r Flashcards

(126 cards)

1
Q

Difference between GUI(Graphical user Interface) and CLI
(Command Line Interface)

A

GUI user doesn’t need to learn any commands while CLI
needs to learn a number of commands to carry out basic
operations GUI is more user-friendly ; icons are used to represent
applications while in CLI all commands needs to be typed in correct format and spelling
In CLI you have to remember the exact path and name of application while GUI menus are offered to help choose an action
In CLI it is more important that users understand how a computer works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Difference between application software and system
software

A

Application software is a program that allows the user to do
specific task . For example : word processor , spreadsheet ,
database , control measuring software , apps (applications
) software , Photo editing software , video editing software
and graphic manipulate software.
System software is a program that allows the hardware to
run properly and allow the user to communicate with the
computer. For Example : compiler , interpreter , linkers ,
device driver and operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is meant by virtual reality and general equipment
used

A

Create an artificial environment that users can interact with ,
help in architects , train pilot , train surgeons and play games .
general equipment used : eye goggles , gloves , headphones ,
sensor and powerful computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe how data is read from the RFID chip

A

The washing machine sends out (interrogation waves) radio
signal to read the data from the RFID . They act as a passive
transponder .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compare and contrast between pen drive than a CD-R

A

Similarities
Pen drive and CD-R are storage devices
Pen drive and CD-R are portable
Difference
Not every computer has a CD drive , but most PCs have a USB
port
Pen drive is more robust
Pen drive stores more data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advantages of SSD compared to HDD

A

They have no moving parts therefore more reliable . Moreover ,
they are very thin as there are no moving parts
They are considerably lighter
They have lower power consumption
They run much cooler than HDDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Difference between internet and intranet

A

internet is public but intranet is within one organization (private)
Internet is global but intranet can be policed / managed
Internet has more information than intranet
Data on the intranet is more reliable and relevant to the
organization than which on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wide area network (Wan) :

A

Wan are used where computers or
networks are situated a long distance from each other
geographically .For example , in a different city or country . If a
number of LANs are joined together using a router , they can
form a WAN . The most common examples of WAN are the
internet and the network of ATMs used by banks .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless Local Area Network (WLAN) :

A

WLANs are similar to
LANs but there are no wires and cables . In other words, they
provide wireless communication over fairly short distances
using radio or infrared signals instead of cables . The main
wireless technologies that are used to form a WLAN are
Bluetooth and WIFI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Local Area Network (LAN) :

A

LAN will consist of a number of computers and devices (for
example, printers) that are connected together to hubs or
switches by cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

– What is meant by Encryption

A

Encryption is the process of converting information into a form
that is meaningless to anyone except holders of a ‘secret key’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

– Explain how the data from a router is routed

A

Routers send packets of data between computers on different
networks . Each data packet contains the IP address of the
computer/ network that the data is being sent to then the router
will use the IP address to work out the best route in which to routers on other networks which will read the IP address and
re-route the data until it ends up at the exact device it was
intended for .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

– Advantages and Disadvantages of booking online , online
shopping or internet banking

A

No need to travel / reducing costs and time-wasting.
Users have access to a worldwide market and can look for
products that are cheaper.
Disabled and elderly people can access any shop without to
leave home.
Shopping and banking can be done at any time 24/7
Shopping from the supermarket probably took up a lot of time
than online.
No face-to-face discussion with staff.
Internet banking saves time.
The shops and banks save money , not having as many staff
working for them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Disadvantages of booking online , online
shopping or internet banking

A

There is the possibility of isolation and lack of socialization
because people stay at home.
Health risks associated with online shopping or banking (lack
of exercise).
Security issues.
It is necessary to have a computer and to pay for the internet
Unlike high street shopping, it is only possible to see a picture
of the goods, which might not portray the exact color of a dress.
High street shops and banks are closing because of the
increase
in online shopping or banking and this is leading to ‘ghost
towns’ forming
It is easier to make errors with online banking and transfer
money incorrectly to different accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

role microprocessor

A

A microprocessor is really just a tiny CPU built into a single chip
. Microprocessor controlled devices affect our lives in lots of
different ways including in our homes , our leisure time , how
we interact socially . They even have an affect on our needs to
actually leave our houses . labor-saving devices example ,
Automatic washing machines , microwaves ovens , cookers ,
automatic dishwashers , robotic vacuum cleaners , breadmaking machines and smart fridge and freezers .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does the microprocessor work ?

