Professional Documents
Culture Documents
Chapter 1
1) State what is meant by hardware.
• Physical components/devices of a computer system
• Could be touched
5) Barcode Reader
• Illuminating the code with red light
• a sensor detects the reflected light
• According to the intensity of the reflections (white reflects more light than black) the code is
detected
Advantages
• unique as no two people have the same fingerprint
• difficult to be copied
• impossible to be lost or forgotten
Disadvantages:
• expensive equipment and takes time to scan
• needs a lot of storage space
• security issues related to storing people’s biometric data
10) Printers
14) Discuss the advantages and disadvantages of using the cloud rather than a hard
disk
Advantages
• Files stored in the cloud can be accessed from any device/any place with internet access
• Don’t have to pay for large computer/mobile storage capacity
• Only pay for the storage you use as much of the space on the hard disk may be wasted
• Easier to add storage capacity on the cloud (unlimited storage capacity)
• Ability to synchronize files across multiple devices (automatically if requested) easily
• Backups are automatic on the cloud
• User does not have to worry about security measures as service provider manages securing
the data
Disadvantages
8) Describe four strategies that he could use to stay safe when using social network
websites
• Don't give out personal information such as his address or phone number
• Don’t send pictures of himself to anyone, especially pictures with uniforms
• Don't open/click on suspicious links/adverts on social media
• Don't become online ‘friends’ with people he does not know/don’t contact/chat to people you
do not know
• Never arrange to meet someone in person who he has only met online
• If anything he sees or reads online worries him, he should tell someone about it/block them
• Use appropriate language
• Set your account private so only friends can see your info
• Use strong passwords and change it regularly
Drawbacks:
• It would be very expensive to police/set up a police group
• It would be very difficult to set standard rules as many countries/states have different rules
• Freedom of speech/human rights is restricted
• Material found on the internet can be found elsewhere
• Some medical websites could be classed as illegal but could be legal
• The mass of information increases daily therefore difficult to check
• People tend to be anonymous therefore difficult to find/track
10) Describe the advantages of using the internet to research information for a
technicalproject.
• Vast amount of information available
• More up to date information is available as information in books may be outdated
• Information can be found quicker using search engines
• Information can be researched at home rather than using research libraries
• Don't have to waste time going to the library
• Don't have to spend money going to the library
• Ability to discuss topics far easier with people from around the world
• Ability to get wider range of opinions.
• Allows emailing therefore sending/collecting information far quicker than manual methods
• Data is digital therefore can be easier to transfer to documents
13) URL
• Uniform Resource Locator
• a reference (an address / a link) to access a resource on the Internet
14) HTTP:
• Hyper Text Transfer Protocol
• set of rules for transferring the webpage from the webserver to the viewer’s browser
15) HTTPS
• Hyper Text Transfer Protocol Secure version
• same as HTTP, but where everything transferred between webserver and user’s computer is
encrypted using the SSL (Secure Socket Layer)
SSL
• SSL is a security protocol (set of rules) developed for sending information securely over the
Internet
• When the URL starts with "https" this webpage is secured by SSL and a padlock is displayed
in the browser
16) FTP:
• File Transfer Protocol
• set of rules for transferring files between a file server and a user’s computer (client)
18) Discuss the benefits and drawbacks to the company of using video-conferencing.
Benefits
Drawbacks
• participants can only hear each other as it uses mobile phones / telephones and mobile
/telephone networks
• the organizer of the conference is given 2 PINs by the phone company (one for the organizer
and one for the participants)
• at the time of the conference the organizer dials the conference phone number and enters
his PIN to start the conference
• then the participants dial the same number and enter their PINs to join the conference
21) Internet telephony / VOIP
• Voice over internet protocol
• A service that enables people to use the Internet as the transmission medium for
telephone calls by converting sound into digital packets
22) Virus
• A program that can replicate itself
• and attaches itself to other programs
• Can delete or corrupt data stored on the computer
• Can slow down computer performance / fill up memory
23) Hacking
• Unauthorized access to a computer system
• to misuse data (steal, change, delete)
• for identity theft
Firewall
• Software to prevent unauthorized access through the network, prevent unwanted
programs,block unwanted sites
• By controlling incoming and outgoing traffic
• Acts as a barrier between the computer and external network
• by keeping a list of allowed IPs and a list of blocked IPs
• in case of unknown access user is asked for permission
28) Phishing
• Sending fake e-mails
• identical to the bank's e-mails (looks legal)
• requesting personal confidential information in reply to the email
• or containing a link to direct the user to a fake website to enter personal confidential
information
• leading to identity theft
29) Smishing
• Short for SMS phishing
• Sending fake SMS on a mobile phone , it often contains a URL or a telephone number inside
the text message
• The recipient will be asked to log on to the website or make a phone call, and asked to
supply personal details such as card number / password
30) Vishing
• phishing via voice messages
• used to leave voicemails that trick the user into providing personal sensitive
information
31) Pharming
• Redirecting a website's traffic to a hacker's identical website without their knowledge
• by installing malicious code (virus) on user's computer
• to collect confidential personal information entered like passwords, banking information, etc
• leading to identity theft
33) SPAM
• Electronic junk mail sent randomly,
• often unwanted advertising,
• fills up mail inbox preventing important messages from being received
• may contain viruses, spyware or phishing attacks
Chapter 3
1) Give three advantages of using robots to carry out the task.
