informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/it in english 2009...

47
1, The process of communication in IT Describe the process of conventional communication. Show the process when we use a mobile phone. What is noise? How can we avoid it, or its distorting effect? Why is it good if the information is redundant? Define the two different meanings of information. Define the unit of amount of information. Sender-encoder-pipe decoder-receiver presume Fundamentals: Notice: signal, signal sequence, data that have information; the sender communicates toward the receiver. Sender: the source of information – can be a person, animal, software, machine etc. That produces Signal converter: signals need to be converted physically to make them fit for relaying e.g. analogue sound to analogue electric signal. Encoder: encodes signals, notices to another code e.g. encode analogue to digital, compress digital data etc. Pipe: a wire, transmission medium physical field that relays the signals. Decoder: decodes the encoded signals. Receiver: who or what interprets and stores the notice, signals. Noise: it mixes with the notice, superimpose and distorts that. In a digital signal false digits can appear. Two-way communication is almost the same. Noise – protection Analogue signal: noise filtering, proofing e.g. soundproofing, electromagnetic shielding. We can increment the signal/noise ratio as well. Digital signal: proofing. If the noise caused errors in the data bits than correcting procedures, parity bits( e.g. the 9th bit signals that the data is even or odd. If one bit fails than the parity is not equal to he parity bit), Redundancy can also be a protection tool. Redundancy: When a notice is redundant, the information is not given in the shortest way. The amount of data is much more than the amount of information. This is the base of the compression as well.

Upload: others

Post on 24-Jan-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

1, The process of communication in ITDescribe the process of conventional communication. Show the process when we use a mobile phone.What is noise? How can we avoid it, or its distorting effect?Why is it good if the information is redundant?Define the two different meanings of information.Define the unit of amount of information.

Sender-encoder-pipe decoder-receiver presume

Fundamentals:Notice: signal, signal sequence, data that have information; the sender communicates toward the receiver.Sender: the source of information – can be a person, animal, software, machine etc. That producesSignal converter: signals need to be converted physically to make them fit for relaying e.g. analogue sound to analogue electric signal.Encoder: encodes signals, notices to another code e.g. encode analogue to digital, compress digital data etc.Pipe: a wire, transmission medium physical field that relays the signals.Decoder: decodes the encoded signals.Receiver: who or what interprets and stores the notice, signals.Noise: it mixes with the notice, superimpose and distorts that. In a digital signal false digits can appear.Two-way communication is almost the same.

Noise – protectionAnalogue signal: noise filtering, proofing e.g. soundproofing, electromagnetic shielding. We can increment the signal/noise ratio as well.Digital signal: proofing. If the noise caused errors in the data bits than correcting procedures, parity bits( e.g. the 9th bit signals that the data is even or odd. If one bit fails than the parity is not equal to he parity bit),

Redundancy can also be a protection tool.

Redundancy:When a notice is redundant, the information is not given in the shortest way.The amount of data is much more than the amount of information.This is the base of the compression as well.In a redundant dataset errors can be repaired more likely if the redundancy is bigger.

Communication process with the mobile phone

Specify the elements of the communication process, fundamental ideas.E.g. notice: What we tell to the phone; encoder: the microphone; pipe: the electromagnetic field that transmits the radio waves.

The steps of phoning are well-known.

The amount of information

The less the probability of an event’s or signal’s occurrence the bigger the amount of information.If a signal’s occurrence is granted then it represents zero information.

Page 2: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

The unit of amount of information: 1 bit (binary unit) – if one of two equal signals with equal probabilities occurs, it means one bit information. It is independent from the meaning of the sign.

The amount of information of a set of signals is independent from its meaning. If we know the occurrence of probability of the signals, we can calculate the information with mathematical formulas.

Questions:When we have a conversation and we gesticulate during this, what are the encoder-decoder, the pipe and the noise?Why is the ratio of signal/noise important?

Page 3: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

2, Learning with the Internet, e-learning. Development of e-commerce and e-economyDescribe the usage of web pages and databases in learningDescribe e-commerce

We can find a lot of information on the Web. We can search the whole Internet with search engines or specialized thematic engines or we can search URL-s and use the open databases. By the topic we want to know we can choose from these options:

Search by author or topic We can search electronic, virtual libraries, like Neumann-ház. We are allowed to download the

documents We can search the web pages of libraries or electronic catalogues (sometimes we can’t look at the

documents via the Internet, only personally): OPAC (Online Public Access Catalogue) or MOKKA – the Hungarian version of OPAC.

Electronic catalogues are more flexible than conventional libraries because we can place inquiries by a lot of point of views.

Thematic search engines – we can use them for learning Like startlap.hu, hudir.hu

We can search special learning portals or databases Like www.om.hu, www.sulinet.hu We can also find useful information on the pages of educational organizations like schools or

universities. SDT (Sulinet Digital Knowledge Base) is a very useful page – a fantastic page for students both

secondary school and high school. Tons of downloadable contents.Keyword or mixed engines

Common information pages: startlap.hu Search engines: google.hu, yahoo.com

Educational pages by subjects: Physics: fizika.lap.hu, nasa.gov IT: om.hu, kiberoktat.hu Etc

Development of e-commerce, advertising, shopping

The most widespread e-commerce thing is the appearance of the companies on the Internet. Here they offer their services, merchandise. They use their pages as advertising tools, offering ordering options as well. The number of shops using the Internet for advertising is increasing. Major shops, chain of shops offer their goods on the Internet too. These companies are from education, culture, media, catering etc. Nowadays we can find every segment of economy on the web like industry, agriculture, trade or tourism. We can find ‘real’ webshops in the fields of ordinary trade.

The number of webshops and their offer is increasing. There are hundreds of webshops and their turnover is billions per year.

The advantages of electronic shopping are: We can shop at home or at our workplace, distance and traffic are not limits. Transport is by other

services or by post. We can check the goods on the screen, we can compare the features to other offers or webshops. The supply of the webshops can be very large if they have connections with other stores’ databases. Internet has no borders. This can change our shopping opportunities and habits. We can buy British

goods from Hungary and ask the delivery to Toronto, Canada. Some shops can offer their goods cheaply. In some cases we can get the purchased goods immediately (data, documents or tickets).

The process of shopping in online shops is happening with the help of a virtual basket, so we can check review the goods in them before paying. After we give our credit card number, he transaction passes. The we just wait for the courier or postman.

Mobile phone shopping is an American way of shopping. Probably it will be used in Hungary as well.

Page 4: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

Questions:What is your opinion about SDT? Is it useful for learning?Are there any disadvantages in buying via the Internet?

Page 5: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

3, Common dangers of ICT (Information and Communication Technologies) vs. ergonomic environment and the right behaviour

Describe the dangers of modern ICT tools in the point of view of health and psyche.Can the monitor, keyboard, printer, mobile phone and other peripherals have a health-damaging effect? How can we protect ourselves?Analyze an ergonomic IT job.How much effect does PCs and computer games have on kids and youngsters?Can a passion for gaming or Internet dependency become abnormal?

Ergonomics is a science. It deals with the optimal relationship between a person and technical devices. It’s main purpose: How to design a machine to fit perfectly to the man’s physical and mental abilities, opportunities.One of the most important things is that the machine cant do any harm the user. It has to fit to the size and the movement of the body and the hand and the organs of sense.Regarding to IT, the communication between the user and the PC is very important. The system of symbols of the graphic operation systems and applications turned to a special user language during the past 15-20 years.If the relationship between the user and the PC is not optimal, the result can be: descending performance, damage, disease.

