Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
633 views
102 pages
Grade 12 IT Theory
Summary of Graded 12 IT Theory (SA)
Uploaded by
Dwayneloli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Grade 12 IT Theory For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
633 views
102 pages
Grade 12 IT Theory
Summary of Graded 12 IT Theory (SA)
Uploaded by
Dwayneloli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Grade 12 IT Theory For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save Grade 12 IT Theory For Later
You are on page 1
/ 102
Search
Fullscreen
technology: Hardware Desktop Laptop + Tablet + Smariphone GPU VRAM Storage > RAM > CPU RAM > VRAM -> GPU Compare New hardware concepts Transfer of data between * CPU * Graphics card + GPU Factors influencing + Bus performance * Cache memory » RAM + Storage — + NIC [Improve performance without adding hardware lardware recommendation for 2.2010 types of users + Power user + Types of printers Grade 10 hardware seep a TED meedare * Toy and electronic devices * Optical drives * Ports Laptop & Desktop vs Smartphone & Tablet Highlight the advantages of each in one colour and disadvantages in another: Laptop & Desktop ‘Smartphone & Tablet! (Computers), (Mobile devices) Easierusing a keyboard and | Touchscreens can be difficult ns es to use for input due to its size Output Larger screen ‘Smaller screen. Much morastorage'spac | Less storage space available More powerunoPusandtii | USS RAM and less powerti Se Orang more | CPU. Since they are les , | powerful they use less po eee ace te which gives tem a better battery life than laptops, “«BtinbIT Grade 1011 Theory|oesktoprcomputers;necd a | CAN use their builtin collar ablesto connect to a network | connection to connect to the internet. This is referred to as or a wireloss:adapton/ expansion card to connect to | ‘@bways connecied. They Wei can also connect wirelessly to ‘a holspot using Wi-Fi, connection the internet connection could be poor and Since they can have wo NICS ine monthly data CAP could eal, be reached, however the iters won't have any, Cellular dongles can also be | COMPU used for both to connect to the connection Uniess thay are interhet connected to Wi-Fi ora oe eee _______| network with internet. Desktops are wasiiupatadied Moduler and expanded eyradaiig> ‘Whe the built-in cellular Communication —_|SeaptOpS can connect to both ren using the Wiskianid’a abled network \Yasteecomponents, additional | storage and extra peripherals | Mobile devices have due to their modular design. _| limitations on upgrading and adding peripherals, due to the lack of space. However laptops are more ‘pandt expandable than smartphones | For example, itis possible to expandable and tablets since peripherals _| print to a wireless printer from a mobile device. USBrand:HOMbports. Itis not possible to improve Itis possible to add a the graphics processing dedicated graphics card toa _| capabilities desktop computer to improve it's graphics processing capabilities. Due to the size of the hard drive and RAM and the speed of the CPU, desktopfaptop | Bmmartpiones are designed fo) CPU, de ‘be mobiieand have a slower Computers areeaMIENOTMPA | Coy ess storage space and Software ‘morerpOWeTESORWAEIAN | Fey wich sth stare smartphones. that can be used on these redadeemmmerenrezis | eMeES= : manage the device.» Mobile devices are “always > \fon’. When the screen is off Computers WESENGIRGSEUE? | the device is still on, checking Always on ja@ndloatihieieperating system, | for notifications. To use the when they are switched on. | device the screen is unlocked by the user and no booting is * }required.| laptops Wave a shorter battery | ite,than tablets and smartphones. This is due to the hardware components such as the CPU, RAM and storage thal use more power. D c ot functo A dedicated graphics card will ase the power usage Le. lower battery life of laptops. Computers have a temperature sensor built-in lo manage the temperature of the CPU. Battery ity Sensors Multipurpose device: are able to use the same device and load different software for different purposes. Usage/Purpose Mobility (largest to smallestheaviest to lightest) and battery life from least to most Battery life of al a SSD for ye which uses less power 5 the battery life, To extond the battery life the can tum off notifications, ‘Bluetooth and sensors Mobile devices have many senisors built-in such as GPS, accelerometer and the gyroscope Convergence device*: a device that combines the functionality of multiple devices into one. For example, a mobile device can also be used as a camera, eBook reader and GPS navigator. Desktop > Laptop Tablet > Smartphone Bilaoes the videos "Laptop vs. Netbook vs. Tablet Which One Should | Buy" and "Choosing Between a Laptop and a Tablet” Laptop = More portable Built-in webcam for conferencing Builtn wireless NIC to connect to Desktop vs Laptop Desktop” - + Easier to upgrade “ = Supports modular design © Larger sereen Final 2016 Paper 2 * Final 2021 Pap? i Roagn: Can be used the power is down Built.in speakers, webcam, Bluetooth Greener solution due to builtin graphics card that uses less power and laptop can be used without being plugged into a power socketSmartphones can be used to make payments by': + Using an app to scan a QR code/Near Field Communication (NEC) Using an app such as Snap Scan/Zapper Online banking / mobile banking apps GPU (Geaphies Proc rom new notes &SO Grdt i unit) Def: A processor specifically designed to increase graphics processing and display GPUs are able to by process many more instructions per sec cause they have more cores than a CPU, making them mee ee * machine leaming + Video editing + gaming applications + High end animation + 3D graphics + Attiticial inteligence ct + CAD Photo bv Thomas Foster on CPU_ PU On Graphics card (Discrete/Dedicated) which could include a cooling fan and Found Motherboard RAM Integrated on motherboard (built-in) Integrated on the CPU Slot ZIF socket PCI Express _ A discrete / dedicated GPU generates images faster than an integrated GPU ‘The GPU takes the graphics processing Responsible for all data | away from the CPU, which allows the CPU Function | processing to spend its time on other processing tasks, instead of generating graphics for display This improves not only the quality of cisplay but improves the general performance of | the computer. Less cores than GPU but Goes [Soe s mow More cores than CPU but not as powerful powerful than a single GPU core * Final 2015 Paper 2The integrated GPU filed GPU are embedded alongside the CPU on the oe of Most personal computers, The i 3PUs thal simply make it possible for the computer to nd images in high resolution, They are often not powerful enough (or tt [DNxaiNNAY, spl rendering high-end animation software or HW vcr no vtno-wat Unit)_ GPU vs. CPU" GI VRAM (Video Random Access Memory) of RAM that sits on the graphics card used {0 store image Ta) ois as a buffer between the GPU and the video card Def: Itis a type the computer dls display lays. I Function: VRAM ensures the even and smooth execution of graphics display through-bettor loading time and image quality. Used in: = Video games + 3D graphic design programs nps:youtu.be! Xk BXWIU. * Video editing P&iaer the video "What is VRAM and Why is it Important_” RAM All data and instructions need to be loaded into RAM before the CPU.can work with them Upgradable and can be replaced Slower than VRAM VRAM vs Function | Stores image data Upgrade | Cannot upgrade Spoed | Faster than RAM Found in smaller Larger capacities than VRAM Capacity | capacities than RAM VRAM acts in the same way as RAM, but for your graphic, video, and display 1 6When looking at an advertisement in exams it will be ls GG graphics ¢ sted in gigabytes, card will have GGB of VRAM Sate ates the INGameCathe, 0 toacy Litho A.2GH7 1 cr ing les MAX AN noe HSM. HHH, AND RYN Heaherbenan GEORGE GTC 1660 11668 Goons orectxt Graphics Cant 16GI DDR 2006M117 1h rerormanen ming RAH 512GB NVME SSD to 2000/5 + spre tftra et ‘Solel state Drie SOW 1101 Hoh Pestormanes Power: EVETECH faze RGB carne cast Intra 8 C1 Hgh Dotination ae on aD fa OF Ota vol What's the Difference Between RAM and VRAM? (understand the The main difference between RAM and VRAM is what each is used for. When a computer has a hard time keeping processes in its memory, that's a RAM problem; When your computer doesn't have the space to handle intensive display data, that's a VRAM problem. following) ooh ee ; J Spin connector PCI-Express x16 ‘connector, Display PortsHlow / transfer of data between components on the mother + Storage > RAM-> GPU + RAM > VRAM > GPU rclors influencing computers perfor CPU: * Speed GHz ~ highor > faster processing + Number of Cores. - More cores > better performanc _ 6 Reason for more cores fo improve performance: More than one core will allow a task to be separated into different threads, that can be processed simultaneously by different cores © Quad Core means the CPU has 4 processor cores builtin + Number of threads -- more threads > better performance Graphies Card’: Factors of a graphies card that affect its graphics proce: ing ability * GPU clock speed (MHz) ~ the higher the clock speed, the more instructions the GPU can process Number of processing cores. ‘Amount and type of memory (VRAM) GPU Cache The speed of its communication with the motherboard The type of GPU -- the discrete/dedicated GPU will improve the overall performance of the computer and the display =o 1019 Paper 2 8* Laptops could have both discrete and integrated GPU for the following reasons* © The builtin graphics adapter is used when performing tasks that don’t require intense graphics processing to conserve battery power © When programs are executed that require more intense graphics Processing, the laptop switches over to use the graphics card Bus: * Speed and number of lanes influence performance Cache Memory, * More = faster + Definition: Cache memory is special high-speed memory that stores recently used data and instructions, Function: To prevent a slower medium from slowing down the performance ofa faster medium. Note: Cannot upgrade Cache because it is built into the CPU Memory / RAM: + More = faster + Measured in GB /TB ‘+ Cheapest way to improve computer's performance, + 32 bit operating system limits the amount of RAM that can be accessed to 4GB. To access more RAM you need a 64bit operating system, + Reason why more RAM would improve computers performance*: The more RAM in your computer, the more data the user can work with at once ¥ and this allows the user to run more programs at the same time v Storage + Lower access time = faster + Disk cache improves the computer's performance since the operating system Can look for data and files that have recently been read from the disk instead of the RAM waiting for the storage which is slower. ‘+ Access time: the average speed a storage device takes to read and write data + SSD (Solid state drive} o Why faster than HDD* + ASSDis electronic + no moving parts, * data can be accessed instantaneously * no increase latency due to read write heads having to find the correct sectors, * Final 2024 Paper 2© About of $8 * Electronic with no moving parts, therefore faster HAN) mechanical hard drive. Moving parts take: Fonger to local data on the disk + Move expensive than hurd drive (HDD), therelore foun I simallor capacities than hard drive + Often ised in cembination wah had drive, (oad the opti and software on thy SSD fo speed up the perforant software, Store data on the hard drive since it fas mene able. The SSD will be faster at boot up tne: and the ‘lol of space for data storage Used in desktops, laplops, NIC (Network interface card) + NIC Speed measured in Mbps (Megabits) or Gbps (Gigabits per + Higher number = faster. + Can be wired, connecting a device with a cable to a network or wireless, I connecting the laptop through WiFi to the Access Point. z + The speed of the NIC can affect performance when it comes to: Study 2 know about all © loading webpages or web applications © downloading applications or games from the intemet © downloading program updates from the intemet © copying large amounts of data over the network © watching multimedia over the network. like Components that ca + RAM » CPU + Graphics card » VOCards be upgraded* Improve performance without adding hardware* Run a disk defragmenter Disable specific features Run disk cleanup Check for unnecessary programs that are set to run at start up. Update Operating 5) * inal 2021 per 2 10Hardware recommendations SOHO (Small Office Home Office) + Hardware © Enty fovel computer © FTTH (fibre to the home) intemet connection ©» Multifunctional printer (A device that includes a printer, scanner, copier and fax machine all as one) + Software © Accounting software (Pastel, QuickBooks) Database software for clients, supplier and stock © Communication software (MS Outlook) © OCR (Optical character recognition) software: Software used to scan a document and convert them into editable text documents, Biles the video "How Does Optical Character Recognition (OCR) Work" Power users + Examples: © Professional gamers © Architects © Engineers Video editing Scientists + High-end computer specifications. © Powerful, Multi-core processors © Disorete GPU © High capacity RAM © High capacity SSD Storage with RAID © Specific hardware related to their job. oo Grade {1 reminders Offi wutomation Def*: Process whereby certain routine office processes are carried out without human intervention” Advantages of office automation: + Saves time by completing repetitive tasks faster * More accurate + Manages digital processes effectively * Final 2021 Paper 2 "1Grade 10 reminders, Printers Factors to take into consideration + Running co: * Speed: ppm (pages per minute) + Quality: dpi (dots per inch) dpi refers to the resolution of the printout, Now many dots per inch wil be printed. The more dots por inch the higher the resolution and quality of the printout Ink tank printer Laser printer Refillable ink tank system ink is sprayed onto the paper. Bottles of | Toner: toner powder is melted ink are bought to refil the empty | onto the paper cartridges, Image by yan Adeendren Ayyan fom Flickr | _ nage by Francs Ray frm Phabay speod | Slower ie. lower ppm Faster ie. higher ppm Running Cost Purchasing | ink tank printers are cheaper to | Laser printers are more Cost purchase expensive to purchase When you need high photo quality printouts, : If you do not use the printer often, When to | the ink in the reservoir, tubes and cartridges can dry up and a laser printer would be a better choice for you in this instance Quality | Higher quality printouts Lower quality printouts More expensive per page to print | Cheaper per page.to print When high quantity is more buy important than quality printouts Inkjot printers: Inkjet printers can make use of ink tanks or ink cartridges for their printing. Regardless of which type of ink the printer uses, it compares the same as ‘above to the laser printer. Inkjet printers that use ink tanks are more expensive to buy compared to those using ink cartridges, but it wil cost less per page to print. Ink Gartialges image by Francks Ray from Pheabiay Water the vid ‘pson Ecotank 4 year of printing on a single refill" 12,3D printers* 3D printers most commonly ink’ that melts when heated and tur ise thermoplastics as their solid when it cools down. The printer uses the design on the computor to print one layer the next layer until the thre completed 30 printers are ata time, wait for it to dry and then continue with -dimensional object has been ed in: Prototyping of new product designs and buildings in architecture. Medicine: Printing body parts and tissue tke a limb, page, by Grattoncom trom ear or muscle. In the design and testing of airplanes and spacecraft. Custom jewellery and fashion accessories. Advantages": No other complicated machinery needed for manufacturing Parts can be computer designed and directly printed Easy to change design and print again Parts that fail can easily be printed again No waiting period for ordered parts More cost effective for small numbers Disadvantages: The quality of the end product might be inferior, in terms of finishing and Precision, compared to using industrial machines to create the product. The choice of material which you would like to use is limited. Colours for your model might also be limited “BrainbIT Grade 10 IT Theory * Final 2011 Paper 2 13LED vs LED monitors (Grade 10 reminder) LED LeD (Light Emitting Diode) (Liquid crystal display) | Contrast Higher contrast ratio with Lower contrast ratio with a less ratio sharper images. clear picture. Response me Faster (lower) response time. _| Slower (higher) response time. Resolution | Higher quality display, Lower quality display. Purchase cost More expensive, Less expensive. Mercury is used in the lo manufacturing. Once the screen Gren No mercury used inthe screen’ | reaches the end of its life ending computing | 24 therefore a greener solution up on a landfill, the mercury would harm environment. More energy efficient Uses more power. Offers better diming options | LCD places more strain on your which is better for your eyes. | eyes. Ergonomic | Watch the video "LCD LED Plasma OLED TVs as Fast As Possible” Toy and electronic devices Both input and output devi There are many toys and electronic robotic devices that can receive input and produce output. ‘These devices can receive input from buttons and sliders. “They also have sensors that can sense sound and light and then produce output accordingly. These devices can be programmed Using software and apps on s = Drones: + Pico bo = VR gaming devie * Smart phone, fit ce toys, robotic Lego, STEM Toys gloves, game controllers band, smart watch 4Optical drives (CD / DVD / Blue ray) Optical drives are no longer included in New computers for the following reasons: * Being replaced by flash drives, extemal hard drives and online storage. Software used to be distributed on optical drives but itis no longer needed Since the software can now be downloaded from the internet. Backwards compatible + Refers to a hardware or software that can use the interface of an older version of the same product. Software examples’ + Ifa game was installed using Windows 7 ¥ it must stil work ifthe operating syStem was updated to Windows 10¥. + When a document was created in Microsoft Word 2007, Microsoft Word 2019 will be able to open the document, Hardware examples: + ADVD player are able to read a CD. + A Blue-ray player can read both DVDs and CDs + Supplementary 2017 Paper 2 15Port Types USB ports Mouse, keyboard, printers and flash Saal drives note Karan Gr Computer monitors, HDTVs and HOMI port blue-ray players are connected to Ff rn M astorly Stock Hon the HDMI port voi by Castry Su High-speed data transfer to | peripherals such as monitors external hard drives, video and networks, Ihunderbott 3 ‘ap GD port USB.C Is often interchangeable ‘att 9 sac with Thunderbolt 3, although all types of USB-C does not support Thunderbolt 3 devices. Thunderbolt 3 is faster than USB-C Vhbale VGA ports are used to connect Photo by Brett Sayles from Pexols If USB port fails, peripherals can be ack «WiFi = Bluetooth = LAN sed through 161.2 Social Implications: Mobile technologies ‘Term 1 Mobile technology impact on |"* “usiness | ay Impacton | | personal Protecting user privacy while communicating online | Intomet of things | Grade 10 reminder Green computing Mobile technology impacts on Business Advantages: Study 2 know about all + Able to keep clients and customers informed ‘Send advertisements to customers on specials through notifications of the app Allows longer hours to do business since customers are not restricted to business hours. Businesses can get mobile payment processing devices instead of having to spend money on expensive equipment such as credit card machines. ‘Sensors in mobile devices, such as GPS, make delivery and businesses such as Uber able to operate more accurately. + Apps collect data about customers which helps businesses to target marketing to customers Disadvantages: ‘+ Can only reach customers with smartphones. . * Costly to create a customised app. * Money needs to be spent on data security Mobile technology impact Personal Social Media: Websites and applications that allow people to interact with anyone, collaborate and share content, 0000 Examples of Social media (apps and websites): Instagram, Facebook, TikTok, Pinterest, LinkedIn 5 ; ; 4 LinkedIn’ is a social networking site used as a media platform by eS 8 @ 6 professionals with the same interest. Linked [i] ° Advantages of social medi * Allows feedback from the community and provides an interactive platform. Easy and convenient way to communicate with others Sharing of media such as photos and videos Marketing Entertainment : Connect with people with common interests + Final 2019 Paper 2 * Final 2014 Paper 2 WwDisadvantages of soc * Public access to information Users information wl pil vale an oui! be ued fore ccrimeséstalking/bullying + Social engineering techniques confidential information using the + Time wasting and a distraction at work * Children can access unsuitable content sto other information Health issues caused by extensive use of social 1 = Mental hoalth issues + Social i int-social behaviour + Inactivity/overweight = Physical problems e.g. eye strain, wrist aches, back aches Advantages of Mobile devices ‘All the same as advantages of social media as well as + Improved productivity many work tasks can be done i email, video conferencing, compiling documents. ng a mobile device Disadvantages of Mobile devices ; ‘Al ihe same as disadvantages of social media as well as Mobile devices are expensive + Information overioad Always avaliable ~ people have access to you 24 hours a day Protecting user privacy while communicating online* = Never give out personal details such as ID number or cell phone numbers fo people you meet online, s Make use of the block / defriend / unfollow features in application when someone makes you feel uncomfortable. + Disable cookies = Enable privacy settings on profile + Disable share location settings = Do not accept strangers as friends / followers. ‘+ Limited third party applications 5 to prevent information overload on mobile devices and Social networks: ‘= Turn nolifications off on mobile devices when doing important work and only keep notifications on for important apps related to your work. + Switch off your phone when doing important work ‘ove yourself from FOMO (Fear of missing out) phobia * Final 2021 Paper 2 * Vinal 2019 Paper 2 Wwtworking responsible use? Do not share personal information