r Flashcards

1
Q

Difference between GUI(Graphical user Interface) and CLI
(Command Line Interface)

A

GUI user doesn’t need to learn any commands while CLI
needs to learn a number of commands to carry out basic
operations GUI is more user-friendly ; icons are used to represent
applications while in CLI all commands needs to be typed in correct format and spelling
In CLI you have to remember the exact path and name of application while GUI menus are offered to help choose an action
In CLI it is more important that users understand how a computer works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Difference between application software and system
software

A

Application software is a program that allows the user to do
specific task . For example : word processor , spreadsheet ,
database , control measuring software , apps (applications
) software , Photo editing software , video editing software
and graphic manipulate software.
System software is a program that allows the hardware to
run properly and allow the user to communicate with the
computer. For Example : compiler , interpreter , linkers ,
device driver and operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is meant by virtual reality and general equipment
used

A

Create an artificial environment that users can interact with ,
help in architects , train pilot , train surgeons and play games .
general equipment used : eye goggles , gloves , headphones ,
sensor and powerful computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe how data is read from the RFID chip

A

The washing machine sends out (interrogation waves) radio
signal to read the data from the RFID . They act as a passive
transponder .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compare and contrast between pen drive than a CD-R

A

Similarities
Pen drive and CD-R are storage devices
Pen drive and CD-R are portable
Difference
Not every computer has a CD drive , but most PCs have a USB
port
Pen drive is more robust
Pen drive stores more data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advantages of SSD compared to HDD

A

They have no moving parts therefore more reliable . Moreover ,
they are very thin as there are no moving parts
They are considerably lighter
They have lower power consumption
They run much cooler than HDDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Difference between internet and intranet

A

internet is public but intranet is within one organization (private)
Internet is global but intranet can be policed / managed
Internet has more information than intranet
Data on the intranet is more reliable and relevant to the
organization than which on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wide area network (Wan) :

A

Wan are used where computers or
networks are situated a long distance from each other
geographically .For example , in a different city or country . If a
number of LANs are joined together using a router , they can
form a WAN . The most common examples of WAN are the
internet and the network of ATMs used by banks .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless Local Area Network (WLAN) :

A

WLANs are similar to
LANs but there are no wires and cables . In other words, they
provide wireless communication over fairly short distances
using radio or infrared signals instead of cables . The main
wireless technologies that are used to form a WLAN are
Bluetooth and WIFI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Local Area Network (LAN) :

A

LAN will consist of a number of computers and devices (for
example, printers) that are connected together to hubs or
switches by cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

– What is meant by Encryption

A

Encryption is the process of converting information into a form
that is meaningless to anyone except holders of a ‘secret key’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

– Explain how the data from a router is routed

A

Routers send packets of data between computers on different
networks . Each data packet contains the IP address of the
computer/ network that the data is being sent to then the router
will use the IP address to work out the best route in which to routers on other networks which will read the IP address and
re-route the data until it ends up at the exact device it was
intended for .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

– Advantages and Disadvantages of booking online , online
shopping or internet banking

A

No need to travel / reducing costs and time-wasting.
Users have access to a worldwide market and can look for
products that are cheaper.
Disabled and elderly people can access any shop without to
leave home.
Shopping and banking can be done at any time 24/7
Shopping from the supermarket probably took up a lot of time
than online.
No face-to-face discussion with staff.
Internet banking saves time.
The shops and banks save money , not having as many staff
working for them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Disadvantages of booking online , online
shopping or internet banking

A

There is the possibility of isolation and lack of socialization
because people stay at home.
Health risks associated with online shopping or banking (lack
of exercise).
Security issues.
It is necessary to have a computer and to pay for the internet
Unlike high street shopping, it is only possible to see a picture
of the goods, which might not portray the exact color of a dress.
High street shops and banks are closing because of the
increase
in online shopping or banking and this is leading to ‘ghost
towns’ forming
It is easier to make errors with online banking and transfer
money incorrectly to different accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

role microprocessor

A

A microprocessor is really just a tiny CPU built into a single chip
. Microprocessor controlled devices affect our lives in lots of
different ways including in our homes , our leisure time , how
we interact socially . They even have an affect on our needs to
actually leave our houses . labor-saving devices example ,
Automatic washing machines , microwaves ovens , cookers ,
automatic dishwashers , robotic vacuum cleaners , breadmaking machines and smart fridge and freezers .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does the microprocessor work ?

