ICT Notes
ICT Notes
a
Hardware consists of the
Physical components of a
CentralProcessing
in EMERGING TECHNOLOGIES
...
Gradiation
-
->
CPU, motherboard, processor.
output. o SPONES enhanced
Internalmemorate attendant
RAM
-
communications
↑t a
construction. - on
input output
education machinery
Conan
-> ->
Hardware components gaming
-
device device ·
-
lack of social
-iI(retworkinterfacewage devices entertainment
interaction
-
word
task.
↳
store files
allows data such as texts
providesservices thatcomputer requires the -> used in normaloperations
compilers, linkers, device drivers, or butilities.
-
data writing is fast. images, video
entered into
or sound to be
a computer enables fast entry it, wristprobesee
processing of your
Analogue Data Digital Data system
InputDevices commands
data represented data represent
users Examples: data is
in
physical way as a
string of3, accepts
data from
entering
keyboardmouseandeasy
eg:audio, video discrete
symbols
-
controlled by user see to
compared to
-
translate user friendly inputs slow
for control
digital -analogue into machine understandable signs automatic methods.
devices. (modern convert) Camera, sensors,
-
some devices need
can
present
to OutputDevices driving
physical data wheel.
for Computer E provide information to users
analogue -> digital controlled
-
convert) by computer
-
inrnevices,
IOPERATING SYSTEMSI-BACKING STORAGEI
collection of USES: PROS CONS
programs that
-> non-volatile data on input
manages and controls the
computer. eg:MacOS, Windows computer. long
->
term data
hard/not fastto read data
fastmethodofdata fastdata entry cards can be
"
small in
-
·icalmarketreadeaeocene increased
efficiency
easy
for data
Chip and pin reader
PROS CONS
loss 3 hacking.
gesture based interface
interface that uses specific computing expensive
physical gestures in order to source
operate an interface.
user-friendly Stere
differencesynemoperane
interface
L
-
aloSweidaagytanein
want?? * data PROS CONS
i
speed
connectivity ud speakers
accuracy
wireless
Examples: can be heard
versality
portable device
monitors by
Uses:
limited
processing I storage
or
multimedia project mostoutputdevices everyone
movie Uses:
high end graphic or
printer
are quietand do not
fragile and
cemeteringthatha
laser
editing, General tasks, surfing waste
paper.
the
internet/creating websites Inkjetprinter hard to
educational services
PROS: printer
3D maintain
data
easier to use
PROS:
high quality
websites
most support terrace flexibility connectivity
Productivity
Speakers
printing
CONS:
portable CONS:
not
dependence, battery, cost,
security.
expensive up
to set
CHAPTER 3:STORAGE
DEVICES } MEDIA
·
STORAGE
MEDIA:
3 device that contains the
STORAGE DEVICES: physical
electronic data for apps and users.
storage
-
store data
using
thatuses a process
computer flash-based
old
of magnetizationd Magnetic Tape very fragile
toaset memory,
-
which is -
Es Inexpensive
=>
holds alotofdata
E Portable medium.
stonger than
magneticl
- DVD (digital, large storage and
Transfer
can store video data.
E, reusable memory faster read speed a
-
Pendrive
3 complicated
-
drive -
storage, data
back up
(compared to
ssd) capacity USB (universal Serial bus) industrystandard
-
-
equality
ROUTERS
to
staff and
large are a
awares
no
fast data share
through router one else. confined to
one
or modem. Bullying.
allows data
device that to
devices Access
connect points
shared among networks
by switches for larger range. Iagreedfor EXTRANET
hubs. network that
safety. Private
enterprises use to provide
NETWORKINu*Pomputers PROS PROS PROS to trusted third parties
efficient Privacy S
to a network.
devices to be
easy; fast availability broad Partners, vendors and etc.
