GR 11 NOTES TERM 4
Integrated software
When a company creates many different types of software it makes sense that the
programs should be designed to have a similar interface. This means that someone who
uses their word processor will feel comfortable when using their spreadsheet because
many of the menus, shortcuts, dialogs etc. will already be familiar. The separate packages
also work together in the sense that they are designed to share and exchange data with
each other.
This type of software design results in what is called integrated software. Common
productivity software is sold grouped together as a suite of programs. The most common
and well-known productivity suite is Microsoft Office.
The CPU
The CPU (Central Processing unit), also known simply as the processor, is the part of the
computer that performs all the processing of data and carrying out of instructions.
A CPU's speed is measured in gigahertz (GHz). This is a general indicator of how many
instructions the CPU can process in a second.
Agreeing to the licence agreement
Most software can only operate under a strict (legal) license agreement. You cannot
proceed with installation until you have read and agreed to the licence agreement (EULA).
The desktop
First basic screen of the operating system. It will vary in appearance as per operating
system. It can be changed by the user. The tiles and smaller pictures or icons on the
desktop represent programs or places on the computer.
All modern software makes use of a graphical user interface or GUI. This allows users to
interact with the computer and to make selections through the use of graphical elements
such as icons and tiles.
A GUI is designed to be used with a keyboard and mouse.
Connecting devices
Ports are the sockets on a computer that you use to connect peripherals like printers,
scanners etc. to your computer. You get many different types of ports but the one used
most often for almost all modern devices is the USB port. If you need extra USB ports, you
can get a USB hub, which provides extra USB ports.
Response time
The response time of a monitor is the time it takes to change a pixel from one colour to
another and is measured in milliseconds (ms). A low (fast) response time is needed for
high quality graphics and video, so that the images do not blur or lag (ghost). For gamers
the response time of a monitor is very important.
RAM AND ROM
There are two types of memory in a computer RAM and ROM
RAM Random Access Memory is often just called memory. Before a program can be
run or any can be processed, it has to be loaded into RAM first.
Important:
RAM is where the CPU keeps all the data/instructions it is working on.
RAM is volatile (it loses its contents when it has no power).
RAM is supplied in modules (called DIMMs) that fit into slots on the motherboard.
RAM is fast (it is electronic, and therefore much faster than storage).
RAM is expensive (it costs more per GB than storage).
The more RAM you have in your computer, the better it will perform as it can load more
data and programs that need to be processed at a time.
Disk defragmentation
The more you use your computer (adding programs, creating, saving, moving and deleting
files), the more the files and parts of the files get scattered on the disk. The more
scattered the file parts are, the slower your computer becomes. This is known as disk
fragmentation.
A disk defragmenter is a utility that puts the parts of files back together again and speeds
your computer up again.
A disk defragmenter is included with Windows, but it is possible to buy additional versions
of the software.
Small networks PAN and HAN
LAN Local Area Network
WAN World wide Area Network
The home button will return you to the page that you have set up as your default or home
page, in other words the first page that appears when you load your browser
When people talk about the RAM of a computer, they are talking about its memory. RAM
motherboard. RAM is usually measured in the low Gigabytes range (from 1 64 GB).
The different types of media are magnetic (storing data in magnetic patterns on hard
drives), optical (changing the way the surface of a disc reflects laser light CD, DVD, Blu-
ray) and electronic (flash drives).
Connecting to the Internet
The internet is a large worldwide computer network, consisting of computers and
networks that are linked using communication media. The communication media can
include telephone lines, fibre cables, undersea cables, satellites, cellular technology and
microwave.
Ergonomic considerations
When working on a computer, you spend most of your time typing on the keyboard. If you
spend more than a few hours a day working on a computer, it makes sense that you
should choose an ergonomically designed keyboard because of its impact on your personal
health.
Ergonomic keyboards position the keys so that you hold your hands in a more natural
position to reduce the likelihood of an RSI (Repetitive Strain Injury) such as Carpal Tunnel
Syndrome. Soft-touch keys and wrist rests can also be helpful in this regard.
A router is a device that allows one or more computers or devices to connect to networks
such as the internet. Most routers include a built-in switch which allows other computers
and devices in the HAN to connect to the router.
