0% found this document useful (0 votes)
17 views

ICT Notes

Uploaded by

senoc86278
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

ICT Notes

Uploaded by

senoc86278
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Chapter 1:

Types and Components of computer system.I

a
Hardware consists of the
Physical components of a
CentralProcessing
in EMERGING TECHNOLOGIES
...

Computer system. life:


The role of CPU in processing Uses: impacts on everyday
EG:
instructions entered into the straining +Ve -
Ve
Internal components ·education health issues
security
-

computer in order to produce an

Gradiation
-

->
CPU, motherboard, processor.
output. o SPONES enhanced
Internalmemorate attendant
RAM
-

communications
↑t a
construction. - on
input output
education machinery
Conan
-> ->
Hardware components gaming
-

device device ·
-
lack of social
-iI(retworkinterfacewage devices entertainment
interaction
-

I, Chapter 2:Input 3 OutputDevice I


software are programs Read
for controlling the operation
only memory from
-
non-volative (info not erased
off)
when power
->
of a computer or cheap
processing stored
of electronic data. ->
permanently
Y
I
->
edited
;INPUT
be
cannot ->
application software
provides services that
DEVICES
Random Access
u ser requires to solve
a

word
task.

processing, spreadsheet, database, control


memory (RAM
graphics editors, audio editors.
-> volatile (data
power
erased
when USES: PROS CONS
off.
system software ->
temporary


store files
allows data such as texts
providesservices thatcomputer requires the -> used in normaloperations
compilers, linkers, device drivers, or butilities.
-
data writing is fast. images, video
entered into
or sound to be
a computer enables fast entry it, wristprobesee
processing of your
Analogue Data Digital Data system
InputDevices commands
data represented data represent
users Examples: data is
in
physical way as a
string of3, accepts
data from
entering
keyboardmouseandeasy
eg:audio, video discrete
symbols
-
controlled by user see to
compared to
-
translate user friendly inputs slow
for control
digital -analogue into machine understandable signs automatic methods.
devices. (modern convert) Camera, sensors,
-
some devices need
can
present
to OutputDevices driving
physical data wheel.
for Computer E provide information to users
analogue -> digital controlled
-

convert) by computer
-

processing. (modern used to


into
computers are unable to process isanattachetsoutput
anolog signals, they are digital devices
>DIRECT DATA ENTRY I

inrnevices,
IOPERATING SYSTEMSI-BACKING STORAGEI
collection of USES: PROS CONS
programs that
-> non-volatile data on input
manages and controls the
computer. eg:MacOS, Windows computer. long
->
term data
hard/not fastto read data
fastmethodofdata fastdata entry cards can be

Graphical User Interface (GUI) in misplaced easily


interface through which
users interacts which electronic
eg:hard-drives
manuallyenterresult reliable, no human doesn'twork at
error.
memorata Temporary. distances.
Out
devices via indicator representations
touch screen
easily updated
technical errors

"
small in
-

quantity voice recognition frequent

·icalmarketreadeaeocene increased
efficiency
easy
for data
Chip and pin reader
PROS CONS
loss 3 hacking.
gesture based interface
interface that uses specific computing expensive
physical gestures in order to source
operate an interface.
user-friendly Stere
differencesynemoperane
interface
L
-

aloSweidaagytanein
want?? * data PROS CONS

relatively cheap expensive to buy


DESKTOP COMPUTERS and reliable if used
MOBILE
COMPUTERS only
Features: friendly form. occasionally.
armistpayforcamee
Features:

i
speed
connectivity ud speakers
accuracy
wireless
Examples: can be heard
versality
portable device
monitors by
Uses:
limited
processing I storage
or
multimedia project mostoutputdevices everyone
movie Uses:
high end graphic or

printer
are quietand do not
fragile and
cemeteringthatha
laser
editing, General tasks, surfing waste
paper.
the
internet/creating websites Inkjetprinter hard to
educational services
PROS: printer
3D maintain
data
easier to use
PROS:
high quality
websites
most support terrace flexibility connectivity
Productivity
Speakers
printing
CONS:
portable CONS:
not
dependence, battery, cost,
security.
expensive up
to set
CHAPTER 3:STORAGE
DEVICES } MEDIA
·
STORAGE
MEDIA:
3 device that contains the
STORAGE DEVICES: physical
electronic data for apps and users.

