Ictnotes
Ictnotes
: Computer
Seq.: sequence
CH1: Intro. to info. Processing ▪ Automate existing manual process Dev.: develop
❖ Input-Process-Output cycle Org.: organization
➢ Comp.: ➢ Data No.: number
Chara.: character
▪ DB
Enter data and commands into a
comp. via one or more input
devices. ➢ Process ❖ Info. Processes
▪ Steps/modules ➢ Data collection
The CPU works on data ➢ Organization
according to commands ➢ Technologies ➢ Analysis
provided in input stage. ▪ Hardware ➢ Storage
▪ Software: systems & application ➢ Processing
The comp. shows processed
software ➢ Transmission
results on the output devices ▪ Network ➢ Presentation
specified in input stage.
➢ Personnel ❖ Info age
▪ IS specialists: ➢ Info literate
❖ Stored programs ▪ Systems analyst ➢ Internet access
Dev. software
➢ Seq. of commands = programs • -research, planning and ➢ Knowledge based society
➢ Automatic, repeated, accurate implementation of IS
according to
➢ Diff function using same machine/ requirements of end ❖ Protocol
hardware users ➢ Standard that governs connection,
▪ Programmer communication and data transfer
processed • -convert system dev. by between two devices
❖ S.A. to program codes
❖ IS (Info. System)
CH2: Data org. and ctrl (CH8) CH3: No. and chara. Coding systems CH4: MM elements and Digitization
❖ Field < record < table < database ❖ Denary (0-9), binary (0/1), hexadecimal no. ❖ Graphics (JPG, GIF, BMP(---browser support))
❖ Errors (0-F(15)) ➢ Bitmaps
➢ Data source error ▪ Pixel
▪ Color depth
➢ Transcription error ❖ Word: natural unit of data used by a comp. ▪ Resolution (ppi)
▪ “1” -> “i” ➢ Word length (16, 32, 64 bits) ➢ Vector (wmf, svg +(24-bit color
➢ Transposition error ❖ b
depth)-> interactive animation, audio,
❖ B ❖ 8b
▪ “09” -> “90” ❖ KB ❖ 1024B vid; - need plug-in)
➢ GarbageInGarbageOut ❖ MB ❖ 1024KB ▪ Objects (shape location defined by
❖ GB ❖ 1024MB mathematical formulas)
❖ TB ❖ 1024GB
• Shape, line, string of text
❖ Data ctrl
➢ Data verification (match data source) ❖ Unsigned/ signed
❖ Audio (WAV, MP3)
▪ Double data entry (DB) ➢ Two’s complement
➢ Bit resolution
▪ -ve: flip bit (One’s complement) ->
▪ Input data twice (same person) ▪ Number of bits used to represent the
+1 amplitude of audio signal
(FORMS)
• Adv: high accuracy ➢ Sampling rate
• Disadv: high cost ❖ Overflow error ▪ Number of samples taken each second (Hz)
• Usage: important data: pw ➢ Result outside the range that the digits ➢ Stereo / mono
➢ Data validation (reasonable data) can represent ▪ 2 streams (1L1R)
▪ Field presence check ➢ 2 no. of same sign + -> result of opp.
▪ Field length check Sign ❖ Video (MP4 -> can, AVI -> X HTML5
➢ Opp. sign-> X overflow support, subtitles, streaming)
▪ Range check
➢ Frame rate
▪ Fixed value check ❖ Character coding systems ➢ Frame size (resolution)
▪ Format check (HKID) ➢ ASCII (7-bits) [alphanumerical + <>…] ➢ Fps
▪ Type check ▪ All OS ➢ Duration
▪ Check digit (- transposition) ▪ Only English
▪ Parity (+ X transposition) ➢ Big5 code (2 bytes) [traditional Chi.] ❖ Analogue vs Digital
➢ GB code (2 bytes) [Simplified chi.] Easy to edit
• Odd / even (1: X)
➢ Unicode (UTF-8)(1-4 bytes) {code Avoid damage
▪ Control total points} Loss of quality
❖ Direct & sequential access ▪ Supported by newer OS only during
➢ Low cost per storage unit digitization
➢ Secondary storage || Backup
Continuous discrete ➢ Printer ❖ Table of content -> set headings -> create table of
signals ▪ Network printer contents
➢ Monitprs ❖ Footnote
➢ Speaker ❖ Index (alphabetical listing of keywords and
➢ Microphones associated page numbers)
➢ Scanner
❖ Digitization
➢ Sampling ❖ DOCX, RTF, HTML, PDF, TXT (cross-
CH6: Word Processing platform) hv encryption
▪ Cont’ to discrete
❖ Font (style->preset formatting)
➢ Quantization ➢ PDF can embed video, animation
➢ Typeface
▪ Convert attribute of each sample data Column: less words in every ❖ Can have hyperlink to other files
➢ Font size
into digital code using a predefined line-> less chance to skip lines
➢ Font style
scale
▪ BIU 2 pages with diff. orientation: CH7: Spreadsheets
➢ ADC, DAC (audio)
➢ Effects section break ❖ Sheet1!A1
➢ Scanner (image)
▪ Resolution
▪ superscript, subscript, strikethrough, emboss, ❖ <>, <=, >=
shadow, outline, hidden ❖ $: lock -> absolute cell reference
▪ Color depth
➢ Color
▪ Color model (RGB, Greyscale…) ➢ Chara spacing, kerning (spacing between
▪ Compression ❖ Goal seek
particular chara) ➢ Lock output, find input
➢ TV tuner card (video) ❖ Paragraph level ▪ Set cell to “” by changing cell
➢ Tap stop ❖ Scenario manager
CH5: Intro to office automation ➢ Indentation
❖ Increased productivity