The router is used to connect to an outside network (internet) while the switch is simply a
device that allows devices and computers to connect to it so they can communicate on the
internal HAN network.
Spyware are programs with bad intentions (malware) which try to monitor and record
how you use your computer.
Steps when installing software:
You are guided through the process by an installation wizard a program that presents
you with options and performs the installation based on your choices and preferences.
Switch
A switch is a device used to connect computers in a network with cables so that
communication can occur between the computers but it is not used for internet access.
One end of the network cable plugs into the network port of the computer and the other
plugs into a port on the switch. The switch can then send the data received from one
computer to other computers on the network and manage the communication on the
network efficiently.
Restricting the possible values
Creating a validation rule
The values allowed in a field can be restricted by using a validation rule. A validation rule
lists the condition(s) that the data in a specific field must meet to be accepted as valid
data.
Validation text can be used together with a validation rule this is the message that must
be displayed if the data entered does not meet the condition(s) in the validation rule.
The table below contains examples of different validation rules for different data types, as
well as possible error messages that you can use as the validation text.
Any condition that can be used in a query can also be used in a validation rule.
Connection methods
Devices in a network can be connected wirelessly or with cables. Every computing device
in the network either must be wireless-enabled (built-in wireless adaptors) to connect to
the network wirelessly, or must have a Network Interface Controller (NIC) to connect to
the network via a cable. (NICs are normally built into the device).
Freeware
Freeware is fully functioning software that can be used and copied without any
restrictions.
Graphics card
The size and quality of the image displayed is only partially determined by the monitor
used. The image has to be generated specialized circuitry that we will call the graphics
card also called video card, graphics adapter, and display card and display adapter.
Cheaper computers use built-in graphics circuitry and use some of the computer's memory
to hold the images generated for the display. This is not ideal because it leaves less
memory for other programs and data.
If you work with graphics intensive tasks such as video editing, 3D software, photo editing
or games then it is better to use a separate, high end graphics card in your computer.
Know what you want to do with your computer before you buy it that way you can make
sure you get the type of graphics card you need. Remember that laptops cannot upgrade
their graphics cards. Most users do not need powerful graphics cards, so if you don't plan
to use the computer for graphics intensive tasks then any graphics card will do.
TEMPLATES
A template is a pattern or blueprint of a document used to crate similar documents. Using
templates helps us to work more productively.
All the applications contain templates of different types of documents that are already laid
out in the correct format. You can use them as they are, or adapt them to suit your task.
Adapting an existing document is a lot faster and easier than creating one from scratch.
Field size To specify the maximum size of the field
Text fields:
A number that indicates the maximum number of characters that a
value in the field can contain. Characters that exceed this number are
simply truncated (chopped off)
Number fields:
The type of number that will be stored in the field, e.g. whole numbers
Byte (0 to 255) and integer (-32.768 tot +32.767).
HDMI (HIGH DEFINITION MULTIMEDIA INTERFACE)
Description what it is
High definition Multimedia Interface is a standard/port for connecting high-definition
video devices such as computer monitors, video projectors and digital television, etc.
HDMI carries high quality video and audio signals so there is no need for separate audio
cables as with VGA.
Open source software
Open source software (OSS) is software that may be freely used, modified and distributed.
It may however, not be sold. Support and documentation may be charged for, but not the
source code.
Most OSS software has a special license which allows you to use the software for free. If
you make any changes to the software then you have to give those changes away for free
as well.
Examples of open source software include:
Linux
OpenOffice and LibreOffice
Java programming language
MySQL database system
Mobile users with laptops will use the built-in touch pad instead of a mouse.
Pen input device
A pen (stylus) is an input device used together with a pressure-sensitive digitising tablet.
Images drawn on the surface appear on the computer screen. These devices are perfect
for anyone doing artistic work on a computer. They allow you to draw far more naturally
ad accurately than you ever could with a mouse. These devices are quite expensive.
You also get special pens (styluses) that work with touch screens, but these are just
substitutes for a finger, and reduce the oily smudges on the screen left by fingers, rather
than adding precision.
Questionnaires
Not all information is readily available. In order to solve your problem, you might need
information about people's ideas, opinions, habits, likes and dislikes. You will need to use
a questionnaire to obtain that type of information.
