network ▪ Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 49 Special thanx to: Nada Dessouky & Shaimaa Hesham ✓ To protect data in case of hacking: 1. Encryption ▪ ▪ ▪ Encoding / scrambling data using encryption key so that only the authorized people can understand as only they have the decryption key to decode it Encryption can’t prevent hacking or deleting or changing data But it prevents a hacker from understanding data if stolen so it can’t be used against the owner. Phishing ▪ ▪ ▪ ▪ ▪ Sending fake e-mails identical to the bank's e-mails (looks legal) requesting personal confidential information in reply to the email or containing a link to direct the user to a fake website to enter personal confidential information leading to identity theft ✓ How to detect phishing: E-mail contains spelling mistakes General not personal (the bank knows your name) No digital certificate attached to the e-mail E-mail claiming the user won a competition they didn’t enter Requesting personal confidential information Contains suspicious links Contains suspicious attachments Urging for quick action ✓ How to avoid phishing: 1. Don’t reply to any e-mail requesting personal information 2. Be cautious when clicking on links in an email or downloading attachments 3. Report the e-mail address that sent the e-mail 4. Be cautious of messages requesting urgent reply 5. Contact the bank to ensure the mail is fake Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 50 Special thanx to: Nada Dessouky & Shaimaa Hesham Smishing ▪ ▪ ▪ ▪ Short for SMS phishing Sending fake SMS on a mobile phone , it often contains a URL or a telephone number inside the text message The recipient will be asked to log on to the website or make a phone call, and asked to supply personal details such as card number / password The sender of the SMS might not be a phone number Vishing ▪ ▪ phishing via voice messages used to leave voice messages that trick the user into providing personal sensitive information Pharming ▪ ▪ ▪ ▪ Redirecting a website's traffic to a hacker's identical website without their knowledge by installing malicious code (virus) on user's computer to collect confidential personal information entered like passwords, banking information, etc leading to identity theft ✓ How to detect pharming: URL will change ✓ How to avoid pharming: 1. Concentrate to ensure URL is not changing while accessing website where confidential info will be entered 2. Ensure the URL begins with https and padlock is displayed Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 51 Special thanx to: Nada Dessouky & Shaimaa Hesham Key logging (spyware) ▪ ▪ ▪ ▪ ▪ ▪ ▪ Program installed by hackers on user's computer to record keystrokes typed on the keyboard stores them in a file transfers it back to the hacker without user’s knowledge a method of stealing information like passwords, banking information, etc leads to identity theft / card fraud ✓ How to avoid spyware: 1. Use anti-spyware (must be updated) 2. Use on-screen keyboard / dropdown when entering confidential information Shoulder surfing ▪ Spying on someone while they use ATM or other electronic device to obtain their personal identification number (PIN), password, etc. Card cloning ▪ Also known as skimming, this technique involves attaching a data skimming device to the card reader slot to copy information from the card. Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 52 Special thanx to: Nada Dessouky & Shaimaa Hesham Internet not policed Reasons: o freedom of speech would be affected o very difficult to enforce rules over the internet because laws differ from country to country o very expensive to police internet; extra police force has to be set up o many users are anonymous (use fake accounts) so difficult to track o everything people do is being watched therefore privacy is lost o internet is so big it is hard to keep track on all the activity Results: o presence of illegal materials o presence of inappropriate websites o presence of discussion groups containing hatred, racism, etc o copyright laws are broken o presence of unreliable information ✓ to make sure information is reliable: 1. Make sure the same information is found on multiple websites 2. Make sure the author is well qualified on the topic 3. Make sure the website is updated recently 4. If the website is reputable and well known source of information it is reliable 5. The end of the URL indicates the type of the website (.edu is more reliable than .com) 6. Avoid websites with excessive advertisements Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 53 Special thanx to: Nada Dessouky & Shaimaa Hesham SPAM ▪ ▪ ▪ ▪ Electronic junk mail sent randomly, often unwanted advertising, fills up mail inbox preventing important messages from being received may contain viruses, spyware or phishing attacks ✓ How to detect SPAM: Sent to many people Contains advertisements Spelling mistakes E-mail claiming the user won a competition they didn’t enter ✓ How to avoid SPAM: 1. Anti-spam / spam filter 2. Don’t open any links in the e-mail 3. Block / report the sender e-mail address 4. Don’t use your e-mail to register on untrusted websites 5. Don’t subscribe in newsletters 6. Be cautious when clicking on links or downloading attachments within emails Stealing personal info online • Personal info: o o data relating to a living individual/person data that can be used to identify a person o Personal info can be Sensitive Confidential • Religion/philosophical beliefs • Passwords • • Political views/opinions Criminal record • • Bank accounts PIN codes • Health/medical record • Address • Genetic data/DNA • Date of birth Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 54 Special thanx to: Nada Dessouky & Shaimaa Hesham ✓ E-safety • Why? ▪ protects personal data from people who should not have access to it ▪ ▪ prevents personal data being used against owner Protects sensitive