354
INDEX
Index
A
.aac files 341
abnormal data 2068
ABS function 192, 194
absolute referencing 162–3, 175, 235,
240
access levels 107–8
accuracy of data/information 7, 16–25,
196
active traffic management (ATM) 79
actors 82
actuators 73, 74, 75–6, 80, 82
advanced audio coding (.aac) 341
adware 57, 114
age of information 8
aggregated information 106
air-conditioning systems 39, 78, 82, 83
algorithms 85–103
air-conditioning systems 39, 78
batch processing 2730
calibration of sensors 71, 72
central heating systems 38
checksum 23
control systems 75–6
encryption 10
online stores 36
traffic flow 245
alignment 201
alphanumeric data 258, 264–5, 266,
278–81, 293, 297, 309–10
ambient temperature 68, 69
American Standard Code for Information
Interchange (ASCII) 22, 190
amplify effect 334, 341
analogue-to-digital converters (ADCs)
67, 69–70, 71, 75, 78, 81
AND queries 212–13, 215, 278, 279, 281
Android 328
animal identification 141–2
animation effects 321, 325
anonymised information 105, 106
anti-virus software 60, 108, 110, 111,
115, 117, 118–19
artificial intelligence (AI) 53, 1456
aspect ratio 31719
asymmetric encryption 10, 11, 14, 15, 16
atomic data 304, 305, 308
attachment data 258
Audacity 332–44
audio editing 332–44
audio files 312, 341, 342–3, 344
authentication 11, 13, 16, 45, 107
AutoFilter 212–15
automated teller machines (ATMs) 31,
44, 107
automatic number plate recognition
(ANPR) 81
automatic operations 221–2
automatic recalculation 235–6, 237
automatic stock control 32–3
AutoNumber 258
AutoSum 165
availability 45
AVERAGE function 166, 171, 177, 223,
292
AVERAGEIF function 176
AVERAGEIFS function 176
averages 176, 1778
axes 22930
B
back-end databases 258
back-up software 59–60
backward chaining 142–3, 144–5, 146
banking
artificial intelligence 146
authentication 107
digital divide 132
electronic funds transfer 31–2
encryption 9, 12, 13
fraud 116
investment analysis 1378
mainframe computers 48, 49
scams 112
sequential access 314
bar charts 223, 224–5, 229
batch processing 25–31, 401, 48, 314
behavioural-based detection 58
benchmark tests 46
BIN2DEC function 191
BIN2HEX function 191
biometric data 45, 107
BIOS 56
Bitcoin 116, 117
bits 2, 22, 342
blocks 60
booking systems 132
Boolean data 258, 267
Boolean operators 278, 279–82
borders 203–4
bots/botnets 115
broadband access 123, 124–5, 126,
129–30, 131, 132
bugs 62
building information modelling (BIM)
246–7
burglar alarms 78, 82, 83
business-to-business (B2B) 34–5
businesses
confidential data 105–6
data from third parties 2, 5
encryption 13
industrial espionage 116–17
malware 11718, 119
management information systems
314–15
network policies 108
sabotage 117
bytecode 54
bytes 223
C
calculated controls 291–3
calibration 70–2
captions 323–4
car engine fault diagnosis 139–40
car-park barriers 801, 83
carbon dioxide sensors 68, 70
cascading style sheets (.css) 312
case, changing 189
CASE...ENDCASE 86, 90–2
cells 148
absolute and relative referencing
162–3, 175, 235, 240
automatic recalculation 237
charts 223–4
formatting 198–206
formulae and functions 161–96
inserting/deleting 156
merging 157
named 163–4
protecting 158–9, 235, 240
testing 188–9, 251–3
validation rules 196–8
census data 48
central heating systems 378, 77, 82, 83
central processing units (CPUs) 37, 40,
42, 45–6, 47
certificate authorities (CAs) 12, 13, 15
chaining 142–6
chaotic model 241
CHAR function 190
charts 8–9, 219–20, 22231, 236
check digit 19–20
checksum 23–4
