Transcript for:
Lecture Notes on ICT Theory and Applications

Hi everyone, Nicholas here from Sunny Cyprus and welcome to today's tutorial. This is the first recording I'm doing on a theory paper. This is 202023 June paper one. Now I was saying I wasn't going to do theory papers and the main reason is you know it's just me answering the questions and you've got the mark sheets anyway. But then I thought well how about I extend it beyond just doing the paper and going over the topics which the questions are about. So this isn't me just solving the paper. This is going to be a long tutorial. This is me answering the papers but before answering any of the questions I'm going to be covering the material the theory on that topic which the question is based on. So there's a lot of learning here. There's a lot of material here for you and this is something that you guys have been asking for for quite a long time. So, I'm hoping this one's a success. It's useful for you. And if that's the case, I'll be making more. And you know the drill. If you do like it, you do learn something new. Make sure you like, make sure you subscribe, and make sure you're on your path for an A star. Okay, so let's begin with question number one. A book has an ISBN number which is 330247204 capital X. Uh we pay attention to that capital X there because that's a letter. The rest are numbers. Uh you're supposed to take the most appropriate data type for the ISBN. Now what is the ISBN? It's an international standard book number. It's like the serial number that we have for devices or a model number for a device. I would I'd rather go for model number rather than serial number because um all devices of the same model have the same model number. And that's the same with the books. Um if you get the the exact same copy of a book, the ISBN number is the same. So if you're trying to find a copy of a book, you're trying to find a book and you have the ISBN number, that's the way you can identify and find the book and guarantee that you've got the right book. So the ISBN numbers for every book are unique. Okay. Now, it says here you've got the options numeric or integer, text, boolean, and date. So, what are the data types? When we're working with databases, when we're working, let's say, with Access, and we're importing a CSV file like we do in paper 2 as a new table, the one thing we do is we set the data type. It tells us to make it either text, um, numeric, integer with decimal values, currency, boolean, yes, no field, date field. That's the data type. And we have to choose the right data type otherwise we may not be able to store the data that we want. So in this case this number here this ISBN number is made up of numbers and of letters. So this cannot be an a numeric integer. It's not boolean because boolean only accepts two particular conditions like a yes no field um or true force and it can't be a date because this isn't a date. So, this has to be a text. It has to be a text because it contains numbers and text. Even if that um x wasn't there, I would still go for text value instead of integer because ideally, if you're not going to use a number at any point in time in a mathematical calculation, then we tend to go for text rather than a numeric integer, especially if it's a long number. Okay? But anyway in this case we can see that capital letter it has to be text. Okay let's go on to question number two. Okay here it says identify the hardware from the descriptions given. So let's see all of the hardware first and then we can um have a look and see of identifying them. So we're going to be looking for these key words. Now straight away I can see this keyword here. So, I'm just going to get my highlighter. A volatile. Now, volatile. Uh, just that one word. Straight away, I know exactly what device they want. But you see, it reads a volatile internal memory that stores the current instruction. Then the next one is a printed circuit board containing the CPU. So, it tells us the CPU and other components of a computer. So this is like a PCB, a printed circuit board which has a CPU and other things as well. The next one is a printed circuit board that controls the output to a monitor. So here we're looking at something which is going to be giving data to our monitor, the device, our output device, the monitor. And then the last one is a printed circuit board that it is that is installed on a computer so that the computer can be connected connected to a network. Okay. So these are are basic there's nothing really too tricky here. Let's have a look. So first of all let's have a look at the architecture of a computer. So I've got one here for you. This thing here is known as the motherboard. Now the motherboard is a printed circuit board and whenever they say a PCB they they mean a printed circuit board. It's these boards that have got all these little lines the tracks and where all the electrical signals run through and your motherboard essentially is a PCB. It's a big PCB and we can see here this is where the CPU would go. So, it contains the CPU, but it also has many, many other things that we can connect on the motherboard. In fact, that's why it's called a motherboard. It's just like a baby. If it's not connected to the mother when it's in the mother's womb, then it's not a baby. There's no baby there. It has to be connected to the mother to be part to be alive. And for something to work on a computer, it has to be connected to the motherboard. So, we plug our CPU here. This area here, the these uh long strips here, these two here, this is where we connect what we call our RAM, our random access memory. Okay, the next thing we're going to have a look at is this chip. This is another little printed circuit board. That one there. Okay, that there, that's your BIOS. That's the BIOS, the B basic input output system. Okay. What else do we have on here? Let's just switch to red. So, what else we have is these areas here. This area here, these are the things that we see on the outside of our computer. And these are the peripheral ports. So, this allows us these are Now, these peripheral ports allow us to access or connect things to the motherboard from outside of our desktop, outside of our computer or the laptop. So, we don't have to open it up to plug things in. And we have things like, we can see here a HDMI port. We've got our Ethernet port for our network. We've got VGA cards here. We've got HDMI. We've got USB ports. Okay. We've got our audio and um microphone jacks, um other USB ports. So, we've got a lot of things that we can connect to it. The next thing we're going to look at is this thing, this black connector here, this long black connector here. This is an accelerated graphics port. Okay? And on this AGP, AGP on that AGP there, we connect a graphics card. Now, you're going to say, "Well, there's a VGA port here." This here is actually this one down here. That one there, that's known as a VGA port. And that's what we will connect our monitor to. And for you to be able to see things on your monitor, you have to connect it to the motherboard. And that motherboard has on already installed on here what we call a graphics card. And that would be for basic graphics. If you want more advanced graphics, you need a better graphics card. And you would plug your graphics card inside this AGP port. And that will give you another peripheral where you can connect your device. Especially if you're a gamer, you want high graphics and high frames per second resolution rate. So, you need a more advanced graphic card. So, you'd plug that in the AGP port. But if you don't, you normally have a basic graphic card already installed on your motherboard and that's where you can plug your monitor in. So, we've discussed all the bits and bobs of the motherboard. Let's go and see what we can do with this question. So, volatile internal memory. Okay. Well, we've already discussed, let's just make another blank one here. A new slide there. We've already discussed that we've got on our motherboard, we've got something called the RAM, but we've also got the BIOS. Now, both of these, which is ROM, both of these are classified as internal or in about internal or primary. I know the inking on PowerPoint is not that good. Primary memory. Okay, so this is the primary memory and the type of primary memory that we normally have. This one you don't really need to know, but this is the first one is something like cache memory inside your CPU. So you've got what you call CPU cache memory and this is really fast memory. It's a memory which is stored inside the CPU but that's for knowledge. The other internal primary memory that we have is known as our RAM and the other one is ROM. And then we've got secondary memory or secondary storage devices. And for secondary memory, this is where we have all of our storage devices like hard disc drive, solid state SSD drive. We've got uh the you got CD, DVD. IDs are not that good. DVD. You've got memory cards. Uh USB pen drives. So USB pen drive. I'm just going to put USB and pen drive or pen. Okay, don't just put USB because USB is the style of connector. It's not an actual device. So, the secondary storage devices, this is where we normally store things. Now, RAM, what is RAM? What's it used for? Well, the RAM we said is store is plugged into this area here. Now, RAM itself is essentially known as volatile. Oops. Let me just get rid of that. Ah, I hate inking. Volatile. Okay. Volatile memory, which basically means when you turn the computer off, everything on RAM vanishes. What is its purpose? Well, the purpose is basically to store temporary information or temp data. Now, the reason I'm writing this, I'm not just saying this is because um whatever I write on this PowerPoint, even if it's a big mess, I'm just going to share this with you anyway. So, if it helps you out, then you know, by all means, you can use it. So it's temporary data and this is usually the data used by uh open apps or open software. I'm just going to put open software. So when you open something up uh any kind of uh package then the data and the information which is required for that software to run is stored in RAM. And why RAM? because RAM is much faster than secondary storage. So RAM is much faster than all of these devices here, secondary storage devices. So it's volatile. When you switch a computer off, that memory has gone. Uh its use is basically to store information currently being used by the software that is open or or um data that the user is using right now. Now usually its capacity is large. So you've got large capacity, but it's not bigger than the capacity of secondary storage devices. So, your hard disk drive, your SSDs is going to have a higher capacity than what your RAM has. But RAM has got more capacity than ROM. So, what's the purpose of ROM? Well, ROM is classified as non or read only memory. So this is random access memory. So and the reason it's called random is because when you switch the computer off, everything on it is deleted. And what's inside the memory is always changing. It's random. Every time you open something up, something goes in RAM. ROM is read only memory. It's classified as a nonvolatile, which basically means that what's on there does not get deleted even when you switch the computer off. Think of the term CDROM. When you get a CD ROM, the data on your CD is never deleted. You can't change it. You can't edit it. It's fixed. This is why it's called a ROM. A CD ROM. It's a compact disc read only memory. So, your ROM or I'm going to put here in brackets what we have on our computer. The type of ROM is the BIOS. Its job is to start up the PC. It's got what we call the boot loader. And that boot loader has instructions to start your computer. And one of its jobs is when you switch on your computer, the BIOS starts up and it will check your motherboard to see if you have a secondary storage device connected to the motherboard through one of the internal ports down here. So, these are like your SSD ports where you will connect your hard drive and it will check to see if you got a hard drive on there with an operating system. And if it finds one, then it will pass over the rest of the boot sequence to your operating system. If it doesn't find a secondary storage device with an operating system, then it will tell you there's no hard drive or no operating system installed. So it is the initial startup of your computer before your operating system loads up. Its capacity is very low capacity because you don't need a lot of memory. Low capacity or small capacity. Okay. So it's you only need a very small amount of data. I want to demonstrate RAM to you or random access memory. So the way RAM works and I like doing this because it will give you a visualization of how things work. Think of RAM as a pipe, long pipe. Now when you open a program up, you send an instruction. So an INS, an instruction to the CPU to open a program. So the instruction goes to the CPU and it says for example, open Photoshop. Now CPU will go to RAM because RAM is fast and it will ask have you got the instructions or do you have the files required to open Photoshop and RAM will check inside this pipe do I have Photoshop it says no so if it doesn't have it then what will happen your secondary storage device for example your hard disk drive will then load all the information to open Photoshop into RAM and then RAM will tell the CPU, yo, I got the information you need. So, Photoshop now is loaded in RAM here. Okay. And CPU says when it's ready, okay, give me the information now. And because RAM is fast, it sends that information to the CPU. And on your monitor, you see Photoshop. Okay. Now, if you close Photoshop and you open it again, another instruction, CPU says, "Well, do you have RAM? Do you have sorry, Photoshop?" RAM says, "Ah, yes, I do." Okay, give me the information. Boom. It's much faster. So, the first time we're loading something up, it's much slower because it's got to be loaded from the hard disk drive to the RAM and then from the RAM to the CPU, let's say, or the the CPU is then gets the information. When you open another program up, let's say you open up Access, Photoshop now moves over here and Access is here. And as you keep opening programs, Photoshop will keep moving along. Photoshop was the first in the RAM fi first in. So as you keep opening programs, Photoshop is going to be the first out. And that's where the term FO comes from. First in first out. So let's show let me show you this. If I open now Photoshop and I press enter. Let's count together. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 seconds for Photoshop to load up. Now, that was 20 seconds because it's the first time I open it. I had to load everything from my hard disk drive. Now that Photoshop is inside my RAM, let's see how long it takes. Ready? And 1 2 3 4 5 6 7 8 9 10 11 12 13 for 14 seconds. So that's 14 seconds faster because this time it didn't have to go to the hard disk drive to get the information. All right, let's finish answering this question now because we got this now. So volatile internal memory. Well, we know what volatile means now. We know that volatile basically means something that loses its memory um when the computer switched off. And the only internal memory we have that is like that that is going to be ROM, a printed circuit board containing the CPU and other components of the computer. Well, we've just been looking at that. That's our motherboard because that's where we're going to put or connect all the devices. And it is ah it is a PCB motherboard, a printed circuit board that controls the output to a monitor. Well, we need to connect to the monitor, we need something that's going to drive the monitor, and that's going to be your graphics card. Whether you have you're using the bra the basic graphics card which is on your motherboard or a more advanced one, you still need your graphics card. Okay, so we need a graphics card. The one that we haven't talked about is this one here. Something where a printed circuit board or a PCB that we use to connect to a network. So that's going to be again on our motherboard here. We need we connect. Now, we've already got this device here. Okay, this is our Ethernet port. This one here. And for this thing here to be able to work, there you go. I've got it in yellow there. For that thing there to work, it has a PCB already installed or connected on the motherboard. And it's called a network interface card. so that it can communicate with other devices on the network. It needs to have well basically the hardware and the software so that it can communicate with other devices. And that device in networks is the network interface card. So this one here is going to be your nick. Don't just put nick. I'm just writing the short term. And that's going to be your network interface card. Okay. We're going to question number three. A head teacher is setting up a newsletter to send to parents of pupils at a school. She has some photographs saved on storage devices that she needs to place in the newsletter. State two communication methods. Okay, so let's just have a look. This is a nasty question. say two communication methods which the headteer could use to upload the photographs onto the school network. H okay so here it says the head teacher is getting user to parents of she has some photo saves on storage devices. So these are going to be secondary storage devices and we need to somehow get the information from the secondary storage devices. Things like a pen drive, a USB pen drive, a memory card, an external hard disk drive or an external SSD, a solidstate drive. She's got some kind of storage. Okay. And she needs to get that data, those pictures onto the network. Now, I don't like the word that they've used here, communication methods. That's just wrong. That is very, very, very confusing and that's wrong wording for me. Um, I would prefer state two methods, just the word methods, which the teacher could use to upload the photographs onto the school network. Well, think about it. If you got pictures on your phone or you got pictures on a USB and you want to put them from your USB onto the school network, how would you do it? Well, the one way would be if it's an external hard drive, sorry, if it's an external hard drive, then you will connect it, let's say, with a USB port onto your device and then from there you can copy the files onto the school network. Okay? connect to the school network and and and copy the files there. The other method will be you could have the if the school network is let's say on a cloud computer you could upload the files. So you can connect the files from your storage device and upload them to a cloud network that would also work. So a very confusing question here. Let's have a look and see what they've also got in this uh mark scheme. So the mark scheme here for number three it says connecting a storage device to computer. Okay, using a cable storage device by Bluetooth. Okay, so that's another one we have. And connecting a storage device um cloud by Wi-Fi. So there you could use cloud. You could use Wi-Fi. Again, I don't like this uh question very much, but okay. Um, what can you say? I think the word is is a bit wrong. Um, it says connecting a storage device/cloud by Wi-Fi. Not many devices, you know, connect directly. Storage devices don't really connect directly by Wi-Fi, do they? Um, so yeah, if it's on a mobile phone, then fine, but the mobile phone is not really classified as storage. So very confusing question here. I'm not very happy with this one, but it is what it is. So I I would probably turn around and just quote what I know how I would go about doing things. And you're going to get either the definitely get the one mark, you probably get the two marks if you mention things like upload it to the