awareness that many people using
english discussion groups may not be
native to england
disability
blind
text alternatives
for graphics
deaf
subtitles for videos
colour
blind
choosing suitable colours that don't contrast
security and
privacy
spam
knowing not to
contribute to it
checking email headers
replies are only sent to
people that need them
formal and informal
writing
informal
messaging friends
slang
social
media
formal
letter
applying for a
job
collaborating
with friends
make it
easier
gets it done
quicker
purpose of key IT
applications
productivity -
improving the
output e.g.
using IT to help
people work
more efficiently
word processing
makes redrafting
more effecient
vector design programs
produce drawings that can be
scaled almost infinitely without
loss of quality or increasing the size
of the files.
Web browsers should all
display information provided
on the internet consistently
irrespective of the device.
A spreadsheet
helps us to apply
mathematical
calculations to
data
The internet is
increasingly the
computer platform, its
purpose is to store and
provide and enable
creation of information all
over the world.
Text messages enable low cost,
instant communication. Basic
principles of files names and
structures associated with
different applications.
Issues related to interoperability
(connecting to each other) of
applications from different
providers.
File sizes, file types and
conversion between files
Save as, import and
export to and from
applications
Passwords enable security but
quality of passwords matters
Identifying unsafe
practice
Knowing that
people on the
internet should
not be trusted
without good and
independent
verification of
their identity
Knowing that simple
internet searches can
reveal a lot about you
and other people.
Knowing that
leaving your
computer
without logging
out is a very
significant
security breach.
Knowing about
common internet
scams
file types
.DOC - document
Word processing document.
.PDF - document file
Portable Document Format (PDF) is now an open standard for electronic document exchange , PDF
files can contain clickable links and buttons, form fields, video, and audio — as well as logic to help
automate routine business processes. When you share a PDF file, virtually anyone can read it using
free Adobe Reader® software or the Adobe Reader mobile app.
.PPT - powerpoint
PowerPoint is a slide show
presentation program
developed by Microsoft.
.MOV - movie
Common multimedia
container file format
developed by Apple and
compatible with both
Macintosh and Windows
platforms; may contain
multiple tracks that store
different types of media
data; often used for saving
movies and other video files.
.JPG - graphics file
JPEG - Joint Photographic Experts Group. (.JPG
file extension, pronounced Jay Peg). This is the
right format for those photo images which
must be very small files, for example, for web
sites or for email. JPG is often used on digital
camera memory cards.
.PNG - graphics file
Portable Network Graphics (PNG) is a graphics file format that supports lossless
data compression. PNG was created as an improved, non-patented replacement
for Graphics Interchange Format (GIF), and is the most used lossless image
compression format on the Internet.
.ZIP - compressed file
ZIP is an archive file format that
supports lossless data compression.
A .ZIP file may contain one or more
files or folders that may have been
compressed.
.SVG - graphics file
Scalable Vector
Graphics (SVG) is an
image format for
two-dimensional
graphics with support
for interactivity and
animation. The SVG
specification is an open
standard.
.XLS - spreadsheet
Microsoft Excel file
format, a spreadsheet
file format.
.MD4 - video file
MP4 is a digital multimedia
format most commonly
used to store video and
audio.
.MP3 - music file
MP3 is a standard technology and format for
compressing a sound sequence into a very small file
(about one-twelfth the size of the original file) while
preserving the original level of sound quality when
it is played.
.TXT - text file
"Text file" refers to a type of container, while plain
text refers to a type of content. Text files can
contain plain text, but they are not limited to
such.
A file type or file format
describes the way in
which data is encoded
for storage in a
computer file. File format
may be either
proprietary or open
more file types
.OGG - multimedia file
Ogg is a free, open container format. The
creators of the Ogg format state that it is
unrestricted by software patents and is
designed to provide for efficient
streaming and manipulation of high
quality digital multimedia.
OGG vorbis. -
audio
compressed file
Vorbis is a free and
open-source software It
is an audio coding
format for lossy audio
compression.
.HTML - web pages
HyperText Markup Language,
commonly referred to as HTML, is
the standard markup language used
to create web pages. It is written in
the form of HTML elements
consisting of tags enclosed in angle
brackets (like <html> ).
.EPS - graphics file
an EPS file is a PostScript program, saved as a single file that
includes a low-resolution preview "encapsulated" inside of it,
allowing some programs to display a preview on the screen.
.odt - xml based file for office.
Open Document Format for Office
Applications (ODF), also known as
OpenDocument, is an XML-based file
format for spreadsheets charts
presentations and word processing
documents.
.WAV - audio file
Waveform Audio File Format (WAVE,
or more commonly known as WAV
due to its filename extension).
.WMF - image file
Windows Metafile (WMF) is an image
file format originally designed for
Microsoft Windows in the 1990s.
Windows Metafiles are intended to be
portable between applications and
may contain both vector graphics and
bit map components. It acts in a
similar manner to SVG files.
.MPG - audio and video file
one of a number of file
extensions for MPEG-1
or MPEG-2 audio and
video compression.
.FLV - video file
Flash Video FLV file.
.EXE - file extenion
a file extension for an executable file
format. An executable is a file that
contains a program - that is, a
particular kind of file that is capable of
being executed or run as a program in
the computer. An executable file can be
run by a program in Microsoft DOS or
Windows through a command or a
double click.