ciphersuites 13
ciphertext 10
cities 123, 124, 126
client-server networks 12–13
climate change/research 51, 70, 141,
242–3
Cloud computing 44, 52, 58
COBOL (Common Business-Oriented
Language) 44, 52–3
CODE function 190
codecs 331, 344
colour
databases 297, 300
spreadsheets 202–3
video editing 320, 330
column headings 153, 155
355
Index
combo charts 228–9
comma separated values (.csv) 2, 149,
220, 272–3, 303, 311
command line interfaces (CLIs) 61, 63–4,
65–6
comments 204
Community Earth System Model (CESM) 51
compilers 52–3, 54, 55
completeness of information 9
compound keys 260
compression 59, 312, 327–8, 331, 343–4
computer-aided design (CAD) 53, 245–7
CONCATENATE function 186
concatenate strings 185–6
conceptual design 261, 264
conditional branching 86, 87–8
conditional formatting 204–6, 235, 239
conditional functions 171–2, 173–7, 206
confidential data 105–6
consistency checks 20
construction industry 245–7
consumer statistics 49
containers 331, 341, 344
contiguous data 60, 223
control systems 67, 73–84
control total 24–5
cooling 47
COUNT function 170, 292
COUNTA function 170
COUNTIF function 173–4, 206, 223
COUNTIFS function 173, 174–5
counting 169–70, 173–5
Cray XC40 43, 44, 501
credit card fraud 116
credits 324–5
crosstab queries 2879, 293
.css (cascading style sheets) files 312
.csv (comma separated values) files 2,
149, 220, 2723, 303, 311
currency 199, 258, 267
custom-written software 61, 62
customer orders 30
cyber-fraud 9, 12–13, 14–15, 105,
109–12, 116
D
Dark Web 117
data
definition of 1–2
direct and indirect 2–6
mainframe computers 45, 48–9, 51–2
operating systems 56
personal 5, 45, 104–13, 116, 118
types of database data 258, 30910
validation and verification 16–25
data compression 59, 312, 3278, 331
data dictionaries 30910
data entry
batch processing 25
databases 257, 266–7, 270, 296–301
double data entry 212
spreadsheets 196–8
validation and verification 16–25
data logging 2, 3, 4
data processing 2, 16, 25–41, 313
data protection 105
data sorting 216–17
database management systems (DBMSs)
261, 314
database of facts 135, 136, 138,
141, 142
databases 255–316
basics 255–62
completeness of information 9
compression 59
creating from existing files 271–3
creating the structure 265–71
data dictionaries 30910
data entry forms 296–301
designing the structure 263–5
file and data management 310–15
grouping data 294–5
importing and exporting data 303
interrogative 41
normalisation of data 304–9
querying 273–93
sorting data 293–4
spreadsheet models 237
switchboards 301–3
validation checks 1720
DATEDIF function 193
dates
databases 258, 267, 282–3,
290–1, 293
spreadsheets 191–5, 200, 213–15
DAY function 192
DC offset 332
de-identification 104
debugging 54
DEC2BIN function 190
DEC2HEX function 190
decay 340
decibels 337, 338, 340, 341
decimals 1678, 254, 258, 267
decryption keys 10
defragmentation 58–9
deleting
databases 257
delete utility 60
spreadsheets 156
design view 294
detail, level of 8–9
device drivers 55–6
diagnosis 140, 144–5
dialogue interfaces 64–5, 66
digital certificates 12, 14, 15–16, 110
digital divide 12034
digital skills 121, 128, 131, 133
direct access 31, 313, 314
direct data sources 2–4, 5, 6, 7
disability 123, 128–9, 134
disk formatting 58
DNS servers 109
double data entry 212
driving simulations 247, 249
drug research 50
duplicates 289
duty of confidence 105–6
DVD burning 328
dynamic parameter queries 284–5, 293
E
e-procurement 35
echo 340
economic factors 122–3, 128