data ▪ Reduces risk of blackmail / rumors / identity theft / stalking /fraud ▪ Make sure data is being used for purpose that it was collected for • How? 1. Make sure websites visited start with https and display padlock 2. When using social networking websites: i. Block or report anyone who acts suspiciously or uses inappropriate language ii. Keep private and personal data secret (privacy settings) iii. Don’t enter private chat rooms iv. Never arrange to meet someone you met online v. Don’t accept friend requests from people you don’t know vi. Don't give out personal information e.g. address, phone number vii. Don't open/click on suspicious links/adverts on social media viii. Don’t share current location 3. When using online games: i. Watch out for cyber-bullying (someone who sends intimidating messages) ii. Avoid use of webcams / audio chatting iii. Don’t use real name iv. Don’t share personal info like address, phone, etc. v. Play the games with the firewall operational vi. Play only with authorized versions of games purchased from the correct sources and for which you have a license vii. Keep the game software up to date. viii. When disposing of your gaming device ensure all of your personal information has been deleted. ix. Report abusive users 4. Read license agreement of any software or subscription before clicking “I agree” Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 55 Special thanx to: Nada Dessouky & Shaimaa Hesham • Difficult because • • Users give information freely Users don’t read the terms and conditions before agreeing to them, • therefore allowing data to be used Data protection laws are local but networks are global Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 56 Special thanx to: Nada Dessouky & Shaimaa Hesham CHAPTER 3 Applications & Effects of ICT Section 1 Applications 1. Control & measuring systems Preset Sensor Analogue reading ADC Digital Processor data DAC Actuator ➢ Sensors: Sensors are used to measure physical quantities. Sensor Temperature Light Pressure Moisture Humidity Water-level Movement Proximity Wind speed Wind direction Contact Sound pH Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem What it detects Temperature Light / dark Pressure (e.g. someone standing on it) Concentration of water in soil Concentration of water in air How full / empty a container is Movement nearby How close / far something is Speed of wind blowing Direction of motion of wind If the door is closed Presence of sound Acidity 57 Special thanx to: Nada Dessouky & Shaimaa Hesham Control device ➢ Analog data: Continuous data, can take any values in a range ➢ Digital data: Discrete data, binary (0/1) ➢ Analogue-to-digital converter (ADC): Sensors measure analogue data and the processor can only process digital data so it needs an ADC to convert analogue data to digital data. ➢ Digital-to-analog converter (DAC): Converts digital signals from the processor to analog data to control a device. Advantages of using control systems rather than humans: 1) More accurate readings 2) More frequent readings 3) Can work 24 hours without breaks or shifts 4) Faster response than humans 5) Can work in conditions dangerous or unsuitable for humans 6) Can take more than one reading at the same time Control System Examples System Washing machine Burglar alarm Greenhouse Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem Sensors Temperature Pressure Contact Contact Pressure Motion Sound Temperature Humidity Moisture Light intensity 58 Control devices Heater Motor / actuator Buzzer Pump Alarm Heater / cooler Sprinkler Light source Special thanx to: Nada Dessouky & Shaimaa Hesham 2. Banking applications Transactions which can be carried out from bank website: ✓ ✓ ✓ ✓ Check balance Transfer money from account to account Change personal information View transaction details / bank statement Transactions which cannot be carried out from bank website: Withdraw cash Deposit cash Cash a cheque Open a new account Close an existing account ATM vs visiting bank branch ✓ ✓ ✓ ✓ ✓ ATMs are more widely available than bank branches ATMs are available when banks are closed ATMs offer choice of language (useful if travelling) Can use ATM of any bank to withdraw cash Don't have to wait in line in ATM like in bank branches Not all services are available in ATM There is a daily limit on amount of cash withdrawn from ATM ATM transaction options ✓ ✓ ✓ ✓ ✓ ✓ ✓ Withdraw cash Deposit cash / cheque Check account balance Printing mini statements Mobile recharge (top up) Bill paying Money transfer Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 59 Special thanx to: Nada Dessouky & Shaimaa Hesham Online banking vs phone banking Risk of defraud Waiting on hold Cost (especially if travelling) Cost for bank Choice of languages Risk of misunderstanding & mistakes Problem in internet connection may cause transaction to be done twice or not at all ✓ ✓ ✓ ✓ Online banking Higher No lower lower (mainly initial) yes higher yes ✓ ✓ Phone banking Lower yes higher higher (employee shifts) no lower ✓ no Online banking Customer advantages Customer disadvantages ✓ saves time and cost of transportation ✓ available 24 hrs ✓ suitable for physically disabled people who find it difficult to leave their homes ✓ available from anywhere (while travelling) Bank advantages Bank disadvantages ✓ saves cost of rent (fewer branches) ✓ saves cost of salaries (fewer employees) ✓ wider range of customers (disabled / far-away / 24 hrs availability) ✓ less risk of physical robbery Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem risk of hacking and defraud users need good Internet connection higher risk of making mistakes cannot withdraw or deposit cash initial cost of creating secure website need to train employees cost of system maintenance 60 Special thanx to: Nada Dessouky & Shaimaa Hesham ATM (automatic teller machine) – initial steps Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 