You are on page 1of 21

Theory Borsham

Chapter 1
1) State what is meant by hardware.
• Physical components/devices of a computer system
• Could be touched

2) State what is meant by software.


• Programs for controlling the operation of a computer
• Can not be touched

3) Optical Character Reader (OCR)


• Convert scanned image to a text file which can be edited (processed) by another software
package such as word processors, spreadsheets, databases

4) Optical Mark Reader (OMR)


• Reads multiple choice candidate exam answers & Questionnaires where responses are
recorded by shading in specified positions
• Dedicated scanner device shines a beam of light onto the form
• Light is reflected back to sensors
• Marks reflect less light so sensors used to identify position of marks

5) Barcode Reader
• Illuminating the code with red light
• a sensor detects the reflected light
• According to the intensity of the reflections (white reflects more light than black) the code is
detected

6) Quick Response Scanner (QR)


• The codes in the pattern contain a small amount of data; such as website URLs and contact
details.
• Many smart phones have QR readers and the codes can be scanned quickly to access
information.
• The codes avoid the user having to remember long telephone numbers and website
addresses, because the QR reader will quickly convert the QR code into the information.

7) Describe how data could be read from RFID chip


• The RFID reader sends radio waves / signal to the RFID antenna in the tag
• The radio waves received by the tag’s antenna activate the microchip
• Tag sends radio wave / signal back to the reader Reading information:
• The reader provides energy / activates the chip
• The antenna will send the information in the chip to the reader
8) Near Field Communication (NFC) reader
• contactless transmissions of information, including payment for items using a smartphone or
transmission of information between smartphones
• NFC requires the sender and receiver to be closer together than in RFID which makes it more
secure
• NFC devices can act both as a receiver and reader

9) Biometric readers (Fingerprint scanners, Retina scanners, Iris recognition, Face


recognition, Voice recognition)

Advantages
• unique as no two people have the same fingerprint
• difficult to be copied
• impossible to be lost or forgotten

Disadvantages:
• expensive equipment and takes time to scan
• needs a lot of storage space
• security issues related to storing people’s biometric data

10) Printers

Printer Laser printer Inkjet printer Dot matrix printer


Noise Low Medium high
Speed/ volume of high speed/ medium speed/ low speed/
paper high volume medium volume low volume
Quality High High low
highest (changing cartridges
Running cost
frequently)
Initial cost Lowest
Images most suitable
Dirty environment most suitable
Stationery separate sheets separate sheets continuous
Copies carbon copies
Ink Toner Droplets Ribbon

11) RAM (Random Access Memory)


• Read & write
• Volatile (loses its memory when switched off)
• Used to store data and files currently in use
12) ROM (Read Only Memory)
• Read only
• Non-Volatile (does not lose its memory when switched off)
• Used to store instructions to start up the computer
13) Flash memory cards
• SD card (compatible with most devices like mobiles-cameras-tablets)
• XD card (used for cameras-limited capacity)
• CFast card (faster transfer speed-used in gaming devices)

14) Discuss the advantages and disadvantages of using the cloud rather than a hard
disk
Advantages

• Files stored in the cloud can be accessed from any device/any place with internet access
• Don’t have to pay for large computer/mobile storage capacity
• Only pay for the storage you use as much of the space on the hard disk may be wasted
• Easier to add storage capacity on the cloud (unlimited storage capacity)
• Ability to synchronize files across multiple devices (automatically if requested) easily
• Backups are automatic on the cloud
• User does not have to worry about security measures as service provider manages securing
the data
Disadvantages

• If the internet connection is unstable/slow there will be a problem accessing/downloading


files on the cloud
• Cloud storage can be expensive if extra storage capacity is required
• Easier to hack the cloud as the data is stored for a long period of time on servers
• Data is controlled by the storage service provider; customers should choose a trusted
company
• Risk of fire , floods etc. at the server can cause data loss

15) Dialogue based Interface


• User interacts with computer through voice commands
✓ Hand free commands
× May lead to errors due to different vocal accents
× Expensive to develop
× Affected by background noise
× Used while driving and used by physically disabled users