A

For example in automatic cooker :
An automatic cooker has temperature sensors and a number of
controls to set the cooking time. The microprocessor checks
the set time against the current time and when they are equal,
the cooker heating elements are switched on. Once the cooker
starts the cooking process, the microprocessor then constancy
checks the end time against current time, when they are equal,
the cooking process is stopped.The microprocessor checks the
temperature data sent from a sensor and turns the heating
element on if the value less than the pre-set value chosen by
the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Components of Expert system

A

Knowledge base
Inference engine
Rules base
User interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

nput and processing involved in booking online

A

The customer clicks on the performance they wish to see.
A date and time is typed in
The required number of seats is also entered.
The seating display in the theatre is shown on the screen.
The user selects their seat(s) by highlighting the actual seats
on the screen, display and then clicks CONFIRM to go to the
next part of the process.
The database searched to check the availability of the selected
seats
If the seats are available, the total price is shown + the seat
numbers
If the customer is happy with this, they select CONFIRM on the
screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

– sensors monitoring process

A

There are many ways in which sensors monitor process like in
weather station , measuring a patients vital signs in hospital or
measuring pollution in river .
Let’s say how sensors monitor the measuring of patient vital
sign in a hospital :
Sensors read key vital signs (such aspulse rate, heart rate,
temperature, blood pressure, respiration, etc.) .The data from
the sensors is converted into digital using an ADC.
The data is stored in the computer’s memory.
The computer compares the data from the sensors with the
values stored in its memory
The results are output on a screen in the form of graphs and/or
numerical readouts
An alarm is activated if any of the data is outside acceptable
input Values
The system continues to measure the patient’s vital signs until
the computer is turned off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OCR

A

because there method reads handwriting it is possible for customers to extend their answers to questions
poor handwriting may cause readings errors
ocr requirs a complex recoginition system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

meaning of verification

A

Verification is a way of preventing errors when data is copied
from one medium to another, there are two ways for verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

User documentation

A

How to load/install/run the software
How to save files / search/sort data
How to do print outs
How to add, delete or amend records
The purpose of the system/ program/ software package
Limitations of the system
Screen layouts / Print layouts
Hardware requirements
Software requirements
Sample runs (with results and actual test data used
Error handling/meaning of errors
Troubleshooting guide/help lines/FAQs
How to log in/log out
Tutorials
Error messages/meaning of error messages
Glossary of terms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Technical documentation :

A

Program listing/coding
Programming language used
Program flowcharts/algorithms
Systems flowcharts
Purpose of the system/program/software
Limitations of the system
Input formats
Hardware requirements
Software requirements
Minimum memory requirements
known ‘bugs’ in the system
List of variables used (and their meaning/description)
File structures
Sample runs (with results and actual test data used)
Output formats
Validation rules
Meaning of error messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Explain what other testing should have been carried before implementation

A

The whole system should have been tested
The operator should have checked the meter reading against
the previous one
The bill should have been checked before it was sent
Linkages between modules should have been tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Methods of researching the current system

A

Observing of the users
Interviewing the manager
Questionnaire given out to users
Examination of existing documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

List principals of a typical data protection act

A

Data must be fairly and lawfully processed
Data can be only processed for the stated purpose
Data must be adequate, relevant and not excessive.
Data must be accurate.
Data must not be kept longer than necessary.
Data must be processed in accordance with the data subject’s
rights.
Data must be kept secure.
Data must not be transferred to another country unless they
also have adequate protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Methods to minimize the likehood of receiving spam emails