cloud or you can use Wi-Fi to uh plug it into a device and use Wi-Fi to connect to the school network. Anything like that will get you the second mark. Okay. Number four. Well, describe the purpose of a web browser. Now, this is not a tricky question, especially since you've already done paper three and things should still be a little bit or a little bit fresh in your mind. What is the purpose of a web browser? Well, what did we do in paper 3? We were working with web design. We were creating web pages and we were using HTML code and cascading stylesheets to create the web page and then modify the design of the web page with CSS code. Where what do we use to view a web page? Well, what we use is a web browser. So, I've got here Dreamweaver, one of the um papers opened up here. So, this is the one which was on Bobby's Bricks. Yes, the infamous Bobby's Bricks. And this is when we were creating let's say a web page. This here is the HTML or the hypertext markup language. This is what's inside the document, the HTML document. So when we go to open a web page, what we're doing, we're accessing the HTML document and this document has got this code inside it and this code will also link to this stylesheet which is another piece of script. Okay, some more code. So what's the purpose of the web browser? Well, essentially its job is to interpret the code or read the code of a HTML document or a webpage document and display it to the user as a web page. That's its job. It basically reads the code and based on the code it will display the web page to the user and then the user is able to interact with the web page click on links they can navigate their web page and that's the purpose of the web page. Now do not use brand names. So do not say examples like Google uh Google Chrome, Edge, Safari. Um do not use Firefox. Do not use these brand names because this is not a brand name assessment. It's for you to understand what all of these different things do, what its purpose is. And its purpose is to interpret code like hypertext markup language or HTML code or CSS code and then display the web page to the user. The user through the web browser is then able to interact with the web page. Okay. So I'm going to also explain this one here and then I'm going to show you my answers. The next one, a company may use an internet or an extranet. Describe the differences between an internet and an extranet. All right. So, I've got here in my there we go. The three types of not topologies. So, we're not talking about uh LANs and WANs and um WLANs. The three three types of nets that we have or networks are internet, internet and extranet. And these three terminologies explain to us how accessible a network is or what is the the scope of the network. With an internet, the scope is global. You've got access to absolutely every uh device worldwide. It's a globe. So when you put your network on the internet, then it's accessible by the public or by the globe. An internet is a restricted network. And we can see here this here is the company network inside this circle here. Let's go to red instead. Okay. So, inside this circle here, that's the company network. And there is a firewall here which blocks access from the internet to this internal network. So, the only people that have access to the internet are people within an organization. And the example that I like to use is think of a hospital. All the doctors inside the hospital have access to patient data. Okay. So if we take the internet uh comparison the hospital website where you can go and get the information of the hospital their address probably book an appointment with a doctor that part of the network is on the internet. Everybody can access it and everybody can see that information. Now the information which is only seen internally by the doctors like patient information this information is not made accessible on the internet. It is a private organization or hospital network and it's only accessible by the doctors and the staff at the hospital. That is basically what an internet is. So it's a network with information memos. It could be a bulletin board. It could be something which is um informing staff about what's going on about in the hospital. It could be access to patient information. But it's only accessible this network is only or this portal of information is only accessible within the organization. Now the extranet the extranet is in between the internet and the internet. Okay, it's an internet. But now on the internet, we also allow some other external. So this now here is our internet. Okay. And this internet here will allow some companies access to that internet because they so take personal doctors which are not in the hospital but they've got their own clinics but you are a patient of theirs and you go to the hospital as well. So your doctor has access to that information at the hospital through the extranet which is accessing the hospital's database with patient information. This is a much more secure network because the doctor will have uh special access. He will have to authenticate with a username and password. Probably will have something like a VPN to allow him to connect. Okay. But it's where we allow access to an internet to external people which that company or that organization collaborates with and that will be through security protocols adding more security to give um limited access or authorized access to selected people or organizations. It's not made public. It's the same with government organizations. A government has its own internet in the individual offices but within the government offices they different um offices can have access to that data. The public does not. That's an extranet. So you got internet, intranet and extranet. Okay. Here I've also got a table for you which outlines the differences of the three types of networks. internet, internet, and extranet. And it's got the definition what it is for each one. The type of access. For example, this is public. Oops. This one um internet is restricted and extranet is restricted but with authorized external users, the purpose, the security type which is required. And my example, the hospital example here which you've got. So you got this table here to refer to. Okay. Let's go have a look at my answers for these two questions. Okay. So here are my answers. Uh for the first one, the web browser will read the HTML code contained in HTML document and create the web page for the user to see. The browser allows the user to interact with the web page and navigate it. So I'm using simple language and this why I say a lot of you students where you just use the mark sheet and try to memorize the terminology and the words that are in the mark sheet that's not what they're going for. What you need to do is to show uh that you understand what it is you're talking about what it is that you're answering. So you understand what a web browser is and you can do this in your own wording. It doesn't have to be elaborate wording. Okay. Describe the differences between an internet and an extranet. Well, we've already seen the table. We've discussed this. So, here's my answer. An internet only allows members of an organization access to information and data held by the organization. An extranet is like an internet only it extends its access. I've got here two, but it should be beyond just beyond. Let's just get rid of that. beyond the organization to other authorized organizations or persons which would need access to the data that should be. So let's just put that access to the data. As the extranet gives access beyond the organization, it is more prone to security breaches and that's normal. When we extend access and we give more people access to data, then we're increasing the security risks. Is that two marks? No, it's probably three. But that's fine. I've shown I've understood what an internet and an extranet is and I will get my two marks. Let's have a look at question number five. It says here, state the safety issue that is most likely to occur for each of these causes. And we've got a list of causes. Now the key word here is the safety issue. Now in our theory components, let's say in the chapters, we've got the chapter called safety and security. And then we've also got a chapter on the effects of using ICT. Now with safety and security, security is all about um protecting your access to your data through authentication methods, protecting your data like um preventing people from stealing your identity or getting access to devices or data that they shouldn't be have access to. Safety is about your physical safety, your own safety. And there's actually two components in this. The one is from let's say um silly mistakes that we would do when we're organizing our work or as we're working. And the other one is to do with the way that we work. So if we have a look at this picture here, I I I do like this picture. So this picture here identifies both areas. So here in this picture we can identify some safety issues and we can also identify issues with the way that um people working because of ICT. So let's look at safety issues here. We've got trailing cables. Okay. So cables running across a walkway or pathway or this that the other are very dangerous because somebody can trip over them and hurt themselves. Then we've got actually let's go with red. Then we've got here um drinking next to electrical equipment. That is a risk because it can cause electrocution if you spill your drinks over something which is uh electrical. So you shouldn't have food and drink. Here we've got more drinks here on the desk. That is a no no. Then we've got up here we can see poorly placed items. This actually happened to me in the past many years ago. I had a I had a shelf with many many monitors on there, the big CRT monitors, the heavy ones. And while I was working at the bottom of the servers, that shelf collapsed on top of my hands. Very painful, but I didn't break anything. Um, so placing things which are not balanced properly on the edge of something or on a loose shelf or something like that can um run the risk of it falling down and hurting you. And those are let's say here's another one. Here's a common one that most people do in their homes. Overloading electrical outlets. When we overload the electrical outlets, especially when we go beyond um the capabilities or the physical capabilities of the equipment we're using. For example, if we've got an extension cable which has got six or seven uh plugs on it and we connect things with high power on them, maybe the cable running to the extension um to that uh outlet extension a thin cable. So those cables are going to get very very very hot and could break out into fire. This has also happened. I've experienced this two three experienced this two three times. you know, leaving things or a messy room is also a bad one. Okay, so those are the physical aspects. Now, let's have a look at some bad uh habits we have when we are working because of ICT. This thing here, we've got a hutch back here. He's hunching over, not sitting up straight. So, that's going to cause back problems. His neck here is tilted upwards, so he can be in line with the screen because he's not sitting high enough. that's going to cause neck aches. So, you got backachches and necks there or back problems. Um, overuse too many hours without a break can cause headaches or eye strain. A lot of clicking on the mouse or um having your hands continuously on the keyboard and repeatedly typing non-stop can cause um repetitive strain injury. And you can try this exercise if you want. If you take your hands, put them in front of you, you're going to see that your hands naturally curve inwards. Okay? Now, with your keyboard, you turn your hands outwards. So, already you're going against the natural line of your body or the way your arms should be. Now, if you turn your hands outwards as much as you can, okay? And then lift your hands upwards because you need to raise your hands up to get on the keyboard. And now try typing like this. You're going to feel a lot of strain here. And essentially that's what you're doing. And over a prolonged period of time, you're going to cause problems to your hands and your wrists. It's called repetitive strain injury. So this picture has got a lot of information here. So if we have a look at the safety, we've got things like trailing cables, which we've got here. We want to avoid those especially when they're going past a walkway. Many times people put their charger to their laptop or to their phone and they run the cable across a pathway or a walkway and somebody trips over it. It's probably happened to you at some point. Spilages of drinks on a device can cause electrocution. And with laptops, it can actually cause a fire because you've got a lithium ion battery in your laptop and if that gets wet, it can break out into fire. But usually with drink spillages or having drinks nearby is going to result with electrocution. Overloading extension cables or power outlets. Well, here's the problem. If this extension cable here is rated at 13 amps, and we plug something in which is 5 amps, 5 amps, and then 3 amps, that's you're right on the limit on 13 amps. But let's say you put here, you connect something which is 5 amps. you've got a total of 15 amps instead of 13, that's probably going to blow a fuse. Or if this cable here is not rated for 15 amps and it's only rated up to a maximum of 13, then that means that cable is going to start getting very, very, very hot and could result in a fire. Here's another example of o overloading power outlets. So, you really don't want to do this. It's very, very dangerous. Um, and another reason why you may um end up having a fire or a fire course is overheating of devices. So, if you don't keep things like cooling fans clean, keep your desktop computers, the system unit, you don't keep that clean from dust and allow the ventilation of the air to circulate. Have enough space around the device so the air can flow in and flow out. It could cause it to overheat and your power supply could catch fire. And yes, that has happened to me once in a lab. The other part that we have is essentially the effects of using ICT. And this is what we discussed about the way that we work. So repetitive strain injury is one of them. So when we're repeating the same thing again and again and again and again and again, we're straining those tendons, straining those muscles, and essentially even your eyes when you're focused on something for too long. That's like keeping your arms straight and just holding them there. After a while, your arms are going to be in pain. Well, that's what happens to your eyes when you're focusing for too long on the same distance, then your eyes are going to strain and you're going to end up with headaches at night. So, if you have you are having headaches at night, especially when you're trying to sleep, that's probably the reason why. Um, RSI, so that's repetitive strain. Neck and back pains, we said that's from bad posture by not sitting properly. You need to have the screen at a nice level at eye level. So, you're sitting straight and your back is nice and straight, your neck is straight, and that will prevent um you from hunching down. One of the biggest problems is, you know, people put their laptops on the coffee table and they're sitting there like this working on their on their laptop. Headaches. Again, this could be from eye strain or overuse. You know, turn things like your blue filter on your screen on or get glasses if you wear glasses. So, I have mine here. I have my other glasses. Where are they? Here they are. These ones here have got a blue uh filter on for blue light. I don't wear these when I'm doing the tutorials because the the green screen and this blue, it kind of causes some like weird uh effects with this eye strain. Again, that's when you're focused too long on the same distance. And again, that's like holding your arms up and not putting them down. All of these have a solution. And so for RSI, you're looking at taking breaks, getting an ergonomic mouse, uh, or an ergonomic keyboard so that the keyboard is in the natural position of your hands and it's not a straight one that you're like this. Personally, I don't like them. An ergonomic mouse is more adjusted um to the shape of your hand. Use a wrist pad and a key pad. So your arms and your hands are not up like this. The wrist pad is going to raise your wrist so you're straight with the level of the keyboard or the mouse. Um, headaches and eye strain, take breaks, regular breaks. There's a a rule called the 2020 rule. For every 20 minutes of work, you stand up, you look at a distance 20 m away, so your eyes focus on a long distance. And you do that for 20 seconds. I also add to that um look away for 20 seconds but at the same time do 20 minutes stretches uh 20 um during those 20 seconds where you're looking 20 m away do some stretches some neck movements just a bit of exercise some movement and then continue for another 20 seconds. I need to take myself up on that advice as well because I I'm normally sitting here during exam period for hours on end. Okay. So, I've got a table for you here which has got the different um health issues or health problems. These are not safety issues. These are health issues. So, safety is about protecting yourself from an accident or something like that waiting to happen. So, this is everything I've explained. Let's go look at our question. So, here for spilling drinks, we're looking at electrocution. overloading sockets by plugging in too many devices. Well, we said that if we overload an electrical outlet, then we're going beyond the rating of that outlet and it's going to cause it to overheat. So, the issue there is going to be fire. Now, remember this is a state question. You only need like one word or two, three word answers. You don't need more than that. You don't need to describe it. You don't have to explain. you just state trailing cables across the floor. Then here we're looking at a problem of tripping over. Okay. And placing a laser printer at the edge of a table. Well, that's exactly like the picture we've got here, isn't it? Uh we can see this printer is right is on a a very unsecure shelf. So, if you were to put it on the edge of a table, then you probably got the same thing. Um, you know, it could So, it's got two lines here. And the reason it's got two lines is because you need a little bit more to explain it. So, the chances are um it it could fall and hurt someone. Okay. And I've got the mark sheet here as well. So, I'm going to bring that in. I can't share the mark sheet, guys. Um, we we've already discussed in the live that I did and the recording where I was answering some of the questions when it comes to copyright legislation. I can't really give the material. But this is essentially the answer sheet, the mark sheet. And this is why I say, you know, me just answering the questions is not that much of a help to you. So I thought instead of just answering the questions which you can get from the mark sheet well most of it um I'd rather explain the topic or topics which are related to that question and give you some learning beyond the paper. Okay, that's question number five. Okay, number six. A student has set up a password for his laptop computer. The password he has chosen is Wow, that is a really long complicated password. have trouble reading it, let alone trying to memorize it. Discuss the benefits and drawbacks of using this password. So, here we've got this is a password for a laptop computer. Okay? And we need to discuss the benefits and drawbacks of using this password. So we need to identify what's the the good and the bad um of using such a password. Well this I mean the fancy wording and the scenarios really don't mean much