16) Gesture based Interface


• User interacts with computer through physical gestures
✓ Easy to use
✓ No mechanical devices needed
✓ No physical contact required
× Limited range of commands
× Can pick up unintentional movements
× User has to be near camera or sensor
17) Describe the benefits and drawbacks of using a command line interface (CLI)
rather than a graphical user interface (GUI)
Benefits
• In CLI the user is not restricted to predetermined options// GUI uses icons & setmenus
• In CLI the user has more control over the computer settings//in GUI computer settings are
protected from the user
• CLI uses less memory than GUI
• CLI requires less processing power for the interface
Drawbacks
• The commands used have to be learnt/The commands used have to be remembered
• The commands used have to be typed in/entered exactly
• Have to remember the exact path/correct name of application
• More risk of errors on data entry
• In CLI Commands have to be typed in by keyboard//in a GUI can use touchscreens/mice
• Tends to be used by experienced people//GUI is more user-friendly and can be used by non-
experts
Chapter 2
1) Describe the differences between an intranet and the internet
• Intranet has restricted access/its private//Internet is world-wide/everywhere
• Intranet is used only within a company/organisation/school
• Intranet access has more control of data whereas the internet access is open/public
access//the internet anyone can add material
• Intranet is policed/moderated/managed
• The intranet has reduced unauthorised access to material whereas the
• Intranet can restrict access to some websites//internet has no restrictions on websites
• Data on the intranet is more reliable/relevant//
• Intranet is protected by passwords /more secure
• Intranet is used to give information relating to the company whereas the internet gives
general information
• Internet has more information

2) Extranet is when an employee is accessing intranet remotely

3) Explain the purpose of a router


• Connects LAN to the Internet
• Act as Switch/WAP to connect devices to each other to create a LAN
• Stores the IP and MAC addresses of connected devices
• Divides messages into packets
• Sends & receives data packets

4) Explain how a router works


• A router receives/sends data packets
• Checks the destination IP address
• If the destination is in this network it Uses the MAC address to send to correct computer
• If not it uses IP address and routing table to send Data packet to the appropriate/next router
• Uses the IP address to work out the best/quickest route

5) Compare and contrast Bluetooth and WiFi.


Similarities
• Both WiFi and Bluetooth use wireless communications
• Both WiFi and Bluetooth use radio frequencies for communication/radio waves
• Both WiFi and Bluetooth allow several devices to be connected
• Both use security when sending data
Differences
• WiFi has faster data transfer rate
• WiFi has a greater range of transmission
• WiFi uses key matching encryption
• Bluetooth uses pairing code
• Wifi connects more devices
• Wifi requires a network device (router/WAP)
6) Describe how computers can use Bluetooth to connect to a device
• Bluetooth sends and receives radio waves
• Enable Bluetooth
• Bluetooth searches for the other devices
• Pairs the two devices
• By entering the same code on both devices
• Devices automatically detect and connect to each other

7) Describe the process of using WiFi to connect to a WLAN.


• computer sends radio waves / signals to search any wifi network in range
• wireless router responds by sending back signal to computer
• name of network is displayed to the user
• user will choose the network and enter the password
• if the network has been used before saved password is used
• wireless router ensures password is correct
• connection is established and data can be exchanged between devices

8) Describe four strategies that he could use to stay safe when using social network
websites
• Don't give out personal information such as his address or phone number
• Don’t send pictures of himself to anyone, especially pictures with uniforms
• Don't open/click on suspicious links/adverts on social media
• Don't become online ‘friends’ with people he does not know/don’t contact/chat to people you
do not know
• Never arrange to meet someone in person who he has only met online
• If anything he sees or reads online worries him, he should tell someone about it/block them
• Use appropriate language
• Set your account private so only friends can see your info
• Use strong passwords and change it regularly

9) Discuss the benefits and drawbacks of policing the internet


Benefits:
• Prevents illegal material being posted/shown
• Information that states how to make bombs. how to hack would be banned
• prevent children from gaining access to inappropriate websites
• Help to stop incorrect information being found on the net/fake news
• Helps to prevent discussion groups that incite hatred, racism/cyber bullying
• Ensure copyright laws are enforced

Drawbacks:
• It would be very expensive to police/set up a police group
• It would be very difficult to set standard rules as many countries/states have different rules
• Freedom of speech/human rights is restricted
• Material found on the internet can be found elsewhere
• Some medical websites could be classed as illegal but could be legal
• The mass of information increases daily therefore difficult to check
• People tend to be anonymous therefore difficult to find/track
10) Describe the advantages of using the internet to research information for a
technicalproject.
• Vast amount of information available
• More up to date information is available as information in books may be outdated
• Information can be found quicker using search engines
• Information can be researched at home rather than using research libraries
• Don't have to waste time going to the library
• Don't have to spend money going to the library
• Ability to discuss topics far easier with people from around the world
• Ability to get wider range of opinions.
• Allows emailing therefore sending/collecting information far quicker than manual methods
• Data is digital therefore can be easier to transfer to documents

11) WAN (Wide Area Network)


• Public network
• Connecting unlimited number of computers
• Far away from each other

12) LAN (Local Area Network)


• Private network
• Connecting limited number of computers
• Close together in location.

