r Flashcards
Difference between GUI(Graphical user Interface) and CLI
(Command Line Interface)
GUI user doesn’t need to learn any commands while CLI
needs to learn a number of commands to carry out basic
operations GUI is more user-friendly ; icons are used to represent
applications while in CLI all commands needs to be typed in correct format and spelling
In CLI you have to remember the exact path and name of application while GUI menus are offered to help choose an action
In CLI it is more important that users understand how a computer works
Difference between application software and system
software
Application software is a program that allows the user to do
specific task . For example : word processor , spreadsheet ,
database , control measuring software , apps (applications
) software , Photo editing software , video editing software
and graphic manipulate software.
System software is a program that allows the hardware to
run properly and allow the user to communicate with the
computer. For Example : compiler , interpreter , linkers ,
device driver and operating systems
What is meant by virtual reality and general equipment
used
Create an artificial environment that users can interact with ,
help in architects , train pilot , train surgeons and play games .
general equipment used : eye goggles , gloves , headphones ,
sensor and powerful computer
Describe how data is read from the RFID chip
The washing machine sends out (interrogation waves) radio
signal to read the data from the RFID . They act as a passive
transponder .
Compare and contrast between pen drive than a CD-R
Similarities
Pen drive and CD-R are storage devices
Pen drive and CD-R are portable
Difference
Not every computer has a CD drive , but most PCs have a USB
port
Pen drive is more robust
Pen drive stores more data
Advantages of SSD compared to HDD
They have no moving parts therefore more reliable . Moreover ,
they are very thin as there are no moving parts
They are considerably lighter
They have lower power consumption
They run much cooler than HDDs
Difference between internet and intranet
internet is public but intranet is within one organization (private)
Internet is global but intranet can be policed / managed
Internet has more information than intranet
Data on the intranet is more reliable and relevant to the
organization than which on the internet
Wide area network (Wan) :
Wan are used where computers or
networks are situated a long distance from each other
geographically .For example , in a different city or country . If a
number of LANs are joined together using a router , they can
form a WAN . The most common examples of WAN are the
internet and the network of ATMs used by banks .
Wireless Local Area Network (WLAN) :
WLANs are similar to
LANs but there are no wires and cables . In other words, they
provide wireless communication over fairly short distances
using radio or infrared signals instead of cables . The main
wireless technologies that are used to form a WLAN are
Bluetooth and WIFI.
Local Area Network (LAN) :
LAN will consist of a number of computers and devices (for
example, printers) that are connected together to hubs or
switches by cables.
– What is meant by Encryption
Encryption is the process of converting information into a form
that is meaningless to anyone except holders of a ‘secret key’.
– Explain how the data from a router is routed
Routers send packets of data between computers on different
networks . Each data packet contains the IP address of the
computer/ network that the data is being sent to then the router
will use the IP address to work out the best route in which to routers on other networks which will read the IP address and
re-route the data until it ends up at the exact device it was
intended for .
– Advantages and Disadvantages of booking online , online
shopping or internet banking
No need to travel / reducing costs and time-wasting.
Users have access to a worldwide market and can look for
products that are cheaper.
Disabled and elderly people can access any shop without to
leave home.
Shopping and banking can be done at any time 24/7
Shopping from the supermarket probably took up a lot of time
than online.
No face-to-face discussion with staff.
Internet banking saves time.
The shops and banks save money , not having as many staff
working for them
Disadvantages of booking online , online
shopping or internet banking
There is the possibility of isolation and lack of socialization
because people stay at home.
Health risks associated with online shopping or banking (lack
of exercise).
Security issues.
It is necessary to have a computer and to pay for the internet
Unlike high street shopping, it is only possible to see a picture
of the goods, which might not portray the exact color of a dress.
High street shops and banks are closing because of the
increase
in online shopping or banking and this is leading to ‘ghost
towns’ forming
It is easier to make errors with online banking and transfer
money incorrectly to different accounts
role microprocessor
A microprocessor is really just a tiny CPU built into a single chip
. Microprocessor controlled devices affect our lives in lots of
different ways including in our homes , our leisure time , how
we interact socially . They even have an affect on our needs to
actually leave our houses . labor-saving devices example ,
Automatic washing machines , microwaves ovens , cookers ,
automatic dishwashers , robotic vacuum cleaners , breadmaking machines and smart fridge and freezers .
How does the microprocessor work ?