A

For example in automatic cooker :
An automatic cooker has temperature sensors and a number of
controls to set the cooking time. The microprocessor checks
the set time against the current time and when they are equal,
the cooker heating elements are switched on. Once the cooker
starts the cooking process, the microprocessor then constancy
checks the end time against current time, when they are equal,
the cooking process is stopped.The microprocessor checks the
temperature data sent from a sensor and turns the heating
element on if the value less than the pre-set value chosen by
the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Components of Expert system

A

Knowledge base
Inference engine
Rules base
User interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

nput and processing involved in booking online

A

The customer clicks on the performance they wish to see.
A date and time is typed in
The required number of seats is also entered.
The seating display in the theatre is shown on the screen.
The user selects their seat(s) by highlighting the actual seats
on the screen, display and then clicks CONFIRM to go to the
next part of the process.
The database searched to check the availability of the selected
seats
If the seats are available, the total price is shown + the seat
numbers
If the customer is happy with this, they select CONFIRM on the
screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

– sensors monitoring process

A

There are many ways in which sensors monitor process like in
weather station , measuring a patients vital signs in hospital or
measuring pollution in river .
Let’s say how sensors monitor the measuring of patient vital
sign in a hospital :
Sensors read key vital signs (such aspulse rate, heart rate,
temperature, blood pressure, respiration, etc.) .The data from
the sensors is converted into digital using an ADC.
The data is stored in the computer’s memory.
The computer compares the data from the sensors with the
values stored in its memory
The results are output on a screen in the form of graphs and/or
numerical readouts
An alarm is activated if any of the data is outside acceptable
input Values
The system continues to measure the patient’s vital signs until
the computer is turned off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OCR

A

because there method reads handwriting it is possible for customers to extend their answers to questions
poor handwriting may cause readings errors
ocr requirs a complex recoginition system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

meaning of verification

A

Verification is a way of preventing errors when data is copied
from one medium to another, there are two ways for verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

User documentation

A

How to load/install/run the software
How to save files / search/sort data
How to do print outs
How to add, delete or amend records
The purpose of the system/ program/ software package
Limitations of the system
Screen layouts / Print layouts
Hardware requirements
Software requirements
Sample runs (with results and actual test data used
Error handling/meaning of errors
Troubleshooting guide/help lines/FAQs
How to log in/log out
Tutorials
Error messages/meaning of error messages
Glossary of terms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Technical documentation :

A

Program listing/coding
Programming language used
Program flowcharts/algorithms
Systems flowcharts
Purpose of the system/program/software
Limitations of the system
Input formats
Hardware requirements
Software requirements
Minimum memory requirements
known ‘bugs’ in the system
List of variables used (and their meaning/description)
File structures
Sample runs (with results and actual test data used)
Output formats
Validation rules
Meaning of error messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Explain what other testing should have been carried before implementation

