Sunday, May 24, 2026

How to Work With Operating Systems & Computer Architecture Troubleshooting: A Practical Masterclass

Computer Skills Masterclass: Basic to Advanced

Computer Skills Masterclass: Basic to Advanced From Desktop Navigation to OS Internals

Published: May 24, 2026 | Category: IT Training & System Administration | Reading Time: ~25 mins

Welcome to your complete computer literacy guide. This page is divided into two learning paths: Basic Modules for everyday Windows users and Advanced Modules for IT professionals and system administrators. Click any module below to expand its content. All sections include practical how-to steps, troubleshooting tables, and pro tips.

🟢 Basic Modules: Everyday Computer Skills

Module 1: Computer Basics & Navigating the Desktop BEGINNER

Power Operations

  • Cold Boot: Press the physical power button to start a powered-off PC.
  • Sleep: Start Menu → Power → Sleep (quick resume, low power).
  • Restart: Start Menu → Power → Restart (applies updates, clears RAM).
  • Safe Shutdown: Save all work → Close apps → Start Menu → Power → Shut down.

The Desktop & Window Controls

  • Taskbar: Bottom bar with Start button, open apps, and system tray (clock, Wi-Fi, volume).
  • Desktop Shortcuts: Icons that launch apps/files; double-click to open.
  • Window Buttons: Minimize (–), Maximize (□), Restore (❐), Close (✕) in top-right corner.
  • Snapping: Drag a window to left/right edge to auto-resize for side-by-side multitasking.

Mouse & Keyboard Mastery

ActionHow-ToUse Case
Right-clickClick right mouse buttonOpen context menu (Copy, Paste, Properties)
Double-clickTwo quick left clicksOpen files/folders/apps
Drag & DropHold left-click + move mouseMove files, reorder icons, resize windows
ScrollUse mouse wheel or trackpadNavigate long documents/webpages
Pro Tip: Press Windows Key + D to instantly show/hide the desktop. Perfect for quickly accessing a file without minimizing apps manually.
Module 2: Advanced File Management (File Explorer) BEGINNER

Opening & Navigating File Explorer

  • Click the folder icon on the taskbar OR press Windows Key + E.
  • Default folders: Desktop, Downloads, Documents, Pictures.

Creating, Moving & Copying Files

# Keyboard Shortcuts (Universal)
Ctrl + C  → Copy selected item(s)
Ctrl + X  → Cut (move) selected item(s)
Ctrl + V  → Paste into current folder
Ctrl + Z  → Undo last action (lifesaver!)
F2        → Rename selected file/folder
  • Copy vs Cut: Copy duplicates; Cut moves the original.
  • Right-click method: Select file → Right-click → Copy/Cut → Navigate to destination → Right-click → Paste.

Renaming, Deleting & Searching

  • Rename: Select file → Press F2 → Type new name → Enter.
  • Delete: Select → Press Delete → Confirm. Files go to Recycle Bin.
  • Permanent Delete: Right-click Recycle Bin → Empty Recycle Bin.
  • Search: Use File Explorer search bar → Sort results by "Date modified" or "Type".

USB Flash Drives

  1. Insert USB → Wait for notification.
  2. Open File Explorer → Find USB under "This PC".
  3. Copy files to/from USB using methods above.
  4. Before unplugging: Click system tray ↑ → Right-click USB icon → "Eject" → Wait for "Safe to Remove" message.
Warning: Never yank a USB drive while files are transferring. Always use "Safely Remove Hardware" to avoid data corruption.
Module 3: Managing Applications (Installing & Uninstalling) BEGINNER

Launching & Pinning Apps

  • Launch: Start Menu → Type app name → Click result OR double-click desktop shortcut.
  • Pin to Taskbar: Right-click app in Start Menu → "Pin to taskbar".
  • Pin to Start: Right-click app → "Pin to Start" for tile access.

Installing Software Safely

MethodStepsSafety Check
Web Download1. Visit official vendor site
2. Download .exe/.msi
3. Run installer → Follow wizard
✅ Check URL is HTTPS
✅ Verify publisher name in installer
Microsoft Store1. Open Microsoft Store app
2. Search app → Get/Install
✅ Apps are Microsoft-vetted
✅ Auto-updates enabled

Uninstalling Cleanly (The Right Way)

  1. Press Windows Key + I to open Settings.
  2. Go to AppsInstalled apps.
  3. Find the app → Click (three dots) → Uninstall.
  4. Follow the uninstaller prompts → Restart if requested.
Crucial Rule: Never delete an app's folder or desktop shortcut to "uninstall" it. This leaves registry entries and temporary files behind, causing bloat and conflicts. Always use the official uninstaller.
Module 4: Built-in Windows Productivity Tools BEGINNER

Quick-Access Tools

  • Notepad/WordPad: Search "Notepad" → Write notes → Save as .txt (plain) or .rtf (formatted).
  • Calculator: Search "Calculator" → Switch modes via menu (Standard, Scientific, Date calculation).
  • Sticky Notes: Search "Sticky Notes" → Create color-coded reminders that persist across reboots.

Screenshots with Snipping Tool

# Capture Any Screen Area
Windows Key + Shift + S → Screen dims → Drag to select area
→ Screenshot copies to clipboard automatically

# To Save or Share:
• Paste directly into email/chat with Ctrl+V
• OR click the notification that appears → Save as PNG/JPG

Task Manager Basics

  • Open with Ctrl + Shift + Esc.
  • View running apps under "Processes" tab.
  • Sort by CPU/Memory to find resource-heavy apps.
  • Select unresponsive app → Click "End task" (use as last resort).
Pro Tip: Press Windows Key + Shift + S to snip, then immediately paste (Ctrl+V) into Teams/Email. No need to save files first!
Module 5: Web Browsers & Cloud Basics BEGINNER

Browser Navigation Essentials

  • Address Bar: Type URLs or search terms directly.
  • Tabs: Ctrl+T (new), Ctrl+W (close), Ctrl+Shift+T (reopen closed tab).
  • Bookmarks: Click ★ icon → Name bookmark → Choose folder → Save.
  • Downloads: Press Ctrl+J to open downloads panel OR check C:\Users\[You]\Downloads.