E, piece of hardware on which


information is stored.
magnetic
drive
Solid State
magnetic
disk
optical
disk drive (SSD) - Hard disks drive (HDD)
a device drive in
Floppy allowrecording of
disks -

storage
-
store data
using
thatuses a process
computer flash-based
old
of magnetizationd Magnetic Tape very fragile
toaset memory,
-

which is -

faster than form of data store


access data.
blu-rays.
traditional
devices
storage optical
drive
ADVANTAGES OF:
SSD -CD (compact disc) primarly for audio
Magnetic Optical
only memory) bargestpre
Every CD-ROM (" Read -

Es Inexpensive
=>

holds alotofdata
E Portable medium.
stonger than
magneticl
- DVD (digital, large storage and

Transfer
can store video data.
E, reusable memory faster read speed a
-

Bilu-pay high definition video content

DISADVANTAGES: Solid State


·anrealYonderaged on afineas expensive -ssD-
drive (SSD)

Pendrive
3 complicated
-

drive -

storage, data
back up

& Slower access


mechanism. E, small - flash drive (USB drive)
and transferring
files

(compared to
ssd) capacity USB (universal Serial bus) industrystandard
-
-

CHAPTER 4:NETWORKS USING THEM


AND THE EFFECTS OF
· 88

NETWORK LAN WLAN WAN INTER 3 INTRANET


S
...

more computers wide area network wide


world
Local area Wireless local Internal restricted
Two or
network
collection of
network area network
resources. formed by LANs networks that access
linked to share doesn'tinvolve
join
together
over a only given
privates
not
connected
being -

equality
ROUTERS
to
staff and
large are a
awares
no
fast data share
through router one else. confined to

be eg:Ibuilding addiction building.


-

one
or modem. Bullying.
allows data
device that to
devices Access
connect points
shared among networks
by switches for larger range. Iagreedfor EXTRANET
hubs. network that
safety. Private
enterprises use to provide
NETWORKINu*Pomputers PROS PROS PROS to trusted third parties
efficient Privacy S
to a network.
devices to be
easy; fast availability broad Partners, vendors and etc.
HUBS:allow multiple coverage
connected, recieve data from ports b expensive
not cost savings high bandwidth
t o each device
send it
(cables)
Safe, secure World Wide Web
SWIIGIEShubs,butmoreefficientaddresses CONS CONS CONS
BRIDGES:Connect 2 networks with
same way for
long distance Hackers expensive information systemenablingthe
handling messages limitation weaksignals more security
resources to be accessed internet
VIA
issues
MODEMS:Convert
8sn
into a
computer signals speed slow problems
analouge for connecting computers via telephone lines
m
initi
SETTING A SMALL
UP
HOME NETWORK ...

② Connect Internet
HACKING
① Hardware
↳ connect ↳once you are
↳ switches/ devices to
connected you
using
MALWARE
router
hubs to link
ethernetc ables
devices VIA the NIC
to access the

↳ network cables internet.


intrusive software to steal data
↳getw ireless and or
↳ Choose ISP pay accesspointt o destroy/damage device
and router
get
detest singless

replicates other
onto computers in

WIFI V.S. BLUETOOTH software that


gathers user info
and moniters
key presses I cameras.
system that allow
wessBersonarea all countries
ADWARE
connection to not
network, uses radio waves malware thathides on device and
network through provide links between
everything
to
allow
wireless connection devices and allow internet
exposing children serves you advertisements 3 developer
connection. makes money when you click on ads
to R-rated
PROS:no cost of PROS:Low power usage
voices data transmission
things freedom of speech PASSWORD INTERCEPTION
wires, confined
not
cannot be
work
to in same place. can Connect
through walls. media is
regulated gone. the
guessing of passwords.
weak
CONS: so why the
not Itis a human
strong password h ave
must random signs
shortrange radiationthe
CONS:Limited signal
internet? right. and be
must frequently changed.
hackers.
range,

CLOUD COMPUTING:
AUTHENTICATION E-CONFERENCE
METHODS:
transfer data, servers, storage discussions thattake place through
of
BIOMETRICS
and data over the internet
-
two-factor the internetw ith computers a mobiles.
·the cloud" to innovate, authentication
① Fingerprint
DEO erence

environmental downtime
Username
-
-

friendly restricted ② Face ID a


Password
-

t
-

reliable access face video call hosted held by


·OTP
data control
-
specialized skills ③ Eye (Ivis) + alk
by one stable
-

needed.
· BIOMETRIC using
backup Physical object caller. internet
recovery
-
·

-
may be slow.