because at the end of the day we're talking about passwords and there's certain things that we know about passwords and what are they? A password has to have well for it for it to be a secure password. So I'm just going to write this down like this. So this isn't my answer by the way. I'm going to show you my answer in a second, but just to use this area here to identify what we mean about passwords. A password should be secure. So, here's one word. It should be a secure password. To make a password secure, it must be at least eight characters. Eight characters long. So, no less than eight characters. It must use small letters, capital letters. It must use numbers. It must use special characters. It must not contain not. So, I'm just going to put here not contain personal details or personal data. Uh, for example, your first name, your last name. Parent, grandparents would use things like their grandchildren's or their children's birthdays. You don't want any of that. And you don't and you don't want to have any kind of a number sequence. number sequence. And what do we mean by number sequence? You know, many times people when they want to just create a quick password is that they'll write something and then they'll put something like 1 2 3 at the end of it just so that they've got some numbers or they'll put 1 one one or 22 2 4 68. These are uh these make your password weaker. Okay. So this password actually fulfills all of these things. So if you were to say that this password is a secure password because it has this, this, this, this, this, this, and this. You're probably going to get half if not more of the marks for that. Now, you can't just have when you're doing a discussion question, you can't just be saying the positive because then that's not a discussion. That's just identifying all the positives. So, discussion will be to have a look at, you know, the benefits and the drawbacks. Well, what's the problem of something like this? Well, think about it. Think relate to you. Stop trying to think about what the um question is asking you for. You've probably got a smartphone. You've probably got um a laptop or some kind of computer. you got some kind of device or you got somewhere where you've got a password, whatever it is. What's the problem with a password? Especially if it's a very complicated password like this one. The number one thing is going to be you have to remember it. So, a password like this is going to be very difficult to remember. A password like this is going to take you time to enter the password every time because you want to be careful. you won't make any mistakes because when it's so complicated, it can get really tricky and you have to look at the keyboard and take your time. Um, so that's another drawback. But because this is a discussion question, you could also say, well, that's going to make it really hard for someone to hack your password. It's also going to make it practically impossible, not impossible, very, very hard for somebody who's shoulder surfing and looking from a distance when you're typing your password on your keyboard. they're not going to be able to remember or see all of these characters to remember them in sequence. So, you're going to make it really hard for them. So, um the problem shoulder surfing is kind of resolved. Whereas, if you've got, let's say, your name and then 1 2 3, that's going to be easy for them to identify when they're seeing you type your password. So only these these things here just the the the things that we know about passwords without even looking at the book or the chapter we're able to answer this if we relate it to our own experiences and this is what the theory paper is primarily about. Try to relate things to your experiences and write it down. The problem with students is that when you think it's something that you've experienced or you know that's probably the wrong answer and you try to d deviate from that so you can write what you think the examiners want as an answer because you've seen the mark sheet and the mark sheet has got a whole load of things there. Some of the things you probably won't even understand but that's just as a guide for the examiners. The examiners are looking to see whether you can identify six things which are correct which you are discussing in this answer. Okay. So with that said um I' I've put my answer in the PowerPoint which I'm going to share with you. There it is there. So essentially I've said the password is classified as a strong password because it is at least eight characters long and consists of small letters, capital letters, numbers and special characters. Further, this password does not contain any information about him like a name or sequence of numbers like 1 2 3 4 or 11 one. It didn't say give examples. So I'm not going to get a mark for the example. But the reason I put the example is if the examiner does not understand what I mean by a sequence of numbers then my example is going to make it absolutely clear I mean repetitive numbers or sequential numbers and that's why I put that example and making it easy for the examiner to see that I actually understand what I'm talking about. This will make it difficult for someone to guess or hack his password. Oh, I've got a full stop there. Let's get or let's get rid of that full stop or be able to memorize all the characters if they were shoulder surfing. So again, we've discussed this. The problem is that the student will find it hard to remember the password and if he forgets it, he will not be able to access his laptop. That's a negative. Other issues are that because it is very complicated password, the user will have to take more time to enter the password so that he does not mistype the password. Okay. Are there other points? Of course they are. But I've got a well-rounded um answer here. I've definitely got six marks I believe because I identified quite a few things. Let me just show you the mark sheet. And you can see how the mark sheet is totally different to my answer. So, where have I getting the marks from? So, instead of one, I don't have a point form because it's a discussion question. It's a strong password. So, I said it's a secure password. It's hard to crack. I said it's hard for uh people to remember or to to hack it. Uh more secure. So, that and that is probably round about the same thing, but they've got it as two marks. Okay. Password is long. Therefore, shoulder surfing is reduced. We've said that. does not contain personal information, so harder to crack. There we go. Drawbacks. It's easy to forget as it's got many characters. Well, we said it's easy to forget. Even though it's still strong, it's easy for a computer to crack. Yeah, I disagree with that. That would not be an easy password for a computer to crack. If you were using brute force attack on that, it's not going to be easy. It's going to be quite hard. Um, the user will have to look at the keyboard when entering the password. Okay. Unless they're a very good touch typist, I'm not too happy with that as an answer either because that's assuming that the user is a bad or just an average typist. The user could be an excellent typist. The user may have to write it down to remember it. Okay, so it's hard to remember. That would be the mark. uh letters and numbers should be uh could be confused like ones and I's twos and zeds again this answer I don't agree with because it's about it's about the the student using the password let's have a look at the question of using this password so if it's your password you know whether you put an I or an L or something like that so yeah a long it's long complex uh could be mistyped so we've put that there as well so we've got at least six marks with a plain answer there. So, full marks on that. Okay, let's go to question 6b. The student could have protected his laptop computer by using two-actor authentication or 2FA. This could have combined his password with a biometric method. State two examples of biometric methods he could use. Now, biometric methods essentially are methods where we can authenticate ourselves, prove we are who we are from our physical traits or uh physical properties. Physical properties like face recognition. Some some people have got face recognition. So, when they want to unlock their phone, um the phone will open the camera, scan their face, and if it's them, it will unlock. You've got fingerprint um recognition where it will scan your fingerprint and identify you. Things like retina scan also is good. You got palm scanners, you know, when you put your palm on the screen and it will scan your palm. Now, when you're going to be using um or identifying some biometric methods or any methods for any question, you have to make sure you relate it to the scenario. Now, in this scenario, you're looking at a student and his laptop. So, he's not going to have a palm scanner, is he? That's not something he's probably going to have on his laptop. So, usually here, the ones that we're going to be looking for is going to be something like face recognition and maybe the other one, fingerprint scanner. Now you could do retina scan as well because um that uses your camera. And if you were to have let's say a second question which would be what is the advantage or disadvantage of using the ones that you have identified? Well usually with our own physical traits um we don't stay the same. We are aging. So, if you're young, as you get older, your face changes. Your fingers, which you use to um do a fingerprint scan, may be damaged, may be dirty. You may have cut yourself. You may have had a haircut or you've changed yourself differently or you now wear glasses. You've got to remember to take your glasses off so it does face recognition. If you were out partying the night before, then your eyes are going to be bloodshot red and your retina scan isn't going to work. So you can think of all the things that you would normally just think about your own experiences that will prevent you from uh identifying yourself from some of these biometric uh measures or authentication methods. So that was B. Now question seven 7 A. Now this one's to do with the systems life cycle. It says a systems analyst has been asked to carry out an analysis of a company's current computer system. State three methods of analyzing the current system. Now, I've received quite a few questions about the system life cycle and a lot of people asking me, can I go over it? So, let's just identify what we want here. We want to carry out an analysis of the company's current computer system. Now this is only a three mark question but I'm going to spend some time um on this particular topic to go over the co most common uh concepts of the systems life cycle and what the most common questions that you will probably be asked on the systems life cycle always appears in every paper nearly. So at least one component of the system life cycle appears. Out of the six components, you're going to get one of them. Okay? And I'm going to go over some of the most common things. So at least you've got a good chance that if a question does come up on this topic, you're going to be able to answer it. So let's begin on the systems life cycle before we actually attack that question. So essentially the system life cycle is made up of uh six stages. six main stages. The first one is the analysis of the current system, which is where we go and we analyze what the company actually has right now because you've been called in. Apparently, the current system is not working properly or it's not sufficient for their needs. The company has grown and they want a new system. So, the first thing you're going to have to do is go and analyze that new system and see what it is that system can actually do, what it can't do, what it is struggling to do, where the problems are. sit down and talk with the owner and say, "What is it that you want the new system to do?" Because you don't just want to tackle the problems or the limitations of the current system. You want to create a system that's going to take them at least 10 years forward. So maybe there are things that they would like to be able to do now because things have changed and they can't. You're going to have to discuss all of these things. The next part is actually designing the system. And the designing the system, I'm going to go through these in detail in a second, but as a short thing, the design is the part where we design. Think about access databases in paper two. We design a database. We create a form. We create reports. We create queries. We create extracts. We create labels. So this is all about designing a database or designing a new system and making it produce the data or the information that we want or produce the outputs that we want. We're creating input forms to make it easier to add information into that database. All of that is the design. And when we design it, we're looking at the data types. We're looking at the different field names. We're looking at validation rules that we're going to be adding. That's the part of the design testing. After we've done the design, we need to test the system to make sure that it's all working before we actually give it to the owner and then they figure out that there's a whole load of mistakes. We need to test it. And the way we test it, what are we going to test? We need to make sure that all the mechanisms that we have put into place, they actually work. So, if we've said that it's a grading system for a school or and they're going to be entering grades, then that's that's fine. You're probably going to be grading out of 100. So, if somebody puts a number which is more than 100, well, it shouldn't allow it. So, you're going to test that by putting numbers which are greater than 100 and it should prevent you from doing that. Um, and we're going to be looking that as well. System implementation. So, once we've actually created everything, everything's tested and we know it's working, we now want to implement the system. How do we implement it? Do we stop it one day and jump to the new one the next day? What is the risk of losing data if your system fails? We need to think about training. How we going to train people? Is it important? Is it extremely important the data is not lost or delayed or is it absolutely imperative nothing is lost? Let's say a bank system. So you need to think about these things and decide how you're going to implement afterwards. Documentation. Well, you also need to leave the person or the company some documentation. A user manual is usually the first one which is uh gives people information about how to use your new system. And then you've also got the technical manual when you're going to have people like technicians. If there's something wrong and it's not working, they need to go, for example, let's say a validation rule would not allow a quantity number of more than 100, but now you want to order something which is 150. the user is getting an error but the user doesn't know what a data validation rule is. The technical or the technician does. So when they get the technical manual they will see ah for the quantity field you're only allowed up to 100. That's why it's giving the error. So they will go and change that validation rule. You don't expect that from your user. Then finally you're looking at your your evaluation and that's to evaluate basically uh what you have created with the new system what it can do and that's where you're going to compare it to what you did at the very beginning where you've identified the requirements of the new system when you were doing your analysis. Have you met all the requirements that you have set out at the beginning when you evaluate your system after you finished it? So that's the general synopsis of the system life cycle. So let's have a look at and show you what I've given you. First one, the analysis of the current system. Now I'm going to go over the topics which are usually questions. Okay. So one of them is usually um describe the analysis of a new system. And that's what our question is all about. We've got four different ways we can do this. First analysis is observation. Go there, sit, see how people are working, observe what they're doing, and identify the weaknesses. This gives you a hands-on view. Interviews. Now, when you interview people, you sit down and you talk to them and you ask questions. And the good thing with an interview, a one-to-one interview, is that you can actually divert your question based on their answers. But sometimes people are scared to answer. They're scared because they think that you might go and tell the boss that, you know, it's somebody else's fault or there's something wrong with the system. So, they would just say that everything's perfect. So, there's goods and bads, which I've got here for you. The problem with interviews is it takes time and you can't interview absolutely everybody if it's a very big company especially if it's a company in different locations or different regions or different countries. Questionnaires questionnaires are fantastic because the the questions are fixed. The answers have to be based on those questions. So it's easy to generate analysis of data based on forms or questions that you receive. The answers that you receive. For example, are you satisfied with your job and you've got a scale of 1 to 10? what everyone puts on it and you can create a chart and get an average of satisfaction. The good thing is with questionnaires, you can send them out and get loads and loads and hundreds and thousands of responses without you doing anything. The other good thing is some people in the in the uh business, they may work late hours or they may not work there. They might be delivery drivers. It's hard to set up an interview for them. So, they can just go fill in the form and you can collect that information. if they're in a different country. Again, you don't have to travel to all these different countries for the different branches to interview everybody. So, normally you would interview key people like the boss, managers, middle managers, and this that the other. And then you probably give questions that probably interview a handful of employees as well. And then you probably rely on questionnaires, existing documents. You want to analyze what documents are they currently using? What are they using to collect information? For example, a school is collecting um school applications for people to go to the school, new students. How are they collecting that data? Is it handwritten? Well, how do they enter that handwritten information into the current system? What kind of output documentation are they producing? Are they producing receipts of payment? Are they producing reports? Are they producing um let's say attendance cards? So you need to see what they've actually what they're actually using to create d to well collect data and how they're actually producing documents as well because your new system has to be able to do that. Once you've done this analysis you're going to create this thing here the requirement specification. And once you've done your analysis you're going to sit down with whoever's hiring you to do this new system and you're going to say look this is the this is what I found out here. And when that person, he's going to turn around and say to you, "Right, what I want the new system to be able to resolve all the problems that we've identified here and I also want it to be able to do this." And do you sign off on this? They sign it, you sign it, and that is your contract. Your final um evaluation at the end should meet all of the requirements or the targets you set at the beginning when you were doing your analysis. So that's the analysis. You need to know advantages and disadvantages. Okay. Okay, design. So once you've done the analysis, you start with