➢ Lock input to some values, show
▪ Hanging summary options
❖ Better data management drop cap
❖ Better commu • Uiopusdajdkbfbu ➢ Create and save diff. sets of scenario
❖ Reduce expenses Jowauwgvndkajv ▪ Changing cell to “”
Bvdifgqieugiv (new para)
❖ Software Ggowrgggwribwrbb ▪ Resulting cell: “”
➢ Word processor rgwjwrinwo ❖ Pivot table
➢ Spreadsheet ▪ First line ➢ Cal, summarize, analyze data
➢ Database software ➢ Alignment ▪ Compare, see patterns and trends
➢ Presentation software ➢ Line/ para spacing ▪ SUM(), AVERAGE()
▪ Self running presentation ➢ No. of lines / page ➢ 2D/ multilayered
➢ Commu software ➢ Row, column, value
➢ Image editing software ❖ Word wrap
❖ Hardware ❖ Wrap text
➢ Keyboard
❖ Leftmost digit is 0-> X number-> TEXT
➢ Mouse ❖ Spelling and grammar checker ➢ 0008(text)-> 8(number)
▪ Precision > touchscreen
ABS -3-> 3 || 2->2
INT Round down Queries Extract data using sql 2. Select chart type
ROUND (---, d.p.) || round off Forms GUI to input data 3. Select data (cells involved)
SQRT +ve sq. root [-ve-> +simplify 4. Enter title, axis, labels, legend
#NUM!] +reduce error
RAND 0<=x<1 Reports Present and display data in better ❖ Bar, pie, line, scatter, stock
RANK (cell/ no., range, layout
desc:0/ asc: non- Spreadsheet Database CH11: System unit of computer
zero) -Small data size -easier data validation
AVERAGE MAX
system
-charts -sql (data extraction)
MIN SUM(IF) Simpler filtering -better reports -> ❖ CPU <- bus -> motherboard
COUNT(A)(BLANK) unified format ➢ Fetch (instruction in RAM) -> decode ->
(IF) (halt ->) execute
CH9: software suites ▪ Clock rate [Hz]
IF(----, true.., false..) FIND(“lo”, “hello”, • 5GHz
2(start serach no.-> Object linking Object embedding
+ content updated - Large file size 5*10 to power 9 instructions/
return no. still start
automatically s
at 1 ))
VLOOKUP &, LEN, LOWER, - X access ▪ Word length [32/64-bit]
UPPER, PROPER, when original ▪ No. of cores/ processing units
TRIM(extra spaces), file is ➢ Upscale/ downscale
CHARA felocated • Downscale ++++ CPU power
LEFT, MID(text, start TEXT, VALUE Dynamic link Have to take avg color
no., no. of chara), between original file ➢ Cooling system on top
RIGHT and the copy in ▪ Virtual memory -> X improve
master file computational power
CH8: Databases ❖ Mail merge (2 files involved)
• 2nd mem addressed as if it were
➢ Can filter and sort fields
❖ Primary Key main mem
1. Compile template in word processor
➢ Non null Physical mem < real can use
2. Mail merge -> use spreadsheet / db
➢ Unique • X cloud storage
as data
❖ Input mask Paging-> segment of mem
3. Insert fields in spreadsheet to word
➢ Data validation • - disk thrashing
documents
❖ Empty field in record still returned in SQL Hard disk overworked by
4. Export results
-> just empty moving data between system
CH10: Present Information mem and virtual mem
Table Datasheet view (table), design • + more processes can be run
Excel chart
view (show data type of each ▪ ALU
field) 1. Chart wizard • X store logic results
• Results stored in accumulator • High data transfer rate > main ▪ Save time to access slower main
Compare 2 numbers -> mem’s rate mem
subtract -> status register • Memory unit in CPU ➢ Faster data transfer rate than RAM
(sign) + accumulator = result ➢ Lower computational power ➢ Can’t be too large
of ALU ▪ + - power consumption ▪ High cost
▪ CU ▪ + - heat / simpler cooling system ▪ CPU design can’t use up large cache
• Track sequence of instructions to ▪ + lower cost size
be processed ▪ + smaller (2010-CE-CIT-2B-Q1) ❖ Bus system
▪ Register ➢ Pipelining ➢ Data, control, address bus
• GPR ▪ Divide instructions in modules -> +1 ▪ Data & instructions
AX: accumulator instructions/ time (2005-CE-CIT-2B- ▪ source/ destination address
BX: base register Q3a) ▪ direction of data transfer + timing
CX: counter ❖ GPU ▪ bus width usually = data bus
➢ Graphics rendering • address bus < data bus
DX: data register
➢ Graphics card specs ▪ Specs : bus width
• Control register
▪ Memory ➢ Physical wiring
IR: instruction register
• Affect computation power (2012
PC: program counter
HKASL-CA-1-Q3b) CH12: I/O devices
➢ Memory address of next
❖ RAM ❖ Optical Character Recognition (X 100%
instruction to be executed
➢ SRAM accuracy) + scanner
▪ copy instruction to
▪ Frequently used data ❖ Scanner, camera, microphone, sound card,
MAR
➢ DRAM MIDI keyboard, barcode scanner, joystick
▪ CU read instructions
▪ Main memory
to main mem via ctrl
➢ Primary mem faster than 2nd Barcode QR-code
bus (fetch)
▪ Accessed by CPU directly Storage - +
▪ Data bus to MDR
➢ Volatile: can be overwritten capacity
MAR
