Website Exercise

Create an Online website using the service provided by http://wix.com

Your website must contain coherent and consistent information on a topic of you choosing. Ensure that your chosen topic which is suitable for a student you age and one that your parents will be proud of.

Include a suitable layout, and pages for “About”, “Contact”, and a Homepage.

Utilize as much features as possible including

Images, text, graphics, hyperlinks (email address etc).

© 2019  Vedesh Kungebeharry. All rights reserved.

Modem

A modem converts a computer’s digital signal   to an  analogue signal for transmission over a network;  and converts analogue signals from a network back to digital signals.

Converting digital to analogue is called modulation.

Converting analogue to digital is called demodulation.

The word modem is short for modulator demodulator.  

© 2019  Vedesh Kungebeharry. All rights reserved.

Peripheral Device

Definition:  Any input or output device that connects to the system unit of a computer system.

Examples include : Mouse, Monitor, Keyboard, Printer.

Peripheral devices do not aid in the system unit’s main task , i.e, computing.

 

© 2018  Vedesh Kungebeharry. All rights reserved.

 

Archive

Information technology systems produce data that is usually recorded or stored.  This information is used to make  strategic decisions to capitalize on  opportunities, and tactical decisions to improve efficiency.

As time passes on, some of the older recorded data becomes less useful in decision making and is accessed infrequently. In this case, we make an archive of this data.

Definition: An archive is a historical copy of information that is important to an organization.

Archives can be used to look back on past decision making, or to gain a better understanding of an organization’s history.

Computer output on microfilm and magnetic tape can be used for archival purposes.

File access

The data is usually stored onto the tape in the order it was exported from the original system, and may be to some extent in sequential form.

However, after many years the original system’s data structure may change and differs from the sequence on tape.

This means that when searching for a record for research purposes, all the data must be examined because the tape’s data structure may be forgotten or unknown; thus making it a serial access medium.

External Video

Archives in a business context:

https://www.youtube.com/watch?v=a-x2IUZVhAE

Credit:

Business Archives Council of Scotland

@businessarchivescouncilofs40

https://www.youtube.com/@businessarchivescouncilofs40

Creating Digital Archives

https://www.youtube.com/watch?v=X53N86nP3lk

Credit:

The British Library

@britishlibrary

https://www.youtube.com/@britishlibrary


updated 26th November 2022 – Added external Video section

(last updated 4th October 2019)

© 2019  Vedesh Kungebeharry. All rights reserved.

Simple Text Formatting

Improving readability and enhancing appearances

Text can be formatted to improve the appearance and readability of a document.  See the example below:

Before Formatting for Appearance and readability

James told Sally, “The quick brown fox jumped over the lazy dog.”

It is  imperative that we let James know that his sentence contains all the 26 letters in the alphabet.

After Formatting for Appearance and readability

James told Sally, “The quick brown fox jumped over the lazy dog.”

It is imperative that we let James know that his sentence contains all the 26 letters in the alphabet.

Conforming to standards and conventions

Other times text is formatted to meet standards and conventions. e.g the equations shown below

10 eq examples

 

 

 

Common Formatting Tasks In Word Processing (Microsoft word)

Task Description How to accomplish Example
Bold Increase the weight or thickness of text, i.e. embolden text 1. Select the text

2. Press Ctrl+B or Click the Icon shown below in the red circle on the home ribbon:

1 Bold

This text is not bold.

This text is bold.

Italicize Gives text a slanted appearence 1. Select the text

2. Press Ctrl+I or Click the Icon shown below in the red circle on the home ribbon:

2 Italics

This text is straight.

This text is slanted.

