KEMBAR78
Study Notes Term 3 | PDF | Operating System | Phishing
0% found this document useful (0 votes)
2 views32 pages

Study Notes Term 3

The document provides comprehensive study notes on system technologies, covering software types, operating systems, hardware components, and various utility software. It also discusses network technologies, internet functionalities, and emerging tech like 3D printing and biometric security. Key concepts include the information processing cycle, device management, and the importance of ergonomics in computing environments.

Uploaded by

Gloria Kap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views32 pages

Study Notes Term 3

The document provides comprehensive study notes on system technologies, covering software types, operating systems, hardware components, and various utility software. It also discusses network technologies, internet functionalities, and emerging tech like 3D printing and biometric security. Key concepts include the information processing cycle, device management, and the importance of ergonomics in computing environments.

Uploaded by

Gloria Kap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 32

STUDY NOTES TERM 3

SYSTEM TECHNOLOGIES

SOFTWARE

Software is a set of instructions or programs that tell a computer what to do and how to do it.

It controls the hardware and allows users to perform tasks such as typing documents, browsing
the internet, or playing music.

Software = the programs and apps that run on a computer or device.

Types of Software:

Main Category Purpose Examples,


System Software Runs and manages the Operating Systems
computer hardware (Windows), Utilities
Application Software Software helping users MS Word, Excel Chrome,
perform specific tasks

Driver Software Software helping the OS Printer driver, Sound card


communicate with hardware driver

1. OPERATING SYSTEM (OS)

Term Definition/Description
Operating System A system software that manages hardware
and software resources and provides a user
interface.
Examples of OS - Microsoft Windows
- Linux (Ubuntu, Fedora)
- macOS
- Android
- iOS

2. INPUT-OUTPUT COMBINATION DEVICES (I/O DEVICES)


Touch screen

Multifunction Printer

External hard drive

Modem

Network Interface Card (NIC)

3. FUNCTIONS OF AN OPERATING SYSTEM (OS)

Function Description
User Interface Provides a way for the user to interact with
the computer (GUI or CLI).
File Management Organizes files and folders, creates, copies,
deletes, or moves them.
Process Management Memory Management Controls running programs and multitasking.
Device Management Security Manages RAM and allocates memory to
programs.
Management Controls input/output devices through
drivers.
Software Provides features like passwords, access
control, and user accounts.
Management Allows installation, execution, and updates of
software.

4. HARDWARE

GUI-graphical user interface

Visual interface that allow users to interact with software through graphical elements

like Windows, icons, buttons, pointers and menus - rather than typing commands.

Network Interface Card (NIC)

Interacts with the mother, especially in relation slots like those for the CPU.

Motherboard

A central circuit board in a computer or device that connects and allows


communications between all its components.

RAM-PRIMARY

Volatile - data lost when power is turned off.

Read/write - CPU can both read from and write from RAM

Used for running applications

Motherboard

COMPONENT DESCRIPTION
CPU socket Holds the processor (CPU) and connects
it to the system
RAM slots Where memory modules (RAM) are
installed
Chipset Manages data flow between CPU,
memory and peripherals
Expansion Slots PC slots for graphics cards, NIC, sound
cards
Storage connectors Power connectors SATA ports for hard drives and SSDs
Connects to the power supply to
distribute electricity

I/O Ports USB, HDMI, Ethernet, audio and other


external connections
BIOS Stores firmware that initializes
hardware during boot-up

5. DEDICATED DEVICE

Dedicated devices are specialized hardware systems designed to perform a specific

function or a limited set of functions. Unlike general-purpose computers that can run

a wide variety of software applications, dedicated devices are optimized for tasks,

examples, scanners, smartphone cameras, industrial robots and ATM.

6. OCR SOFTWARE (OPTICAL CHARACTER RECOGNITION)

Includes software for image editing and Optical Character Recognition (OCR) for text

conversion. Make hard copies digital.


7. UTILITY SOFTWARE

Utility Program Purpose Examples


Antivirus Detects and removes Avast Windows Defender
malicious software.
Disk Cleanup Removes unnecessary files to Windows Disk Cleanup
free up space.
Defragmenter Reorganizes hard drive data Defraggler, Windows
for efficiency. Optimize Drives
Backup Software Makes copies of data for Acronis Windows Backup
recovery.
File Compression Reduces file size for WinRAR, 7-Zip
storage/sharing.
Firewall Blocks unauthorized access ZoneAlarm , Windows
to/from a network. Firewall

8. PROPRIETARY SOFTWARE

Software you buy, however do not own. You pay for the rights to use the

software (EULA)

The source code is never released

Advantages

Professional support and maintenance

Thorough testing and reliability

Enhanced security

9. TASK SCHEDULER

Built-in Windows tool enabling the computer to run automatically a task at a

specific time.

