Nothing going on here, move along…

Archive for the ‘2010’ Category

Programming exam revision sheet

Program development life cycle



Also know as PDLC this process contains six main phases.



Define the problem

Design the solution

Code the programme

Test the programme

Document the programme – this should be done right the way through.

Implement the programme

Define, design, code, test, document, implement

Logic techniques




Here are the steps to build a website with some organisation.

Show the basic layout. Draw a story board to show the general layout of the program.

Name different items using the naming standards. e.g. lblExample, btnTest. (these labels go in the name part of the properties and with the storyboard for reference.)

Logic. Explain what each item does.

Draw a flow chart

Create the interface and add naming standards to each item (physical)

Code each logical item starting with the easiest thing first. (physical)

Storyboard, naming standards, logic, flow chart, create interface and add naming standards, code logic items


Test plan example

A test plan contains columns for the following:

The test number

A description of the test

The test data

The expected output

Actual output


*Both the actual output and suggestions are filled in by someone else.

Test number, description, data, expected output, actual output, suggestions.

Checking the boundries

Check how the program performs when using numbers expected e.g. 1-100

Check the performance when using numbers outside the boundry e.g. 0 or 101

Check the performance when using special characters e.g. a-z

Naming standards

Uses the three letter acronym followed by the chosen naming standard which always starts with a capital letter.

e.g. btnFound

– What can be done to fix any problems- What actually happened in the test- What should happen in the test- The data which will be used to carry out the test- to explain what the program will be doing in the test





Not coding, used to help understand what the program should do. (On paper usu.)


Blue tooth classifications

Class 1 – Range of 100m

Class 2 – Range of 10m

Class 3 – Range of 1m

Each uses Adaptive Frequency Hopping (AFH)

Fire walls


Free standing, uses it’s own hardware

Costs more

Multiple computer use

Little impact on computer performance


Availible as 3rd party software, cost varies

Included in Windows XP

Only protects the computer it is on

Uses the CPU, can slow computer speeds

Wireless network stuff

The domain is the bigger network, a work group is a smaller group within the domain, information can be shared between only these computers.

SSID – Service Set Identifier

The default wireless network name so that wireless devices can detect other devices in a wireless network, it must be manually entered when the SSID broadcast has been disabled on the wireless router or access point.

MAC address filtering

A security technique in which only identified MAC addresses can connect to a wireless network, used on wireless LAN’s

WEP – Wired Equivalent Privacy

First generation security for wireless, crap, it is easy to break it’s encryption making it pretty much useless.

WPA – Wi-Fi Protected Access

2nd generation of WEP, has much stronger encryption


A security layer for wireless systems, once it was made an official standard WPA2 was released

WPA2 – Wi-Fi protected access 2

The improved version of WPA which uses the entire 802.11i standard and provides goverment grade security. It can be enabled in two versions:

Personal – Password authentication

Enterprise – Server authentication

LEAP – Lightweight extensible Authentiation Protocol

CISCO’s wireless security, addresses weaknesses in WEP and WPA

WTLS – Wireless Transport Layer Security

Security for mobile devices which uses a smaller amount of bandwidth. Uses WAP (Wireless Applications Protocol)

 Hub – receives data, sends to all ports

Switch – Sends to intended port, more sophisticated than a bridge

Routers – Connects entire networks to each other e.g. internet

WAP – Wireless Access Points, Uses radio waves to connect wireless devices to the network

Printer and scanner hazards

Weight read instructions for two or three man lifting

Clothes that may shift it, from desks for example or shoes that don’t protect your feet if something drop on them

Jewelery that may drop into slots or scratch flatbeds

Heat from being turned on may remain for hours after being turned off

Packaging that should be removed


Serial attached SCSI (sas)

Point to point

Can take 65535 devices

No terminators

SATA (old)

Half duplex- Info goes one way at a time

Consumer market

1-2m cables

SCSI (new)

Full duplex- Info goes both ways at the same time

Better error handling

Critical server applications

10m cables

Laptops and portable devices


Blue tooth

Short range

Eliminates the need for cables between devices

Operates at 2.4 to 2.485 GHz

Low power, low cost and small size

Use adaptive frequency hopping AFH

Vers. 1.2 up to 1.2Mbps

Vers. 2.0 + EDR up to 3 Mbps

vers. 3.0 + HS up to 24Mbps


Short range

Operates in the lowest light frequency, usu between 100GHz-1000THz (terahertz)

Has to be aligned with the device so the light signal isn’t blocked

Cellular WAN

Two ranges about 800 MHz and about 1900 MHz

Wi-Fi (Wireless Fidelity)

Connection distance 300 feet

Easy to access for network connectivity


Faster than dial-up slower than cable and DSL

Ideal for rural and remote internet users

Faster to download than upload

Weather can screw with the connection.

Laptop servicing

Replacing parts

CRU – Customer replaceable units, parts a customer can replace

FRU – Field replaceable unit, parts only a field technician


You may need a new laptop battery if

It shuts off immediately when AC is removed

Battery is leaking

Battery over heats

Battery wont hold a charge

Look for the largest capacity battery when buying

Docking stations

Lets you connect PCI cards, addtional hard drives optical drives and floppy drives

Usually made for each specific laptop so you have to buy the one made for your laptop

Storage devices

External USB hard drive

Firewire hard drive

BD/DVD/CD burner

Additional RAM

SODIMM usually used for laptops

Read manual to check what can be changed before beginning

Preventive maintainence

Clean regularly

Perform hard drive maintainance, disk clean ups and disk defragmenter

Update software

Tag Cloud