Information and Communication Technology
Information and Communication Technology
Data Informa�on
Data refers to unprocessed and meaningless raw Informa�on refers to the processed and
facts, including text, numbers, audio, video, and meaningful data that can be used to update
pictures. knowledge.
Differences
Unprocessed Processed
Independent Dependent on data
Meaningless Meaningful
• Informa�on System: A system that collects, processes, stores, and transforms data into informa�on.
1|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
3. ICT in the Health Sector
a. Use of ICT in diagnosis
i. CAT - Computerized Axial Tomography Machine
ii. MRI (Magne�c Resonance Imaging Machine)
iii. ECG - Electrocardiogram Machine
iv. EEG (Electro-encephalography)
v. Blood Sugar Tes�ng Machine (Glucometer)
b. Telemedicine
i. Emergency Telemedicine
ii. Home health medicine
iii. Telemedicine Consulta�on
iv. Telesurgery (Remote Surgery)
v. Medical Tele training
4. ICT in the Agricultural Industry
a. Meteorological Devices
b. Automated Insect Control Devices
c. Automa�c Weed remover
d. Seedlings planter using Robo�cs
e. Greenhouse (ICT controls light, moisture and air inside the greenhouse.)
5. ICT in the management of Farmhouse
a. RFID – Radio Frequency Iden�fica�on Device
b. Automated milking and examina�on of cows
c. Farm Management System
6. ICT in the Fishing Industry
a. SONAR Sensor
b. Underwater Cameras
7. ICT in Manufacturing Industry and Business
a. Using robots for manufacturing, packaging, labeling, filling botles, and other tasks.
b. Human Resource Management
c. Online Shopping
i. Open 24 hours.
ii. You can make payments using electronic methods, such as credit cards.
iii. Home delivery of goods and services saves �me and reduces transporta�on costs.
8. ICT in the Transport Sector
a. Use of CCTV
b. Traffic Light Control System
c. Parking iden�fica�on placard
9. ICT in Entertainment
a. Social Networks
b. E-books available online
c. Downloading and listening to music
Demerits(Disadvantages) of ICT:
Addic�on, Building unsuitable friendships through social media and Improper use of internet.
2|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
EVOLUTION OF THE COMPUTER
• In order to add numbers, a device called Abacus was invented around 5000 years ago.
• In 1642, Blaise Pascal invented the Adding Machine.
o This was the world’s first ever mathema�cal machine.
• In 1674, Go�ried Wilhelm Von Leibnitz improved the to perform mul�plica�on and division.
• Joseph Jacquard invented a mechanical loom using Punch Card System.
• Charles Babbage made the Analy�cal Engine using the Punch Card System concept.
o This machine was based on the concepts input, process, output and store.
o Charles Babbage is called the father of compu�ng.
• Madam Ada Augusta Lovelace is the first programmer.
o She wrote programmes for the Analy�cal Engine.
• In the year 1944, Howard Aiken invented the Automa�c Sequence Control Calculator.
o This was named MARK 1.
COMPUTER GENERATIONS
Genera�on Hardware So�ware Characteris�cs Inven�ons
1st Genera�on Vacuum tubes for Machine Language High heat genera�on ENIAC
processing, Assembly Language Slow in Processing EDVAC
(1940 – 1956) Punch Card for storing. Large in size EDSAC
16 years Expensive UNIVAC
High electricity usage. IBM 701
2nd Genera�on Transistors for Assembly Language Honeywell 400
processing, High-level IBM 7030
(1956 – 1963) Tapes and Floppy disks Programming CDC 1604
Compara�vely;
7 years for storing. Language. UNIVAC LARC
Less heat genera�on
Faster in Processing
3rd Genera�on Integrated Circuits for Birth of Opera�ng IBM 360
Small in size
Processing, Systems (CLI) PDP 8
Less expensive
(1964 – 1975) High Capacity disks for PDP 11
Less electricity usage
11 years storage, CDC 6600
Mouse & Keyboard for
data input.
4th Genera�on Large Scale Integrated Opera�ng Systems Very small in size IBM PC
Circuits and Very Large with Graphical User Portable Apple II
(1975 – 1989) scale Integrated Circuits interface (GUI) Upgradable
14 years (Microprocessor) for Ex: Unix OS
processing,
High Capacity Hard
disks and Op�cal Disks
for storage,
Faster Computer
Networks.