Advantages

Improve productivity
Ensures tasks are executed without human error

Saves time and reduces manual effort

10. DUAL SCREENS

Advantages

* Productivity and workflow efficiency: Multi-tasking Easter comparison and collaboration,


Share data between programs fester,

* Enhancing the user experience: More screen space, Organized workspace/ Flexible
workspaces.

* Collaboration and Presentation: Improved collaboration and web-conferencing, one screen


can be used for presenting while the other screen is used another activity, use multiple
programs simultaneously.

11. VIRTUAL KEYBOARD

A virtual keyboard displayed on screen that users can click using a mouse or alternative device.

Provides keyboard access without physical keyboard.

Users with hand/mobility disabilities.

Portability and convenience.

Wireless keyboard connections

* Bluetooth

* Wireless receiver dongle

* WIFI

12. BIOMETRIC SECURITY

A fingerprint reader is a biometric security measure that allows access by way of scanning a
fingerprint. It is unique and cannot be copied.
13. SSD vs HDD

Definition

Tiny Flash-based storage with no moving parts.

Found in modern laptops and PCs.

Advantages

* Super-fast read/write speeds

* Silent and energy efficient

* More durable

Disadvantages

* More expensive than HDD

* Impossible for data recovery

14. ERGONOMICS

Definition

Refers to the study and design of the workplace for comfort and safety of people in the work
environment. Designing of computer workstations to reduce strain and improve posture.

Advantages

* Increase production

* Less medical costs because of fewer injuries

* Less absenteeism

Preventative measures

 Sit correctly
 Table/seat height is comfortable
 Lighting is acceptable
 Ventilation in room
 Monitor correct height and distance
 Do eye exercise
 Take regular breaks

Examples of technology in practice

 Chairs that support back


 Desk that have variable heights
 Monitors that can adjust
 Mouse support the wrist
 Keyboard allow for arm rest

15. HDMI (HIGH DEFINITION MULTIMEDIA INTERFACE)

Definition

Standard port for connecting high-definition video devices, such as computer

monitors, video projectors and digital television. It carries a high-quality video

and audio signal.

16. USB PORT

Can connect via a USB

Small and portable

Compatible with older devices

17. DRIVER

Definition

It is a program that allows communication between the operating system and

hardware device, enabling the system to use the device's functions properly.

18. READ-ONLY FILES

Definition

When a user can only read a file and not edit or change information.

Solution

Save file with a new name/location

Go to properties and remove the Read-only attribute

19. COMPRESSING OF FILES


Reducing the size to save space or make it easier to share.

EXAMPLES

7-Zip

WinRAR

PeaZip

20. BACKUP

A copy of data, files or software saved on a different storage medium and kept

off-site from the original information. If the original data gets lost/damaged it

can be restored.

21. PRODUCT KEY

Code assigned to software which users need to enter to install and use the

software.

Reasons for using product key

Prevents software piracy or ensures that users pay for the program.

22. ERROR MESSAGE WHEN INSTALLING PROGRAM

Solution

Delete temporary files

Uninstall unused programs

Empty recycle bin

Use disk clean-up

23. AUGEMENT REALITY

Types of technology like VR but does not create a totally virtual environment

like VR. Takes physical world and adds objects, such as graphics within the

real world.

24. VIRTUAL REALITY

Refers to using technology to create a simulation of a 3D-environment that


can be interacted with by a person in seemingly real or physical way.

25. AUDIO ELEMENTS

• Interactive audio

• Voice overs

• Ambient sound

19. GREEN COMPUTING

Less paper - shrink carbon footprint

Encourage recycling and responsible disposal of outdated technology

20. SOFTWARE FOR VISUAL IMPAIRED USERS

Input devices

Braille keyboard

Eye typer

Foot mouse

Software

Text-to-speech

Voice recognition software

Narrator

21. 3D PRINTER

Definition

3D printers can create three-dimensional solid objects from a digital model

of the item by adding successive layers of material on top of one another.

Purpose and function

To be able to produce a 3D reproduction, the 3D printer reads the design from

a 3D printable file and then fuses layers of liquid, powder, paper pulp or s

heet material on top of one another to build the model.

These layers correspond to the computer-generated cross sections of a


Computer-aided Design (CAD) model.