A

Use a spam filter/anti-spam software
Do not reply to spam/suspicious messages
Do not click on any links/attachments in a spam/suspicious
message
Use a disposable email address
Use a complex email user name
Do not give out your email address online/do not register using
email on untrusted websites/opt out of marketing
Read messages as text
Do not use your email address as an online username
Changing to an email provider who filter spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How to keep it secure the personal data

A

Don’t give out any personal information to people who are
unknown to you.
Don’t send people photos of yourself - either online or via a mobile phone unless the person known to you.
Always maintain your privacy settings
When accessing the internet make sure the websites being visited can be trusted
Only use recommended websites by teachers
Only open emails from known sources.
Only send email people you know
Using social networking sites, instant messaging or chat room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are cookies and why are they important to
companies

A

A small text file sent to a user’s web browser when they visit a
web site. It is important to Store information about the visit and
are used the next time the user visits the site
Remember the user’s details
Remember the user’s preferences
Remember items a user bought
Remember passwords
Remember what they searched for
Target products
Offers a tailored experience for users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

2 – What is meant by software copyright?

A

Software / Music CDs, videos and articles from magazines and books is protected by copyright laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

3 – Actions that would break copyright

A

Make a software copy and then sell it
Use software on a network or in multiple computers without a
license
Rent out a software package without permission
use the name of copyrighted software without agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

4 – Ways to protect software from piracy

A

Before installation of software the user will be asked to enter Product key
The user will be asked OK/I Agree to the license agreement before installation
The original software always come with the sticker informing
the purchaser it is illegal to make copy ( hologram form)
Some software required to be original CD/DVD available in the drive
Some software run only if dongle is plugged into USB port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How you would evaluate the reliability of information found
on the internet

A

Anyone can setup website, so information not necessarily
reliable or accurate.
Some commercial web site will be based to advertise their products, If the advertising only related to their own products It could be unreliable
If the web site URL ending with .gov or .org … mostly is reliable If you compare the information on the web site with the information in the book, this will help to show if the information reliable or no .
It is good idea to see if responsible bodies (endorsed support and permit ) the website
Check if the website linked to reliable or unreliable web sites
Check if the website have a testimonials recommendation
this can indicate reliability If the last update was long time ago , this mean the information is not reliable
If the author of the website is good credential, then the
information is more likely reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Advantages and Disadvantages of policing the internet

A

Arguments in favor of some form of internet control:
It would prevent illegal material being posted on websites
People find it much easier to discover information (Ex. make a
bomb)
By some control would prevent children and other vulnerable
groups from being subjected to undesirable websites.
By some control would stop incorrect information being
published on websites.

Arguments against some form of internet control:
Material published on websites is already available from other sources.
It would be very expensive to police all websites
It would be difficult to enforce rules and regulations on a global scale.
It can be argued that policing would go against freedom of information
Many topics and comments posted on websites are already
illegal and laws already exist
Who is to decide what is illegal or offensive, many things are only offensive to certain people but others NO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Advantages and Disadvantages of students using the
internet to carry out researches

A

Advantages :
Information on the internet is up-to-date
The internet limitless of information
Searching using a search engine is fast and easy.
Information on the internet is usually free of charge.
Pages on the internet can have multimedia elements , which
can make learning is interesting
Disadvantages :
Anything can be posted on a web page and information may be
incorrect.
There is always the risk of accessing inappropriate websites
It is too easy to be distracted when searching on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

backing storage

A

devices provide permanence and are used to store data for later use and backup data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

NFC READER

A

contactless transmission of info
the sender and receiver to be closer together than in RFID which makes it more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

backup

A

is an extra copy of important files stored away from the original copy in case of damage or loss of original copy

this may happen due;
hacker deleting the data
virus damaging data
corruption of hard disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

transfer data from a computer to another

A

-magnetic
-optical
-solid state
-cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

magnetic tapes

A

prop
large storage capacity
slow access speed
high transfer speed
drive not commonly available

used to store:
backup of file servers for computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

fixed hard discs

A

very fast access to data
not portable high capacity
used to store
operating systems
software
working data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

portable hard discs

A

prop:
large capacity
portable
more expensive then other forms of removable media
used to store
very large files which need transporting from one computer to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

optical backing storage

A

prop:
portable
can be broken/scratched

used to store data:
CDs: large files
DVDS very large files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