The mobile phone: some say that these phones can do harm to the brain because of the electromagnetic radiation but it’s not proven so far.

The risks of a computer workplaceThe monitor and lighting: the connection between the windows, the screen and the lighting – avoiding reflections.Powerful sunshine and the visibility of the screenThe charging of the screen: dust can harm the eyes – pain, weeping.The distance of the eyes from the screen: 60-70 cm’s. Resolution; the size of a pixel – strain.Protection: quality 17” LCD monitors, the right placement, proper lighting.

The work desk, chair, keyboard and mouseThe size, the position of the desk, monitor and the chair can make the user have uncomfortable posture (back and neck pains, stiffeningThe keyboard and the mouse can force the arms and the wrists to have unnatural postures. The constant typing can cause pain in wrists and fingers.Protection: carefully chosen desk for the peripherals as well. Swivel chair with castors; setting the right height. Having rest frequently; gymnastics, right posture, ergonomic keyboards. Optical mouse etc.

The PC case and the printerThe cooling fan and sometimes the hard drive can be very noisy or resonate. Constant noise can make the user tense.The steam of the laser printer is unhealthy.Protection: silent fans, frequent airing.

The expectations for the applicationsThe user interface has to use the most up-to-date visual items (icons, tools, windows, menus etc).Clear, simple and easy to use.Intelligent, user-friendly communication with the userReliable operating.

Page 6: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

Computer games – addictionComputer games develop faster and faster. They become more interesting, exciting and more realistic thanks to the growing performance of the computers and video cards (e.g. virtual reality).Users who play regularly (hours per day) can become addicted.The neglecting of studying or working.We can experience the same of Internet browsing, chatting etc.Adult materials that are harmful for kids can be accessed easily via Internet.Protection: School education, parental care, self control!

CrimesNot so many young people are involved. There are unauthorized data-using, security breach, virus-programming etc.

Questions:What type of monitor would you prefer if price is not important?How can you avoid the addiction to computer games?

Page 7: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

4, Relationship in using software and the copyrightSort software by their features.Sort software by copyright. What types of software usage do you know? What is free software (freeware)?How can we protect our compositions, intellectual products? What is copyright?

Sorting of softwareSoftware consists of: computer programs, data and their documentation in file and printed format.

Operating system: it is the link between the computer and the user. The operating system interprets the user’s wishes toward the computer e.g. file copying, deleting, running programs. Modern OS’ have graphic interface like Windows, MacOS, Linux.

Developer systems: Programming languages like BASIC (the simplest and most popular among everyday home computer users); Assembly (the professionals’ language), C, Pascal, Java, Visual Basic etc.

Applications: for office use (Microsoft Office, Open Office), engineering (AutoCAD), games, multimedia (media players); for everyday usage.

Software in the point of copyright view

Free software (Public Domain): free, freely distributable, the programming code is also free for viewingFreeware: free, freely distributable, but the programming code is kept secret. The copyright belongs to the author. We are not allowed to sell the software and to modify it.Shareware: We can get them for free but we are allowed to use them for a limited time or they are not fully functional. We have to pay for the full version and have to register the program.Semi-free programs: They are commercial programs but there is a discount for certain purposes (e.g. education).Commercial programs: They have a price (some programs are very expensive) and we have restrictions for the usage (like we are allowed to install them only for on PC).

Licence agreementIt details the conditions of the usage of a program.We are allowed to use the purchased software on limited number of machines (we are allowed to install it to the machines we bought the licence for).We are not allowed to propagate. We can make one backup copy of it. We have to have the original installation disks.We can send back the registration form or we have to register via Internet.

Software is an intellectual product as well (like novels, or an invention).

Ethics: a useful commercial program needs a lot work and skill to produce. The company who owns the program needs the income (e.g. to pay the employees’ salary).Electronic products are easy to copy without any value loss.

Sometimes a program is copy protected, but generally it doesn’t take much time to crack the protection.To force back computer piracy there are civilian organizations like BSA (Business Software Alliance). They are no authority so they can only advice the legal software usage.Software can be handled as invention and protect them by patent but it’s not a simple process.

Page 8: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

The copyright (1999 law 26) (Some more important excerpts)

The subject of copyright1st §. Every composition in literature, science, art is copyrighted, even the public speech.The product of computer programming and the documentation including applications and operating systems are also copyrighted.The copyright doesn’t depend on quantity, quality or aesthetic features or value judgements.

The author has the personal and property rights from the birth of the composition. The author is not allowed to give up the personal rights.It is the author’s decision to public the product (on the Internet as well).The author has exclusive rights to every kind of usage of the product and to authorize any usage. The licence to use the product can be obtained by licence agreement. It can be a financial benefit for the author. The licence fee for the product must be proportional to the income if there is no special agreement.

There are some constraints of the copyright e.g.:34th §. A part of the composition can be quoted freely in a reasonable extent with the notation of the source and the author.

Questions:On how many PC’s can we use a program if we installed it to a server?You have a desktop PC with a legal Windows XP. You just bought a notebook without an operating system. Are you allowed to install your only legal Windows to this notebook?

Page 9: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

5, Analogue and Digital Pictures – digitalisationDefine and arrange pictures as signals.How can you digitize a common, colour 2D picture as an analogue signal?Explain the structure of a digital raster image (like BMP) and the regular parameters of the resolution.What is the concept of the additive mixture of colours and where is it used? How can we encode the colour of the picture elements (pixels) binary?Explain the concept of the RGB colour blending and encoding. What is the connection between the number of bits and the number of possible colours?What is the concept of subtractive mixing of colours and where is it used?Give some details of vector graphic pictures. What is the difference between these and the pixel graphic pictures?

The picture as an analogue or digital combined signalThe eye is our biggest capacity information channelThe signal is a phenomenon that can be sensed and comprehended by our organs. It relates to other things so it has a meaning. A grouping: visual, audio, olfactable, non perceptible.

We can call a visual signal everything that is visible and acts as a signal – mostly 2D drawings, photographs, videos, maps, symbols etc.It can be pictorial (drawing, photograph, video etc.) stylized (map, technical drawing, conceptual design, icon etc.) and symbolic (characters, numbers, bar code etc.)

Analogue signal: macroscopic physical signal, continuous or it can be considered continuous (it can represent any value between two limits like time, colour, current, voltage, the angle of the clock-hands if they are signals)

Digital signal: it can be represented by numbers, binary encodable (a set of discreet signals that is given with numbers).

It is important that in practice we can approximate the analogue signal with a sufficient amount of numbers. From this numbers we can restore the original analogue signal with high accuracy e.g. photograph-digital picture-printed picture.

Digitalization of the analogue pictureConventional pictures are analogue signals or signal sets. The number of colours of a picture can be very large or the definition and resolution very high. It depends on the size and the quality of the chemical grains.

The two main steps of the digitalization of an analogue pictureThe reducing of the picture to pixels or dots e.g. we put a 800 column-600 row grid to the picture in thought. Every square is a pixel, so we resolve the picture to 800*600 pixels.

The colour coding of the picture – we assign a number to every pixel. We digitalize automatically, mostly with the help of a computer scanner.Practical examples are the digital cameras and recorders. They digitalize and store the analogue picture made by the lens automatically.

Resolution - the quality of the particularsThe regular resolution of the picture in pixels:Monitor: 800*600, 1024*768, 1600*1200Mobile phone display: 128*160, 240*320Television: 720*640

Page 10: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

If we zoom in the picture, the size of the pixels grows because the amount of the pixels is constant. In this case the image can be ‘squared’.The measure of the physical resolution is dpi (dot per inch). That is the number of pixels per a unit length. It is used in printing.