• Robots can work in environments where humans would have difficulty
• Robots can work 24/7
• Robots are not paid/no salaries
• Productivity is higher
• Fewer mistakes are made/greater accuracy
• More consistent production
• Allow humans to do more skilled work/other tasks
8) Virtual Reality
• 3-D Artificial environment created by software
• It uses goggles, suits, helmets and gloves to interact
• It gives the human the feeling of reality by simulating senses such as vision, hearing, touch and
smell
9) Augmented Reality
• Virtual objects overlaid on real world environments (use a photo as an item in a search engine)
Disadvantages:
Disadvantages
13) Discuss the advantages and disadvantages to the customers of the introduction of
internet banking.
Advantages
Health
Cause Prevention
problems
• Use anti-glare screen
• Use flat screens
Staring at computer screens for a
Eye strain • Improve surrounding lighting
long time
• Reduce screen brightness
• Maintain sufficient distance
between screen and eyes
• Take regular breaks
• Sit in an upright position
Sitting in a wrong position in front
Back pain • Use ergonomic chair
of the computer for a long time
• Take regular breaks
• Sitting on an adjustable chair
Neck pain Looking up or down at the screen
• Take regular breaks
• Use wrist rest
Long use of mouse
• Use ergonomic mouse
(pain in wrist)
• Take regular breaks
Repetitive Long use of keyboard • Use ergonomic keyboard
Strain (pain in wrist) • Take regular breaks
Injuries Repetitive clicking on mouse
• Take regular breaks
(RSI) (pain in fingers)
Long typing on mobile phone or PDA
or use of joystick • Take regular breaks
(pain in thumb)
Ozone • Proper room ventilation
irritation / Sitting too close to a laser printer • Laser printer placed in
respiratory for a long time printer room
problems • Change type of printer
Disadvantages
• Models can only test situations which are expected / in reality some situations might
come up that were not expected
• Humans in a model will not react the same way they will do in a real life dangerous
situation
• Creating models consume time, delay in start of creating the real thing
• Models usually require specialist / specialist software to be done (cost
19) Netiquette
• Short for internet etiquette, set of rules that need to be respected when communicating
over the internet, examples:
• Don’t be abusive, use threatening language
• Don’t send spam or repeatedly send the same information to the same
person
• Respect peoples’ privacy, don’t share personal information about anyone
without permission
• Don’t use capital letters; it’s considered shouting
• Don’t plagiarize, always acknowledge source of any information / quotations /
images used
• Check spelling and grammar, gives a good impression
• Posts made are usually public so be careful of any comments being shared
• Don’t send inappropriate content, disturbing for others and not respectful
• When sending emails confirm the recipient to make sure the email is not
delivered to someone else
Eng Shaimaa ElAdl 15 Eng Mostafa Mahdy
Chapter 4
2) Verification checks
• Double data entry: User enters data twice and computer compares the two entries to make
sure they are identical.
• Visual check: User visually compares data entered with data source to make sure they are
identical.
3) Proof-reading:
• Reading the document after typing to check for spelling, grammar, punctuation mistakes
without comparing to a source
4) Validation Checks
• Range
• Length
• Format
• Lookup
• Type/Character
• Presence
7) Formula vs function
Formula:
8) Naming cells/ranges:
• Easily referring to cells
• Simplifies formulas o Easy to refer to cells without using cell references
• Don’t have to set absolute cell manually (a names range will not change when replicating)
10) Class:
• It is defined in a stylesheet using a dot (e.g. .right)
• It is used in adding or changing properties without having to create new style
11) Gutter
• Extra margin on one side to allow for binding or stapling a book
13) Orphan
• When the first line of a paragraph is separated on the previous page
A file format used for text that contains formatting; can contain
.rtf Rich text format tables, images, etc