61 Special thanx to: Nada Dessouky & Shaimaa Hesham ATM - Cash withdraw Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 62 Special thanx to: Nada Dessouky & Shaimaa Hesham ATM - Cash deposit Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 63 Special thanx to: Nada Dessouky & Shaimaa Hesham ATM - Check balance Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 64 Special thanx to: Nada Dessouky & Shaimaa Hesham • EFTPOS (Electronic Fund Transfer at Point Of Sale) Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 65 Special thanx to: Nada Dessouky & Shaimaa Hesham Processing of bank cheques • Bank cheque is verified by making sure it is: o Not fake o Signed • Information from bank cheques are collected: o Information printed ▪ Account number of payer ▪ Bank & branch code of payer ▪ Cheque serial number o Information handwritten ▪ Amount ▪ Due date ▪ Name of recipient ▪ Signature of payer • When the due date of the cheque has arrived: o The bank makes sure that the amount of money is available in the payer’s account o Decrease the balance of the payer’s account o Increase the balance of the recipient’s account o Send bank statements to both customers Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 66 Special thanx to: Nada Dessouky & Shaimaa Hesham 3. Booking systems Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 67 Special thanx to: Nada Dessouky & Shaimaa Hesham 4. Applications in retail Stock control Products table Barcode Product name Price Suppliers table Supplier ID Quantity in stock Reorder level Supplier name Reorder quantity Supplier ID Contact details (telephone/address/e-mail) Updating stock file when product is sold: • The barcode is scanned by the barcode reader (or typed in manually) • The products table is searched to find this barcode • When found: o The corresponding number in stock is decreased by the amount sold Checking whether reorder is necessary: • Number in stock is compared with reorder level • If number in stock is less than reorder level: o Reorder is necessary Reordering products that are low in stock: • The reorder quantity corresponding to the product is read • The supplier ID corresponding to the product is read • The supplier table is searched for this supplier ID Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 68 Special thanx to: Nada Dessouky & Shaimaa Hesham • When found: o The corresponding contact details are used to contact the supplier o The quantity to be ordered was previously read from the products table o Products are flagged as ordered When products reordered are received: • Flags are removed • Number in stock is updated Online shopping Customer advantages Customer disadvantages ✓ saves time and cost of transportation ✓ available 24 hrs ✓ suitable for physically disabled people who find it difficult to leave their homes ✓ can shop from abroad ✓ wider variety of products ✓ easy to compare prices Shop advantages Shop disadvantages saves cost on rent (fewer branches) saves cost of salaries (fewer employees) method of advertisement wider range of customers (disabled / far-away / 24 hrs availability) ✓ less risk of physical robbery loss of customer loyalty initial cost of secure website need to train employees ✓ ✓ ✓ ✓ Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem risk of hacking and defraud quality not guaranteed cost of shipping/customs difficult to refund needs Internet connection & credit card 69 Special thanx to: Nada Dessouky & Shaimaa Hesham 5. Robotics in manufacturing Advantages of using robots in manufacturing: Increase in production (robots don’t need breaks like humans) Consistency in production (exact same product every time) Monthly salaries for human workers are saved Dangerous tasks are carried out without the need of life insurance for humans ✓ Fewer mistakes / greater accuracy ✓ ✓ ✓ ✓ Disadvantages of using robots in manufacturing: High initial cost of robots Training workers who will be still present after robots are introduced High running cost of maintenance of robots Robots cannot react in unexpected situations Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 70 Special thanx to: Nada Dessouky & Shaimaa Hesham 6. Monitoring and tracking Automatic number plate recognition system (ANPR) It is used to read the number plates on cars Car park example: • • • • • • • A sensor detects a vehicle It sends a signal to the processor to instruct the camera to capture an image for the car A program is used to isolate the number plate from the image The brightness and contrast is adjusted to separate each character in the plate Each character is recognized using OCR then it is stored in the database The car park barrier is raised and the driver receives a ticket showing the date and time When the driver returns they insert their ticket to calculate the charge Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 71 Special thanx to: Nada Dessouky & Shaimaa Hesham 7. Emerging technologies Global Positioning Systems (GPS) • System used to detect the position of the user • Signals (radio waves) sent from device to satellite • Signals (radio waves) sent from satellite to device • Device calculates the distance from satellite • At least 3 satellites are used • Location is determined Satellite navigation • GPS is main a component of satnav • used in routing to destinations examples: o o o o o o in cars by walkers to locate position on hills/mountains by runners to calculate distance run by farmers for tractor navigation in satellite navigation systems for ships in tracking aircraft Geographic Information System (GIS) • Adds layers of data to maps • Allows the user to analyze data according to location (in order to take decisions) • Allows users to create interactive queries • Users can edit map data • Works with GPS Uses: • weather forecasting • sales analysis • crime patterns • traffic information • disease spreading • population