e.g. ID number or bank account number: Tum notifications off on mobile devices when doing important work ‘Switch off your phone when doing important work. Remove yourself from FOMO (Fear of missing oul) phobia Be aware that all posts are public + Refrain from insulting other people Be aware that the Internet never forgets information/cannot delete information from the Internet Be aware thal you can be fired from your job for writing inflammatory posts and any number of topics The admin of a social network group can be held responsible for the content shared on the group Lot (Internet of Things) Def: Many devices are connected to the Intemet Vand can be controlled and communicate with each other through the Internet without human to interaction. Made possible by Web 3.0 / Semantic web Ways devices can connect to internet: * WiFi + Bluetooth ‘Sensors Physical Connection Social implications of lo. There are many ways that loT will affect and benefit society, below are a few examples: Study 2 know about all. + Waste management: sensors in a fridge will record anything that is not used so that you can examine the trends and patterns. The less waste, the less Pollution, Sensors in bins can record the trends and pattems of what can be recycled. + Daily commute: Sensors will let you know the shortest route to your work or home; which routes would be the most economical on petrol and if public transport is a better option. Taxi services for business meetings can be planned according to your calendar and synced with your smartphone «Smart cities: These can include fast and convenient transportation systems, street lighting that switches on or off depending on the amount of natural light and energy-efficient buildings. For example, Barcelona has a citywide WiFi and information network linked to sensors, software and a data analytics platform. This provides the city with smart water technology, automated street lighting, remote-controlted irrigation for parks and fountains, “on-demand + Final 2017 Paper 2 * Final 2021 Paper 2 19waste pyekups, gia bus routes an smart parking motes Hs has rede traffic jams and pollution, as well as water, light and energy Usage + Agriculture, Sensors ean track microclimates across farm, to monitor Yemporature changes and huvdiy levels as perishable goods move from Hele to warehouse to store. This can extend their shelf fe and eliminate waste + Businesses. lo! is used to detect and troubl predict maintenance needs, track production line efficiency, monitor devices ete These directly impact a company’s revenue + Smart water sensors. These sensors monitor the water quality, lemperature, pressure, and Ui s data is used by the water company to analyse HOw tomer 1 and to help them be more effi ator leak dotectors are used to find tiny leaks that can lead to huge water was Baten the video + Whatis The Internet of Things +The Intemet of Things presents ~ #LikeABosch + The Internet of Things presents Heat smart LikeABosch + Microsoft's Concept of How 2019 Will Look Like - Official Video + Top loT Projects 2021 | Useful loT Devices | Smart loT Projects | loT Applications | Simplilearn lo ~ Capturing device In manual data capture process, the data is entered manually by a user using input devices like keyboard, touch screens, mouse, barcode scanners etc. for entering data using processing program like Microsoft Excel / Access. Manual data capture prone to GIGO and takes much longer to enter. Intemet of Things (loT) data capturing is the process of using sensors to track the conditions of physical devices. Devices connected over the oT can monitor, record and measure data in real time. The loT is capturing data from a network of connected devices such as security systems, smart TV, smart watch Example Security system: The video received from CCTV cameras can be processed by software on a connected computer to better identify unknown personnel, wam of emergencies such as fire, and recognize dangerous behaviours, 20Wear rable devices? Examples; Interactive gl Smart watch Advantages: You can interact withthe technology hands free interactively provides information on your environment since it has continuous aceess to the Intemet. Smart watch provides a more convenient way to receive notifications from Smart phone using haptic feedback, reducing the need to check your phone regularly ‘Smart watch can mor nitor certain physical characteristics such as heart rate and activity level as sisting in health monitoring. Technology used in wearable devices. Bluetooth, Gps Cellular connection (4G/5G) WiFi Holographic technology Haptic feedback — like vibrating Could be banned because {tis illegal to video or audio record people or aspects such as their Performance without their consent Distraction in workplace Illegal use in exams Security issues for example taking Pictures of sensitive data with smart lasses without anyone knowing 1.2014 Paper 2 aGreen computing (Grade 10 reminder) Marware (Stunty 3 know about all) Groen Dispo: Recycling the materiale Donating the computers to needy societies” Use: SSwiteh off when notin i Buy respo and yd ED screen us eon ses Hoss: power har a hard dive full scale operating syster a laptop wall eonsurne Jess powor than a desktop compuiter + Look for the Energy star sticker id © Make use of virtualisation instead of buying another computer to load ¢ different operating system on. Energy Star v Indicates that the computer is energy efficient without sacrificing performance. + Printing, © Refil ink cartridges © Donot print unnecessarily by proof reading on computer © Recycle paper and empty cartridges > Use recycled paper © Print back-to-back and reduce where appropriate + Power usage of laptops: © Use the settings of the device to us + Battery saver + Power & sleep * Airplane mode tu on "Mobile hotspot - turn off + Location — tum off + Bluetooth —tum off © Set device to go to sleep mode when not active for a certain petiod e less power like: Advantages of using electronic documents + Save paper Save ink Cheaper to send to many people ideo (Go Green) + Vina 202 2"A systom technota y: Software ‘Term 2 | Operating systems | | Sloud services * Cloud storage | * Cloud computing Virtual roatity ae | Augmented reality Virtualisation Types of Sherating systems from largest to smallest (left to right): Network (NOS) Stand-Alone Mobile Embedded | A specialised | network | _ | operating Tomanagete Used to manage | To run the | § | system needs | Nardwaremnd hardware and | software for | 2) be stalled, | SOftwarerora software of tablets | a specific 2 ‘omte server | COMPUTEr and to and smartphones | appliance @ | computer to | Provide a user and to provide an | or enable ito. _| interface for interface for their | electronic paren computer users. | users tool | functions. faaeeanen an Less expensive than Not 2 Network OS.Can | Not purchased —_| purchased. & | om Srpensive |e included in the separately separately. 3° Alone Price of a computer | Installed with Installed because it comes device sold with device pre-installed, a sold ‘Smaller than Larger than g Network OS but embedded but & | Largest larger than smaller than Stand | Smallest si jembedded {atone i Windows Windows 10 Home ‘Symbian, Eg. | Server, Linux, iOS, Android [Ubunti Sener |éton, Macos |S: Raspbian ‘The cloud Def: online services provided through the internet Watch the video (Computer Basics_ What Is the Cloud_)Cond /¢ Hine seevtees nm tv cane = | y af Maes a Onine resarations ‘Onfne shopping (gen os a ‘Online banking ee ‘Search engines Online / Cloud storage Def Online storage: Storing files on a storage medium connected to a server and acoessed over the intemel. Examples: Dropbox, iCloud, OneDrive, Google Drive. Advantages: + Access on multiple devices ‘+ Share with others which allows for collaboration * Small amount of space for free + Synchronisation of data files across all your devices, + Access to all your files where you have an intemet connection Disadvantages: + Need fast and reliable intemet + The free space provided is limited and you will have to pay for more storage, aFile / cloud syncing Dek Software monitors the changes made to your files and mirrors the Changes to the online storage and back to all the devices: which will now have the same updated version of the files, + Advantages © Allows the user to access the latest version of the files on different devices © Share with others to collaborate © Make a duplicate copy off site. File sharing: Givin 1g Someone access to the files / folders you have uploaded on Cloud storage Collaboration: + Simultaneous editing: All users can change and update the same document when using the online application of the software for editing. Example: Google Docs, iWork This is made possible through file sharing so that a group of people have access to the same folder on a service. 4... the videos "OnlineStorage and Syne using DropBox", “Sharing” AND "Collaboration Google Docs” Cloud / Online Backup* ‘+ There is a proper backup schedule Specified files aré backed up first Duplicate copies of changed files are made Files are encrypted Usually charges per month per user. Examples: Dropbox, OneDrive, Box, CrashPlan, Carbonite 112018 Paper 2 25* Disadvantages of cloud bac © Need intemet access to syne and access your files. f © Litmited free storage space and if you need more you need to pay fort {the company you are backing up with goes under of they have hardware issues, all your files will be lost Cloud computing Cloud computing of The use of resources offered as service over the Internet like cloud applications 2 of cloud computing (Study the bulles and understand what each ‘SO and Final 2020 + Scalability: increase / decrease example hosting a blog on a virtual traffic is high and once traffic reduce removed. + Ubiquity: As long as you have service available anywhere and an size and power quit arver allows incr to normal the extra r intemal conn ime. + Enables collaboration: All users can change and update the same document when using the ontine application of the software for editing that was share with them + No need for maintenance and upgrades of hardware: Reduce cost for hardware and support staff to keep the service running + No need for software installation and upgrades: Upgrades to software take place on the server and are managed by the service provider. Reduced cost and time to ensure all employees are using the same version. + Saves local storage space: Since the data and software is not the computer's storage device it saves space on local storage. stalled on Disadvantages of cloud computing ‘+ Only available as long as you have a good intemet connection. ‘+ Only available as long as the service provider exists. * Only available as long as you pay for the service. + Ifthe company no longer exists and did not inform you, you might los data + You rely on the company to have good security and backup policies + You rely on the company not to oversell their services which could result in lower quality service all your Examples of cloud computing: Workplace that includes Gmail, calendar, Google Drive, Google Docs, Forms ete. (formerly known as GSuite), Microsoft 365 26Types of cloud Online storai puting toring files ony a storage medium connec qroessed Over the intemet. Example: Dropbox, iCloud, OneDrive, Google Drive More about online storage later