STUDY NOTES TERM 3
SYSTEM TECHNOLOGIES
SOFTWARE
Software is a set of instructions or programs that tell a computer what to do and how to do it.
It controls the hardware and allows users to perform tasks such as typing documents, browsing
the internet, or playing music.
Software = the programs and apps that run on a computer or device.
Types of Software:
Main Category Purpose Examples,
System Software Runs and manages the Operating Systems
computer hardware (Windows), Utilities
Application Software Software helping users MS Word, Excel Chrome,
perform specific tasks
Driver Software Software helping the OS Printer driver, Sound card
communicate with hardware driver
1. OPERATING SYSTEM (OS)
Term Definition/Description
Operating System A system software that manages hardware
and software resources and provides a user
interface.
Examples of OS - Microsoft Windows
- Linux (Ubuntu, Fedora)
- macOS
- Android
- iOS
2. INPUT-OUTPUT COMBINATION DEVICES (I/O DEVICES)
Touch screen
Multifunction Printer
External hard drive
Modem
Network Interface Card (NIC)
3. FUNCTIONS OF AN OPERATING SYSTEM (OS)
Function Description
User Interface Provides a way for the user to interact with
the computer (GUI or CLI).
File Management Organizes files and folders, creates, copies,
deletes, or moves them.
Process Management Memory Management Controls running programs and multitasking.
Device Management Security Manages RAM and allocates memory to
programs.
Management Controls input/output devices through
drivers.
Software Provides features like passwords, access
control, and user accounts.
Management Allows installation, execution, and updates of
software.
4. HARDWARE
GUI-graphical user interface
Visual interface that allow users to interact with software through graphical elements
like Windows, icons, buttons, pointers and menus - rather than typing commands.
Network Interface Card (NIC)
Interacts with the mother, especially in relation slots like those for the CPU.
Motherboard
A central circuit board in a computer or device that connects and allows
communications between all its components.
RAM-PRIMARY
Volatile - data lost when power is turned off.
Read/write - CPU can both read from and write from RAM
Used for running applications
Motherboard
COMPONENT DESCRIPTION
CPU socket Holds the processor (CPU) and connects
it to the system
RAM slots Where memory modules (RAM) are
installed
Chipset Manages data flow between CPU,
memory and peripherals
Expansion Slots PC slots for graphics cards, NIC, sound
cards
Storage connectors Power connectors SATA ports for hard drives and SSDs
Connects to the power supply to
distribute electricity
I/O Ports USB, HDMI, Ethernet, audio and other
external connections
BIOS Stores firmware that initializes
hardware during boot-up
5. DEDICATED DEVICE
Dedicated devices are specialized hardware systems designed to perform a specific
function or a limited set of functions. Unlike general-purpose computers that can run
a wide variety of software applications, dedicated devices are optimized for tasks,
examples, scanners, smartphone cameras, industrial robots and ATM.
6. OCR SOFTWARE (OPTICAL CHARACTER RECOGNITION)
Includes software for image editing and Optical Character Recognition (OCR) for text
conversion. Make hard copies digital.
7. UTILITY SOFTWARE
Utility Program Purpose Examples
Antivirus Detects and removes Avast Windows Defender
malicious software.
Disk Cleanup Removes unnecessary files to Windows Disk Cleanup
free up space.
Defragmenter Reorganizes hard drive data Defraggler, Windows
for efficiency. Optimize Drives
Backup Software Makes copies of data for Acronis Windows Backup
recovery.
File Compression Reduces file size for WinRAR, 7-Zip
storage/sharing.
Firewall Blocks unauthorized access ZoneAlarm , Windows
to/from a network. Firewall
8. PROPRIETARY SOFTWARE
Software you buy, however do not own. You pay for the rights to use the
software (EULA)
The source code is never released
Advantages
Professional support and maintenance
Thorough testing and reliability
Enhanced security
9. TASK SCHEDULER
Built-in Windows tool enabling the computer to run automatically a task at a
specific time.
Advantages
Improve productivity
Ensures tasks are executed without human error
Saves time and reduces manual effort
10. DUAL SCREENS
Advantages
* Productivity and workflow efficiency: Multi-tasking Easter comparison and collaboration,
Share data between programs fester,
* Enhancing the user experience: More screen space, Organized workspace/ Flexible
workspaces.