forecasting • land use planning Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 72 Special thanx to: Nada Dessouky & Shaimaa Hesham Virtual reality • Simulated digital world • It uses headset to allow 360 view of digital world & suits, gloves, joystick to interact • Isolates user from reality Augmented reality • Virtual objects / info overlaid onto real world environments • Not isolated from surroundings • Requires only smartphone Artificial intelligence (AI) • It is a technology by which a program updates itself automatically through learning from its own experience • The ability of a computer to perform tasks similar to learning and decision making in humans Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 73 Special thanx to: Nada Dessouky & Shaimaa Hesham 8. Applications in modeling A model is created prior to creating a real thing in order to test / avoid errors in reality, examples include: • CAD (modeling buildings or machinery) • simulations (modeling situations and training people before being placed in the real scenario) • financial models (calculations of expected profit or loss to avoid financial losses in a project) Benefits: • Fewer errors in final version of real item as errors would have been resolved in model • Saves money as it saves on resources • Safer to run a computer model rather than risking human life • Different scenarios/what ifs can be carried out which may happen in real life/to experiment • Some situations will be very difficult to test in real life Challenges: • Models can only test situations which are expected / in reality some situations might come up that were not expected • Humans in a model will not react the same way they will do in a reallife dangerous situation • Creating models consume time, delay in start of creating the real thing • Models usually require specialist / specialist software to be done (cost) Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 74 Special thanx to: Nada Dessouky & Shaimaa Hesham 9. Expert systems An expert system is a system that stores the knowledge of a human expert, so that it can later be asked questions & give answers to them. Some examples of Expert systems • Medical system • Car fault diagnostics • Plant species identification • Rock identification • Mineral exploration • Chess games • Weather forecasting • Tax calculation Advantages: • Help the expert give more accurate results • More consistent results; not affected by emotional reasoning • Faster to produce results • Uses data from many experts so contains more knowledge than single expert • Cheaper than employing multiple experts • Updating expert system is cheaper and more frequent than regularly training experts Disadvantages: • Lack common sense in the decision making process • Initial cost of creating the system • If the knowledge base or rules base contain errors it will mislead the expert to an incorrect result • Must be regularly updated • Experts must be trained to use it Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 75 Special thanx to: Nada Dessouky & Shaimaa Hesham How to use an expert system • Questions about the ... (depending on the application) are asked by the system • Answers to these questions are entered by the user through the interactive user interface (inputs depend on the application) • Inference engine uses the information in the knowledge base and rules base to find results • The results will be output to the user on the user interface (suggested/possible/probable ... (depending on the application) are displayed on the screen) • The explanation system will explain how the expert system arrived at its conclusion Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 76 Special thanx to: Nada Dessouky & Shaimaa Hesham Section 2 Effects of ICT At home Health & Safety Legal effects ➢ At home Effects of microprocessor-controlled devices at home (on people's lifestyle) ✓ More leisure time ✓ More time to work (full time instead of part time) ✓ Can leave home while household tasks (cooking & washing) are being done by equipment ✓ More secure lifestyle (due to presence of automatic alarms) ✓ Can control appliances (e.g. heating systems) using smart phone while outside home ✓ Timers on home cooling / heating systems can be set to come home to a suitable temperature without leaving it on the whole time ✓ Automatic lighting systems can reduce risk of injury People have become lazy as they are more dependent on equipment Lack of exercise Manual household skills are lost Un healthy lifestyle due to dependency on ready meals Cost of purchase and maintenance of devices Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 77 Special thanx to: Nada Dessouky & Shaimaa Hesham Smart homes ✓ Can control devices remotely (while outside the home) o Switch on/off devices before getting home or after leaving ✓ Smart fridge can send reminders to buy products when running out ✓ Security systems connected to the internet enable monitoring the home while outside ✓ Smart television enables streaming of content to watch at any time & playing online games Needs stable internet connection High initial cost & maintenance of devices Must have a smart phone with internet connection Risk of viruses installed on devices may cause malfunction Risk of hacking devices like burglar alarms/security cameras/people can view your house/switch off the alarm Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 78 Special thanx to: Nada Dessouky & Shaimaa Hesham ➢ Health & Safety Health problems and prevention: Health problems Eye strain Cause Prevention Staring at computer screens for a long time Back pain Sitting in a wrong position in front of the computer for a long time Neck pain Looking up or down at the screen Long use of mouse (pain in wrist) Repetitive Strain Injuries (RSI) Long use of keyboard (pain in wrist) Repetitive clicking on mouse (pain in fingers) Long typing on mobile phone or PDA