Captcha
What it is and why we need it?
The sending of spam is automated today. To get email to work with, computer programs
called 'bots' search websites and try to join mailing lists or sign up to blogs. To stop the
'bots' you now have to prove that you are human when signing up this can take the form
of a simple check box (I am not a Robot) or a CAPTCHA (Completely Automated Public
Turing test to tell Computers and Humans Apart) input distorted letters and words that
no computer software can recognise, but which humans can recognise with ease.
Hotspots
A hotspot is a place where a WiFi network has been created so that people can connect to
the network and through it, connect to the internet.
An organisation that has set up a hotspot will more than likely have the wireless network
connected to an ISP via a fibre or ADSL connection. The area within which the devices can
connect is quite small.
SCREEN LOCK PATTERN
Description What it is
It is a way of locking a device by setting up a pattern you must draw or trace on the screen
to unlock the device.
Uninterruptible Power Supply
A UPS can be used to protect a computer against power surges and spikes as well as power
outages. A UPS is connected to the mains and will immediately provide power to the
computer connected to it as soon as the mains power falls. This give you time to save our
work and shut down your computer if need be.
A UPS only provides power for a limited duration it will usually keep your computer
running to give you enough time to save your work and shut your computer down
properly. It will not keep your computer running during a long power outage.
Dual Double eg core/system software - 2
Functions of operating systems:
Managing all the hardware and software on the computer. Giving computer instructions
on how to do very basic tasks
Maintaining security (passwords). Creation of different users.
Providing a user interface. Allows us to interact with the computer and programs.
Windows is not the only operating system. Your phone or tablet probably uses either
Android or iOS and desktops and laptops can also run Linux or MacOS.
Information processing cycle
Input Processing Output processing storage communication.
Input the computer receives instructions what to do and what data to work on. The
user give the computer input using the mouse and keyboard.
Processing the computer works on the data calculating, sorting, etc. The part of the
computer that does all the processing is the CPU.
Output the computer gives feedback on the results of its processing. Usually pictures or
text on a screen, sound or printing on paper.
Storage Storage lets us keep a permanent record of our work. It receives output and can
provide input for the computer. Storage is internal or portable.
Communications computers linked to other computers can communicate.
Communication can provide input and output for the computer.
INPUT
Input is the data and instructions that are given to a computer. Providing input is the first
step of getting a computer to do anything.
OUTPUT
It is whatever the computer produces to provide us with the results of its processing can
be text, graphics, audio or video. Different output devices. Users can view output on
screens, print it out or hear it through earphones, headphones or speakers. Some output
is meant to be responded to immediately (interactive) e.g. dialog box appears with
choices. Other output needs to be more permanent printouts on paper, also known as
hard copy (the visual output on our computer screens is known as soft copy.)
Most commonly used output devices monitors and printers.
Printers
Important specifications and factors determining the overall quality of printers:
Speed Measured in pages per minute (ppm).
Resolution Measured in dpi (dots per inch) and is specified in a similar fashion to a
monitor e.g. 1200 x 600 dpi. The higher the dpi the better quality.
Disk filling up (too little space)
With increasing use of media files such as photos, music and movies most people find
themselves running out of storage space sooner or later. It might be a good idea to put
media files on external drives from the start.
Windows provides a very useful utility, namely Disk Clean-up, to perform a lot of your
housekeeping in one step by removing the following:
Temporary files downloaded from the internet.
Deleted files and folders from the Recycle Bin.
Temporary files created by Windows.
Components of Windows that you are not using.
Installed programs that you no longer or seldom use.
Disk defragmentation
The more you use your computer (adding programs, creating, saving, moving and deleting
files), the more the files and parts of the files get scattered on the disk. The more
scattered the file parts are, the slower your computer becomes. This is known as disk
fragmentation.
A disk defragmenter is a utility that puts the parts of files back together again and speeds
your computer up again.
Updating your software
Updating software is the process of either getting the latest fixes for the bugs in the
current version of the software or obtaining new, additional features.
Updates to operating systems especially ones that fix bugs or security vulnerabilities
are called patches and Microsoft's update on the first Tuesday of the month is commonly
known as Patch Tuesday.
