Categories
Microsoft Excel

Excel functions you need to know for CAT

The following table lists all the functions that you will learn in your three years of CAT.

Categories
Microsoft Word

Page numbering in Word

Word’s automatic page numbering feature can become quite complicated very quickly! The complexity results from the various options available combined with the possible existence of Sections in your document. Your saving grace is that Word neatly labels the Headers and Footers on each page giving you all the information you need. Page numbering is inserted […]

Categories
Microsoft Word

Lorem Ipsum – the Dummies Guide to Dummy Text

If you work in design or printing (or with designers or printers) you will often see some pretty weird-looking text in documents, advertisements, posters and other design work: “Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation […]

Categories
Microsoft Office

Extracting data from a completed Word Form

Microsoft Word can be used to create a digital form complete with a variety of controls. This form can be distributed, filled out by a respondent and returned to the sender. This article deals specifically with a Form created using the Legacy Form controls. The completed form can be opened and viewed, but how does […]

Categories
Theory

Pixelation

Pixelation as a concept is best demonstrated by two versions of the same image, one with a much lower resolution than the other. The image below is the original image, the image to the right is the pixelated image. Both images are exactly 500 x 500 pixels in size (remember a pixel is a block […]

Categories
Theory

Pharming

Pharming is defined as the fraudulent practice of directing Internet users to a bogus (fake) website that mimics (copies) the appearance of a legitimate (official) one, in order to obtain personal information such as passwords, account numbers, etc. Do not confuse pharming with phishing.

Categories
Theory

Phishing

Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising a message as an official, trustworthy electronic communication. Typically carried out by e-mail spoofing – as well as via SMS (“smishing”), instant messaging, and text messaging – a phishing message includes a hyperlink (or […]

Categories
Theory

Catfishing

Catfishing is defined as “luring (someone) into a relationship by means of a fictional online persona”. The goal of building this relationship could be any one of the following: To bully or harass or physically harm the victim (see: cyberbullying, grooming) To gain personal information about the victim to commit fraud with their information The […]

Categories
Theory

URL shortening

URL shortening is a technique on the World Wide Web in which a Uniform Resource Locator (URL) may be made substantially shorter and still direct to the required page. This is achieved by using a redirect which links to the web page that has a long URL. https://en.wikipedia.org/wiki/URL_shortening If you glance at the address bar of your browser right now, you will see that […]

Categories
Theory

Networks

This post is aimed at the Matric Learner preparing for theory assessment: it covers work from the entire CAT syllabus. Much of this theory was covered in Grades 10 & 11 and should serve as revision. Definition: a (computer) network is defined as two or more computer devices connected to each other. The physical network […]