Uploaded by Nishad Kshirsagar

IGCSE ICT 0417 Paper 1 Theory Quick Revision

advertisement
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
IGCSE
ICT 0417
Quick Revision
Paper 1 Theory
By : Mr. Ayman Al-Nahhas
Cambridge ICT Tutor
www.etoptutor.com
|Page1
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
|Page2
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Chapter 1
Type of components and computer system
x
Hardware : is a Physical Components that makes a computer system
x
Software : is a general term of Programs that control the computer system
and processing data.
x
Types of software: ( applications and system)
x
Motherboard: Printed circuit board in all computers, All components plug
into the motherboard, It allow the processor and other hardware to function
and communicate with each other, It is central to any computer system
x
CPU is Central processing unit, is a brain of the computer consist of Control
unit , Arithmetic and logical Unit ( ALU) , Immediate access store ( IAS)
x
CPU Interprets, execute the commands
x
and handle calculations, data
processing and movement data to and from system memory
Random access memory (RAM): temporarily, Written and Read,
Content lost when computer is turned off , Volatile
Read only memory (ROM): permanent, Only read , Data can' t be
changed or lost, Non-volatile , to store BIOS instructions
Video card : allow the computer to send graphical information to video
display
Sound card : to produce sounds
x
Internal Hard Disk Drive (HDD): Main internal storage , fast data
x
x
x
transfer, Magnetic in nature
|Page3
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Application Software: Program that allow the user to do specific task
x
Word processor: software to manipulate text documents, ( create, save,
edit , copy and paste, importing photos, translate )
x
Spreadsheet : software to manipulate numerical data in columns and rows,
use formula to carry out calculations, create graph and modeling the
calculations
x Database: software to organize, manipulate, analyze data, carry out query,
modify data and create report.
x
Control and measuring software : designed to allow a computer or
microprocessor to interface with sensors
x
Apps ( applications) software: run on mobile phones or tablet
x Photo editing software : software allow editing digital photo
x Video editing software: software allow to manipulate videos
x Graphics manipulate software : software allows bitmap and vector
images to be changed
System Software: Program that allow the hardware to run properly and allow
the user to communicate with the computer
x
Compiler : computer program that translate program written in high
level language as a whole into machine code
x
Interpreter: computer program that translate program written in high
level language ( step by step )
x
Linkers: computer program to combine object files to a single program the linker put all together.
x
Device driver: software that enable one or more hardware device to
communicate with the operating system
x
Operating systems (OS): software running in the background of a
computer system, OS allow: Input. Output operation, User communicate
with the computer, Error handling, Managing of security
|Page4
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
x
Utilities: software to carry out specific tasks on a computer, (Antivirus,
Anti-spyware, Backup files etc.. )
x
Internal hardware devices : CPU, Internal HDD, RAM, ROM
x Boot files : Code tells the computer what to do when the first start up
referred as BIOS
x
BIOS: Basic input/output system.
x CMOS : Chip that BIOS stored the data ( date & time
and system
configuration) non-volatile
Operating systems:
ƒ
Command line interface (CLI) example DOS – used by
programmers, analyst, somebody need direct communication with
the computer
ƒ
Graphical User Interface ( GUI) example Windows – used by
end-user who doesn’t need to know the computer works
x
Types of computers : PC ( Desktop computer ) , Laptop computers,
Tablet computer, Smartphone, Smartwatch , Mainframe computer
x
Mainframe computer : can have several CPUs, very fast processor ,
have Multiple operating systems, huge storage capacity, huge internal
memories and using time sharing or batch processing
x
Artificial Intelligence (AI) : use to enhance video games, in expert
system, to make robots , Understanding different languages
x
Biometric : including Finger print , Retina , Iris, Face and Voice
x
Quantum cryptography: Cryptography is the science of making a
message unintelligible to any unauthorized user, use of photons (light) ,
message encrypted
x
Computer-assisted translation ( CAT ) : computer software to
help in translation process
|Page5
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
x
3-D and holographic imaging : Technology makes images appear as
3D
x
Virtual reality : create an artificial environment that users can interact
with , help in architects, train pilot , train surgeons and play games
x Equipment of Virtual reality : Eye goggles – gloves –headphones –
powerful computer
|Page6
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Chapter 2
Input and output devices
•
Keyboard : Input of data into applications software and typing commands to
the computer
•
Ergonomic keyboards : Designed to reduce the health-related problems
•
Concept Keyboard : Used in fast-food restaurants
•
Numeric keypads : to enter numbers only ( ATM – Mobiles – POS – Chip &
Pin)
•
Mouse : Opening, closing , and minimizing software, grouping ,deleting files
•
Touchpad : Pointing device in laptop
•
Tracker ball: Used in applications , control room and luxury cars
•
Remote Control : Televisions, satellite systems, Control multimedia systems
•
Joysticks: Used in video/computer games nad simulators
•
Touchscreens: used in ATMs , POS, Airports, railway stations, tourist offices
and used as output
•
Scanners : two types ( Flatbed scanner & Barcode scanner)
•
Digital Camera: Directly reading the memory card.
•
Video cameras : DV (digital video) camera, They store compressed photo
frames at speed of 25 MB per second know as (MOTION JPEG)
•
Microphone : Sounds converted from analogue signal into a digital signal
|Page7
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
•
Sensors : is a device inputs data to a computer, ADC to convert the signal and
types incudes (temperature, pressure, light, sound, humidity/moister, Proximity
and pH
•
•
•
Graphics tablet : produce freehand drawings
Webcams : used in video conference
Light pens : contain sensors that send signals to a computer
Direct data entry (DDE) devices:
•
Magnetic stripe readers : used On credit/debit cards for use at ATMs or
EFTPOS, Security devices
•
EFTPOS : Electronic fund transfer at point of sale
•
Contactless card readers : allow customers to pay for items without entering
their PIN
•
Chip and PIN readers: used in Payments (restaurants, supermarkets, travel,
etc.).