Browsing Safety Checklist

CheckWhat to Look ForAction
Secure SitePadlock icon 🔒 left of URL + "https://"✅ Safe to enter passwords
Suspicious Pop-ups"Your PC is infected! Call now!" alerts❌ Close tab immediately; never call
Fake Download ButtonsGreen "Download" ads mimicking real buttons❌ Hover to see real URL; use official site only
Unknown ExtensionsBrowser asks to install "helper" tools❌ Decline unless you explicitly requested it
Warning: If a website demands you "enable notifications" to view content, click Block. These are often used for spam ads.
Module 6: Basic Troubleshooting for Everyday Issues BEGINNER

Quick Fixes for Common Problems

IssueStep-by-Step FixWhen to Escalate
Frozen App1. Press Ctrl+Shift+Esc
2. Find app in "Processes"
3. Click "End task"
If app crashes repeatedly after restart
No Sound1. Click speaker icon in system tray
2. Check volume slider & mute
3. Click device name → Select correct output (speakers/headphones)
If no audio devices appear in list
Wi-Fi Disconnects1. Click Wi-Fi icon → Toggle Off/On
2. Re-select network → Connect
3. Restart router if issue persists
If all devices lose connection simultaneously
Printer Not Responding1. Open Settings → Bluetooth & devices → Printers
2. Click printer → "Open queue"
3. Cancel stuck jobs → Restart printer
If printer shows "Error" status after reboot

The Golden Rule of Troubleshooting

Restart First: Over 80% of glitches (slow performance, app errors, network drops) resolve after a simple restart. Save your work, restart the PC, and test again before diving deeper.

When to Ask for Help

  • ✅ You've tried the steps above and the issue persists.
  • ✅ You see error messages with codes (e.g., "0x80070005").
  • ✅ Hardware makes unusual noises (clicking HDD, burning smell).
  • 📝 Before contacting support: Note the exact error text, when it started, and what you were doing. Screenshots help!

🔷 Advanced Modules: Operating Systems & Architecture

Module 1: Introduction to Computer Systems & OS ADVANCED

Core Concepts

The OS acts as a resource manager and abstraction layer between hardware and software. It coordinates CPU execution, RAM allocation, storage I/O, and peripheral communication. Kernel space runs privileged code (memory management, device drivers), while user space hosts applications with restricted access. Communication happens via system calls and hardware interrupts.

Day-to-Day Tasks

  • Verify system specifications (CPU cores, RAM, storage type) before installing software.
  • Monitor boot times and identify startup programs impacting performance.
  • Check driver versions for GPUs, network adapters, and peripherals.

Troubleshooting

SymptomRoot CauseFix
Slow boot / hanging at logoFailing storage, outdated BIOS, conflicting driversBoot in safe mode, update BIOS, disable fast startup temporarily
Blue/Kernel panicsCorrupt kernel module, faulty RAM, incompatible driverRun memory diagnostic, rollback recent driver updates, check dump logs
Peripherals not recognizedInterrupt conflict, missing chipset driverReinstall chipset drivers, check Device Manager for yellow exclamation marks

How-To: Identify Kernel vs User Processes

# Linux
top -p 1   # Shows PID 1 (usually systemd/init - kernel space manager)
ps aux | grep -E "kernel|kworker"

# Windows
PowerShell: Get-Process | Where-Object { $_.Handles -gt 1000 } | Format-Table Name, Id, Handles
Pro Tip: Never manually kill kernel threads (usually prefixed with k or [ ] in Linux). Doing so forces a reboot or corrupts system state.
Module 2: OS Types & User Interfaces ADVANCED

Core Concepts

OS architectures vary by workload: batch (non-interactive jobs), time-sharing (CPU slicing for multiple users), real-time (deterministic response), and distributed (networked resource pooling). Desktop OSes (Windows, macOS, Linux) emphasize GUI navigation, while mobile platforms (iOS, Android) optimize for touch, sandboxing, and battery conservation.

Day-to-Day Tasks

  • Customize workspace layouts, virtual desktops, and default applications.
  • Configure multi-monitor scaling and refresh rates.
  • Manage mobile OS updates, developer options, and app permissions.

Troubleshooting

SymptomRoot CauseFix
GUI freezing / laggy animationsGPU driver mismatch, compositor overloadUpdate graphics drivers, disable hardware acceleration in apps, restart display manager
Touch input unresponsiveCalibration drift, overlay app interferenceRestart touch driver service, boot without third-party overlays, recalibrate
Multiple OS won't bootCorrupted bootloader (GRUB/Windows Boot Manager)Use live USB to repair bootloader, ensure UEFI boot order matches disk partition style

How-To: Change Default Boot OS & Configure Dual-Boot

# Linux (GRUB)
sudo nano /etc/default/grub
# Edit: GRUB_DEFAULT=0  (0 = first entry, change as needed)
sudo update-grub

# Windows (bcdedit)
bcdedit /enum | find "identifier"
bcdedit /default {identifier}
Warning: Always backup your EFI/System partition before modifying bootloaders. Incorrect edits can render the system unbootable.
Module 3: Process Management & CPU Scheduling ADVANCED

Core Concepts

A process is a program in execution with its own memory space, registers, and state. Threads are lightweight execution contexts sharing process memory. The OS uses context switching to rotate CPU time. Scheduling algorithms (FCFS, SJF, Round Robin) balance fairness, throughput, and latency. Deadlocks occur when four conditions coexist: mutual exclusion, hold & wait, no preemption, circular wait.

Day-to-Day Tasks

  • Monitor CPU usage per application and background services.
  • Adjust process priority for resource-intensive tasks (rendering, backups).
  • Identify and terminate unresponsive or runaway processes.

Troubleshooting

SymptomRoot CauseFix
100% CPU usage, system sluggishRunaway process, driver loop, malwareUse htop/Task Manager, sort by CPU, isolate PID, check event logs
App freezes / Not RespondingDeadlock, I/O block, thread starvationForce close, check for pending disk/network I/O, update app
High context switch rateToo many lightweight threads, misconfigured serviceLimit concurrent threads, adjust scheduler policy, update software

How-To: Manage Process Priority & Kill Safely

# Linux: Nice/Renice & Kill
nice -n 10 ./heavy_script.sh   # Lower priority
renice -5 -p 1234              # Raise priority
kill -15 1234                  # Graceful termination (SIGTERM)
kill -9 1234                   # Force kill (SIGKILL - use cautiously)

# Windows: WMIC & Taskkill
wmic process where name="notepad.exe" set priority=128
taskkill /IM chrome.exe /T /F
Module 4: Memory Management ADVANCED

Core Concepts

The OS maps logical addresses (used by programs) to physical RAM via page tables. Paging divides memory into fixed-size blocks, eliminating external fragmentation but risking internal waste. Virtual memory extends RAM using disk swap space via demand paging. When physical RAM fills, the OS pages out inactive data, causing thrashing if overused.