CHAPTERS:THE
EFFECTS OF
USING
I?
MICROPROCESSOR: SI CREPETITIVESTRAIN
& INJURY):
miniature electronic device that contains the
perform by repeated use
caused of a body
arithmetic, logic 3 control circuitry to
the functions of a CPU. eg:clicking mouse
Part

ADVANTAGES of Smart devices: EYE PROBLEMS:


convenience

security flexible
effiency
to needs.
digital eye strain
device usage.
resultof prolonged
DISADVANTAGES: HEAD ACHES:
expensive internet dependance excessive eye strain leads to headache
safety issues replaces humans
from also face.
using devices too close to

· aaaaaamurine saling
MICROPROCESSORS TRANSPORT:
IN TYPESOF HEALTH ISSUES FROM DEVICES

raingude'e
puts humans of
out job

your device.
-

better posture.
CHAPTERG:ICT
APPLICATIONS

X.
-
CHAPTER 7:THE
SYSTEMS LIFE CYCLE

IMPLEMENTATION

I
Analysis c urrent System
system:
Design.
of

Eresearchmethodinentere specificatio Directchangeover Phased Implementation


based on the
analysis stage, a

herengine
(SRS) System new
-

characteristics:

acinwaveones new
PROS:
>controlled · reliable requirements system will be designed. The new
system
effective
-
systematic will hope to resolve the issues identified.
arecitiesFor
·

the
-Empirical-based
observations
on ·

improvesmethods
productive.
on screen forms: Parallel
on
running
s
purposive -

USES:
CONS: files thatd escribe existing and new system
new
system is given
trial run, ifs uccess
a

together for
I appropriate
work period of

spacing
a
time consumive
features, behavior

create betterunderstanding expense


akranaman
uncover new information
of a software Screenfilled/no white space
data
application. ↑ easy to read font
size near t
.
- no
overlapping items place a
at time.

analyse current Development and testing.


F or a new
Record and system:
Paper based forms:
sigentemytheofinputssy'sentertaining

Identify's justify
the new hardware
and software thati s
>clear headings 3 instructions createfile
field names
specific data ateachanticsures - awasare
increase effectiveness Store

the activity; how to

required.
> use of text boxes
Set specific types fields.

identifyproblemswiththecurrentsystemthe >
Use of tick boxes
·
What is
being
eg: issue.Andgene
tinorating
ti
productivity. tested
identify 3 information requirements >clear fonts Style testseatened
user

forsthehewareusers willhesatisfied ene


hardware required: >
n ew
microphone make choices precise ·

software required: > expected


met.
microphone amplifier
allow free feedback outcome

DOCUMENTATION EVALUATION
the which has Analysis
evaluate new
system B
user Technical been implemented in full.


documention documentation Design
evaluation refers back to require -

ments A
s
trouble shooting > details of specification

Developmentseethe
guide
How to install
hardware 3
-
software
List minimum hardware Software ⑪ ②
compare,
identinYere
and software
How to start/stop > details of solutions ->
system with original I
improve
expected
inputs Documentation
> details of how ③ evaluate users' I
data is processed
responses Evaluation

& 8:SAFETY AND


CHAPTER SECURITY -

...

It I ↑ ↑
-

of
Physical Safety. esafe!Y security dat
electrocution
* from spilling drinks
Threats to data i
nearby electrical equipmentand touching Data
* protection.

aremanage
live/are cables.
Hacking gain

cause: prevention: principles: importance:
for personal
↳ Use
secure passwords

items malware
-faultyapplicationthe dont use defective valid grounds provides guidance
-
o

↳via unsafe links


and
damaged wires o clear
honestabout downloads
and bestp ractice rules
electric appliances in uses email ↳ trustr eliable
now data msgs links only.
-

-
use insulated tools is used
water contact
·use data in a fair way for organizations and download malware card fraud
t

isin
·dont
keep data for longer than the governmentto a card
cloning
equipmentoverheating Personal data
needed
follow on how to use
same
threatb ut · shoulder surfing
ashegamesin
*
cause: prevention: personal data. mesase
·key
dontoverload outlets characteristics:Sensitive data: logging
"
>
faulty outlets
retire old appliances

Boomers
political opinion

noverloaded tetsu a
et keep away flamable
objects from sockets a re
i religiou3
Health
beliefs
biometric data
Protection of data .