* Collaboration and Presentation: Improved collaboration and web-conferencing, one screen
can be used for presenting while the other screen is used another activity, use multiple
programs simultaneously.
11. VIRTUAL KEYBOARD
A virtual keyboard displayed on screen that users can click using a mouse or alternative device.
Provides keyboard access without physical keyboard.
Users with hand/mobility disabilities.
Portability and convenience.
Wireless keyboard connections
* Bluetooth
* Wireless receiver dongle
* WIFI
12. BIOMETRIC SECURITY
A fingerprint reader is a biometric security measure that allows access by way of scanning a
fingerprint. It is unique and cannot be copied.
13. SSD vs HDD
Definition
Tiny Flash-based storage with no moving parts.
Found in modern laptops and PCs.
Advantages
* Super-fast read/write speeds
* Silent and energy efficient
* More durable
Disadvantages
* More expensive than HDD
* Impossible for data recovery
14. ERGONOMICS
Definition
Refers to the study and design of the workplace for comfort and safety of people in the work
environment. Designing of computer workstations to reduce strain and improve posture.
Advantages
* Increase production
* Less medical costs because of fewer injuries
* Less absenteeism
Preventative measures
Sit correctly
Table/seat height is comfortable
Lighting is acceptable
Ventilation in room
Monitor correct height and distance
Do eye exercise
Take regular breaks
Examples of technology in practice
Chairs that support back
Desk that have variable heights
Monitors that can adjust
Mouse support the wrist
Keyboard allow for arm rest
15. HDMI (HIGH DEFINITION MULTIMEDIA INTERFACE)
Definition
Standard port for connecting high-definition video devices, such as computer
monitors, video projectors and digital television. It carries a high-quality video
and audio signal.
16. USB PORT
Can connect via a USB
Small and portable
Compatible with older devices
17. DRIVER
Definition
It is a program that allows communication between the operating system and
hardware device, enabling the system to use the device's functions properly.
18. READ-ONLY FILES
Definition
When a user can only read a file and not edit or change information.
Solution
Save file with a new name/location
Go to properties and remove the Read-only attribute
19. COMPRESSING OF FILES
Reducing the size to save space or make it easier to share.
EXAMPLES
7-Zip
WinRAR
PeaZip
20. BACKUP
A copy of data, files or software saved on a different storage medium and kept
off-site from the original information. If the original data gets lost/damaged it
can be restored.
21. PRODUCT KEY
Code assigned to software which users need to enter to install and use the
software.
Reasons for using product key
Prevents software piracy or ensures that users pay for the program.
22. ERROR MESSAGE WHEN INSTALLING PROGRAM
Solution
Delete temporary files
Uninstall unused programs
Empty recycle bin
Use disk clean-up
23. AUGEMENT REALITY
Types of technology like VR but does not create a totally virtual environment
like VR. Takes physical world and adds objects, such as graphics within the
real world.
24. VIRTUAL REALITY
Refers to using technology to create a simulation of a 3D-environment that
can be interacted with by a person in seemingly real or physical way.
25. AUDIO ELEMENTS
• Interactive audio
• Voice overs
• Ambient sound
19. GREEN COMPUTING
Less paper - shrink carbon footprint
Encourage recycling and responsible disposal of outdated technology
20. SOFTWARE FOR VISUAL IMPAIRED USERS
Input devices
Braille keyboard
Eye typer
Foot mouse
Software
Text-to-speech
Voice recognition software
Narrator
21. 3D PRINTER
Definition
3D printers can create three-dimensional solid objects from a digital model
of the item by adding successive layers of material on top of one another.
Purpose and function
To be able to produce a 3D reproduction, the 3D printer reads the design from
a 3D printable file and then fuses layers of liquid, powder, paper pulp or s
heet material on top of one another to build the model.
These layers correspond to the computer-generated cross sections of a
Computer-aided Design (CAD) model.
Advantages
• 3D printing is much cheaper than other manufacturing methods.
• 3D printing technology enables home users to have access to machines that can
build 3D models.
• Parts needed for a project can be made 'on-demand'.
• Clients can examine a physical model before manufacturing/building starts (e.g. a mi
niature of a new mall being developed).
Disadvantages
• Surface gets too hot
• Emissions may possibly be toxic (smelly/odour).