Day-to-Day Tasks

  • Monitor RAM consumption and cache usage.
  • Configure swap/page file sizes based on workload.
  • Clear temporary files and application caches regularly.

Troubleshooting

SymptomRoot CauseFix
Out of Memory (OOM) crashesMemory leak, insufficient RAM, unoptimized appIdentify leaking process via memory profiler, increase RAM, limit app pool
System thrashing / constant disk activityExcessive swapping, undersized RAM for workloadAdd physical RAM, reduce swap dependency, close background apps
Slow app switchingPage faults, fragmented page cacheReboot to clear cache, enable RAM optimization, check for SSD health

How-To: Check & Configure Virtual Memory

# Linux: View & Resize Swap
free -h
swapon --show
sudo fallocate -l 4G /swapfile
sudo chmod 600 /swapfile
sudo mkswap /swapfile
sudo swapon /swapfile

# Windows: Adjust Pagefile
sysdm.cpl → Advanced → Performance Settings → Advanced → Change
# Uncheck "Automatically manage", set custom size (1.5x RAM recommended)
Pro Tip: Keep swap on an NVMe/SSD. HDD-based swap severely degrades performance under memory pressure.
Module 5: File Systems & Storage Optimization ADVANCED

Core Concepts

File systems (NTFS, FAT32, ext4, APFS) manage metadata, directory trees, and disk allocation. Strategies include contiguous (fast but fragments), linked (flexible but slow random access), and indexed (inode-based, modern standard). Disk schedulers (SCAN, C-SCAN, LOOK) optimize physical read/write head movement to reduce seek time.

Day-to-Day Tasks

  • Organize directory structures and enforce naming conventions.
  • Monitor disk health, temperature, and remaining lifespan.
  • Run periodic integrity checks and optimize storage.

Troubleshooting

SymptomRoot CauseFix
Corrupted files / missing directoriesUnsafe ejection, power loss, bad sectorsRun fsck/chkdsk, recover via testdisk, restore from backup
Slow file transfer / random I/OHigh fragmentation, failing drive, wrong schedulerDefrag (HDD only), check SMART data, switch to deadline/none scheduler on SSD
"Disk full" but space appears freeHidden system files, orphaned inodes, trash cacheRun df -i, clear temp/trash, check for large logs in /var

How-To: Disk Health & File System Repair

# Linux: SMART & ext4 check
sudo smartctl -a /dev/sda
sudo fsck -f /dev/sda2  # Run from live USB if mounted

# Windows: CHKDSK & Optimize
chkdsk C: /f /r
Optimize-Volume -DriveLetter C -Defrag
Warning: Never run fsck or chkdsk on a mounted active partition. Boot from recovery media or use maintenance mode.
Module 6: Basic Command Line Interface (CLI) ADVANCED

Core Concepts

The CLI provides precise, scriptable control over the OS. Core commands handle navigation (cd, pwd), file management (cp, mv, rm, mkdir), permissions (chmod, chown), and monitoring (top, htop, kill). CLI outperforms GUI for automation, remote administration, and low-overhead troubleshooting.

Day-to-Day Tasks

  • Quickly navigate directories and batch-rename files.
  • Set precise file/folder permissions for shared projects.
  • Monitor system logs and terminate hung services via terminal.

Troubleshooting

SymptomRoot CauseFix
Permission deniedMissing execute bit, wrong ownership, SELinux/AppArmorchmod +x script.sh, sudo chown user:group file, check audit logs
Command not foundPath misconfigured, package not installedecho $PATH, install via package manager, verify binary location
Terminal hangs / unkillable processOrphaned child process, I/O wait, terminal emulator bugPress Ctrl+C, then Ctrl+Z + kill %1, restart terminal session

How-To: Permissions, Monitoring & Safe Cleanup

# Set recursive permissions (read/write for owner, read for group/others)
chmod -R 755 /var/www/html
chown -R www-data:www-data /var/www/html

# Monitor & terminate
htop  # Press F9 to send signal, F3 to search
tail -f /var/log/syslog  # Live log monitoring

# Safe bulk delete (preview first!)
find /tmp -type f -name "*.log" -mtime +30 -print
find /tmp -type f -name "*.log" -mtime +30 -delete
Pro Tip: Always use -print before -delete in find commands. Accidental recursive deletion is irreversible without backups.
Module 7: Security & Administration ADVANCED

Core Concepts

Security relies on the principle of least privilege. Threats include viruses (self-replicating), worms (network-spreading), and Trojans (disguised malware). Defense layers include OS patches, firewalls, endpoint detection, and strict user account policies. Regular audits and automated updates close known CVEs before exploitation.

Day-to-Day Tasks

  • Review and apply security patches weekly.
  • Configure firewall rules and disable unused services.
  • Manage user accounts, enforce strong passwords, and enable MFA.

Troubleshooting

SymptomRoot CauseFix
Unexpected network traffic / high bandwidthCompromised service, cryptominer, worm propagationIsolate machine, run netstat -tulnp, scan with ClamAV/Defender, reset credentials
Failed logins / account lockoutsBrute force attack, password policy conflict, time sync errorCheck auth logs, enable fail2ban, verify NTP sync, unlock via admin console
Update fails / broken dependenciesRepository mismatch, disk full, corrupted package cacheClean cache (apt clean / sfc /scannow), check disk space, switch to stable repo

How-To: Firewall Rules, User Management & Patching

# Linux: UFW Firewall & Updates
sudo ufw allow 22/tcp
sudo ufw enable
sudo ufw status verbose
sudo apt update && sudo apt upgrade -y

# Windows: PowerShell Firewall & Account Creation
New-NetFirewallRule -DisplayName "Allow SSH" -Direction Inbound -Protocol TCP -LocalPort 22 -Action Allow
New-LocalUser -Name "admin_backup" -Password (ConvertTo-SecureString "Str0ngP@ss!" -AsPlainText -Force) -Description "Emergency Admin" -AccountNeverExpires
Add-LocalGroupMember -Group "Administrators" -Member "admin_backup"
Critical: Never use default passwords. Disable remote root/SSH password auth on internet-facing servers. Use SSH keys and rotate credentials quarterly.