The developer of any software is continually working to improve the software by
enhancing existing features and providing new features, fixing bugs and patching security
loopholes. The make fixes available quickly and frequently as downloadable updates,
known as patches. This is why, when your software tells you an update is available, it is
worth taking the time to stop what you are doing and install the update.
Service packs versus updates
A service pack is usually a collection of all the previous updates for the last period of time.
The service pack is meant to help people who are behind in their updates fix their software
all at once.
Service packs are pretty much a thing of the past. Most software companies expect users
to have an always on internet connection and they create the software so that it will
regularly check for updates and then automatically download and install those updates.
Ergonomics
The study and design of the workplace and the equipment used in the workplace for the
comfort and safety of people in their work environments.
Features of an ergonomically designed keyboard
Keyboards at angle for easy input
Wrist and palm rests
Special keys for frequently used functions
Curved keyboards etc
Bluetooth is a technology that allows devices such as mice, printers and smartphones to
communicate wirelessly over a short distance.
Wireless mouse and keyboard
either via a cable or
wirelessly. Wireless mice and keyboards use short range radio waves (Bluetooth) to
communicate with the computer. A wireless adaptor has to be connected to a USB port
on the computer to receive signals from the device. Wireless devices need power in order
to send a signal and so they have to contain a battery.
Most devices connect to a computer via USB but there are some specialised ones such as
HMII for monitors.
Advantages:
There is less clutter as there are no cables
You have a wider range of movement
Disadvantages or limitations:
They require batteries
They are slightly more expensive than wired devices
They can easily be removed stolen
There can sometimes be interference with the wireless signal, causing the device to stop
working temporarily.
Bluetooth is a technology that allows devices such as mice, printers and smartphones to
communicate wirelessly over a short distance.
Reasons for connecting computers to a network:
Files can be accessed from any computer in the network.
Files can be transferred.
Software can be shared by users.
Hardware such as printers can be shared by users.
Increased security.
Internet connection can be shared by many users.
All programs can be installed and updated from a single location.
Internet access can also be controlled.
Facilitating communication.
Free time management: e-books, radio, video and TV live
streaming over the Internet.
WHAT IS NEEDED TO CONNECT?
Setting up a small network
Hardware
Includes the computing devices themselves, desktops, laptops, tablets and smartphones as
well as other hardware that can be shared such as printers.
Additional devices are needed for communication between devices in a HAN and
connection to the internet:
A Switch is a device used to connect computer in a network with cables so that
communication can occur between the computers.
A router is a device that allows one or more computers or devices to connect to
networks such as the internet. Most routers include a built-in switch which allows other
computers and devices in the HAN to connect to the router.
The router is used to connect to an outside network (internet) while the switch is simply a
device that allows devices and computers to connect to it so they can communicate on the
internal HAN network.
Small networks PAN and HAN
Personal area network (PAN)
A Personal Area Network (PAN) is a network organised around an individual or a couple of
individuals with a range of a few metres.
In a PAN one computing device typically connects to one or more peripheral devices
(sound, speakers, etc.), usually wirelessly. The peripheral devices are usually only able to
connect to one computing device at a time, while the computing device itself can host a
number of simultaneous connections.
The main purpose of a PAN is to automate connections between mobile devices. You pair
your smartphone with Bluetooth headphones.
A PAN is a mobile network it goes wherever you go as you carry your devices around
with you. Devices connect and disconnect automatically as they move in and out of range
of one another.
Firewall software
Whenever you connect to the internet, any software on your computer can use this
connection to communicate with other computers on the internet. Other computers
outside of your network can try to see if your computer is connected and try to take
control of your computer.
Firewall software is software that allows you to control which programs can access the
internet, and it protects your computer or network from unauthorised access.
Windows provides a basic firewall facility. Many anti-virus software packages such as
Norton Internet Security have built-in firewall software.
The firewall software that comes with Windows is already set up and configured to handle
most situations, and it is best not to change any of these settings yourself.
802.11 a/b/g/n
It refers to a set of specifications and protocols used in communication on a wireless
network. The letters (a, b, g, n) simply indicate different versions of the Wi-Fi standard
(each with different speeds, etc.)
Simple explanation of how it works
Devices that have the appropriate wireless capability can communicate with other devices
by using Wi-Fi (wireless fidelity), which identifies any network based on the 802.11
standards.