or use of joystick (pain in thumb) Ozone irritation / respiratory problems Sitting too close to a laser printer for a long time Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem • • • • • • • • • • • • • • • • • • • • • • • • • • • 79 Use anti-glare screen Use flat screens Improve surrounding lighting Reduce screen brightness Maintain appropriate distance between screen and eyes Take regular breaks Sit in an upright position Use ergonomic chair Take regular breaks Sitting on an adjustable chair so screen is at eye level Take regular breaks Use wrist rest Use ergonomic mouse Take regular breaks Use ergonomic keyboard Use hand exercises Use voice commands Take regular breaks Use hand exercises Use voice commands Take regular breaks Use hand exercises Use voice commands Take regular breaks Proper room ventilation Laser printer placed in printer room Change type of printer Special thanx to: Nada Dessouky & Shaimaa Hesham Safety problems and prevention: Safety problems Tripping over cables Risk of electric shock Prevention Keep wires in underground ducts Keep wires well insulated Avoid drinks in presence of computers Don’t overload sockets Avoid overheating of equipment Do not cover the cooling vents on computer equipment Have CO2 fire extinguishers Keep computers in a U-shape and wellspaced to enable easy exit Use strong desks / use large desks / secure equipment to wall or floor or desk Risk of fire People trapped in emergencies Injuries due to equipment falling Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 80 Special thanx to: Nada Dessouky & Shaimaa Hesham ➢ Legal effects ▪ Copyright law A law to prevent software from being sold, copied, distributed or updated any without its owner's (author) permission. It gives the owner of the copyright the exclusive right to make copies of the work Only the owner can give permission for others to use the work Support the original producers of the work Example: Windows copyrights belong to Microsoft. Methods by which companies try to protect copyrights: • Serial number / product key To be entered by user while installing (which was supplied with the original copy of the software) • License agreement The user will be asked to click ‘OK’/’I AGREE’ to terms before the software continues to install. • Holograms Used on the packaging to indicate that this is a genuine copy. • Some software will only run if the CD, DVD or memory stick / dongle is actually in the drive; this stops illegal multiple use and network use of the software. Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 81 Special thanx to: Nada Dessouky & Shaimaa Hesham ▪ Data Protection Act Data protection Act is a law to protect personal data handled by organizations (example: school, hospital, club) from misuse: • Do not keep data longer than required • Do not collect data that is not required • Do not pass on the data to anyone without the owner’s permission • Only certain employees can view the data and handle it • Keep the data safe and secure (encryption, firewall, password) • Only use the data for the reasons given to the owner • Keep the data up to date ➢ Netiquette Short for internet etiquette, set of rules that need to be respected when communicating over the internet, examples: • Don’t be abusive • Don’t send spam or repeatedly send the same information to the same person • Respect peoples’ privacy, don’t share personal information about anyone without permission • Don’t use capital letters; it’s considered shouting • Don’t plagiarize, always acknowledge source of any information / quotations / images used • Check spelling and grammar, gives a good impression • Posts made are usually public so be careful of any comments being shared • Don’t send inappropriate content, disturbing for others and not respectful • When sending emails confirm the recipient to make sure the email is not delivered to someone else Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 82 Special thanx to: Nada Dessouky & Shaimaa Hesham CHAPTER 4 Software Lifecycle Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 83 Special thanx to: Nada Dessouky & Shaimaa Hesham ➢ Analysis Why? Gathering information about the current existing information system: • identify inputs, outputs and processing in the existing system to fulfill them in the new system • identify problems with the system to avoid them in the new system Agreement with the customer about: • requirements to fulfill them in the new system • budget analysis • timeline Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 84 Special thanx to: Nada Dessouky & Shaimaa Hesham How? Method Interviewing employees, managers Advantages ✓ Collecting detailed information ✓ Questions can be changed based on responses ✓ Can see body language; less risk of misunderstanding Disadvantages Time consuming Not anonymous (unreliable responses) Expensive due to analyst time Analyst & employee must be available at same time Distributing questionnaires to employees ✓ Collecting wide variety of responses ✓ Responses can be anonymous (reliable responses) ✓ Cheaper than interviews ✓ Not time consuming; can be filled any time Observing or monitoring employees while working without interference Most people are ✓ No waste of employee distracted or time uncomfortable or ✓ Reliable information; don't work as usual the analyst will while being watched observe the system in Not all problems person instead of may appear during taking opinions the observation Document study: Collecting and examining documents produced (like receipts or reports), manuals of the current system. ✓ Details about paper work cannot be obtained by other methods Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 85 Careless / vague answers Misunderstanding of questions Questions not flexible Time consuming Special thanx to: Nada Dessouky & Shaimaa Hesham Design Why? Taking decisions based on which the system will be created How? Database