Conclusion

Whether you're mastering desktop basics or diving into OS internals, consistent practice is key. Use the Basic Modules to build confidence in daily computing tasks. Progress to the Advanced Modules to understand the "why" behind system behavior and gain professional administration skills. Bookmark this page, revisit troubleshooting tables when issues arise, and keep the CLI cheat sheets handy. Technology evolves—your ability to learn and adapt is your greatest tool.

💡 Pro Learning Strategy: Complete one Basic module per day for a week, then tackle one Advanced module weekly. Apply each concept immediately on your own machine (in a safe test environment for advanced tasks).

Monday, May 18, 2026

Unit 8 Detailed Notes GCE A/L ICT Database Management Systems (DBMS) Questions and Answers

🎓 GCE A/L ICT – Unit 8 Detailed Notes

Database Management Systems (DBMS)

Comprehensive exam-focused notes for Sri Lankan GCE Advanced Level ICT


📌 8.1–8.3 Introduction: Data, Information & File Systems

🔹 What is Data?

Data are raw facts and figures without meaning.

Examples: 95, Ahmed, Colombo, 2026

🔹 What is Information?

Information is processed and organized data that has meaning.

Example: "Ahmed scored 95 marks in ICT in 2026."

📁 File Processing Systems (Pre-Database Era)

Characteristics:

  • Data stored in separate files per department
  • Difficult to share data across systems
  • High redundancy and maintenance complexity

❌ Problems of File Processing Systems

ProblemDescriptionExample
Data Redundancy Same data stored multiple times Student name in exam file AND library file
Data Inconsistency Different versions of same data Old address in one file, new in another
Data Isolation Data scattered across files Hard to get complete student profile
Security Problems Difficult access control No centralized permission system
Backup Issues Recovery difficult after failure Multiple files = multiple backup points
Lack of Integrity No validation rules Invalid data can be entered freely

✅ Database Approach Advantages

  • Reduced Redundancy: Duplicate data minimized
  • Better Consistency: Single updated version of data
  • Data Sharing: Multiple users access same data
  • Improved Security: Controlled access privileges
  • Backup & Recovery: Centralized restoration
  • Data Integrity: Validation rules enforce correctness
  • Concurrent Access: Multiple users work simultaneously
💡 Exam Tip: "Compare file processing vs DBMS" is a frequent 10-mark question. Always structure answer as: Definition → Problems of file system → Advantages of DBMS → Conclusion.
⚙️ 8.4–8.6 DBMS Fundamentals: Functions, Components & Architecture

🔹 What is a DBMS?

A DBMS is software used to create, manage, manipulate, and maintain databases.

Common Examples: MySQL, Oracle, Microsoft Access, PostgreSQL, MongoDB, SQLite

⚙️ Functions of a DBMS

  1. Data Storage: Efficiently stores large volumes of data
  2. Data Retrieval: Fast search and fetch operations
  3. Data Manipulation: INSERT, UPDATE, DELETE operations
  4. Security Management: Authentication and authorization
  5. Backup & Recovery: Protects against system failures
  6. Transaction Processing: Ensures reliability of operations
  7. Concurrency Control: Manages simultaneous user access
  8. Data Integrity: Enforces accuracy and consistency rules

🧩 Components of DBMS Environment

ComponentDescriptionExamples
HardwarePhysical devicesServers, Hard disks, Network devices
SoftwareDBMS + Operating SystemMySQL, Windows, Linux
DataActual stored informationStudent records, Product lists
ProceduresRules and instructionsBackup schedules, Access policies
PeopleUsers interacting with systemDBA, Developers, End users

👥 Types of Database Users

  • Database Administrator (DBA): Security, backup, performance tuning, user management
  • Database Designers: Design logical and physical database structures
  • Application Programmers: Develop software that interacts with database
  • End Users: Cashiers, Students, Teachers who use the system daily

🏗️ Three-Level Database Architecture

LevelPurposeExample
External Level User-specific views of data Teacher sees marks; Cashier sees payments
Conceptual Level Logical structure of entire database ER diagram showing all entities & relationships
Internal Level Physical storage details File structures, indexing methods, disk allocation
🗂️ 8.7–8.10 Data Models, Relational Concepts & Keys

📊 Types of Data Models

ModelStructureProsConsExample
Hierarchical Tree (parent-child) Simple, Fast access Complex relationships difficult School → Classes → Students
Network Graph (many-to-many) Flexible relationships Complex design Students ↔ Subjects ↔ Teachers
Relational Tables (rows & columns) Simple, Easy querying, Flexible Complex joins may slow performance Student table with ID, Name, Grade
Object-Oriented Objects with methods Good for complex data Steep learning curve Multimedia systems, CAD

🔑 Relational Database Concepts

  • Relation: A table
  • Tuple: A row in a table
  • Attribute: A column in a table
  • Domain: Allowed values for an attribute (e.g., Gender = Male/Female)
  • Degree: Number of attributes in a relation
  • Cardinality: Number of tuples (rows) in a relation

🗝️ Types of Keys in Databases

Key TypeDescriptionCharacteristicsExample
Primary Key Uniquely identifies each record Unique, Cannot be NULL StudentID
Candidate Key Possible choices for primary key Unique, Minimal NIC or StudentID
Alternate Key Candidate key not selected as primary Unique but unused as PK Email (if StudentID is PK)
Composite Key Combination of multiple attributes Used when single attribute isn't unique StudentID + SubjectID
Foreign Key Attribute referencing another table's PK Creates relationships between tables StudentID in Marks table

🔒 Integrity Constraints

  • Entity Integrity: Primary key cannot be NULL
  • Referential Integrity: Foreign key values must exist in referenced table
    Example: Cannot enter invalid StudentID in Marks table
  • Domain Integrity: Values must belong to valid domain
    Example: Age cannot be negative; Grade must be A/B/C/D/F
🔷 8.11–8.16 ER Modeling: Entities, Attributes & Relationships

🔷 Components of ER Diagram

ComponentRepresentsSymbolExample
Entity Real-world object ▭ Rectangle Student, Teacher, Course
Attribute Property of entity ⭕ Oval StudentName, Age, Address
Relationship Association between entities ◇ Diamond Student enrolls in Course

📋 Types of Attributes

  • Simple: Cannot be divided (Age, Gender)
  • Composite: Can be divided (Address → City, Street, ZIP)
  • Single-Valued: One value only (NIC, StudentID)
  • Multi-Valued: Multiple values (Phone Numbers, Email addresses)
  • Derived: Calculated from others (Age from Date of Birth, Total from Unit Price × Quantity)

🔗 Types of Relationships

TypeNotationDescriptionExample
One-to-One (1:1) 1 ↔ 1 One entity instance relates to one other instance Person ↔ Passport
One-to-Many (1:M) 1 → ∞ One entity instance relates to many others Teacher → Students
Many-to-Many (M:N) ∞ ↔ ∞ Many instances relate to many others Students ↔ Subjects

📐 Degree of Relationships

  • Unary: Relationship within same entity
    Example: Employee supervises Employee
  • Binary: Relationship between two entities
    Example: Student enrolls in Course
  • Ternary: Relationship among three entities
    Example: Student takes Subject taught by Teacher

⚠️ Weak Entity

An entity that cannot exist independently and depends on another entity.