13) URL
• Uniform Resource Locator
• a reference (an address / a link) to access a resource on the Internet

14) HTTP:
• Hyper Text Transfer Protocol
• set of rules for transferring the webpage from the webserver to the viewer’s browser

15) HTTPS
• Hyper Text Transfer Protocol Secure version
• same as HTTP, but where everything transferred between webserver and user’s computer is
encrypted using the SSL (Secure Socket Layer)

SSL
• SSL is a security protocol (set of rules) developed for sending information securely over the
Internet
• When the URL starts with "https" this webpage is secured by SSL and a padlock is displayed
in the browser
16) FTP:
• File Transfer Protocol
• set of rules for transferring files between a file server and a user’s computer (client)

17) Video conferencing:

• two or more people


• at different places
• online at the same time
• using the same program
• where they can all see and hear each other

18) Discuss the benefits and drawbacks to the company of using video-conferencing.
Benefits

• Can call meetings at short notice


• Employees save time travelling
• No hotel expenses
• No need to transport/carry equipment/lots of documents
• suitable in bad weather conditions
• no need for a conference room

Drawbacks

• Takes time/costs money to be trained


• Difficult to have international meetings because of time differences
• Initial cost of hardware (and software)
• Loss of personal/social contact
• Legal documents cannot be signed
• problems in internet connection may interrupt the meeting/lag between video and audio

19) Web conferencing:

• used in presentations, training and online courses


• participants online at the same time
• presenter controls what the participants can see/hear
• presenter has a control panel to decide when participants can interact
• a chat box is provided for participants to type in their questions
• could be accessed by invitation link
• participants do not need to have a webcam

20) Audio conferencing:

• participants can only hear each other as it uses mobile phones / telephones and mobile
/telephone networks
• the organizer of the conference is given 2 PINs by the phone company (one for the organizer
and one for the participants)
• at the time of the conference the organizer dials the conference phone number and enters
his PIN to start the conference
• then the participants dial the same number and enter their PINs to join the conference
21) Internet telephony / VOIP
• Voice over internet protocol
• A service that enables people to use the Internet as the transmission medium for
telephone calls by converting sound into digital packets

22) Virus
• A program that can replicate itself
• and attaches itself to other programs
• Can delete or corrupt data stored on the computer
• Can slow down computer performance / fill up memory

23) Hacking
• Unauthorized access to a computer system
• to misuse data (steal, change, delete)
• for identity theft

24) How to avoid hacking:


Authentication
• Making sure that the person using the computer is who he claims to be (ensuring the
identityof the person using the computer).

Firewall
• Software to prevent unauthorized access through the network, prevent unwanted
programs,block unwanted sites
• By controlling incoming and outgoing traffic
• Acts as a barrier between the computer and external network
• by keeping a list of allowed IPs and a list of blocked IPs
• in case of unknown access user is asked for permission

25) Authentication techniques


• Username & password:
• ID card
• Biometrics
• Two factor authentication:
• Zero login (devices can detect changes in user behavior; login from new device /
strange location and checks with the owner that he/she is attempting to access
the account)
• Physical token (one-time passcode is generated and sent on numerical display
device)
• Electronic token (one time passcode that is generated and sent to a trusted
device such as a mobile phone)
• Digital certificate

26) Digital certificate


• like a passport, a digital certificate provides identifying information about the email sender o
can be verified because it was issued by an official, trusted agency
27) To protect data in case of hacking:
Encryption
• Encoding data using encryption key
• so that only the authorized people can understand
• as only they have the decryption key to decode it

28) Phishing
• Sending fake e-mails
• identical to the bank's e-mails (looks legal)
• requesting personal confidential information in reply to the email
• or containing a link to direct the user to a fake website to enter personal confidential
information
• leading to identity theft

29) Smishing
• Short for SMS phishing
• Sending fake SMS on a mobile phone , it often contains a URL or a telephone number inside
the text message
• The recipient will be asked to log on to the website or make a phone call, and asked to
supply personal details such as card number / password

30) Vishing
• phishing via voice messages
• used to leave voicemails that trick the user into providing personal sensitive
information