Materials for 3D printers
Resin
Wood
Foam
Wax
Plastic
22. PRINTER QUEUE
Options
Pause
Resume
Cancel
Restart
View properties
Open print queue
Types of printers
Inkjet printers
Laser printers
Dot matrix printers
Thermal printers
3D printers
Ink tank printer
Spooling
Process where your computer temporarily stores print jobs in a queue before
sending them to the printer.
23. UTILITY SOFTWARE
Antivirus & security
File management
Disk management
Compression
Snipping Tool
24. INFORMATION PROCESSING CYCLE
1. Input: Gathering data. Eg: Typing a document on a keyboard or
scanning a barcode at a store.
2. Processing: Converting data into useful information. Eg: The computer's
CPU calculating the total of an invoice, or a smartphone app
converting voice input to text.
3. Storage: Saving information for future use. Eg: Saving a file to a hard
drive or storing contact information in a cloud-based service.
4. Output: Delivering information to users. Eg: Displaying a report on a
monitor or printing a receipt from a cash register.
5. Communication: Using output to influence future inputs and processing,
example send and receive information between different
devices (transfer of files, downloading files, multimedia files)
and sharing information between different
networks
25. TYPES OF USB PORTS
USB type A Keyboards, mouse, flash drives
USB Type B Printers, scanners, external hard drives
Mini USB Older cameras, MP3 Players
Micro USB Older Android phones
USB type C Newer smartphones, laptops
Thunderbolt USB C connector - high transfer speed
26. CONVERGENCE
When different technologies are merged into one device.
27. GIGO
The output a system produces depends on the input it receives. If you put garbage in,
chances are high that you will get garbage out. This fact holds even if the program's
logic is accurate. Thus, while logic is important, the correct input is equally -- if not
more -- important to generate the correct and useful output.
INTERNET & NETWORK
TECHNOLOGIES
1. DEVICES TO CONNECT TO A NETWORK
Switch
Allows multiple devices on a network to communicate.
Router
A device that connect a network to other networks wirelessly or through
cables.
2. INTRANET
Definition
A secure, internal network that uses web technologies to distribute
organisational data and information exclusively to employees.
Uses of Intranet
- Internal communications
- Document management
- Information sharing
- Support and maintenance
- Collaboration tools
- Employee services
Disadvantages
- Employees need to be trained
- Requires integration and maintenance
- Complex for employees
- Rarely equipped with offline functionality
3. LAN
Local Area Network is small network of computers covering a small area, such
as an office building or school. Use wired connections. Limited to fixed
locations.
4. WLAN
Wireless local area network. Provide greater mobility and coverage
5. WEB-BASED EMAIL SERVICE
Definition
An email system that you access through a web browser - no need to install
any software.
Examples
- Gmail
- Outlook.com
- Yahoo Mail
Disadvantages
- Need to be connected to Internet to access email.
- Limited personalisation.
- Supported by ads.
- Privacy concerns.
- Spam vulnerability.
- Data loss risk.
Features of threaded discussion in an email
- Make it easier to follow discussion
- Easier to see updates in chronological order
- Maintain continuity
6. FIBRE
- delivers speeds up to 20x faster cable.
- immune to electromagnetic interference.
- support high-definition streaming without buffering.
7. SEARCH ENGINE vs WEB BROWSER
FEATURE SEARCH ENGINE WEBBROWSER
DEFINITION A website that helps users An application used to access
find information online by and display website.
searching its index of web
pages.
EXAMPLES Google Chrome
Bing Firefox
Yahoo Safari
Edge
FUNCTION Retrieves relevant web pages Displays web pages and
based on keywords. allows interaction
INSTALLATION No installation needed - Must be installed on your
accessed via browser. device
8. URL
Identify and locate a resource on the Internet.
Parts of URL
- https - tells browser how to access the resource
- www. identifies the server
- Path - identifies the specific page or resource
9. GRID COMPUTING
Different computers resources in different locations to achieve a common goal
or to solve a specific problem.
Examples
- Space exploration
- Analysis of Big Data
- Earth quake simulations
10. ONLINE BANKING
Allows to view account balances, pay bills and transfer money via EFT
(Electronic Funds Transfer).
Advantages
Can bank at anytime from anywhere if you have Internet connection
Transactions can be done faster and cost less than going to the bank
Safer than carrying around large sums of cash
Disadvantages
Users at risk of scams and fraud
Need Internet connection to bank online
Examples
PayPal
Amazon Pay
OTP-One Time Password
Unique temporary code used to verify a user's identity during login or
transactions.