5th Genera�on Ultra Large Scale Internet and Portable IBM Notebooks
Integra�on circuits for mul�media Easy Opera�on Pen�um PCs
(1989 – Present) processing, applica�ons High reliability SUN
Very High Capacity High efficiency worksta�on
Hard disks and op�cal Ar�ficial
disks for storage, Intelligence (AI)
Internet.
3|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
FUNDAMENTALS OF A COMPUTER SYSTEM
• A computer is an electronic device, which collects data, processes them according to the given
instruc�ons and produces the desired output.
• Features of a computer: Speed, Accuracy, Storing & Retrieving, Efficient, Versa�lity.
Classifica�on of Computers
According to size According to Technology
Super Mainframe Mini Computer Micro Analog Digital Hybrid
Computer Computer Computer Computers Computers Computers
High Compu�ng Less powerful Smaller, less Small
Ex: Speedometer.
Use analog signals
Ex: Smartphones
Use digital signals
4|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Basic physical components of a computer system
Input Devices Output Devices CPU Computer Computer Ports
Memory
> Keyboard > So� Copy Main component > Main Memory PS/2 Ports – To
101/102 Keys - Monitor of a computer - RAM (Random Connect the
CRT, LCD, LED system. Access Memory) keyboard and
> Poin�ng Devices - Mul�media Projector mouse
- Mouse 3 Components: Temporarily stores
- Joys�ck > Hard Copy Arithme�c data (vola�le)
- Light Pen - Printers Logic Unit (ALU) Has both read-
- Touch screen Impact Printers - Performs all write facility. Parallel Port – To
(Head or needle strikes mathema�cal and connect old
> Imaging and video against ribbon, Noisy) logical func�ons - ROM printers.
input # Dot Ma�x (Read Only
- Digital Camera # Line Printer Control Unit Memory)
- Webcam Nonimpact Printers (CU) Permanently stores HDMI – Connects
- CCTV (Not Noisy, High Quality, - Controls all data (non - vola�le) monitor, projector,
High Cost, Quick Prints) devices of a The commands TV and speakers to
> Scanners # Laser Printer computer system required for boo�ng computer
- Flatbed Scanner # Inkjet Printer up a computer are
- Barcode Reader # Thermal Printer Memory stored in ROM.
- MICR Registers RJ45 Port –
- OCR (Characters) > Sounds - Temporarily - Cache Memory Connects computer
- OMR (Marks) stores data Acts as the to network switch.
- ATM (Scans Card) needed for mediator between
func�on of ALU. CPU and Primary
> Microphone Memory. Audio Ports –
Connects
Computer speed > Secondary Microphone (pink),
is measured by Memory Headphone(Green),
Hertz (MHz and Used to store data CD Player(Blue).
GHz) Permanently (non-
vola�le)
USB – Many types
- Magne�c Media
of input and output
Ex: Hard Disk
devices
- Op�cal Media
Ex: CD, DVD
- Solid State
Devices Video Port –
Ex: USB, SD Card Connects monitor
or mul�media
projector
Serial port –
Connects modem
to a computer
5|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
DATA COMMUNICATION
Basic components for data Transmission
Sender/Source
Medium
Receiver/Des�na�on
Data transmission modes
Simplex Mode
Half-duplex Mode
Full-duplex Mode
Transmission Media Example Characteris�cs
Unshielded Twisted Pair Maximum 100 meters
Used in Telephone Connec�ons
Guided / Wired Shielded Twisted Pair Used in Mobile charging cables
Coaxial Cable Used in TV Antennas, CCTV
Fiber Op�cs Used in Internet cables
Radio Waves Data transmited through air
Used in Wi-Fi and Bluetooth
Micro Waves Data transmited through air
Unguided / Wireless More than 36000km
Used in Dish TV, Satellite
connec�ons
Infrared Used in Remote controllers
• There should be two or more computers to build a computer network.
Networking Device Use
Network Interface Card (NIC) Helps to connect computer to a wireless network.
Switch / Hub Connect mul�ple devices together.
Wireless Fidelity (Wi-Fi) Connect mul�ple networks together.
Modem Connect the device/network to the internet.
