Академический Документы
Профессиональный Документы
Культура Документы
Learning objectives
When finished with this chapter you should be able to:
• Identify different types that are used for different purposes, such as css, csv, gif,
htm, jpg, pdf, png, rft, txt, zip
• Quickly locate files you have stored in your device
• Open, import and export different types of files
• Save files in a folder structure that you plan and create
• Save files with appropriate names to be able to identify the content
• Print files in a variety of ways
• Reduce file sizes for storage purposes or for transmission
• Compress file sizes with several techniques
ICT Theory – Revision Presentation – File Management
11. File Management
Depending on the application you are using to create a file it has specific characteristics. A file
Chapter 11 - FILE MANAGEMENT
created using a word processor will have different characteristics to a file created using
spreadsheet.
GIF-Graphics
Key Terms Examples of file extensions Interchange
JPG-
Interchange
Format able joint
File name: a way to identify a file
photos
File extension: a way to identify the type of file
PNG-
Portable
network
.DOC-Microsoft graphics
word document
.CSS-
Cascading
style sheet .HTML-
.DOCX-
hyper text
office open markup
XML language
.PDF-
.RAR- portable
roshal document
archive format
.RTF-rich
.ZIP- text
compresse .CSV- .TXT- format
d file types comma text file
separated
values
ICT Theory – Revision Presentation – File Management
11. File Management
Senders should check for Netiquette: The rules of Avoid humor as some people
spelling and grammatical errors. may not understand the joke.
etiquette that apply when
communicating over
Respond quickly to an email Do not plagiarize and obey the
computer networks,
message. copyright law.
especially the Internet
If your email account is not secure then emails could be sent from You could also be at
your account without your permission or knowledge. risk due to email
scams
Your email account could be hacked due to the following reasons: (phishing/pharming).
Email
Spam (junk) email is sent out to recipients from a mailing list. The
• Use a junk email filter to stop
email could be part of a phishing scam or could be to promote
certain products. They are basically unwanted emails. spam email coming into the
inbox.
• Do not sign up for any
Effects of Spam Email? commercial mailing lists.
If a spam email is part of a phishing scam then there is a chance • Do not reply to spam email.
your details could be obtained. The network could also become • Untick the check box if you
slower or unresponsive if there is a lot of unnecessary traffic are asked to give your email
flooding the network. to a third party.
Hypertext Transfer Is the rules which are followed when transferring information across
Chapter 11 - FILE MANAGEMENT
Protocol (HTTP) & the internet. Rules are agreed between the sender and recipient
(HTTPS) when data is being transferred.
Uniform Resource • A web browser allows the user to display a webpage. A web
Locator (URL) & Web browser will use URLs to access specified websites.
Browser • URLs are represented by numbers (http://100.100.100.1)
however it is not very user friendly.
• So therefore an alphanumeric format (http://www.mrlawsonsclassroom.weebly.com)
HTTP or
HTTPS
Internet Service
Provider (ISP) ISP is a company which provides internet
access to users. Normally the users would
have to pay a monthly fee. Broadband
connections tend to use fire-optic cables
for increased bandwidth.
ICT Theory – Revision Presentation – File Management
11. File Management
Advantages Disadvantages
Search Engines
Chapter 11 - FILE MANAGEMENT
•
Chapter 11 - FILE MANAGEMENT
Blogs and Blogging A blog is based on personal experiences and usually updated
by one author.
• Blog entries are in order (most recent entries are shown first).
• Blogs can not be changed by other users of the internet.
• Bloggers can be prosecuted for posting offensive material.
Advantages Disadvantages
• Regularly updated in real time. • Not regulated
• Vast amount of information. • Online threats (hacking/viruses/scams/
• Can find information using search engines. cyber bullying)
• Is available on many platforms. • Easily become distracted
• Web content can include text, images, • Sharing of illegal content
video, sounds, animations etc. • Exposure to inappropriate material
• Information may not be reliable
Why the internet is so popular? The internet has also evolved over the years with the
introduction of social networks, media streaming sites,
online shopping/banking.
How to evaluate the • Checking the websites URL address (ending in .gov or
reliability of information .ac more likely to be reliable)
found on the internet • Check links or endorsements from other websites.
• Check the last time the website was updated.