  • Has a partial key (discriminator)
  • Identified via relationship with strong entity
  • Example: Dependent linked to Employee; OrderItem linked to Order

🗂️ Mapping ER Diagram to Relations

Example: Student-Subject Enrollment

Student Table
StudentID (PK)NameAddress
S001AliColombo
Subject Table
SubjectID (PK)SubjectName
ICT01Information & Communication Technology
Enrollment Table (Relationship)
StudentID (FK)SubjectID (FK)EnrollDate
S001ICT012026-01-15
🎯 ER Diagram Exam Tips:
✓ Use correct symbols (rectangle/oval/diamond)
✓ Label relationships with verbs (enrolls, teaches, manages)
✓ Show cardinality clearly (1, M, N)
✓ Underline primary keys in attribute lists
✓ For M:N relationships, create a separate junction table
🔄 8.17–8.21 Normalization: 1NF, 2NF, 3NF

🎯 Purpose of Normalization

Normalization is the process of organizing data to:

  • ✓ Eliminate duplicate/redundant data
  • ✓ Reduce insertion, update, and deletion anomalies
  • ✓ Improve data integrity and consistency
  • ✓ Simplify database maintenance

⚠️ Types of Anomalies

AnomalyDescriptionExample
Insertion Cannot add data without other unrelated data Cannot add new subject without assigning a student
Update Need to update same data in multiple places Changing teacher name requires updating many records
Deletion Deleting data unintentionally removes other data Deleting last student also deletes subject info

✅ First Normal Form (1NF)

Requirements:

  • All attribute values must be atomic (indivisible)
  • No repeating groups or multi-valued attributes in a single cell

Before 1NF:

StudentIDSubjects
S01ICT, Maths, Science

After 1NF:

StudentIDSubject
S01ICT
S01Maths
S01Science

✅ Second Normal Form (2NF)

Requirements:

  • Must already be in 1NF
  • No partial dependency: Non-key attributes must depend on the entire primary key

Example: If PK is (StudentID + SubjectID), then Grade must depend on BOTH, not just StudentID.

✅ Third Normal Form (3NF)

Requirements:

  • Must already be in 2NF
  • No transitive dependency: Non-key attributes must not depend on other non-key attributes

Example: If StudentID → Department → DeptHead, then DeptHead depends transitively on StudentID. Move DeptHead to Department table.

🎯 Normalization Exam Strategy:
1. Identify the primary key first
2. Check for repeating groups → Apply 1NF
3. Check if non-key attributes depend on full PK → Apply 2NF
4. Check for non-key → non-key dependencies → Apply 3NF
5. Always show "Before" and "After" tables for full marks
💻 8.22–8.26 SQL Essentials: Commands, Clauses & Functions

📦 SQL Command Categories

CategoryFull NamePurposeKey Commands
DDL Data Definition Language Define/modify database structure CREATE, ALTER, DROP, TRUNCATE
DML Data Manipulation Language Insert/update/delete data INSERT, UPDATE, DELETE
DQL Data Query Language Retrieve data from database SELECT
DCL Data Control Language Control access permissions GRANT, REVOKE
TCL Transaction Control Language Manage transaction boundaries COMMIT, ROLLBACK, SAVEPOINT

💡 Essential SQL Examples

-- CREATE TABLE
CREATE TABLE Student (
  StudentID CHAR(5) PRIMARY KEY,
  Name VARCHAR(50) NOT NULL,
  Grade CHAR(1),
  EnrollmentDate DATE
);

-- INSERT DATA
INSERT INTO Student VALUES ('S001', 'Ali', 'A', '2026-01-15');

-- SELECT WITH CONDITIONS
SELECT Name, Grade 
FROM Student 
WHERE Grade IN ('A', 'B') 
ORDER BY Name;

-- AGGREGATE FUNCTIONS
SELECT Grade, COUNT(*) AS StudentCount, AVG(Marks) AS AvgMark
FROM Results
GROUP BY Grade
HAVING COUNT(*) > 5;

-- JOIN EXAMPLE
SELECT s.Name, m.Subject, m.Marks
FROM Student s
INNER JOIN Marks m ON s.StudentID = m.StudentID
WHERE m.Marks >= 75;
    

🔍 SQL Clauses & Operators

  • WHERE: Filters rows before grouping
  • ORDER BY: Sorts results (ASC/DESC)
  • GROUP BY: Groups rows for aggregate functions
  • HAVING: Filters groups after aggregation
  • Comparison Operators: =, >, <, >=, <=, <>
  • Logical Operators: AND, OR, NOT
  • Special Operators: BETWEEN, IN, LIKE, IS NULL

📊 Aggregate Functions

FunctionPurposeExample
COUNT()Count rowsCOUNT(*) , COUNT(StudentID)
SUM()Total of numeric valuesSUM(Marks)
AVG()Average valueAVG(Marks)
MAX()Highest valueMAX(Marks)
MIN()Lowest valueMIN(Marks)

🔗 SQL JOIN Types

  • INNER JOIN: Returns matching rows from both tables
  • LEFT JOIN: All rows from left table + matches from right
  • RIGHT JOIN: All rows from right table + matches from left
  • FULL JOIN: All rows from both tables (matches + non-matches)
⚠️ Common SQL Exam Mistakes:
✗ Forgetting WHERE clause in UPDATE/DELETE (affects ALL rows!)
✗ Using HAVING without GROUP BY
✗ Confusing WHERE (pre-aggregation) vs HAVING (post-aggregation)
✗ Missing JOIN condition (creates Cartesian product)
✓ Always test queries mentally with sample data before writing
🛡️ 8.27–8.32 Advanced DBMS: Views, Indexing, Transactions & Security

👁️ Views (Virtual Tables)

A view is a saved SQL query that appears as a table but doesn't store data physically.