➢ Storage - =/= slow program run Data type - +
➢ Address of memory / numbers chi, pics
❖ ROM letter
location to transfer data to Scanning horizonal Any (as
➢ Permanent info supplied by
or get data from orientation long as eyes
manufacturer
MDR (three
❖ Secondary storage
➢ Data to be written into or outermost
➢ SSD
read largest
▪ High data transfer rate
• Status register squares) X
❖ Cache mem
Zero, sign, parity, carry, damages)
➢ Data frequently, recently used by CPU
overflow flag
Error - + ➢ Color depth ➢ Register > cache > RAM > SSD (OS:
correction ➢ Speed (pages per minute) frequently used) (+ low power
Store more consumption) > Flash memory > Hard
data (e.g. adv disadv
disk
contact Dot matrix Multipart Low quality
❖ Hard disk -> rpm
information, forms Low speed
Noise ➢ Store program data
URL -> ❖ RAM ****
reduce input inkjet +++ colors Low speed
Ink has to be ➢ Video editing
error)
replaced ❖ Flash mem (- storage capacity << hard disk)
❖ Virtual keyboard vs physical
regularly ➢ Light in weight
➢ Peripherals
laser High speed Replace toner ➢ Small in size (portable)
➢ Physical space
Gd quality regularly ➢ Anti-shock
➢ Speed
Thermal Quiet Only B&W ➢ Low power consumption
➢ Screen space
Fast Printouts ➢ quiet
➢ Customizable buttons and keys Small might fade
❖ Mouse vs touchscreen X ink/ toner
➢ Hand-eye coordination CH14: System and application
➢ Ergonomic design CH13: secondary storage software
➢ Pointing precision ❖ User <-> AS (UI) -> SS -> hardware
• Store OS, data, system and application
❖ Visual display ❖ AS: users to perform tasks
software
➢ Resolution ➢ Presentation, word processor….
❖ Random (both) VS sequential access
➢ Refresh rate ➢ Written in high level language
• Magnetic tape
➢ Dot pitch ➢ Run on platform provided by SS
❖ Volatile VS non-volatile
▪ Vertical distance between each pixel ➢ Interact with users
▪ sharpness ❖ Rewriteable?
➢ Specific purpose software used by users
➢ contrast ratio ❖ Data transfer rate
to perform specific tasks
▪ brightest vs darkest ➢ Read and write speed
❖ SS: coordinator between AS and hardware
❖ Direct access by CPU?
➢ OS, driver programs, utility programs
➢ SSD (can’t) vs RAM (can)
❖ Output ports ➢ Low level language
RAM ROM Flash Cache
VGA DVI HDMI DisplayPort mem mem ➢ Maintain system resources for AS
video Y Y Y Y Volatile Y N N Y ➢ Interact with AS
audio N N Y Y
(switch ➢ General-purpose software used for
off -> X)
quality low high rewritable operating computer hardware
Y N Y Y
❖ Printers (may need device drivers-> tell OS temporary BIOS ❖ UI: command line, GUI, menu-driven
how to manage or control printer) ❖ Hardware: CPU, GPU, display card, RAM,
➢ Resolution (DPI) ❖ Data transfer rate comparison storage
▪ Reorganize the segments of files to Batch Collect and accumulate
❖ OS (manage hardware and resource) shorten access time -> store files processing tasks for a period of time ->
➢ Mem management/ allocation continuously perform all together
➢ Device configuration ➢ Program uninstaller Online Respond to incoming
➢ Network management (record network ➢ Backup utility interactive requests from internet
traffic) ➢ Data recovery - respond as early as
➢ File management ➢ File manager possible
Real time Receive info and act
➢ Manage comp. resources ➢ Anti-virus software
immediately
➢ Control of processes ➢ File compression
- respond as early as
➢ Some measures of network security ➢ Disk scanning possible
▪ Bit size -> affect number of memory ➢ System monitoring Single-user 1 user/ time
locations addressed ▪ Performance….. Multi-user +1 users/ time
➢ - power consumption ❖ Driver program Single-task 1 task/ time
▪ System/ monitor/ hard disk standby ➢ Allow peripheral device to comm with Multi-task +1 tasks/ time
mode (2010-CE-CIT-2B-Q1) comp system Parallel Process divided into
➢ X in ROM processing different portions ->
▪ Easy update CH15: Computer systems executed by different CPUs/
➢ In ROM ❖ Compare physical size, power consumption, cores at the same time
▪ Prevent user from modifying OS computational power, storage capacity, I/O Distributed More than one computer
➢ Smartphone OS vs Desktop processing interacts with each other
devices
▪ Lightweight through a networked (=/=
❖ Personal computer (microcomputer)
▪ Less mem. internet) environment
➢ Desktop -> have network card =
➢ User Interface Network computer
▪ Allow comp to run AS ➢ Notebook
Single-user -> - Multi-user ❖ Minicomputer
CH16: Networking and internet
less T to load ➢ Medium scale companies basics
(mobile phones) ❖ Mainframe computer ❖ LAN vs WAN
1 user /time ➢ +++ I/O device, database ➢ Geographical coverage