•
RFID : Radio frequency identification readers, made up of two components ( a
microchip and an antenna ) used in admission passes, libraries, retail and livestock
tracking
•
MICR : Magnetic ink character recognition/reader : Read characters printed in a
special ink (banking operations )
•
OMR : Optical Mark recognition / Reader : Read marks written in pen or pencil
used in questionnaires, multiple-choice , examination papers ..
•
OCR : Optical character recognition/reader : Processing of passports and identity
cards, converting printed documents to an editable electronic format, read car
number plate
•
Barcodes reader: to read barcode, used in supermarkets, libraries, electrical
equipment ..
|Page8
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Output devices
•
CRT monitors : Cathode ray tube (CRT) monitors, viewing angel better than
most of TFT monitors
•
Thin film transistor (TFT) monitors : Made up of thousands of tiny pixels
•
Multimedia projectors : used in training , presentation or home cinema
•
Laser Printers : High quality, low noisy, Fast, long time toner, but produce
ozone or volatile organic
•
Inkjet printers : low volume, high quality, cheap, but slow and not for large job
•
Dot matrix printers: impact printer, slow, noisy, cheap, use continuous carbon
copy paper use ribbon not ink
•
3-D printers : to produce solid objects ( like ,, artificial organs, prosthetics,
medical products ,tissue engineering, artificial blood vessels, designs of medical
tools
•
Speakers : Output sound
Control Application
• Actuators : Used to take signals from a computer and convert them
into a form of motion and connect to one of the following:
• Motors: Turned on or off by the actuator, used in automatic
washing machines, cooker, water pump, automatic glass house.
• Buzzers: Turned on or off by the actuator, used in cooking
process
|Page9
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
• Lights : to turn lights on or off , used in security lights ,
glasshouse
• Heaters: to switch on or off, used in automatic washing
machine, temperature control, heating system..
| P a g e 10
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Chapter 3
Storage devices and media
Why back up data: To safeguard against loss of data / damage caused by
hackers / use the files elsewhere / protect data files from virus
Serial access: start from the beginning of the file then access to each
record / in magnetic tap / very slow form of data access
Direct access: Used with magnetic disks, optical media and solid state
media / used in real time access (online systems or automatic stock
control
Secondary storage media: measured by KB, MB, GB, TB
Three different types of storage media: Magnetic, Optical and Solid
state
Magnetic storage media:
x Fixed/internal hard disk drive (HDD): to store operating
system / applications/ data/ files / very fast / large
capacity
x Portable hard disk drives : using USB, to transferee data
between computers / very fast / large capacity / damaged
if dropped
x Magnetic taps( Serial access): use batch processing
(clearing bank Cheques ) , ( utility bills ), for long term
backup/ huge data storage
| P a g e 11
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Optical storage media:
x CD/DVD- ROM : use Laser light is used to read data and to
write / used to store music files, software, computer
games / to record / the data transfer slower than HD
x CD/DVD – R : for home recordings of music (CD-R) and
films (DVD-R)
x CD/DVD RW : to record TV programs , can be written
many times
x DVD RAM : To record satellite receivers to allow recording
and playback
x Blu-ray disk : use blue laser technology, use for home
video, very fast, large capacity, encrypted but expensive,
fewer movies formatted with Blu-ray
Solid State drives (SSD) ( direct access ): More reliable / Lighter / lower
power consumption, / very thin / data access faster than HHD
x Memory sticks/pen drives: to transport between
computers / backup / very compact / robust /easy to lose
x Flash memory card : used as mobile memory cards/p3
player/ compact / robust / limited life /
| P a g e 12
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Chapter 4
Networks
Computer Network: A network is two or more computers or other
device connected together so that can exchange data
Advantages of using Network: easily share files / data / printer /
internet/communicate with other users/store data on one file
server/setting is centrally
Disadvantages of using Network: risk of hacker / virus / if server is
down can't use computers/ printer developing / equipment is costly
Network devices:
x Hubs: to connect computers/devices to make LAN / poor secure
/ suitable for home network
x Switches : to connect number of computers / devices to make
LAN / more secure / used in office/ school/ large network
x Modem : to convert analogue signal from telephone line to
digital signals and vise verse
x Bridges : devices that connect one LAN to another LAN that uses
the same protocol
x Router: connect computer / network to internet / connect LAN
network together / transfer data between networks
x NIC : Network interface cards allow to connect device to the
network
x Network cables: data transfer faster than WiFi / more secure
than WiFi
| P a g e 13
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
x Gateway : network point that acts as an entrance to another
network
Internet Protocol ( IP ) address : uniquely identifies the connection of
network , its address of computer when connected to internet as form
109.108.158.1, assigned by ASP
MAC address: to ensure the physical address of computer. It uniquely
identifies the devices on a network
WiFi : use radio signals / easier to connect many devices / up to 100 range
/reduce cost of cabling / limited area / signal strength is weaker / easier to
hack -less secure / signal can interfere from other devices
Bluetooth : use radio signal / devices should close to a computer/
transferring files between computers / very slow data transfer/ short
distance up to 30 M / no password required – less secure / low bandwidth/
supporting to limited devices.
Configuring small network : setup an account with ISP/ setting IP to
connect to internet / buy hardware and software / configure hardware and
software/ put all software in the server with its license / setup privilege/
setup network manager
Hardware required for small network: Router/ (switch - hub) / Network
cables/ Firewall / server
Firewall: it can be hardware of software, to protect the network against
hacking
Server : to manage network functions ( network security/network file
storage/ share recourses , etc)
| P a g e 14
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Software required for small network: web browser / E-mail / security
package ( AntiVirus / AntiSpy )
Local area networks (LANs): for small area/ one building / connect
through hub/switch / share resource / communicate between users /
control and monitor the network activities / easier to spread viruses/
security risk
Wide area networks (WANs) : computer in long distance / joining several
LANs/ as example of internet
Wireless LANs (WLANs) : no cables/ devices connected wireless / better
than running long cables / share resources / more flexible / security big
issue/ affect signal problem / transferring data slower than wires
Accessing to the internet:
x Laptop : more portable / small size compare to desktop/ bigger
screen compared with tablet of mobile phone / touch pad difficult
to navigate webpages/ processor not fast
x Desktop : internet stable / easier to navigate webpages by using
pointing devices / should connect to power supply / not portable
x Tablet/ Mobile : more portable than laptop and desktop / mobile
easy to carry / everyone have mobile all the time / signal strength
depend on location / screen is small / not all website can used by
mobile or tablet / touch screen can be difficult to use / limited
battery life.