the design. Now with the design, you've got think of access. When you're doing design, always think of access because that's essentially what you're doing. You create the field or data structures, the field names. Remember, field names have to have no spaces. Um they had to be short. Then we create the input formats. How do we collect data? Is it going to be an electronic form like a data entry form that you've learned in Access? Are you going to have automated data entry? For example, bar barcode scanners, maybe people clock in in the job when they go with a fingerprint scanner or a retina scanner, biometrics. Um, are you going to be entering other information using automated data entry like um optical mark recognition? You may be doing optical character recognition by scanning their ID card and then it will identify the characters and record that information automatically making it much faster to enter data rather than having to type things out. They may have RFID chips. Look at the live stream that I did that video. I talk about RFID and explain how it works. And I gave the example of instead of scanning things with the barcode when you go to supermarket one by one, if all the products have got an RFID chip, then you just go through the RFID scanner with your trolley and it will scan all the items in your trolley in one go. Output formats, what are you going to produce? Are you producing um you have to design the output forms? Let's say the the receipts or whatever it is that they're going to produce, you have to design those. And finally, you have to also design your validation rules. Your validation rules are there to try and prevent mistakes when they're being typed in. For example, the date format. If you're typing a telephone number, a length check. If the telephone number has to be eight numbers long, then if you accidentally put seven numbers for a telephone or nine numbers or more, then it will prevent you. That's what the length check is about. That's the length check. The type check. If you're typing something and it's supposed to be an L and you put a one instead and it shouldn't have, let's say, numerical values or it should be numerical values only and you put an O instead of a zero, it will warn you. That will be a type check, a format check. This is also good when you're doing dates. Do you want day, month, year, or month, day, year? If you're doing a serial number and the serial number begins with a character like a and then four numbers 3 7 1 6 then that format should be one character and four integers. Okay, that will be the format and if it's not like that then it will flag it for you. An input mask you may put a mask a string of characters that indicates the format and that's basically what I describe. Now you will put for example a character which is um let's say an a and then four numbers. So an input mask I think it will be the a letter a and then the numbers could be 9999. That's basically a mask. Okay. So that way it will only allow an entry with one character and four numbers afterwards. A presence check. Are you going to allow them to leave a field blank? If a field cannot be blank, for example, serial number, then it won't allow you to enter it unless you put the serial number. There you go. So that's the design. These are the things that we do for a design. And that's another type of question testing. So once we've done the design, we want to test. Once we've designed everything, we've done everything, we've done the analysis, we've done, we've designed it, we now want to test. What is it that we're going to be testing? Well, we've said already in the design we think about things like validation routines. We want to test and see if these validation routines work. Let's say we have um they're going to be writing scores for grades. A grade can be between zero and 100. So with ranges you or it could be a date for example. With ranges you can turn around and say that normal data test it put the number 34 that should be allowed. If you put the number 93 that should be allowed. Okay that's known as normal data. Extreme data is when you go to the extreme values the smallest and the largest you can put. So you put zero and 100 are your extreme values. What should happen? It should accept them because we want zero and 100. Those are your extreme values. And then abnormal data add anything which is abnormal or shouldn't be allowed. For example, 200 and 33 that shouldn't be allowed. Minus 10. If you write for example the word hello, you put text instead of a number. That should not be allowed. So these are things that we do to test ranges. Other tests that we do are all the tests that we did for our validation rules and this is a sample test plan table. The student number should be a number type it said. So if we put the words any number then we expect an error. We get an error. The first name should be text. Here it says enter 1369 into the student number field. Well the student number field it should be a number. It is a number so it should pass the text and it did. Um it should be accepted. It was accepted the actual result. No remedial action. Enter seven into the score. And so you get the idea. This is what a test plan looks like. You should be able to complete one. You may be given something like this and you have to complete a test plan. All right. The system life cycle, the implementation. Now I had the PowerPoint on this. So I put all the slides for the implementation. How we implement depends on how big the company is, how many um how how many locations they have, how many branches, and how important the data is. In other words, if it's a small kiosk and they lose um I don't know, they they they lose let's say 2 10 20 30 entries of chips or whatever, they can enter those manually afterwards. If it's a bank and you lose 10 20 30 transactions, that's a no no. That can't be done. So this is what's going to decide how you're going to implement the new system. So you've got four methods. You've got direct change over phased implementation, pilot running, and parallel running. The question that you will normally get if you get something like this is they'll give you a scenario. They'll give you some information and you have to discuss what the best method or uh would be to implement the new system and you have to argue both ends. There is no right or wrong answer. there are only valid justified answers and if you justify it then it's going to be a correct answer. So the first method is direct changeover and that's where we have our old system and at some point in time we stop using the old system we start using the new system and I've explained here when this is um advantageous and what's the disadvantages for it. So this is good with a small company, one location, not so many people, probably doesn't have too many entries at some point in time. If something goes wrong, you could probably just go back to the old system until you fix the new system and just add all the transactions that you've missed. Training is a lot is harder because you've got to train um people on the entire system in one go. Parallel running. So this is where you've got your old system running here and there's a point in time here when you're doing the same thing two times. So you're using the old system and the new system together. This is a lot lot slower. It's a lot more demanding on the staff. It's double entry. You're doing double the work because you have to do things two times in the old system and the new system. But this is the best way to ensure that no data is lost. there is zero chance of losing data because even if your new system crashes here, you're using the old system here anyway. So, you're recording everything twice and only once everything is proven to be working well, you stop the old system and you only now use the new system. Now, again, training is difficult. I've got some information there because you've got to train the entire staff on on the entire system while they're working and it's harder to deal with problems because if there's a problem with the let's say the application system that will probably cause a problem in the finance system so on and so forth. So that's that. Then we've got phased implementation. Now this is where we have the old system first that's here. Then we start using parts or some modules or most of the modules from the old system and we only use the one module from the new system and then slowly slowly once we resolve all the problems of that new of that one module we then add another module and reduce the modules of the old system. So think about the school you could start with the application system only using the new system but the finance the reporting the attendance they use the old system. any issues with the application system are dealt with and they are only focused on the application. This makes it easier to train people as well because you only have to train them on one module. Once all the problems have been resolved, you then say okay we finished with application system. Now let's start looking at the finance system. So we stop using the finance system in the old system. We start using it in the new system. Now we can now only deal with the finance only train the finance people and only resolve the issues for the finance system. This is the longest method but it is the safest method. It's um the the easiest method let's say to train people but at the same time there is a small risk of loss of data because when you you're switching over one complete module. So if something goes wrong with the application system, the one that you're using the new system on, then if something goes wrong, you could lose data on applications, your finance, your reporting and attendance are fine because they're using the old system. Pilot running. Now pilot running, this is where if you have if you've got different locations, you can pilot the new system in one branch only. So let's say you've got two three sites then you compilot it in one site and the rest all the other sites they use the old system. Now normally you would do this with a branch which is a little bit smaller an office which is a little bit smaller because there are less people there to work with. It's easier to train a smaller group. The rest of the company the rest of the branches they use the old system. Now once you've resolved all the issues then you can get all the other branches to go to the new system. The good thing with this is once you've trained everybody at this branch or this site then these people can be used to train the people in the other sites and that reduces the costs of hiring you and your technicians and your people to be training them. So it's cheaper for the company as well. Um now for this particular branch though there is a higher risk um as there's no backups for that branch. So if data is lost for that particular branch or that office where you're doing the pilot then um that is a risk. Okay. Here I've got a list of um the advantages and disadvantages of each. And the last one here is the documentation. So I've got the list for you here. What's included normally in a user documentation? What's included in a technical documentation and the purpose or audience. So usually a technical documentation are people that understand the back end of what was designed. Let's say the tables, the fields, the data types, the validation rules, the structure, the routines, the programming, all of these things. Um on on the design level, that's who will get the technical documentation. The user documentation would normally have things like how to install it, how to run it, the minimum requirements, instructions how to do the task or how to use it. And this is for the end users, the people that are going to be using the system. Okay, that was a crash course into the system life cycle and part of the most common ones. So, state three methods of analyzing the current system. Well, we've discussed this already and one of them will be observation. The other one could be interviews and the other one could be uh a questionnaire. Now I know I went through a lot of material there for a three mark question but as I said I wanted to go over a quick uh run through of that chapter the system life cycle uh because there's always going to be a question I don't know if there's another one in this paper but there's always going to be a question on the system life cycle okay the systems analyst is working with a team to create some new software the software documentation will be stored on the cloud now can you see here this is to do with the software documentation but if you read the question carefully It's saying it's going to be stored on the cloud. Describe how the team can use the cloud to share. Okay, it says here to share the documentation. So can use how they can use it to share the documentation. So although this is to do with the system life cycle, the answer has nothing to do with the system life cycle. It's got nothing to do with the actual um user or the technical documentation. It's talking about the team, the systems analyst team and they're creating the documentation. So you got different people working on this documentation. The people which are working on the applications module are writing their documentation. The people working the finance module, they're writing their documentation. They want this all to be in one document. So how they going to use the cloud to share this documentation? Well, the idea is that they're going to be able to upload it first of all and they're going to upload it to the cloud. From there, they're going to give access to the different members or to the different members which are going to be contributing to this document. They're going to be able to sign in and access that information and they're going to be able to update that documentation. When they're updating things, the updated version is seen by everybody. the document is synchronized on for everybody in near real time and um let's say the project manager or whatever you can actually see who has edited what. Now the other good thing is because this is going to be a cloud document and people going to be using it and it's syncing on many many devices you've got many copies of this of this document so it's really hard to lose that document. So these are the advantages and dis. So this is what we're going to describe how the team can actually use it. We're not looking at the advantages of this. We're looking how the team can use this cloud to share the documentation. And here's my answer for 7B. So I'm saying here the documentation will be uploaded to the cloud and access to the document will be given to the team. All the team members will be able to access the documentation and we'll be able to contribute to and edit the document. So essentially everyone can access it. Everyone can contribute and everyone can edit all the changes made will be seen by all the team members as the document is synced automatically. So they will know that should be they will know not now they will know what has been added or changed and this prevents data duplication. So it may be if you don't have something which is synced somebody might be working on one part of the documentation another person in the same team will be b working on the same part of that documentation. So both people working on the same thing duplicating that data and just wasting time and effort. But because it's synced um essentially if somebody goes to add something say oh this person has already done that part I can focus on the next part. Okay. The team manager will also be able to see all the changes being made and who made what changes so that he she will be able to see everyone's contribution. And this is important because if you if you feel that there's something wrong or there's something that is not understood, uh the team manager will be able to know who added that and will be able to question can you please clarify this point or can you explain this a bit better? So instead of just trying to guess who's contributed what and everyone being quiet, um because it's a shared document and they have to sign in, which is something else you could put in that they have to sign in. Um they would know who's actually put what. So here are the here's the mark sheet for 7 A and 7B. Okay, so yeah, there you go. Okay, question 7 C. Now question seven is a really really long question. And you can see this is a six mark question. We had a four mark question. We had the three mark question. This is 14 marks for question seven. And each part A, B, and C is on a different topic. Although it's still talking about the same team, the systems analyst team is not about the systems life cycle. Um only that first one really was. So this one says members of a team can use video conferencing to join business meetings from different locations around the world. Describe giving reasons. Describe giving reasons. Three disadvantages of using video conferencing for businesses for business meetings rather than meeting in person. So you only want the disadvantages and it wants describe. Now when you're doing describe then you're looking at when and it's got it wants reasons as well. Now this particular one you're looking at probably um a good reason and an example. Okay. So you need to give reasons three of three disadvantages. So since you only need to identify three disadvantages and there are six marks, it's clearly stating only three disadvantages. Then the other three marks are going to be the examples that you are using. So you need to identify three disadvantages and give the reasoning behind each disadvantage for the full marks. Now, in the live stream that I did for preparing for the theory, I went over the different types of conferencing, video conferencing, web conferencing, and and the other ones. I'm going to show you where that is now. So, that's the thumbnail. Okay? And it's this one here, theory vision, ICT, IGCC 04170983. Okay? Now, in this video, if you open the description, you look at question number nine. This is to do with web conference, video conference, webcast and webinar. So, and I go over what the differences are and down here you can download the PowerPoint for that where I give you all the resources explaining what the differences are, the advantages of web conferencing, the advantages of video conferencing, uh, webinars and so on and so forth. Okay. Now, I'm going to add those slides in this PowerPoint now as well. So, you've got that in this PowerPoint for this tutorial also. But this tutorial, this video here goes over everything in more depth. Okay. So, here we are back in our presentation. I've added the slides from the presentation from that live stream for regarding um web conferencing and the different types of conferencing. So, just to go over this quickly, we've got four types and you need to know um as I explained in that other video tutorial in the live uh for that particular question, question nine, you need to know the differences between web conferencing, video conferencing, webcast, and the webinar. what the advantages are, the disadvantages are, and what what is class what what it is in that meeting or that stream that classifies it that way. For example, we've got here a slide which goes over web conferencing. And here web conferences is usually, you know, a smaller group. You got fewer presenters and they're able to share and talk and share screens, um, presentations, slides, and there's a chat with the audience. Um and essentially that's what web conferencing is. Then you got video conferencing which is our topic right now for this question. And you can see here with video conferencing it the the point is it's um so that a meeting can be held usually for video conference to happen and it's required. It means that people are in different locations. It's hard for