Advantages:

  • ✓ Security: Restrict access to sensitive columns
  • ✓ Simplicity: Hide complex JOINs behind simple view name
  • ✓ Consistency: Centralize business logic
CREATE VIEW TopStudents AS
SELECT Name, Grade, Marks
FROM Student
WHERE Marks >= 75;
    

⚡ Indexing

Indexes improve search speed by creating a lookup structure on columns.

  • Advantages: Faster SELECT, WHERE, JOIN, ORDER BY operations
  • Disadvantages: Slower INSERT/UPDATE/DELETE; Extra storage space
  • Best for: Columns frequently used in WHERE clauses or as JOIN keys

🔄 Transactions & ACID Properties

A transaction is a logical unit of work that must be completed entirely or not at all.

PropertyMeaningExample
Atomicity All or nothing execution Bank transfer: debit AND credit must both succeed
Consistency Database moves from one valid state to another Account balance never goes negative if rule exists
Isolation Concurrent transactions don't interfere Two users booking same seat: only one succeeds
Durability Committed changes survive system failure After COMMIT, data remains even if power fails

🔐 Database Security Measures

  • Authentication: Verify user identity (username/password, biometrics)
  • Authorization: Control what authenticated users can do (GRANT/REVOKE)
  • Encryption: Convert data to unreadable form during storage/transit
  • Audit Trails: Log all database activities for monitoring
  • Backup Strategies: Regular copies for disaster recovery

⚙️ Concurrency Control

Manages simultaneous access to prevent conflicts:

  • Problems: Lost updates, Dirty reads, Unrepeatable reads, Phantom reads
  • Solutions: Locking (pessimistic), Timestamp ordering, Optimistic concurrency
🌐 8.33–8.39 Modern Topics + Exam Focus + Revision

💾 Backup Types

TypeWhat It CopiesRestore SpeedStorage Used
Full Backup Entire database Fastest restore Highest
Incremental Changes since last backup (any type) Slowest restore (needs chain) Lowest
Differential Changes since last FULL backup Moderate restore speed Moderate

🌍 Modern Database Trends

  • Distributed Databases: Data across multiple locations → Better reliability & local access
  • Data Warehousing: Central repository for analysis → Business intelligence, Decision support
  • Data Mining: Discover patterns in large data → Fraud detection, Recommendations
  • Big Data (5Vs): Volume, Velocity, Variety, Veracity, Value
  • NoSQL Databases: MongoDB, Cassandra → Flexible schema, horizontal scaling for unstructured data
  • Cloud Databases: Hosted on cloud platforms → Scalability, accessibility, reduced maintenance

🏫 Real-World Applications

  • 🏦 Banking: Account management, ATM transactions, Fraud detection
  • 🏥 Hospitals: Patient records, Appointment scheduling, Billing
  • 🏫 Schools: Student management, Attendance, Examination systems
  • 🛒 E-Commerce: Product catalogs, Order processing, Customer profiles

🎯 Examination Focus Areas

📝 Theory Questions (Frequent):

  • Advantages of DBMS over file processing
  • Types of keys with examples
  • Normalization steps (1NF→2NF→3NF) with table transformations
  • ER diagram components and relationship types
  • SQL command categories and use cases
  • ACID properties with real-world examples

💻 Practical/Diagram Questions (High Marks):

  • Draw ER diagram for given scenario (school, library, hospital)
  • Convert ER diagram to relational tables
  • Normalize a given unnormalized table to 3NF
  • Write SQL queries: SELECT with JOIN, GROUP BY, aggregate functions
  • Identify and correct DFD/ER diagram errors

⚡ Quick Revision Checklist

TopicKey Point to Remember
Primary KeyUnique + NOT NULL; identifies each row
Foreign KeyReferences PK in another table; creates relationship
1NFAtomic values only; no repeating groups
2NF1NF + no partial dependency on composite PK
3NF2NF + no transitive dependency (non-key → non-key)
SQL SELECTSELECT → FROM → WHERE → GROUP BY → HAVING → ORDER BY
ACIDAtomicity, Consistency, Isolation, Durability
ER SymbolsEntity=▭, Attribute=⭕, Relationship=◇

💡 Student Success Tips for Unit 8

  1. Practice drawing ER diagrams daily with different scenarios ✏️
  2. Memorize normalization rules with transformation examples 🔁
  3. Write at least 5 SQL queries daily (SELECT, JOIN, GROUP BY) 💻
  4. Learn key definitions word-for-word (examiners check terminology) 📌
  5. Use real-world examples in answers (school, bank, hospital) 🌍
  6. Practice past paper diagram questions under timed conditions ⏱️
  7. Understand WHY behind rules (not just memorization) 🧠
  8. Review ACID properties with transaction examples 🔄
  9. Compare concepts in tables for essay questions 📊
  10. Leave 5 minutes at exam end to check diagram labels & SQL syntax ✅

🎯 FINAL EXAM REMINDERS

For ER diagrams: Label EVERY element, show cardinality

For SQL: Write syntax exactly; missing semicolon can cost marks

For normalization: Show each step with "Before/After" tables

For essays: Definition → Explanation → Example → Conclusion

You've mastered the concepts. Now execute with confidence. All the best! ✨

Tuesday, May 12, 2026

GCE A/L ICT Unit 7 - System Analysis & Design Exam Questions and Answers

📘 GCE A/L ICT Unit 7

System Analysis & Design

Comprehensive exam-focused notes for Sri Lankan GCE Advanced Level ICT


📌 Introduction & Information Systems
Unit 7: System Analysis & Design is one of the most important units in GCE A/L ICT (Sri Lanka Local Syllabus). It is heavily tested in MCQ, structured, and essay questions.

🔹 What is an Information System?

An Information System is a collection of people, hardware, software, procedures, and data that work together to process data into meaningful information.

Key Idea:
Input → Processing → Output (Information)

🔹 Components of an Information System

ComponentDescriptionExample
PeopleUsers, operators, developersTeachers, students, IT staff
HardwarePhysical devicesComputers, servers, printers
SoftwarePrograms and applicationsOperating systems, DBMS, apps
ProceduresRules and instructionsUser manuals, backup policies
DataRaw facts and figuresStudent records, marks, attendance
🔄 SDLC – System Development Life Cycle
SDLC Definition: A structured process used to develop information systems efficiently through defined phases.