Biometrics
importance of privacy to avoid inappropriate use b iometric
of for
authentication and access control
discloser
Prevention: &
cause:
unorganized wires wireless
prevent identity theft
Digital Certificate
use more ↳
legal/ reputational damage file/ electronic password that
too wires connection proves authenticity of device
many exposed
s

, getwire arranging
↳>
compromise of accounts
systems Secure SocketLayer (SSL)
> poorhousekeeping
<poorly installed carpets
a
teamhem away from path B esafety Protocol
communication
thatprovides
over the
secure

internet
B heavy equipment falling
and
injuring types i ssues:
of

canacious
prevention: Encryption
that converts
outline the method data
>nacking
people prevention:
users dangers
into secret
codes hides true meaning
> Scam links opersonal, get Firewall
cause: anti-virus
desks
>use strong >innapropriate material gain
firewall 3 protection networksecurity devisethatmonitethe
> poor instalment
, ensure safe instalment o to get
software.
>Cyberbullying information Two-factor authentication
oneperly, make appliances
of

>
sure appliance is >malicious users oscam/frands'personaldata to ·
Securitysisten tinanaccess

poor
quality desks away from edge of desk untrustful site/people
CHAPTER 9
AUDIENCECHAPTER IO:COMMUNICATION
.

--

AUDIENCE APPRECIATION Email Spam Emails.


audience:groupofpeople for whom
E characteristics
>automatic reply to
messages ~
characteristics:
Poor spelling/grammar

you are developing your work autoforwardandredirectionof messagepeopleare I


,
mismatched/dodgy URL
asked for sensitive/private info

Purpose:ensure
3,
productwill be needed uses of email: >has been sent multiple people
to

>contacting friends
audience.
and interest information effects of spam emails:
requesting
,

> spread malware


>applying for jobs
the needs of personal info
ICT solutions m eet
must
3, constraints of email:
> trick you into sharing
to
unrealistic threats for you pay
will either use
they
cause or make
audience > Causes misunderstanding 3 run
phishing scams to take ur
money
contain viruses
take partin the solution. can
I

cannot view
Prevention of spam emails.
senders msg
report spam

BossPamefadaresantednewsletter
while emails
being sent
e
factors concerning How to
analyse the Principles of
the audience that audience:
should be considered:
copyrighting
computer soft
of E-mail.
3
interview find
e
M s
constraints .
·

age of target how to ware:

E
engage
audience
audience
sel/giveaways ofare
·

questionnairestofind groups:
email

amakogaleaggrinan, ingener
.

·
experience of email addresses you
audience right.Software in youare
a set
of
them all once.
can

so solution can meet own software or sell itas


send emails to at

copy (C):
your own software
·
expectations of final expectations carbon
· Use a software on
audience
Yes ratedmatsinonin
network

acopy ofemailyou aresendinein


or multiple
·
marketresearch -
in devices unless license
has been
acquired.
a company
·
knowledge of depth analysis of the need
security: for
audience data recieved. blind carton
copy (6cc) :
faserativemiss andidea. copy of email sentbut address isn't
visible to
other recipients
Forward:
netiquette: email if weren't
allows new recipienttosee they
rules of conductf or respectful originally included in the
chain

An n n n n n n n n n n n
attachments:

HTTP Request (URL

Responsement

TPUseTS38encryptormarequestamoreseenare. Inan
used websites like HTTPS is used in bank
HTTP. HTTP is in
blog writing but

websites and etc.

of ISP
·
benefits of using the

internet.
Provider(ISP):
InternetS ervice Weensearcherineisestateitem ·
innapropriate
education
> fasta ccess to info
Isp makes itpossible for customers
Search the
6 main criterias: material
world wide web in a systematic eg:Pornography >connectivity
onceheranterneteswhenasetthe way. ① authority 4
currency ·
Crier!
>
anonymity
isitclearwhoaspireset aretheran pageswere
google,Yanoo"duckduck, one
eg: >
e-commerce
structure of a web address: videos/imgs of Finding locations
is the info source reliable? criminal activity. 3 numbers
Uniform Locater (URL): prevention of risks.
resource
② accuracy
-

5 coverage
Uses of search engines: ·Cyberbullying
wet pageshave uniqueandrese
sharingnegative restrictitis
relevantinfo
isthetargeta terate
research +
are sources to factual info
>carry out
listed?

quickly
https:we
for information isintogrammaticallyen your needs?

maintentml,antaa"aaous
- search for
stuff
online
>blocking innapropriate
Sm

file
③ Objectivity 6appearance ·
identity theft > ISP control
Protocol
Resourceene organized

nennSminquestion
Path is there bias? is the site
a look up other websites the site well? keep personal info private
people with parent for noseof
relevant do the links work?
create an algorithm to help
c
regularly change passwords
information.

You might also like