them to travel to meet up and you normally have to try and make it as uh simulated as much as possible as a real in-person meeting. You've got big screens, um, more expensive cameras, uh, they've got normally directional microphones that identify the speaker, so the camera moves towards the speaker to show that person. You've got microphones in the middle of the tables. You've got a control units or tablets on the desk so you can manage the meeting. It also takes a little bit more skill and a little bit more training to be able to run a video conference because you need to use some uh some software to do this. It's more expensive and it's largely dependent on the internet. uh the bandwidth of every site. So if the if the speeds the bandwidth or the the stability of the connection even at one of the locations is not that good, it can affect it could affect the whole conference meeting because things like sharing files or sharing screen is going to be much slower or not possible. Lip syncing or the video feed may be jittery and people are sitting there waiting wasting time. time zones cause a problem because they're in different locations sometimes and they may not be able to join or they will join late. You lose that personal touch when you're talking to someone in person. That's also another issue. So, you've got all of these issues, but you've also got all the advantages as well. You need to know all of those. So, anyway, here I talk about webcasting, which is basically a one-way thing like a live stream like I did. And then you've got uh a webinar which is more uh designed for training purposes and it's like training or teachers giving lessons. So I've got that information there. You can watch that tutorial if you want to learn more about those. And here I've got the table for the uh comparison of each type of conferencing webcast webinar video and all of that. Um what it's used for uh the scope the target so on and so forth. So you you've got all this information here in the PowerPoint just so you can expand your scope on this question. So for this question C, this is my answer based on everything that I've discussed just now with you. So I said video conferencing is primarily used to hold meetings in real time where all parties can attend and share their video and audio stream with others. So that's basically me showing that I understand what a video conference is. You don't have to put that in, but it just shows a little bit more confidence in me to show the examiner, look, I know what a video conference is and straight away the the examiner will start, you know, thinking of you in a positive light. It also helps me build up my answer. It helps my thinking. So, this however requires specialist equipment like large screens, cameras, and microphones, which can be expensive to purchase and difficult to set up. So, I've actually got two marks here because I'm I'm actually talking about two things with that one example. Um, you've got all this specialist equipment, but at the same time, it's uh expensive. And also, you're probably going to need some specialist people to set all of this up. You're not going to have your average person being able to set all this up. It's not like just using your laptop and just connecting to, let's say, an online meeting. The whole meeting is primarily dependent on the quality and bandwidth of the internet connection at all locations as bad quality connection and slow speeds can result in jittery video feed and slow uploading and downloading of files being shared or even the screen being shared. So if the if the internet speeds and the reliability is not good of the connection then you're going to have all of these issues. So there's my other disadvantage as video conferences are usually held uh when uh the different parties in both are not in the same location. There could be issues with the different time zones making it difficult for some to join or will join late. So again video conferencing is only there if you've got everyone in the same company in the same building. There's no point having a video conference. We only do this when you know some people are not in that vicinity that location or they can't come to work or they're in a different country. But that does cause time zone issues if they're in different countries because it might be 2:00 in the morning for someone. So they may miss it, they may be tired, they might join in late. Okay, so those are just three. There are many more um which I've discussed. And here's the mark sheet 47 C. And that completes question seven. So you can see here it says three matched pairs. And that makes sense because he only wants three disadvantages with reasons. So each disadvantage and each reason for that is an answer. Okay, it's going to be a mark because it's six marks. Okay, here we are. Number eight. Now compare optical mark readers, OMRs, with optical character readers, OCRs. Your answer must include similarities and differences. So here we've got a compare question. Okay. So we need to compare two devices. Um in a compare question we need to find the similarities between two items and then we need to list the differences of two items or more but in this case only two. This is a six mark question. So we need to find similarities and differences. Now, usually you have the answers again in your head, but you think, "Nah, it can't. That's not an answer. That won't be a point." It is. Anything that you mention as a similarity or a difference is going to be a mark. But do not keep repeating yourselves by listing the same similarity using different words. Okay? you need to stick to um finding new similarities and differences. So here we're comparing OMRs with OCRs. We want to find similarities and differences. So both of these are automated data entry devices and we've got a number of automated data entry devices that we can use. So these are only two. Now, in my PowerPoint here, which I'm sharing with you, I've got some automated data entry methods for you. This first one here is the OMR, the optical mark recognition. Optical mark recognition, you have to um mark with a pencil or a special pen or ink in a particular point on a printed media. You can't simply write or put marks wherever you want. You have to put them in pre-allocated spaces. And the way it works is light would shine on the paper and where there's a dark mark, the reflection of light is less. And that's where it knows where you've put your mark, what you've chosen out of that um of the options you have. In this case, 1 2 3 or four. So, optical mark is great for simple answers, multiplechoice questions, data, um maybe a voting ballot, maybe a survey, it could be a lottery tickets, you know, the lottery tickets that we fill in. You have to try and think of experiences that you've experienced with these things and you can use those as an example even if they're not in the mark sheet. So for me, I normally go I always um think of let's say a voting ballot where you've got a list and you mark the one that you choose or it could be multiplechoice questions. The next one that we've got is a barcode reader. Now again this works with optics. So anything which has got um light or uses camera or something like that to read the data, it is an optical method. It has to somehow read light. Okay? Even if it's a camera, it's reading light. So barcode readers. So um we know all of these. These are the black and white lines. The black and white lines and the way the black and white lines are arranged and their thickness will relate to a particular number. That number is also printed at the bottom of an optic of a barcode reader. Normally on a barcode, you can see that number there. In case there's something wrong with the barcode itself, it's dirty, it can't be read, whoever's trying to read this information, they can punch in the serial number or the number underneath manually as a backup method. It uses light and reflection. Now, OCR, optical character recognition. What this does, this uses a camera to view something which is on printed media or printed somewhere and it will in that image it will try with the special software it has it will try to identify characters and you can see this is here this is a number plate recognition system. So it will identify the area the square area where the number plate is and in there it will try and identify letters. when it sees those letters, it tries to compare those letters and identify them and puts these letters either directly in a database. It can record them or if it's a whole passage, let's say a whole document, you can take a picture of it and put it through OCR software and it will identify all the text and put it in an editable format for you in a word processing package. So, you can then go and edit the text. You might get a question like that. You might be asked, what's the difference between a photocopy of a document and you using OCR on a document? The photocopy will make a copy, but you can't edit the document. With OCR, you can uh scan the document. It will identify the characters and export them in a format where you can edit the text in a word processing package. So the amount of data that you can probably scan or not probably that you can scan or identify with OCR is much more. You can identify a whole lot more data. Identifying text with OMR is going to be very very difficult because you're going to have loads and loads of lines of the alphabet and you have to keep selecting which letter you want for each letter of each word. QR code readers. These are quick response codes. These are fantastic to give quick information, links to URLs, um, uh, automatically installing Wi-Fi codes so you don't have to give the codes. So, these have got, um, a very large use as well because there's quite a lot of data that you can put in a QR code. You can put up to, I think, um, 256 characters um, in a QR code. You could put URLs, you can put links to documents, you can put uh an address, you could put a pin to a location in a map. Um, so all of these things and it's really easy to use. You simply use your camera on your smartphone and it will identify what the person has encoded as text or a URL on that uh QR code. Other ones that we have RFID. Now I've gone through RFID in great detail again in the live stream which I did and I was answering some questions. There was one on smart devices or sorry on RFID and I gave examples how RFID works. It's towards the end of the video if you look in the description of that video you'll find where I'm talking about RFID. This was actually a question from one of the um people one of you guys attended the live. You wanted me to cover RFID. So essentially RFID, this is an optical. It goes through the reader. The reader creates a radio frequency. That radio frequency energizes the RFID chip. This line going all the way around. That's the antenna. It picks up the radio frequencies which creates an energy field and energizes the chip and the chip starts transmitting its data. So this is using radio frequencies to transmit data and the the communication is one way. We've got magnetic stripe or magnetic strip card and reader. So this is the magnetic strip and this has got a piece of magnetic tape and we record data on that tape. Now the amount of data we can record on there is kind of limited and you know the disadvantage is because it use magnets it can be demagnetized easily. So if you got it next to a mobile phone or next to a magnet that data can be corrupted. Um and also the data is accessible to anyone who might have a skimmer device. So it's easy for them just to skim the card and read the data. Smart cards. Well, smart cards have got a little smart card chip. They've got a little microchip on there. The data is stored on there. It's got higher um encryption, more security, and you can store more data than what you can sorry on a magnetic strip. Okay. Um I've got here for you a small table which basically gives you common use of the different methods of automated data entry and the key advantage of each one. So let's look at our answers. So here we go. Here's my answer um for this question. I thought both OMR and OCR or automated data entry device is uh let's just correct that. And both can uh can enter data at high speeds with accuracy. Well, that's the whole point of the automatic data entry. So this is a similarity of both. They can read data accurately and they can read it quickly. much faster than you entering it manually. Both can read data from physical media like printed documents. So both of them read information from a physical medium. What do I mean by that? Well, if we look at RFID, it's reading information which is in a digital medium. The data is on this microchip on the RFID. So it's not something that we can see in the physical world. Whereas with auto with OMR and OCR, we can actually see this data in the real world and we can actually read it ourselves, but now we're finding a way to record it manually in and you know there's loads of uses for OCR as well. You might have them on uh read somebody's ID card. Uh so this is data we can actually see and it's in printed form and it can read it. The same with um barcodes and QR codes. These are these are printed on media. Whereas when you go to uh these devices RFID, magnetic striper, smart card, these are not automated data entry systems that read things on printed media. They're on digital media. They're in digital form. Okay. Despite the similarities, there are very different methods of data entry with advantages and disadvantage. So they have the similarity, they have the uh they have their differences. OMR is able to read optical marks which are generally created by the user. The mark must be placed in a specific place for it to be read and it must be accurately filled in. So if you do not complete when you're doing your mark, you don't fill the complete area, then it may not identify it. Okay? So you have to be very careful when you're filling these things in with your pencil. Unlike OCR, OMR cannot read text uh ma uh making its use I'm going to which makes it uh use more limited when entering data. So again with OAR you can only in you know import or read small amounts of data just things that people filled in. Uh because OCR can read text, the data it can read can be more complex and allows the user to modify the text that has been imported into a word processor. So again, we can import more data, more text, and that text can then be modified. So I've got I think here's the let's have a look at the mark scheme. Actually, let's answer the next question as well. Um because it's a two-part question. Where is it? Yeah. The second question number eight is this one. Identify two uses of optical mark recognition. So what I've put for my two uh things that I've identified, I've put multiplechoice questions. Those are very very often. So I'm relating to things I know. And I've put here a voting ballot. Um so when you're going to be voting, you can use OMR. The user can actually, you know, scribble in the area, fill in the area that they want to select. So use whichever ones you want. Now looking at this mark sheet, I'm not too happy with this mark sheet to be honest. This one's okay. So this is the first one. You've got to take similarities from here and differences. And these are pretty much okay. I'm happy with these. Um what I'm not happy with is this question. This one here where it asks you um two possible uh uses for OMR. It's actually got listed here barcodes and QR codes. This is wrong. Um, so lottery tickets, yes, that's a good use for OMR. Multiplechoice forms or questionnaires, yes. Um, attendance registers, yes. But barcodes and QR codes, barcodes and QR codes are not optical mark recognition. They're totally different. They do not read a mark. A barcode reads black and white lines. The QR code reads a complex pattern or black and white squares. So this technically is not optical mark recognition. So I have no idea what they were thinking when they were put that when they put that in there. But that for me is wrong. Um so again this is why I say just reading these mark sheets and memorizing them is not the best way to study. But understanding what it is that you're answering is the important thing. Okay. So that was automated data entry. This question is mainly related to uh paper 3 web design but it's the theoretical part. It's the understanding of what it is that you're doing. Now let's read the question first. So absolute and relative file paths are used in the content layer when creating a web page. Explain the differences between an absolute file path and a relative file path. So an absolute file path and relative file path. What are they? Well, here I've got a folder. Okay. And this folder is called year 10 webpage.est. So the folder where a year 10 webpage.est is this blue outline here. And inside that folder, I have got a folder called images. And I've got some files. So if we have a web page like this web page here called BBHTML and inside that web page I'm using pictures inside this folder there are two ways that I can point to the picture inside there. So if we look at these absolute and relative references at the bottom the picture that I'm linking to is called brick work.jpg in both cases. But we can see in this case here the absolute reference that is using the entire file path. So that picture is actually found on my C drive in the users folder administrator downloads year 10 web uh web page uh test in the folder images and in that folder images is the brick work. This is the absolute reference. So when you when it's trying when your um web browser is reading the code and it wants to find the picture to place the picture, it's going to follow this entire path here. Okay? And if this path does not exist, then it can't find the picture. So let's say I I I was to change for example instead of going um from year 10 webpage uh test folder. Now this um percentage 20 is simply a space. If I was to change the name of that folder to web page only, then it will not be able to find that picture because the file path has now changed. This is an absolute. What is the relative reference? Well, the relative reference says from where your web page is, the web page you're viewing. So, in this case, the web page I've got open is this one here, bb.html. from this folder. In other words, year 10 webpage test from that folder without even looking at that folder. So you're inside that folder already because that's where you've opened the HTML file. You want to go there should be a folder called images. There's the folder called images and the picture is inside there. So what would be the best method to use? Well, the best meth best method or always use is a relative reference. Why? If I then take this folder which I'm working on my computer and I upload it onto a server which is somewhere else let's say a hosting service and they give me some space here and I upload my year 10 webpage test folder here. All of these files here, all of these will be uploaded into that web server. Now, when it I use my browser to go to my web page bhtml, which is inside this folder, it was then going to try and load this picture. But on this server, this file path C drive users administrator downloads year 10 web page test does not exist. Well, it might exist from here onwards because I've uploaded the year 10 web page, but all of this doesn't exist. There is no C drive users administrator download. They might have a different file structure. So, it's not going to find my picture. If I'm using a relative reference and I'm saying from wherever my BBHTML file is, which is calling the picture images/brick work. So there should be in the same location where BBHTML is, there should be a folder called images. Is there? Yes, because I've uploaded it up here together with everything