For example in automatic cooker :
An automatic cooker has temperature sensors and a number of
controls to set the cooking time. The microprocessor checks
the set time against the current time and when they are equal,
the cooker heating elements are switched on. Once the cooker
starts the cooking process, the microprocessor then constancy
checks the end time against current time, when they are equal,
the cooking process is stopped.The microprocessor checks the
temperature data sent from a sensor and turns the heating
element on if the value less than the pre-set value chosen by
the user.
Components of Expert system
Knowledge base
Inference engine
Rules base
User interface
nput and processing involved in booking online
The customer clicks on the performance they wish to see.
A date and time is typed in
The required number of seats is also entered.
The seating display in the theatre is shown on the screen.
The user selects their seat(s) by highlighting the actual seats
on the screen, display and then clicks CONFIRM to go to the
next part of the process.
The database searched to check the availability of the selected
seats
If the seats are available, the total price is shown + the seat
numbers
If the customer is happy with this, they select CONFIRM on the
screen
– sensors monitoring process
There are many ways in which sensors monitor process like in
weather station , measuring a patients vital signs in hospital or
measuring pollution in river .
Let’s say how sensors monitor the measuring of patient vital
sign in a hospital :
Sensors read key vital signs (such aspulse rate, heart rate,
temperature, blood pressure, respiration, etc.) .The data from
the sensors is converted into digital using an ADC.
The data is stored in the computer’s memory.
The computer compares the data from the sensors with the
values stored in its memory
The results are output on a screen in the form of graphs and/or
numerical readouts
An alarm is activated if any of the data is outside acceptable
input Values
The system continues to measure the patient’s vital signs until
the computer is turned off.
OCR
because there method reads handwriting it is possible for customers to extend their answers to questions
poor handwriting may cause readings errors
ocr requirs a complex recoginition system
meaning of verification
Verification is a way of preventing errors when data is copied
from one medium to another, there are two ways for verification
User documentation
How to load/install/run the software
How to save files / search/sort data
How to do print outs
How to add, delete or amend records
The purpose of the system/ program/ software package
Limitations of the system
Screen layouts / Print layouts
Hardware requirements
Software requirements
Sample runs (with results and actual test data used
Error handling/meaning of errors
Troubleshooting guide/help lines/FAQs
How to log in/log out
Tutorials
Error messages/meaning of error messages
Glossary of terms.
Technical documentation :
Program listing/coding
Programming language used
Program flowcharts/algorithms
Systems flowcharts
Purpose of the system/program/software
Limitations of the system
Input formats
Hardware requirements
Software requirements
Minimum memory requirements
known ‘bugs’ in the system
List of variables used (and their meaning/description)
File structures
Sample runs (with results and actual test data used)
Output formats
Validation rules
Meaning of error messages
Explain what other testing should have been carried before implementation
The whole system should have been tested
The operator should have checked the meter reading against
the previous one
The bill should have been checked before it was sent
Linkages between modules should have been tested
Methods of researching the current system
Observing of the users
Interviewing the manager
Questionnaire given out to users
Examination of existing documents
List principals of a typical data protection act
Data must be fairly and lawfully processed
Data can be only processed for the stated purpose
Data must be adequate, relevant and not excessive.
Data must be accurate.
Data must not be kept longer than necessary.
Data must be processed in accordance with the data subject’s
rights.
Data must be kept secure.
Data must not be transferred to another country unless they
also have adequate protection
Methods to minimize the likehood of receiving spam emails
Use a spam filter/anti-spam software
Do not reply to spam/suspicious messages
Do not click on any links/attachments in a spam/suspicious
message
Use a disposable email address
Use a complex email user name
Do not give out your email address online/do not register using
email on untrusted websites/opt out of marketing
Read messages as text
Do not use your email address as an online username
Changing to an email provider who filter spam
How to keep it secure the personal data
Don’t give out any personal information to people who are
unknown to you.
Don’t send people photos of yourself - either online or via a mobile phone unless the person known to you.
Always maintain your privacy settings
When accessing the internet make sure the websites being visited can be trusted
Only use recommended websites by teachers
Only open emails from known sources.
Only send email people you know
Using social networking sites, instant messaging or chat room
What are cookies and why are they important to
companies
A small text file sent to a user’s web browser when they visit a
web site. It is important to Store information about the visit and
are used the next time the user visits the site
Remember the user’s details
Remember the user’s preferences
Remember items a user bought
Remember passwords
Remember what they searched for
Target products
Offers a tailored experience for users
2 – What is meant by software copyright?