802.11 is a series of network standards that specifies how two wireless devices
communicate over the air with each other or, put very simply, it is a wireless connection to
a physical network or network device.
Standard 802.11a transfer rate is up to 54 Mbps
Standard 802.11b transfer rate is up to 11 Mbps
Standard 802.11g transfer rate is 54 Mbps and higher
Standard 802.11n transfer rate is 108 Mbps and higher
Advantages
No cables are needed.
Network connection can be made in areas where cables cannot be used.
Disadvantages
Can be more expensive to install.
Can be more difficult to maintain.
Security risks are more pronounced.
Examples of the technology in practice
Wi-Fi communication in hotspots.
WiMAX
WIMAX (Worldwide Interoperability for Microwave Access) is an upgrade on WiFi. It is a
more secure wireless networking technology that allows wireless devices to communicate
with one another over a wider area than WiFi. WiMAX towers are able to cover an area
measured in kilometres. It provides secure, broadband access for business and home
users.
Bluetooth vs WiFi
Bluetooth is used to transfer information between two or more devices.
With Bluetooth speed in data transfer not so important/ Speed is important with Wi-Fi.
Wi-Fi primarily to connect devices in a network.
Wi-Fi provides access to the internet.
Accessing the Internet through mobile device
Pages using flash graphics either do not load or are very slow and can cause your device
to freeze or crash.
Pages using large graphics or tables may not display correctly, depending on your screen
and its resolution.
Pages that depend on pop-up windows for data entry may not work correctly
FTP
FTP (File Transfer Protocol) is the protocol (rule for communication) used for the fast, easy
transfer of files between remote computers that have an internet connection. The files
can be uploaded to an FTP server or downloaded from an FTP server.
Cloud storage services such as Google Drive, OneDrive and Dropbox have largely taken
over this function for most users.
Many people never encounter FTP because websites have evolved and bandwidth
increased, making the downloading and uploading of files more efficient without the use
of FTP.
Reasons for using FTP VS sending e-mail
No restriction on the size limit of files/Larger files can be transferred via FTP.
Security can be maintained by using a username and password.
Examples of printed sources
Book
Magazine
Newspaper article
Journal
Give credit where it is due
It is important to be aware of issues involving copyright, intellectual property and
plagiarism when researching. It is not only important to supply a record of your sources
but also to know what you may and may not use as part of your research. Plagiarism is
committed when someone else's words or ideas are used and the source is not
acknowledged.
When acknowledging a web source, the following information should be included:
Author
Date on which the website was posted or updated
Title of website
URL of website
Date on which the website was visited.
Advantages of using DATABASE instead of a SPREADSHEET:
Designed to work with structured records
Excellent reporting facilities
Powerful querying facilities
Better data validation tools
Can design appropriate data capture forms
Can export data to various forms
Formatting of Excel to make it easy to read:
Add a main heading bold, bigger font size.
Main heading can be merged over cells A E.
Column headings must stand out bold.
Wrap text in cells
=COUNTIF(range,criterion) Counts the number of cells in a range that meet a certain
criterion.
The results can then be displayed in a chart.
=COUNTIF(range,criterion) Counts the number of cells in a range that meet a certain
criterion.
To display responses separately in Acces, e.g. male and female you can group the report
Form field controls to make a survey easier:
Dropdown box
List box
Text box
What should be included in an AUP?
The promotion of basic netiquette rules, including not sending Spam, hoaxes and using
accepted ways of communicating in online forums, email and on social networking sites.
Restrictions in terms of what may be accessed online.
Restrictions on the amount of data and information downloaded from the internet.
The importance of sticking to responsible ethical, legal and safe practices respecting
copyright and intellectual property and avoiding plagiarism.
Details on when and where portable storage devices such as flash disks and portable
drives may be used.
Details of restrictions about installing any hardware or software.
Procedures to follow if users find they are victims of identity theft, malware such as
viruses, cyber-bullying or cyber-stalking.
Clear consequences of violating conditions spelt out in the AUP.
How to cope with information overload
Learn to read quickly and accurately and to identify the key points in what you are
reading.
Learn to analyse and compare sources. A single source is never the only correct one.
Get opinions and information from a variety of sources from around the world.