Examples
Reset password
Online shopping
Logging into streaming apps
11. LAYOUT OF WEB PAGE
Readability
• Readability allows users to efficiently read and process the information in the
text.
• Users should be able to read your content and absorb it easily
Navigation
• Navigation links should be formatted in a consistent and standard way
• Navigation system should be easy to locate and identify (Usually top of
web page)
• Links should not be long -user must be able understand what the link
is leading to
• There should be no 'broken' links (All navigation links must work)
Consistency
• Consistency provides users with a familiar focus point when they are
scanning the text, and it helps to organise the content.
• The website should use the same basic layout throughout
• The same fonts, colours , to theme should be used on all pages.
Layout
• Layout refers to how the various elements (text, graphics, buttons, etc.)
are arranged on a web page.
• Pages should be designed and laid out in a way best suited to their
intended audience or readers.
Typography
• Typography refers to fonts and how they are put together.
• The font you use on your website needs to meet two specific criteria:
• How easy is it to read?
• Can it be rendered in HTML?
12. BETA-VERSION
Software to a limited group of users for testing before final release.
May contain bugs.
Used to collect feedback and usage data
13. URL SHORTENER
URL shortener is a tool or service which converts a long URL to a shorter vers
ion. This shorter version of the URL will take a user to the same web address
but is easier to remember and/or type out.
14. NFC- NEAR FIELD COMMUNICATION
Allows devices such as smartphones to connect wirelessly simply by touching
them together or bringing them into close proximity.
Purpose and function
NFC is a technology built upon radio-frequency identification, or RFID, which
allows a gadget to send radio waves to another gadget or to another RFID-
enabled tag and to trigger a certain action.
NFC makes tap-and-go services possible and is often used in smartphones
and smartwatches.
Advantages
• NFC offers a certain amount of security, as a hacker would need to be close to the
target to access NFC-data exchange.
• NFC can be used to change settings automatically on devices such as smartphones.
• Makes quick contactless data transfer by a single tap on a screen possible, for example,
contactless tap-and-go card transactions.
Disadvantages
NFC has a comparatively low transfer speed - so it is not the best method for transferring large
files such as videos.
15. WEARABLE DEVICES
Wearable devices and technologies are electronic mobile devices worn as accessories or part of
clothing that continuously generate data from various environments and communicate with
other devices/PC/networks.
Purpose and function
Used for tracking information on a real-time basis.
These devices have sensors which track information such as distance travelled, hear
t rate,
oxygen saturation and temperature which can be transmitted to connected smart devices.
The information between the wearables and the smart devices are synchronized.
Advantages
• Wearables are hands free and portable, facilitating mobility and connectivity for
users to access online information.
• Wearables are connected to smart devices to which they transmit information. This
allows us to view this information immediately or at a later time.
• It allows for tracking of information without confinement to a physical location.
• Information is collected and analyzed, and a report is issued almost immediately.
• There are several advantages of wearable devices in the health sector: encourages
proactive healthcare, keeps patients engaged, and monitors vulnerable patients.
Disadvantages
• Some wearables have been known to measure data inaccurately on some occasions
which can have serious implications.
• Privacy concerns regarding wearables - may share information that violates privacy.
• Wearable technology may pose security risks as they are always online and may be hac
ked or allow the wearer to be spied upon.
16. E-LEARNING
E-learning (Electronic learning) is the creation of a learning environment
where individuals use their computers to take part in teaching and learning to
further their education.
Mobile learning or m-Learning is a form
of education and training delivered and
conducted via the internet using mobile
devices, such as tablets and smartphones.
It is designed to be flexible, allowing
learners/workers/students access to
education anywhere, anytime. It is a
subsection of e-learning.
17. CLIENT/SERVER
Definition:
Client devices are endpoints (pc/workstation) in a network that request services,
resources, or data from server devices. They are typically used by end-users (us who
work on them).
Characteristics:
• User-Focused: Designed to interact directly with users.
• Input and Output: Equipped with input devices (keyboards, mice) and output
devices (monitors, printers).
• Software: Run client-side applications that interface with server-side
applications.
• Limited Resources: Generally, have less processing power and storage
compared to servers.
Examples:
1. Personal Computers (PCs):
Desktops and laptops used for everyday tasks such as browsing the internet,
word processing, and gaming.