🔹 The 8 Phases of SDLC (In Order)

  1. Planning
    • Identify problem/need
    • Define project scope
    • Allocate resources
  2. Feasibility Study
    • Evaluate if project is practical
    • Check TELOS factors
    • Decide: Proceed or stop?
  3. System Analysis
    • Study current system
    • Gather user requirements
    • Create Requirement Specification Document
  4. System Design
    • Design database (ERD)
    • Create DFDs
    • Design UI/UX mockups
  5. Development
    • Write actual code
    • Build database
    • Integrate modules
  6. Testing
    • Find and fix bugs
    • Unit, integration, system testing
    • User acceptance testing (UAT)
  7. Implementation
    • Deploy system for real use
    • Train users
    • Migrate data from old system
  8. Maintenance
    • Fix post-launch issues
    • Apply updates and patches
    • Add new features as needed
🎯 Exam Tip: Memorize the 8 phases IN ORDER. A common 4-5 mark question asks you to list and briefly explain them. Use mnemonic: "Please Find Smart Developers Testing In Modern Labs"
📊 Feasibility Study (TELOS)

🔹 Purpose of Feasibility Study

❓ Key Question: "Is this system worth developing?"
Evaluates if the project is practical, affordable, and achievable before committing resources.

🔹 TELOS Feasibility Factors

FactorKey QuestionExample
Technical 🔧 Do we have the technology & skills? Need mobile app developers, cloud server access
Economic 💰 Do benefits exceed costs? Cost: Rs.500k | Benefit: Rs.1.2M over 4 years → ✅ Feasible
Legal ⚖️ Does it comply with laws? Data protection laws, software licensing requirements
Operational 👥 Will users accept and use it? Can teachers learn the new system without extensive training?
Schedule 📅 Can it be completed on time? Can we finish before the next academic year begins?

🔹 Economic Feasibility Formula

Project is feasible if:
Expected Total Benefits > Development Cost + Operational Costs

Example Calculation:

  • 💸 Development Cost: Rs. 500,000
  • 📈 Annual Benefit: Rs. 300,000 × 4 years = Rs. 1,200,000
  • Net Gain: Rs. 700,000 → Project is economically feasible!
🎯 Exam Trick: If asked "Explain feasibility study", use the TELOS structure + one calculation example for full marks. Always link each factor to a real-world scenario.
🔍 Fact-Finding Techniques

🔹 Purpose

Techniques used during System Analysis to gather accurate information about user requirements and current system problems.

🔹 Four Main Techniques

TechniqueAdvantagesDisadvantagesBest Used When
Interviews • Detailed information
• Clarification possible
• Builds rapport
• Time-consuming
• Expensive
• Interviewer bias possible
Small group of key users; complex requirements
Questionnaires • Fast data collection
• Reaches many users
• Cheap to distribute
• Low response quality
• Misunderstandings possible
• No immediate clarification
Large user base; simple, structured questions
Observation • Real environment analysis
• Accurate process understanding
• Unbiased data
• Time-consuming
• Users may behave differently
• Cannot observe thoughts
Understanding actual workflow; verifying reported processes
Document Study • Reliable historical data
• No user interruption
• Verifies other findings
• May be outdated
• Incomplete records
• Time to analyze
Understanding existing procedures; validating user claims
💡 Exam Trick: If question says "compare" or "discuss", ALWAYS give advantages + disadvantages for each method. Use a table format if allowed for clarity and full marks.
🔷 Data Flow Diagrams (DFD)

🔹 What is a DFD?

A Data Flow Diagram (DFD) is a graphical representation showing how data moves through a system – from input, through processes, to output and storage.

🔹 DFD Symbols (MEMORIZE FOR EXAMS)

SymbolNameMeaningExample
○ CircleProcessTransforms input to output"Calculate Marks", "Validate Login"
➜ ArrowData FlowMovement of data"Student Details", "Payment Info"
▭ RectangleExternal EntitySource/destination outside systemStudent, Admin, Bank, Supplier
▭▭ Open RectangleData StoreWhere data is storedStudent File, Database, Transaction Log

🔹 Levels of DFD

  • Context Diagram (Level 0): Entire system as ONE process + external entities only. NO data stores or internal processes.
  • Level 1 DFD: Breaks system into major sub-processes with data stores and flows.
  • Level 2+ DFD: Further decomposition of individual processes from Level 1.

🔹 Context Diagram – EXAM CRITICAL

✅ What it Shows:
  • The whole system as a single process (one circle)
  • All external entities interacting with it (rectangles)
  • Data flows between entities and system (labeled arrows)

🔹 How to Draw: 4 Simple Steps

  1. Identify the System
    Example: [ Library Management System ]
  2. Identify External Entities
    Example: [Student] [Librarian] [Supplier]
  3. Map Inputs & Outputs
    EntityInput to SystemOutput from System
    StudentBook request, Return bookConfirmation, Due date, Fine notice
    LibrarianAdd book, Update recordReport, Inventory list
  4. Draw Labeled Arrows
    [Student] → Borrow Request → [System] → Confirmation → [Student]

🔹 Critical Rules (MCQ Gold)

✔ MUST DO:
  • Only ONE process circle (the whole system)
  • NO internal processes or data stores
  • ALL external entities must be shown
  • EVERY arrow must have a clear descriptive label
  • Arrows show direction of data flow
❌ AVOID THESE MISTAKES:
  • Drawing multiple process circles ❌
  • Adding database/data store symbols ❌
  • Unlabeled or ambiguously labeled arrows ❌
  • Missing key entities mentioned in question ❌
  • Arrows with no direction or bidirectional without justification ❌
🎯 Exam Focus: Context Diagram questions appear almost every year (6-10 marks). Practice drawing for: Library System, School Admission, Hospital Appointment, Bank ATM.
📄 DFD Past Paper Questions + Answers

🔹 Question 1: Context Diagram

Q: Draw a Context Diagram for a Library Management System. (6 marks)