education 123, 126–7, 130
electoral register 2, 4–5
electromagnetic field sensors 73
Electronic Data Interchange (EDI) 34, 35
electronic funds transfer (EFT) 31–2
email 14, 11011, 113, 115, 119, 121
encryption 9–16, 104, 108–9
checksum 23
confidential data 105
mainframe computers 44, 45, 52
operating systems 57
ransomware 115
supercomputers 45
entity relationship diagrams (ERDs)
260–2, 263–5, 268, 272
environmental monitoring 70
equalisation 338
error trapping 172, 173
errors 7
algorithms and flowcharts 95, 101
batch processing 40
databases 257, 266, 270
interpreters and compilers 54
mainframe computers 44, 46, 49
operating systems 57
parity checks 23
spreadsheets 196–8, 206, 208,
237–8, 239
transaction files 26
validation and verification 16–25
eSecurity see security
EXACT function 190
expert systems 135–46
explanation systems 136, 137
exponential growth 2401
exporting data
audio editing 335, 343
databases 303
graphs and charts 231
spreadsheets 220
video editing 325, 326–7
extraction of data 186–7, 188, 21116
extreme data 206, 208
F
fade-ins/fade-outs 333–4
fading effects 328–9, 331
false positives 58
fault tolerance 46, 52
fear of technology 122, 127, 133–4
fields
data dictionaries 309, 310
data entry forms 297
356
INDEX
key 259–60, 264–5, 266, 268, 305,
309–10, 313
lengths 264
names 263, 268
normalisation of data 304–5
presence checks 1718
querying 274–6, 286, 288–91, 293
types 267
File Allocation Table 60
fileless malware 115
files
audio 312, 341, 342–3, 344
copying 60
databases 2713, 310–15
handling 978
video 312, 325, 3267
filters 330
financial forecasting 238, 239–40
financial planning 138
find duplicates query 289
FIND function 187–8
firewalls 16, 106–7, 117, 118, 119
First Normal Form (1NF) 304–5, 308
flat-file databases 256, 257, 304
flight simulators 247–9
FLoating point Operations Per Second
(FLOPS) 46
flowcharts 85, 98–102, 103
font colour 202, 297
font size 202, 296, 297, 302, 320, 324
font style 202, 2967, 324
footers 152–3, 155, 156
foreign keys 259, 260, 261, 262, 265,
2689
Form Wizard 296–301
format checks 19, 21
formatting
charts 224–5, 227
disk formatting 58
spreadsheets 150, 198–206, 235
formulae 148, 161–96
automatic recalculation 235–6, 237
charts 223
data dictionaries 309
databases 292–3, 308
formatting 204
Goal Seek 235
testing 206, 208, 20910, 251–3
FORTRAN (Formula Translation) 52
forward chaining 143–5, 146
fractions 200
frame size 31719
frames per second (fps) 331
fraud 9, 1213, 14–15, 105, 109–12, 116
freeze panes 159, 160–1
functions 164–96
G
gaming 145
General Data Protection Regulation
(GDPR) 105
generic file formats 311–12
genetic analysis 50
geography 122
gesture-based interfaces 65, 66
.gif (graphics interchange format) files
59, 311
glasshouses 37, 70, 74–6, 84
global digital divide 125–6
Goal Seek 235, 240, 253–4
goals 1423, 144
government websites 133
graphical user interfaces (GUIs) 61, 63,
64, 65–6
graphics interchange format (.gif) 59,
311
graphics processing units (GPUs) 47
graphs 72, 222–31, 236, 237, 240, 315
greenhouses 37, 70, 746, 84
gridlines 153, 155
grouping data 294–5
guidance systems 39–40
H
hackers 9, 12, 1416, 1078, 114, 116–17
handshakes 12–13, 15
hard disks
encryption 10, 13–14
storage 2, 56, 57–8
hardware
device drivers 55–6
digital divide 120
mainframe computers 42–3, 44–9,
51–2, 233
management information systems
315
online processing 40
supercomputers 43–7, 49–52
hash function 23
hash total 23, 24, 25