Colour theory basicsThe visible light is an electromagnetic radiation in 380-780nm wave-length.Rainbow is the white light segmented into colours by the wave-length from the higher to the lower: red, orange, yellow, green, blue, violet.

The eye has approximately 126 million receptors (rod receptors for the luminance – 120 million, cone receptors for the colours – 6 million) and one million nerve fibres to relay excitation.

Cones are responsible for he sense of colours. There are three different ones: one is the most sensitive for red, on is for green and one is for blue.

The eye is an optical lens. It can alter the focal distance. It produces a reverse scaled-down real image on the retina where the receptors are.

We sense slightly different things with our two eyes. The three-dimensional image is created in our brain. This is the base of the 3D pictures, movies

Hologram works differently.

The major features of a lighting pixel are: colour, brightness (depends on the efficiency of the light that gets into the eye), saturation (it depends on the ratio of white light – the bigger the white component in the light, the less is the saturation).

Additive colour mixing: all colours can be made with the use of the three base colours Red, Green and Blue-the RGB colour system. The method is used in lighting images, monitors, televisions etc.

Subtractive colour mixing: We can make any colours if we subtract some colours from white light. It is used in printing. The base colours are: Cyan, Magenta and Yellow.Black can’t be made with these three colours, it was chosen as the fourth colour, the Key. This is The CMYK colour system.

There are other colour systems as well.

The RGB colour codingIf we increase the number of bits, the encodable number of colours grows exponentially:1 bit can be used for black and white encoding.8 bits=1 byte is good for encoding 28=256 grey shades or colours.If we represent every base colours on 1 byte, that means we have 3 bytes, so we can encode 2563=16777216 different colours. RGB(0,0,0) is black, RGB(256,0,0) is red, RGB(256,256,256) is white.2-byte encoding is also common. 16 bits (high colour) are 2562=65536 different colours.

Colour depth: The number of bits shows it in the colour code – this is the base-two logarithm of the representable colours.

Vector graphicsIt describes figures with mathematical formulas:It works with lines, dots, geometric figures, visual signals.There are expandable feature lists to the mathematical figures. These feature lists are part of the image dataset. They can be saved with the picture.

Page 11: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

E.g. the definition of a segment is: the coordinates of the end points, the colour and the thickness.It can be zoomed without any quality loss, the image won’t be rough.The amount of data of the stored picture is independent from the physical size and the dpi or pixel resolution of the picture. IT only depends on the number of basic shapes and complexity. The size of the image file is much smaller than the raster ones.

It can’t be used to encode common pictures but there some special applications like conceptual design digitizers, character recognition programs.Raster and vector graphics can be combined as well.

The importance of vector graphics: CAD-systems, geographic information systems, document formats (like PDF) etc. It is often used in engineering and stylization: conceptual designs, maps, technical drawings etc.

Questions:How many colours can be encoded on 6 bits?Does the pixel resolution of the picture change if we zoom with a digital camera?The amount of data in a raster image is more than the vector image of the same picture. Why is it so? Why is it bigger?

Page 12: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

6, The Neumann principle. The parts of the PCIntroduce the Neumann principle. What are the main parts of a Neumann computer?Describe the equipment and the main functional units of recent personal computers. Introduce motherboards and processors in detail, list the ports, mass storages, the input and output peripherals.

The first electronic computer: ENIAC (1946)The application of vacuum tube circuits and relays.

ENIAC: Electronic Numerical Integrator and Computer: 18.000 vacuum tubes, 1500 relays, 30.000 tons, punch cards, worked with decimal numbers. 5000 additions/s.EDVAC (1944) Electronic Discrete Variable Automatic Calculator) the first machine that worked by the Neumann principle.

Neumann principle (1945)Separate control and execution units. Serial operationEvery data area binary encoded.Data and program in the same inner addressable memoryUniversally programmableThe equipment: control unit, arithmetic unit, memory, input and output units, external data storageElectronic – very fastDigital computers were built by this principle for decades.

The main parts of the PCThere are desktop and portable PC’s. Desktop computers are more expandable than the laptops or notebooks. There are two main ‘parts’: the central unit and the peripherals. Some peripherals are standalone devices as well.The Parts of the PC: motherboard, power supply, mass storages and other media, case, keyboard, mouse, printer, scanner and other digital devices and adaptors.

The motherboardOn the motherboard we can find the processor (CPU), memory, bus system and the ports for the peripherals, the interface cards plugged to the ports (soundcard, video card, modem, Ethernet card).The clock generator is also on the motherboard. It synchronizes the operating, determines the specified speed, but different parts can work with different speed (frequency).

The processor (CPU) The processor is a digital circuit unit containing millions of transistors integrated on a silicon monocrystal. This is the computer’s central operating and processing unit.One of the processor’s features is on how many bits it can operate simultaneously e.g. on 64 bits.The processor contains an operating unit, an arithmetic and logical unit and a small but very fast internal memory.The operating frequency and the number of operations per loop determines the speed of the processor. Usually it is between 2 GHz-3,5 GHz. The number of operations s 5-10 oeprations per second.

Intel has Pentium (nowadays Core Duo), AMD has Athlon (nowdays X2) processors.A 3,06 GHz Pentium processor uses a special technology: The operating system senses two CPU’s and programs run as they run on a two-CPU machine. The Core2 Duo is a real two-CPU processor.Previous processors are 80386, 80486, Pentium I, Pentium II, Pentium III.

Page 13: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

The memoryROM (Read Only Memory): integrated circuit memory. The program that was ‘burned’ to that memory is read-only.RAM (Random Access Memory): read-write memory. The running programs and data are in this memory. It needs continuous power. Computers use 1 or 2 GB nowadays.The most frequent type nowadays is DDR SDRAM (Double Data Rate).CACHE: very fast memory. It’s an intermediate storage by the processor.

Bus systemIt is the ‘road’ between the main parts for the data traffic. We have address bus and control bus. There were a lot of standards during the past decades because the processors, memories and the external data traffic became faster and faster.

Ports (interfaces)PS/2 plug for the keyboard and the mousePCI slot for soundcards, Ethernet cards etc. Its maximum speed is 500MB/s.AGP slot for graphic cards. Its maximum speed is 2GB/s.Serial port, parallel port (for printers)USB (Universal Serial Bus). The speed of the USB 2.0 is 480 MB/s. We can connect a lot of peripherals to the USB slot.

CardsSound card, video card, modem, Ethernet card for the network.

Power supplyThe internal parts need +- 5V or +- 12V. The power supply provides the direct current voltage from the standard 230V electric network voltage.

Mass storages and data carriers (media)We have floppy disk, hard disk, CD and DVD reader/writer, pen drive (USB key).

Input peripheralsKeyboard, mouse, trackball, touchpad, touch screen, wheel, joystick, light pen, tablet, scanner, microphone, webcam, digital camera.Input peripheralsCRT (Cathode Ray Tube) Monitor, LCD (Liquid Crystal Display) monitor, speakers, printer (laser, ink jet, matrix), helmet.

Questions:What is the equipment of your own PC?Introduce your dream PC (CPU, memory, hard disk, peripherals etc.

Page 14: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

7, Memories and mass storagesDescribe the major memory types and their usage sorted by type or functionDescribe memory cards and mass storages (Pen drives, Compact Flash Cards etc.)Introduce the common types of magnetic disks (mechanism, capacity and other features)Describe optical storages (CD, DVD) (mechanism, capacity and other features)

Integrated circuit memories (IC on a silicon monocrystal chip)

ROM – Read Only Memory: The program burnt in the factory to this type of memory can only be read, e.g. the program that loads the operating system (Rom BIOS).