Firewall Protects network from unauthorized access.
6|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Switch Hub
Sends data to the relevant computer only Sends the transmited data to all computers
Uses full duplex mode Uses half duplex mode
NETWORK TOPOLOGY
Star Topology Bus Topology Ring Topology
The breakdown of switch/hub The breakdown of the main cable The breakdown of one computer
will affect the en�re network will affect the en�re network. may affect the en�re network
Benefits of Networking:
Data and informa�on can be shared easily.
Ability to share resources.
Email
Disadvantages of Networking:
Possible security issues.
Breakdown of a Network..
Training requirements.
7|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
DATA REPRESENTATION METHODS IN THE COMPUTER SYSTEM
329 329
58.32 58.32
Most Significant Bit (Only in Binary) Least Significant Bit (Only in Binary)
23 20
1001 1001
011.101 011.101
21
2-3
Number Conversions
Decimal to Binary Decimal to Octal Decimal to Hexadecimal
Conver�ng 4610 to a binary number. Conver�ng 15810 to a octal number. Conver�ng 4710 to a hexadecimal
number.
8|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Hexadecimal to decimal Hexadecimal to Binary Hexadecimal to Octal
Conver�ng 32916 to a decimal Conver�ng 2AE16 to a binary Conver�ng 23A16 to a octal number.
number. number.
• Following are the rela�onships between units which measure data storage capacity.
o 4 bits = 1 nibble
o 8 bits = 1 byte
o 1024 bytes = 1 kilobyte (KB)
o 1024 kilobytes = 1 Megabyte (MB)
o 1024 Megabytes = 1 Gigabyte (GB)
o 1024 Gigabytes = 1 Terabyte (TB)
o 1024 Terabytes = 1 Petabyte (PB)
9|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Coding Systems
4 bit
Logic Gates
Basic Logic Gates Combina�onal Logic Gates
AND GATE NOR GATE (NOT + OR)
OR GATE
10 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
OPERATING SYSTEMS
• A Computer consists of hardware(any physical component of a computer system with a definite shape),
firmware(boo�ng instruc�ons stored in the ROM) and so�ware(instruc�ons given to the computer to
perform some ac�vity).
• Ini�al Opera�ons of a Computer
1. CPU ac�vates BIOS.
2. POST program checks hardware via CMOS.
3. Reads Master Boot Record from boot drive using bootstrap loader.
4. Loads Opera�ng System into RAM.
5. Displays user interface.
OPERATING SYSTEM
UTILITY SOFTWARE
• Backup So�ware - To copy files and take back up of hard drives
• Disk scanner - To check the errors in hard drive
• Disk defragmenta�on - Organizing the hard disk by rearranging clusters of small spaces together
and crea�ng a larger free space.
o Fragmenta�on slows down the computer. Defragmenta�on, Reorganizes data for efficient
access.
• File/data compression - Compression of larger files into smaller files
• Task Manager - to display informa�on regarding the processes and programmes in a computer and
the general status of the computer
• System diagnosis tools - to monitor errors in hardware and so�ware of a computer or network of
computers and diagnosis of system errors.
• An�-Virus So�ware - Protec�ng the computer by iden�fying and elimina�ng malicious so�ware
• Clipboard - temporary storage of data/files for cut/copy and paste opera�ons
• Disk par��oning so�ware - can divide an individual drive into mul�ple logical drives
12 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
• System profilers - to provide detailed informa�on about the so�ware installed and hardware
atached to the computer.
• Network u�li�es - to analyze the computer's network connec�vity, configure network se�ngs,
check data transfer or log events.
WORD PROCESSING
PROOF READING
1. Correc�ng Spelling and Grammar
2. Thesaurus: Used to find synonyms for the words
3. Find and Replace words
MAIL MERGE – STEPS
Mailings Tab Start Mail Merge Leters
Select/Create Data Source: Select Recipient Type new list or use exis�ng
list
Click on customize to modify fields.
Enter data and save.
Create Address block using more and match field.
Add Gree�ng Line.
Add fields using Insert Merge Fields.
Finish & Merge edit individual documents.