Underline Underlines text. 1. Select the text

2. Press Ctrl+U or Click the Icon shown below in the red circle on the home ribbon:

3 Underline

This text is underlined
Changing

Font

Changes the style of the written text 1. Select the text

2.Use the dropdown shown below to select a different style:

4 changing font

Some text

Some Text

Font Size Changes the size of the written text. 1. Select the text

2.Select a size from the box shown below:

5 Font size

Small

Large

Font Colour Changes the colour of the written text 1. Select the text

2.Select a new colour from the box shown below on the home ribbon:

6 Font Color

RED

Blue

GREEN

Text Highlight Changes the background colour of text 1. Select the text

2. Select a new colour from the box shown below on the home ribbon:

7 font hilight

9 Highlight example
Subscript and Superscript Lowers and Raises text respectively 1. Select the text

2. press Ctrl + = for subscript, Ctrl + Shift +  for super OR

Select the desired script modifier shown below on the home ribbon:

8 superscript and subscript

Subscript

Normal

Superscript

© 2018  Vedesh Kungebeharry. All rights reserved.

Computer Hazards

There are various hazards to consider when using computer systems.  Employers take steps to educate employees on safe practices as well as provide proper equipment to promote a safe work environment.

It is also important to be aware of computer hazards and how to use computer systems safely at home.

Eye strain

The eyes can be come hurt or damaged when staring at a screen for long periods of time without a break. Flickering monitors, brightly lit screens, and glare can contribute to eye strain.

Depiction of a person suffering from eye strain
https://www.myupchar.com/en, CC BY-SA 4.0 <https://creativecommons.org/licenses/by-sa/4.0>, via Wikimedia Commons

Symptoms include:

  • Blurred vision
  • Eye pain
  • Burning in Eyes
  • Headache
  • Nausea

You should:

  • Use properly working monitors or screens
  • Use Anti-glare screens or monitors
  • Reduce the intensity of brightly lit screens
  • Use screens that display text that is clear and easily readable

Back Ache

Lower back pain
Injurymap, CC BY 4.0 <https://creativecommons.org/licenses/by/4.0>, via Wikimedia Commons

Poor posture can contribute to pain and stress of the back and neck.

You should:

  • Use an adjustable ergonomic chair
  • Use an adjustable monitor

Repetitive Strain Injury (RSI)

This is muscle or nerve injury caused by repetitive movements over a long period of time.

Any part of the body that performs repetitive actions can be subject to RSI.

Some examples of actions that can lead to RSI

Symptoms of the affected areas include:

  • Pain and Tenderness
  • Throbbing pain
  • Stiffness
  • Reduced range of motion
  • Numbness
  • Weakness
  • Cramps

You should:

  • Practice using good posture and technique when doing repetitive tasks
  • Take frequent breaks
  • Use ergonomically designed equipment

Carpal Tunnel Syndrome

Carpal tunnel syndrome isBruceBlaus. When using this image in external sources it can be cited as:Blausen.com staff (2014). “Medical gallery of Blausen Medical 2014”. WikiJournal of Medicine 1 (2). DOI:10.15347/wjm/2014.010. ISSN 2002-4436., CC BY 3.0 https://creativecommons.org/licenses/by/3.0, via Wikimedia Commons.

Force on the wrist and bad posture contributes to carpal tunnel syndrome, which in this case, makes it a form of repetitive strain injury.

Carpal Tunnel Syndrome
BruceBlaus. Blausen.com staff (2014). "Medical gallery of Blausen Medical 2014". WikiJournal of Medicine 1 (2). DOI:10.15347/wjm/2014.010. ISSN 2002-4436., CC BY 3.0 <https://creativecommons.org/licenses/by/3.0>, via Wikimedia Commons

Symptoms include:

  • numbness, tingling, or burning sensations in the thumb and fingers, in particular the index and middle fingers and radial half of the ring finger[1]
  • wrist pain
  • Pain an strain in the upper forearm or arms
  • Loss of grip strength in hands

You should:

  • Use wrist stretching and exercise as a preventative measure
  • Take frequent breaks
  • Use ergonomically designed equipment

Hearing loss

Bose QuietComfort 25 Acoustic Noise Cancelling Headphones with Carry Case
Florian Fuchs/Wikipedia/CC-BY-SA 3.0, CC BY-SA 3.0 <https://creativecommons.org/licenses/by-sa/3.0>, via Wikimedia Commons

Hearing loss and damage can occur by listening to moderately loud sounds and music for long periods of time.