Take a disciplined and structured approach to dealing with information. Create a
routine which limits the time you spend dealing with information.
o When working, remove distractions by disconnecting yourself from the internet
so that you workflow is not disturbed by email, tweets, etc.
o Filter your email by creating categories such as work, friends, family, etc.
o Use RSS feeds and readers to structure the new you read rather than simply
browsing the web randomly.
o Learn to use search tools properly.
o Use features of you browser that can help you save time when using the web
favourites, history, etc.
RSS (Really Simple Syndication) is a technology that automatically provides users with
updated content, such as new blog entries, feeds from websites and news headlines all
from many different sites.
Health tips for using computers
Use ergonomically designed equipment keyboard with a built-in wrist rest.
Sit correctly don't slouch
Adjust the height of your seat and/or table so you can sit with your hands at the
keyboard while keeping your upper arms fairly slack at your sides, and your elbows and
wrists level with each other. Upper legs parallel to the floor and feet flat
Make sure the lighting is adequate
Make sure the lighting is adequate
Make sure the ventilation/ air circulation is adequate
Make sure your mouse and keyboard are close together and within easy reach
Make sure that your monitor is positioned at the correct level and distance from your
eyes
Every once in a while, turn your eyes away from your monitor and focus on something
else in the room, or look out the window.
Take regular breaks don't work for more than an hour at a time without taking at least
a short break.
Stand up and move around. Scientists have shown that sitting all day is very bad for
your health, but that taking as little as a two minute break every hour will counteract
most of this negative impact.
Pharming
Pharming is similar to phishing but the used does not get sent an email. Pharming is a
scamming practice where a user is automatically redirected to another (fake) webwide
even if he/she types in the correct URL for the official website. The criminal is then able to
use any data the user enters usually passwords and PINs. Pharming is very hard to
detect and prevent.
Social engineering
Social engineering refers to the use of deception to manipulate someone into giving out
confidential information or into giving access to their computer or premises. This can be
used to impersonate them, to install malware, or for other fraudulent purposes.
The goal of social engineering is to manipulate people by playing on their basic human
emotions such as fear, greed and optimism, in order to get the necessary access to what
they want.
Countif
Example
We wish to determine how many learners were absent for more than five days specify
the values you want to count. We wish to count the number of cells that comply with a
specific criterion or condition.
=Countif(range,criteria)
Count Counts the number of cells in a range that contain numeric values (numbers only).
Dates and times are also numeric types and are also counted.
=Count(B2:B10)
Text Wrapping
When a line or cell is full of text, the text flows automatically from one line to the next in
the same cell
ERROR MESSAGES IN EXCEL
Error messages in Excel are caused by human error and can be avoided by entering
formulas and functions correctly the first time around.
An error message starts with the hash sign (#).
The error messages are the following:
#value! Reference is made to cells in the formula function where the data type cannot
be used in a calculation. When a cell containing text is multiplied by a number. Ensure
that all cell references and any other values used in the calculation are of a data type
that can be used in calculations.
#div/0! Division by zero or an empty cell is attempted. Change the divisor to another
number, or key in a number if the cell is empty.
#name? An invalid function name is used e.g. average. Check the spelling of the
function name
The double quotation marks delimiting text references are left out. Place text in double
quotation marks if it is required by the function.
The colon in a range reference is left out, e.g. =SUM(B2B10) ensure that the colon is used
in reference to a range, =SUM(B2:B10).
#ref! A cell reference in a formula function is no longer valid. For example, if a column
or row is deleted and the cell reference no longer exists. Use the Undo command if the
message appears. This usually corrects the error.
#num! If an invalid numerical value is used in a formula/function, e.g. the square root
of a negative number.. It also occurs if a number is too large or too small, e.g. 1 000
000^100. Ensure that numerical values are valid, and that the result of a calculation is
not too large or too small.
##### - when the column is not wide enough to display the number. Change the width
of the column to display the number.
Numbers which must be treated as text
When, for example, a postal code such as 0081 is typed into a cell, it appears as 81, i.e.
without the leading zeros. This is because Excel treats it as a number.
In certain cases, as with postal codes and cell phone numbers, one would like Excel to treat
the series of digits as text and not as numbers. (This makes sense, as you are not going to
perform numerical calculations with such data.)