Single-tasking Multi-tasking
▪ Institution, gov
1 program /time LAN WAN
❖ Supercomputer
Multi processing Wifi, Twisted pair Optical fibre,
➢ Complex math
Support +1 CPU cable (UTP, STP satellite, microwave
▪ Weather forecast, aerospace
(have metal
research shielding))
❖ Utility program
▪ Can be a network of +++ Connect Connect LANs
➢ Disk defragmenter
microcomputers networking device together
of a room, Switch ❖ Leased line (private) vs broadband
building… (Manage ➢ Guaranteed bandwidth
High speed slower data ➢ + reliability
bandwidth transmission ➢ + stable
❖ LAN between ❖ Network data transfer rate
➢ P2P LAN) ➢ bandwidth
▪ More reliable -> x central Wireless AP Connect devices within LAN
dependency -> 1 peer failure will not through Wifi
Modem Modulate (D-> A) and
CH17: Communication software and
affect network seriously
▪ Share workload -> faster demodulate network data Protocols
between analogue signals and ❖ Send files through internet
▪ X single point failure
digital signals ➢ Email, FTP, P2P, cloud-based storage,
➢ client-server
Repeater Amplify received signals,
▪ high performance computer act as instant messaging software
remove unwanted noise
server to centralize the control ❖ Protocols
❖ Wireless router
▪ Server provide most of the resources ➢ Set rules and formats for data
➢ Router + switch + wireless AP
for clients transmission
❖ Wired communication (interference -,
▪ Usually clients do not share any ➢ TCP/IP
stability +++)
resources 1. [TCP] (sender) divide data into
➢ UTP/ STP cable
▪ Centralized control packets
➢ Telephone lines
▪ Better security 2. [IP] give destination IP address to
➢ Coaxial cable (TV)
❖ PAN each packet to route the packets
➢ Optical fibre
➢ Connect personal/ mobile devices 3. [IP] choose best route (different path
➢ Network cables
▪ Wifi, Bluetooth, NFC, RFID to avoid congestion)
▪ Communication links between nic
• Airdrop 4. [TCP] (receiver) reassemble data
and switch
First Bluetooth then wifi packets into single file
❖ Wireless (flexible number of connections)
➢ HTTP
➢ NFC
❖ NIC ▪ Hypertext doc
➢ RFID
➢ Manage data sent and data received ▪ Web mail
➢ Infrared (easily disturbed by obstacles)
through network cables ➢ FTP
➢ Bluetooth (- power consumption)
➢ Each card have a unique MAC address ➢ SSL
➢ Wifi (+ power consumption)
set by manufacturers ▪ Secure data transmission
➢ Mobile phone network/ cellular network
▪ Identify devices in LAN ➢ SMTP
▪ LTE, HSPA, UMTS, EDGE, GPRS
▪ Send email
Router 2 LANs / LAN <-> WAN ➢ Satellite
➢ POP
Bridge 1 LAN segment to another ➢ Microwave (affected by weather)
▪ Download email to client
Hub Multiple devices within LAN ▪ X cable limit
▪ Read and delete email
▪ + flexible number of connections
➢ IMAP • com, edu, gov, org ➢ MM delivered and consumed in
▪ Access mail box on server X • country code: hk, se…. continuous manner from a source ->
download downloaded to RAM -> view -< deleted
▪ Synchronize email when user read CH18: Internet service and + - waiting time (X download entire file)
email with different devices + save storage space
▪ Reorganize email and put to different
applications - viewing may not be smooth due to
folders ❖ Search engines unstable network connection
▪ Receive email ➢ Spider o not related to duration
➢ Email server ▪ Search, extract and index ➢ bandwidth
▪ Transferring agent (Hotmail -> information from webpages ❖ cloud computing
gmail) ▪ Return information upon users’ ➢ delivery of computing services over the
▪ Delivering agent requests internet
❖ IP • Update search engine index ➢ high flexibility
➢ Unique ➢ Use relevant keywords ➢ high availability
➢ At least 32 bits (IPv4) -> 128 bit (IPv6) ▪ “” ▪ backup service
▪ Wildcard ▪ possible data recovery
❖ MAC address ❖ WWW ▪ distributed processing
➢ 48-bit ❖ BT program • 1 server down -> still have
➢ Assigned to NIC ➢ X necessarily faster than downloading service
from the server ➢ - depend on internet connection
❖ URL ➢ Legal if X pirated data involved ➢ - security risks -> data stored in third-
➢ Unique path to internet resource ➢ + host downloading file party server (managed by their staff)
❖ DNS ▪ Speed +++ ❖ E-learning
➢ Translate domain name to IP address ❖ Email ➢ Submit assignments-> immediate
▪ Purpose to locate network services ➢ To: expect actions in response feedbacks
and devices worldwide -> LAN does ➢ Cc: received email for info ❖ E-commerce
not need DNS ➢ Bcc: hide recipients’ email address ➢ B2B
➢ Provided by ISP ▪ Cross-platform (cross-OS…) ➢ B2C
▪ Domain name ▪ Can add descriptions to attached files ➢ C2C
• Meaningful ❖ Streaming technology