else. So this is my images folder and these are all my other files including my bb.html. So, inside here, wherever I put this entire folder, it's always going to be able to find the images folder and load the picture. And that's the important thing. Now, the other way that you can use um absolute references is if you're using a picture from another URL. So, let's say you've got a picture from a different web page and you're taking the complete part of that um picture. For example, if I was um creating a web page on storage devices and I found a picture on the internet through my browser with a hard disk drive. If I right click on that picture and choose copy file path or copy path and use that whenever somebody loads my web page, it will show the picture but it's downloading the picture from somebody else's website. If they change the picture but keep the same name on my web page, I will now have a different picture. If they change the name of the file, my picture will not display. If they move their web page, it won't display. So, that's two examples of absolute references. So, the best thing to do is to use relative references. Why would somebody use absolute references? Well, if you've got limited amount of space on your web hosting service and you've got a lot of pictures that you're using from the internet, let's say, instead of downloading the pictures and putting them all inside your images folder and uploading all of those pictures, which are taking a lot of space on your server, the server that you're paying services for, you're you're purchasing basically storage. Instead of doing that, you can link to, let's say, images which are on the internet which will display on your web page because you're using the absolute reference to that image on the internet. So, it's not taking any space on your server because they're stored somewhere else. But we said the disadvantage is if whoever has those files on their server changes the name, they won't be seen anymore. you're going to get a no image icon or if they change the picture and keep the name, you're going to get different pictures popping up on your web page. So that's basically absolute and relative references. I'm going to show you my answers um once I've gone through through the questions. Okay, the next question is explain well we've done this as well. So, we've said the differences between absolute file path and relative file path and we've also explained why absolute file paths should not be used but I've also explained to you where they could be used. Okay, so this is absolute file path should not be used for hyperlinks to locally saved web pages. So again, if you're linking, let's say, um, and this is what we've explained already, but if I've got this BBHTML and I want to link to this BB contact HTML page. So this is my web site. I've got this page open in my browser. And when I click on it, I want it to open this one. Then I again I want to use a relative reference. In other words, for here I would simply need for example source and from here we're going to put href and we're going to put equals to and just put the BB contact. I don't need to put anything else because what's that saying is in the same location where you've opened this web page this one you should be able to find the BB contact.html because I haven't put a path. If I put this whole path here though beforehand then again when I upload it's not going to be able to find BB contact because on the server where I've uploaded it's not going to be able to find C drive users administrator downloads. Okay. So there you go. Um, so we've talked why we could use absolute references, why we shouldn't use absolute references locally, why we could use um, absolute references with URLs, in other words, to pictures. That saves us space so we don't download the pictures on our server. But what the disadvantages are as well. Okay, the other part of question nine is this one here, anchors. Now I know somebody who's watching this is going to be very happy because you've been asking me about anchors and the A tag and what's the difference. So I'm going to explain it with this question here. In fact you've actually requested this particular paper. Okay. Anchors and hyperlinks are both used in HTML. Now here it says anchors and hyperlinks. Now we need to understand because it's very confusing uh both used in HTML. Compare an anchor with a hyperlink. Your answer must include similarities and differences. Okay, so there are two different things that we need to look at when we're looking at anchors and hyperlinks. In fact, this is a really bad question, but doesn't matter. Okay, so here I've got examples of hyperlinks. Okay. Now, let's just make this a bit bigger so we can There we go. That's like a type. Now, a hyperlink, any hyperlink will use the Href attribute. And that when it uses the Href equals attribute, it means it is a hyperlink. So, and we're linking to whatever we put after the equals. Now, the href attribute is normally placed inside the a tag, otherwise known as an anchor tag. The tag basically means it uses the tags like this. And this is known as the a tag or the anchor tag. And this is where it gets confusing. So this here this is a hyperlink to a URL. We can you see it's using the href. Okay, which means it's a hyperlink and it's linking to a URL. In other words, a website. This is the complete URL. This is a hyperlink to an email. We can see it's using the A tag or the anchor tag in both scenarios. But the next attribute is href, which means it's a hyperlink. And this will link to a mail to an email mail to so on and so forth. And that's what they're going to click on the text contact me. This is a hyperlink to an anchor or ID or bookmark. It's got three different names. Okay, it's either called a bookmark or ID or an anchor. So again, this is a a tag, the anchor tag, and it's a href. So it's a hyperlink. And this time it's linking to an ID or otherwise known as an anchor, not an anchor tag. An anchor tag is this one. That's when you use the word tag. Okay, it's got the A inside the triangle brackets. When we specify an anchor, we're going to create an anchor. We're basically putting something like a bookmark somewhere in our web page. And we create that using the ID tag. So this is basically an anchor which has been used. It's an ID and it basically calls that anchor or that bookmark bottom. So if this is my web page down here somewhere in my code I've got ID equals bottom at the bottom of my page. You can call it what you like. Now the difference between a hyperlink and an anchor when it comes to this particular question is that hyperlinks can link to other URLs, emails, web pages, so on and so forth. When we use the term what's the difference with an anchor, we're basically linking. So somewhere up here, I've got the text go to autumn. And when I click on that, it will take me it will jump my web browser to this point here where it finds that that bookmark or that anchor. It's called an anchor. The anchor tag is this the triangular brackets a and that's called an anchor tag. And inside the anchor tag, we can put the different attributes. Okay? So you have to read the question carefully. In this particular question, it's basically asking us to uh compare an anchor with a hyperlink. So when we're comparing something, we said that we need to find the similarities and the differences. So an anchor and a hyperlink in this case will be what is the difference between this one a link to an anchor point. Okay, it's not talking about the a tag or the anchor tag. It's talking about the anchor itself or you can call it a bookmark and the difference between uh the rest of them. So let's say a link to a URL or to an email or even to a file. You could have for example ahref and put here um revision.pdf that will open a file. Again that's a hyperlink. Okay. But this sometimes they call it a link to an anchor. And in this question, what it wants you to identify is that the similarities are going to be you can apply the hyperlink to images, either the anchor or the hyperlink to images, to text or anything you like. A hyperlink will generally take you to another web page, another either a local page or another URL or to an email or to a file. but that an anchor will take you to a location in the existing web page. That's basically what they're looking for. Okay. So, here's my answers for 9A part one and part two. So, for explain the differences between an absolute file path and a relative file path. I've got an absolute file path refers to the location of a document or URL using its full file path. A relative reference refers to the location of a file starting from the folder where the web page is located. So the web page that you're looking at from the location where that web page is onwards. Okay. For part two, I've got to explain why absolute file paths should not be used for hyperlinks to locally saved web pages. This is strictly on locally saved web pages. So the other web pages that create your website and this is only one mark. So you just want to show that if that path changes essentially the link won't work. So I've got here if the folder path is renamed or the location to a web page we are linking to has changed then the links will not work. Let's just put a comma there. Okay. And let's have a look at that mark sheet. So, for those two parts, that's what it's got for the mark sheet. Um, again, you can see my answers are kind of different. Um, I'm using more basic language, but I'm showing an understanding of the question and the answer, and that's what's important here. Okay. Uh, let's go to uh B. Now B is only four marks and you need to show here that you understand that essentially an anchor is simply a point in the current web page that you're looking at. It's like a bookmark. Hyperlinks well those are the things that we generate to click on and hyperlinks are things that take us to different places. Uh, so when we're clicking to go to another web page or we're clicking to go um to another URL, but we can also click on the hyperlink to take us to the anchor. The confusing thing here is that the A tag is actually called an anchor tag. Okay? And that's I think where the confusion comes in. So if you stop using the A tag as an anchor tag and you just call it an A tag, it then makes more sense. So here's my answer. Both are links which the viewer can click on and can be applied to a text or images. Both anchors and hyperlinks use the anchor tag A to generate a clickable link to which will allow the viewer to navigate. So we can both of these allow us to navigate within our web page or take us to another place. Hyperlinks will generally take the viewer to another web page in the website or to a different URL. That's generally when we're looking at what a hyperlink is. Anchors are like bookmarks. And this is where you're showing your understanding of what an anchor is. Okay? Not the anchor tag, an actual anchor. It's like a bookmark. And they're used to identify a specific location in the current web page like top or bottom. You could have many. For example, if you got a very long page with subheadings, you can create an anchor point on each subheading. And that's an example you can give. and at the top have a menu. So people can click on that subheading and it will jump to that location in the web page. Um an anchor can be created at any point in the web page using the ID equals. You can use name but whichever one you prefer in the HTML code. Once an anchor has been created, we can create hyperlinks to navigate to the anchor. So once we've created that anchor, we can generally create a hyperlink to go to that anchor. So here's the difficult here's the confusing thing. Why is the anchor clickable? Because the anchor run itself, the ID equals bottom is not you can't do anything with it. It's just a bookmark. So to actually create a an anchor that actually works and does something we normally refer to the anchor the ID and the name that we give bottom and then the a tag or the hyperlink which links to the anchor. Both of those together is actually the anchor. So both of these having that here creating the ID and then also creating the hyperlink to that ID. That for me is how I define what an anchor is. Both of those together. The one is uh creating a name in the web page and the other one is a hyperlink to it. That is the anchor. But this on its own is just a hyperlink. And this on its own is just an ID. Okay. All right. And let's see what the mark sheet has for that. So that's for this one here. So this is the mark sheet for that. Okay. There's a lot of things here that you can choose from because there's a lot of things which um are similar or different. You only need four. So you have to look at that mark and the marks of that question. You only need four items, four valid items, not using the same uh reason, the similarity or difference and just writing it in different ways. That's just going to get you one mark. Okay, so that's the mark sheet for that. Okay, question 10. Now here it says, some people use dialogue based user interfaces to operate their car audio system. Describe what is meant by a dialoguebased user interface. So here we're going to describe and then it says describe the benefits and drawbacks of using a dialogue based user interface in this way. So when it says in this way then it means using an car audio system. And again we have to describe. So when it says describe guys again we don't use bullet points. If you're expanding on those bullet points anyway, just write what you're going to write, put a full stop, and then write the next thing. Okay? It's better than just putting bullet points which stand out straight away just by looking at it um that it's bullets. So, in the previous tutorial in the live stream which I did, if you go to that tutorial, I've got the link to that tutorial um in the description below of this video. Question 13, I describe user interfaces and I go through all the types of user interfaces and these are the slides which I have for that. Okay. So I'm going to go through this very quickly um again but I'm not going to repeat everything. So if you want all the information about the user interfaces go to that tutorial question 13. So essentially an interface is um something which is going to allow two devices which would not normally be able to communicate with each other to allow them to communicate with each other. Okay. So in our case when we're using interfaces on devices we're getting a human to have the ability to communicate with a digital device which is your computer or your smartphone or whatever else it is and that device being able to communicate to you. And there are five different ways of doing this. The one is the graphical user interface which is one that we all know and this uses images and pictures for us to communicate. Command line interface. This uses text interface where you have to type the commands. You have to know the commands and you have to type the commands accurately for it to work with graphical user interface. It's much easier to start using it but it takes a lot more memory memory and a lot more processing power whereas CLI takes much much much less. Then we've got menudriven interface. Something like what you get at an ATM when you go to the bank. It gives you a menu and you select items. This is really easy. But the amount of options, the amount of options that you have are uh limited. So you don't have a lot of options there. You can't do as much as what you can, let's say, with a graphical user interface or command line interface. Down at the bottom here, we've got a touchscreen interface. This is usually when you go to, let's say, a fast food restaurant or whatever. You can select items quickly using the touch interface, making it much faster. Again, not as complex as a graphical user interface. Doesn't give you much interaction or control over the interface like a command line interface, but it does allow for quick, simple input. It can get quite tiring after a while. Now, the one we're talking about now is a dialogue based interface. And this is really good when you don't have or your hands have to be doing something else, let's say, or your your concentration has to be elsewhere apart from the device you're trying to control. And this is ideal when you're driving a car because your car your hands have to be on the steering wheel. Your eyes have to be focused on the road in front of you. So, the best interface in this case would be a dialogue base. And dialogue comes from the Greek word theor. And it basically means a conversation or dialogue. And you basically speak to the device. You speak normally and the device listens. It picks up what you're saying through the microphone. It interprets what you're saying and then it comes out and does the actions which you tell it or the commands you give it and then it will normally confirm the actions and confirm the input that it's giving by speaking back to you through the speakers. So this is really great. If you think about car navigation systems, you know, they work like that as well. Instead of you typing in what you want, you can say, you know, take me here. You got things like Alexa and Siri where it's a dialogue based interface where you can ask for things and it will confirm. Car audio systems can tell you to turn you can tell to turn the volume up or turn it down or change the channel. So it's great in these scenarios because it f it gives you more uh safety and more uh when you're doing or operating machinery or doing something where you need to be focused on something else rather than controlling the system. So with that being said, I've got here um where are we? The again these are the slides which I've got from the previous tutorials. It's the same ones again. It's got here the different types of interfaces, their key features, advantages, disadvantages, and examples because you could be asked about anything. And that question was about using a SAT navigation system in the previous now it's talking about using car audio system. The scenario is exactly the same. You have to focus on uh what the topic is about. And here we're talking about dialogue based interfaces. The advantages and the disadvantages are going to be the same for every scenario. Okay. So here are my answers. I have put here an interface where the user uses speech or spoken words to give commands. The interface also interacts with the user through spoken words to confirm actions carried out. So here I've got two things that you use words or speech and it will speak back to you and you're giving commands and it's confirming the commands that you're giving. We'll look at the actually let's have a look at uh actually we'll look at 10 A and 10B together. Okay. So then it says describe the benefits and drawbacks of using a dialogue based user interface this way. And the this way is a car audio system. So obviously you're driving your hands have to be on the steering wheel. You need to be focused on the road. So the advantage is you can be focused on what you're doing focused on your driving. Your hands are uh you don't need to use your hands. you don't need to look away. Um, so it makes it much safer while you're driving. And then the disadvantages, well, we see some of them now. So, dialogue based interface allow uh for hands-free interaction, which is beneficial in circumstances where the user has limited mobility or when the use of both hands are required for other tasks like when driving a car, making it safer to drive. So, there we've got our safe. We've shown that we understand why it's beneficial with the dialogue based interface because we need our hands to be uh on the stereo. We need to be focused on what we're doing. Dialogue based interfaces you uh need to be trained to recognize a user's voice. If