Symptoms include:

  • Permanent partial loss of hearing
  • Ringing in ears

You should:

  • Use headphones at a safe and low volume level
  • Reduce your exposure to loud sounds when playing videogames or watching videos
  • Ensure that you start using audio devices at low levels first and then adjusting the volume to safe levels.
  • Set all volume levels on hardware controls to low when you are finished using devices.

Computer Addiction

Internet addiction
Sam  Wolff from Phoenix, USA, CC BY-SA 2.0 <https://creativecommons.org/licenses/by-sa/2.0>, via Wikimedia Commons

This refers to excessive or compulsive use of computer systems and devices such that an individual personal , social and professional life is affected negatively.

Symptoms include[2]:

Physical

  • Backache
  • Headaches
  • Weight gain or loss
  • Disturbances in sleep
  • Carpal tunnel syndrome
  • Blurred or strained vision

Psychological / Behavioral

  • Feelings of guilt
  • Anxiety
  • Depression
  • Dishonesty
  • Euphoric feelings when in front of the computer
  • Unable to keep schedules
  • No sense of time
  • Isolation
  • Defensiveness
  • Avoiding doing work
  • Agitation

Helpguide.org provides the following tips for helping someone who is addicted to a computer or the Internet[3]:

  • Introduce the Internet addict to other people who handle their use of the Internet reasonably.
  • Serve as a good role model for the Internet addict by properly managing your own use of computers and the Internet.
  • Support a person’s desire for change if it appears that he or she is an Internet addict.
  • Talk to the person about your concerns that he or she may be an Internet addict.
  • Get the person involved in interests that aren’t related to the Internet.
  • Encourage an Internet addict to seek professional counseling.

Radiation from mobile phones

Mobile phones use and produce electromagnetic radiation.  Electromagnetic radiation is dangerous in high doses; however, international manufacturing standards prevent the production of mobile devices that are dangerous for use.

Cell phone towers produce large amounts of electromagnetic radiation and can be very harmful in to persons in close proximity.  People should not come within 1500 feet ( 460 meters) of a cellphone tower, or be in an area of overlap of 6 cellphone towers.[4]

Closure – Discussion on Content after Reading/Study

See the video below:

Update: Added video discussion (Wed 29th Sept 2021)

© 2018  Vedesh Kungebeharry. All rights reserved.

[1] https://en.wikipedia.org/wiki/Carpal_tunnel_syndrome#Signs_and_symptoms

[2] https://www.psychguides.com/guides/computerinternet-addiction-symptoms-causes-and-effects/

[3] https://www.psychguides.com/guides/computerinternet-addiction-symptoms-causes-and-effects/

[4] http://electromagnetichealth.org/electromagnetic-health-blog/emf-help-blog%E2%84%A2-5/

Reliability of information sources

View the video below before studying the notes below. The video is not tailored specifically to our notes, however it builds a good context for proper use of information sources.

Credit: Western University (https://www.youtube.com/user/WesternUniversity)

Reliability of information sources

Information is used to make decisions that can impact the long term welfare of organizations or society as a whole.  Information that has been retrieved electronically must be evaluated to be reliable.

On the lowest level of evaluation, we should consider the following criteria:

  • authenticity,
  • currency,
  • relevance,
  • bias

Authenticity (or Credibility)

This refers to the integrity of information or how correct the information is.  Usually, we try to verify gathered information against other sources to establish that the information is accurate.

Credibility refers to the amount of trust we place in an information source being correct.

Established authorities are good sources of verification, e.g Organizations, experts in the field etc.

Accuracy

This refers to the correctness of discrete items in the information source and how complete the information is for it’s application.

Reliability

This refers to how consistent the information source is over time.  For example, when monitoring temperatures related to climate change we may want to record the temperatures at consistent time intervals.   Even though each individual recording may be accurate and precise, the lack of regular recordings can make the information unreliable when determining trends associated with temperature.

Currency (or Timeliness)

Information should be current, and recent enough to make problem solving and decision making reasonable and reliable.

In problem solving and decision making, all information is considered to have a life span for which it is appropriate.

Relevance

Information gathered should be relevant to the topic being researched and free from extraneous, cosmetic, and irrelevant details.

It should be appropriate for the tasks of problem solving and decision making.

Bias

Gathered information should be free from bias, i.e the information is objective and free from preconceptions.