• Easy to rmb ➢ wmv, rm, mp4, wma, aac, mp3 CH19: Intro to HTML
• Need registration ➢ downloads/ buffers a portion of the ❖ Hypertext
content -> short wait time ➢ Allow hyperlink
• X occupied by others ❖ Markup
▪ start to play the content before entire
• X invalid symbols ➢ Additional properties
file downloaded/ transmitted ▪ Font, style -> <B>
▪ TLD
❖ Editor
➢ Text editor (notepad) ➢ Calendar box 1. Endless loop
▪ Available in all OS ➢ Radio button (one option, cannot 2. Unexpected results
▪ More concise unselect) b. Data validation
➢ Web authoring tools ➢ Checkbox (multiple selections at once) i. Fixed value/ range check
▪ WYSIWYG ➢ Dropdown list prevent run-time error
▪ Instant preview ➢ Multiple select list c. Test case (boundary)
▪ Templates ▪ Data validation d. Stubs
▪ Built-in tools/ function i. Lines of codes that take
➢ Web content management software CH21: Problem solving procedures place of another component
❖ <HTML> 1. Problem identification during testing
➢ <BODY> 2. Problem analysis 6. Documentation
➢ </BODY> a. Problem -> modules/ sub-problems a. User manual
❖ </HTML> i. Divide and conquer i. Non-technical
❖ <b><i><u> b. Program manual
❖ <font face= color= size=>
b. IPO requirements
❖ <h1> >>>> <h6> 3. Algorithm design i. For programmer
❖ <!—ignored -- > a. Flowchart or pseudocode
❖
❖
<ol> <li> </li> </ol>
<ul> </ul>
4. Develop solution CH22+23: Algorithm design (I+II)
❖ <table> <tr> <td> </td> </tr> </table> a. Top down ❖ Algorithm: finite step to solve problem
❖ <img src=> i. Divide and conquer Start/ end
❖ <a href=> </a> X <- Y+1
ii. + small and manageable
modules
CH20: Web authoring b. Bottom up
Input /
Output
1. Planning
i. Existing modules to build ❖ I/O requirements
a. Intended audience
b. Objective solution for a large problem ➢ Data type, format
c. Info structure ii. + - time needed
d. Content and layout
5. Test and debug ❖ User interface
i. Font size
ii. Color scheme a. Errors ➢ Text readability
iii. Languages available i. Syntax ▪ Dark text light bg or vice versa
iv. Navigation
1. Error message in ➢ Contrast!!
v. MM
2. Authoring compiler ➢ Form field validation
3. Publishing and testing ii. Run-time ▪ Indication of required fields
a. Broken hyperlinks
b. Outdated contents 1. Error when running • Asterisk
c. Long response time program • Grouped
❖ Input types a. /0 ▪ Warnings
➢ Text box b. sqrt(-ve) ➢ Better
➢ Multiline text box iii. Logic wordings Decision
on
▪ Unclear abbreviations • CASE i OF ▪ Cover whole range of allowed data
▪ X redundant • Value: statement; …. ▪ Improper entries
➢ Location, alignment of fields • ELSE ▪ Can test every branch
➢ Appropriate use of form tools • END CASE ▪ Boundary case (critical values
▪ Radio buttons, menu, list ➢ Iteration (Looping) affecting result of condition check)
➢ Worked example ▪ Pretest
➢ Consistent GUI • Condition checked before loop CH25: Equity, work and health issue
▪ Icon size ▪ Posttest ❖ Info literacy
▪ Layout • Run a least once ➢ + free access to vast amount of up to
▪ Menu date info
*Retrieve user input
➢ Accessibility ➢ - info can be unreliable
▪ For-loop (pretest)
▪ Screen reader (audio aid) ➢ - addictive
• FOR i <- 1-10
▪ Large font (visual aid) ❖ Digital divide
….
• Adjustable size ➢ Age, gender, education level, income,
• NEXT
➢ Fixed path of navigation within an location
Javascript
interface ➢ Disabled
➢ for (i=0; i<=7; i++)
➢ Different version for different users ▪ Braille reader, printer
▪ (exe once before loop,
➢ Appropriate system message ▪ Voice recognition
define condition, exe
➢ Consistent ❖ Telecommuting
after code block exe)
❖ Data types ❖ Video conference
▪ While loop (pretest)
➢ Integer, real, character, Boolean (T/F)
▪ Calculations • + can dk no. of iterations needed
❖ RSI (repetitive strain injuries)
• Numeric • WHILE
➢ Carpel tunnel syndrome
▪ Leading zeros -> string BEGIN
▪ Take break every hour
❖ Data structure ➢ …
▪ Stretch muscles
➢ String (1D array of characters) END ❖ CVS (computer vision syndrome)
➢ 1D array ▪ Do while loop (posttest) ➢ Dry irritated eyes
▪ Repeat until (posttest) ▪ Take break every hour
❖ INPUT , OUTPUT, A <- B+C, SQR, SQRT, ❖ Linear search ▪ Anti-glare screen
MOD, ^, +, -, *, / ❖ Binary search ▪ Suitable brightness / environment
❖ Control structures ❖ Modular approach ++ ▪ Monitor distance
➢ Sequence ▪ Night shift mode to filter blue light
➢ Selection CH24: Algorithm testing ❖ Ergonomic design
▪ Decision logic ❖ Trace and test
• If then (else) endif ➢ Dry run -> trace table ❖ Addiction
▪ Case logic ➢ Test data ➢ Bandwidth limit
➢ Screen time limit ➢ For $ = (disguis
➢ Block apps ▪ + better services cause e as