| P a g e 15
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
x Internet : Public / network of networks / global / lot of information /
browse webpages / send and receive email / communicate using
VOIP / web conferencing / playing multiplayer games / streaming
video and audio / online shopping and banking
x Intranet: Privet (one organization) / can be policed- managed / more
secure / data more reliable / data is relevant to organization/
viewing internal webpage / internal email between workers/ sharing
internal documents
x How hackers affect data and network: DATA can be deleted or
edited/ corrupted/ replicated / passed to others / accessing to email
/ carry online banking NETWORK can be shutdown / infected by virus
/ stop production
x Should internet policed? : To protect vulnerable users access to
undesirable websites/ prevent illegal material / stop incorrect
information being published/ but extremely difficult and expensive to
police internet / difficult to push roles in all countries / against
freedom
x Reliability of information: up-to-date / easier to get / big amount of
information/ also may incorrect / may get millions of hits due to
hard to get relevant information
x What is Authentication: technique to ensure only authorized users
are able to gain access to the network via Username/Password or
Biometrics, Magnetic Card, Digital Certificates?
| P a g e 16
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
x ID and password as authentication method: can be (guessed if
week password / seen by others / stolen / spyware can get it /
hacked
x How to protect your password: run Antispy software / change
password
x Strong password: 8 characters / one Capital letter / one numeral
value / one keyboard character
x Virus: piece of programming code/ software / can install / replicate
itself without the user’s permission - due to computer crash (slower)
/ delete files or copied by hackers / can stop production
x What Antivirus software do : check software or files before
running or loaded / indicate a possible virus / infected put into
quarantine to automatic delete or ask to make the decision about
deletion/ should be up-to-date / system should full check once/week
x Encryption: process of converting information into meaningless /
Data is encrypted / prevents people from understanding and reading
the data / Decrypt to understand the data
x How to avoid virus and spyware /using internet: Don't (download
files from unknown source / install illegal software / click any
unknown like within a website / ensure antivirus up-to-date / look at
https or padlock of the website
x Data Protection Act ( DPA) : most of countries have DPA / 8
principals for DPA -- Data must be ( lawfully / stated purpose /
| P a g e 17
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
adequate, relevant and not excessive / accurate / no longer than
necessary / accordance with the data subject's rights / kept secure /
be transferred to another unless have adequate protection.
x Network communication:
9 Physical Faxing : Require fax machine / telephone line / recipients
should be dialed before sending / can be printed and signed / but
any one can access to fax / out of paper or toner
9 E-mail : multiple attachments / multiple recipients / received
instantly / use any plat form/ attachment can include virus or
spam or phishing email
9 Electronic fax : through internet / no need fax machine / no ink /
no paper / from any location have net / no extra cost
x Video conferencing: video and audio / for business meeting /
hardware is ( Web camera – screen / monitor / speakers / Microphone
) easier to communicate with experts / hold meeting within short
notice / No cost ( travelling – accommodation – transportation ) useful
for unsafe places / but internet can affect quality / setup cost / lack
personnel contact / problem with different time zone / signing
document problem
x Audio conferencing: over the telephone network using VOIP / need
Telephone VIOP / Microphone / speakers
x Web conferencing: using internet connection / hardware is (web
camera – screen – microphone - speakers) / similar to video
conferencing / participant joining to meeting through link received by
email / instant SMS available and have permission to speak and share
| P a g e 18
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
| P a g e 19
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Chapter 5
The effective of using ICT
• Advantages of robots over humans: Higher productivity, More consistent
results, Work non-stop without breaks, they don’t get bored by
repetitive tasks, they don’t go on strike.
• Disadvantages of robots over humans : Expensive to purchase and setup,
need to be reprogrammed for every new task, production errors may
occur
• ICT New job opportunities : Network managers, Computer technicians,
Website designers, Systems analysts, Programmers, Computer
engineers, Delivery drivers
• Part-time working: any one can work part time than full time
• Flexi-time working: ability when can start and finish
• Job sharing: Ability to share time between 2 workers , one morning / one
evening
• Compressed hours : Worker work 40 hours in few days like 4 days
• Robots for production : Spraying the bodies /paint, Assembly bodies
parts / Assembly the engine and transmission / Fitting the windscreen
• Advantages of robots : Higher productivity / More consistent results /
Work non-stop / repetitive tasks without boring / don’t go on strike.