Enter data that consists of digits, but that must be treated as text, as follows:
Type a single quotation mark (') and then the data.
OR
Format the data type of the cell to text before typing in the data.
Problems when surname and initials are in the same field:
Cannot only use surname e.g. in a query.
Difficult to add information accurately.
Cannot do effective data validation.
Difference between a field and a record in a database:
Field: The smallest unit of data, each fact would be stored in a field.
Record: A collection of fields that includes the particulars of a specific entity.
Benefits of connecting via video conferencing rather than normal telephone call
Will be able to see each other/pick up gestures/body language.
Many participants simultaneously.
Holistic communication experience.
The following communications has the same benefits as above:
Webinar
Video call/video chat
Other examples:
Google Hangouts
Adobe Connect
TeamViewer
Zoom
Cisco WebEx
Reason to upgrade RAM to more GB in a video call:
To increase the speed of processing.
To increase temporary storage/more volatile memory.
Explanation of answer:
No lagging.
Continuous buffering.
Work with loads of data/high resolution graphics.
Multimedia files with audio and video.
How to set up a video call for a large group of people
Set up data projector to laptop with screen.
Set up overhead projection facilities.
Set up a big screen TV.
Set up multiple big screen TVs
HDMI (HIGH DEFINITION MULTIMEDIA INTERFACE)
Description what it is
High definition Multimedia Interface is a standard/port for connecting high-definition
video devices such as computer monitors, video projectors and digital television, etc.
HDMI carries high quality video and audio signals so there is no need for separate audio
cables as with VGA.
Simple explanation of how it works
A single HDMI cable will carry both the video and audio signal from a device to your
display. A HDMI cable is most frequently used to connect a laptop to a data projector or a
television.
Advantages
Higher quality: HDMI enables loss-less transmission and better quality video at low
brightness scenes at higher resolutions.
Single cable: Offers a cable solution as there is only a single cable that carries audio,
video and controls information.
Devices needed for video conferencing
Microphone
Speakers
Web-camera/video camera
Specifications that a Laptop use to connect to the Internet:
Wi-Fi / 802.11a/g/n
Ethernet
So that different memory cards (CF, SD or MMC) can be read.
Ergnomic considerations regarding seating:
Seat height should be easily adjustable.
Lower back support.
Wider backrest.
Armrests.
Swivel
Ergnomic considerations regarding lighting:
Insufficient light.
Poor distribution of light.
Improper contrast.
Amount of glare.
Flickering.
Ways in which video conferencing can improve education:
Interaction via multimedia.
Virtual field trips.
Virtual visits from experts.
Opportunity for expert teachers to engage all learners (across wider reach)/Telematics.
Learners can review recordings of video conferences.
Training of teachers from anywhere in the world.
Consulting with other teachers from across the world.
Lowering the cost of education.
Improve distanced/on-line education.
E-Learning.
Any THREE or any other acceptable answer)
Netiquette and on-line communication
Introduce yourself.
Ensure adequate lighting.
Check background.
Limit background noises/mute your microphone when others speak.
Make eye contact (with camera).
D
Avoid interruptions.
Consider your words/comments/replies.
Stick to copyright rules.
Announce when leaving the conference.
Netiquette and email
Ensure that any email message you type is clear and contains no errors
Never type email messages only in capital letters. It implies that you are shouting at the
other person
Ensure that any files that you attach to an email message are free of viruses
Never be insulting in an email message rather use emojis to show you are teasing
Emoticons and emojis should only be used in informal correspondence.
Never pass on chain mail, hoaxes or spam. It wastes bandwidth, overloads your inbox
and irritate people.
If you need to send a large attachment, contact the recipient and agree on a suitable
method
If you forward an email message to many people, rather add their addresses in the Bcc
field. In this way the message will not be seen as spam and you will not be giving out
people's email addresses to others.
Be careful of passing on personal information in an email message it can easily be
forwarded to others.
CPU or processor
The CPU is responsible for running your programs and processing data.
Important:
The speed of a processor is measured in Gigahertz (GHz).
Modern CPUs often have multiple cores (quad-core) which is like having more than one
processor on the chip.