Software / Music CDs, videos and articles from magazines and books is protected by copyright laws
3 – Actions that would break copyright
Make a software copy and then sell it
Use software on a network or in multiple computers without a
license
Rent out a software package without permission
use the name of copyrighted software without agreement
4 – Ways to protect software from piracy
Before installation of software the user will be asked to enter Product key
The user will be asked OK/I Agree to the license agreement before installation
The original software always come with the sticker informing
the purchaser it is illegal to make copy ( hologram form)
Some software required to be original CD/DVD available in the drive
Some software run only if dongle is plugged into USB port
How you would evaluate the reliability of information found
on the internet
Anyone can setup website, so information not necessarily
reliable or accurate.
Some commercial web site will be based to advertise their products, If the advertising only related to their own products It could be unreliable
If the web site URL ending with .gov or .org … mostly is reliable If you compare the information on the web site with the information in the book, this will help to show if the information reliable or no .
It is good idea to see if responsible bodies (endorsed support and permit ) the website
Check if the website linked to reliable or unreliable web sites
Check if the website have a testimonials recommendation
this can indicate reliability If the last update was long time ago , this mean the information is not reliable
If the author of the website is good credential, then the
information is more likely reliable
Advantages and Disadvantages of policing the internet
Arguments in favor of some form of internet control:
It would prevent illegal material being posted on websites
People find it much easier to discover information (Ex. make a
bomb)
By some control would prevent children and other vulnerable
groups from being subjected to undesirable websites.
By some control would stop incorrect information being
published on websites.
Arguments against some form of internet control:
Material published on websites is already available from other sources.
It would be very expensive to police all websites
It would be difficult to enforce rules and regulations on a global scale.
It can be argued that policing would go against freedom of information
Many topics and comments posted on websites are already
illegal and laws already exist
Who is to decide what is illegal or offensive, many things are only offensive to certain people but others NO
Advantages and Disadvantages of students using the
internet to carry out researches
Advantages :
Information on the internet is up-to-date
The internet limitless of information
Searching using a search engine is fast and easy.
Information on the internet is usually free of charge.
Pages on the internet can have multimedia elements , which
can make learning is interesting
Disadvantages :
Anything can be posted on a web page and information may be
incorrect.
There is always the risk of accessing inappropriate websites
It is too easy to be distracted when searching on the internet
backing storage
devices provide permanence and are used to store data for later use and backup data
NFC READER
contactless transmission of info
the sender and receiver to be closer together than in RFID which makes it more secure
backup
is an extra copy of important files stored away from the original copy in case of damage or loss of original copy
this may happen due;
hacker deleting the data
virus damaging data
corruption of hard disk
transfer data from a computer to another
-magnetic
-optical
-solid state
-cloud storage
magnetic tapes
prop
large storage capacity
slow access speed
high transfer speed
drive not commonly available
used to store:
backup of file servers for computer networks
fixed hard discs
very fast access to data
not portable high capacity
used to store
operating systems
software
working data
portable hard discs
prop:
large capacity
portable
more expensive then other forms of removable media
used to store
very large files which need transporting from one computer to another
optical backing storage
prop:
portable
can be broken/scratched
used to store data:
CDs: large files
DVDS very large files
CD ROM
uses by software companies for distributing software programs
by music companies for distributing music albums
by book publishers
prop prevent deleting
DVD ROM
uses film distributors
prop prevent deleting
CD R
uses:
recording of music downloads from internet
prop
single burning
DVD R
uses:
recording of films downloads from internet
prop
single burning
CD RW
uses: very useful for keeping files that need to be edited
Blu-ray
for storing HD/3D movies
capacity 25GB,5BGB,1OOGB
solid state backing storage
prop
smallest form of memory
portable
more robust than other forms of storage
more expensive than other forms
can be easily written
memory sticks
prop
can store up to many Gb
uses: to transport files and backup data from computer to computer
flash memory card
uses
in digital camera, mobile phone
types
SD card