➢ Notification reminders • Maintenance and tech support ) useful)
➢ (X redistribution) Self Yes Y No
CH26: Intellectual property ❖ Shareware (copyright) replication
➢ Try before buy Attach to Y N Y
❖ Copyright (original work)
other
➢ X registration ▪ Free trial, limited time
program
➢ CONSENT ➢ In-app purchases
(can’t run
➢ May expire ▪ Limited features alone)
▪ Restrict reproduce, sell, duplicate, ➢ Frequent update of features and fixed Automatic N Y N
display and distribute bugs spread (not
❖ Trademark ➢ Can distribute immedia
➢ Distinguish product or service from ❖ Freeware (copyright) te ->
other traders ➢ Totally free slowed
❖ Patent ▪ - limited support down
➢ Legal right for an invention ➢ Unknown developers system)
▪ Formula, method ▪ - X reliable
❖ Design ➢ Cannot distribute or modify ❖ Spread through
➢ Appearance and design of products ❖ Public domain software (X copyright) ➢ Email
➢ Internet
❖ Proprietary software / closed source ❖ Digital watermark ➢ Storage media
➢ X source code when purchasing ➢ Hidden copyright notices
❖ Open source software (copyrighted even ❖ Digital certificate ❖ Spyware
after amendment by users) ➢ Digital code attached to message used to ➢ Hide and look for info
➢ Have source code -> contribute and dev. identify sender and verify message was ➢ X damage
▪ Allow use, modification and not altered during transmission
redistribution of software ▪ PKI
❖ Adware
• Linux ➢ Track activities
❖ Software license
➢ Single user license CH27+28: Threats and security on ❖ Anti-virus software
▪ One machine/ time ➢ Update regularly
➢ Multi user/ site license the internet (I+II) ▪ Virus signature
▪ Use within a location (school, ❖ Malware ➢ Scan all incoming files
office…) Virus Worm Trojan ❖ Anti-spyware program
(user horse ❖ Firewall
❖ Commercial software action
➢ Filter intruders • Antispam (built in in webmail proxy server -> save time
➢ Prevent spyware client) to download from internet
➢ Prevent info leak • Wrongly identified as spam ➢ Strong password
➢ Log user activity (2022 dse P1B Q3) Put in trust, non-spam list of ▪ Sufficient digits (>=8)
➢ Block unauthorized access email client program ▪ Mix of capital and small letters,
➢ Filter network traffic ➢ Phishing numbers and symbols
➢ Safeguard incoming and outgoing data ▪ Disguise as trustworthy -> get ▪ X same across different sites
through internet or a comp network personal info ▪ Change regularly
▪ Block or allow based on defined set • Check if have valid SSL ▪ Meaningless words
of security rules certificate ▪ Random numbers
▪ Users implement policies and ➢ Eavesdropping
configure ▪ Intercept network traffic ❖ Encryption
▪ Find out properties of data packets ➢ Readable data into ciphered unreadable
• Source and destination IP ❖ Prevention characters
➢ Protect network from online security ➢ Remain anonymous ▪ Symmetric key encryption
threats ▪ Anonymous browsing • Same key for en and decryption
▪ X adware • VPN ▪ PKI
▪ X virus Encrypt data packets and hide • Identity verification
IP address through VPN ❖ SSL (https, lock icon)
❖ Symptoms of infecting malware tunnelIMAP ➢ Public key encryption
➢ Unexpected network traffic • Proxy server ▪ Secured and encrypted
➢ Drastic decrease in computational power communication between user and
Route data packets through
➢ Unusual CPU usage web servers
one or more comp
➢ Users <-> internet ➢ Authenticate server communicating
❖ Data privacy threats ➢ X expose user comp IP ➢ Ensure communication X modified
➢ Hacking (cracking-> illegal) address, only know proxy
▪ Illegal access to data in comp ❖ Authentication
server IP
system/ network ➢ Biometric
Record browsing history
• DoS ▪ Fingerprint, iris, face, voice, hand
Filter indecent websites
• Get info geometry
(Similar to firewall)
• Damage comp data • - personal data collection
Store webpage for caching
➢ Spam • + hard to replicate
➢ One user visit -> temp.
▪ Unsolicited emails ➢ Security tokens
stored -> other users visit
• Never reply -> directly access form
▪ Hardware
➢ SMS
➢ Smart cards, ID cards
➢ IP address ▪ 2. CPU clock rate ➢ Define character set VS define keywords
➢ Digital certificate to facilitate searching
➢ Two-factor authentication ❖ Organize photos
▪ 2nd factor time bounded ➢ Naming of files
➢ folder structure
❖ Authorization/ access control ❖ Single sided DVD-R
➢ Access control list (ACL) ➢ Storage capacity: 4.7 GB
▪ Who, what can be done ❖ FTP: file transfer protocol ❖ Word: page number =/= footnotes
❖ Encoding schemes ➢ Can start from number that is not 1
➢ Extra computation -> computational
General ❖ Compression
power !