EPROM (the contents can be erased by ultraviolet rays)EEPROM (Electrically Erasable ROM) it can be erased electronically, rewritable and there is no need for electricity to store the data.

RAM (Random Access memory) it stores the running programs, data. It needs constant electricity. The capacity is 1-4 GB recentlyData transfer speed: operating frequency * the number of transferable bits at once (e.g. 64 bits), so this is an important feature: 400 MHz or more.

Common types:SDRAM (Synchronous Dynamic RAM – Older)Rambus (Older)DDR (Double Data Rate RAM) (recent)Cache: an aggregate name – very fast memory, a temporary one near the processor.Flash memory – Read-write memory that doesn’t need power source to store the data

Pen Drive or USB Key – small portable mass storage with USB connection with the capacity of 1-8 GB recentlyCompact Flash and others- they are used in digital cameras, video cameras with the capacity of 1-8 GB recently.

Magnetic mass storages

FDD (Floppy Disk Drive) – the data carrier is a flexible disk (floppy disk). It is a read-write-erasable media and it can be formatted. The last type is a 3.5 inch 1.44 MB capacity disk, double-sided, both sides are coated with magnetic surface.The disk in the drive is rotated by en electromotor very fast. There are read/write heads (small electromagnets) on both sides close to the magnetic surfaceNow it is an old-fashioned media

Zip drive (a:drive): works similar to the FDD, same size but has a 100-250MB capacity.

HDD (Hard Disk Drive) (or Winchester, used only in Hungary): a hermetic box. It has one or two metal magnetisable disks on an axle. It has read/write heads close to the surface. It is hit-sensibleIt has precise mechanics, 5000-10000 turns/s, high data density., 2 or 3.5 inch sizeIt has 250GB-1TB capacity (recent) and 0.001s access time.There is a portable version (mobile rack)Streamer – old fashioned media. It has large capacity, but the data can be access at a slower speed.

Page 15: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

Optical storages

CD (Compact Disc): It is a disc with an aluminium layer. The bits are in pits. Data reading is with the help of a laser beam. Data are stored in a spiral from the middle toward the rim. The diameter is 8 or 12 cm, the capacity is 700 MB (recent)Newer CD drives come out as a combo drive – combined with a DVD reader.CD-ROM: Read Only CD, the data get on it during manufacturing.CD-R (Recordable) – It can only be written once.CD-RW (ReWitable): readable, erasable, rewritable.DVD (Digital Versatile Disc) The look and the mechanism is similar to CDs but the capacity is higher: 4.7 GB. It has higher density and there are more than one data layersBlu-Ray is the newest media with 30 GB capacity

Questions:

Will compete Flash memories with CD’s or HDD’s?Is it worth buying a film on Blu-Ray and not on DVD (answer: not yet. Blu-Ray players are very expensive yet and the movies have double price compared to normal DVD prices)?

Page 16: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

8, Monitors and printersSort monitors by their mechanism.Explain the main features of a monitor.Describe printers: their mechanism, features, advantages and disadvantages, their scope of application.

Monitors by their mechanismCathode ray Tube (CRT) monitors: traditional.In a suitable vacuum tube a fine electron beam controlled by a magnetic field draws (line by line) the picture to a phosphorescent screen. The phosphorescent stuff shines by the effect of the electron beam. The colour depth and the refresh frequency is high, and they are cheap.

Liquid Crystal Display (LCD)Some liquid crystals can change their optical and translucent attributes by the impact of an electric field.Their consumption is low, they are flat, producing bigger screens (they don’t flicker and radiate) is easy. The price of LCD’s has been dropping so they are becoming more and more popular.Sharp produced a 15 inch 3D LCD monitor. The beams of light that get to the eyes form a stereo pair of image. Our brain forms a three dimensional picture form them. The resolution is 1024x768 pixels. We don’t have to use special glasses as well.

The main features of the monitorDiameter: It’s the attribute of the screen’s size. Its measure is inch (15”, 17”, 19”, 21”) (1 inch=2.54 cm).Resolution: The number of pixels shown horizontally and vertically: 800x600, 1024x768, 1600x1200. It depends on the physical features of the monitor but also on the video card. The given resolution can be set by the operating system. There is no big difference between monitors in the aspect of the real pixel size (0.25 mm) so if we want higher resolution, we have to buy a monitor with bigger diameter.The number of colours is connected to the colour depth. When the colour depth is 8 bit the number of available colours is 28=256. When it is 24 bit then the number of colours is 224=16.777 million.We have to differentiate three things using high colour depth: the colour depth of a digital image; how many colours can a monitor display; how many colours can the human eye sense.Refresh frequency: The number of pictures shown in a second. From 85Hz the display won’t flicker so it won’t be unpleasant. All monitors sold these days can handle it and they are also Low Radiation (LR). If we increase resolution, the refresh frequency decreases and vice versa.

Printers by their mechanismMatrix printer: The ‘improved typewriter’. There is an ink ribbon between the he paper and the print head. The small pins hit the ribbon in the right time. The ribbon impresses to the paper and marks it. Electromagnets move the 9 or 24 pins very fast. The printer can print characters and drawings but the resolution is low. When mainly characters are wanted and low resolution is enough, matrix printer is a good choice because it’s cheap.Inkjet printers: they use colour ink cartridges. The printer head shoots very small ink drops to the paper. The resolution of the printing is given by the number of dots per inch (dpi), usually 200-700 dpi. The cartridges usually have four or more colours (cyan, red, yellow and black). The measurement unit of the printing speed is page/minute (2-20 pages/minute). We can print very high quality colour pictures with some inkjet printers – photo printing.Laser printers: A thin and strength-altering laser beam scans the surface of a rotating electrostatic cylinder made of selenium (or ceramics recently). This beam draws the picture to the cylinder (drum). The stronger the laser beam reaching a section of the surface the more charge the surface loses. The drum is next to the ink toner and the powdered ink sticks to the drum in the ratio of the charge because of the electric attraction. Then the image generated on the drum is pressed to the paper and special hot drums burn the ink to it. The resolution is 300-1200 dpi. Laser printers can produce good quality

Page 17: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

papers at fairly low cost. IT is recommended if you print a lot. Colour laser printers are rather expensive but their price is lowering recently. They are still more expensive than inkjet printers. Laser printers produce ozone and eluting solvent fumes similarly to photocopiers – so ventilation is recommended.

Questions:What type of printer would you buy if you need to print hundreds of pages and images?Explain the ergonomic points of view of the monitors. What do we have to pay attention when we buy a new monitor?

Page 18: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

9, Describing peripheralsChoose three of the following peripherals and describe them: scanner, digital camera, keyboard, sound card, video card, Ethernet card, modem and mouse.

Scanner (photo digitizer)A peripheral that digitizes black and white or colour pictures, photos, drawings, slides, texts (as pictures). The scanner binary encodes the lighted image on the paper by colour and luminance pixel by pixel. Then it can be saved with the help of the scanner’s program as a file to any media. We can even choose the format of the image file.The text that we scanned is an image. We can convert is to real text and save it with the help of a character recognition software (like Recognita – a Hungarian software). The conversation is not always perfect but we can easily correct the text.The resolution is also in dpi (100-1200 dpi). The colour depth determines the number of colour components and on how many bits we store he image. From these data we can easily calculate the number of the available colours.There are hand-held and desktop scanners. The hand-held has got a lot of disadvantages we use them only in special situations.