you've ever trained your mobile phone or whatever to um carry out voice activated commands, then you will see that there's a series of words and things that you have to say so that it actually understands you. So you train it on your voice. So there is a training um session at the start when you set up your device. So that is a disadvantage and the user will need to learn certain commands. Again you can't just talk to it normally. Yeah. I mean they are getting better and better but for certain commands you need to know the commands that you're going to use so that it actually activates either a particular system or it knows what it is that you want to do. Again, since there's a learning curve, that's going to be a disadvantage. Background noise or people's accent could be an issue as spoken words may not be understood or misinterpreted, which will result in a wrong or no command being inputed. So, again, people have different accents. So, although you train your device, sometimes it's hard for the device to understand what it is you're saying. That could be frustrating if you're trying to change a channel. Let's say in this particular thing here with the audio system, I mean I could have related that to the audio system. Let's say um maybe I should I should expand on that and just say you know you um you might want to turn the volume up and it doesn't understand or you might want to change the channel and it might not understand. So the command might not be inputed. So, um, the other thing is if you're in a car, then while you're trying to give commands to your car audio system, there might be surrounding noise. If the windows are open, if the fans are running or whatever, that noise or if there other people in the car, that noise can interfere with the the commands that you're giving. So, here's the the mark sheet for number 10. So, that's 10 A. Let's expand that down. Okay, let's make that a bit smaller. So there's 10 A and 10B together. Okay. So it says here, software that interacts with speech recognition, uses spoken words of voice um to carry out actions control devices. And for 10B, we've got allows for hands-free control, safer than using standard interface, more useful for physical disabled users, um limited access. So I mean this one here, that's always general. I mean, you can say, you know, it's it's easier for somebody who's got limited um ability or movement to control a car audio system. It's easier for them to um activate or turn on the car audio system or turn it off or change the channels without having to actually um stretch out and change the channels. Limited access due to the number of commands stored. So, we've got these ones here, which is what we said. Here's that being trained by the user. Um it says here can be distracting if the commands are not understood. Okay, the the idea here is that if the commands are not understood that's a disadvantage and that could be a number of things. Either um it's not accepting your input, it's um doing something else because it's misunderstood. It could be distracting or frustrating for the user because he's not understanding them. Okay, question 11. Portable hard drives can be solidstate drives, SSDs or hard disk drives, HDDs. Explain why SSD may be better to use than the HDD. So, what we're looking for here in this particular question is this. It says here portable hard drives. So, it's your answer has to be related to using an external storage device. It's either an SSD or a HDD. And the advantages of using SSD over HDD with a portable hard drive, not a hard drive that you have installed as your primary internal secondary storage on your device, but one that you carry around with you. Okay. So for this I have for you this slide here. So this is question 11. Now here are the different types of storage devices. We've got magnetic storage devices, optical storage devices, and solidstate drives. Now, magnetic storage devices have their advantages and optical and SSDs as well. So, the types of magnetic that we have, oops, is the hard disk drive. Now, here we've got a disc which spins around. It's got a motor or an actuator, it's sometimes called, or the correct terminology is an actuator. And then we've got this arm which goes backwards and forwards and reads that information on the disc. And the information on the disc is stored as very very small magnets. Then we've got the floppy disc. These are kind of extinct. They don't exist anymore. Um you can't even buy one if you want to, but I think they're still part of the syllabus. It's exactly the same thing. The only difference is that we can take the storage medium away with us. This is the disc and the drive or the actu actuator in one device. So you can't just get the hard disk. You need to get the hard disk and the drive together. And this made you know um floppy disc were like your use like your USB pen drives today or CDs. Again magnetic. And then you got tape. Now tape again is not really doesn't really exist much anymore. These are really good for backing up large amounts of data and archiving them. they weren't used to actually res um read and write to non-stop. So if you wanted to store your your drives or you wanted to store large amount of data, you could put it on a tape drive on a tape using a tape drive and that will store all the data. And the idea is you will never ever use that tape unless you had a crisis. All your data has been corrupt and you needed to restore it would it's much much longer. It's it's sequential access. In other words, you can't jump from one point of the tape to the other point of the tape. you have to go through the whole reel. Whereas everything else that we talk about is direct access. So hard disc drives and floppy disc drives and everything else. You can go from one point to another point on the disc instantly. Then you got optical drive. So here you got CDRs, DVDRs, and then you got CDRW and DVDRW. So the R basically means this is a recordable drive. We can see here that the CD uses larger pits whereas the DVD uses smaller pits. The smaller the pits, the more data you can hold. The way it works, a laser will shine on that disc. And if it hits on a pit, let's say it hits on that pit there. Let's enable that. So if it hits on that pit, the laser beam hits on that pit there, it disperses the light. So what comes back is very, very minimal, meaning a zero. If it if it hits on a shiny area, let's say there, then you get a stronger reflection back. And that's a one. Okay. And the more pits you have, the more data you can store, which is why DVD can store more. The RWA basically means rewritable. So these work with a special kind of ink. And what happens when you uh hit the ink with a laser on a certain frequency? It makes a dark spot, meaning less reflection. If you hit the the um the the rewritable medium with a different frequency of laser, it would turn the color back to what it was. So it will make it more reflective and that's what makes it uh rewritable. Solid state, these are devices which don't have any mechanisms. They don't have any machinery, any actuators or anything that has to spin them around. Magnetic and optical drives both need a drive. They need a motor. They need something spinning. They need something reading the discs, these circular discs or the tapes while they're spinning around or moving around. So, whenever you've got something like a motor, an actuator, you got moving parts, things are going to be slower. So, data transfer is slower. And the other problem is that it will also cause an issue if you shake that device or move that device while it's reading or writing. The delicate heads like this head here. as it's moving, the head is actually so close to the disc. It is not actually touching, but it's very close. And if you shake that device or drop it while the disc is spinning at 7,200 revolutions per minute, that head will touch that disc. And what that will do on the disc, it will cause a scratch and that will destroy the sectors on that disc. So there's a higher risk with these things to destroy data or corrupt data because you can't move them around while they are working. Also, if you got an actuator or a motor on the device like you do with magnetic uh magnetic discs or storage devices and on optical devices which also have lasers, they require a lot more energy. So they're not as energy efficient as SSDs. SSDs are much more energy efficient. They store data in electronic form on microchips on little printed CB uh PCBs on these little chips here. So you've got like an SSD hard disk drive here and then you've got well not a hard disk drive, you've got a hard disk, an SSD hard disk, and then you've got these little NVME cards. Okay, essentially exactly the same technology. All of them store the data in electronic form. The same with your USB pen drive or your memory stick or flash memory cards where you've got Now these here are more portable usually. Okay. Um smaller amount of storage. This is the question we're looking at is comparing this device, the SSD hard disk and the hard disk drive. This one here. So you can see straight away this is going to be smaller. It's going to be lighter. is going to be more compact because it doesn't have a disc of moving arms. It doesn't have uh sorry, it doesn't have a motor of moving arms around in there. It's going to require less energy as well. Also, the data transfer on SSD because you don't have to convert let's say magnetic information to electrical data or you don't have to turn convert light energy into electrical data. you don't have that uh process of converting from magnetic to u um digital and light to digital then the reading speeds and writing speeds of solid state drives are much faster because they are already the data is already in electronic form. Okay, so these are generally much faster than SSDs. Now flash memory cards these are primarily used to expand memory on devices. If you want more memory on your phone, then you can use something uh you can use these flash memory cards and that will give you more storage on your device. Um other memory cards are great for cameras, digital cameras. You can expand the memory on them. Um tablets might have an expansion slot. Computers, laptops might have an expansion slot to put flash memory cards. Okay. I've then got for you here a table which gives you general characteristics of each type of storage device. the advantages and disadvantages. You can have a look through those. These are the things that I've already discussed. I'm not going to waste the time by reading this through. You can have a look through it because you can download this PowerPoint from the description in this uh the description of this video. And then here we're looking at the rest of them. We've got some more CD, DVD, and Blu-ray disc. So, this is a continuation of this table here. I didn't want to squeeze everything to make everything too small. Okay. So, here's my answer. Unlike the hard disk drive, the uh the solidstate drive does not have any moving parts and does not need a drive brackets motor which makes the SSD lighter and smaller, therefore more portable. So, I've just got two points here because I've said it's lighter and it's smaller. These are two advantages. Also, as the SSD does not have any moving parts, data cannot be corrupted by moving the SSD while it's reading or writing data, which is not the case with a HDD. So, again, if if it's reading or writing, you can move the SSD. It makes no difference because there are no moving parts to get out of alignment or scratch any disc. SSD drives require less energy. So, it's more efficient, more energy efficient and will not drain the battery of laptop or other battery operated device it's connected to as much as a hard disk drive. So, if it's a portable device, you're plugging it into a USB, it's going to be using the energy of your device to actually um give energy to the disc. So, if it's more energy efficient, then we're going to be draining our battery of the device we're using or the electricity it's using is going to be much more efficient. So, let's say you're uh you're using a laptop and you connect your hard disk drive. If it's a hard disk drive, it's going to drain your battery a lot faster. So, you're going to need to charge your laptop a lot sooner. Okay. So, looking at the mark sheet for 11. So, this is the mark sheet for question 11. um basically everything that we've talked about you only need four marks. I've probably put an answer which is more than four marks but because I want to give you a complete answer but essentially if you hit on two or three four of those points and describe them you should be good. Okay, here we go for question 12. Now question 12 says where are we? Many media companies now provide media streaming for users to watch their television programs. Okay. Explain what is meant by the term media streaming and then describe the benefits and drawbacks of media streaming. Okay. Well, let's first have a look at what I've got for you here. So, first of all, I've got a slide here which I put together for you just to explain what media streaming is and give you some advantages and disadvantage. So first of all it says media streaming is the process of transmitting audio video or multimedia content over the internet in real time without needing to download the entire file before playing it. And this is the really important part here. You do not download the entire file. Okay. So let me explain to you before we'll go through this and then I'll give you a small diagram or an analogy to help you understand how it works. The media is stored on a remote server. As the content is requested, small parts called packets are sent to the user's device. The device buffers a small portion to start playback, then continues receiving data while playing. So, let's understand what that means. I'm going to show you a little I'm going to try and draw you because I'm not very good at drawing. But anyway, if this is a reservoir of water, okay? So, this is a big tank of water. So, and we say this is the movie that is going to be streamed. Now, we then have this here has a hole and it fills the water flow falls into a bucket. Okay, my drawing is not that good. Okay, so the water from here is flowing from here into this bucket. And at the bottom of the bucket, you've got a hole. And what's happening? If you're putting water into the bucket, the water is obviously going to flow out of the bottom of that bucket. The bucket is your buffer. Okay? So what happens is this as when the streaming starts your device will then start downloading and it's in other words the flow of water is going to start going into the buffer of your device and once that buffer starts getting up to a certain level let's say up to about here water or the movie is going to start being played because the water is dripping out the bottom. So that's your data coming out to your device. So, you're watching the movie now because there's water in your buffer or in your bucket and that water is flowing out. That's basically how it works. The other, and I'll explain a little bit about buffering in a second. The other option would be if you were to download the entire movie, you have to download all of the Reservoir, download it onto your computer, which is going to take space on your computer, and then only once you've downloaded the entire thing can you play that movie. Okay, so that's the difference between downloading and streaming. But you keep a copy of the entire movie if you're going to download it. So how does streaming work? Well, they start streaming the video over the internet. Your device starts collecting those packets and puts them in a buffer and out comes the video and you are playing the video as it's continuing to download. If the amount of data that you are playing is greater than the amount of water flowing into the bucket, at some point this water level here is going to drop so low that there's no data to play. And that's when your video is going to start freezing and you get that circle saying buffering. What does that mean? Well, you've run solo there's no water in here or there's no data for me to play. you need to wait for some water to drop into the buffer and once it gets to this level again it will start playing. So basically this means that you need to have a fast internet connection a a good bandwidth and a stable internet connection to make sure that the flow of data going into your buffer is greater than the flow which you are playing. Okay. And that will keep this buffer full because the flow going in is much faster than the flow going out. So this buffer is full and you're playing. Now once you've played it that data is not stored anywhere. So that's how streaming works and if you understand that you can now understand the rest of this examples of video of media streaming is video streaming movies, music like or podcasts, webcast or remote meetings. So live streaming, so when you're doing an online meeting, you're actually streaming your audio and your video to somebody else. They're not saving that video, it's being streamed. And sometimes you get, and we said bad lip syncing or the video freezes. That's because the the internet um connection on one of the two sides is slow or not fast enough. The bandwidth is not big enough. So what's happening is this buffer is emptying out and it has to wait for more data to fill in up to a certain level before it can start playing. Okay, advantages, no need to download the large files. So that's the other thing. If you're downloading, you need to download the entire file and that's going to take a lot of space on your hard drive if you're downloading movies like a a 2hour movie, maybe four, five, six GB. quick access to the content so you can access and start playing immediately. You don't have to wait for the whole thing to download. Live broadcasting is possible. So if there's a live event right now and you want to watch it live, you don't have to wait for that event to finish for someone to upload the video, then you download the whole thing and then watch it as a replay as they are streaming the video like a webcast. Then you can be watching it live. Okay? But again um if if you've got a camera let's say a camera device here which is connected to the internet and you're connect watching what this camera is picking up the streaming bandwidth this way and your download speed this way has to be fast enough to fill your buffer so you can view um that video without any buffering and without any delays. Okay. Otherwise, you will get delays. You will still see everything, but it will keep pausing because your buffer is not is emptying all the time. Um, what's going in is not as fast as what's coming out of that buffer. Um, now the disadvantages requires a stable and fast internet connection. Quality may drop with poor connectivity, in other words, buffering. And the content isn't available offline unless downloaded. So you can't actually store that video to watch it anytime you want. That's a good that's the advantage of downloading a movie instead of streaming it because you may not you have to watch it at a specific time when it's being streamed. Sometimes um the streaming content is only available for an x amount of time and if you don't watch it then you can't watch it because the stream will stop. Whereas if you download something, you can download it and watch it any time you want, whenever you want, at any point in time you want. Um, it's nothing that can be taken down because you've got a copy of it. So with streaming, like even if you think about Netflix, movies are available for an x amount of time and then they're taken down. You can't see them. So if you don't manage to watch the content while it's being streamed or it's available for streaming, you won't be able to watch