file structure Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem Processing Input methods 86 Output methods Special thanx to: Nada Dessouky & Shaimaa Hesham ➢ Development & testing Why? Development: The system is created from the designs Testing is done to make sure the system works as expected How? Stages: Unit test: each module of the system is tested alone System test: the whole system is tested Data used: Normal: data inside the acceptable range Abnormal: data outside the acceptable range / data of wrong datatype Extreme: data on the limits / borders / boundaries of the acceptable range Live (real): data with known outputs from the previous system; the same data is input to the new system to make sure outputs are the same Reason: To make sure normal & extreme are accepted and abnormal is rejected To make sure outputs of the new system are identical to outputs of the old system Improvements could be needed as a result of testing: If testing results are not as expected, modifications may need to be done to design and/or development. Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 87 Special thanx to: Nada Dessouky & Shaimaa Hesham ➢ Implementation Why? Replacing the old system with the new system How? Method: Direct changeover: Remove the old system completely and use the new one at once Parallel running: Use both systems together for a while then remove the old system Phased implementation: Replace the old system by the new part by part Pilot running: Replace the old system by the new branch by branch Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem Advantages & Disadvantages: ✓ Cost: low cost • Time: fast replacement Training: no time to train employees on the new system Risk: if the new system is faulty data will be lost Cost: high cost of running two systems ✓ Time: new system fully working immediately ✓ Training: have time to train employees on the new system ✓ Risk: if the new system is faulty no data will be lost • Cost: medium cost Time: takes time until new system is fully working ✓ Training: have time to train employees on the new system • Risk: if the new system is faulty part of the data will be lost • Cost: medium cost Time: takes time until new system is fully working ✓ Training: have time to train employees on the new system • Risk: if the new system is faulty part of the data will be lost 88 Special thanx to: Nada Dessouky & Shaimaa Hesham ➢ Documentation Why? User documentation For the user to help him: • interact with the system • deal with any simple problems faced while using the system Technical documentation For another programmer to help him: • fix the system in case of any malfunction • update the system if more functionality is needed How? User documentation Contains: • how to print, save, load , run , install etc (use the system) • error messages • frequently asked questions • trouble-shooting guide • glossary of terms Technical documentation Contains: • program flowcharts / algorithm • system flowcharts • file structures • program coding / listing / language • list of variables • validation routines Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 89 Special thanx to: Nada Dessouky & Shaimaa Hesham Both contain: • software and hardware requirements • purpose of the system • limitations of the system • input & output formats • sample runs ➢ Evaluation Why? To make sure users are satisfied with the system; make sure the system: • Appropriate o meets need of users o match original requirements • is easy to use o users are able to interact with the system easily o users need minimal training • is efficient o operates quickly o reduces running cost • has no problems o has no suggested improvements How? • Interviews and questionnaires with the users to collect their opinions and responses after using the system • Comparing the system with the original requirements Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 90 Special thanx to: Nada Dessouky & Shaimaa Hesham Types of software ➢ Customized software • Specially designed for the company so it meets their needs • Less functions in the software making it easier to use • Customized support from the system creator • The software only has the features needed by company therefore uses less memory • Can be changed when the company needs ➢ Off-the shelf software • Cheaper to purchase as there are no development costs • More reliable as any error will have been tested • Regular upgrade more easily obtained • More support as many users Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 91 Special thanx to: Nada Dessouky & Shaimaa Hesham Chapter 5 Practical Related Section 1 Database Data types • Numeric o Integer o Decimal • Currency • Text / alphanumeric • Date • Boolean (a field with 2 options) Why telephone number is text? o May begin with 0 o Not needed in any calculations o Could contain + or – Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 92 Special thanx to: Nada Dessouky & Shaimaa Hesham Database structures 1) Flat file database Consists of only 1 file where all data is stored. Supermarket Barcode Prod Name No in Reorder Supp Supp stock Level ID name Supp tel 3748502051 Lindt 100 80 1 Peter 7842452 4802385285 FerreroRocher 60 50 2 Bill 6453453 5892328592 Bounty 55 50 1 Peter 7842452 5893452345 Kinder 45 40 3 Chris 5635473 5023463852 KitKat 65 60 3 Chris 5635473 5839567392 Hershey’s 60 50 1 Peter 7842452 5683065794 Toblerone 70 60 2 Bill 6453453 Problem: In flat file databases data is repeated; the personal details of every supplier are repeated with each of his products. Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 93 Special thanx to: Nada Dessouky & Shaimaa Hesham 2) Relational database Consists of 2 or more tables with relations between them; relations are created by taking the primary key from a table and adding it to another table as a foreign key. Primary Barcode 3748502051 Foreign Products key Prod Name Lindt key No in Reorder stock Level Supp ID 100 80 1 4802385285 FerreroRocher 60 50 2 5892328592 Bounty 55 50 1 5893452345 Kinder 45 40 3 5023463852 KitKat 65 60 3 5839567392 Hershey’s 60 50 1 Primary key Problem solved: By separating the product details and supplier details into 2 tables and creating a relation between them by adding the Supplier ID to the product table as a foreign key. Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 94 Suppliers Supp Supp ID name Supp tel 1 Peter 7842452 2 Bill 6453453 3 Chris 5635473 Special thanx to: Nada Dessouky & Shaimaa Hesham Primary key Foreign key • Advantages of Relational database: o Data is only stored once/avoids data duplication o Less storage space o Easier to edit records o Easier to add/delete records o Complex queries / reports can be carried out using several tables • Advantages of flat file database: o All records are stored in one table. o Easier to understand/use o Easier to sort and filter data o Easier to setup (less ICT experience needed) • Primary key vs foreign key o Primary key is unique o Primary key is used to identify a record o Foreign key is used to link tables o A table can have only one primary key but multiple foreign keys o Any database (relational or flat-file) can contain primary key o Only relational database can contain foreign key o Primary key cannot be blank Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 95 Special thanx to: Nada Dessouky & Shaimaa Hesham Checks to minimize errors Make sure data entered is: Prevents: Does not prevent: Done by: Validation Verification Logic Identical to data source Illogical entries Incorrect logic entries Computer Copying/typing errors Errors in data source User / user & computer ➢ Verification checks • Double data entry User enters data twice and computer compares the two entries to make sure they are identical. • Visual check User visually compares data entered with data source to make sure they are identical. • Proof-reading is NOT verification check o Reading the document after typing to check for spelling, grammar, punctuation mistakes Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 96 Special thanx to: Nada Dessouky & Shaimaa Hesham ➢ Validation checks Check Range check Length check Format check Lookup check Presence check Type/character check Check digit Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem Description Make sure numbers entered are within specific limits Make sure the exact correct number of characters have been entered; not more & not less Make sure letters, numbers, specific symbols are in their specified positions Make sure data entered is one of the specified options Make sure the field is not left blank This checks to see if the data entered is of the correct type (i.e. letters only or numbers only) Certain calculation performed on the numbers of a barcode and the result must be equal to the check digit 97 Example Numeric fields Date fields In practical: • Between 0 and 100 • >=0 • <10 Telephone number Candidate number Centre number Centre number Gender (M or F) Title (Mr or Ms or Dr) In practical: • M or F • Red or Blue or Green Key fields In practical: • Not NULL Price can only contain numbers Name can only contain letters Barcode ISBN Special thanx to: Nada Dessouky & Shaimaa Hesham Section 2 Spreadsheet Search direction Built-in error handling Lookup array must be before return array Lookup array must be sorted ascending • VLOOKUP HLOOKUP XLOOKUP LOOKUP Vertical Horizontal Both Both No No Yes No Yes Yes No No No No No Yes Formula vs function o Formula: ▪ Can be simple calculations/mathematical operations ▪ Can be easily typed by user ▪ Can contain a function o Function: ▪ ▪ • Built into the software Have a pre-defined name Naming cells/ranges: o Easily referring to cells o Simplifies formulas o Easy to refer to cells without using cell references o Don’t have to set absolute cell manually (a names range will not change when replicating) • • Absolute cell reference ($A$2) when replicated the cell reference will not change Relative cell reference (A2) when replicated the cell reference will change Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 98 Special thanx to: Nada Dessouky & Shaimaa Hesham Section 3 Webpage design • Relative vs absolute file path: Relative file path • Absolute file path displays only file name displays file name and path means all files are saved in same means files are not saved in same folder folder Files should be saved in one folder to be ready for publishing Will only work on one computer as other computers will not have the website (should be relative not absolute) the same file path Web development layers o Content layer (htm) Creates the structure of the web page including images, tables, text, hyperlinks o Presentation layer (css) ▪ ▪ Defines the format of a web page through styles including colours, fonts, borders o Behaviour layer ▪ created using coding / scripting language; to control interactive content • Hyperlink: • o A link from text or image to redirect the user to another position on the same page, another webpage, an email Anchor: o A position on the webpage that a hyperlink will point to Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 99 Special thanx to: Nada Dessouky & Shaimaa Hesham • Bookmark: o saved shortcut to direct the user to a certain website (favorites) • Class: o It is defined in a stylesheet using a dot (e.g. .right) o It is used in adding or changing properties without having to create new style • Head section of htm contains: o Page title o Stylesheet link o Default target frame o Metadata ▪ Charset: defines the character set used by a web page (the ▪ • type of characters displayed) Page description: a suitable description of the web page ▪ Keywords: keywords are used by search engines to find websites matching a user’s search. ▪ Viewport: the user’s visible area of the web page ▪ Author: name