• Disadvantages of robots : Expensive to purchase and setup first time
/need to be reprogrammed for new task /production errors may occur
• Microprocessor – controlled device in the home: Is a device that
uses computer to control its functions,
| P a g e 20
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
• Two categories controlled device in the home (Labour – saving
devices and Other type of devices)
• Labour – saving devices: Automatic washing machines /Microwave
ovens / Cookers / Automatic dishwashers / Robotic vacuum /cleaners /
Bread making machines / Smart fridge and freezer
• Other type of devices : Alarm clocks / Television sets / Central heating
and air conditioning systems / Home entertainment systems
• Advantages and disadvantages of microprocessor-controlled laborsaving devices ( check note )
• Advantages and disadvantages of other of microprocessor-controlled
devices ( not related to lifestyle )
| P a g e 21
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Chapter 6
ICT Applications
Communication applications:
x Using word processor or desktop publishing: create flyers / posters /
brusher / leaflet / Newsletter : Open word processor or DTP, create
frames / text box / import photo / edit the photo
x Websites : for advertising / communicate with clients / easily update /
up-to-date information / online shopping / research / social networking
/ online banking / include ( video – sound – navigation buttons – it
counter ) but can be hacked / risk of pharming / maintain expensive /
not target audience
x Multimedia presentation : use animation / video / sound / more
interesting
x Music / Cartoons : software to create and edit sound and 3D animation
x Mobile phones : Mobile phones / text message / intent telephony
(VIOP)
x Business card and letter head : using for branding and awareness
x Data handling applications : surveys / address lists / clubs/ society
records / schools records / school libraries
Measurement applications:
x Using sensors / Data convert (ADC)
| P a g e 22
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
• Sensor examples : Weather stations / Scientific experiments /
Measuring a patient’s vital signs on a hospital / Pollution monitoring /
Burglar alarm systems
• Weather station : can measure Rainfall / Temperature / Wind speed /
Wind direction / (Barometric) pressure ( air pressure ) /Humidity
• Why use computer for measuring : No break / more accurate / reading
frequently / data can analyzed / create automatic graph / work in
dangerous places/ people can work while system working
• Measuring a patient's vital signs in a hospital: sensors can read pulse
rate, heart rate, temperature, blood pressure, respiration
• How Measuring works ( data from the sensor converted into digital using
( ADC ) / data stored in a computer / compare the data with pre-set
values / create graph / or readout / alarm activated if data is outside
acceptable values / the system continue to read .
• Measuring application In a river : Sensors place in 2 different places /
data converted using ( ADC ) / computer store data in the computer /
oxygen and acidity level compared
• Microprocessors in control applications: Automatic washing machines /
Automatic ovens/cookers / Central heating systems / Chemical plants
(Petrochemicals) / Glasshouse environment control / central heating
system / chemical process control
• Glasshouse environment control : five sensors (Humidity, Moisture,
Temperature, pH and Light ) used to control the glasshouse
• Turtle graphics : forward x / Backward x / left d / right d / repeat n /
endrepeat / pebup / pendown
• Modeling applications : Spreadsheets / Flight simulator / building
simulator / traffic lights
| P a g e 23
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
• Robotics with manufacturing applications : Robotics used in paint /
spray car bodies / welding body of cars / manufacturing microchips and
electrical goods
• School management systems : registration of attendance / student
performance / organize school exam / create timetable / teacher
substitution / traditional way / method 1 - using ID card / method 2 –
using finger print
• Student performance : grades / behavior / reports
• Exam timetables, subject timetables and teacher substitution : all can
be created
• Booking systems : in transport ( flight – train – buses ) | entertainment (
Theater – cinema – Stadium ) | Accommodation ( Hotels – Apartments –
Villas)
• Advantages of booking system: Prevent double booking – immediate
feedback - booking anytime - receive special offer – no printed ticket –
through mobile phone – confirmation message.
• Disadvantages of booking system: setup and maintenance is expensive /
need internet / difficult to cancel booking / no personal relation / web
site should organized well
• Automatic teller machine : used for cash withdrawal / deposit /
checking / printing statement)
• Advantages of Internet banking & online shopping : reducing cost / no
need to travel / product cheaper / suitable for disabled and elderly
people / no face to face discussion / saves time / save money -no more
staff
• Disadvantages of Internet banking & online shopping : possible isolation
for people / lack of exercise / should have computer / no picture of
goods / no body in the street / money transfer mistakes
| P a g e 24
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
• Chip and Pin : Many credit cards equipped with Chip & Magnetic strip
which have key information like PIN
• Clearing of check: a process whereby funds move from one account to
another to settle a check payment. The amount is usually credited to the
bank account of deposit and an equivalent amount debited at the bank
from which it is drawn
• Electronic Fund Transfer (EFT) : allow money to be transferred
electronically from one account to another ( example, when an
employer pays their employees their salaries
• Expert systems : used in diagnosing person illness / Finding car faults /
help to discover locations to drill for water or oil / strategy games /
identification of plants – animals – rocks / Road scheduling / financial
advice
• Elements of expert system :
inference engine
user interface – knowledge base –
• Using expert system : user asking/answering a questions / search in
knowledge base / provide answer or advice
• Setup expert system : data collected / create knowledge base / design
rules base / design user interface / develop explanation system / design
inference engine / interview experts to evaluate effective of the system
• Computers in medicine : Patient and pharmacy records / Monitoring
patients ( heart rate / respiration / brain activity / body temperature /
blood pressure / blood sugar level / oxygen level in blood ) / using expert
system to diagnosis illness / using 3D printer in medicine
• Using 3D printer in medicine : Surgical and diagnostic aids / Prosthetics /
Tissue engineering / Design of medical tools and equipment
| P a g e 25
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
• Computer in libraries : keep track with books / database store book and
members through two files / On daily bases the borrower's file is
reviewed by the computer
• Computers in the retail industry : Automatic stock control system /
Electronic fund transfer / 3- Internet shopping
• Using barcode in control stock level : barcode scanned / manual entry /
search until to find the record / product details are read / stock level
reduced 1 / new stock level / item is flagged / automatically re-order if
the level less than re-order level
• Barcode used in different applications : library book system /
administration system / passport / id cards / burglar alarm system /
automatic stock control system
• Recognition system : MICR / OMR / OCR / RFID / Sensor plats / MCQ
• Automatic Number Plate Recognition (ANPR) System : Sensor detect
vehicle / send signal to microprocessor / camera to capture image of
the vehicle / isolate number plate / plate is adjusted / number plate is
segmented / character recognized by OCR software / text nor is
editable / text string stored in the database / car park barrier is raised /
ticket is issued / driver returns to the car park / the payment registered /
the driver exit and again read number plat
• Monitoring and tracking systems : Monitoring /tracking a member of the
public / Cookies / key logging / Employee call monitors
• Satellite systems: Global positioning satellite (GPS) systems / at least 3
satellite visible /
determine specific location in ships, cars, plans,
walkers, runners.