❖ Scroll -> see ➢ + maintain folder structure
➢ Storage space ➢ + protect by password
➢ Prefetch ❖ URL shortening
▪ ++++ RAM ➢ X preview before download
❖ RGB ❖ Cloud storage
❖ Hibernate file ➢ 3 primary colors
➢ Sleep laptop -> file still kept ➢ Flexibility to expand storage size
➢ Combine all to create white color ➢ Maintenance of file server from third
❖ Task manager ➢ Monitor
➢ Set app priority parties
❖ CMYK
▪ Affect CPU usage ❖ Domain name vs IP
➢ 4 primary colors ➢ IP
❖ High quality splash screen ▪ Cyan magenta yellow black
➢ e.g. -> Netflix logo after opening the app ▪ - hard to remember due to lack of
➢ Printer meaning
▪ X good for mobile device ➢ Combine CMY to create black color ▪ + not necessary to register and pay
• Consume ++ mobile data ❖ Force users to change password after first
• Need ++ computational power for a domain name
log in ➢ Domain name: X need translation ->
but mobile device – ➢ Personalized
❖ bps -> kbps faster access
➢ X problems from leak of default ❖ DPI too high
➢ x 1000 password
▪ not 1024 for network speed ➢ Printout will be too small
❖ Partial password
❖ power on -> motherboard have power -> ➢ Random position Assembler Assembly level ->
CPU run BIOS -> POST (power on self test) ➢ X hacker record keys clicked machine codes
-> check for memory -> check graphics card ▪ X password leak Compiler High level ->
-> display ❖ Browser (Google) =/= search engine (google machine codes
➢ speed chrome) Interpreter Read code -> exe
▪ load OS -> run start up program -> ➢ Software that retrieves and display web Editor Developer write and
peripheral deivces edit codes
pages VS website to help find webpages
▪ 1. Storage devices speed from other websites
Web server Video sharing platform ▪ File size • Right, left, center, justified,
▪ Corrupted? distributed
▪ Resolution ▪ Spacing
X Provide technical support
▪ Compression format ▪ Indentation
❖ Balance quality and file format ➢ Document
Shutdown Still available ❖ Uncompressed & lossy compression ▪ Size
Reduce workload on providing ➢ 100% same data but different file size ▪ Orientation: Portrait and landscape
streaming service ▪ Margin
CH2: Text ▪ Number of columns
❖ Attributes ❖ Web based vs standalone
CH1: Multimedia Application ➢ Truetype font ➢ Web based
❖ Attributes ▪ vector ▪ Cross platform
➢ Text: font size, typeface ➢ Font ▪ Collaborative editing
➢ Graphics: color depth, resolution, ▪ Typeface (Arial, Times New Roman) ▪ Up to date functions
▪ Website: alt text, title ▪ Serif ▪ No installation
➢ Audio: bit rate, bit resolution • (high resolution printing: visual ▪ - Disconnection: data loss
➢ Video: frame rate, frame size effect of line running along base ▪ - data security
of text -> readability +) ➢ Standalone
Analogue Digital ▪ san serif ▪ X depend on internet connection
Continuous Discontinuous ▪ Better security control
• (low resolution printing: modern,
❖ Digitalization methods -> ADC, DAC
cleaner look) TXT RTF DO HTML PDF
➢ OCR
▪ Fixed width VS variable width C
➢ Scanner
▪ size notepad wordpa MS Web editor Adobe
▪ Resolution (dpi, ppi) d word acrobat
• 1 point = 1/72 inch X Have Have Only Have
▪ Color depth paragrap
▪ Style formattin
▪ Compression ratio (file format) h level
• BIU, strikethrough, superscript, g features
➢ Microphone
subscript X specific X Yes No Cross
➢ Camera
▪ Color app platfor
❖ CODEC: coder/ decoder
▪ Character spacing m PDF
➢ Usually include compression and viewers
▪ Kerning
decompression -> compressed (stored) X Hv
-> decompress (display) • Adjust character spacing -> look
form
➢ X -> cant display equally spaced but actually no
support
❖ Metafile ▪ Highlighting
X Preserv
➢ Bytes reserved in beginning of file to ➢ Paragraph e format
store info ▪ Alignment
when ▪ Rasterization and outline tracing -SWF# WM AI <- vector
printing ❖ Vector (animation) F
-> 24 bit
➢ Lines, fills, arcs color depth
CH3: Graphics ▪ Mathematical formula -> PLUG-IN
❖ GUI ❖ Brightness -SVG*
❖ Compression ratio ❖ Contrast *browser support #streaming support
➢ X:1 ❖ Saturation
RAW: keep most data of image as no
➢ Uncompress : compress ❖ Resize
compression is applied
▪ 0.9 : 1 ❖ Rotate
➢ Run length endoing ❖ Sharpness GIF SWF
❖ Blur + sound effect
❖ Filters + tweening effect
❖ 720p/ i 1080 p/i - X supported by
➢ 720 1080: number of li ex used for the most mobile device
display
➢ P: progressive
▪ Refresh all lines line by line CH4: Audio
➢ I: interlaced ❖ Number of channels
▪ Refresh alternative lines (half) ➢ Stereo, mono
❖ Sample size
BMP JPG GIF* PNG* TIF
* F ➢ Bit used to record 1 sample
❖ Aspect ratio ➢ Bit rate
➢ Width : height 24 bit 24 8 24 24
X lossy lossles lossless loss ▪ CBR
❖ Color depth
compresse s y • Livestream
➢ Full color (not supported by printers) ->
d - Waste bandwidth
dithering
X X have X hav - + storage space
➢ 24 bit: true color animation e ▪ VBR
➢ 8 bit: indexed color X X have Adjustab ❖ Sampling rate (Hz)
➢ 1 bit: B&W transparen le level ➢ Number of sample taken/ s
❖ Color model cy ❖ Adjust volume
➢ RGB [TIFF]vs RAW ❖ Fade in/ out
➢ CMYK Editable format -> no
❖ Trim