of the webpage creator Body section of htm o Tables o Images o Hyperlinks o Videos o Text Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 100 Special thanx to: Nada Dessouky & Shaimaa Hesham • Attached stylesheets vs inline styles Attached stylesheet separate from the web page; can be Inline styles within each web page applied to multiple pages edited in one file edited by changing each web page placed in the head section of the web can be anywhere in the web page page Lower priority Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem Higher priority 101 Special thanx to: Nada Dessouky & Shaimaa Hesham Section 4 Word processing • • Gutter: Extra margin on one side to allow for binding or stapling a book Widow: When the last line of a paragraph is separated on the next page • Orphan: When the first line of a paragraph is separated on the previous page • Breaks: To avoid orphans/widows To improve layout of the document To enable to start a new chapter on a new page o Page break: pushes text to next page o Column break: pushes text to next column o Section break: To allow for the change of orientation of pages in the document Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 102 Special thanx to: Nada Dessouky & Shaimaa Hesham Section 5 Presentation • Master slide: o Ensures consistency o Saves time of repeating formats adjustments on different slides • Evaluate presentation: positive points: o Font colour contrast with background colour o Font size is big enough to be easily read o Titles centre aligned and in larger font o Text displayed as bullets not paragraphs o Not too much text on one slide o Presence of animation and transition makes the presentation interactive o Title font larger than bullet font o Presence of title slide as first slide (title and subtitle) o Consistency of slides Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 103 Special thanx to: Nada Dessouky & Shaimaa Hesham Section 6 General Generic file formats are files that can be used in different types of application software Examples: Term Stands for Definition and function A file format used for text that contains formatting; can .rtf Rich text format contain tables, images, etc can be opened in any word processor A file format used for plain text that contains no .txt Text file formatting, no images or tables can be imported into any text editor/ word processing/DTP package A file format used to hold tabular data, e.g. spreadsheet .csv Comma Separated or database table. It stores it as a text file using commas Values (or semi-colons) to separate data items. can be imported into any spreadsheet or database File containing design of the webpage created using Hyper .htm HyperText Markup Text Markup Language can be opened by any web browser and on web-design software Contains style definitions (to define how to display HTML .css cascading stylesheet elements), can be attached to each webpage to avoid including styles in HTML can be opened in any text editor and on web-design software Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 104 Special thanx to: Nada Dessouky & Shaimaa Hesham Makes it possible to display formatted text and graphics .pdf Portable document in the same layout on any device screen format can be opened in any document format reader on any device Container that holds any type of data stored in a .zip Archive file compressed format .rar formats Used to save storage in the computer and reduce attachment sizes on email Best Use JPG GIF PNG Joint photographic expert group Graphics Interchange Format Portable network graphics Simple animations (moving images) Transparent images, icons, graphics Lossless Lossless Websites (fast loading) photography Lossy Compression (loses quality when compressed) (does not lose quality when compressed) (does not lose quality when compressed) High Resolution Use Good No Okay Colour Millions 256 PNG 8 - 256, PNG 24 - Millions Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 105 Special thanx to: Nada Dessouky & Shaimaa Hesham Section 8 Corporate house style Corporate house style is way a company is presented to customers; including color scheme, font, logo, etc. These items are applied to all company’s documents, presentations, webpages, e-mails… Benefits: • Consistency • Brand recognition • Reduces time spent in formatting documents • Reduce errors of typing/forgotten elements Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 106 Special thanx to: Nada Dessouky & Shaimaa Hesham Section 9 Audience needs The design of any ICT product (poster, presentation, website, etc) is affected by the audience targeted: o Different size/style of font for the title o Clear font color for title/text o Clear fonts for the title/text o Text well distributed o Contrasting colours for font and background colour o Up-to date information • Children: o Simple language o Bright colors o Cartoons / navigation o Small amount of text • Teenagers: o Compatibility with mobile devices o Attractive colors o Relying on media rather than text o Casual tone of speech • Adults: o Pastel colors o Formal language o Compatibility with mobile devices • Elderly: o Basic contrasting colors o Large, bold text o Not too much text o Simple interface o Access to help Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 107 Special thanx to: Nada Dessouky & Shaimaa Hesham Section 10 E-mail • To: main recipients of the e-mail • Cc: Carbon copies: addresses receive a copy of the e-mail with the main recipients knowing • Bcc: Blind Carbon copies: addresses receive a copy of the e-mail without the main recipients knowing • Attachment: Files sent with the e-mail • Forward: sending the e-mail to someone else • Reply: sending an e-mail back to the sender • Reply all: sending an e-mail to all addresses in the "To" and "Cc" of the original email Shaimaa El-Adl & Mostafa Mahdy Hesham Hatem 108 Special thanx to: Nada Dessouky & Shaimaa Hesham