A

The whole system should have been tested
The operator should have checked the meter reading against
the previous one
The bill should have been checked before it was sent
Linkages between modules should have been tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Methods of researching the current system
Observing of the users Interviewing the manager Questionnaire given out to users Examination of existing documents
25
List principals of a typical data protection act
Data must be fairly and lawfully processed Data can be only processed for the stated purpose Data must be adequate, relevant and not excessive. Data must be accurate. Data must not be kept longer than necessary. Data must be processed in accordance with the data subject's rights. Data must be kept secure. Data must not be transferred to another country unless they also have adequate protection
26
Methods to minimize the likehood of receiving spam emails
Use a spam filter/anti-spam software Do not reply to spam/suspicious messages Do not click on any links/attachments in a spam/suspicious message Use a disposable email address Use a complex email user name Do not give out your email address online/do not register using email on untrusted websites/opt out of marketing Read messages as text Do not use your email address as an online username Changing to an email provider who filter spam
27
How to keep it secure the personal data
Don’t give out any personal information to people who are unknown to you. Don’t send people photos of yourself - either online or via a mobile phone unless the person known to you. Always maintain your privacy settings When accessing the internet make sure the websites being visited can be trusted Only use recommended websites by teachers Only open emails from known sources. Only send email people you know Using social networking sites, instant messaging or chat room
28
What are cookies and why are they important to companies
A small text file sent to a user’s web browser when they visit a web site. It is important to Store information about the visit and are used the next time the user visits the site Remember the user’s details Remember the user’s preferences Remember items a user bought Remember passwords Remember what they searched for Target products Offers a tailored experience for users
29
2 – What is meant by software copyright?
Software / Music CDs, videos and articles from magazines and books is protected by copyright laws
30
3 – Actions that would break copyright
Make a software copy and then sell it Use software on a network or in multiple computers without a license Rent out a software package without permission use the name of copyrighted software without agreement
31
4 – Ways to protect software from piracy
Before installation of software the user will be asked to enter Product key The user will be asked OK/I Agree to the license agreement before installation The original software always come with the sticker informing the purchaser it is illegal to make copy ( hologram form) Some software required to be original CD/DVD available in the drive Some software run only if dongle is plugged into USB port
32
How you would evaluate the reliability of information found on the internet
Anyone can setup website, so information not necessarily reliable or accurate. Some commercial web site will be based to advertise their products, If the advertising only related to their own products It could be unreliable If the web site URL ending with .gov or .org … mostly is reliable If you compare the information on the web site with the information in the book, this will help to show if the information reliable or no . It is good idea to see if responsible bodies (endorsed support and permit ) the website Check if the website linked to reliable or unreliable web sites Check if the website have a testimonials recommendation this can indicate reliability If the last update was long time ago , this mean the information is not reliable If the author of the website is good credential, then the information is more likely reliable
33
Advantages and Disadvantages of policing the internet
Arguments in favor of some form of internet control: It would prevent illegal material being posted on websites People find it much easier to discover information (Ex. make a bomb) By some control would prevent children and other vulnerable groups from being subjected to undesirable websites. By some control would stop incorrect information being published on websites. Arguments against some form of internet control: Material published on websites is already available from other sources. It would be very expensive to police all websites It would be difficult to enforce rules and regulations on a global scale. It can be argued that policing would go against freedom of information Many topics and comments posted on websites are already illegal and laws already exist Who is to decide what is illegal or offensive, many things are only offensive to certain people but others NO
34
Advantages and Disadvantages of students using the internet to carry out researches
Advantages : Information on the internet is up-to-date The internet limitless of information Searching using a search engine is fast and easy. Information on the internet is usually free of charge. Pages on the internet can have multimedia elements , which can make learning is interesting Disadvantages : Anything can be posted on a web page and information may be incorrect. There is always the risk of accessing inappropriate websites It is too easy to be distracted when searching on the internet
35
backing storage
devices provide permanence and are used to store data for later use and backup data
36
NFC READER
contactless transmission of info the sender and receiver to be closer together than in RFID which makes it more secure
37
backup