Digital cameraIn a digital camera the lens produces the real upside-down image as in traditional cameras. However the image doesn’t get to a photosensitive film surface but to a photo-diode matrix (a CCD sensor). It decomposes the light to three base components and produces signals proportionally with the luminance. Then it digitizes these signals and stores them in a compressed form on the memory card. One of the most important features of the camera is the number of pixels. IT is in million pixels (megapixels – MP). Today the common resolution is 1-8 MP. The cameras that have traditional films have got very high resolution because of the quality of the material of the film. Optical zoom means that we can enlarge the picture, but only a part of the original view because the other parts are out of the sensitive area.Digital zoom means that the digital picture is enlarged so the size of the pixels is enlarged. Therefore the picture quality gets worse. It will look like we are working with a low resolution picture. We can do it later with the help of an image editor program but it’s not worthy. We can take with a 3.2 MP camera a 3 times digital zoomed picture but it will look like a 0.35 MP picture from three time closer.

TFT display.It is useful when we take photos and we can check the previous pictures, delete any of them etc.We can switch on/off the flash and we can avoid the redeye-effect.We can also make videos with a digital camera (30 frames/s, 640x480 resolution) but of course a video camera is the perfect choice for this.The images are stored on a Compact Flash memory card. We can buy a 4 GB capacity card as well. This type of card can store data without any power. The speed of file transferring is about 2-3 MB/s – like the speed of CD burning. Usually we can transfer the images to the computer via an USB port for viewing, editing or printing. If we’d like to have photo quality pictures printed then we need a 600-1200 dpi printer and photo paper.

Laser printers: A thin and strength-altering laser beam scans the surface of a rotating electrostatic cylinder made of selenium (or ceramics recently). This beam draws the picture to the cylinder (drum). The stronger the laser beam reaching a section of the surface the more charge the surface loses. The drum is next to the ink toner and the powdered ink sticks to the drum in the ratio of the charge because of the electric attraction. Then the image generated on the drum is pressed to the paper and special hot drums burn the ink to it. The resolution is 300-1200 dpi. Laser printers can produce good quality papers at fairly low cost. IT is recommended if you print a lot. Colour laser printers are rather expensive but their price is lowering recently. They are still more expensive than inkjet printers. Laser printers produce ozone and eluting solvent fumes similarly to photocopiers – so ventilation is recommended.

Page 19: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

Questions:What have got MMS and a digital camera in common?What are the advantages of a digital camera compared to an ‘old fashioned’ one?

Page 20: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

10, The main functions and types of operating systems. A user interface of an OS, the main settings.

Sort software by their types. Introduce the objectives and types of operation systems.Introduce the items of a graphic operating system, their usage and the usage of the mouse. What main settings of appearance and hardware can be adjusted in the operating system you use?Exercise: set another screen resolution and colour depth.

Sorting of software:

Development environmentMaking programs, developing, compiling and testing. The main programming languages: Pascal, C+, Visual Basic, Delphi, Java, PHP etc.

System programsOperating systems – they control the hardware, run programs, communicate with the user, handle errors, protect data. Examples: DOS, Windows, Linux and their versions.System applications – they ease or extend the handling and services of the operating system – Total Commander, WinZip etc.Applications – word processors, spreadsheets programs, database programs, presentation programs, image editors, graphic designers, music editors, publishing editors etc.

Operating systemsFunctions: Controlling the hardware Running softwareError handlingCommunication with the userInterconnection between the running programsData protection.

Parts: kernel, user interface, system shell and other programs. The normal user is in relation to the last two parts.

The operating system can be:Single user and single or multitask (more than one applications can run at a time)Multi user and single or multitaskThe user interface (system shell) can be character driven (like DOS or older Linux versions) or graphic (like Windows or newer Linux versions).

The boot process of the operating systemThe BIOS in the ROM start when we switch on the computer. It checks the hardware for errors, loads the operating system’s kernel and other system programs from the hard drive to the RAM.

Communication with the graphic operating systemsWe communicate with the OS through graphical applications with the help of a rapidly developing visual-manual code system.We can enter data mostly manually with a mouse, keyboard, touch screen etc.The OS presents data mostly with visual elements like icons, windows, menus and of course texts.

Page 21: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

‘Windows’ operating systemsWindows 95, Windows 98, Windows Me, Windows XP Home Edition – for home or office useWindows NT Windows 2000, Windows XP Professional – for networked computers (office use)Windows CE – for handheld computers and mobile phones

Windows XPThe graphical interface:Desktop, icons, taskbar, start menu, windows, menus, context menus, their main functions and partsMenus, window types, parts, notations and their meaningsThe usage of windows, menus, iconsDialogue windows and controls

Keyboard handling – special Windows keys.

Mouse usage – mouse operations. Pointing, clicking, highlighting, grabbing, moving, double clicking. The right button. The meaning of the shape of the mouse cursor.

Running, usage, closing programs, running multiple programs, switching between them.

The usage of the Help menu.

The settings – Start-Control Panel.

Display properties:Desktop settings: wallpaper, screen saver, appearance, resolution, colour depth etc.The options of the taskbar and the Start menu. – clock, style etc.Folder settings.

Regional settings: date, time, time zone, language, code page etc.

Hardware settings: keyboard, mouse, printer, speaker,

Questions:Which day of the week was January 13th 1978. (hint: date settings)How can you change the mouse settings?

Page 22: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

11, The directory structure of an operating system. Handling folders and filesSort files by their purpose. Introduce the folder structure of the operating system.Introduce the main file and folder handling operations in a graphic operating system

Sorting of files

File is a set of logically coherent data. We store files on data media or on mass storages. Every file has an identifier (name). A file can be a program or a document (data).The identifier is usually a name and a three-letter extension. The whole filename has to be less than 256 characters. There is a dot between the name and the extension. The extension is determined by the file type, usually the program we made the file with.

Some frequent extensions:exe, com, bat – executable programstxt – ASCII textrtf, doc, dot - Formatted texthtm, html, php – web documentbmp, gif, tif, tiff, jpg, jpeg, png – imageppt, pps – presentationavi, wmv – videowav, mid, mp3 – soundxls, xlc – spreadsheetdbf, mdb – databasepas, bas – Pascal, basic programs

Folder structure – storage system

The folder is a storing place, collector that stores files and/or more folders. The old name for folder is directory of subdirectory. The identifier of the folder is its name. The system of the folders is hierarchic. It is a tree structure on the storage media: the folders in the root directory can have subfolders etc.The storage media are usually disks (floppy, hard disk, CD, DVD) or flash memories. They have letters as identifiers: A:, B:, C:, D: etc. We can browse the folders and files with Explore menu or My computer icon or other file manager programs like Total Commander.

Managing folder with Explorer

Creating, renaming, deleting, copying, moving, sending folders.File creating and saving with applications: creating documents with a word processor.Creating, renaming, deleting, copying, moving, sending files.

There are a couple of ways to copy or move files and folders:Highlighting techniques – mouse and Shift, Ctrl.Drag And DropUsing the clipboardLocal menuFile menuEtc.

Questions:How can you highlight 5 files that are one after the other?How can you format a floppy disk?

Page 23: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

12, Compressing and unpacking files.-The main types of archiving.Introduce the possibilities and the necessity of compressing files. What role does redundancy play in compressing? How can you compress a series of numbers, namely, put it down shorter? Show a simple example.What is lossless and loss-making compressing? Where are they applied?Exercise: Compress a specified file with the specified program and find the quantity of compressing. (The amount of data of the compressed file per the amount of data of the original file).

Theory of compressing data

Data sets are usually redundant, they are not in the shortest, most compact form. We can often present the same information shorter, encode. This is the possibility of data compressing.