.RTF - text file
RTF is a text file format
used by Microsoft
products, such as Word
and Office. RTF, or Rich
Text Format, files were
developed by Microsoft in
1987. RTF files support text
style formatting, as well as
images within the text.
.GIF - image file
The Graphics Interchange
Format (better known by its
acronym GIF) is a bitmap image
format.
.AVI - video file
The AVI format is
popular for
watching standard
definition video. AVI
player is compatible
with tablets, TVs
and PCs.
proprietary
created by commercial companies to
support their own applications. For
example Microsoft use a .docx file
format for Word.
open-file
do not belong to anyone in
particular. For example a
.txt file can be read by any
text processing
application
SMART targets
Specific goals
Measurable goals
Attainable goals
Realistic and relevant
goals Time bound goals
target audience
age
gender
background
nationality
disability
aspects that are
suitable for the
audience
style of writing
language
images
fonts
colours
multimedia content
ICT can reach a global audience
Translation software, VoIP
(Video conferencing, Skype, etc),
websites, public web pages
(wiki), online messaging,
forums
shortcuts: Copy a selected item: Ctrl+C Cut a selected item: Ctrl+X
Paste a selected item: Ctrl+V Undo an action: Ctrl+Z Redo that
thing I just undid: Ctrl+Y Select everything: Ctrl+A Print: Ctrl+P
internet scams
phishing
The most common
types of phishing
scams are fake emails,
social posts and texts.
hacking
If someone tries to access your
computer, tablet or smartphone
without permission,
malware
- Malware is a
computer program
that’s designed to
damage a computer
without the owner
knowing anything
about it
why are file types used?
so that the user
knows the correct
software to use
so that the user knows what the
file may contain from seeing the
file extension
so that the user can
search and sort files
more effectively
so that the operating system
can display the appropriate
icon
so that the operating
system can open the
appropriate application
so that the application program
knows how to load and interpret
the data
File size is the measurement
of how much disk space a
file requires when it is
stored. It is usually
measured in bytes and
multiples of bytes
A licence allows an
individual or group to use a
piece of software. Nearly all
applications are licensed
rather than sold. There are a
variety of different types of
software licenses:
● Some are based on the number
machines on which the licensed
program can run
● Others are based on the
number of users that can
use the program.
● Most personal computer software
licenses allow you to run the
program on only one machine and
to make copies of the software only
for backup purposes. Some licenses
also allow you to run the program
on different computers as long as
you don't use the copies
simultaneously
costs
direct
● software license
(yearly, monthly ,
quarterly or one-off)
● technical support to install the
application- using your network
manager
indirect
● hardware to run the
application - up-to-date
operating system for
instance
● need for other
associated
applications- like
antivirus software
● maintenance
● mandatory upgrade that
cost additional fees
● technical support
● training on new system- the workforce
need to be trained to be able to use the
new application will take time from
work-related activities and also cost of
having the training delivered. However
training is very important as it will help
save money in the long-term by
supporting more efficient working
practices in the future
password
8 or more digits long
numbers
capital letters
symbols
A virus is a type of malware that
spreads through normal programs.
Once your device has a virus it may
spread easily and quickly. A virus
might just slow down your device - or it
might be so severe you lose all your
applications and documents!
Worms can spread from device to device, but
unlike a virus they don’t need to attach
themselves to other programs. Worms can copy
themselves hundreds of times, so they can very
quickly harm your device and other devices. A
worm might copy itself onto your email account
and then send a copy to all of your email
contacts!
A trojan horse (or just a trojan) pretends it will be a useful
and safe program, when actually it will try to attack your
device. Trojans are named after the story of the Trojan
Horse. It is said that many years ago the Greek army
wheeled a large wooden horse to the gates of the city of
Troy. The people of Troy thought it was a gift and wheeled it
inside. They didn't know that inside the horse were Greek
soldiers waiting to attack. Can you see why a trojan horse
on a device is named after this story?
Spyware is software that installs itself onto devices and then steals
personal information about the user, like passwords, email
addresses and other important information. It often does it just by
keeping a record of everything the user types, which is called key
logging. Some spyware can even use your webcam without your
knowledge.
macros:REM—Remark (comment in the macro) DIM—Declaring variables Data Types:- Text (characters)
Number (Integer = whole number) Date Time Currency Boolean (Yes/No, True/False)
creative commons
The basic Creative Commons license is CC Attribution. It allows for all copying, modification and
redistribution (even commercially), provided that the original author is attributed (with no
implication of endorsement). Work under CC Attribution is essentially free to use. The CC Attribution
license can be extended to CC AttributionShareAlike
copyright
fair use
“Fair use” is an exception to the exclusive rights held by the
copyright owner. It exists in some countries such as the US and
UK. Under it, in certain cases, using work without permission is
possible. If someone’s usage is defined as fair use, then they
don’t need to obtain a license. Essentially, using copyrighted
material is a legal right.
public domain
Work that falls in the “public domain” basically has no copyright owner. You can use, modify and
redistribute it to your heart’s content. An author can forfeit their copyright and, thus, put their work
in the public domain
Vendor lock-in is a situation in which a customer
using a product or service cannot easily transition
to a competitor’s product or service. Vendor lock-in
is usually the result of proprietary technologies
that are incompatible with those of competitors.
However, it can also be caused by inefficient
processes or contract constraints, among other
things.