in the book) Media repositories + Dek itis storage nthe cloud ¥ to which you are given access once You purchase the media. ¥ Allows you to buy media from them and also provides cloud access to media bought. One does not need to download your purchases on all your devices. Example: iTunes, Amazon (Kindle), VOD (Netflix, Showmax) + Advantages: © No need for large storage capacity in devices © Files can be accessed anywhere where Internet is available © Easy to maintain / update content + Disadvantages © High bandwidth needed © Requires lots of data CAP for large files lke videos. Cloud application / RIA (Rich Internet Applications) Def: Web application that runs in a browser with functions and features of traditional desktop applications’ Advantages: + Physical location does not matter as long as you have internet access you will have access to data and processing power. + Don't need local powerful resources since the data and processing power will always be accessible no matter which device you are using. Save local storage space. Always have the latest version available. Can access through a browser on any device Automatic online backup of data Disadvantages* + Software is not owned and a regular fee needs to be paid. * Cost of data used when everything is transferred from the cloud can be high, + Need fast reliable intémet connection since the software cannot be accessed when the Internet is down. + Exposure to security issues when documents are stored in cloud Examples: Google Workplace such as Google Docs, Gmail Calendar, Forms, Microsoft 365, Work, Gmail, Facebook Business apps: Customer Relationship Management, Human Relations, Accounting software. + Final 2019 & 2018 Paper 2How dos Sit work’? Software where most of the processing is done by servers which is acct via the Internet + The intert is apps or the interf is being created on local computers using apps or the inte ed through a web browser. SaaS ~ Software as a Service Def / licence model’: You pay a regular subscription fee / and gain access to the services provided by S: Advantages* + minimal setup required * minimal initial cost * software is updated automatically on the new features are regularly added * Ubiquity ~ Software and data is accessible from different devices and locations with an Intemet connection * easy to collaborate or share information with other users Always have access to latest version of software + Scalable as you only need to pay for what you need * Raves storage space as the software does not need to be installed on the hard drive Accessible from different devices + No need for backups + Does not nece: available cloud computers Ssarily use local storage space with some online storage space Disadvantages: + fusing the online ve il need intemet access, * Online version of the software could have timited functionality compared to downloading and instaling the SaaS software ion in the browser one wil Examples: Adobe Creative Cloud, Microsoft 365 Data ownership: The subscriber does own any work created using the software even if this information is stored on a cloud series According to the Protection of Personal Information Provider is required to have Act (POPIA), a cloud service sienten agreement with the customer to clarify the agra, brovider's responsibilty with regards to the customer's data. Even if “areement lapses, the service provider must stil ken the data private ass BG warcn the video (Software @ Service Overview) 2 Final 2021, 2019 & 2016 Paper 2 * Final 2021 Paper 2VR (Virtual reality) Def: VR a computer-generated Simulated environment that can be experienced by the user using Specific input and output hardware and specialised software. The headset and controllers allow You to interact with the simulated environment using built in sensors, 'n this simulated environment, the user is able to have a realistic experience. Photo by XR Expo on Unsplash The hardware needed for virtual reality includes: * Personal Computer (PC)/Console/SmartphonelVR headset are used to Process and power the inputs and outputs. Input devices lets users navigale and interact within a VR environment e.g Joysticks, force Balls/Tracking balls, controller wands, data gloves, trackpads, On-device control buttons, motion trackers, bodysuits, treadmills and motion platforms Output devices present the VR environment to the users and includes visual, auditory or haptic feedback often through the VR headset ‘Software manages the input and output devices, analyses incoming data and generates appropriate responses, Input data and the system response that is sent to the output displays must be prompt in order not to destroy the feeling of immersion There are many advantages to using virtual reality mainly because it can be used as: * A training tool in many areas of life and can provide remote access e.g surgery can be performed in remote locations using robotic technology and virtual reality It provides learning experiences that one cannot get from reading books as itimmerses you in that world. This makes leaming fun and can eliminate the language barrier and certain dangers associated with scientific experiments. + Itoffers a new way of providing entertainment. itations + Itcannot simulate a real classroom where learning fluctuates. + Virtual reality can be addictive and detrimental to social connections as it is not real-life, only a simulated world. + Virtual reality devices can be expensive + VR software takes up a lot of storage space + Requires a lot of computing power compared to other software + The software for virtual reality is limited and in some cases inflexible as it cannot go out of that scope.Uses: Study 2 know about all + Military: used for training simulation so soldi situatior iors can train for combat in a virtual classroom + Education 7 with supporting di Scientific Visualisation: uses computer graphics to show abstict or complex ideas to show scientific concepts, Uke ‘molecular models + Healthcare: used by doctors and nurses in many fields e.g. surgery mulation, phobia treatment, robotic surgery and skills training + Entertainment: for example, gaming, interactive theme parks, vil museums, theatres and movi + Fashion: for example, avatars are used to help with clothing design, Virtual stores can be created. + Heritage: for example, visitor centres like the Terracotta Army are being created in a virtual world so that the site can be protected from tourism + Businoss: to train new employees and provide virtual tours of the busin environment. + Engineering: engineers can view their project virtually to understand how it works, to spot any flaws or potential risks before implementation. watch the video "VR 101: The Basics of Virtual Reality" AR (Augmented reality) Def: Augmented reality technology superimposes a 3D computer-generated image onto a user's view of the real world AR can be experienced through headsets and through displays on mobile devices. Itincorporates three basic features Eye ‘+a combination of real and virlual worlds, + real-time interaction, El ‘+ accurate 3D registration of virtual and real objects ae bas 2lagnwaAyes Biiwatcn the video Garden _ Aircards" gmented Reality Brochure for Alnwick Examples: + Ina shopping mall the app can have an assistant advertising some products and the app can give you 3D views of some of the items in the shops that are wrapped inside a box + Try outa pair of frames for new reading glass ‘would look like in your home. + Use a photo of a girl and do a virtual make-up session. + Pick out paint by trying out different colors on the room walls by combining a photo of the room with virtual colors provided by an app. + Pokémon Go + AR can be applied so that the surgical teatn can s lime while the procedure is in pragre or new furniture to see what it 2 imaging data in res 30ardware requirements: + Smartphone * Sensors such as? © Accelerometer © GPS © Gyroscope © Camera © Light sensor + Display screen * Camera * And sometimes a microphone, smart glasses and a connection to the internet depending on the application Software requirements for augmented reality include: AR software works together with devices such as tablets, phones, headsets, and more, These integrating devices contain hardware for input, processing and output and hence require: * appropriate software such as an app, that enables computer-generated objects to be projected into the real world Advantages of AR include + Enhances personal experiences * Able to preview the product visually like fiting clothes, a new desk in your room + Can be used by people who are physically or mentally disabled + [tis more interactive and engaging than regular media, which can make teaching easier Some of Augmented Reality's limitations include: * Ensuring that the digital data is within scale with the real environment can be difficutt. + In smartphones, AR must work with limited storage, low processing power and small amount of memory which limits what itis able to do. ‘+ The development and maintenance of AR software can be expensive + Could drain the battery life of the device * Supplementary 2021 Paper 2 31{ivally PC, simartphone and tablet applications for augmented reality focused 0 sames, bul the uses oF AR has extended far and wide. Listed below are a fo Ut oF AR technology Study 2 kiiow about all + Product view Allows customers to view and intoract wilh products OF a services before purchasing. Ina mall an app ean display advertisements (0 {he user TEA produet is wrapped in packaging the app can show thie Use AD view of the product “outside the wrapping} + Enhance content People can point their device at a teal li whatever kind of information is necessary, instead of needing to search for il elsewhere + Training -AR enables us can through documenta feam job responsibilito job duties 8 to th than the 1 employees: more thoroughly are allows for trainees to + Engage your audience . People are inundated with print and television advertisements to the point where they don't pay much attention to them. Inserting augmented reality into advertisements will catch the eye of your target demographic Difference between VR and AR*: While Virtual Reality immer world and blocks out the real word 7” Augmented Realy refers to overlaying computer-generated images on top of real- time images ¥ you into a virtual VR replaces reality, taking you somewhere else like a tour of a museum or in an Ff electronic game. Your physical location in VR does not change your experience. AI adds to reality, projecting information on top of what you're already seeing. * Supplementary 2021 Paper 2 32.Virtuatisa Def: Virtualisation rotors to creating an entity, referred to Only exists in software’ as a virtual machine, that Examples of virt tion software. * Virtual Box. + VMWare * Parallels + Microsoft Hyper.v How does it work? Software is used to create a virtual machine that runs on top of the current operating System. In this way one computer can run more than one operating system. A voinPletely different operating system and software can then be installed on the Wirtual machine. The specifications of the virtual machine ean also be set. Its offen Sed when developing software to ensure thatthe software will work on a devioe with lower specification or on a different operating system, Advantages: Study 3 know about all * Another machine does not ne