• GPS advantages: NO paper maps to carry / re-rout / warn from
camera / estimate the arrival time / locate petrol station.
| P a g e 26
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
•
Geographic information system (GIS) : is a computer system
that allows us to map, model, query and analyze large amounts
of data
• Media communication systems: Communication media is the
methods of delivering and receiving information using
telecommunication.
| P a g e 27
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Chapter 7
Systems Life Cycle
x Stages of system analysis : analysis / design / development and testing
/ implementation / documentation / evaluation
x Analysis stage ( researching in existing system ) : it can be through
Observation / Questionnaires / Interviews / looking at existing system
x Data flow diagram DFD : showing the data flows input and output
requirements, processing and type of data storage needed / user
requirement from the new system / suitable hardware and software
x Design stage : design a new system based on the information from
analysis system
x Data capture form : paper based form or screen form must include |
clear heading / instruction / text box to collect information ( name –
date of birth – gender … ) , tick box to keep choice easier, clear font,
sufficient space or each filed)
x On screen form should have: appropriate spacing between each filed /
not too much white space/ readable font / suitable font size / font color
suitable with background color / drop down menu / tick box / radio
buttons / no overlapping / navigation buttons / save & close buttons (
may in exam asking to evaluate form design or create simple design )
x When you create database you should consider: data type / tables and
relationships / fields and its keys (Text – Numeric – Boolean – Date &
time - object…
x Screen output ( report ) : output fields should be correct / instruction is
clear / avoid white space without nothing / suitable font style and color
/ report should have (header – footer - Title ) and fitting page correctly
| P a g e 28
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
x Flow chart : show data flow through the system and how the decision is
taken / analyst used this chart to proposed overall the system
x Verification : a way of preventing errors when data is copied from one
medium to another:
1. Double entry : data is entered twice / two people enter the
data / then compared
2. Visual check :
same person is entering the data and
compare with the original document
x Validation: Is a process where data is checked to see if it satisfies
certain criteria when input into a computer:
x Range check : if data within acceptable value
x Lookup check : if data entered exists and stored in a table of
data
x Length check : if the data contains the required number of
character
x Character type check : if data doesn’t contain invalid
characters
x Format / Picture check : if the data in specific format
x Presence check : if the data already present
x Consistency check : if the fields correspond with each other
x Digit check : an extra digits added
x File structure : analyst should consider Field type / suitable field name /
data type
x Design and testing strategy plan : Make sure ( that meets the clients
requirements / produce required output ) and Remove any bugs
x Developing stage : system should be created and fully tested after
design stage / during development file structure should be created (
data type / field names ) / check validation rules / create user interface
x Testing strategy: software creates as a modules (small parts) each
module should be tested / to make sure each part working correctly.
| P a g e 29
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
x Category of user testing : Normal / Abnormal / Extreme / Live
o Normal : data is acceptable /reasonable
o Extreme: data at the limits of acceptability
o Abnormal: data outside the limits of acceptability
o Live : new system output compared with existing
system output.
x Implementation stage: change over from old system to new system by
4 common methods :
x Direct : Old system stopped overnight / replaced with new
system immediately ( immediate benefits / reduce cost / but
may be disaster
x Parallel : two systems running side by side until new system
take over ( old system working in case new system filed – train
staff gradually / but more expensive / Time consuming
x Pilot : The new system introduced in one part of company
before whole company ( if failed only one part affected / train
staff in one area / less cost / but take time to implement
x Phased : Only one part from the system introduce for all fully
check the system / but more expensive / time consuming
x Documentation : produce user documentation ( for end user ) and
technical documentation ( for developers / programmers
x User documentation: include.. how to ( load/ save / install / run
/search / query / sort / print out / add / delete )- purpose from
the system / hardware and software requirements / Error
handling / trouble shooting guide / log-in and out / error
messages meaning / glossary of terms / limitation of the system
/ sample run with result.
x Technical documentation: include.. program coding and listing /
computer language used / program and system flowchart /
| P a g e 30
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
x
x
x
purpose from the system / limitation of the system / input
formats / hardware and software requirements / known bugs of
the system / list of variables / file structure / sample run with
result / output format / validation rules / error messages and it
meaning.
Evaluation : evaluate the implemented system to see if the system
resolved the issues
The main evaluation points : Compare final solution with the
requirements / Identify any limitations or necessary improvements
needs / Evaluate the user’s responses / Compare results and
performance for new system with old system / Interview users to
gather responses about new system / questionnaires to gather
responses
Results from evaluation :
ƒ Update Hardware: user feedback / new hardware in the
market / changes in the company
ƒ Update software : changes in the company structure /
changes in legalization
| P a g e 31
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Chapter 8
Safety & Security
x Health aspects: computer systems have at least moveable table / antiglare screens/adjustable chairs/foot supports/suitable lighting/
uncluttered work stations/frequent breaks /frequent eye tests.
x Health risk list:
1. Back and neck problem/strain: cause by sitting in front
of a computer screen for long period in the same
position / to minimize adjustable chairs / foot rests /
screens that can be tilted
2. Repetitive strain injury / RSI : Damage fingers or rest by
using continuous keyboard or mouse click buttons / to
minimize / correct position / proper use of a wrist rest
/ Take regular break / Use ergonomic keyboard / Use
voice- activated software
3. Eyestrain : Caused by looking at the screen for long
time / to minimize use screen flicker / Change screen to
LCD / Use screen anti-glare / User should check his eyes
on a regular basis
4. Headaches : Caused by incorrect lighting ,screen
reflections, flickering screen / to minimize - Use antiglare screen / Take a regular break / check eyes on a
regular basis
5. Ozon irritation: Caused by laser printer in the office
area / to minimize - Proper ventilation should exist /
| P a g e 32
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
housed in separate room / change to other type of
printer.
Safety aspects:
Safety risk :
1. Electrocution : to minimize - Use residual current breaker
RCB / check wires and equipment regularly / Don’t allow
drinks near to computers
2. Trilling wires : to minimize - Use cable ducts / Cover wires
under table/ Use wireless connection
3. Heavy equipment falling and causing injury : to minimize Use strong and large desks and tables
4. Fire Risk : to minimize - Have Co2/dry fire extinguishers /
Don’t cover equipment / use good ventilation / Don’t
overload socket with too many items / Change to low voltage
hardware
E-safety : safety while using internet.