With the help of compressing algorithms we can present our data in a form that has less amount of data than the original. It is often just a little portion of the original (e.g. the tenth). It requires less space on the storage media or spares time via the network. Usually we have to change the new data to their original form if we want to use them.

Lossless compressionWith this method the result is a smaller set of encoded data but we can perfectly restore the original information from it.We use this method when we want to compress programs and documents because it is very important to get back data completely.Example: Because every data are stored in the form of a number therefore it is enough to represent this example with numbers.3 5 5 5 5 5 2 2 7 7 7 7. This set of data has got 13 numbers. We encode this set this way: we put down the number and then the number of iteration. The result is 3 1 5 6 2 2 7 4. These are 8 numbers so the compressing ratio is 8/13 and it can be restored completely and explicitly.In images it is very frequent that there are a lot of dots with the same colour one after the other. With this method we can have very small compressed files.The compression ratio depends on not just the method of compression but on the attributes of the data set e.g. the repeating data or other regularities, the frequency of some signals and sets of signals. We can replace long frequent sets of signals with a short code. We do it every day (vécé – water closet).Compression programs have efficient routines. They analyze the structure of the file and then choose the compressing method.When we backup our data we often use compression.Some programs: ZIP, ARJ, RAR – Winzip, Winrar.

Lossy compression

This is a method that’s result is a much more shorter set of signals compared to the original but we can’t get back the original data set fully from the compressed file. The new file only approximately is as the original. We lose only a little information.This method is used with digital pictures, sound, videos where the perfect restoration is not important. We are unable to notice small deviations when we see videos or listen to music. Of course the quality of the digitized and compressed files is worse a bit. Some lossy compressions: MP3 (audio), JPEG (images) MPEG, AVI (videos).The higher is the level of compression the worse is the quality of the image or audio file.

Compression in practice

Compressed folders in Windows XP:

Page 24: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

Creating (File-New-Compressed Folder)The system compresses the files in the folder with ZIP extension.When we copy from the folder, the system extracts them.

Compression with PowerArchiver…We can compress with paint as well when we save our picture as a JPG file.There a re self-extracting files with EXE extension (executable file)We can pack whole folders as well so we can handle related files together

Questions:Is there a link between redundancy and the possibility of error correction?Is there a limit in compressing? What is it?

Page 25: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

13, Viruses and other harmful programs – their description and protection against them.

Introduce the definition of a computer virus and the main virus categories. What other harmful programs do you know?How can we avoid virus attacks?Exercise: use the specified virus scanner and look for viruses on a specified drive. If you find some, clean the machine.

Sorting virusesViruses are programs that produce copies of themselves and spread them while they are hiding. Usually they attach to files and infect more and more of them. After a while, depending on the programming They cause damages in the operating system. Mostly they change data files so that we couldn’t use them anymore. The damage can be very multiple. Sometimes they just cause inconvenience.When a virus starts (gets into the memory) it hides itself and can do almost anything a program can do without the aware of the user.Every virus has its signature – a binary code – that makes them recognizable. Antivirus programs identify viruses based on these signatures. Polymorph viruses change their signature often so they are hard to identify.The variations of a certain virus are the mutations. There are more than 50.000 viruses so far.Nowadays viruses spread in e-mail attachments hiding in data and program files. These are the main categories:Boot viruses: they activate with the system booting. Conventional, they’re very rare yet. They hide in the boot sector of the drive.File viruses: they attach to programs. When the program starts they activate too and infect other programs. After a while, depending on the programming they start destroying.Macro virus: they hide in documents especially in Word and Excel files in the macro area. When a macro stars, the virus starts as well similarly to file viruses. Macro viruses spread in operating systems where the specific applications can run.Trojan virus: They get in our machines pretending they are useful programs. They spread differently compared to the previous viruses but they can do harm too.Worms: They are programs made for unauthorized intrusion. They eliminate some protection functions and try to get passwords.

How can we protect against viruses

We have to suspect virus infection when: A common function doesn’t work in a program The size of a program increase Logical errors start appearing on the hard drive Strange screen effect start appearing

We can protect our machines or network with antivirus systems or programs.

Some practical antivirus rules: Backup our important files regularly Install some antivirus programs that start running with the boot process of the operating

system and stay resident in the memory (e.g. Norton Antivirus or Avast free version), checks the running programs, opened documents.

Update the virus database of the antivirus programs and check the system regularly If you get disks from someone, check them with an antivirus program. If you have to give somebody a text document, choose RTF format instead of doc. Have a clean and read-only system disk. You can boot your machine with it if you have a

virus infection.

Page 26: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

In case of infection we have to boot the PC with a system disk then try to find and erase the viruses. Well-known antivirus programs: Norton Antivirus, VirusBuster, F-Prot, Avast, AVG.It is necessary to update the installed antivirus programs if it is not automatic. If our licence is expired we have to renew it to be protected against new viruses.

Questions:

Why do virus programs exist? For what purposes?Is the unwanted e-mail, the spam virus or not? Why?

Page 27: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

14, The most important services of the Internet. File transfer, FTP.What are the services of the Internet? Describe them.What is FTP protocol for? What is an FTP host?How can we us an FTP server?Exercise: With a special program or with the Internet Explorer download and upload specified files to and from a specified server to your machine’s ‘TEST’ folder.

The major communication services of the InternetWWW: The Web is a set of more or less connected hypermedia documents on the Internet. It allows ‘jumps’ between distant machines with the help of links. The website is a set of web pages that are coherent by content and design on the same server.The browsers represent us the websites but they have lots of other functions like downloading, mail, webpage creation, FTP etc.The web provides a lot of special information services as well.

Electronic mailMail servers have got the mailboxes for the e-mail addresses where we can send mails and we can check our mails in our mailboxes.

Chat, IRCLogged-in users can send short online messages to each other

FTP:We can upload and download files and folders with this protocol if we have the permission to access the server.

Telnet (remote usage of terminals):We can log in if we have access to remote machines of the network and we can use their resources. It looks like we sit in font of that machine.

Gopher: It’s a text service protocol. We can search text data in hierarchic menus.

File transfer between remote PC’s – FTP

FTP (File Transfer Protocol)It’s a standard for transferring files and folder between remote computers. IT is used mostly for transferring from and to FTP servers.Public access to a FTP server can be done with ‘anonymous’ login. It is used for downloading only. If we have a login name and password then we can (sometimes with some restrictions) download and upload, copy, move, rename and delete files and folders.We need special programs if we want to use the FTP protocol. Internet Explorer, Total Commander, or programs designed for FTP usage. If we use he Internet Explorer, we have to enter the FTP site in the title bar starting with ftp:// instead of http://On FTP servers files are stored in compressed forms because this way they require less space and can be transferred quickly. He transfer can be binary ( for images, music or formatted texts) or ASCII.

Questions:What are the common rules when we write an e-mail?Who is a hacker?

Page 28: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

15, The usage and settings of an Internet browserName some browser programs.Introduce the basic features and services of a selected browser.What operations can you do on a webpage?Introduce the sending of the address of a webpage to a specified e-mail address in practice with a selected webpage.Introduce the main settings of a browser.Exercise: sending the address of a current webpage in e-mail. Printing a frame on a webpage. Changing the following settings: font size, start page history.

Webpage (website) basicsBrowsers: internet Explorer, Firefox, OperaThe webpage identifier is the URL (Uniform Resource Locator). That’s the address of the webpage. Sometimes we get different looks of the same page when we browse them with different programs.Homepage: This is the main, the starting page of a web site. The web site is a set of web pages that are coherent by content and design on the same server. A portal is a web site hat has a lot of information and has links to many areas of the Internet.The Web itself is a set of coherent hypertext documents on the Internet with links to other pages.