developed Install any operating system on the virtual machine. Install any compatible application software on this virtual'machine. Specify the size of the hard drive, CPU and RAM the virtual machine has. * Users can hire a virtual computer from an online virtual machine provider. In this way they can choose the hardware configuration they need and have access to “their computer" from anywhere with an internet connection, Less expenditure: servers, storage and desktops, virtualisation can allow the same hardware to be used for multiple tasks which saves money. It can also reduce the number of software licences that are needed, Green IT: with fewer server and storage resources, the demand for power and cooling can be reduced and there will be fewer units to dispose of iy ed to be bought in order to test software being ‘Watch the video "What is a Virtual Machine (VM) In 3 minutes" * Final 2021 Pa 33use of virtual Cloud computing make: ion techniques + Virtualisation techniques* : © The sharing of resources of powerful computers between USES | © Combining resources of different computers to create a super powe lability of a Virtual server" © As traffic increases to a site the virtual server is supplied wilh extra resources like processors, bandwidth and memory © When traffic retums to normal, the extra resource ity... the videos “What Is VPS Explained JerryTel #JoinHandsGoDigital” AND "What is a VPS" are decreased » Final 2020 Pape Vinal 2016 Pape“Systems technology: ¢ Computer management ‘Teen 2 ——. h Operating system software updates | + avice pack Anti-virus software © Tips ; | Auto. + Examples Update disadvantages + Defragmenter Disk cleanup Backup Atchive Managing files and folders System settings | Utility software | | Safety when using a computer Good password policies FOSS (Free open source software) * Def: The source code of the software is available to view ¥ and is editable.” Examples of FOSS that can be installe + Ubuntu + Linux + Chrome os 1d on a laptop: Disadvantages of FOSS: + Lack of formal support * No one to hold accountable for errors + Possible bugs Operating system software updates ‘The function of operatin device, Function: + Resolve bugs in the software * Close security loopholes and weaknesses that hackers and malware might exploit, ‘Add new features and improvements to existing software. + Improve the performance of the software Make provision for using newer hardware (include new drivers) 1g system updates are the same regardless of the type of * Final 2024 Paper 2 36Patel. An update that can be downloaded to fic a bug in the software tons to fix bugs and new features since the (ee features for the an patches avs well as new addtional Service Pack Release of com of the oniginal software program atger than patch palates tO Patehos and service packs are thee same mn the sense that they are bot software Anti virus software + Tips for anti-virus and anti-spyware software 6 Use only one ant virus product Sot software t ily scan removable devices 1 Set software to scan your computer automatically 0 Roqularly update software / antivir + Need to update anti-virus software so that it will detect ne matware threats, + Secunity patches for your operating 8} weaknesses in the security of the operating s + Use auto-update option in the software » Buy a Sul . different forms of rahware Advantages: * Cheaper than buying each separately. = Easier to manage as they wor't interfere with each other. + Examples: Symantec, Kaspersky, Avast!, AVG, Windows Nefender tom is needed 10 1 Auto-update disadvantages for both anti-virus and operating system updates + Unexpected use of data + Slows system down + Unwanted restart afety when using a computer + Don't open e-mails or attachments from suspicious sources © Do not click on links in an e-mail that direct you to a site where you have to enter personal information. + Aways enter the website URL yourself in a browser when doing online baking or shopping and ensure it starts with https. + Scan external devices before you use them = Don't install pirated or untrustworthy software = Don't download from suspicious websites + Read and obey security warnings on website: and software 6SOU password poticieg* * Make passwor AVoid using words least 9 characters long. that can be found in a dictionary {Avoid using personal intonation about yourself or your family. {Change passwords on a regular barn * elude a combination of spacial charac ers, uppercas charac and lowercase FS and numbers, Avoid keyboard pratt Wateh the video (Passwordtips) Utility sofware Utility software: System software administration tas! that performs routine maintenance and ks in a computer, Defragmentation Fragmentation: Definition fragmentation*; The scattering of different atts of files to several Sectors on the disk v which slows down the disk’s data access speed When a file needs to be opened the hard drive head needs to find all the sectors that Contain parts of the file. You will Notice that your computer becomes slow and unresponsive if you have not done a disk defrag in a while. Fragmented hard drive: “tl * Final 2019 + Fin 2019 Paper 2.Dofaymentation ante Jo solve the problem of a hagmented hard drive you carl use the defragmenter ranges files: Definition defragmenter * (tity software (defragmenten that thal are fragmented / scattered on the hard drive dist ‘tie Defragnentation increases the time iL takes to 6 files on the hard drive. Itdoe NOT create more space. This would be done with the ullity software Disk Cleanup the space: Za Note: SSDs do not need to be defragmented because you would not notice the performance improvement as a result of defragmentation. There is no extra space created on the hard drive, it only reorgar available in a more effective way eal Bifwarcn the video "Disk Defragmentation & Drive Optimization as Fast As. Possible” and “defrag” * Final 2021 Day tbDisk Cleanup Db re a Definition: Disk Cleanup, ‘Tis is utity software, installed wit Your operating systom, designed to free up space delete’ ate the hard drive for fles and programs no longer in use and Actions perto Utility include: * Emptying the recycle bin “ome eae Removing temporary files stored Ru med by Disk Cleanup : 1 Yor canim sk ent ta 2.99 Te de from surfing the intemet and bie Smporary Windows les ° ACRE * Deleting files downloaded from the | A dewteaded Program Fes. Sates Iz} ates we 46968 Windows updates. Stem actied Woon Fp. 68 48 y Providing a list of programs that Tad arte Adc goon poner M8 You have not used in a long time Desten which could be uninstalled, {edo os cof aed peo indo Backup and Archive intemet including previous | edt ever trating reer varus Vows Gee corp dteaa campers ie von cupstes | tatece sci Pst Def Backup: A duplicate copy ¥of a file is created on another device for use when the original copy is damaged or lost”, Tips for making backups: * Only backup your data files and not your software, but keep a record of Necessary software product keys + Schedule the running of your backup software so that you don't forget. * Backup on an external storage device such as a portable hard drive. Keep backups off-site, * Remove duplicate copies of the same files on your computer to reduce the time it takes to do the backup. + Archive files that you seldom use to an external hard drive, * Check that your backups are working Def Archive*: Less frequently used or outdated files, can be compressed and stored on a secondary storage device where they can be retrieved when necessary. The files can be retrieved if needed again in the future * Final 2018 Paper 2 39a: Similarities between arctiving andl hacky Both store files on an external storage: doviee, Difference between archiving and backup? Backup stores a copy of the files: and archiving moves the files off the current system lo free up space. al Archive, | Which files? ace onthe primary | [0.Nave a COPY ofthe data should Purpose oe eee ae ee pipuigy, | te original data get lost or storage device of pl Sena Frequency fi Managing files and folders + Use operating system's search tools or File Explorei fil * To make it easier to find files: o Make use of a meaningful folder structure o Use meaningful names for files and folders. ‘arch funetion to find a0fystem settings ‘edional and language settings! {here are many settings and propesties that can be changed for a personal Windows Cambuter either through the Control Panel or Settings, These improve the user's &xPerience by customizing their experience. The language used for the Windows settings and File Seltings > Time & Langua window displays, apps, websites, keyboard, speech, Explorer can be change by going to: ge > Language Language a & 8 act nie Niplatiee | feakaana-— Reseanahe Cottatsoe Souci Spon FB Date stime a | Region Keyboard Spesch lngh Unt Ske} Unie Ste Sat Windows display language {ras ted Snes Wows etre ke Stings and Fl Explorer wil appear hs uoguage, Here you are also able to change the region properties that will allow you to display currency values in your country’s currency. + BrainbIT Grade 101 Pheory Mt1.5 Computer crimes: So engineering Piggybacking Computer criminals, Internet attacks Intellectual property Fake news Effects of cybercrime Protect yourself Why cybercrimes are prevalent Social engineering + Def Social engineering: An attempt to manipulate someone into in Definition Where do they gel information? Examples Definition How to prevent Gracker / Black hat hacker Hacker / White hat hi Vir ulhor Seript kiddies © Cyber gang = Cyberbully + Cyber terrorist + Spammer + Malware definition Phishing Backdoor Computer Worm Trojan pos Ransomware Botnet Definition Piracy * Product and activation key * Society © Business ng malware or giving out sensitive information such as personal information, + Where do they get the information? They use personal information available on s ial networks for identity theft, + For example; Computer criminals will copy a friend of yours’ profile and pretend to be them to get money from you without paying for it To prevent piggybacking on a network + Don't keep the default pa password. + Change the password on a regular bas + Don't leave your WiFi conn the video (Piggy Backing) to someone s intemet connection sword + rey ce it with a qood original clion open -- secure it with at password. ADComputer criminats 1 3 Cracker / Black hat hacker A hacker who does illegal things such as stealing or ma aking unauthorised changes to d White hat hacker: A ha harm though the legal is when tho ‘ker thal hacks out of curiosity without the intent to do act of hacking is stil illegal, The only way hacking can be 'y are hired by companies to identify security flaws. Watch the video : (Types of Hackers (Hats) Explained) Virus author: A person wh ibn ho writes code for a computer virus. Script Kiddies: term used for amateur programmers who use virus templates, which they modity, and release. They are not able to create the Script for a virus from soratch Cyber gang: A group of people who help each other to commit cybercrimes. Cyberbully: Someone who uses ICT to mock, embarrass or intimidate a Person. Done through many social platforms such as IM, SMS, e-mail, Facebook, YouTube etc, Cyber terrorist": A person who uses the Intemet or network to destroy or damage computers for political reasons ‘Spammer: sends out unsolicited e+ advertisements. malware. ‘mails