✅ Model Answer Structure:
  1. Center: [ Library Management System ] (single process circle)
  2. External Entities (rectangles around system):
    • Student
    • Librarian
    • Supplier (optional but good to include)
  3. Data Flows (labeled arrows):
    • Student → System: Borrow request, Return book, Fine payment
    • System → Student: Book details, Due date, Fine notice, Confirmation
    • Librarian → System: Add book, Update record, Generate report
    • System → Librarian: Overdue list, Inventory report, Member status
    • Supplier → System: New books list, Price update
    • System → Supplier: Order request, Payment confirmation
✨ Marking criteria: 1 mark for correct single process, 1 mark per entity (max 3), 1 mark per correctly labeled flow (max 3)

🔹 Question 2: Level 0 DFD

Q: Draw Level 0 DFD for a School Admission System. (8 marks)

✅ Model Answer Structure:

Processes (numbered circles):

  • 1.0 Receive Application
  • 2.0 Verify Documents
  • 3.0 Process Application
  • 4.0 Generate Admission Result

Data Stores (open rectangles):

  • D1: Application File
  • D2: Student Database
  • D3: Result Log

Key Data Flows:

  • Parent → 1.0: Completed application form
  • 1.0 → D1: Store application details
  • 2.0 → D2: Check student eligibility
  • 3.0 → 4.0: Approved application data
  • 4.0 → Parent: Admission letter / Rejection notice
✨ Marking criteria: Correct symbols (2), Proper numbering 1.0, 2.0... (2), Balanced flows (2), Labeled arrows (2)

🔹 Question 3: DFD Symbols

Q: Identify and explain the four symbols used in DFD. (4 marks)

✅ Model Answer:
SymbolNamePurpose
○ CircleProcessRepresents an action that transforms input data into output data
➜ ArrowData FlowShows the movement of data between processes, entities, and stores
▭ RectangleExternal EntityRepresents a person, organization, or system outside the boundary that interacts with the system
▭▭ Open RectangleData StoreRepresents a location where data is stored for later use (file, database, etc.)

🔹 Question 4: Context vs Level 0 DFD

Q: Differentiate between a Context Diagram and a Level 0 DFD. (4 marks)

✅ Model Answer:
Context DiagramLevel 0 DFD
Shows the whole system as ONE single processBreaks the system into multiple main sub-processes
NO internal processes shownInternal processes ARE shown and numbered (1.0, 2.0...)
NO data stores includedData stores ARE included (open rectangles)
Highest level, shows system boundaries onlyFirst level of decomposition, shows major data flows internally
🧪 System Testing & Conversion

🔹 Types of System Testing

Testing TypePurposePerformed ByWhen
Unit Testing Test individual modules/functions in isolation Programmers/Developers During development phase
Integration Testing Test combined modules working together Developers + Testers After unit testing, before system test
System Testing Test complete integrated system against requirements Independent testing team After integration, before user acceptance
Acceptance Testing (UAT) Verify system meets user needs and is ready for launch End users / Client Final stage before implementation

🔹 System Conversion Methods

MethodHow It WorksAdvantagesDisadvantagesBest For
Direct Changeover Old system stopped; new system starts immediately on a set date • Fast
• Low cost
• No dual maintenance
• High risk
• No fallback option
• Users unprepared
Small, low-risk systems with simple data
Parallel Running Old and new systems run simultaneously for a period • Safer
• Easy comparison
• Fallback available
• Expensive
• Double workload
• Staff confusion possible
Critical systems (banks, hospitals, exam systems)
Pilot Running Implemented in one department/branch first, then rolled out • Reduced risk
• Real-world testing
• Lessons for full rollout
• Slower full implementation
• Pilot group may feel burdened
Large organizations with multiple branches
Phased Implementation Modules/functions replaced gradually over time • Easier management
• Users adapt gradually
• Problems isolated
• Takes longer
• Temporary interfaces needed
• Complex coordination
Complex modular systems (ERP, school management)
🎯 Exam Answer Template:
"For a hospital patient record system, I would recommend Parallel Running because:
✓ Critical patient data must not be lost or corrupted
✓ Old system can run as backup during transition
✓ Medical staff can be trained gradually while still using familiar system
✓ Any errors in new system can be fixed without stopping patient care"
🔧 System Maintenance & Exam Focus

🔹 Types of System Maintenance

TypePurposeExample
Corrective Maintenance Fixing errors, bugs, or faults discovered after launch Fixing a calculation error in the grading module
Adaptive Maintenance Adapting system to changes in environment or requirements Updating system to comply with new data protection law
Perfective Maintenance Improving performance, usability, or adding new features Adding mobile app access to existing web-based system
Preventive Maintenance Preventing future problems through proactive measures Regular database optimization to prevent slowdowns

🔹 Exam Focus Areas (High Frequency Topics)

⭐ Topics That Appear Almost Every Year:
  • SDLC phases – List, explain, or put in order (4-8 marks)
  • Feasibility Study (TELOS) – Explain factors with examples (5-10 marks)
  • DFD Drawing – Context Diagram or Level 0 DFD (6-15 marks)
  • Fact-Finding Techniques – Compare advantages/disadvantages (5-10 marks)
  • Testing Types – Define and differentiate (4-8 marks)
  • Conversion Methods – Explain with suitable examples (5-10 marks)
  • Maintenance Types – Define with examples (3-6 marks)

🔹 Quick Revision Checklist

TopicKey Point to Remember
SDLC OrderPlanning → Feasibility → Analysis → Design → Development → Testing → Implementation → Maintenance
TELOSTechnical, Economic, Legal, Operational, Schedule – one question per factor
Context DiagramONE process, NO data stores, ALL entities shown, EVERY arrow labeled
DFD SymbolsCircle=Process, Arrow=Flow, Rectangle=Entity, Open Rect=Store
Testing SequenceUnit → Integration → System → Acceptance (in that order)
Conversion RiskDirect = Highest risk, Parallel = Safest but costliest
MaintenanceCorrective=Fix bugs, Adaptive=Change for environment, Perfective=Improve
🧠 FINAL EXAM DAY REMINDERS

👉 For DFD Questions:
✓ Draw neatly with pencil & ruler
Label EVERY arrow with descriptive data name
✓ Use correct symbols ONLY (no databases in Context Diagram!)
✓ Show ALL external entities mentioned in question
✓ Keep Context Diagram as ONE process box only

👉 For Essay Questions:
✓ Start with clear definition
✓ Use structured paragraphs with topic sentences
✓ Include relevant local examples (school, bank, hospital)
✓ End with brief conclusion linking to real-world value

✨ You've prepared well. Trust your knowledge. All the best! ✨