xD card for cameras, limited capacity
cast card
operating system
is the most important program that runs the device
manage security, manage error messages, provides user interface
solid state drives
same as hard disk but portable
complier
traslate a program written by a programmer into machine code
linker
link more than one object file and combine them in one single program
network interface card
placed inside the device
to be enable to connect with network device
contains MAC address
bridge
device with only two ports
used to connect two networks together
so they can function as a single network
Hub
device with multiple ports
a hub is a “dumb” device when data is received at one port it sent to all computers
switch
like hub but sends to it destination
WLAN
wireless access point
accessing website
is created using HTML, stored in a server
HTML
Hyper text markup language
language used to create webpages
server
centralized storage
accessed by multiple users
URL
uniform resource locator
a reference to access a resource on the internet
WWW
world wide
massive collection of webpages created using HTML
accessed using the internet
is a service on the internet
HTTP
Hyper Text Transfer Protocol
▪ set of rules for transferring the webpage from the webserver to the viewer’s browser
HTTPs
Hyper Text Transfer Protocol Secure version
▪ same as HTTP, but where everything transferred between webserver and user’s
computer is encrypted using the SSL (Secure Socket Layer)
▪ SSL is a security protocol (set of rules) developed for sending information securely
over the Internet
▪ The webpage is secured by SSL when the URL starts with “https” and a padlock is
displayed in the browser
wikis
editable multi-author
website Users
participate in the
creation of the content
by :
posting information
about many topics
reviewing and editing
each other’s posts
posts not in
chronological order
FTP
File Transfer Protocol
▪ set of rules for transferring files between a file server and a user’s computer (client)
Blog
an online diary or journal
(ideas, opinions,
information)
single author
others can comment on
posts and on each other’s
comments
posts ordered from most
recent to oldest (reverse
chronological order)
blog owner can set their
blog for private or public
access
web conferencing
participants online at the same time
presenter controls what the
participants can see/hear
participants view the presentation
and listen to the presenter
presenter has a control panel to
decide when participants can interact
a chat box is provided for participants
to type in their questions
audio conferencing
participants can only hear each other as
it uses mobile phones /telephone
networks
the organizer of the conference is given
2 PINs by the phone company (one for
the organizer and one for the
participants)
at the time of the conference the
organizer dials the conference phone
number and enters his PIN to start the
conference
then the participants dial the same
number and enter their PINs to join the
VIOP
(Voice Over Internet
Protocol)
A service that enables people to
use the Internet as the
transmission medium for
telephone calls by converting
sound into digital packets
virus
▪ A program that can replicate itself
▪ and attaches itself to other programs
▪ Can delete or corrupt data stored on the computer
* Can slow down computer performance / fill up memory
how to avoid virus
1.Use anti-virus software (must be updated)
* checks every file the user opens or downloads
* scan any removable media before use
* scan e-mail attachments
* stores virus codes and downloads new, updated definition files for new viruses
* when an antivirus program scans a file it compares the file with the list of known viruses,
if it matches, the antivirus will try to clean the file if possible, if not the user is given
choice to delete or quarantine the file
2.don’t download programs from untrusted sites
3.don’t open attachments from e-mails from unknown senders
how to avoid spyware
Use anti-spyware (must be updated)
*Use on-screen keyboard / dropdown when entering confidential information
spyware
program installed by hackers on user’s computer
* to record keystrokes typed on the keyboard
* stores them in a file
* transfers it back to the hacker without user’s knowledge
firewall
Firewall: Software to prevent unauthorized access through the network, prevent unwanted programs,
block unwanted sites
By controlling incoming and outgoing traffic
▪ Acts as a barrier between the computer and external network
▪ by keeping a list of allowed IPs and a list of blocked IPs
▪ in case of unknown access user is asked for permission
firewall can affect the operation of the computer and stop some uploads / some legitimate software can
be blocked by the firewall
may need to be shut down at times to upload files therefore making computer unsafe
if firewall installed on router it will not secure computer from other computers in the same network
hacking
Unauthorized access to a computer system
▪ to misuse data (steal, change, delete)
▪ for identity theft
Authentication:
Making sure that the person using the computer is who he claims to be (ensuring
the identity of the person using the computer).