is an extra copy of important files stored away from the original copy in case of damage or loss of original copy this may happen due; hacker deleting the data virus damaging data corruption of hard disk
38
transfer data from a computer to another
-magnetic -optical -solid state -cloud storage
39
magnetic tapes
prop large storage capacity slow access speed high transfer speed drive not commonly available used to store: backup of file servers for computer networks
39
fixed hard discs
very fast access to data not portable high capacity used to store operating systems software working data
39
portable hard discs
prop: large capacity portable more expensive then other forms of removable media used to store very large files which need transporting from one computer to another
40
optical backing storage
prop: portable can be broken/scratched used to store data: CDs: large files DVDS very large files
41
CD ROM
uses by software companies for distributing software programs by music companies for distributing music albums by book publishers prop prevent deleting
42
DVD ROM
uses film distributors prop prevent deleting
43
CD R
uses: recording of music downloads from internet prop single burning
44
DVD R
uses: recording of films downloads from internet prop single burning
45
CD RW
uses: very useful for keeping files that need to be edited
46
Blu-ray
for storing HD/3D movies capacity 25GB,5BGB,1OOGB
47
solid state backing storage
prop smallest form of memory portable more robust than other forms of storage more expensive than other forms can be easily written
48
memory sticks
prop can store up to many Gb uses: to transport files and backup data from computer to computer
49
flash memory card
uses in digital camera, mobile phone types SD card xD card for cameras, limited capacity cast card
49
operating system
is the most important program that runs the device manage security, manage error messages, provides user interface
50
solid state drives
same as hard disk but portable
51
complier
traslate a program written by a programmer into machine code
52
linker
link more than one object file and combine them in one single program
53
network interface card
placed inside the device to be enable to connect with network device contains MAC address
54
bridge
device with only two ports used to connect two networks together so they can function as a single network
55
Hub
device with multiple ports a hub is a "dumb" device when data is received at one port it sent to all computers
56
switch
like hub but sends to it destination
57
WLAN
wireless access point
58
accessing website
is created using HTML, stored in a server
59
HTML
Hyper text markup language language used to create webpages
60
server
centralized storage accessed by multiple users
61
URL
uniform resource locator a reference to access a resource on the internet
62
WWW
world wide massive collection of webpages created using HTML accessed using the internet is a service on the internet
63
HTTP
Hyper Text Transfer Protocol ▪ set of rules for transferring the webpage from the webserver to the viewer’s browser
64
HTTPs
Hyper Text Transfer Protocol Secure version ▪ same as HTTP, but where everything transferred between webserver and user’s computer is encrypted using the SSL (Secure Socket Layer) ▪ SSL is a security protocol (set of rules) developed for sending information securely over the Internet ▪ The webpage is secured by SSL when the URL starts with "https" and a padlock is displayed in the browser
65
wikis
editable multi-author website Users participate in the creation of the content by : posting information about many topics reviewing and editing each other’s posts posts not in chronological order
65
FTP
File Transfer Protocol ▪ set of rules for transferring files between a file server and a user’s computer (client)
65
Blog
an online diary or journal (ideas, opinions, information) single author others can comment on posts and on each other’s comments posts ordered from most recent to oldest (reverse chronological order) blog owner can set their blog for private or public access
66
web conferencing
participants online at the same time presenter controls what the participants can see/hear participants view the presentation and listen to the presenter presenter has a control panel to decide when participants can interact a chat box is provided for participants to type in their questions
67
audio conferencing
participants can only hear each other as it uses mobile phones /telephone networks the organizer of the conference is given 2 PINs by the phone company (one for the organizer and one for the participants) at the time of the conference the organizer dials the conference phone number and enters his PIN to start the conference then the participants dial the same number and enter their PINs to join the
68
VIOP
(Voice Over Internet Protocol) A service that enables people to use the Internet as the transmission medium for telephone calls by converting sound into digital packets
69
virus
▪ A program that can replicate itself ▪ and attaches itself to other programs ▪ Can delete or corrupt data stored on the computer * Can slow down computer performance / fill up memory
70
how to avoid virus
1.Use anti-virus software (must be updated) * checks every file the user opens or downloads * scan any removable media before use * scan e-mail attachments * stores virus codes and downloads new, updated definition files for new viruses * when an antivirus program scans a file it compares the file with the list of known viruses, if it matches, the antivirus will try to clean the file if possible, if not the user is given choice to delete or quarantine the file 2.don’t download programs from untrusted sites 3.don’t open attachments from e-mails from unknown senders
71
how to avoid spyware
Use anti-spyware (must be updated) *Use on-screen keyboard / dropdown when entering confidential information
72
spyware