2. Mobile Devices:
Smartphones and tablets that access web services, email, and cloud
applications.
3. Thin Clients:
Lightweight computers that rely heavily on a server for processing and data
storage commonly used in enterprise environments.
4. Workstations:
High-performance computers used for specialized tasks such as graphic
design, engineering, and scientific computations.
17. TYPES OF SERVERS
SERVER TYPE FUNCTION
Web server Host websites and deliver web pages
Database server Stores and manages structured data for
applications
Email server Send, receives stores email messages
File server Centralises file storage and sharing across a
network
Print server Manages printers and print jobs
Proxy server Acts as middleman between users and the
Internet, filters and caches.
18. AUTHENICATION
Two-factor (two-step) authentication (2FA) is a security process in which
users provide two different authentication factors to verify themselves, usually
something you know (like a password) plus something you have
(like a one-time password - OTP sent to your phone).
An extra layer of security is added to your account to prevent someone
from logging in, even if they have your password.
INFORMATION MANAGEMENT
1. TASK DEFINITION IN PAT
- Current situation
- Focus and purpose
- PAT requirements
- Target audience
2. ELECTRONIC FORMS
Digital version of paper forms. Designed to collect, validate and submit data
online.
Advantages
- Faster data collection and processing
- Reduces human error
- No paper, printing
- Cut down paper waste
3. LEVELS OF QUESTIONS PAT
LEVEL TYPE OF QUESTION QUESTION STARTS WITH
1 Focus on facts Who, when, where, what
how many
2 Focuses on exploring How
3 Focuses on predictions or What if, if
gives alternatives
4 Allows judgement or helps to Would it be better if what
evaluate critique, review or recommendation what would
find meaning be bes
Reasons for different levels of questions
- Gathered enough information
- Guide your research
- Add depth to research
4. PLAGIARISM
When someone passes of someone else's work as their own, without
acknowledging the original source.
How to avoid plagiarism
- Keep track of your sources
- Use quotations for direct text
- Cite all source
5. CONCLUSION IN FORMAL REPORT
- Answer your focus question
- Provide recommendations
- Summarize findings
- Wrap up your findings
SOCIAL IMPLICATIONS
1. POSITIVE IMPACT
- Improve access information
- Education Transformation
- Economic growth and innovation
- Enhance communication
2. SOCIAL ENGINEERING
Phishing
Type of cybercrime where attackers impersonate legitimate organisations to
trick individuals into revealing sensitive information such as passwords, credit
card numbers, personal data.
Types of phishing
- Email phishing - mass emails to be from banks or services
- Spear phishing - targeted attacks using personal info to trick specific
Individuals
- Smishing - Phishing via SMS messages
- Vishing - Voice phishing - fraudulent phone calls
- Clone phishing - A legitimate email is copied and altered with malicious
Links
How to avoid phishing
- Use multi factor authentication
- Verify sender
- Check for grammar errors
- Keep software updated
- Never click on suspicious links
3. RANSOMWARE
Type of Malware that locks or encrypts your data and demands payment to restore access.
How to prevent ransomware
- Back up data regularly
- Avoid suspicious links
- Use multi factor authentication
4. CRYPTO CURRENCIES
Digital assets most often based on blockchain technology.
A virtual currency secured by cryptography.
Risks of cryptocurrency
- Cannot reverse or cancel a transaction
- Not widely accepted
- Price fluctuations
- No protection for buyers
5. VIRTUAL REALITY
Using technology to create a simulation of a 3D environment that can be interacted with by a
person is seemingly real of physical way.
Disadvantages
- Motion sickness
- Eye strain and fatigue
- Addiction risk
6. TELECOMMUTING
Performing job duties outside traditional office setting - often from home - using digital tools to
stay connected with colleagues and complete tasks.
Benefits
- Flexibility can work from home
- Reduces commuting stress and allows more personal time
- Cost saving cut down on travel, office space
- Increased productivity, better focus in quiet personalise environment
Challenges
- Motivation and focus without direct supervision, staying productive can be tough
- Less face-to-face interaction may affect team cohesion and morale
- Reliable Internet and digital tools are essential
- Work and personal life can easily overlap, leading to burnout.
7. CAPTCHA
Completely automated public truing test to tell computers and humans apart.
Security feature used on websites to verify that a user is human and not a bot.