Advantages

• 3D printing is much cheaper than other manufacturing methods.

• 3D printing technology enables home users to have access to machines that can

build 3D models.

• Parts needed for a project can be made 'on-demand'.

• Clients can examine a physical model before manufacturing/building starts (e.g. a mi

niature of a new mall being developed).

Disadvantages

• Surface gets too hot

• Emissions may possibly be toxic (smelly/odour).

Materials for 3D printers

Resin

Wood

Foam

Wax

Plastic

22. PRINTER QUEUE

Options

Pause

Resume

Cancel

Restart

View properties

Open print queue

Types of printers
Inkjet printers

Laser printers

Dot matrix printers

Thermal printers

3D printers

Ink tank printer

Spooling

Process where your computer temporarily stores print jobs in a queue before

sending them to the printer.

23. UTILITY SOFTWARE

Antivirus & security

File management

Disk management

Compression

Snipping Tool
24. INFORMATION PROCESSING CYCLE

1. Input: Gathering data. Eg: Typing a document on a keyboard or

scanning a barcode at a store.

2. Processing: Converting data into useful information. Eg: The computer's

CPU calculating the total of an invoice, or a smartphone app

converting voice input to text.

3. Storage: Saving information for future use. Eg: Saving a file to a hard

drive or storing contact information in a cloud-based service.

4. Output: Delivering information to users. Eg: Displaying a report on a

monitor or printing a receipt from a cash register.

5. Communication: Using output to influence future inputs and processing,

example send and receive information between different

devices (transfer of files, downloading files, multimedia files)

and sharing information between different

networks

25. TYPES OF USB PORTS

USB type A Keyboards, mouse, flash drives

USB Type B Printers, scanners, external hard drives

Mini USB Older cameras, MP3 Players

Micro USB Older Android phones

USB type C Newer smartphones, laptops

Thunderbolt USB C connector - high transfer speed

26. CONVERGENCE

When different technologies are merged into one device.


27. GIGO

The output a system produces depends on the input it receives. If you put garbage in,

chances are high that you will get garbage out. This fact holds even if the program's

logic is accurate. Thus, while logic is important, the correct input is equally -- if not

more -- important to generate the correct and useful output.

INTERNET & NETWORK


TECHNOLOGIES
1. DEVICES TO CONNECT TO A NETWORK

Switch

Allows multiple devices on a network to communicate.

Router

A device that connect a network to other networks wirelessly or through

cables.

2. INTRANET

Definition

A secure, internal network that uses web technologies to distribute

organisational data and information exclusively to employees.

Uses of Intranet

- Internal communications

- Document management

- Information sharing

- Support and maintenance

- Collaboration tools
- Employee services

Disadvantages

- Employees need to be trained

- Requires integration and maintenance

- Complex for employees

- Rarely equipped with offline functionality

3. LAN

Local Area Network is small network of computers covering a small area, such

as an office building or school. Use wired connections. Limited to fixed

locations.

4. WLAN

Wireless local area network. Provide greater mobility and coverage

5. WEB-BASED EMAIL SERVICE

Definition

An email system that you access through a web browser - no need to install

any software.

Examples

- Gmail

- Outlook.com

- Yahoo Mail

Disadvantages

- Need to be connected to Internet to access email.

- Limited personalisation.

- Supported by ads.

- Privacy concerns.

- Spam vulnerability.
- Data loss risk.

Features of threaded discussion in an email

- Make it easier to follow discussion

- Easier to see updates in chronological order

- Maintain continuity

6. FIBRE

- delivers speeds up to 20x faster cable.

- immune to electromagnetic interference.

- support high-definition streaming without buffering.

7. SEARCH ENGINE vs WEB BROWSER

FEATURE SEARCH ENGINE WEBBROWSER


DEFINITION A website that helps users An application used to access
find information online by and display website.
searching its index of web
pages.
EXAMPLES Google Chrome
Bing Firefox
Yahoo Safari
Edge
FUNCTION Retrieves relevant web pages Displays web pages and
based on keywords. allows interaction
INSTALLATION No installation needed - Must be installed on your
accessed via browser. device

8. URL

Identify and locate a resource on the Internet.

Parts of URL

- https - tells browser how to access the resource

- www. identifies the server

- Path - identifies the specific page or resource


9. GRID COMPUTING

Different computers resources in different locations to achieve a common goal

or to solve a specific problem.