which usually contain Spam is mostly just annoying but can be used to spread ‘Spam: Electronic junk mail/messages The POPIA (Protection of Personal Information Act), makes itillegal to send Unsolicited marketing messages. A company can approach you only to ask for Permission to send you marketing messages, but if you ignore or deciine this request, they may not send any more messages, Itis also illegal for companies te sell electronic databases of contact information without getting your permission to do so. Consumers can report a company that is disobeying POPIA and sending spam to the Information Regulator who can impose a fine or jail ime on the spammer. Avoid spam: + Use a spam fiter in your e-mail client program + Avoid entering your e-mail address into website forms. * Final 2015 Paper 2 43,tnd bombards: you with advert pop-ups. Adware: Software that downloat These are annoying but not harmful lic lent thal is dosignod to cause ‘omputer software with a malicious inl ’ fe nl putor network or lo facilitate any computer Hiloctive name for malicious software stich: viruses, ware, (Grade 11 reminder) Det Matware damage to a compute crime, Matware ia computer worms, Internet attacks 1. Phish Def. Usually an e-mail is received with a link for the receiver (0 click on, whieh is to a spoofed website that asks the user lo enter personal information. ‘This information is used fo commit identity thet, fraud or withdraw money from their bank accau watch the 2. Backdoor*: Def: It isa loophole that is programmed into software 7 that is: used to bypass the security ¥ controls in the network or program, eos "Phishing Scams in Plain English" AND “Phishing” Computer Worm: Def: a form of malware that replicates and distributes itself on a network or computer, without a person having to run the infected program, © Sends itself - No human trigger needed ‘© How to know your computer was infected by. ter worm: id drive space decreases even though no extra files have been loaded on the HOD «Performance of the computer decreases + Files are missing but not deleted by the user / new files on HDD that were not added by the user + Anti-virus software defects a wormn and requests a user ponse to delete the file 4. Trojan: Def: A program disguised as something useful which receiver clicks on and in this way install to do harm Watch the video (Malware Difference Between Gomputer Viruses, Worms and Trojans) + Supplementary 2021 Paper 2 * Final 2021 Paper 2 “* DDoS - Distributed Denial of Service: Using ka (6 overtoad serversiservice with a inaccessible je number of computers” igo number of requests “ making it [C's an attack that makes a website unavailable by using thousands of ‘Computers to request data from the. site at the ne time, The servers become overloaded and can't respond at which time the website hecomes Unavailable for everyone. Watch the video (DDoS Attacks as Fast As Possible) 6. Ransomware: Def: Malware that locks or encrypts data until a ransom amount is paid* Explanation: A type of malware that blocks or limits access to a computing device (e.g. computer) or files or encrypts data until the victim pays a ‘Specified amount of money. The attacker demands payment in a form of Cryptocurrency such as bitcoin since it cannot be traced, How infected: It can enter your computer through e-mail, infected files. through downloads or an infected webpage. ‘Watch the videos (Ransomware As Fast As Possible) Botnets: Criminals use malware to take control of multiple computers without the user/s knowiedge. They can control the computers remotely. The infected computer that is controlled by the malware is called a Zombie PC. ‘Watch the video (What is botnet and how does it spread) Right to access vs right to privacy, misuse of personal information ‘There is a line between the right to access to information and a person's right to. privacy. If you want to sign up for an online service, the company could require you to provide some personal information, but the company is legally prevented from sharing that information with other people or companies. ‘An example of this dilemma was; in the USA, the FBI failed to compel Apple to unlock an iPhone used by a terrorist. + Final 2019 Paper 2 45that store your personal abigaed to Cyber criminals can also gain access to the databs information and use it for illegal acts such as identity theft A company take security measures to protect your information from being stole la for themselves or sel i 10 ath Companies collect data about you to use the dal Intelte fo a person's own creation of the mind neone else's intellectual properly voltware to ensure val property. Det. The legal rig + Piracy det making illegal copi + Product and aetivation keys that software is not pirated 38 ie, ich the video "Online Piracy... It_s Different” onal information so that they ean engineering Identity theft: when someone steals your pe protend to be you, Often done through phishing or other sc techniques Theft of time Itan employee uses their employer's internet connection to perform personal t during work hours, this can be considered as theft of both resources and time. For example, accessing social media during working hours can be con: of time, ke news Def: False news stories truth, ihat are distributed online as the Why it spreads so fast: Social media has made it easy for fake news to spread like fire using text, images and videos The purpose of fake news ranges from changing your opinion, generating revenue or traffic on a website and discrediting or promoting politicians to name a few. intentions. Fake NewS | There are various types of Fake news which are categorised according to their intent. Here are three types: + Misinformation: F: and spread regardless ofits intent. * Disinformation: False information that is spread with the intent to deceive others for financial ga or to influence them to think in a certain way. * Propaganda: False information that is often us to promote or demote political views, votes and political figures, ise information that is created 46{ake news is illegal and you could be held hi ponsible for the information that you Pebe Posted If you are the admin of a social medi group and someone posts fake Hele In thal group and you do nothing about it, you can be held responsible for the How can, fake news be Wdentihed / how to protect yourself: Venty the article by cross referencing the content with those of © Reputable news sites © The citations and references given © Factcher ‘king Websites like the Google fact check tools msider the source, the heading, content and URL. Some fake news is Spread on websites that imitate well-known brands. L.ook at the URL of a site to confirm whom the site belongs to. Check the references of the author “oo Poor grammar and spelling usually is an indication that the news is false Check for biased content that provokes emotional reactions iti ‘Watch the video Fake news explained (explainity® explainer video) Def Hoax: An electronic mess. or defraud others. ‘A hoax would be a type of fake news and fall under misinformation age or article intended to deceive Effects of Cybercrime 1. Society * Decreased discretionary spending due to money needing to be spent on things that make us safer. Decreased productivity due to time spent on preventing crimes, * Development of culture of fear and suspicion. 2. Business*: (Name and explain) Loss of work time - while viruses and pop up messages are removed and software is reloaded Loss of business services - due to a DDOS attack, hardware thett or disruption of a network. Financial losses: due to money spent to protect themselves against cybercrime as well as potential down-time. Having to pay ransoms as a result of ransomware. + Loss of confidence and trust in the business ~ damage to reputation if knowledge of cybercrimes committed against them becomes public especially on social media + Loss of data: data required to run the business could be lost potentially causing the company to go out of business. 1016 Papor 2 arHow to prevent matw. e / Cyberer Use anti-virus and anti-spyware software Roguilaily update software / anti virus Using a firewall Following a good password policy, 7 Only use secure websites starting with hltps when making online purchase oF using online banking, He guarded when s| Don't open e-mails or attachments from suspicious source: Don't install pirated / untrustworthy software from suspicious websit Why are cybererimes prevalent? + Low risk of physical danger to erimina when crime is committed Difficult to detect a crime Difficult to trace who committed the crime: Increased use of Intemet with a large number of potential vietimes Increased number of online financial transactions A large number of potential victins 117020 Papier 2 82.1 Communication technolopi s: Networks = ‘Term 2 > Nah co) Rowton \ 7 | aan Intornot : — ‘Switch Server [7 | Wieoloss ‘Accoss Point sRREGRSRS e 192,168.08 Desktop computer ‘Smartphone Laptop computer Definition 4 Advantages Disadvantages Terminology Nos Nic Switch Communication media Internet connection options Compare types Router / Bridge NAS Definitions How does it work Legalities Advantages Disadvantages Software Definition Uses + Software Network BitTorrent Remote Access 49+ Definition VPN + Uses, + Advantages + How to login Difference Re and VPN note Ace Network (Grade 10 Reminder) Def Network: A colle cation media lion of computing devices connected by communication to allow users to shar 'e software, hardware, data and information, Advantages of a network . ing of hardware resources . nd efficient communics er of files ntralisation of data exible acces * Increased control and security. + Leisure Disadvantages of a network*: * Administrator required which adds cost to the company, * Sophisticated security required + Malware can spread very quickly in a network * Cost implications A central fault in the network such as the server crashing could cause data loss. (Grade 11 Reminder) cal layout of devices in a network, Types of topologies: | A star topology is a network layout where each computing device wil link to a network switch like we have in class. Def Star Topology*: The star topology requires each of the devices to be independently connected ¥ to the switch, ¥ Stor + Final 2021 Paper 2Advantage of a star topology? Fasy to troubleshoot problems Network is more efficient Wthere is, able break, only that device is disconnected from the network Easy to add and remove devices, Easy to set up Stable network Terminology Ethernet Def: a cabled networking standard that describes the connection of devices in a Local Area Network. UTP cables are often referred to as Ethernet cables, Def: The total amount of data that can be transferred from one Point fo another in a given period of time. Measured: Kilobits per second (Kbps) or Megabits per second (Mbps) High bandwidth, Bandwidth: Broadband: Range / Distance: Range refers to the measurement of how far data or a signal can be transmitted and received ¥ Backbone: Connects two parts of a LAI NN that are far apart, often using fibre optic cables NOS (Network Operating Systems) {5 Setialised network operating system needs to be installed onthe server computer to enable it to Perform its functions. This software allows the workstations to featmunicate, share files, acoess hardware like printers