HUBS:allow multiple coverage
connected, recieve data from ports b expensive
not cost savings high bandwidth
t o each device
send it
(cables)
Safe, secure World Wide Web
SWIIGIEShubs,butmoreefficientaddresses CONS CONS CONS
BRIDGES:Connect 2 networks with
same way for
long distance Hackers expensive information systemenablingthe
handling messages limitation weaksignals more security
resources to be accessed internet
VIA
issues
MODEMS:Convert
8sn
into a
computer signals speed slow problems
analouge for connecting computers via telephone lines
m
initi
SETTING A SMALL
UP
HOME NETWORK ...
② Connect Internet
HACKING
① Hardware
↳ connect ↳once you are
↳ switches/ devices to
connected you
using
MALWARE
router
hubs to link
ethernetc ables
devices VIA the NIC
to access the
replicates other
onto computers in
CLOUD COMPUTING:
AUTHENTICATION E-CONFERENCE
METHODS:
transfer data, servers, storage discussions thattake place through
of
BIOMETRICS
and data over the internet
-
two-factor the internetw ith computers a mobiles.
·the cloud" to innovate, authentication
① Fingerprint
DEO erence
↑
environmental downtime
Username
-
-
t
-
needed.
· BIOMETRIC using
backup Physical object caller. internet
recovery
-
·
-
may be slow.
CHAPTERS:THE
EFFECTS OF
USING
I?
MICROPROCESSOR: SI CREPETITIVESTRAIN
& INJURY):
miniature electronic device that contains the
perform by repeated use
caused of a body
arithmetic, logic 3 control circuitry to
the functions of a CPU. eg:clicking mouse
Part
security flexible
effiency
to needs.
digital eye strain
device usage.
resultof prolonged
DISADVANTAGES: HEAD ACHES:
expensive internet dependance excessive eye strain leads to headache
safety issues replaces humans
from also face.
using devices too close to
· aaaaaamurine saling
MICROPROCESSORS TRANSPORT:
IN TYPESOF HEALTH ISSUES FROM DEVICES
raingude'e
puts humans of
out job
your device.
-
better posture.
CHAPTERG:ICT
APPLICATIONS
X.
-
CHAPTER 7:THE
SYSTEMS LIFE CYCLE
IMPLEMENTATION
I
Analysis c urrent System
system:
Design.
of
herengine
(SRS) System new
-
characteristics:
acinwaveones new
PROS:
>controlled · reliable requirements system will be designed. The new
system
effective
-
systematic will hope to resolve the issues identified.
arecitiesFor
·
the
-Empirical-based
observations
on ·
improvesmethods
productive.
on screen forms: Parallel
on
running
s
purposive -
USES:
CONS: files thatd escribe existing and new system
new
system is given
trial run, ifs uccess
a
together for
I appropriate
work period of
spacing
a
time consumive
features, behavior
required.
> use of text boxes
Set specific types fields.
identifyproblemswiththecurrentsystemthe >
Use of tick boxes
·
What is
being
eg: issue.Andgene
tinorating
ti
productivity. tested
identify 3 information requirements >clear fonts Style testseatened
user
DOCUMENTATION EVALUATION
the which has Analysis
evaluate new
system B
user Technical been implemented in full.
↑
documention documentation Design
evaluation refers back to require -
ments A
s
trouble shooting > details of specification
Developmentseethe
guide
How to install
hardware 3
-
software
List minimum hardware Software ⑪ ②
compare,
identinYere
and software
How to start/stop > details of solutions ->
system with original I
improve
expected
inputs Documentation
> details of how ③ evaluate users' I
data is processed
responses Evaluation
...
It I ↑ ↑
-
of
Physical Safety. esafe!Y security dat
electrocution
* from spilling drinks
Threats to data i
nearby electrical equipmentand touching Data
* protection.
aremanage
live/are cables.
Hacking gain
↳
cause: prevention: principles: importance:
for personal
↳ Use
secure passwords
items malware
-faultyapplicationthe dont use defective valid grounds provides guidance
-
o
-
use insulated tools is used
water contact
·use data in a fair way for organizations and download malware card fraud
t
isin
·dont
keep data for longer than the governmentto a card
cloning
equipmentoverheating Personal data
needed
follow on how to use
same
threatb ut · shoulder surfing
ashegamesin
*
cause: prevention: personal data. mesase
·key
dontoverload outlets characteristics:Sensitive data: logging
"
>
faulty outlets
retire old appliances
Boomers
political opinion
noverloaded tetsu a
et keep away flamable
objects from sockets a re
i religiou3
Health
beliefs
biometric data
Protection of data .