Examples

- Space exploration

- Analysis of Big Data

- Earth quake simulations

10. ONLINE BANKING

Allows to view account balances, pay bills and transfer money via EFT

(Electronic Funds Transfer).

Advantages

Can bank at anytime from anywhere if you have Internet connection

Transactions can be done faster and cost less than going to the bank

Safer than carrying around large sums of cash

Disadvantages

Users at risk of scams and fraud

Need Internet connection to bank online

Examples

PayPal

Amazon Pay

OTP-One Time Password

Unique temporary code used to verify a user's identity during login or

transactions.

Examples

Reset password
Online shopping

Logging into streaming apps

11. LAYOUT OF WEB PAGE

Readability

• Readability allows users to efficiently read and process the information in the

text.

• Users should be able to read your content and absorb it easily

Navigation

• Navigation links should be formatted in a consistent and standard way

• Navigation system should be easy to locate and identify (Usually top of

web page)

• Links should not be long -user must be able understand what the link

is leading to

• There should be no 'broken' links (All navigation links must work)

Consistency

• Consistency provides users with a familiar focus point when they are

scanning the text, and it helps to organise the content.

• The website should use the same basic layout throughout

• The same fonts, colours , to theme should be used on all pages.

Layout

• Layout refers to how the various elements (text, graphics, buttons, etc.)

are arranged on a web page.

• Pages should be designed and laid out in a way best suited to their

intended audience or readers.

Typography

• Typography refers to fonts and how they are put together.


• The font you use on your website needs to meet two specific criteria:

• How easy is it to read?

• Can it be rendered in HTML?

12. BETA-VERSION

Software to a limited group of users for testing before final release.

May contain bugs.

Used to collect feedback and usage data

13. URL SHORTENER

URL shortener is a tool or service which converts a long URL to a shorter vers

ion. This shorter version of the URL will take a user to the same web address

but is easier to remember and/or type out.

14. NFC- NEAR FIELD COMMUNICATION

Allows devices such as smartphones to connect wirelessly simply by touching

them together or bringing them into close proximity.

Purpose and function

NFC is a technology built upon radio-frequency identification, or RFID, which

allows a gadget to send radio waves to another gadget or to another RFID-

enabled tag and to trigger a certain action.

NFC makes tap-and-go services possible and is often used in smartphones

and smartwatches.

Advantages

• NFC offers a certain amount of security, as a hacker would need to be close to the

target to access NFC-data exchange.

• NFC can be used to change settings automatically on devices such as smartphones.

• Makes quick contactless data transfer by a single tap on a screen possible, for example,
contactless tap-and-go card transactions.
Disadvantages

NFC has a comparatively low transfer speed - so it is not the best method for transferring large
files such as videos.

15. WEARABLE DEVICES

Wearable devices and technologies are electronic mobile devices worn as accessories or part of
clothing that continuously generate data from various environments and communicate with
other devices/PC/networks.

Purpose and function

Used for tracking information on a real-time basis.

These devices have sensors which track information such as distance travelled, hear

t rate,

oxygen saturation and temperature which can be transmitted to connected smart devices.

The information between the wearables and the smart devices are synchronized.

Advantages

• Wearables are hands free and portable, facilitating mobility and connectivity for

users to access online information.

• Wearables are connected to smart devices to which they transmit information. This

allows us to view this information immediately or at a later time.

• It allows for tracking of information without confinement to a physical location.

• Information is collected and analyzed, and a report is issued almost immediately.

• There are several advantages of wearable devices in the health sector: encourages

proactive healthcare, keeps patients engaged, and monitors vulnerable patients.

Disadvantages

• Some wearables have been known to measure data inaccurately on some occasions

which can have serious implications.

• Privacy concerns regarding wearables - may share information that violates privacy.
• Wearable technology may pose security risks as they are always online and may be hac

ked or allow the wearer to be spied upon.

16. E-LEARNING

E-learning (Electronic learning) is the creation of a learning environment

where individuals use their computers to take part in teaching and learning to

further their education.

Mobile learning or m-Learning is a form

of education and training delivered and

conducted via the internet using mobile

devices, such as tablets and smartphones.

It is designed to be flexible, allowing

learners/workers/students access to

education anywhere, anytime. It is a

subsection of e-learning.

17. CLIENT/SERVER

Definition:

Client devices are endpoints (pc/workstation) in a network that request services,

resources, or data from server devices. They are typically used by end-users (us who

work on them).

Characteristics:

• User-Focused: Designed to interact directly with users.

• Input and Output: Equipped with input devices (keyboards, mice) and output

devices (monitors, printers).