CD ROM

A

uses by software companies for distributing software programs
by music companies for distributing music albums
by book publishers
prop prevent deleting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

DVD ROM

A

uses film distributors
prop prevent deleting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

CD R

A

uses:
recording of music downloads from internet
prop
single burning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

DVD R

A

uses:
recording of films downloads from internet
prop
single burning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

CD RW

A

uses: very useful for keeping files that need to be edited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Blu-ray

A

for storing HD/3D movies
capacity 25GB,5BGB,1OOGB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

solid state backing storage

A

prop
smallest form of memory
portable
more robust than other forms of storage
more expensive than other forms
can be easily written

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

memory sticks

A

prop
can store up to many Gb
uses: to transport files and backup data from computer to computer

49
Q

flash memory card

A

uses
in digital camera, mobile phone
types
SD card
xD card for cameras, limited capacity
cast card

49
Q

operating system

A

is the most important program that runs the device
manage security, manage error messages, provides user interface

50
Q

solid state drives

A

same as hard disk but portable

51
Q

complier

A

traslate a program written by a programmer into machine code

52
Q

linker

A

link more than one object file and combine them in one single program

53
Q

network interface card

A

placed inside the device
to be enable to connect with network device
contains MAC address

54
Q

bridge

A

device with only two ports
used to connect two networks together
so they can function as a single network

55
Q

Hub

A

device with multiple ports
a hub is a “dumb” device when data is received at one port it sent to all computers

56
Q

switch

A

like hub but sends to it destination

57
Q

WLAN

A

wireless access point

58
Q

accessing website

A

is created using HTML, stored in a server

59
Q

HTML

A

Hyper text markup language
language used to create webpages

60
Q

server

A

centralized storage
accessed by multiple users

61
Q

URL

A

uniform resource locator
a reference to access a resource on the internet

62
Q

WWW

A

world wide
massive collection of webpages created using HTML
accessed using the internet
is a service on the internet

63
Q

HTTP

A

Hyper Text Transfer Protocol
▪ set of rules for transferring the webpage from the webserver to the viewer’s browser

64
Q

HTTPs

A

Hyper Text Transfer Protocol Secure version
▪ same as HTTP, but where everything transferred between webserver and user’s
computer is encrypted using the SSL (Secure Socket Layer)
▪ SSL is a security protocol (set of rules) developed for sending information securely
over the Internet
▪ The webpage is secured by SSL when the URL starts with “https” and a padlock is
displayed in the browser

65
Q

wikis

A

editable multi-author
website Users
participate in the
creation of the content
by :
posting information
about many topics
reviewing and editing
each other’s posts
posts not in
chronological order

65
Q

FTP

A

File Transfer Protocol
▪ set of rules for transferring files between a file server and a user’s computer (client)

65
Q

Blog

A

an online diary or journal
(ideas, opinions,
information)
single author
others can comment on
posts and on each other’s
comments
posts ordered from most
recent to oldest (reverse
chronological order)
blog owner can set their
blog for private or public
access

66
Q

web conferencing

A

participants online at the same time
presenter controls what the
participants can see/hear
participants view the presentation
and listen to the presenter
presenter has a control panel to
decide when participants can interact
a chat box is provided for participants
to type in their questions

67
Q

audio conferencing

A

participants can only hear each other as
it uses mobile phones /telephone
networks

the organizer of the conference is given
2 PINs by the phone company (one for
the organizer and one for the
participants)
at the time of the conference the
organizer dials the conference phone
number and enters his PIN to start the
conference
then the participants dial the same
number and enter their PINs to join the