31) Pharming
• Redirecting a website's traffic to a hacker's identical website without their knowledge
• by installing malicious code (virus) on user's computer
• to collect confidential personal information entered like passwords, banking information, etc
• leading to identity theft

32) Spyware (key logging SW)


• Program installed by hackers on user's computer
• to record keystrokes typed on the keyboard
• stores them in a file
• transfers it back to the hacker without user’s knowledge
• a method of stealing information like passwords, banking information, etc
• leads to identity theft

33) SPAM
• Electronic junk mail sent randomly,
• often unwanted advertising,
• fills up mail inbox preventing important messages from being received
• may contain viruses, spyware or phishing attacks
Chapter 3
1) Give three advantages of using robots to carry out the task.
• Robots can work in environments where humans would have difficulty
• Robots can work 24/7
• Robots are not paid/no salaries
• Productivity is higher
• Fewer mistakes are made/greater accuracy
• More consistent production
• Allow humans to do more skilled work/other tasks

2) Give three disadvantages of using robots to carry out the task.


• Expensive to maintain/repair
• Expensive to purchase
• Replace labour, leads to unemployment
• Manual skills are lost
• Can not react to any unexpected condition
• Training workers who will be still present after robots are introduced

3) Describe the advantages of using microprocessor-controlled devices in the


home.
• People no longer have to do manual tasks at home
• No need to stay at home whilst washing is carried out/people can go out
• shopping/to work and come home to washed clothes
• People have more time to spend on leisure activities/shopping/socializing
• Increased sense of security
• Heating/air conditioning can be set remotely/the user can arrive home to a
• warm/cool house

4) Explain the negative effects that microprocessor-controlled devices can have


onlifestyle.
• This can lead to an unhealthy lifestyle as people rely on ready-made foods
• People depend on the devices making them lazy
• Devices carry out the manual tasks leading to lack of exercise
• People lose their household skills in carrying out tasks
• There is a danger that devices that use the internet can have security issues
• Increase risk of safety problems like electrocution

5) Automatic number plate recognition system (ANPR)


• It is used to read the number plates on cars Car park
• A sensor detects a vehicle
• It sends a signal to the processor to instruct the camera to capture an image for the car
• A program is used to isolate the number plate from the image
• The brightness and contrast is adjusted to separate each character in the plate
• Each character is recognized using OCR then it is stored in the database
• The car park barrier is raised and the driver receives a ticket showing the date and time
• When the driver returns they insert their ticket to calculate the charge
6) Global Positioning Systems (GPS)
• System used to detect the position of the user
• by calculating the distance between the receiver (user’s device) and three or four satellites

7) Geographic Information System (GIS)


• Works with GPS
• Adds layers of data to maps
• Allows the user to model and analyze data according to location (in order to take decisions)
• Allows users to create interactive queries
• Users can edit map data

8) Virtual Reality
• 3-D Artificial environment created by software
• It uses goggles, suits, helmets and gloves to interact
• It gives the human the feeling of reality by simulating senses such as vision, hearing, touch and
smell
9) Augmented Reality
• Virtual objects overlaid on real world environments (use a photo as an item in a search engine)

10)Discuss advantages and disadvantages of online shopping to the shop


Advantages:

• An online shop costs less to set up and run.


• Reduced overheads in an online shop
• Reduced cost on wages as less shop staff needed
• Easier in advertisement/send a marketing message by email to
• A local business can become nationwide or even international.
• An online shop can be updated instantly

Disadvantages:

• Need to re-train staff to use the online system


• The cost of setting up/maintain a website
• Drop in customer loyalty therefore fewer customers
• Need to pay more delivery drivers
• Need to buy more delivery vehicles to deliver goods to customers

11) Working Patterns


• Part time
• Compressed hours
• Flexible working
• Job sharing
• Work from home
12) Discuss the advantages and disadvantages of using online booking systems.
Advantages

• Prevention of double booking


• The person booking the seats knows immediately if the seat is taken
• The successful booking is known immediately
• Bookings can be made 24/7
• There are more booking lines than in a manual booking system
• The customer needs to add an email address therefore special offers/promotions
can besent from time to time
• Easier to reserve seats than in a manual booking system
• E-tickets can be produced therefore less chance of tickets being lost in the post.