headers 152–3, 154, 156
health 12930
heat maintenance 47
heuristic-based detection 58
HEX2BIN function 191
HEX2DEC function 191
hexadecimal values 23–4
hiding rows/columns 157
hierarchical database management
systems 314
high-pass filters 339
HLOOKUP function 179–80, 182, 189
hosts files 109
HOUR function 194
HTML (Hypertext Markup Language) 312
HTTPS (Hypertext Transfer Protocol
Secure) 12, 13, 14–15, 110
humidity sensors 68, 69, 71, 75
I
IBM z15 43
identity theft 9, 15, 105, 116, 117, 118
IF function 171–2, 173, 178, 206
IFERROR function 173
IFS function 172, 173, 178
IF...THEN 136, 137, 140, 141, 142–5
IF...THEN...ELSE 86, 87–90, 98, 102
IIF function 287
images
compression 59
databases 303
file types 31112
metadata 106
video editing 319, 320, 323
importing data
audio editing 332
databases 272, 289, 303
spreadsheets 149–50, 220, 237
INDEX function 182–3, 184–5, 189, 206
indexed sequential access 313–14
indices 161, 162
indirect data sources 2, 4–5, 6
industrial espionage 116–17
industrially developed nations 123,
125–6
industry statistics 48
inference engines 13642, 144, 145
information
compared with data 1–2
digital skills 121
quality of 79
retrieval systems 315
see also data
infrared sensors 68, 78
infrastructure 121–2, 124–5
INPUT 86–9, 915, 97, 100, 103
input masks 266, 270, 309
inserting cells 156
insurance planning 138–9
INT function 167, 290
integers 167, 258, 267, 290
intellectual property 117
internet 5
digital divide 12034
as expert system 135
hosts files 109
online shopping 35–7, 108, 125–6,
1323
see also websites
Internet of Things (IoT) 83, 115
internet protocol (IP) 11
internet service providers (ISPs) 110
interpreters 53–5
interviews 2, 3, 4, 5, 7
investment analysis 1378
invoices 34, 238, 273, 299–300
IP addresses 1067, 109
IPsec (internet protocol security) 16
ISERROR function 173
ISNONTEXT function 189
ISNUMBER function 188
ISTEXT function 188
J
job opportunities 1301
.jpg (JPEG) files 59, 311
Jusqueen supercomputer 50
Juwels supercomputer 50
357
Index
K
key fields 259–60, 264–5, 266, 268, 305,
309–10, 313
keyloggers 114
knowledge base 135, 136–7, 139, 1401
knowledge base editors 136, 137, 140
knowledge engineers 137, 139, 140
L
labels 148, 297, 299–300
laptops
digital divide 124, 129, 130, 131,
134
encryption 10, 13
voice control 65
lasso tool 292, 297, 298
LEFT function 1867
LEN function 187
length checks 18–19
levels of access 45, 1078
light sensors 37, 68, 69, 74, 76, 80
limit checks 20
line graphs 223, 2278, 229
linear progression 86
linkers/link editors 55
Linux 47, 114
LISP (List Processor) 53
list boxes 298–9
logging in 57, 108
logical design 261, 262, 264
logistic model 241
longevity 44
lookup checks 20
LOOKUP function 179
lookup functions 179–85
loops 86, 92–6
lossless compression 59, 312, 331, 344
lossy compression 59, 331, 341, 344
low-pass filters 339–40
LOWER function 189
M
.m4a files 341, 343
machine code 52, 53, 54
macros 221–2, 235, 240
mainframe computers 42–3, 44–9, 51–2,
233
malicious bots 115
malware 578, 109, 111, 113–19
management information systems (MISs)
314–15
margins 151–2, 156
massively parallel processing 47, 52
master files 2630, 40
MATCH function 182, 183–5, 189, 206
mathematical models 250
mathematical operators 1612
MAX function 166, 292
MAXIF function 173
MAXIFS function 1767
mean 176
mean time between failures (MTBF) 45
media files 258
MEDIAN function 1778
medical diagnosis 140
memory 57, 59
merging cells 157
Met Office 242