A reputable institution should support source without bias in the information.[1]

[1] Discovering Computers (2011) pg 92

last updated Tuesday 12th March 2019, Wed 27th Jan 2021

© 2018  Vedesh Kungebeharry. All rights reserved

Sources of Data and information

Recall that data can be processed to produce information.

Information Sources

When searching for information, we may acquire our research from various sources.

Sources of information emerge from:

  • Interview experts in a field; people related to your research.
  • Books, Newspapers, magazines and journals.
  • Computer databases, company databases.
  • Websites on the internet.

Document Types

Most of the time, we can gather data and information from various documents.

Turnaround documents

This is a document produced by a computer that can be used to record information by a human.  The document with its new information can then be input into the computer system for further processing.

OMR and OCR are technologies that are widely applied in this process.

e.g

Turnaround document

[1]

Human Readable and Machine readable forms

Human readable documents , simply put, can be read by humans.

Machine readable documents contain  parts that can only be read by a computer system and not by humans.  E.g. barcodes, QR codes etc.

Hardcopy and Softcopy

Hardcopy output is physical, e.g printed paper.

Softcopy output is not tangible, e.g a webpage displayed on a screen, the sound coming from a computer speaker.

[1] http://ictsmart.tripod.com/ict4/print/partdctd.htm

 

© 2018  Vedesh Kungebeharry. All rights reserved

Data and Information

Definition: Data are raw facts and statistics that have been gathered as input  for processing.

Definition: The output of data processing is information; i.e the results of data processing.

Example:   The heights of each student in a class can be gathered as data   for analysis. e.g

150, 160, 150, 161 etc.

The data can be  analyzed or processed  to determine the height of the tallest student and the average height of students in the class. The processed values   are called information.

 

© 2018  Vedesh Kungebeharry. All rights reserved

Data and Software Maintenance

Computer systems require routine maintenance for their data and software to ensure efficiency and prevent breakdowns.

The maintenance tasks are outlined in the following sections.

  1. Disk Formatting
  2. ANTIVIRUS SCANS
  3. Software Updates
  4. Backups
  5. Disk Defragmenting
  6. Disk Cleanup

Disk Formatting

New secondary storages need to be formatted before use.

Disk formatting refers to preparing a secondary storage medium for use by the computer system.

This includes structuring the initial data on the disk so that new data can be stored and managed effectively.

ANTIVIRUS SCANS

A computer virus is malicious software that is harmful to computer programs and data.

They are usually created to damage or disrupt the functioning of computer systems for malicious purposes.

Protective antivirus software  prevents infections from computer viruses and can remove existing viruses in computer systems.

Antivirus software removes existing viruses via scanning or searching through computer software and data for virus infections.

Software Updates

Both system software (including the operating system) and application software may require updates from the manufacturers for improvement to features and to fix  existing issues.   This process is sometimes automatic  or may require intervention from the computer user.

Examples include Windows updates, MS Office updates.

Backups

A backup is a duplicate or copy of data.   Computer systems are backed up to recover  from accidental or malicious data loss or corruption.

Reasons for data loss include

  • Theft
  • Hardware Failure
  • Viruses
  • Fire
  • Natural Disaster

Usually the backup is stored off-site in another physical location to the computer system.

Backups can be scheduled automatically or performed manually by the user.

Disk Defragmenting

Files stored on a computer may not be stored in continuous blocks of data.    A computer is most efficient when reading data that is stored in large continuous blocks.

Over time, files stored in computer system can become increasingly fragmented, beaning that they are stored in discontinuous blocks over the file system.

Defragmenting is the process by which files are re-joined into continuous blocks.

Defragmentation tasks are usually  scheduled and managed by the operating system, but can be manually performed by the user.

Disk Cleanup

Disk cleanup refers to the process of removing redundant and useless files from computer storage to increase the free space capacity for new files.

Files are cleaned from the recycle bin and other temporary storage locations.

Windows operating system provides a utility that performs this task that is usually managed by the computer user.

Updates to this post

2024/1/9 – Added table of contents

© 2018  Vedesh Kungebeharry. All rights reserved