• Software: Run client-side applications that interface with server-side

applications.
• Limited Resources: Generally, have less processing power and storage

compared to servers.

Examples:

1. Personal Computers (PCs):

Desktops and laptops used for everyday tasks such as browsing the internet,

word processing, and gaming.

2. Mobile Devices:

Smartphones and tablets that access web services, email, and cloud

applications.

3. Thin Clients:

Lightweight computers that rely heavily on a server for processing and data

storage commonly used in enterprise environments.

4. Workstations:

High-performance computers used for specialized tasks such as graphic

design, engineering, and scientific computations.

17. TYPES OF SERVERS

SERVER TYPE FUNCTION


Web server Host websites and deliver web pages
Database server Stores and manages structured data for
applications
Email server Send, receives stores email messages
File server Centralises file storage and sharing across a
network
Print server Manages printers and print jobs
Proxy server Acts as middleman between users and the
Internet, filters and caches.

18. AUTHENICATION

Two-factor (two-step) authentication (2FA) is a security process in which

users provide two different authentication factors to verify themselves, usually


something you know (like a password) plus something you have

(like a one-time password - OTP sent to your phone).

An extra layer of security is added to your account to prevent someone

from logging in, even if they have your password.

INFORMATION MANAGEMENT
1. TASK DEFINITION IN PAT

- Current situation

- Focus and purpose

- PAT requirements

- Target audience

2. ELECTRONIC FORMS

Digital version of paper forms. Designed to collect, validate and submit data

online.

Advantages

- Faster data collection and processing

- Reduces human error

- No paper, printing

- Cut down paper waste

3. LEVELS OF QUESTIONS PAT

LEVEL TYPE OF QUESTION QUESTION STARTS WITH


1 Focus on facts Who, when, where, what
how many
2 Focuses on exploring How
3 Focuses on predictions or What if, if
gives alternatives
4 Allows judgement or helps to Would it be better if what
evaluate critique, review or recommendation what would
find meaning be bes

Reasons for different levels of questions

- Gathered enough information

- Guide your research

- Add depth to research

4. PLAGIARISM

When someone passes of someone else's work as their own, without

acknowledging the original source.

How to avoid plagiarism

- Keep track of your sources

- Use quotations for direct text

- Cite all source

5. CONCLUSION IN FORMAL REPORT

- Answer your focus question

- Provide recommendations

- Summarize findings

- Wrap up your findings

SOCIAL IMPLICATIONS
1. POSITIVE IMPACT

- Improve access information

- Education Transformation

- Economic growth and innovation

- Enhance communication

2. SOCIAL ENGINEERING
Phishing

Type of cybercrime where attackers impersonate legitimate organisations to

trick individuals into revealing sensitive information such as passwords, credit

card numbers, personal data.

Types of phishing

- Email phishing - mass emails to be from banks or services

- Spear phishing - targeted attacks using personal info to trick specific

Individuals

- Smishing - Phishing via SMS messages

- Vishing - Voice phishing - fraudulent phone calls

- Clone phishing - A legitimate email is copied and altered with malicious

Links

How to avoid phishing

- Use multi factor authentication

- Verify sender

- Check for grammar errors

- Keep software updated

- Never click on suspicious links

3. RANSOMWARE

Type of Malware that locks or encrypts your data and demands payment to restore access.

How to prevent ransomware


- Back up data regularly

- Avoid suspicious links

- Use multi factor authentication

4. CRYPTO CURRENCIES

Digital assets most often based on blockchain technology.

A virtual currency secured by cryptography.

Risks of cryptocurrency

- Cannot reverse or cancel a transaction

- Not widely accepted

- Price fluctuations

- No protection for buyers

5. VIRTUAL REALITY

Using technology to create a simulation of a 3D environment that can be interacted with by a


person is seemingly real of physical way.

Disadvantages

- Motion sickness

- Eye strain and fatigue

- Addiction risk

6. TELECOMMUTING

Performing job duties outside traditional office setting - often from home - using digital tools to
stay connected with colleagues and complete tasks.
Benefits

- Flexibility can work from home

- Reduces commuting stress and allows more personal time

- Cost saving cut down on travel, office space

- Increased productivity, better focus in quiet personalise environment

Challenges

- Motivation and focus without direct supervision, staying productive can be tough

- Less face-to-face interaction may affect team cohesion and morale

- Reliable Internet and digital tools are essential

- Work and personal life can easily overlap, leading to burnout.

7. CAPTCHA

Completely automated public truing test to tell computers and humans apart.