Disadvantages

• The customer needs an email address


• The customer needs a debit/credit card
• Requires the customer to have a smartphone for e-tickets
• Customers need an internet connection
• Expensive to set up/maintain
• More difficult to cancel a booking
• Server crash or too many bookings can cause long delays

13) Discuss the advantages and disadvantages to the customers of the introduction of
internet banking.
Advantages

• Reduces the cost of travelling to the bank


• Reduces the time wasted travelling to the bank / waiting in queues
• The interest rates are usually better using internet banking
• Easier to shop around for the better bank accounts
• Disabled people do not have to travel to the bank in order to carry out transactions
• 24/7 banking
• People can spend more time doing other activities rather than travelling to the bank
• Less physical robberies
Disadvantages
• Less physical banks which means that people have to travel further to go to the bank
• Health risks with using the computer
• Security is an issue as transactions are carried out over the internet
• The user needs a reliable internet connection
• More risk of pharming / phishing/fraud
• Easier to make errors whilst using internet banking e.g. incorrect input
• If the internet connection drops during a transaction, then there may be issues
14) Health problems and prevention:

Health
Cause Prevention
problems
• Use anti-glare screen
• Use flat screens
Staring at computer screens for a
Eye strain • Improve surrounding lighting
long time
• Reduce screen brightness
• Maintain sufficient distance
between screen and eyes
• Take regular breaks
• Sit in an upright position
Sitting in a wrong position in front
Back pain • Use ergonomic chair
of the computer for a long time
• Take regular breaks
• Sitting on an adjustable chair
Neck pain Looking up or down at the screen
• Take regular breaks
• Use wrist rest
Long use of mouse
• Use ergonomic mouse
(pain in wrist)
• Take regular breaks
Repetitive Long use of keyboard • Use ergonomic keyboard
Strain (pain in wrist) • Take regular breaks
Injuries Repetitive clicking on mouse
• Take regular breaks
(RSI) (pain in fingers)
Long typing on mobile phone or PDA
or use of joystick • Take regular breaks
(pain in thumb)
Ozone • Proper room ventilation
irritation / Sitting too close to a laser printer • Laser printer placed in
respiratory for a long time printer room
problems • Change type of printer

15) Safety problems and prevention:


Safety problems Prevention
Tripping over cables Keep wires in underground ducts
Risk of electric shock Keep wires well insulated
Avoid drinks in presence of computers
Risk of fire Don’t overload sockets
Avoid overheating of equipment
People trapped in emergencies Keep computers in a U-shape and well-
spaced to enable easy exit
16) Modelling (CAD-Simulation-Financial model)
Advantages
• Fewer errors in final version of real item as errors would have been resolved in model
• Saves money as it saves on resources
• Safer to run a computer model rather than risking human life
• Different scenarios/what ifs can be carried out which may happen in real life/to
experiment
• Some situations will be very difficult to test in real life

Disadvantages
• Models can only test situations which are expected / in reality some situations might
come up that were not expected
• Humans in a model will not react the same way they will do in a real life dangerous
situation
• Creating models consume time, delay in start of creating the real thing
• Models usually require specialist / specialist software to be done (cost

17) Copyright law


• A law to prevent software from being sold, copied, distributed or updated any without its
owner's (author) permission.

18) Data Protection Act


• Do not keep data longer than required
• Do not collect data that is not required
• Do not pass on the data to anyone without the owner’s permission
• Only certain employees can view the data and handle it
• Keep the data safe and secure (encryption, firewall, password)
• Only use the data for the reasons given to the owner
• Keep the data up to date

19) Netiquette
• Short for internet etiquette, set of rules that need to be respected when communicating
over the internet, examples:
• Don’t be abusive, use threatening language
• Don’t send spam or repeatedly send the same information to the same
person
• Respect peoples’ privacy, don’t share personal information about anyone
without permission
• Don’t use capital letters; it’s considered shouting
• Don’t plagiarize, always acknowledge source of any information / quotations /
images used
• Check spelling and grammar, gives a good impression
• Posts made are usually public so be careful of any comments being shared
• Don’t send inappropriate content, disturbing for others and not respectful
• When sending emails confirm the recipient to make sure the email is not
delivered to someone else
Eng Shaimaa ElAdl 15 Eng Mostafa Mahdy
Chapter 4

How to use an expert system


• Questions about the ... (depending on the application) are asked by the system
• Answers to these questions are entered by the user through the input screen (inputs depend on
the application)
• Inference engine uses the information in the knowledge base and rules base to find results
• The results will be output to the user on the output screen (suggested/possible/probable ...
(depending on the application) are displayed on the screen)
• The explanation system will explain how the expert system arrived at its conclusio

Eng Shaimaa ElAdl 16 Eng Mostafa Mahdy


Chapter 5
1) Discuss advantages and disadvantages of relational database compared to flat file
database
Advantages of Relational database:

• Data is only stored once/avoids data duplication


• Less storage space
• Easier to edit/add/delete recordsk
• Complex queries can be carried out using several tables
• Separate passwords can be assigned for separate tables (better security)
• Less inconsistency of data
• Easier to expand

Advantages of flat file database:

• All records are stored in one table.