it. So here's my answer. I'm going to leave this little um diagram here. So for a I've got recorded or live media is transmitted through the internet and can be played back on devices in real time. The media is viewed while it is being downloaded instead of having to download the whole file first. So that's just a little explanation um of what uh media streaming is. Now describe the benefits and drawbacks of media streaming. So here I've pulled media streaming allows users to view media or live event in real time instead of having to wait for the entire file to be downloaded before it can be watched as the file is not downloaded. It does not reduce your storage capacity. So you're not wasting your storage on your device. Media streaming requires a stable internet connection so that the video does not freeze due to buffering. And so I could say here a stable and fast uh a stable and fast internet connection so that the video does not freeze due to buffering. That might even be two marks there, the stable and the fast or bad higher bandwidth. Another drawback is that some media streams are only accessible during a fixed period. If you download a file, you can access it whenever you want. So I only wanted four marks. I should be good. Let's go have a look at uh the mark sheet for this. So this is the mark sheet for 12A. It basically says identify that it's live or recorded content delivered uh to computer via the internet playback in real time. Okay, we're good with that. And this is the second part 12B. Uh the benefits and the drawbacks. And you need to obviously identify both benefits and drawbacks. You can't just go with only the drawbacks or only the benefits. Okay. Question 13. GIF and JPG or GIF depends on how you want to pronounce it. File formats are used to store images. Give one reason for using each of the file formats. Each of your reasons must be different. Okay? So you just need to give the reason. And then B says, explain the differences between the two file formats. So, as always, let's jump to my PowerPoint presentation, which you can download from the description of this video. So, I've got here for you. Before I get to that animation, I've got here for you a table which analyzes and gives you information about the different types of image files. And I'm going to explain the terms so you can understand what these are. So when we're looking at an image or we want to decide on how to save an image, there are certain things that we need to look at. Um the first one is going to be is it a lossy or lossless format. Lossy format basically means that when you save the image it's going to lose some data. The reason why it would lose the data is to try and make the file size smaller. The other reason that you the other way you can make a file size smaller is to compress the file. You know, like when we zip files together, we compress them, but we don't necessarily have to lose data when we compress the file. So, there's two things that we look at. Is it going to be a lossy format, which is going to lose some data permanently and reduce the quality, and does it compress the file? When you take a picture or a photograph with your mobile phone, you're actually taking pictures and it saves them automatically for you using the JPG or the JPEG format, Joint Photographers Experts Group. That's what it stands for. Now, that is a lossy format and it is also going to compress it. So, there's two things it does to make the file smaller. You say, "Well, why is it making it smaller?" The reason your phones or your smart devices, your cameras are making the file smaller is because every picture that you take with your camera on your phone is actually approximately 50 to 60 megabytes. 50 to 60 megabytes. What you get when you take the picture is a JPEG file which is only about between 4 and 6 MGB. So 10 times smaller. Why? Because it's losing some data and it's also compressing the file. Why do we do that? Because if we didn't, you would take a 100 pictures with your phone and then you will be out of memory on your phone. So you're going to need a mobile phone or a smart device which has got like 3 GB or 10 GB of storage so you can store some images on there. Okay. So that's a good way to use JPEG if you want good quality but lossy format so that the file is smaller and compression. Now the other thing that you're going to be looking at when you're saving a file is how what is the color depth that you want? How many colors? The more colors you have, the more color depth you have and the better the quality you have. So, if you're trying to uh uh paint a portrait of someone and you're only using two colors, then it's going to be black and white. If you're going to use, let's say, a 100 colors, then it's going to be better. If you're going to use a million colors, then you're going to get much better contrast and color blending. You're going to come out with a beautiful, very highdetailed image or artwork. So, the color depth is also important. The more colors you use, well, the bigger the size of the file. The bigger the size of the file, the more storage it takes or the more uh time it's going to take to download from the internet. So, the reason that you need this image is going to decide these factors. The other thing that we want to have a look at is do we want to allow for transparency? In other words, all images have a rectangular shape. They have a dimension, a width and a height. But let's say I want a round image and I don't want the white border around that white image to show. Then you can't do that with some file formats, but you can with some. That's called transparency. And if a file format supports transparency, it's great. Let's say when you've got a dark background and you want to have your color, you want to put your company logo on your website. You don't want a square white brick with your logo in the middle. You just want your logo to stand out. Just the logo without the white rectangular part. So, does that file format support transparency? So, here are the types of images that we have. We've got BMP, which is a bitmat image file. This is uncompressed and can go up to 32bit color. That's millions and millions and millions of colors. In other words, each pixel is made up of 32 ones and zeros, okay, of color. A GIF or a GIF, this is a graphics interchange format. This is lossless. So, it doesn't lose any um so this is so the BMP is not a lossy format. It's lossless and it is uncompressed. The GIF is lossless, but it's only limited to 8 bit color. In other words, a maximum of 256 colors. This is why when you see on social media some of these animated GIFs, the colors are not that good. That's because it's only got 256 colors. JPEG or JPEG with an E that we talked about this one. This is a lossy format. It is compressed and it does not support transparency. GIF, however, or GIF does support transparency. PNG, which is a portable network graphics. This is a lossless format, and a lot of people get confused with um JPEG and PNG. Now, this can go up to 32bit color, but it also supports transparency. Usually with PNG, you would only use PNG. You can use it for photographs because it can be high quality. It's got a good color depth, very high color depth. JPEG only goes up to 24bit color depth because it gives eight bits for the red, eight, eight bits for the green and eight bits for the blue. Um, but usually when you're using portable network graphics, you're only using for images where you can actually distinguish each color, you know, with logos and things like this. It gives you vector graphics, which is absolutely fantastic. TIFF. This is a tagged image file. This is the lossless. And it can be either compressed or uncompressed. In either case, depending on how you're going to save it, it is still lossless. It's not going to lose any data. Okay. Uh but you can compress it so that it actually makes a smaller file size, goes up to 32bit color, and it does allow transparency. So, this is a nice little table. And here's an example of what I mean by animation. Oh, the the good thing about GIF. Um, it allows for animated uh images. So, simple animation, great for web graphics. And this is the only one that really allows for animation. So, if you want something moving, your only option is going to be a GIF file. So, here's an example. I've got a picture background here. This picture background from my YouTube channel there from the header. This here, this is a JPEG file. You can see it's not transparent. It's not moving. It's got a lot of color depth. There's loads and loads of colors there. Over here I've got an animated GIF and you can see one this is moving. Two it's transparent. Can you see that it's going over it's not taking a big white brick to show this uh display. So it is it has got a transparent background. And can you see the transition? If I pause that look at the transition from dark blue to yellow. You can see this scaling of colors. And that's because it can only use 256 colors. So you're not getting a very good contrast or a very good blend of the colors, which is why it looks very pixelated and jittery. Okay. So with that in mind, we now have I've got for you here um some notes. BMP files are not compressed. It gives you just uh what we've got in that table, but in a more text form. So whatever works best for you. And here I've got my answers. So, we would use a GIF or a GIF to store animated images like logos. That's a good one. And JPEG we can use to store pictures or photographs because they give you a lot of color depth. Um, you don't need to explain why. It just says give two uses. That's it. The next one, this is where we're going to explain the differences between GIF and JPEG. So, here's my answer. Graphic interchange format. GIF is a format that stores image. Now I've put this here graphic inte I've given the full name. If they don't give you the full name and they only give you the abbreviation like this then if you give the full name you will get a mark. Okay. So if they tell you explain the differences between ROM and RAM but they don't tell you ROM is read only memory and RA RAM is random access memory and you state what each one is you're getting a mark possibly for each statement that you're getting giving the full name. Okay. It um is a format uh is a format that stores images with 8 bit or 256 colors resulting in a small file size. Joint photographers expert group. So there's another mark there probably. JPEG can store images with millions of colors up to 24bit. Now if you can remember this that's fine. It shows you got good understanding and knowledge which means that the quality of the images are better quality than GIF. GIFs can be animated images and also provide for transparency whereas JPEG does not support neither animation or transparency. So there's two marks there. Okay, because I'm explaining the differences. I've got two differences there. JPEG is a lossless format, which means that every time the image is saved as a JPEG, data is lost. And this is true. When you save an image and then save it again as a JPEG and save it as again as a JPEG because the scripting language is using um to do the compression and to do the lossy format to reduce the file size, you're usually losing a little bit more data. Something not many people know. This is not the case with GIF as it is a lossless format. Um GIF when you save it, as you save it, it saves it. It is not a lossy format. It doesn't need to be because you've only got 8 256 colors. It's usually small files. So, it's never going to be a really big file because it's only 8 bit color. Okay, let's go have a look at what the mark sheet has here. So, we've got Yep, there we go. So, that's for A. You can use anyone from here for GIF and anyone from here for JPEG. You just need to be able to um distinguish the need or the purpose for each one. And then for B, again, um six points. you want to gain you want to give you know um points on the GIFs and the JPEGs as well. Okay. So that's the mark sheet. Again I don't like going through the going uh basing my answers on the mark sheet. I I like to give answers which are normal answers um so that you students can learn that you don't have to memorize what's on the mark sheet to give an answer. Okay, let's uh there's another question here. Let's just go have a look at we haven't shown that one yet. So it says here the file size of an image can be reduced by changing the file format of the image. State two other ways of reducing the file size of an image. Well, we've discussed that already. Um well discussed one of them at least. We said that when you have when you reduce the color depth that's going to be the first one. So you can reduce the color depth or the number of colors used for the image that will reduce the quality and reduce the file size. The other one is going to be the resolution. So if you're going to reduce the amount of data that you're actually storing. So that's called actually DPI. Have I put anything on DPI here? So uh reducing resolution reduces the image size. For example, going from let's say uh 300 dots per inch or what we call dpi and reducing that to 72 dpi. That basically means instead of using 300 dots for every inch to make the image, we're using 72 dots to make the image. That's going to drastically reduce the size of the file. So if we have a look here for question C, it says here I've put here change the res resolution of the image for example from 300 dpi to 72 dpi. And the other one is to reduce the color depth of the image for example changing from 24bit color to 16 bit color. You don't have to put the examples. You only need to put you know just state because that's what it says. It doesn't say an example, but I've put that example there so that I can expand on the knowledge that you're gaining from uh watching this and you can understand exactly what I'm saying. Question 14, the last question. So, this one is about well, let's see what it says. Identify the most appropriate method for reducing data entry errors from the descriptions given. So the descriptures are manually checking the data without reference to the original copy. Checking that the data being entered is reasonable, preventing errors when data is copied from one medium to another. So let's go identify what this is all about. This is a bit of a tricky question. So this is all about identify the most appropriate method for reducing data entry errors. So when we're talking about data entry errors, we we're looking at the things that we do to control or to try and minimize errors being entered into a form or when we're entering data into a database. And that's going to be the three aspects. You've got proofreading, verification, and validation. So let's see what these are. Proofreading is exactly that. Once you have entered your data, so think of it this way. If you're copying the data, if you're copying your friend's work, their homework as your homework, you've copied it, you've typed it all out, and then after you've typed it out, you go and proofread it to go and find any spelling mistakes or any grammatical mistakes and you fix it. That's called proofreading. That's what you do after you have entered the data, not while you're entering the data and not before you enter. is after you've entered all the data, you go back and then you proofread. And that's why I've got this word after in red. Verification is what you do while you're entering the data. Okay? And this is done by humans. And this is the difference here with verification and validation. Verification is an action done by humans and this is done by computer. This one is also done by humans. So I just I would just leave that there so it makes sense. So what does that mean? There's two ways that you can do verification. The one is double entry. Enter the same thing twice and then you can compare the two. You know when you're entering in a form, you've got to enter your password twice and if you enter it different in the second time round, it tells you tells you the two passwords don't match. That's a verification process. you've got to enter it twice and you have to enter it correctly. The other way to do it is as you're entering data and you've got your copy that you're entering data, you're checking what's here and what you put on the screen. You write the next one. You check right what's on here, what's on the screen. This is verification. You might have, and I do this a lot, another person sitting next to you who is checking what you're typing or what you're entering on the screen with what's on the original copy that I'm copying. So you've got a second person who's going to be just verifying uh and checking what you're entering. So that's verification. The last one is validation. The validation this is what we've talked about already. And again in my tutorial in the previous tutorial you're going to see there's a section there which is to do with um in in the system life cycle when we do the design in the system life cycle part of the design is to set up the validation routines. So we try to prevent people from creating errors or entering errors by setting up rules. For example, the number can't be greater than 100. The telephone number has to be eight characters long. It has to be only numbers or only text. We could use a mask. So it's one letter and then four numbers. And if somebody while they're entering data, they enter it wrong, it will won't let them. It will give them a message. We might put options or tick boxes that they will tick instead of typing things out. Okay. So these are validation rules. So knowing this now we can go back to our question and analyze it. So manually checking the data without reference to the original copy, without referring to the original copy. And you're going to do this manually. In other words, you're going to do it and you're not checking the original copy. This is going to be proofreading. Okay? because it's after we've done it, we're going to check it without checking the original and we're doing it manually. Checking that the data being entered is reasonable. So, while you're entering the data, is it reasonable? Well, that's a bit tricky. Let's look at the next one. Preventing errors when data is copied from one medium to another medium. So, think about that. What do you think the answers are there? And here we go. Instead of reading them and wasting time, there are the answers. So the first one is going to be validation. Why? Because this is checking the data being entered is reasonable. So as you're entering the data, it's going to check to see if it's reasonable. Does it meet the validation rules? Okay. The other one is preventing errors when data is copied from one medium to another. In other words, I have my hard copy and I'm copying the data from here on my computer. This is one medium. That's another medium. Okay, this is a printed copy. And this is on my computer. I'm entering an electronic copy. That's a different medium. Okay, that was a long tutorial, a really long tutorial. But as you can see, we're not just answering the questions. There was a lot of material there and we've covered a lot of topics, a lot of the chapters. We haven't covered them in full, but we have covered a large majority of a lot of those chapters. So, I'm thinking this tutorial together with the previous tutorial that I've got on the live stream, which you can find a link to in the description at the bottom of this video, then I think that should be enough to really give you a lot of knowledge and give you a good boost for the theory paper which is coming up soon for most of you. So, if you have found this useful, if you have learned something new, make sure you like, make sure you subscribe, and make sure to come back and let me know how you did in those exams. Take care. See you in the next tutorial. Bye-bye.