▪ Alpha channel: transparency conversion to edit ->
❖ HTML attributes
❖ Bitmap (raster graphics) faster processing
+ no dedicated software ➢ Loop
➢ Pixels
needed to view ➢ Autoplay
➢ Grids upon magnification
➢ Muted
➢ Preload er CH8+9: Design factors of webpages
➢ src resourc
e (I+II)
MP3*# WAV M4A RA# WMA needed 1. Plan and design
# to edit 1.1. Audience awareness
MIDI (- Encapsulated lyrics 1.2. Content purpose
file size) Precise editing
2. Producing
- MIDI - X human voice
code - quality depend on sound system
CH6: Animation 3. Testing
- cross platform ❖ Frame 4. Publish and maintenance
➢ Frame size
CH5: Video ➢ Color depth
➢ Frame rate
❖ video standard
➢ Keyframe
➢ PAL, NTSC, SECAM
➢ Tween frame
❖ Frame size
▪ Motion tween
➢ Resolution of individual frames
▪ Shape tween (morphing)
▪ 1080p (1920 x 1080)
▪ 720p (1280 x 720) Flash movie Animated GIF
❖ Color depth vector bitmap
❖ Frame rate (fps) - File size +
❖ Duration Interactivity X
❖ Edits Streaming (Y) N
❖ Site map
➢ Filters Browser plug-in (Y) N
➢ A
➢ Titles
▪ 1
➢ Subtitles
▪ 2
➢ BGM CH7: integrated MM production ▪ 3
➢ Transition 1. plan and design ➢ B
▪ Page peel, fade 1.1. audience awareness ▪ 1
1.2. content purpose ▪ 2
AVI MPG4 MOV WMV
X Yes Y Y 2. producing ❖ Root folder
streaming 3. testing ❖ Header
X plug Need 3.1. compatible with delivery program? ❖ Navigation buttons
in plug- 4. Delivering ❖ Footer
in ❖ Frames
-more Less ➢ 1 browser window
comput ▪ Split into smaller windows
➢ - X printer friendly ▪ Screen reader ➢ CascadingSS, font, font size, styles,
➢ - difficult to be indexed • Alternative text color and bg settings
❖ Color scheme • Separate text only version ▪ <FRAMESET rows=”” cols=””>
➢ Warm / cool Straight paragraphs ▪ </FRAMESET>
➢ Analogous X tables ▪ <FRAME src=””>
➢ Complimentary ➢ Appropriate color combinations ▪ Different browser interpret CSS
❖ 24 bit -> 8 bit color depth ▪ Contrast differently
➢ Dithering ➢ Full keyboard access • Different position of element
▪ Blend 2 colors to be a 3rd color ▪ Navigate UI with keyboard • Consistent format or better layout
• Simulate + colors • X need mouse/ trackpad • Change layout of website to suit
➢ Web palette ❖ Have to consider time for loading webpage different os/ browsers/ device
▪ 216 colors specified -> X dither ❖ Responsive web design • Enriched formats or styles
❖ Appropriate use of MM ➢ Element of webpage resize or rearrange • External style sheets
➢ Image automatically with respect to available
▪ Bg window size ❖ Form (can be in table)
• X complicated patterns ➢ Form actions
Seamless background -> tiled CH10+11: Using web authoring ▪ mailto
• + color contrast with foreground • submit clicked -> form action
text
tools (I+II)
sent to server side
➢ Details of downloadable files ❖ Lists
• enctype
▪ File size, format, user rating, ➢ Unordered
encoding method of form
publisher, publish date ▪ <ul>
data
❖ Interaction ▪ <li> hihi </li>
➢ <FORM>
➢ Rating, feedback ▪ </ul>
▪ <INPUT type=”reset/ submit/ text/
❖ Hardware constraints ➢ Ordered
checkbox/ radio” name=”” size=””
➢ CPU ▪ <ol>
value=”submit (text in button)”>
➢ Bandwidth (+ -> stable network) ▪ <SELECT name=”country”>
▪ MM require storage space, ❖ Tables
• <option value=”Sweden”>
computational power ➢ <TABLE border=”1” width=”200”>
Sweden </option>
❖ Platform compatibility ➢ <tr>
▪ </SELECT> -> drop down list
➢ Browser and plug-in compatibility ▪ <th></th> -> header / <td
➢ </FORM>
❖ Language compatibility colspan=”” rowspan=”” ></td>
❖ Display message
➢ Character set ➢ </tr>
➢ Pop-up window
❖ Web accessibility ➢ </TABLE>
▪ + grab attention
➢ Visually impaired ❖ Style sheet
▪ - maybe blocked by some browsers
▪ Braille characters ➢ Consistent look on web pages
▪ Attributes - Reveal + security }
• Position instruction - longer
• Resizable code response
• Size time Onload, Onclick, Onmouseover
- + server
• Scroll bar ❖ menus
workload
• Title bar ➢ jump directly to specific web pages
➢ (Status bar) JavaScript ➢ click to expand
❖ Publish website ➢ 2- level independent select list
❖ + - * / %(remainder)
➢ Web hosting service ▪ 1. Select list
❖ = = / !=
➢ Register domain name ▪ 2. Of 1.’s option
❖ >/ </ >=/ <=
❖ <MARQUEE direction=” up/ down/ left/ ➢ X GIGO
❖ &&/ ||/ !
right”> ▪ Validate inputted data
❖ var m(letter / _)yName =”Hi” ;
➢ Scrolling area of text ▪ Error message
➢ local f(x)
❖ <BLINK> ❖ Cookies
▪ used only in function
➢ global ➢ Store user info on client side
▪ used within <SCRIPT> ▪ Small text file stored
CH12+13+14: Dynamic and ▪ * shopping cart
interactive web pages (I+II+III) IF (mark >= 50) { ▪ Language preferences
❖ Image map document.write(“pass!!”); Document.cookie = “name= expires=
➢ Clickable area of image to hyperlink Sun, 1 Jan 2012 12:00:00 GMT;”
} else {
➢ Area select by coordinates
❖ Changeable content Document.write(“fail”);
➢ * user input
❖ Client server model }
Client -- request → server
response--
Program Exe on SWITCH(Apple){
exe in client server side case”1”:
side
1. Request Client side document.write(“One”);
2. Server for display
search break;
3. returned default:
to client
4. exe document.write(“apples”);