• Easier to understand/use
• Easier to sort and filter data
• Easier to setup (less ICT experience needed)

2) Verification checks
• Double data entry: User enters data twice and computer compares the two entries to make
sure they are identical.
• Visual check: User visually compares data entered with data source to make sure they are
identical.

3) Proof-reading:
• Reading the document after typing to check for spelling, grammar, punctuation mistakes
without comparing to a source

4) Validation Checks
• Range
• Length
• Format
• Lookup
• Type/Character
• Presence

5) Why telephone number is text?


• May begin with 0
• Not needed in any calculations
• Could contain + or –

Eng Shaimaa ElAdl 17 Eng Mostafa Mahdy


Absolute cell reference ($A$2)

• when replicated the cell reference will not change

Relative cell reference (A2)

• when replicated the cell reference will change

6) Describe how you could replicate a function in cell C4 till C15


• Click on the cell/C4
• Move to the bottom right hand side of the cell
• Drag down the fill handle/double click on drag handle
• Drag the handle to C15

7) Formula vs function
Formula:

• Can be simple calculations/mathematical operations


• Can be easily typed by user
• Can contain a function
Function:
• Built into the software
• Have a pre-defined name/word stored inside the spreadsheet software
• Used to perform specific tasks

8) Naming cells/ranges:
• Easily referring to cells
• Simplifies formulas o Easy to refer to cells without using cell references
• Don’t have to set absolute cell manually (a names range will not change when replicating)

9) Web development layers


• Content layer (htm) images, tables, text, hyperlinks
• Presentation layer (css) colours, fonts, borders
• Behaviour layer (created using coding / scripting language) interaction of website

10) Class:
• It is defined in a stylesheet using a dot (e.g. .right)
• It is used in adding or changing properties without having to create new style

11) Gutter
• Extra margin on one side to allow for binding or stapling a book

Eng Shaimaa ElAdl 18 Eng Mostafa Mahdy


12) Widow
• When the last line of a paragraph is separated on the next page

13) Orphan
• When the first line of a paragraph is separated on the previous page

14) Corporate house style


• It is way a company is presented to customers; including color scheme, font, logo, etc.
• These items are applied to all company’s documents, presentations, webpages, e-mails…
Benefits:
• Consistency
• Brand recognition
• Reduces time spent in formatting documents
• Reduce errors of typing/forgotten elements

Relative file path Absolute file path


displays only file name displays file name and path
means all files are saved in same folder means files are not saved in same folder
Files should be saved in one folder to be ready Will only work on one computer as other
for publishing the website (should be relative not computers will not have the same file path
absolute)

Eng Shaimaa ElAdl 19 Eng Mostafa Mahdy


Generic File formats
Term Stands for Definition and function

A file format used for text that contains formatting; can contain
.rtf Rich text format tables, images, etc

can be opened in any word processor

A file format used for plain text that contains no formatting, no


images or tables
.txt Text file
can be imported into any text editor/ word processing/DTP
package

A file format used to hold tabular data, e.g. spreadsheet or


Comma Separated database table. It stores it as a text file using commas (or semi-
.csv colons) to separate data items.
Values
can be imported into any spreadsheet or database

File containing design of the webpage created using Hyper Text


.htm HyperText Markup Markup Language

can be opened by any web browser and on web-design software

Contains style definitions (to define how to display HTML


elements), can be attached to each webpage to avoid including
.css cascading stylesheet styles in HTML

can be opened in any text editor and on web-design software

The most common image format used mostly in websites, as it


Joint photographic loads quickly because of its low capacity.
.jpeg
expert group
can be opened in any image editing software

Image format that can be easily sent via email


Portable network
.png can be used in any image editing software
graphics

Graphics Interchange File format for moving images


.gif
Format can be opened in any image editing software

Eng Shaimaa ElAdl 20 Eng Mostafa Mahdy


Makes it possible to display formatted text and graphics in the
Portable document same layout on any device screen
.pdf
format
can be opened in any document format reader on any device

Eng Shaimaa ElAdl 21 Eng Mostafa Mahdy

You might also like