metadata 106, 309, 335
microprocessors 37, 38–40
control systems 73–8, 80, 83
monitoring 67, 69, 72
Microsoft Access 257311
Microsoft Excel 148–231, 251–4, 258,
271, 303, 311
Microsoft Word 311
MID function 187, 188
MIN function 166, 292
mineral prospecting 137
MINIFS function 173
MINUTE function 194
missiles 39–40
mobile devices 5, 10, 13, 109
see also smartphones
MODE function 1778
modelling 233–54
drug research 50
effectiveness 236–9
need for models 236
simulations 247–51
software characteristics 235–6
uses of models 239–47
what-if analysis 234–5, 237, 239,
251–4
moisture sensors 37, 70, 74, 75–6
monitoring 37, 6772
mono 334
MONTH function 192
Movie Maker 317–31
.mp3 (MPEG-3) files 312, 335, 341, 343
.mp4 (MPEG-4) files 312, 325, 331, 341
multi-factor authentication 45, 107
multi-programming 56
multitasking 567
N
names
databases 263, 268
spreadsheets 163–4
natural-disaster planning 249–50
natural language processing (NLP) 146
nested functions 170–1, 178, 182
nested IF statements 89
nested loops 94–5
nested queries 286, 293
network policies 108
news 133
noise reduction 336–7, 339
non-atomic data 304, 305, 308
non-contiguous data 223, 225
normal data 206–8
normalisation 289, 304–9
NOT queries 213, 278, 280, 281, 282
notes 204
nuclear science research 2501
null strings 22, 172
number bases 1901
numbers 148, 167–9, 199
numeric data 212–13, 258, 264, 266,
274–6, 278, 293
O
observation 2, 3
off-the-shelf software 61, 62, 239
older people 122, 123, 127–8, 134
OLE objects 258
online banking see banking
online booking systems 132
online processing 25, 317, 401
online shopping 35–7, 108, 125–6, 1323
open source file formats 311
operating systems (OSs) 47, 56–7
deleting 60
device drivers 55–6
formatting 58
mainframe computers 51
updates 108, 119
operators 161–2, 278
optical character recognition (OCR) 81
OR queries 212, 278, 279–80, 282
orientation 151, 201–2, 276
overdubbing 3401
overheating 47
oxygen sensors 68, 70
P
padlocks 15, 110, 119
page margins 1512, 156
page specifications 1501
pan and zoom effects 329–30
parallel processing 42, 47, 52
parity checks 22–3
passwords 45, 107, 112, 11718
fraud 116
operating systems 57
spreadsheets 159
strong 119
Payment Card Industry Data Security
Standard (PCI DSS) 12
payments 31–2
payroll 26–30, 314
.pdf (portable document format) files
150, 220, 231, 303, 312
penetration testing 107
percentages 200, 267
performance metrics 45–6
permissions 57
personal computers (PCs) 42, 43, 47, 48
digital divide 124, 129, 130, 131,
134
voice control 65
personal data 5, 45, 10413, 116, 118
pH sensors 68, 70, 71–2
pharming 10910, 113, 116
phishing 110–11, 113, 115, 116
phone scams 112
physical design 261, 262, 264–5
physical tokens 45
358
INDEX
physical variables 37, 38, 67, 70, 73, 102
Pi 162, 169
pie charts 223, 225–7
pilot training 247–9
PINs 45, 107, 112, 116
pitch changes 336
pivot charts 219–20
pivot tables 21719
pixels 318, 319, 331
plaintext 10, 14
plant identification 141–2
platters 59–60
.png (portable network graphics) files
59, 312
pollution 5, 68, 70, 82
poor people 123, 128, 131, 134
population growth 238, 2401
portable document format (.pdf) 150,
220, 231, 303, 312
power-line communication (PLC) 134
presence checks 1718
pressure sensors 68, 69, 78
primary axes 22930
primary keys 259, 268, 272, 289
creating the database structure 265,
266
data dictionaries 309, 310
entity relationship diagrams 260,
261, 262, 264
normalisation of data 304