• Personal data ( name , Birth date , address , medical history,
banking details)
• Sensitive personal data : ethnic origin, political views,
religion, sexual orientation, criminal activity
E-safety issues and advices:
• Don’t give out any personal information to unknown people / Don’t
send people photos of yourself unless the person known to you /
maintain your privacy settings / only visit trusted websites / open
emails from known sources / send email people you know / Using social
networking sites, instant messaging or chat room
| P a g e 33
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Using social media networking sites or chat room:
• Block or report anybody who acts suspiciously or who uses
inappropriate language / use a nickname / Keep private and personal
data secret / Don’t enter private chat rooms / don’t meet anyone
the first time on your own chat room / meet the person in a public
place / Avoid the misuse of images / Always use appropriate
language / Always respect people’s .
• Security of data: Hacking / Phishing / Smishing / Vishing / Pharming /
Spyware / Viruses / Spam / Moderated and unmoderated forums /
Cookies
• Hacking: Unauthorized access to the computer system without
permission / Hacker can delete, corrupt, edit, files or change data or
personnel information, steel user identity, stop production/ to avoid
or remove .. Using firewall / strong password/ Protection software/
ID and password / encryption
• Phishing: a method of trying to gather personal information using
deceptive e-mails and websites by sending request from bank or a
note from someone in their company/ can gain personnel data such
as credit card number / to avoid .. filter phishing e-mail / be cautious
when opening email or attachment / Don’t click on executable files
•
Smishing ( SMS phishing ): SMS system of mobile phones to send out
Fake text message which often including URL or telephone number /
to gain personnel details / to avoid .. Double check the SMS / check
for spelling mistakes / Check the link of the website / Contact your
bank directly
• Vishing: uses voice mail message to trick the user into calling the
telephone number contained in the message
| P a g e 34
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
• Pharming : Malicious code installed in the user computer to direct
the user to fake website / gain personnel data / to avoid .. use antispy software / double check the URL
• Spyware and key-logging software : software to collect data by
monitoring key presses on the user’s keyboard / effects : gives the
originator access to all data entered using a keyboard on the user's
computer / install other spyware/ read cookie data and also change
a user's default browser / to avoid .. use Anti-spy software / Enter
password by using drop-down menu
• Viruses: program code or software / can replicate/ copy itself to do
something like deleting or corrupt the files or operating system /
crash or slow the computer / stop functioning / corrupt OS …. To
avoid.. install antivirus and update / don’t use software from known
source / don’t open attached files with email from known sender /
always backup
• Spam : refers as junk mail / by flooding network with useless traffic
which slow the network down / to avoid .. Set the protection filter
level to high / junk mail filter should kept up to date / Block images
in HTML messages / Do not sign up to commercial mailing lists
•
Moderated and unmoderated forums: moderated forum is online
discussion forum / posts checked y administrator / can prevent spam
/ filter posts / | unmoderated forum.. no one own the internet / not
policed
• Cookies: small files or code stored on a user’s computer/ Sent by
web server to user’s computer / The data can be retrieved and used
| P a g e 35
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
/ online cookies remember the type of the book / The data gathered
by cookies
• Firewalls: hardware or software / sites between user computer and
external websites / examine terrific between user computer / check
incoming and outgoing data / can block terrific or warninig about
security issue / can manage the criteria to prevent access to certain
websites / can prevent hackers to enter the network / warning if
software trying to access to the data.
• Security protocols : Secure Sockets Layer (SSL) and Transport Layer
Security (TLS)
• Secure Sockets Layer (SSL) : type of protocol that allows data to be
sent and received securely over the internet
• Transport Layer Security (TLS) : form of protocol that ensures the
security and privacy of data between devices and users over the
internet / provide encryption / authentication and data integrity
• TLS layers :
• Record Protocol: part of the communication can be used with
or without encryption/ contains data being transferred over the
internet.
• Handshake Protocol : secure session between user and website
is established
• Encryption : used to protect data in case it has been hacked /
information is converted to secret code / encryption and decryption
called cryptography
| P a g e 36
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
• Authentication : used to verify that data comes from a secure and
trusted source
• Digital certificates: a pair of files stored on a user’s computer, each
pair of files divided into / A public key (known by anyone) and a
private key (known to the computer user only).
• Passwords : Strong passwords should contain upper case / lower case
characters/ numbers / keyboard symbols / should changes in regular
basis / many systems asking to enter 3 times before lock out /
prevent others to access to your computer
• Biometrics: method of authentication / include : finger print scan /
signature recognition / retina scans / iris recognition /
face
recognition / Voice recognition
• Cloud Security: online storage medium used to backup files / access
anywhere / no need to pay for extra local capacity / could make sure
your data is backed up / synchronize data / several users can edit
| P a g e 37
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Chapter 9
Audiences
• Software copyright and privacy: Software / Music CDs, videos and
articles from magazines and books is protected by copyright laws
• What is illegal: make copy of software and sell it / use single user
software and install in multiple computer / use code from copyright
software / rent out software without permission / use software name
without agreement.
• Legal: covers the law; whether an action is punishable by law.
• Morality governs the private and personal interactions between
people
• Ethics governs professional interactions
• Culture attitudes, values and practices shared by a society or
group of people
• A dongle is a small device and used of protected software through USB
| P a g e 38
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Chapter 10
Communication
• Email : popular for communication between people
• Email acceptable language : language and content must be appropriate /
in business the language must be formal
• Email terminology:
9 Attachment: any type of file sent along with an email message,
can include photos and documents to zipped files, folders,
mp3s, and more.
9 CC : Stands for Carbon copy, that recipients who else is getting
a copy
9 BCC: Similar to CC, Blind Carbon Copy sends a copy of a
message for the information of a large number of people.
