📚

Lecture Notes on ICT Theory and Applications

May 7, 2025

Lecture Notes on Theory Paper Discussion

Introduction

  • Lecture by Nicholas from Cyprus focusing on a theory paper (202023 June paper one).
  • Aim: Not just solving the paper but covering the theory on topics related to questions.
  • Encourages audience to engage (like, subscribe).

ISBN Number and Data Types

  • ISBN: International Standard Book Number, unique identifier for books.
  • Data Types: Options include numeric/integer, text, boolean, and date.
    • Chosen type: Text since ISBN can have numbers and letters (e.g., 'X').
    • Not suitable as numeric/integer due to letter presence.
    • Text is preferable for non-mathematical, long numbers.

Identifying Hardware

  • Keywords for identification (e.g., volatile memory, CPU on PCB).
  • Volatile Memory: RAM (Random Access Memory), loses data when powered off.
  • Motherboard: PCB with CPU and components; essential for device operation.
  • Graphics Card: Controls monitor output; can be basic (on motherboard) or advanced.
  • Network Interface Card (NIC): PCB for network connection.

Communication Methods for File Upload

  • Questionable use of term "communication methods".
  • Suggested methods:
    • USB connection to computer.
    • Upload via cloud/Wi-Fi.
  • Criticism of confusing question wording.

Purpose of Web Browsers

  • Web browsers interpret HTML, CSS code, and display web pages.
  • Allow user interaction with web pages.
  • Avoid using brand names in explanations.

Internet vs. Extranet

  • Internet: Global access, public.
  • Intranet: Restricted to organizational access (e.g., internal hospital data).
  • Extranet: Extends intranet access to specific external parties.

Safety Issues in ICT

  • Focus on physical safety and ergonomic issues:
    • Trailing cables, food/drink near equipment, poorly placed items.
    • Overloading electrical outlets can cause fires.
  • Health issues from ICT usage: RSI, back/neck pain, eye strain.

Password Security

  • Attributes of a secure password: length, varied characters, no personal info or sequences.
  • Discussion includes drawbacks like memorability, entry time.

Two-Factor Authentication

  • Biometric methods: Fingerprint, face recognition.

System Life Cycle

  • Stages: Analysis, design, testing, implementation, documentation, evaluation.
  • Analysis methods: Observation, interviews, questionnaires, document analysis.
  • Implementation methods: Direct changeover, parallel running, phased implementation, pilot running.

Cloud in Software Development

  • Sharing documentation via cloud allows collaborative editing, syncing.

Video Conferencing

  • Advantages: Accessibility, reduced travel.
  • Disadvantages: Equipment cost, internet dependency, timezone issues.

Automated Data Entry

  • OMR vs. OCR: OMR reads marks, OCR reads text.
  • OMR uses: Multiple-choice testing, voting ballots.

File Path Differences in Web Design

  • Absolute vs. Relative Paths: Absolute uses full path, relative uses current directory context.

HTML Anchors vs. Hyperlinks

  • Anchor: Specific location in a webpage.
  • Hyperlink: Link to a webpage, URL, or anchor.

Dialog-Based User Interfaces

  • Used for hands-free interaction (e.g., car audio systems).
  • Benefits: Safety while driving.
  • Drawbacks: Requires training, background noise issues.

SSD vs. HDD

  • SSD Advantages: No moving parts, energy-efficient, faster.
  • HDD Disadvantages: Moving parts, less portable, energy-demanding.

Media Streaming

  • Media played in real-time without full download.
  • Requires stable internet, no offline access.

Image File Formats

  • JPEG: Lossy, high color depth.
  • GIF: Lossless, supports animation, limited colors.
  • Methods to reduce image file size: Lower resolution, reduce color depth.

Data Entry Error Reduction

  • Proofreading: Manual check after entry.
  • Verification: Double entry or comparison.
  • Validation: Automated checks during entry.