68
Q

VIOP

A

(Voice Over Internet
Protocol)
A service that enables people to
use the Internet as the
transmission medium for
telephone calls by converting
sound into digital packets

69
Q

virus

A

▪ A program that can replicate itself
▪ and attaches itself to other programs
▪ Can delete or corrupt data stored on the computer
* Can slow down computer performance / fill up memory

70
Q

how to avoid virus

A

1.Use anti-virus software (must be updated)
* checks every file the user opens or downloads
* scan any removable media before use
* scan e-mail attachments
* stores virus codes and downloads new, updated definition files for new viruses
* when an antivirus program scans a file it compares the file with the list of known viruses,
if it matches, the antivirus will try to clean the file if possible, if not the user is given
choice to delete or quarantine the file
2.don’t download programs from untrusted sites
3.don’t open attachments from e-mails from unknown senders

71
Q

how to avoid spyware

A

Use anti-spyware (must be updated)
*Use on-screen keyboard / dropdown when entering confidential information

72
Q

spyware

A

program installed by hackers on user’s computer
* to record keystrokes typed on the keyboard
* stores them in a file
* transfers it back to the hacker without user’s knowledge

72
Q

firewall

A

Firewall: Software to prevent unauthorized access through the network, prevent unwanted programs,
block unwanted sites
By controlling incoming and outgoing traffic
▪ Acts as a barrier between the computer and external network
▪ by keeping a list of allowed IPs and a list of blocked IPs
▪ in case of unknown access user is asked for permission
firewall can affect the operation of the computer and stop some uploads / some legitimate software can
be blocked by the firewall
may need to be shut down at times to upload files therefore making computer unsafe
if firewall installed on router it will not secure computer from other computers in the same network

73
Q

hacking

A

Unauthorized access to a computer system
▪ to misuse data (steal, change, delete)
▪ for identity theft

74
Q

Authentication:

A

Making sure that the person using the computer is who he claims to be (ensuring
the identity of the person using the computer).

75
Q

zero login

A

Systems recognize users based on biometrics & behavior patterns
devices keep record when and where logins occur
devices can detect changes in user behavior; login from new device / strange location and checks with the owner that he/she is attempting to access the account

76
Q

How to detect spam/phishing:

A

E-mail contains spelling mistakes
➢ General not personal (the bank knows
your name)

➢ No digital certificate attached to the e-
mail

➢ E-mail claiming the user won a
competition they didn’t enter
➢ Requesting personal confidential
information
➢ Contains suspicious links or attachments
➢ Urging for quick action

77
Q

spam

A

*Electronic junk mail sent randomly, unwanted advertising,
*fills up mail inbox preventing important messages from being received
*may contain viruses, spyware or phishing attacks

78
Q

how to avoid spam

A

*Anti-spam / spam filter
*Don’t open any links in the e-mail
*Block / report the sender e-mail address
*Don’t use your e-mail to register on untrusted websites
*Don’t subscribe in newsletters
*Be cautious when clicking on links or downloading attachments within emails

79
Q

phishing

A

▪Sending fake e-mails identical to the bank’s e-mails (looks legal)
▪requesting personal confidential information in reply to the email
▪containing a link to direct the user to a fake website to enter personal confidential information

80
Q

How to avoid phishing:

A

How to avoid phishing:
1.Don’t reply to any e-mail requesting personal information
2.Be cautious when clicking on links in an email or downloading attachments
3.Report the e-mail address that sent the e-mail
4.Be cautious of messages requesting urgent reply
5.Contact the bank to ensure the mail is fake

81
Q

smishing

A

it contains a URL or a telephone number inside the text message
The recipient will be asked to log on to the website or make a phone call, and asked to supply personal details such as card number / password
The sender of the SMS might not be a phone number

82
Q

processor

A

receives reading from sensor, compares it with preset value and gives a signal to control device to switch on/off

82
Q

vishing

A

phishing via voice message

82
Q

ADC

A

(converts
analog signals
from sensor to
digital signal for
processor)