Limitations
- Visual impairments - difficult for low vision or blindness.
- People with dyslexia may struggle
- Language barriers
7. FAKE NEWS
Misleading information presenting as legitimate news. It is designed to manipulate public
opinion.
Prevention
- Use fact-checking tools
- Be mindful of social media
- Check spelling and grammar
8. DOS ATTACK
Denial of Service attacks are attacks where a computer is bombarded with huge amounts of
data to slow down a computer network.
9. BLOCKCHAIN
It is a sequence of blocks or groups of transactions that are linked or 'chained' together and
distributed among users.
SOLUTION DEVELOPMENT
1.WORD PROCESSING
Mail Merge
- Word can use data from a spreadsheet, database or another Word document in a form letter,
stickers, envelopes etc. In order for Word to accomplish this, you need to link the data file to
the document you are going to use as the form/main letter.
- After the mail merge has been completed, remember to SAVE the merged document under a
new name, as to not disturb your form letter.
Used to do a Mail Merge:
- Table/Query in a database
- Spreadsheets/CSV (comma delimited) file
- Contacts file e.g. in Microsoft Outlook
- Table in a word processing document
- Text file
Track changes
Track changes is when many people working on a document and they make suggestions for the
layout, wording or spelling etc. Once changes are made, changes are tracked, and the original
owner can accept or rejecting the changes made.
- Go to the Review Ribbon
- Tracking options can be activated here
- Changes options is where you accept changes (keep changes) or reject changes (delete
changes made).
You can identify these track changes made by seeing the lines along the side of a
document, or bubbles with comments on the side.
2. SPREADSHEET (EXCEL)
Subtotal
The subtotal feature is useful when you want to summarise data quickly. It is used
typically
to determine statistics - number, sum or average, of various groups of data in
a worksheet.
Absolute cell referencing
Designated in a formula by the addition of a dollar sign ($) before the column
and row. Keep a row and/or column constant.
Cell reference
Word can use data from a spreadsheet, database or another Word
document in a form letter, stickers, envelopes etc. For Word to accomplish
this, you need to link the data file to the document you are going to use as
the form/main letter.
After the mail merge has been completed, remember to SAVE the merged
document under a new name, as to not disturb your form letter.
Error messages
• #NUM error indicating numeric values that are not valid. Enter a valid numeric
value.
• ####### error indicating that the column is too thin for data to show. Change
the column width.
• #NAME error signifies that something needs to be corrected in the syntax of a
function. Check the syntax of your function.
• #DIV/0! error indicates that no division by 0 can take place. Check your
formula.
• #REF! error indicates that function refers to a cell or range that no longer
exists.
• #VALUE! error indicates that there is something wrong with your function or
referencing inside the function.
Text functions:
Left - Extracts text from the left of a string.
Right - Extracts text from the right of a string.
Mid - Extracts text from an indicated point inside of a string.
Concatenate - Combines text.
Len - determines the length of a string.
Value - converts text to a numeric value.
Find - returns the position of specific text inside a string.
Conditional formatting
Used to apply certain formatting to data that meets one or more conditions.
Identify trends and patterns.
Improves data readability and visual analysis
Difference between file formats:
.xlsx is a typical Excel file format that saves data, graphs, pivots etc.
.txt is a text file containing no formatting.
.csv is a flat text file that uses delimiters to separate data e.g. a comma.
Types of graphs:
• Pie - to indicate percentages or proportional data.
• Line - to track changes over periods of time.
• Column/Bar - compare information/data between groups.
How to improve the readability of a chart:
• Appropriate chart title.
• Label the axis.
• Use a legend.
• Changing the scale on the axes.
• Add Minimum and maximum values.
• Use graphics.
• Add or remove gridlines.
3. ACCESS - DATABASE
Primary key
Automatically generates a unique value for each new record.
Prevent any duplicate records.
Data validity
Input mask
Validation rule
4. HTML
Images
To insert images, we use code to give it the file name we want, the height and
width of the
image as well as any alternative text which gives a description of the image.
The following tags are used:
<img> tag shows we are now working with the images.
src = to add a file name of which we MUST include the file extension as well.
alt = alternative text (message) or description of the image if image is broken
or do not
display
align = do we want to right align or left align the image
width = how wide we want the image to be
height = the height of the image.
Reasons images does not show in webpage
• Incorrect file name
• Incorrect file extension
• Image not in folder