Biometrics
importance of privacy to avoid inappropriate use b iometric
of for
authentication and access control
discloser
Prevention: &
cause:
unorganized wires wireless
prevent identity theft
Digital Certificate
use more ↳
legal/ reputational damage file/ electronic password that
too wires connection proves authenticity of device
many exposed
s
, getwire arranging
↳>
compromise of accounts
systems Secure SocketLayer (SSL)
> poorhousekeeping
<poorly installed carpets
a
teamhem away from path B esafety Protocol
communication
thatprovides
over the
secure
internet
B heavy equipment falling
and
injuring types i ssues:
of
canacious
prevention: Encryption
that converts
outline the method data
>nacking
people prevention:
users dangers
into secret
codes hides true meaning
> Scam links opersonal, get Firewall
cause: anti-virus
desks
>use strong >innapropriate material gain
firewall 3 protection networksecurity devisethatmonitethe
> poor instalment
, ensure safe instalment o to get
software.
>Cyberbullying information Two-factor authentication
oneperly, make appliances
of
↑
>
sure appliance is >malicious users oscam/frands'personaldata to ·
Securitysisten tinanaccess
↑
poor
quality desks away from edge of desk untrustful site/people
CHAPTER 9
AUDIENCECHAPTER IO:COMMUNICATION
.
--
Purpose:ensure
3,
productwill be needed uses of email: >has been sent multiple people
to
>contacting friends
audience.
and interest information effects of spam emails:
requesting
,
cannot view
Prevention of spam emails.
senders msg
report spam
BossPamefadaresantednewsletter
while emails
being sent
e
factors concerning How to
analyse the Principles of
the audience that audience:
should be considered:
copyrighting
computer soft
of E-mail.
3
interview find
e
M s
constraints .
·
E
engage
audience
audience
sel/giveaways ofare
·
questionnairestofind groups:
email
amakogaleaggrinan, ingener
.
·
experience of email addresses you
audience right.Software in youare
a set
of
them all once.
can
copy (C):
your own software
·
expectations of final expectations carbon
· Use a software on
audience
Yes ratedmatsinonin
network
An n n n n n n n n n n n
attachments:
Responsement
TPUseTS38encryptormarequestamoreseenare. Inan
used websites like HTTPS is used in bank
HTTP. HTTP is in
blog writing but
of ISP
·
benefits of using the
internet.
Provider(ISP):
InternetS ervice Weensearcherineisestateitem ·
innapropriate
education
> fasta ccess to info
Isp makes itpossible for customers
Search the
6 main criterias: material
world wide web in a systematic eg:Pornography >connectivity
onceheranterneteswhenasetthe way. ① authority 4
currency ·
Crier!
>
anonymity
isitclearwhoaspireset aretheran pageswere
google,Yanoo"duckduck, one
eg: >
e-commerce
structure of a web address: videos/imgs of Finding locations
is the info source reliable? criminal activity. 3 numbers
Uniform Locater (URL): prevention of risks.
resource
② accuracy
-
5 coverage
Uses of search engines: ·Cyberbullying
wet pageshave uniqueandrese
sharingnegative restrictitis
relevantinfo
isthetargeta terate
research +
are sources to factual info
>carry out
listed?
quickly
https:we
for information isintogrammaticallyen your needs?
maintentml,antaa"aaous
- search for
stuff
online
>blocking innapropriate
Sm
file
③ Objectivity 6appearance ·
identity theft > ISP control
Protocol
Resourceene organized
nennSminquestion
Path is there bias? is the site
a look up other websites the site well? keep personal info private
people with parent for noseof
relevant do the links work?
create an algorithm to help
c
regularly change passwords
information.
⑳