zero login
Systems recognize users based on biometrics & behavior patterns
devices keep record when and where logins occur
devices can detect changes in user behavior; login from new device / strange location and checks with the owner that he/she is attempting to access the account
How to detect spam/phishing:
E-mail contains spelling mistakes
➢ General not personal (the bank knows
your name)
➢ No digital certificate attached to the e-
mail
➢ E-mail claiming the user won a
competition they didn’t enter
➢ Requesting personal confidential
information
➢ Contains suspicious links or attachments
➢ Urging for quick action
spam
*Electronic junk mail sent randomly, unwanted advertising,
*fills up mail inbox preventing important messages from being received
*may contain viruses, spyware or phishing attacks
how to avoid spam
*Anti-spam / spam filter
*Don’t open any links in the e-mail
*Block / report the sender e-mail address
*Don’t use your e-mail to register on untrusted websites
*Don’t subscribe in newsletters
*Be cautious when clicking on links or downloading attachments within emails
phishing
▪Sending fake e-mails identical to the bank’s e-mails (looks legal)
▪requesting personal confidential information in reply to the email
▪containing a link to direct the user to a fake website to enter personal confidential information
How to avoid phishing:
How to avoid phishing:
1.Don’t reply to any e-mail requesting personal information
2.Be cautious when clicking on links in an email or downloading attachments
3.Report the e-mail address that sent the e-mail
4.Be cautious of messages requesting urgent reply
5.Contact the bank to ensure the mail is fake
smishing
it contains a URL or a telephone number inside the text message
The recipient will be asked to log on to the website or make a phone call, and asked to supply personal details such as card number / password
The sender of the SMS might not be a phone number
processor
receives reading from sensor, compares it with preset value and gives a signal to control device to switch on/off
vishing
phishing via voice message
ADC
(converts
analog signals
from sensor to
digital signal for
processor)
Advantages of sensors rather than humans
More accurate readings
More frequent readings
Can work 24 hours without breaks or shifts
Faster response than humans
Can work in conditions dangerous or unsuitable for humans
Can take more than one reading at the same time
Sensors will not forget to take readings
Cheques
- cheque is verified by making sure it is Not fake, Signed
- collect printed info
o Account number of payer
o Bank & branch code of payer
o Cheque serial number - collect hanwritten info
o Amount and Due date
o Name of recipient
o Signature of payer - When due date of the cheque has arrived:
o bank makes sure that the amount of money is available in the payer’s account
o Decrease balance of payer’s account and Increase balance of recipient’s account
o Send bank statements to both customers
Advantages of using robots in manufacturing:
Increase in production (robots don’t need breaks like humans)
Consistency in production (exact same product every time)
Monthly salaries for human workers are saved
Dangerous tasks are carried out without the need of life insurance for humans
Fewer mistakes / greater accuracy
Disadvantages of using robots in manufacturing:
High initial cost of robots
Training workers who will be still present after robots are introduced
High running cost of maintenance of robots
Robots cannot react in unexpected situations
Global Positioning Systems (GPS)
System used to detect the position of the user
Signals (radio waves) sent from device to
satellite
Signals (radio waves) sent from satellite to
device
Device calculates the distance from satellite
At least 3 satellites are used
Geographic Information System (GIS)
Adds layers of data to maps
Allows the user to analyze data according to
location (in order to take decisions)
Users can edit map data
Works with GPS
Uses:
weather forecasting
sales analysis
crime patterns
traffic information
population forecasting
Automatic number plate recognition system (ANPR)
It is used to read the number plates on cars
* A sensor detects a vehicle
* It sends a signal to the processor to instruct the camera to capture an image for the car
* A program is used to isolate the number plate from the image
* The brightness and contrast is adjusted to separate each character in the plate
* Each character is recognized using OCR then it is stored in the database
* The car park barrier is raised and the driver receives a ticket showing the date and time
Expert systems adv
Advantages:
Help the expert give more accurate results
More consistent results; not affected by emotional reasoning
Faster to produce results
Uses data from many experts so contains more knowledge than single
expert
Cheaper than employing multiple experts
Updating expert system is cheaper and more frequent than regularly
training experts
disadv of exp.system
Disadvantages:
Lack common sense in the decision making process
Initial cost of creating the system
If the knowledge base or rules base contain errors it will mislead the
expert to an incorrect result
Must be regularly updated
Experts must be trained to use it
smart homes
Can control devices remotely