83
Q

Advantages of sensors rather than humans

A

More accurate readings
More frequent readings
Can work 24 hours without breaks or shifts
Faster response than humans
Can work in conditions dangerous or unsuitable for humans
Can take more than one reading at the same time
Sensors will not forget to take readings

84
Q

Cheques

A
  1. cheque is verified by making sure it is Not fake, Signed
  2. collect printed info
    o Account number of payer
    o Bank & branch code of payer
    o Cheque serial number
  3. collect hanwritten info
    o Amount and Due date
    o Name of recipient
    o Signature of payer
  4. When due date of the cheque has arrived:
    o bank makes sure that the amount of money is available in the payer’s account
    o Decrease balance of payer’s account and Increase balance of recipient’s account
    o Send bank statements to both customers
85
Q

Advantages of using robots in manufacturing:

A

Increase in production (robots don’t need breaks like humans)
Consistency in production (exact same product every time)
Monthly salaries for human workers are saved
Dangerous tasks are carried out without the need of life insurance for humans
Fewer mistakes / greater accuracy

86
Q

Disadvantages of using robots in manufacturing:

A

High initial cost of robots
Training workers who will be still present after robots are introduced
High running cost of maintenance of robots
Robots cannot react in unexpected situations

87
Q

Global Positioning Systems (GPS)

A

System used to detect the position of the user
Signals (radio waves) sent from device to
satellite
Signals (radio waves) sent from satellite to
device
Device calculates the distance from satellite
At least 3 satellites are used

88
Q

Geographic Information System (GIS)

A

Adds layers of data to maps
Allows the user to analyze data according to
location (in order to take decisions)
Users can edit map data
Works with GPS

Uses:
weather forecasting
sales analysis
crime patterns
traffic information
population forecasting

89
Q

Automatic number plate recognition system (ANPR)

A

It is used to read the number plates on cars
* A sensor detects a vehicle
* It sends a signal to the processor to instruct the camera to capture an image for the car
* A program is used to isolate the number plate from the image
* The brightness and contrast is adjusted to separate each character in the plate
* Each character is recognized using OCR then it is stored in the database
* The car park barrier is raised and the driver receives a ticket showing the date and time

90
Q

Expert systems adv

A

Advantages:
Help the expert give more accurate results
More consistent results; not affected by emotional reasoning
Faster to produce results
Uses data from many experts so contains more knowledge than single
expert
Cheaper than employing multiple experts
Updating expert system is cheaper and more frequent than regularly
training experts

91
Q

disadv of exp.system

A

Disadvantages:
Lack common sense in the decision making process
Initial cost of creating the system
If the knowledge base or rules base contain errors it will mislead the
expert to an incorrect result
Must be regularly updated
Experts must be trained to use it

92
Q

smart homes

A

Can control devices remotely
Switch on/off devices before getting home or after
leaving
Smart fridge can send reminders to buy products when
running out
Security systems connected to the internet enable
monitoring the home while outside
Smart television enables streaming of content to watch
at any time & playing online games
Needs stable internet connection
High initial cost & maintenance of devices
Must have a smart phone with internet connection
Risk of viruses installed on devices may cause
malfunction
Risk of hacking devices like burglar alarms/security
cameras

93
Q

eye strains

A

Staring at computer screens for a long time

  • Use anti-glare screen
  • Use flat screens
  • Improve surrounding lighting
  • Reduce screen brightness
  • Maintain appropriate distance between screen and eyes
  • Take regular breaks
94
Q

neck pain

A

Looking up or down at the screen * Sitting on an adjustable chair so screen is at eye level

  • Take regular breaks
95
Q

Repetitive Strain
Injuries (RSI)

A

Long use of mouse
(pain in wrist)

  • Use wrist rest
  • Use ergonomic mouse
  • Take regular breaks

Long use of keyboard
(pain in wrist)

  • Use ergonomic keyboard
  • Use hand exercises
  • Use voice commands
  • Take regular breaks

Repetitive clicking on mouse
(pain in fingers)