referential integrity 268–9
PRINT 86–9, 916, 99–100, 103
private keys 13, 14, 15
problem-solving programs 135
procedures 967, 99100
program files 310–11
program flowcharts 85, 98–102, 103
programming
languages 52–3, 85–6
linkers 55
proprietary file formats 311
protecting cells 158–9, 235, 240
protocols 11–13
prototypes 233
proximity sensors 73
pseudocode 85–98
pseudonymised data 104, 105
public keys 10, 11, 12, 13, 14, 15
Python 44, 54
Q
quality of information 7–9
quantum mechanics 49, 50
questionnaires 2, 3, 4, 5, 7
queue management 243–5
R
radio buttons 300, 302
RAM (random access memory) 2, 55,
56–7
random access 314
range checks 18
ranges 163–4, 208
ransomware 9, 15, 115, 116
.rar (Roshal archive) files 312
RAS (reliability, availability and
serviceability) 42, 44–5
READ 86
real-time processing 25, 3740, 73
recruitment, online 131
reed switches 68, 69
referential integrity 20, 268–9, 308
relational databases 2567, 260, 271–3
relationships 258–9, 260, 263–4, 268–9,
273
relative referencing 1623, 175, 235,
240
relevance of information 8
reliability 44, 51
REPEAT...UNTIL 2730, 86, 92, 93–5, 98,
103
reports 273–7, 2901, 293–4, 302, 303,
315
resizing rows/columns 1567
resolution
sampling 342, 343, 344
video 327–8
reverb 3378
rich people 122–3, 128
rich text format (.rtf) 303, 311
RIGHT function 187, 188
rockets 39–40
ROM (read-only memory) 56
rootkit 114–15
ROUND function 167–8, 171, 177
ROUNDDOWN function 168–9
rounding 167–9, 254
ROUNDUP function 168, 251
route scheduling 1401
row headings 153, 155
.rtf (rich text format) files 303, 311
rules base 1367, 138, 142–4
rural areas 122, 123–5, 129, 1301,
134
S
sabotage 117
sample rate 341–2, 343, 344
sampling bias 6
sampling resolution 342, 343, 344
sandboxes 58
scams 109–13, 115
scareware 115, 116, 118
schools 126, 130, 134
SEARCH function 187
searching
databases 257, 273–93
date and time 213–15
numeric data 21213
strings 187–8
substrings 215
text filters 21112
SECOND function 194
Second Normal Form (2NF) 305–6, 308–9
secondary axes 229–30
sectors 60, 61
secure sockets layer (SSL) 11–13,
14–15, 16
security 104–19
Electronic Data Interchange 34
mainframe computers 44, 45, 52
operating systems 57
see also encryption; hackers; viruses
sensors 37, 38, 39
control systems 73–4, 77, 82
data logging 4
monitoring 6772
sequential access 26, 31, 313–14
serial files 312–13
serial processing 42
servers 12–13, 15, 109
serviceability 45
shells 136
shopping 32, 35–7, 83, 108, 125–6,
1323
signature-based detection 58
simulations 247–51
slides 320
smart cards 107
smart homes 82–3
smart motorways 79–80
smartphones
digital divide 120, 124, 128, 129,
130
encryption 10
older people 127
security 106, 107, 11112
smart homes 82–3
smishing 111–12, 113, 116
SMS messages 11112
snapshots 323
social interaction 132
social media 5, 105, 106, 108, 131
socioeconomic groups 122–3, 128
software
anti-malware 118
anti-phishing 111
anti-virus 60, 108, 110, 111, 115,
117, 11819
CAD 53, 245–7
custom-written 61, 62
digital divide 120
mainframe computers 44, 46
management information systems
315
modelling 233, 235–6
off-the-shelf 61, 62, 239
system 52–7
updates 108, 110, 119
utility 5761
video 331
see also databases; spreadsheets
solid state drives (SSDs) 2, 26, 56, 59
sorting data 216–17, 293–4
sound
audio editing 332–44
compression 59
environmental monitoring 70
sensors 68, 78
video editing 322, 326
359
Index
speech recognition 64–5, 66
speed
audio 336
processing 45–6
video 322