The basic functions of a browser – The Internet ExplorerA browser’s main function is displaying web pages. Navigation between web pages is called browsing or surfing. Today’s browsers have got a lot of other features like printing, download, e-mail, web page creation, ftp etc.

To open a web page we have to enter its name to the title barHow to use linksWe can go back and forth between the visited pagesRefresh: to open the page again (because it can happen that we see an older version of the page from the temporary folder)Stop: we can stop downloading the page if it comes slowlyDefault page: we jump to the page we set as the starting pageFavourites: a list of web pages we visit frequentlyHistory: The list of pages visited recentlyE-mail: it opens the e-mail client program we’ve set as defaultSearch: we can search for a text on the actual page.

Actions with web pagesWe can save the page to a specific folder and the other elements can be saved to a subfolderWe can save the whole webpage to a single fileWe can save the html part of a page to a fileWe can save the page as a text onlyWe can save a highlighted part or a picture on the page

Copying: We can export to other applications the highlighted parts with the help of the Clipboard.Sending in e-mail: We can send a web page or an URLFile downloading: We can save a file on a web page.Printing: We can print out he whole page or a part of it. It’s practical to choose he printer friendly option. If we want to print frames, it’s better to choose from the menu because of the option.Web page creation: We can create web pages with suitable programs (like Frontpage or Dreamwaver etc.)

SettingsAppearance, coding, security settingsThe starting page

Page 29: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

History: the list of how many pages were visited recentlyThe web pages visited: as temporary files

Colours, font types, language settings

Content banning: We can ban web pages by their contents (violence, sex etc.)

Data protection and security settings

Font size settingsCoding: Which codepage is it?Disabling-enabling pictures for faster downloading.

Questions:Can we take a look at the html source code of a page in a browser?Name some portals.

Page 30: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

16, Searching data on the Internet – thematic and keyword searchingWhy do we need search engines? What is a thematic and a keyword engine? Introduce the methods and possibilities of keyword searching.What operators, expressions, filters can we use if we search with keywords?What keyword search engines do you know?Exercise: Find documents for a presentation about Neumann János with the help of a keyword search engine. Introduce the thematic searching using one of the following webpage: www.hudir.hu or www.origo.hu. What other special engines do you know?

Searching on the Net – basic conceptionsThere is a huge amount of information on the web.Websites, portals, data bases are well-ordered, but the entire web is disordered, changes and develops rapidly. It is now hard to find anything just with browsing or with URL-s.There are a lot of search engines on the Internet. They try to map the net and store the features and data of the found pages. They run a search program that can be controlled by the visitors of the page with their own browser.

Keyword: a word that is illustrative of the data or information we are looking for.

Internet catalogue: a hierarchic, thematic well-ordered system within the search page. People sort the data of the web pages. We can search by topics. That’s thematic search.

There are general informational sites like www.lap.hu. www.kereső.lap.hu etc.

Keyword search:Search engines: Google (google.hu), Yahoo (yahoo.com)We can search for pages (documents) with a simple keyword or expressions made of keywords.The PC displays the result of the search (the number of hits and the seeking time) and some of the first items.It also displays some features of the found documents: the title, the URL, the document’s size, the date of the document etc.

Search expressions:We can make expressions of keywords with the help of some operators:

represents any character we can type in: game* represents any word that starts with ‘game’ string of characters: “”. The search engine searches for the exact phrase: “Neumann János”. It

may contain more words. We can use lower case or capitals. NOT – the word after it mustn’t be in the documents + - the word after it has to be in every document - - the same as NOT NEAR – the words before and after has to be in a range of maximum 10 words. AND – The words before and after (two words) has to be in the document OR – At least one of the words before and after has be in the documents

Filters: restrictive, qualifyingFilters by date: it restricts the time interval of the document.Filters without accent – If there are some accents, they can be ignored.Filters by language: It finds only the documents written in the given languageURL: it searches only in the URL’sTitle: it searches only in the title of the documents

The algorithm of the search

Page 31: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

Determine the keywords – search expression, filters – start of search – rating of the hit list – if the results are not sufficient, than back to the start

Other search enginesMeta search engines: They automatically search on the different search sites, gather the results and display them in a common list: www.ariadnet.hu or www.mamma.com

Special field of interest engines: they search on specific topics like geographic areas, type of documents, audio files, images etc.

Thematic search engines- Internet cataloguesSearch by topics can give better results but the number of hits is less.www.hudir.hu, Lycos, Magellan.

Topic search: Documents are sorted by their contents. Every topic in the main categories has got sub topics until we reach the level of documents.

The concept of sortingMain groups – common knowledge domains, sub-groups – part fieldsSorting by knowledge domains is very common.Geographic systemSorting by document typesLibrary ETO –system (Egyetemes Tizes Osztályozás – Universal Decimal Sorting)

The sorting is not uniform – every catalogue has its own system.Sub-groups often appear in alphabetical orderDocuments are evaluated by their usefulnessWe can search by keywords usually.

Exercise: Theoretically you have to speak about the Holy Crown. Find some useful information about it!

Mixed search engines: www.index.hu, www.origo.hu.

Questions: Compare Internet search to the traditional library search.During your studies on IT, in which topic did you learn about operations and operators used in search expressions?

Page 32: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

17, Electronic mailIntroduce the fundamental ideas of e-mailing.Introduce the parts of an e-mail.Introduce the basic functions of e-mail programs.Exercise: Send your teacher a short message with priority. Attach a specified picture. Fill in the ‘Subject’ line and send a blind copy to another specified address. Highlight the automatic feedback.

Basic concepts:Electronic mail: a special electronic document that we can send via a network (usually the Internet) from a machine to another – like the traditional mails.E-mail servers: Computers or programs that handle the mailboxes of the users, receive, store and send the letters.E-mail program (client): Usually it’s a program tat runs on the user’s machine. It is connected to its own mail server where it sends the outgoing mails and downloads the incoming mails. The program provides a lot more services for e-mailing.E-mail address: username@servername – space, accented characters are not allowed and the first character mustn’t be number (e.g. [email protected]).Progress: The sender writes and sends the mail to the recipient’s mailbox – the recipient downloads the mail and reads it.

Advantages of the e-mail: fast – it can get to the farthest parts of the Internet in minutes. We can attach files to the mails. There are extra features like calendar etc. in the e-mail clients

The main parts of the e-mail

Sender: the name or e-mail address of user who writes the mail.Recipient (To): the e-mail address of the user who gets the mail.Subject: short summary about the mail.Message body: The (formatted) text we writeAttachments: Files we send with the text.Accompanying data: priority, receipt mail, size, the exact date of the mail, encryption and signature etc.

Basic features of the e-mail client programsSending and receiving e-mailsWriting and formatting e-mailsDeleting e-mailsReply to the sender (or everybody). The reply message can contain the original message.Forwarding: We can forward the received mail to other addresses. The forwarded message can be a part of our letter or the attachment.Spell checking.Attachment files.Priority – We can mark the important mails.Receipt request – we can ask for a receipt mail. It will be created when the recipient opens the message. An automated mail will be sent to us to be sure that the recipient got our mail.Outbox messages – we will send the finished mails later.Draft messages – We can store here the unfinished mailsFiltering and selecting messages – we can create rules like messages from a given address must get to the given folder.Making and maintaining an address book – this option eases the addressing of the mails. We can create groups so that we can send mails to a whole group.Listing, saving and sorting of mails.