Switch on/off devices before getting home or after
leaving
Smart fridge can send reminders to buy products when
running out
Security systems connected to the internet enable
monitoring the home while outside
Smart television enables streaming of content to watch
at any time & playing online games
Needs stable internet connection
High initial cost & maintenance of devices
Must have a smart phone with internet connection
Risk of viruses installed on devices may cause
malfunction
Risk of hacking devices like burglar alarms/security
cameras
eye strains
Staring at computer screens for a long time
- Use anti-glare screen
- Use flat screens
- Improve surrounding lighting
- Reduce screen brightness
- Maintain appropriate distance between screen and eyes
- Take regular breaks
neck pain
Looking up or down at the screen * Sitting on an adjustable chair so screen is at eye level
- Take regular breaks
Repetitive Strain
Injuries (RSI)
Long use of mouse
(pain in wrist)
- Use wrist rest
- Use ergonomic mouse
- Take regular breaks
Long use of keyboard
(pain in wrist)
- Use ergonomic keyboard
- Use hand exercises
- Use voice commands
- Take regular breaks
Repetitive clicking on mouse
(pain in fingers)
- Use hand exercises
- Use voice commands
- Take regular breaks
Long typing on mobile phone or PDA or use of
joystick
(pain in thumb)
- Use hand exercises
- Use voice commands
- Take regular breaks
backpain
Sitting in a wrong position in front of the
computer for a long time
- Sit in an upright position
- Use ergonomic chair
- Take regular breaks
ozone
Sitting too close to a laser printer for a long time
- Proper room ventilation
- Laser printer placed in printer room
- Change type of printer
Data protection Act
Data protection Act is a law to protect
personal data handled by organizations
(example: school, hospital, club) from
misuse:
Do not keep data longer than required
Do not collect data that is not required
Do not pass on the data to anyone without
the owner’s permission
Only certain employees can view the data
and handle it
Keep the data safe and secure (encryption,
firewall, password)
Only use the data for the reasons given to
the owner
Keep the data up to date
netiquette
Don’t be abusive
Don’t send spam or repeatedly send the
same information to the same person
Respect peoples’ privacy, don’t share
personal information about anyone without
permission
Don’t use capital letters; it’s considered
shouting
Don’t plagiarize, always acknowledge source
of any information used
Check spelling and grammar, gives a good
impression
Don’t send inappropriate content, disturbing
for others and not respectful
When sending emails confirm the recipient
to make sure the email is not delivered to
someone else
Interviewing
Collecting detailed
information
Questions can be changed
based on responses
Can see body language; less
risk of misunderstanding
Time consuming
Not anonymous (unreliable
responses)
Expensive due to analyst time
Analyst & employee must be
available at same time
Distributing questionnaires to
employees
Collecting wide variety of
responses
Responses can be anonymous
(reliable responses)
Cheaper than interviews
Not time consuming; can be
filled any time
Careless / vague answers
Misunderstanding of
questions
Questions not flexible
Observing
No waste of employee time
Reliable information; the
analyst will observe the
system in person instead of
taking opinions
Most people are distracted or
uncomfortable or don’t work
as usual while being watched
Not all problems may appear
during the observation
Flat file database
1 table
All records are stored in
one table.
Easier to understand/use
Easier to sort and filter
data
Easier to setup (less ICT
experience needed)
Relational
database
2 or more tables with
relations between them;
created by taking the
primary key from one
table & adding it to
another table as a
foreign key
Data is only stored once
so:
Less storage space
Easier to edit/add/delete
records
Complex queries can be
carried out using several
tables
Separate passwords can
be assigned for separate
tables (better security)
Easier to expand
Formula and Function
Formula:
Can be simple
calculations/mathematical operations
Can be easily typed by user
Can contain a function
Function:
Built into the software
Have a pre-defined name
Absolute cell reference
replicated the cell reference will not
Relative cell reference (A2)
when
replicated the cell reference will change
Content layer
(htm)
images, tables, text,
hyperlinks
Presentation layer
(css) colours, fonts,
borders
anchor
A position on
the webpage that a
hyperlink will point to
Behaviour layer
(created using coding
/ scripting language)
interaction of website
bookmark
saved
shortcut to direct the
user to a certain
website (favorites)
class
defined in a
stylesheet using a dot
(e.g. .right)
used in adding or
changing properties
without having to
create new style
inline styles
within each web page
edited by changing
each web page
can be anywhere in
the web page
Higher priority
widow
When the last line of a
paragraph is separated on the next page
Orphan
When the first line of paragraph is separated on the previous page
Corporate house styles
Benefits:
Consistency
Brand recognition
Reduces time spent in formatting documents
Reduce errors of typing/forgotten elements