9 Forward: sends a message that has been received to another
email address
9 Group: group of email addresses that are given a group name
so
9 Subject : short description of the message.
| P a g e 39
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
• Inappropriate language: Absence images/Abusive, profane /
inflammatory / Violent message / Use illegal material in messages
• Netiquette : rules of etiquette over computer networks and internet /
don’t write content in an email could be misunderstood / check spelling
and grammatical error / respond quickly / Avoid humor / Do not
plagiarize / Do not chaptalize all text
• Spam: junk email is sent out to the recipients / part of phishing scam /
usually unwanted email / effects: chance to obtain details / network
could also become slower / unnecessary traffic flooding the network.. to
avoid: Use a junk email filter / Do not sign up commercial mailing lists or
reply spam email / Untick the check box if you are asked to give your
email
• Effective use of the internet : internet is worldwide collection of
networks allow to send and receive email / chat / transfer files between
computers / browse the web
• World Wide Wep ( WWW) : is a part from the internet / collection of
warpages based on http / access through web browser
• Intranet : a computer network based on internet / designed to meet
the internal needs / for single organization / safer, less chance of
hacking/viruses / possible to prevent external links / easier to send out
sensitive messages / better bandwidth / possible to create extranets
• Hypertext transfer protocol http & https : set of rules which are followed
when transferring information across the internet which agreed
between the sender and recipient / http changed to https or padlock (
secure )
| P a g e 40
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
• Uniform recourse locator URL : web browser display webpages / URL
represent numbers ( not user friendly ) / instead of numbers use
alphanumeric / web browser translate html to show the result
• URL format : domain host / domain name ( website name) / domain type
.. com or gov or edu / may include country code.. kw or eg or uk / path /
filename.
• Process of loading webpages : enter URL or click the link / retrieve code
of web page from the server / webpage displayed
• File transfer protocol FTP : is Network protocol / transfer files from
computer to another using internet / FileZilla is popular FTP application /
to use FTP you have to install the FTP application and know ( ID ,
password , host name , port .
x
Internet service provider ISP : internet company provider / they are
using fiber-optics to increase bandwidth .
x
Internet : international network / covers topics of global or general
interest / Internet possible or difficult to block certain websites /
accessed from anywhere / open for hackers / public access
x
Intranet : internal restricted access / used to give local information
relevant to the company or organization / easy to block certain
websites / behind a firewall / some protection against hackers /
private access
x
Cloud storage : Online storage / backup files / files accessed from any
device connected to internet / user don’t have to carry storage device
/ backup solution / unlimited capacity / but : files could be hacked / :
| P a g e 41
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
x
Three types of storage clouds : Public cloud / Private cloud / Hybrid
cloud
x
Blog : personal experiences / updated by one author / recent entries
are shown first / Bloggers can be prosecuted for posting offensive
material
x
Wiki : collaboration from users / can be edited by anyone/ Wikipedia
is an example
Social networks : to interact and communicate with each other /
similar interests / share content such as photos, video / each member
can build public and private profiles / free instant messaging and video
chatting / email other members / invite people to be a friend /
members have control to access to personal data
Microblogs : Similar to blogs / use short, frequent posts / like tweets /
Very difficult to customize
B-blog : business blog to promote themselves on the internet.
Searching for information on the internet : using URL or search
engines like Chrome , internet explorer , Mozzila )
Search engines : useful if you don’t know URL / use variety of methods
to search / more specific search get more accurate result / narrowing
search by typing (+) between words / you will see thousands of hits
x
x
x
x
x
x
Advantages using internet to get information : up-to-date / limitless
of information / searching using search engines is fast and easy /
people can search while comfortable at home / pages on the internet
can have multimedia
x
Disadvantages using internet to get information : anyone can post
information which possible incorrect / risk to access to inappropriate
websites / easy to distracted while searching on the net / may
| P a g e 42
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
overload with information if you don’t have searching experience /
losing research skills because search engine do every thing
x
x
Why internet search to find relevant information is not always fast?
without narrowing the criteria you will take long time to find the
relevant information / millions of relevant web sites / If the user
uncertain what he needs it will take long
x
Why it is not always easy to find reliable information on the internet?:
Content on the internet is not regulated / anyone can make a web site
/ wikis can edited and include not correct information / information
sometimes depending on who is the author.
How can you evaluate the reliability of information found on the internet?
Anyone can setup website, so information not necessarily reliable or
accurate / some commercial website only to promote and advertise their
products could be unreliable / if the URL ending with .gov or .org could be
reliable / compare information on the website with a text book / good idea
to check support or permit from endorsed / website linked to reliable or
unreliable web sites / check testimonials or recommendation / check last
update if was long time ago( not reliable ) / If the author of the website is
good credential.
| P a g e 43
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
¾ File management :
Manage Files Effectively:
Extension
name
.CSS
.CSV
.GIF
.HTM
.JPG
Full form
Cascading Stylesheet
Comma Separated
Value
Graphics Interchange
Format
Hypertext Mark-up
(Language)
Joint Photographic
Experts Group
Used for
Stylesheets in webpages
Store tabular data
Moving images
Webpages
Standard for images
.PDF
Portable Document
Format
Documents to be circulated over the
internet/email
.PNG
Portable Network
Graphic
Compressed images
.RTF
Rich Text Format
Word processed documents
.TXT
Text (File)
Simple Text files
.ZIP
Zone Improvement
Plan
Sending many files over the
internet/email
x Generic file formats can be opened by any software to access the data
held in them.
| P a g e 44
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
¾ Styles:
9 Several organizations use a corporate house style or corporate
branding, which is used to print on websites, visiting cards, letters,
etc. It refers to a specific style of fonts and formats used in the
making of ICT solutions by organizations.
9 A corporate house style when used effectively identifies the users of
the style.
9 Consistent styles enable users to associate a particular organization
with a style and also show consistency in the ICT solutions created
by the organization
¾ Proofing:
9 When name (person or organization) is entered or sometimes
newly coined terms are used, spell checkers might pick these up
as errors, because they are not found in the dictionary. This makes
spell checkers less efficient.