Security feature used on websites to verify that a user is human and not a bot.

Limitations

- Visual impairments - difficult for low vision or blindness.

- People with dyslexia may struggle

- Language barriers

7. FAKE NEWS

Misleading information presenting as legitimate news. It is designed to manipulate public


opinion.
Prevention

- Use fact-checking tools

- Be mindful of social media

- Check spelling and grammar

8. DOS ATTACK

Denial of Service attacks are attacks where a computer is bombarded with huge amounts of
data to slow down a computer network.

9. BLOCKCHAIN

It is a sequence of blocks or groups of transactions that are linked or 'chained' together and
distributed among users.

SOLUTION DEVELOPMENT
1.WORD PROCESSING

Mail Merge

- Word can use data from a spreadsheet, database or another Word document in a form letter,
stickers, envelopes etc. In order for Word to accomplish this, you need to link the data file to
the document you are going to use as the form/main letter.

- After the mail merge has been completed, remember to SAVE the merged document under a
new name, as to not disturb your form letter.

Used to do a Mail Merge:

- Table/Query in a database

- Spreadsheets/CSV (comma delimited) file

- Contacts file e.g. in Microsoft Outlook

- Table in a word processing document


- Text file

Track changes

Track changes is when many people working on a document and they make suggestions for the
layout, wording or spelling etc. Once changes are made, changes are tracked, and the original
owner can accept or rejecting the changes made.

- Go to the Review Ribbon

- Tracking options can be activated here

- Changes options is where you accept changes (keep changes) or reject changes (delete
changes made).

You can identify these track changes made by seeing the lines along the side of a

document, or bubbles with comments on the side.

2. SPREADSHEET (EXCEL)

Subtotal

The subtotal feature is useful when you want to summarise data quickly. It is used

typically

to determine statistics - number, sum or average, of various groups of data in

a worksheet.

Absolute cell referencing

Designated in a formula by the addition of a dollar sign ($) before the column

and row. Keep a row and/or column constant.


Cell reference

 Word can use data from a spreadsheet, database or another Word

document in a form letter, stickers, envelopes etc. For Word to accomplish

this, you need to link the data file to the document you are going to use as

the form/main letter.

 After the mail merge has been completed, remember to SAVE the merged

document under a new name, as to not disturb your form letter.

Error messages

• #NUM error indicating numeric values that are not valid. Enter a valid numeric

value.

• ####### error indicating that the column is too thin for data to show. Change

the column width.

• #NAME error signifies that something needs to be corrected in the syntax of a

function. Check the syntax of your function.

• #DIV/0! error indicates that no division by 0 can take place. Check your

formula.

• #REF! error indicates that function refers to a cell or range that no longer

exists.

• #VALUE! error indicates that there is something wrong with your function or

referencing inside the function.


Text functions:

 Left - Extracts text from the left of a string.


 Right - Extracts text from the right of a string.
 Mid - Extracts text from an indicated point inside of a string.
 Concatenate - Combines text.
 Len - determines the length of a string.
 Value - converts text to a numeric value.
 Find - returns the position of specific text inside a string.

Conditional formatting

Used to apply certain formatting to data that meets one or more conditions.

Identify trends and patterns.

Improves data readability and visual analysis

Difference between file formats:

 .xlsx is a typical Excel file format that saves data, graphs, pivots etc.
 .txt is a text file containing no formatting.
 .csv is a flat text file that uses delimiters to separate data e.g. a comma.

Types of graphs:

• Pie - to indicate percentages or proportional data.

• Line - to track changes over periods of time.

• Column/Bar - compare information/data between groups.


How to improve the readability of a chart:

• Appropriate chart title.

• Label the axis.

• Use a legend.

• Changing the scale on the axes.

• Add Minimum and maximum values.

• Use graphics.

• Add or remove gridlines.

3. ACCESS - DATABASE

Primary key

Automatically generates a unique value for each new record.

Prevent any duplicate records.

Data validity

Input mask

Validation rule

4. HTML

Images

To insert images, we use code to give it the file name we want, the height and

width of the

image as well as any alternative text which gives a description of the image.

The following tags are used:

<img> tag shows we are now working with the images.

src = to add a file name of which we MUST include the file extension as well.

alt = alternative text (message) or description of the image if image is broken

or do not
display

align = do we want to right align or left align the image

width = how wide we want the image to be

height = the height of the image.

Reasons images does not show in webpage

• Incorrect file name

• Incorrect file extension

• Image not in folder

You might also like