and it also provides security features that will determine what users can access on a network Examples of network operating systems: + Microsoft Windows Server 2019 © Unix Ubuntu * Pinal 2014 Paper 2 51Mardware ny H network Mic swork interface controller / card: + Function /Det- hardware that allows the network device to connect to the ‘network for communication to veeur + Hits a wired network the NIG has a port fo connect t ple (RUA port) + Hits a wireless network the NIC allows sending and receiving data USI radio * B02 11s ion indicates wireless NIC. that have a builtin NIG on the motherboard + On-board controller: Dev ‘ a NIC is plugged into the | PCI express: It on board controller f slot © Laptop: A laptop ha * One to conne ple to the network + Awirelesss NIC, to connect to WEI indicated by the 802.11 pacification Switch = Function / Def: Hardware device that is used to connect computers to a central location so that communication can occur. It directs traffic between devices connected to the network. media Attenuation*: The loss of signal strength over distance whieh leads to interruptions, Eavesdropping: When someone detects the signal on a cable without piercing it Crosstalk: The magnetic fields in two wires that are close together that interfere with the transmission and create crosstalk, EMI: Electromagnetic interference. An electronic signal that interferes with network data transmission, Example of s engines, machinery, lights, radar “Vinal 2024 Papa?Wired vs Wire + Wins less UTP_Used to connect computing devices to the switeh anid sends, tlecthical pulses along the copper cable. Associated with a star topology Fibro opt Jsed as backbone to connect different sections af a Wireman NOM AN uses ight pulses through thin stands of glass + Wireiess Del. Wireless ba station / Access Point: Hardware that contains aN antenna to send and receive radio waves to allow wireless devices fo connect and communicate on a network wirelessly. + Wi-Fi and WiMAX similarities + Make use of a wireless base station as hardware. *+ Both make use of radio waves to send data to its destination. Signal strength is influenced by physical objects like building and electromagnetic interference. WIMAX advantages compared to Wi-Fi* + Has a wider range to cover a wider area + Is more secure than Wi-Fi + Higher bandwidth for faster data transfer To address poor Wi-Fi signal: + Provide sufficient access points + Limit interference of structures by placing the access points strategically + Use a booster to increase signal strength © Cellular: LTE/4G 1 6G + Def LTEI4GI5G modem / dongle: A hardware device that converts data so that it can be transferred over a cellular network, 4G vs 5G: fifth generation mobile network connection has higher speeds than 4G. + Used: ‘+ When you are traveling for your work you would need a dongle to connect to the intemet. * Mostly used in mobile devices. + Can use dongle plugged into USB port to connect computer. + Can use Hotspot for a mobile device © Bluetooth: Used in PAN to connect two devices within short range. * Final 2021 Paper 2ssi available through used in an office 10 Hotspot A publ area where interet ace wmroless “infemet connectiony A hotspot can be connect to a companies network + Unonerypted files that are sent + Risk of malware: + Personal information ean be hacked Mobile hotspot Sharing a celfular internet connection devices via Wi FoF radio waves an be intercepted and exposed lo connect ompared to Wii + UTP is loss prone to Interference: + UTP is notas slow when shared betwe + UTP as not as influenced by objects tke walls + UTP has better secunty eon multiple user ie re WiFi Bluetooth “Long range communication Short range communication Lower data transfer speed d toa(l Higher data transfer Allows devices to conn networkintemet 1) | Transfers data between two deviceWired Fibre O ute (Unshielded Twisted Pair) Watch the video (Seacom) Often used in backbone of | Associated with star network. topology Light pulses through fine | Electrical pubes along glass tubes _____ | copper cables ‘Advantages - Disadv: More expensive ee Less expensive Technical expert needs to install_ Easy to install Highest data transfer Slower data transfer than (higher bandwidth) Fire (lower bandwidth) Lower attenuation, Susceptible to Transmit over km before | attenuation. Signal signal needs needs to be boosted ignal needs to be boosted, | Needs £0 bs Immune to EMI, Susceptible to EMI, eavesdropping and eavesdropping and crosstalk crosstalk Limited by the nuniber of available points to connect Limited by the number of cables available Radio waves are used inv © WiFi Cellular networks NEC RFID Bluetooth Wireless wi (Access Point / Wireless base station) a ash Associated with WLAN Uses radio waves. ited by Less expensive to install Lowest bandwidth Limited range fram 40m — 100m depending on the power of the access point and the ‘ype of antennae used. Susceptible to EMI and eavesdropping Easier to access and connect than cabled network with mobile devices and in cramped place: Limited by the range of the radio signals and the number of devices connected to the access point Bifwvaccn the video “Fibre (Fiber) vs Copper as Fast As Possible" 55Ronter /Aeidpe Def? Hardware device that makes communication between nebworks Pe directing the dala over the network and choosing the best route to the d a stwork) © Mean also conect a network tothe internet (antler typ ate 5 making intemot acces ible to all devices on the Nel © Routers are used to connect different ANS to form aa WAN »AWAN Connects more devices than a LAN ble by ystinalion NAS (Network Attached Storage) Advantages of using NAS to backup file on network” * Direct link to files without * Many users on the network have acces ible from anywhere on the network + Onee off cost * Complete control over who has access to the + Physical ownership of hardware and data * Good for long term, high capacity storage storage device Elven the video "What is a NAS as Fast As Possible” Internet connection option ; Wireless: Cellular connection or hotspot connecting through Wi-Fi or WiMax Cabled / Wired * FITH - Fibre to the Home ©. Fibre cables connected to Wi-Fi router at home and paying an ISP a monthly subscription fee. © Permanent connection © High bandwidth internet © Connection speed + Throttling: Throtting reduces bandwidth to all activities 7 when network is strained or once you have exceeded your monthly fair usage policy (FUP) limit a You will pay more to have an unthrottled line. You can think of itas having a stricter speed limit imposed on at highway Wilwaten the video “What is bandwidth throttling NordVPN" * Vinal 2019 Paper 2 * Vinal 2016 Paper 2 Final 2021 Paper 2All-in-one solution (router’ is modem, When Shaping* Shaping happens when an online activity gets 7 briontised over others ¥ when the network/intemet is busy only certain online activities are restricted during peak times ‘An ISP would usually do this to ensure that everyone on the Network stil has some connection by ensuring that more Recessary things like video chats and VoIP calls are prioritised when bandwidth is limited. You will pay more for an unshaped line. A shaped line will prioritise a video call held {or example over Microsoft Teams, over watching a movie on Netix This would be the equivalent to having different lanes for ifferent types of vehicles, each with their own speed limit, ADSL: (ald technolo © Copper tele} home. © Different bandwidth and CAP packages available © Download speed is faster than upload speed, BY Not likely to be asked) hone lines connected to router (could have Wi-Fi) at router, switch and base station/Access Point) Connecting to FTTH you could buy an all in one solution that will combine the features of a modem, router, switch a ind access point all in one. Permissions of files and folders The network administrator can set + Fin Permissions using the network operating system: Read: User can only read, copy and save as files and folders Write: User can write to and modify file folder. Execute: User can view, access file / folder content and run program fle (exe) List folder contents: Allows isting of fies and subfolders in folder. Modify: Allow reading, writing and deleting of files and folders, Full control: Allows reading, writing, changing and deleting of files and folders as well as add, change and remove access permissions of users. Usually the administrator will have these permissions. 2024 Paper 2 87right: + Administrator*: full contro! over the system (o- Install software and hardware drivers. © Greate and modify new anyone 6 Full access to all files: and folders, 6 Determines rights of other users + Standard user © Fog on to comput © Run prograny © Work with files in their fold © Access to common folders according to permissions, ‘© Change their awn passwords, 6 Cannot change passwords of others ‘© Gannot make system changes c re PAN/MAN, LAN, WAN in te: PAN HAN LAN WAN Arouter and personal Composition | jioce range ormected 1b it computer leet ee |e through router smartphones and printers Bluetooth / cable UTP cables - to connect and fibre optic | UTP and fibre Meda smartphone to |UTP.and WHF) cables for | optic cables computer backbone 10 to 20 devices spumber | Connects Capacity — | Twodevices | depending on | 292 MUMPET | more devi the router's than a LAN capability BitTorrent Def BitTorrent: is a Peer-to-peer protocol for the transfer and sharing of large files actoss a network/intemet How does it work? Fle is split into sections and shared via a number of peers ¥ instead of a server which makes it faster. The BitTorrent client (software) sends list of the contents of your shared folders to a BitTorrent server (torrent tracker These servers generate files with a torrent extension that contain a list of all the computers that are sharing this file atDet Torrent A torrent isa small fle easy to download. Itdoes not cont shared file, but rather alist of computers the BitTorrent client trom, The trackers also rate the files by counting seeder More seeders, the faster the download n the actual in download the file sand downloaders. The Det See PeopleMevices who are sharing the files 's it illegal? BitTorrent itself is merely peer-to-peer protocol ¥ that allows for the Sharing of large files and is not legal fo use however the user must guard against downloading illegal software or other media, ¥ Advantages: + Many users can download popular files faster. + Reduces cost to the host * Effective use of available download bandwidth. * Client software usually freeware Disadvantages: + Often used to make pirated material available which is illegal + Malware can be distributed + IP address is accessible to anyone/access to other confidential information on computer + Network traffic congestion when seeding/sharing Software’ © pTorrent + BitComet B8uaicn the videos “About Torrents” “How torrenting works" itTorrent Explained.