program installed by hackers on user's computer * to record keystrokes typed on the keyboard * stores them in a file * transfers it back to the hacker without user’s knowledge
72
firewall
Firewall: Software to prevent unauthorized access through the network, prevent unwanted programs, block unwanted sites By controlling incoming and outgoing traffic ▪ Acts as a barrier between the computer and external network ▪ by keeping a list of allowed IPs and a list of blocked IPs ▪ in case of unknown access user is asked for permission firewall can affect the operation of the computer and stop some uploads / some legitimate software can be blocked by the firewall may need to be shut down at times to upload files therefore making computer unsafe if firewall installed on router it will not secure computer from other computers in the same network
73
hacking
Unauthorized access to a computer system ▪ to misuse data (steal, change, delete) ▪ for identity theft
74
Authentication:
Making sure that the person using the computer is who he claims to be (ensuring the identity of the person using the computer).
75
zero login
Systems recognize users based on biometrics & behavior patterns devices keep record when and where logins occur devices can detect changes in user behavior; login from new device / strange location and checks with the owner that he/she is attempting to access the account
76
How to detect spam/phishing:
E-mail contains spelling mistakes ➢ General not personal (the bank knows your name) ➢ No digital certificate attached to the e- mail ➢ E-mail claiming the user won a competition they didn’t enter ➢ Requesting personal confidential information ➢ Contains suspicious links or attachments ➢ Urging for quick action
77
spam
*Electronic junk mail sent randomly, unwanted advertising, *fills up mail inbox preventing important messages from being received *may contain viruses, spyware or phishing attacks
78
how to avoid spam
*Anti-spam / spam filter *Don’t open any links in the e-mail *Block / report the sender e-mail address *Don’t use your e-mail to register on untrusted websites *Don’t subscribe in newsletters *Be cautious when clicking on links or downloading attachments within emails
79
phishing
▪Sending fake e-mails identical to the bank's e-mails (looks legal) ▪requesting personal confidential information in reply to the email ▪containing a link to direct the user to a fake website to enter personal confidential information
80
How to avoid phishing:
How to avoid phishing: 1.Don’t reply to any e-mail requesting personal information 2.Be cautious when clicking on links in an email or downloading attachments 3.Report the e-mail address that sent the e-mail 4.Be cautious of messages requesting urgent reply 5.Contact the bank to ensure the mail is fake
81
smishing
it contains a URL or a telephone number inside the text message The recipient will be asked to log on to the website or make a phone call, and asked to supply personal details such as card number / password The sender of the SMS might not be a phone number
82
processor
receives reading from sensor, compares it with preset value and gives a signal to control device to switch on/off
82
vishing
phishing via voice message
82
ADC
(converts analog signals from sensor to digital signal for processor)
83
Advantages of sensors rather than humans
More accurate readings More frequent readings Can work 24 hours without breaks or shifts Faster response than humans Can work in conditions dangerous or unsuitable for humans Can take more than one reading at the same time Sensors will not forget to take readings
84
Cheques
1. cheque is verified by making sure it is Not fake, Signed 2. collect printed info o Account number of payer o Bank & branch code of payer o Cheque serial number 3. collect hanwritten info o Amount and Due date o Name of recipient o Signature of payer 4. When due date of the cheque has arrived: o bank makes sure that the amount of money is available in the payer’s account o Decrease balance of payer’s account and Increase balance of recipient’s account o Send bank statements to both customers
85
Advantages of using robots in manufacturing:
Increase in production (robots don’t need breaks like humans) Consistency in production (exact same product every time) Monthly salaries for human workers are saved Dangerous tasks are carried out without the need of life insurance for humans Fewer mistakes / greater accuracy
86
Disadvantages of using robots in manufacturing:
High initial cost of robots Training workers who will be still present after robots are introduced High running cost of maintenance of robots Robots cannot react in unexpected situations
87
Global Positioning Systems (GPS)
System used to detect the position of the user Signals (radio waves) sent from device to satellite Signals (radio waves) sent from satellite to device Device calculates the distance from satellite At least 3 satellites are used
88
Geographic Information System (GIS)
Adds layers of data to maps Allows the user to analyze data according to location (in order to take decisions) Users can edit map data Works with GPS Uses: weather forecasting sales analysis crime patterns traffic information population forecasting
89
Automatic number plate recognition system (ANPR)
It is used to read the number plates on cars * A sensor detects a vehicle * It sends a signal to the processor to instruct the camera to capture an image for the car * A program is used to isolate the number plate from the image * The brightness and contrast is adjusted to separate each character in the plate * Each character is recognized using OCR then it is stored in the database * The car park barrier is raised and the driver receives a ticket showing the date and time
90
Expert systems adv