9 Validation ensures that the data being entered into an ICT solution
is reasonable and makes sense. Entered data is checked against set
criteria to be validated.
Proofing techniques:
9 Verification: checking of data when copied from one medium to
another to prevent errors.
| P a g e 45
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
9 Verification is also important and is a way of preventing a
difference in data when it’s being transferred from one system to
another. This tries to make sure data entered is correct, relative to
the source.
¾
Document Production
9 Widow: A paragraph-ending line that falls at the beginning of the
following page or column, thus separated from the rest of the
text.
9 Orphan: A paragraph-opening line that appears by itself at the
bottom of a page or column, thus separated from the rest of the
text.
9 Page, section and column breaks are used to ensure that widows
and orphans are not present in a document (these show poor
typography).
9 A mail merge document is created in order to create a standard
template and then use it to send documents personalized (by the
computer system) for the selected recipients of the document
| P a g e 46
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
¾ Data Manipulation
Create a Database Structure
9 Flat file databases are tables that have data sorted in rows and
columns, whereas relational databases are several tables grouped
together to from a link, thus preventing unnecessary repetition of
data.
9 Primary key: The key field of a table which is unique and identifies
each record
9 Foreign key: The field linked to the primary field of the table
linked to through a relationship
Relational database
Flat-file database
Complex queries can be carried out
Poor at complex queries
Better security
Poor at limiting access
Cater for future requirements
Harder to update, so inherently
inefficient
Data is only stored once
Potential duplication
Require more planning
Easy to design
Non-unique records
Harder to change data format.
| P a g e 47
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
¾Data analysis
Create a Data Model
9 Charts: A graphical representation of (usually tabulated) data
9 Accurate data ensures the results obtained by the processing of
data is relevant, which is essential to the usability of the model
9 Formulae are mathematical operators defined by the user to
perform a function, whereas functions are predefined logical and
mathematical operations a user can use in a spreadsheet
9 Mathematical operations are performed in the order PEMDAS
(Parenthesis [Brackets] Exponents Multiplication Division Addition
Subtraction). Brackets are used to notate data used by a function,
e.g. =SUM (A2:A10).
9 Relative cell referencing is made when the cell reference is
supposed to change when the cell it is referred to in is changing. It
aids more efficient designing of models.
9 Absolute cell referencing is made when the cell referenced stays
constant when the cell it is referred to in is changing. This aids the
preparation of a model when a set of data is constantly being
referred to throughout the model.
9 Cell reference or relative cell reference describes how far away a
cell or group of cells is from some other cell in the same
spreadsheet. Basically, the cell's address.
| P a g e 48
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
9 A model prepared needs to be tested before being used to ensure
that all results computed are accurate.
Definitions:
9 Cells: A space for data to be entered a table; a box formed by the
intersection of columns and rows
9 Rows: Horizontal boxes that divide the table in segments
9 Columns: Vertical boxes that divide the table in segments
9 Sheets: A table of data
9 Tabs: A module of a database program that holds the tables on
the computer,
9 Pages: Full pieces of papers that contain information held on one
sheet of paper.
9 Ranges: A group of cells in a table
9 Named cell: A cell in a table that is given a name (like "profit") and
can be referred to using that name.
9 Named range A group of cells in a table that are given a name
(like ‘Pricing’) and can be referred to using that name.
9 Nested formulae/function: A formula/function used inside a
formula/function as an argument
| P a g e 49
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Test the Data Model
9 A model prepared needs to be tested before being used to ensure
that all results computed are accurate. The test plan must be
justified to be apt for the model. E.g. all the mathematical
operations must be tested in a model that relies on calculations.
9 Definitions:
o Testing: Checking if the designed model delivers the
expected outcome when tested with data.
o Test data: The input data used for testing model.
o Expected outcome: The output a model is supposed to give
with the test data.
9 Actual outcome: The output a model actually gives the user when
the test data is input.
¾ Web Development Layers
9 Content/Structure layer: Holds the content of the webpage
structure.
9 Presentation layer: The layer responsible for the formatting
of a webpage(s) or elements (using a stylesheet).
9 Behavior layer: scripting language of a web page or an individual
element
| P a g e 50
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
¾ Create a Webpage
9 Tables make the basic structure of a webpage and organize
page layout.
9 Anchor: An element in a webpage that creates a hyperlink
between a source anchor and a destination anchor. These can
be used to link 2 resources together.
9 Relative file paths are used for attached stylesheets as the
stylesheet is going to be stored on a server in the same
directory as the webpage, and not where it an absolute file
path says.
¾
Definitions:
9 Relative file path: A path referring to a file in the same directory
relative to the page the reference is made in.
9 Absolute file path: The full path of a file, which is not relative to
anything, whereas relative links only point to a file or a file path,
the browser then redirects the user to that location on the
current site.
9 Absolute paths always include the domain name of the website
9 These should not be used to refer to locally saved webpages as
the computer the webpage is stored on (the server) is not the
same as where the webpage was developed and thus an absolute
file path would point to the wrong address.
| P a g e 51
Mr. Ayman Al-Nahhas +965 97956633
Cambridge ICT Tutor
Use Stylesheets:
9 CSS (cascading stylesheet) is a text-based language which is
attached to webpages to set their format. CSS files have a “.css”
extension
9 These should be attached using relative file paths as they are
stored along with the webpage and thus can be linked relative to
them.
9 Internal CSS have more preference over Inline CSS
9 If several external stylesheets are attached to one web page, the
stylesheet attached last (at the bottom of that part of the code) is
given preference over the other attached ones).
Test and Publish a Website
9 To upload and publish content on a website using FTP, a user must
have:
o FTP client software
o All files in one folder
o Host Name/URL/IP address for ftp
o Host port to be used for upload
o Username and password
9 The test plan used to test a webpage must be justified based on the
elements being tested. ( If hyperlinks are being tested, it makes to
check if all the hyperlinks are redirecting the user to the correct
webpage/ section of webpage.
| P a g e 52
Download