-Mobile" AND Remote Access ‘Access to a computer linked to the intemet from a remote location to take over the target computer. + Def: The desktop of the remote computer appears as a separate application on his computer “which allows him to work with the computer as if seated in front of the computer itself” + Both computers need software installed © Remote Desktop included in Windows o TeamViewer (-) TeamViewer 59* Offer used by 11 support to make changes: on the computer for example © installing printers, © changing setting the computor Watch the video "TeamViewer 7 - Remote Control any Gomputor” VPN (Virtual vate Network) Def: Is @ network that allows users to log into a network fromm a remote location via {he intemet with the same privacy and security as a LAN using at username anid a password. Used: when traveling or at home and need to log onto a network to ga files or resource, a printer to print documents in the office. Advantage and purpose: + The user can log on over a publi benefits of privacy and s + The user has access to files from anywhere + The user has access to the same resource: network like the Internet with th curity of a LAN and documents on the busines omputerserver and software as in the office: How to logon to VPN The user needs to be connected to the Intemet. After that the user connects to the network's server ¥ with access being controlled with a usemame and password” Use of VPNs in South Africa South Africans use VPNs to access content that is not available here. ‘They log into a VPN in another country which gives them an IP address for that country. When they log into a site such as Netflix, the service will see the American IP address and grant access to the American Nettlix content. Using a VPN to watch yeo-blocked content is not illegal but you are breaking the streaming company's T&Cs. Difference between remote access and VPN Remote Desktop allows access and control of a specific computer including ts files, settings and hardware, whereas a VPN allows access to shared resources on the network you are logging into lke for example the files stored on the server and printer linked to the network. “0| 2.2 Communications t nologies: E-communication - Term - * Definition Encryption * Local encryption + Automatic encryption * Definition SSL + Uses | * Identify + How does it work Digital signature ] * Definition Digital certificate | * Uses * Issued by + Contains ] Firewall I Encryption © Def. Encryption: scrambling text / data into a new format using a specified set of rules. © Opposite: Decrypt 4... the video “What is data encryption" Def. Key: The key is a formula that is used to encrypt the data so that it cannot be read, the key is used to decrypt it again after transmission and make it readable again Local encryption: Encryption software is used to protect the files on your local storage from being accessed by unauthorised people. Automatic encryption: + Def DRM (Digital Rights Management)*: refers to any software which uses some form of encryption and manages access to the content of electronic media. | © Examples: + Digital books + Movies | = Computer games ATM Web browsers: When using https Skype calls Online Storago: E.g. DropBox ee es * Final 2017 Paper’2 65 a form of encryption to control access Why does electronic media use DRM?* Itis to the content ¥ ) (Secure sockets la iy | thal uses two an encryption proto e Public key encryptio Det SSI. AKA Public key encryption: an eneytn A separate koys, a public key to encrypt transmitted over the Intemel Used for online purchasing and online banking Can be identified in the URI starting with hllps How does it work* ntover the network to the person/computer wishing to communicate. Public key used to ENCRYPT dala that is sent back to institution (like a bank) Private key that matches the public key is used to DECRYPT the data, The private key does not move across the network. The two keys are mathematically link. Watch the videos "How SSL works tutorial - with HTTPS example” AND ‘Encryption as Fast As Possible" 1 signature* Def / Function: An electronic signature that is used verify the sender of an electronic: document, that the document actually comes from them and has not changed I certificate Def / function: A digital certificate is and electronic document used to verify the authenticity of a person or organisation. ¥ Where used: For security purposes when ace software over the Intemet, sing information or installing “Issued by CA (Certificate Authority) * Thawte = Verisign + Final 2024 Paper 2 * Supplementary 2021 Paper 2 * Final 2020 Paper 2 62Digital Certificate Conta * Serial number of digital the certife Digital signature of is Name of Certificate Authority, that issued the digital certificate Owners of public key Owner's name Expiration date of the public key Date of issue Varifias the idwatity ‘tthe boldar Prowstos publle key of aleve te ‘acta huge Certificate era ath A) en La Sisson Hie «Spe tober — mF Digital signature vf CA validates tha authenticity ae incagenty of the enrifeate Watch the video "SSL Certificate Explained" Firewall Def: Hardware and/or software that monitors and controls communication that takes. place between a computer / network and the internet to prevent unauthorised access. How it works to protect a network from being hacked*: A firewall is a network security device/software that monitors. incoming and outgoing network traffic“ and decides whether to allow or block specific traffic based on a defined set of security tules.¥ Bhives the video “What Is A Firewall_ Tutorial _ Network Security _ Simplilearn™ Firewall Explained _ Firewall * Final 2024 Paper 2 63
You might also like
Economic Geo Winter School 2025 FF
PDF
100% (2)
Economic Geo Winter School 2025 FF
62 pages
IT Theory Study Guide
PDF
No ratings yet
IT Theory Study Guide
242 pages
CAT Theory Notes 2023
PDF
No ratings yet
CAT Theory Notes 2023
47 pages
GR 12 IT Theory Notes
PDF
100% (3)
GR 12 IT Theory Notes
35 pages
Theory Concept Booklet Eng
PDF
No ratings yet
Theory Concept Booklet Eng
198 pages
Phys Science P1 - Topic Revision Qus (XL)
PDF
No ratings yet
Phys Science P1 - Topic Revision Qus (XL)
79 pages
2025 CAT Grade 12 ATP
PDF
100% (1)
2025 CAT Grade 12 ATP
7 pages
Teacher Guide Ssip 2024
PDF
No ratings yet
Teacher Guide Ssip 2024
68 pages
Grade 12 ENGLISH HL Revision Kit
PDF
No ratings yet
Grade 12 ENGLISH HL Revision Kit
41 pages
Examination Data Sheet For The Physical Sciences (Physics) Table 1 Physical Constants Name Symbol Value
PDF
No ratings yet
Examination Data Sheet For The Physical Sciences (Physics) Table 1 Physical Constants Name Symbol Value
2 pages
3.1 One Pager The Ear - Memo
PDF
100% (2)
3.1 One Pager The Ear - Memo
1 page
Doe PHSC p1 Memo Prep Exam 2008
PDF
No ratings yet
Doe PHSC p1 Memo Prep Exam 2008
12 pages
Accounting GR 12 Activities On Inventory Valuation and Internal Control
PDF
No ratings yet
Accounting GR 12 Activities On Inventory Valuation and Internal Control
36 pages
PP15. Receptors The Eye
PDF
100% (1)
PP15. Receptors The Eye
108 pages
FET MST Physical Sciences Physis Grades 10 12 - Compressed
PDF
No ratings yet
FET MST Physical Sciences Physis Grades 10 12 - Compressed
64 pages
Ade 12 Physics Exercise 6 Page 135 144
PDF
No ratings yet
Ade 12 Physics Exercise 6 Page 135 144
48 pages
Lesson 6 - Responding To The Environment - G12 - DR Ross
PDF
100% (1)
Lesson 6 - Responding To The Environment - G12 - DR Ross
58 pages
Wts 12 Maths p2 Class of 2019 Memo
PDF
No ratings yet
Wts 12 Maths p2 Class of 2019 Memo
118 pages
Chapter 9
PDF
No ratings yet
Chapter 9
40 pages
Consumer Studies-ENTREPRENEURSHIP Final
PDF
No ratings yet
Consumer Studies-ENTREPRENEURSHIP Final
77 pages
Limpopo Mathematics Grade 12 PreTrial 2022 P2 and Memo
PDF
No ratings yet
Limpopo Mathematics Grade 12 PreTrial 2022 P2 and Memo
41 pages
GR 12 Physical Sciences P1 Memo
PDF
No ratings yet
GR 12 Physical Sciences P1 Memo
15 pages
Life Sciences Learner Revision Booklet Term 1 - 2023
PDF
No ratings yet
Life Sciences Learner Revision Booklet Term 1 - 2023
33 pages
IT Definitions
PDF
No ratings yet
IT Definitions
14 pages
Gr12 Maths Summaries (Collectable Marks)
PDF
No ratings yet
Gr12 Maths Summaries (Collectable Marks)
85 pages
Accounting Grade 12 March 2022 QP and Memo
PDF
No ratings yet
Accounting Grade 12 March 2022 QP and Memo
18 pages
GRADE 12 Investigation Sequenses and Series Frans Du Toit HS
PDF
No ratings yet
GRADE 12 Investigation Sequenses and Series Frans Du Toit HS
6 pages
Calc SM
PDF
No ratings yet
Calc SM
69 pages
L.O: Mrs. Stent: Case Study:: 1: Sowa Moved Form Somalia To South Africa Because She Was Told To Choose
PDF
100% (2)
L.O: Mrs. Stent: Case Study:: 1: Sowa Moved Form Somalia To South Africa Because She Was Told To Choose
3 pages
Mathematics P2 Nov 2011 Memo Eng
PDF
No ratings yet
Mathematics P2 Nov 2011 Memo Eng
22 pages
Physical Sciences P2 Grade 11 2014 Common Paper Eng
PDF
No ratings yet
Physical Sciences P2 Grade 11 2014 Common Paper Eng
24 pages
MIND ACTION SERIES jGRADE 11 PAPER 2 SPECIAL ANSWER BOOK
PDF
100% (1)
MIND ACTION SERIES jGRADE 11 PAPER 2 SPECIAL ANSWER BOOK
19 pages
PP17. Human Endocrine System
PDF
No ratings yet
PP17. Human Endocrine System
131 pages
Life Sciences p2 Eng
PDF
100% (2)
Life Sciences p2 Eng
12 pages
Maths Lit Study Guide 2020 Grade 12
PDF
No ratings yet
Maths Lit Study Guide 2020 Grade 12
81 pages
Summary Notes On SR, CSR & CSI 2024
PDF
No ratings yet
Summary Notes On SR, CSR & CSI 2024
4 pages
Life Sciences Grade 12 Term 3 Week 1 - 2020
PDF
100% (1)
Life Sciences Grade 12 Term 3 Week 1 - 2020
8 pages
AVBOB STEP 12 SISWATI Paper 1 Digital
PDF
No ratings yet
AVBOB STEP 12 SISWATI Paper 1 Digital
40 pages
IT Is Gr8! at Grade 11 - Module 1.2 (Software)
PDF
No ratings yet
IT Is Gr8! at Grade 11 - Module 1.2 (Software)
14 pages
Life Sciences Grade 12 Term 1 Week 2 - 2021
PDF
No ratings yet
Life Sciences Grade 12 Term 1 Week 2 - 2021
5 pages
KC With X
PDF
No ratings yet
KC With X
24 pages
SAICA G12 Maths P1 Sept 2017
PDF
No ratings yet
SAICA G12 Maths P1 Sept 2017
10 pages
Gauteng Physical Science Trial 2021 P1 and Memo
PDF
No ratings yet
Gauteng Physical Science Trial 2021 P1 and Memo
41 pages
CAT Revision Package GR 12 - (FINAL - IF)
PDF
No ratings yet
CAT Revision Package GR 12 - (FINAL - IF)
26 pages
Life Sciences Practical Task 1 Grade 12 2021
PDF
No ratings yet
Life Sciences Practical Task 1 Grade 12 2021
9 pages
KWV Education Financial Maths
PDF
No ratings yet
KWV Education Financial Maths
36 pages
Accounting P1 Prep Sept 2022 Memo Eng
PDF
No ratings yet
Accounting P1 Prep Sept 2022 Memo Eng
11 pages
6.1 One Pager Nervous System - MEMO
PDF
100% (2)
6.1 One Pager Nervous System - MEMO
1 page
2025 - T1-Gr. 12 Life Sciences ATP Term 1 2025
PDF
No ratings yet
2025 - T1-Gr. 12 Life Sciences ATP Term 1 2025
4 pages
GR 12 Life Sciences IEB Part 2 3 in 1 Extracts
PDF
100% (1)
GR 12 Life Sciences IEB Part 2 3 in 1 Extracts
12 pages
SAICA ACCOUNTING OLYMPIAD LIMPOPO 2024 Dry Run DATABASE
PDF
No ratings yet
SAICA ACCOUNTING OLYMPIAD LIMPOPO 2024 Dry Run DATABASE
35 pages
69 - Notes - Debtors Age Analysis
PDF
No ratings yet
69 - Notes - Debtors Age Analysis
13 pages
2025 FS RECOVERY ATP Life Sciences GR 12
PDF
No ratings yet
2025 FS RECOVERY ATP Life Sciences GR 12
10 pages
Life Science Part 1 - The Answer Series Book
PDF
100% (1)
Life Science Part 1 - The Answer Series Book
156 pages
2025 CAT Grade 12 ATP
PDF
No ratings yet
2025 CAT Grade 12 ATP
7 pages
Human Nervous Sysetm Topic Test - 092206
PDF
No ratings yet
Human Nervous Sysetm Topic Test - 092206
7 pages
LU1 Hardware
PDF
No ratings yet
LU1 Hardware
15 pages
For Oom Piet
PDF
No ratings yet
For Oom Piet
2 pages
Grade 10 Cat Atp 2025
PDF
No ratings yet
Grade 10 Cat Atp 2025
5 pages
Grade 11 Cat Atp 2025
PDF
No ratings yet
Grade 11 Cat Atp 2025
9 pages