13 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
SHORTCUT KEYS
ELECTRONIC SPREADSHEETS
TYPES OF CHARTS
15 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
ELECTRONIC PRESENTATIONS
Func�on Shortcut
New Presenta�on Ctrl + N
New Slide Ctrl + M
Black screen while B
presen�ng
White screen while W
presen�ng
Next Slide N
Previous Slide P
Slideshow View F5
DATABASE
16 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
• Data: An individual piece of informa�on related to a specific field.
• Field: A single piece of data or atribute within a record.
• Record: A collec�on of related fields represen�ng a single en�ty or item.
• Table: A collec�on of records organized in rows and columns.
• Rela�onal Database: A collec�on of related tables that store data and allow for rela�onships between
different data sets.
• A column which enables to iden�fy a record uniquely is called primary key.
• The primary key which consists of two or more columns of a table uniquely iden�fies a record is called
Composite Primary Key.
• If a field of one table can be used to uniquely iden�fy rows of another table, this field is called the
foreign key.
• Recording column data repeatedly is called data duplica�on.
o Disadvantages of Data Duplica�on:
Inability to select a primary key field to maintain iden�ty of records.
Inability to analyze data properly.
Reduced efficiency.
Possibility to make errors in dele�ng data.
• Commonly used Data types in a Database:
o Numeric (Integer [Ex: 12, -23] & Real [Ex: 2.20808, -2349.2])
o Text (Leters, Numbers, Special Characters)
o Currency [Ex: $145.96, Rs. 2208.08]
o Date / Time [Ex: 15/01/2025, 08:30PM]
o Boolean [Ex: True or False].
• Rela�ons in a Rela�onal Database
o One to One Rela�onship (only a row of a table is related to a row of another table)
o One to Many Rela�onship (each record of a table is related to several records of the other table)
o Many to Many Rela�onship (record of a table is related to several records of another table and if
a record of that related table is related to several records of the other table)
• Forms are used to enter data to a table in Database Management Systems.
• A query is used to obtain necessary informa�on from the data of related tables.
• Reports are used to obtain printed copies of important informa�on received from the data of related
tables.
17 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
PROGRAMMING
• Input refers to the data received by a system to be processed. Process is the ac�on taken by a system to
transform input data into a meaningful informa�on. Output is the result produced by a system a�er
processing the input.
CONTROL STRUCTURES
1. Sequence
Ex: Climbing up or down step by step when going on a staircase
2. Selec�on
Ex: If the mark is 35 or more It is a Pass If not It is a Fail
3. Repe��on
Ex: Marking the atendance register student by student �ll the last name of the register is called.
FLOWCHARTS
• Flowcharts are used to present how the algorithm is built step by step in a drama�c manner.
PSEUDO CODES
• When an algorithm is presented in simple English terms it is called a pseudo code.
TERMS USED IN PSEUDO CODES
BEGIN - To indicate a beginning
END - To indicate an end
INPUT , READ , GET - To indicate an input
OUTPUT, DISPLAY , SHOW - To show an output
PROCESS, CALCULATE - To indicate a process
IF … THEN .. .ELSE … ENDIF - To indicate a selec�on
FOR – DO
WHILE – ENDWHILE - To indicate a repe��on
REPEAT – UNTIL
18 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Flowchart Pseudo Code
Example 1: Finding whether a number is even or odd
19 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
PASCAL PROGRAMMING
2. Comparison Operators
3. Logical Operators
AND Operator, OR Operator, NOT Operator
ORDER OF OPERATIONS IN PASCAL
20 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
BASIC COMPONENTS OF A NORMAL PASCAL PROGRAM
IF Statement
IF... THEN.... ENDIF IF... THEN.... ELSE .......... ENDIF
Program: If the input number is only posi�ve, print Program: Finding the larger number from two
the number. unequal numbers
NESTED IF
21 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
CASE STATEMENT
WHILE DO
Statements inside the loop are executed only if the condi�on is true.
REPEAT UNTIL
Loop is started if the condi�on is false only.
ARRAYS
• An array is used to save data items of the same type in memory using a single variable iden�fier name.
𝑉𝑉𝑉𝑉𝑉𝑉 𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁_𝑜𝑜𝑜𝑜_𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴 ( 𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 [𝑓𝑓𝑓𝑓𝑓𝑓𝑓𝑓𝑓𝑓 𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖 . . 𝑙𝑙𝑙𝑙𝑙𝑙𝑙𝑙 𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖] 𝑜𝑜𝑜𝑜 𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑 𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡
SUB PROGRAMS
• Sub programs are used to ease the complex programs.