Page 33: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

ProprietiesDon’t add anything to a mail that you wouldn’t write on a postcard.Don’t write chain lettersDon’t write vehement letters.Try to avoid words in capitals.Fill in The ‘Subject’ row.Write briefly.Sign the mail.-Free web-based mail programs: freemail.hu, mailbox.hu, gmail.com

Exercise: As above

Questions:

Is e-mail usage safe?What is electronic signature?

Page 34: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

18, Using remote data bases on the InternetCategorize the main Hungarian Internet databases.Exercise: introduce the main services of a specified database. Suggestions: ELVIRA (www.elvira.hu), Országos Széchenyi Könyvtár (www.oszk.hu/szolg/index.html), Magyar Elektronikus Könyvtár (www.mek.oszk.hu).

About the Hungarian Internet open databases and portalsDatabase is a collection of (a lot of ) sorted data that belongs to a special application. The data model defines the structure of the database. It gives the types of the data, the relations and the available operations.We can search in the database by a lot of point of view, we can ask questions and make operations.Source-type databases have source data, reference databases only contain links or bibliographic data.State and local government databasesState online information and administration becomes more and more important and creates the potential of a modern electronic democracy and statehood.Some addresses: www.meh.hu – The Hungarian GovernmentMagyarorszag.hu, Budapest.huCultural and educational databases and webpagesSzéchenyi Library: www.oszk.huHungarian Electronic Library: Mek.iff.huMinistry of Education: www.om.huEducation: www.sulinet.huUniversities: www.elte.huMedia (papers, tv, radio)We can listen to online radio and watch tv if we have broadband Internet connection. Internet news service can be very fast and global if the Internet providers make it available.Hungarian Television:www.mtv.hu, TV2: www.tv2.hu, CNN: cnn.com.Newspapers: Blikk: www.blikk.huWeekly World Business: www.hvg.huPC World: www.pcworld.huPublic databasesTime-table: www.elvira.huCommercial databasesChamber of industry www.mkik.hu

Exercise: Introduction of the database www.elvira.hu

Questions: What is the difference between conventional and Internet media?

Page 35: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

19, History of libraries. Categories of libraries. Rooms of a modern library. Speak about the history of libraries. Describe libraries from the point of view of their collection of interest. What types of libraries do you know?Introduce the functional rooms of a library.

History of librariesKing Ashurbanipal’s library in Ninive (650 BC) had more than 20.000 clay tablets. They are in the British Museum now.Museion Library in Alexandria collected the whole literature of the ancient times (founded by Ptolemy 3rd century BC). It had 600.000 papyrus rolls but were ruined totally by fire.Greek and roman libraries had papyrus and parchment rolls. There were scientists’ public libraries.In the Middle Ages monasteries and universities had libraries. The form of books were ‘codex’.Paper got to Europe from China in the beginning of the 13th century. Johannes Gutenberg revolutionized book printing.

History of Hungarian libraries

Benedictine Abbey LibraryLibrary in Pannonhalma was founded in 1001. It had hundreds of codices and manuscripts in 1580. In 1683 they tried to save it from the Turkish army but many books were lost forever. Now they have about 320.000 books. There are 14 codices among their rarities.

Bibliotheca Corviniana – The library of King Mathias.Mathias’ library mostly had manuscript codices covered with gilded velvet, silk and leather.Mathias collected ancient and contemporary religious, scientific and artistic books with wide erudition. Only 200 books remained from the collection. In Széchenyi Library there are 52 Corvinas of them.

Reformed College LibraryDebrecen was the centre of the Hungarian protestants. The library of the College is more than 450 years old. It has rarities like 39 codices, 146 incunabula. They have valuable painted flower patterned Debrecen-style covers. It also has a lot of manuscripts of some Hungarian historical persons. Today it has approximately 600.000 books.

National Széchenyi LibraryCount Széchenyi gave 15.000 books to the nation in 1802. This established the Hungarian National Library. The National Library operated in The National Museum between 1808 and 1949. In 1949 it was renamed to National Széchenyi Library. It is located in Budavári Palace since 1985. The library’s field of interest is Hungary related documents regardless the fact that they were made in Hungary or in Hungarian language.

Additional famous historic libraries:Reformed Church Library in SárospatakHelikon Library in Keszthely

Categories of libraries by their field of interest and visitors.National library (as above)Reference libraries: collect, classify and make available to the public a certain field of interest’s literature.Educational libraries: wide field of interest: fiction, scientific, periodical publications usually in villages or towns.

Page 36: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

School libraries: collect, classify and make available schoolbooks, handbooks, educational books, specialized books, books for young people, fiction and books for teachers. They also collect audiovisual and electronic documents. They have open shelves, reading room, media collection, networked computers with internet connection.

Library servicesLendingReading roomReference serviceBibliography makingSelecting dissemination of informationCopy makingMusic, videoBook agendaNet usage, databases

Functional parts of a libraryOpen shelf system – fiction, educational booksReading room – handbooks, journalsStudy room, photocopier, videotheque, audio roomCataloguesBook lending

Questions: How can you develop your school library?What is Drop Cap?

Page 37: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

20, Concept and services of the electronic (digital) library. The introduction of an electronic library.

What electronic libraries do you know? What is an electronic library?Describe libraries by their collection of interest.Introduce the virtual architecture of an electronic library and its services.

Electronic services of the regular libraries

Online digital services (remote or local service)We can search in the web pages or electronic catalogues of the libraries even in several libraries at a time.We can search the whole internet with search engines or thematic engines. We can also search in URLs or use public databases.We can usually download or print the found documents for personal purposes.

Offline digital servicesThe usage of databases, sorted documents and applications on digital media (CD, DVD, Hard drive).They can be borrowed or restricted for local usage.

The concept of electronic libraryThe electronic library is a library that only gathers electronic documents only. It collects, sorts, catalogues, stores and makes these documents available to the public via the Internet. The material of the electronic digital online library is stored on servers. These servers can be accessed without any human intervention.Electronic online libraries are often called ‘virtual libraries’ because the documents are present only in digital form and can be accessed online.For security reasons an electronic library must have an offline section where the materials are on digital media (CD, DVD, hard drive) and they can be borrowed independently from the network.

Electronic libraries: Neumann-ház: www. Neumann-haz.hu, MEK: www.mek.oszk.hu

Introduction of the MEK

We can find there the introduction of the library:‘In a workshop in 1994 some librarians decided to make a Recommendation to the foundation and the articles of assotiation of the Hungarian Electronic Library (MEK).’

The objectives of the MEK are these: collect, sort, store in given formats and make Hungary related digital documents available to the users.

The field of interest of the MEK:By topics: Hungary related or Hungarian scientific, educational and cultural documentsBy document types: books, lectures, essays, maps but not periodic publications.

Documents are sorted by the range of subjects. Te main subjects are:Natural scienceTechnical science, economic sectionsSociologyHuman areas, culture, literatureHandbooks, other genres

This is different from the ETO-system (Universal Decimal Sorting). If we choose natural science it has 8 subtopics. We can choose the specialities where we can search among the documents by title, author

Page 38: Informatika középszintű érettségi szóbeli tételek 2008users.atw.hu/voki13/IT In English 2009 topics.doc  · Web viewRegarding to IT, the communication between the user and

or chronological order. The results are in alphabetical order.If we are disconnected by the results, we can use other sources like lap.hu or in EPA (Elecronic Periodic Database).Every document has a catalogue label and we can choose the formats of the documents: normal or compressed for downloading.

Questions: Do you know some other electronic libraries?