The brand name (usually AMD or Intel) and model (e.g. Intel i7) can also be used to
identify the processor in an advert
Advantages of using an LED backlit LCD non-glare screen:
Clearer image
Brighter display
Sharper image
Specifications that determine quality
The table below lists some of the key specifications to look out for when purchasing a
monitor (display device). These are the factors that determine the quality of such a
device.
Screen size is measured diagonally in inches.
Resolution it is the number of horizontal and vertical pixels that a screen can display, e.g.
1920 x 1440. The higher the resolution, the more you can fit on your screen, but you text
and images become smaller. Resolution also depends on the video card you are using.
Tips on how to practise green computing
Switch off computers and device you are not using
Try to avoid the senseless wasting of paper by proofreading on the screen before you
print or by printing 2 pages on 1
Rather than throw old or broken hardware away, donate or try to repair or upgrade it
Don't just throw away ink and toner cartridges. Rather return them to the manufacturer
when you have finished with them. The manufacturer will be able to re-use them or
dispose of them in an environmentally friendly way
Investigate the possibility of refilling and reusing ink and toner cartridges
Never throw phones, computers, batteries, printers, hard drives, etc. into the trash.
These all contain components that are very bad for the environment and need be
recycled or properly disposed of.
Performing a spell check on soft copies of documents
Scanning documents that need to be shared with others
Training people to use Outlook effectively
The amount of carbon dioxide released into the atmosphere as a result of the activities of a
particular individual, organisation or community.
INPUT AND OUTPUT AND HEALTH ISSUES
The way we sit and the way we use input devices such as the keyboard and mouse can
easily have a negative impact on our health by creating problems such as a sore neck,
backache, headaches and RSI (Repetitive Strain Injury) in arms and wrists.
Output devices can cause problems of their own, such as eye strain and headaches from
looking at a screen for too long or even damaged hearing from using headphones at too
high a volume.
The solutions to these problems include using ergonomically designed equipment and
configuring your work space to be comfortable. More important, however, is the idea that
you manage your work style.
INPUT AND OUTPUT FOR PHYSICALLY CHALLENGED USERS
Many options are available to help disabled people use ICT. What follows is a short list of
the kinds of devices that could be used.
Visually impaired/Blind
Braille keyboard and Braille display device
Magnification devices
Large-key keyboards
Braille printers
Programmes for visually impaire
Screen readers
Text to speech programs/voice recognition
Windows provides a very useful utility, namely Disk Clean-up, to perform a lot of your
housekeeping in one step by removing the following:
Temporary files downloaded from the internet.
Deleted files and folders from the Recycle Bin.
Temporary files created by Windows.
Components of Windows that you are not using.
Installed programs that you no longer or seldom use.
Email Spoofing
Email spoofing is the changing of an email header (the addressing section of the email) so
that the email appears to come from a different source. It is used in spam and phishing
emails to disguise the origin of the email message. For example, a spoofed email may look
like it is from someone in a position of authority, making the email more credible.
How malware can have huge implications in terms of financial costs for a company
The most obvious financial cost of malware is the cost of purchasing software to
prevent infection.
Money has to be spent to renew licences to keep software up to date.
Pay for services of experts to help them protect servers and web sites.
BOTNET
the moment the computer connects to the internet.
manipulated to update the hacker with info it requires and it can happen through a
network of computers.
GENERAL tags in html
<body> - All the text and images you want to display on the web page.
</body>
Everything that you see on the webpage must be in the body
<hr/> No end tag Horizontal rule
<h1> - <h6> </h1> - </h6> Create headings from level 1 biggest to level
6 smallest
The font element - <font></font>
Color, face, size - <font color = "red"></font>
Face e.g. arial
Data type What it is typically used for
Short Text Names, surnames, addresses, company names, etc.
Series of digits for which no mathematical calculations need to be
performed, such as cell phone numbers and postal codes
The maximum number of characters in a Short Text field is 255
Long Text Text entries longer than 255 characters, such as comments or
explanations
Auto number Sequential numbers, beginning at 1, which are automatically
assigned by Access for each new record. Each number is unique
Primary key
It is recommended that every table should have a primary key a field which identifies
each record with a unique value. For example, the ID number of a person or simply the
number assigned by the AutoNumber data type.