Advantages: Help the expert give more accurate results More consistent results; not affected by emotional reasoning Faster to produce results Uses data from many experts so contains more knowledge than single expert Cheaper than employing multiple experts Updating expert system is cheaper and more frequent than regularly training experts
91
disadv of exp.system
Disadvantages: Lack common sense in the decision making process Initial cost of creating the system If the knowledge base or rules base contain errors it will mislead the expert to an incorrect result Must be regularly updated Experts must be trained to use it
92
smart homes
Can control devices remotely Switch on/off devices before getting home or after leaving Smart fridge can send reminders to buy products when running out Security systems connected to the internet enable monitoring the home while outside Smart television enables streaming of content to watch at any time & playing online games Needs stable internet connection High initial cost & maintenance of devices Must have a smart phone with internet connection Risk of viruses installed on devices may cause malfunction Risk of hacking devices like burglar alarms/security cameras
93
eye strains
Staring at computer screens for a long time * Use anti-glare screen * Use flat screens * Improve surrounding lighting * Reduce screen brightness * Maintain appropriate distance between screen and eyes * Take regular breaks
94
neck pain
Looking up or down at the screen * Sitting on an adjustable chair so screen is at eye level * Take regular breaks
95
Repetitive Strain Injuries (RSI)
Long use of mouse (pain in wrist) * Use wrist rest * Use ergonomic mouse * Take regular breaks Long use of keyboard (pain in wrist) * Use ergonomic keyboard * Use hand exercises * Use voice commands * Take regular breaks Repetitive clicking on mouse (pain in fingers) * Use hand exercises * Use voice commands * Take regular breaks Long typing on mobile phone or PDA or use of joystick (pain in thumb) * Use hand exercises * Use voice commands * Take regular breaks
96
backpain
Sitting in a wrong position in front of the computer for a long time * Sit in an upright position * Use ergonomic chair * Take regular breaks
97
ozone
Sitting too close to a laser printer for a long time * Proper room ventilation * Laser printer placed in printer room * Change type of printer
98
Data protection Act
Data protection Act is a law to protect personal data handled by organizations (example: school, hospital, club) from misuse: Do not keep data longer than required Do not collect data that is not required Do not pass on the data to anyone without the owner’s permission Only certain employees can view the data and handle it Keep the data safe and secure (encryption, firewall, password) Only use the data for the reasons given to the owner Keep the data up to date
99
netiquette
Don’t be abusive Don’t send spam or repeatedly send the same information to the same person Respect peoples’ privacy, don’t share personal information about anyone without permission Don’t use capital letters; it’s considered shouting Don’t plagiarize, always acknowledge source of any information used Check spelling and grammar, gives a good impression Don’t send inappropriate content, disturbing for others and not respectful When sending emails confirm the recipient to make sure the email is not delivered to someone else
100
Interviewing
Collecting detailed information Questions can be changed based on responses Can see body language; less risk of misunderstanding Time consuming Not anonymous (unreliable responses) Expensive due to analyst time Analyst & employee must be available at same time
101
Distributing questionnaires to employees
Collecting wide variety of responses Responses can be anonymous (reliable responses) Cheaper than interviews Not time consuming; can be filled any time Careless / vague answers Misunderstanding of questions Questions not flexible
102
Observing
No waste of employee time Reliable information; the analyst will observe the system in person instead of taking opinions Most people are distracted or uncomfortable or don't work as usual while being watched Not all problems may appear during the observation
103
Flat file database
1 table All records are stored in one table. Easier to understand/use Easier to sort and filter data Easier to setup (less ICT experience needed)
104
Relational database
2 or more tables with relations between them; created by taking the primary key from one table & adding it to another table as a foreign key Data is only stored once so: Less storage space Easier to edit/add/delete records Complex queries can be carried out using several tables Separate passwords can be assigned for separate tables (better security) Easier to expand
105
Formula and Function
Formula: Can be simple calculations/mathematical operations Can be easily typed by user Can contain a function Function: Built into the software Have a pre-defined name
106
Absolute cell reference
replicated the cell reference will not
107
Relative cell reference (A2)
when replicated the cell reference will change
108
Content layer
(htm) images, tables, text, hyperlinks
109
Presentation layer
(css) colours, fonts, borders
110
anchor
A position on the webpage that a hyperlink will point to
111
Behaviour layer
(created using coding / scripting language) interaction of website
112
bookmark
saved shortcut to direct the user to a certain website (favorites)
113
class
defined in a stylesheet using a dot (e.g. .right) used in adding or changing properties without having to create new style
114
inline styles
within each web page edited by changing each web page can be anywhere in the web page Higher priority
115
widow
When the last line of a paragraph is separated on the next page
116
Orphan
When the first line of paragraph is separated on the previous page
117
Corporate house styles
Benefits: Consistency Brand recognition Reduces time spent in formatting documents Reduce errors of typing/forgotten elements