• There are two types of sub - programs in addi�on to the main programs:
o Func�on is a subprogram which returns an output.
o Procedure is a subprogram which does not give an output.
22 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
• The purpose of the use of sub-programs are to improvement of code reusability, readability, ease of
tes�ng and maintainability
Programming languages
Machine language Assembly language High-level language
Binary numbers such as 0s and 1s Designed to use simple symbols. Designed with simple English
(bits) are used to provide words enabling the programmer
instruc�ons. to understand it easily.
Fast in Opera�on Compara�vely slower than the Compara�vely slower than
machine language Assembly language
No need of transla�ng programs Should be translated using an Should be translated using
assembler compiler or interpreter
Dependency on Machines. Does not depend on machine
LANGUAGE TRANSLATORS
Two types of language translators can be used to translate a program writen in a high-level language to
machine language instruc�ons. They are:
1. Interpreter
This is the language translator which translates each statement writen in a high-level computer
language to machine language commands one by one and the translated program is executed using
the necessary commands instantly.
2. Compiler
Compiler translates the en�re program writen in a high level language to machine language as a
whole, before it could be executed.
23 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
SYSTEM DEVELOPMENT LIFE CYCLE
• A system is a collec�on of components that interact to achieve a specific task. A system which
converts data into Informa�on is known as informa�on system.
SDLC MODELS
Waterfall Method Defini�on: An SDLC model where each phase must be completed before
the next begins, with no overlap between phases.
Advantage: Well-suited for projects with clear requirements.
Disadvantage: Not ideal for complex or evolving projects.
Itera�ve Incremental Model Defini�on: This model focuses on an ini�al implementa�on, then
progressively adds more features through itera�ons, allowing for
feedback and refinements.
Advantages: Can see a part of the system before release, Allows for
feedback and con�nuous improvement.
Disadvantages: Requires effec�ve planning and design.
Prototyping Model Definition: Creating a prototype (a working model) early in the development
process to understand requirements and refine them through iterative feedback.
Spiral Model Definition: Combination of iterative development with the systematic aspects of
the Waterfall Model, focusing on risk analysis at each iteration.
24 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
THE INTERNET AND THE ELECTRONIC MAIL
IP ADDRESS
- Internet Protocol (IP) addresses are used to individually iden�fy all the computers in the Internet.
- These IP addresses are assigned by an Internet Service Provider (ISP).
HOW THE INTERNET WORKS
The Internet is controlled by protocols. Following are some protocols used in the Internet.
25 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
SERVICES OF THE INTERNET
1. World Wide Web – WWW
- World Wide Web is a large collec�on of electronic documents saved in computers all around the world
connected to the Internet.
- Sir Tim Berners Lee is considered the father of WWW
2. File Transfer Protocol
- FTP is used to transfer large files of one computer in the Internet to another computer.
3. Remote Access
- Controlling and opera�ng a computer in the Internet remotely is performed through remote access.
4. File Sharing
- Sharing of various files in the Internet.
5. Streaming of Media
6. Search Engines
- Search engines are designed for the Internet users to find any informa�on easily.
7. Electronic Mail (e mail)
- Electronic mail enables exchanging messages as electronic mails or files between two or more people.
- E mails are categorized inside an e mail account for easy use.
o Inbox - To store mails received.
o Dra�s - To store mails that are composed to be sent but could not be completed .
o Sent - To store mails sent.
o Trash/Deleted - To store mails for a certain period that are deleted.
o Spam/Junk - To store mails that are unwanted.
VIDEO CONFERENCING
• Video conferencing is conduc�ng a conversa�on between two or more persons in different (remote)
loca�ons using audio and video transmission over computer networks.
• The requirements are as follows for a video conference Computers, Web cam, Internet connec�on and
Communica�on so�ware
CLOUD COMPUTING
• Cloud compu�ng is the prac�ce of using a network of remote servers hosted on the Internet to store,
manage and process data, rather than a local server or a personal computer.