  • Use hand exercises
  • Use voice commands
  • Take regular breaks

Long typing on mobile phone or PDA or use of
joystick
(pain in thumb)

  • Use hand exercises
  • Use voice commands
  • Take regular breaks
96
Q

backpain

A

Sitting in a wrong position in front of the

computer for a long time

  • Sit in an upright position
  • Use ergonomic chair
  • Take regular breaks
97
Q

ozone

A

Sitting too close to a laser printer for a long time

  • Proper room ventilation
  • Laser printer placed in printer room
  • Change type of printer
98
Q

Data protection Act

A

Data protection Act is a law to protect
personal data handled by organizations
(example: school, hospital, club) from

misuse:

Do not keep data longer than required
Do not collect data that is not required
Do not pass on the data to anyone without
the owner’s permission
Only certain employees can view the data
and handle it
Keep the data safe and secure (encryption,
firewall, password)
Only use the data for the reasons given to
the owner
Keep the data up to date

99
Q

netiquette

A

Don’t be abusive
Don’t send spam or repeatedly send the
same information to the same person
Respect peoples’ privacy, don’t share
personal information about anyone without
permission
Don’t use capital letters; it’s considered
shouting
Don’t plagiarize, always acknowledge source
of any information used
Check spelling and grammar, gives a good
impression
Don’t send inappropriate content, disturbing
for others and not respectful
When sending emails confirm the recipient
to make sure the email is not delivered to
someone else

100
Q

Interviewing

A

Collecting detailed
information
Questions can be changed
based on responses
Can see body language; less
risk of misunderstanding
Time consuming
Not anonymous (unreliable
responses)
Expensive due to analyst time
Analyst & employee must be
available at same time

101
Q

Distributing questionnaires to
employees

A

Collecting wide variety of
responses
Responses can be anonymous
(reliable responses)
Cheaper than interviews
Not time consuming; can be
filled any time
Careless / vague answers
Misunderstanding of
questions
Questions not flexible

102
Q

Observing

A

No waste of employee time
Reliable information; the
analyst will observe the
system in person instead of
taking opinions
Most people are distracted or
uncomfortable or don’t work
as usual while being watched
Not all problems may appear
during the observation

103
Q

Flat file database

A

1 table
All records are stored in
one table.
Easier to understand/use
Easier to sort and filter
data
Easier to setup (less ICT
experience needed)

104
Q

Relational
database

A

2 or more tables with
relations between them;
created by taking the
primary key from one
table & adding it to
another table as a
foreign key
Data is only stored once
so:
Less storage space
Easier to edit/add/delete
records
Complex queries can be
carried out using several
tables
Separate passwords can
be assigned for separate
tables (better security)
Easier to expand

105
Q

Formula and Function

A

Formula:
Can be simple

calculations/mathematical operations
Can be easily typed by user
Can contain a function
Function:
Built into the software
Have a pre-defined name

106
Q

Absolute cell reference

A

replicated the cell reference will not

107
Q

Relative cell reference (A2)

A

when
replicated the cell reference will change

108
Q

Content layer

A

(htm)
images, tables, text,
hyperlinks

109
Q

Presentation layer

A

(css) colours, fonts,
borders

110
Q

anchor

A

A position on
the webpage that a
hyperlink will point to

111
Q

Behaviour layer

A

(created using coding
/ scripting language)
interaction of website

112
Q

bookmark

A

saved
shortcut to direct the
user to a certain
website (favorites)

113
Q

class

A

defined in a
stylesheet using a dot
(e.g. .right)
used in adding or
changing properties
without having to
create new style

114
Q

inline styles

A

within each web page
edited by changing
each web page
can be anywhere in
the web page
Higher priority

115
Q

widow

A

When the last line of a
paragraph is separated on the next page

116
Q

Orphan

A

When the first line of paragraph is separated on the previous page

117
Q

Corporate house styles

A

Benefits:
Consistency
Brand recognition

Reduces time spent in formatting documents
Reduce errors of typing/forgotten elements