splicing 322–3, 333
split windows 159–60
spreadsheets 147–232
automatic operations 221–2
compression 59
creating the structure 15061
formatting 150, 198–206, 235
formulae and functions 161–96
graphs and charts 222–31
importing data 149–50
modelling 234–5, 236–9, 240,
251–4
testing 206–11
using 21120
validation rules 196–8, 207–11,
237–8
spyware 107, 114, 116, 11718
SSH (secure shell) 11
static parameter queries 284–5, 293
stock control 32–3
storage 2, 56
audio files 342
back-up software 59–60
hard disk 59–60
video 326–7, 331
strings 185–90
structured language 85
sub-forms 299–300
subroutines 967, 98
substrings 215
subtitles 323–4
SUBTOTAL function 179
SUM function 165–6, 292
SUMIF function 175
SUMIFS function 175–6
summary data 287, 293
Summit supercomputer 43, 52
supercomputers 43–7, 49–52
supermarkets 32, 35, 243–5
switchboards 301–3
symmetric encryption 10, 11, 15, 16
system software 52–7
T
tables 2567, 258–9, 270, 274
creating 265, 267–8, 272–3
data dictionaries 309, 310
entity relationship diagrams 260
exporting 303
names 268
normalisation of data 304–9
tablets 10, 823, 124, 128, 129
The Tech Partnership Basic Digital Skills
framework 121
temperature sensors 37, 68, 73
air-conditioning systems 39, 78
calibration 71, 72
central heating systems 38, 77
greenhouses 70, 74–5
water pollution 70
weather stations 69
templates 237
text-based slides 320
text (.txt) files 220, 303, 311
text filters 21112, 215
TEXT function 194–5, 200
Third Normal Form (3NF) 3067, 308–9,
310
throughput 46
times
databases 258, 267, 283
spreadsheets 191, 194–5, 200,
213–15
tipping buckets 69
touch sensors 73
tourism 130
tracks 60
traffic control 79–80, 245
traffic lights 80, 81–2, 83
transaction files 2630, 40
transactions 25–30, 35, 46, 48, 49
transport layer security (TLS) 11–13,
14–15, 16
trimming 321–2, 333
Trojan horses 43, 57, 113–14, 115
turbidity sensors 68, 70
.txt files 220, 303, 311
type checks 18
U
ultrasonic sensors 73, 81
Un-normalised Form (0NF/UNF) 304
Unified Model (UM) approach 242
Unix 114
updates 108
UPPER function 189
URLs 15, 109–11
user identification 45
user interfaces 63–6, 136, 137–42, 235,
239
user logins 57, 108
utility software 57–61
V
validation 16–21, 26, 136
databases 266–7, 269–70
spreadsheets 196–8, 20711,
237–8
variables 86, 238, 239
verification 16, 20–5, 196, 270
video 59, 106, 312, 317–31, 344–5
virtual machines 54
viruses 43, 113, 117, 118
anti-virus software 60, 108, 110,
111, 115, 117, 11819
disk formatting 58
see also malware
vishing 112, 113, 116
visual checking 21, 196, 270
VLOOKUP function 179, 1801, 182, 189,
191
voice control 64–5, 66
Voice over IP (VoIP) 12, 342
voiceovers 3401
VPNs (virtual private networks) 11, 12,
16
W
water pollution 68, 70, 82
.wav files 341, 342–3, 344
wearable devices 82
weather forecasting 44, 49–50, 69,
241–2
weather stations 6970
web crawlers 115
websites
encryption 12, 13, 14–15
file types 312
government 133
health-based 129–30
levels of access 108
malicious 119
online stores 35–7
see also internet
WEEKDAY function 191
what-if analysis 234–5, 237, 239, 251–4
WHILE...ENDWHILE 86, 92–3, 94–5, 100,
102, 103
wi-fi hotspots 120
wildcards 187, 280
WIMP interface 64
Windows Movie Maker 317–31
wireless sensor and actuator networks
(WSANs) 82
.wmv files 327, 331
worms 57, 114, 115
wrapping text 1578, 177
WRITE 86
X
XLOOKUP function 179, 181–2
Y
YEAR function 192, 193
younger people 123, 127
YouTube 328
Z
.zip files 312
zoom effects 32930