26 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
• The main services of cloud compu�ng are;
o Infrastructure as a Service (IaaS)
o Pla�orm as a Service (PaaS)
o So�ware as a Service (SaaS)
• Advantages: Lower so�ware cost, Improves performance, Instant so�ware updates
• Disadvantages: Requires a constant internet connec�on, Does no work well with slow internet speed.
USE OF MULTIMEDIA
• Drawings or images, created with the use of computer graphic so�ware, are called digital graphics.
• Basic elements of digital graphics
o Pixel
A pixel is a �ny illuminated dot having a colour which is displayed on a computer screen.
𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶 𝑝𝑝𝑝𝑝𝑝𝑝 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 = 2𝑏𝑏𝑏𝑏𝑏𝑏 (𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏 𝑝𝑝𝑝𝑝𝑝𝑝 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝)
o Resolu�on
The physical dimension is displayed as the image resolu�on.
o Size
The size of a graphic is determined by the number of pixels, the number of lines and the colour
combina�ons used for the crea�on.
Graphic compression is used to compress file size.
Lossy Compression Lossless Compression
Original form of Data is Lost Original Data is preserved
Smaller File Size Larger File Size
Reduced quality depending on level of No loss in quality
compression
File Formats: JPEG, TIFF, BMP File Formats: GIF, PNG, RAW
o Colour
There are about 16 million of recognizable colours visible to the naked eye.
Two widely used colour models are RGB(Red, Blue, Green) and CMYK(Cyan, Magenta, Yellow,
Black).
RGB is used to create images on television screens or computer screens using coloured lights.
CMYK is used for prin�ng on paper using coloured inks.
GRAPHIC TYPES
27 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
GIMP – FOR RASTER GRAPHICS - TOOLBOX
28 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
ANIMATION
- Anima�on is an op�cal illusion to show the movements of an object or objects.
- Key Frame: The main, sta�c frame in a series of frames to be used with the crea�on of an anima�on.
- Tween Frames: Anima�on is created in the Tween Frame.
- Blank Keyframe: Provides a blank frame to include a content.
- Anima�on So�ware: Vectorian Giato
AUDIO EDITING
- So�ware Used: Audacity
• A video clip that is created using Windows Movie Maker is saved .WLMP (Movie Maker Projects)
format.
29 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
USE OF BASIC HTML
HTML TAGS
Header Tag <h1>….</h1> makes the leters big and bold
The size and the thickness of the leters are
decreased gradually from <h1> to <h6>
Image Tag <img src=”Path to Image” alt=”Text to show when image is unloadable”>
Alignment can be adjusted using ‘align’ atribute with ‘le�’, ’right’, ‘center’,
‘jus�fy’ values
30 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Line Break <br>
Unordered Lists <ul type= “disc”>
<li>Item 1</li>
<li>Item 2</li>
</ul>
31 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Two Types of Websites according to Nature
Sta�c Websites Dynamic Websites
If the content of a website is maintained If the web content is o�en changed, such a
without any change over a period of �me, such website is called a dynamic website.
a website is called a sta�c website.
These are designed using so�ware such as PHP,
The web content can be changed only by ASP.net, JSP.
changing the code.
Here the web server generates informa�on
using a data base or program.
33 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Misuse of ICT to harm Society
Cyber Crime
- Irresponsible use of social media has engendered misconduct in society. This irresponsible use is
iden�fied as cybercrime. A few such acts are:
o Uploading others’ images without permission
o Releasing unsuitable photographs or videos of women or young girls to the Internet and
making use of such images or videos to frighten, threaten or blackmail
o Giving publicity to informa�on that can harm a person’s reputa�on
o Using social media to give out false informa�on and, thereby atract others to finally destroy
lives
o Using unfair means to gain access to others’ personal accounts and stealing personal
informa�on.
- How can we protect ourselves from using social media?
o Be careful in selec�ng social media over the Internet
o Be cau�ous about making friends through social media over the Internet
o Avoid accessing suspicious e-mails
o Do not click on suspicious links that come through e-mail
o Ignore anonymous e-mails
o Do not allow social media to access the e-mail address book
o Do not use personal e-mail to access social media
o Avoid installing applica�ons in your computer that come through social media.
o Think twice before using social media
________________________________________________________________________________
For more free educational resources, notes, and tips to help with your studies, follow:
https://learnwithammaar.com/whatsapp
34 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6