Gr11 IT Theory LVDM
Gr11 IT Theory LVDM
Gr11 IT Theory LVDM
INFORMATION
TECHNOLOGY
CAPS
As an organisation rooted in technology, we believe in providing a new bold digital world to communities we
operate in. This unique digital book provides the fundamental knowledge necessary for a sound grounding
from which to make practical use of the complete and indispensable application-oriented information
regarding Computer Applications Technology (CAT) and Information Technology (IT). It is a foundational
reference for today’s secondary school learners and teachers alike - as well as for the next generation of CAT
and IT students.
Restrictions
You may not make copies of this book in part or in full – in printed or electronic or audio or video form – for a
profit seeking purpose.
Learning outcomes
At the end of this chapter you should be able to
● describe the motherboard
● describe the purpose and role of the motherboard
● describe the purpose and role of components that form part of the motherboard
Introduction ● describe the purpose and role of expansion cards
The introduction is a brief
● summary
explain how dataof why youbetween
is transferred will be learning
computer the content that is covered in the chapter.
components
Sometimes it will give you
● a briefcaching
describe background of how far technology has come, while at other times it will just
and web caching
give you a short summarydescribe memory as part
that introduces theof acontent
computerthat
systemwill follow in the chapter.
●
INTRODUCTION
In Grade 10 you learned about several different input-, processing-, output-, and
storage devices. In this chapter you will look at hardware and extend your
knowledge while learning more about the component connecting these
devices – the motherboard. You will also learn about computer memory, including
RAM and ROM, in greater detail. HARDWARE IN A NUTSHELL
Computer hardware refers to the physical comp
In Grade 11 we introduce new and interesting concepts and expand your This includes devices that stand on their own
knowledge of computers and computer programming. To make sure this new also components inside the computer like the C
knowledge is placed in the context of information you already understand, each
can be grouped into the following categories:
chapter starts with a brief overview of the core concepts covered in Grade 10.
● Input devices: any device that allows you t
This gives you an opportunity to refresh any knowledge you might need to
understand the concepts being taught in this chapter. If there are concepts keyboard, mouse, camera or microphone.
covered in the Grade 10 overview that you struggle with, the ‘In a Nutshell’ link ● Memory: the storage space in a computer
New words
allows you to jump directly to the appropriate section in the Grade 10 textbook while it is being processed.
New words so that you can revise any work. CPU – the processing unit ● Output devices: a device that takes data fr
These are difficult words that you may not responsible for processing available to the user in a way the user unde
general instructions monitors, speakers and printers.
have encountered before. A brief explanation
GPU – the part of a ● Storage devices: a device that stores data
for these words are given.
computer responsible for devices like hard disk drives, CDs and flash
processing the instructions amounts of data.
TERM 1 I CHAPTER 1 HARDWARE 1
that create a picture on ● Processing devices: the computer devices
the screen instructions and doing calculations. You lear
devices: CPUs and GPUs.
● Communications devices: devices, such a
allow a computer to connect to other comp
2
Activity 1.2 continued
Consolidation activities
COMPONENTSThis
AS PART OF THE
is a revision MOTHERBOARD
activity based on what you have covered in the chapter. Take time to answer the questions on
6 INFORMATION TECHNOLOGY I GRADE 11 I Theory Book
yourshows
The following image own. where
You teacher
most ofmay also use devices
the important these toare
assess your performance during class.
connected
to the motherboard.
Animation
Animation showing a
CONSOLIDATION ACTIVITY Chapter 1: Hardware motherboard, then zooming
in on the following slots:
1. Choose the correct answer.
CPU RAM ROM PCIe
a. Which one of the following is true of the motherboard?
PCIe ×16 (for the graphics
A. Provides physical structure for other hardware
card) SATA Power
B. Allows processing of data
C. Temporary storage of the computer
D. Permanent record of our programs and data
b. Which one is NOT a feature of RAM?
A. Small capacity B. User controlled
C. Very high speed D. Slow
Figure 1.1: A motherboard is a large PCB with slots for all the hardware
c. The form of cache which stores data sent or received by the hard disk plates for a short time is called…
A. CPU cache B. Disk cache
C. Web cache D. None of the above
d. Which one of the following is the most important component of a motherboard?
IT-Theory-LB-Gr11-INK05.indb 6 A. CPU TERM 1 I B. RAM
CHAPTER 1 HARDWARE I UNIT 1.1 Motherboard 3 2020/01/24 14:02
TERM 1
CHAPTER
HARDWARE
1
CHAPTER OVERVIEW
Unit 1.1 Motherboard
Unit 1.2 Purpose and role of cache memory and caching
Unit 1.3 Memory as part of a computer system
Unit 1.4 Computer performance
Learning outcomes
At the end of this chapter you should be able to
● describe the motherboard
● describe the purpose and role of the motherboard
● describe the purpose and role of components that form part of the motherboard
● describe the purpose and role of expansion cards
● explain how data is transferred between computer components
● describe caching and web caching
● describe memory as part of a computer system
INTRODUCTION
In Grade 10 you learned about several different input-, processing-, output-, and
storage devices. In this chapter you will look at hardware and extend your
knowledge while learning more about the component connecting these
devices – the motherboard. You will also learn about computer memory, including
RAM and ROM, in greater detail.
All these devices are connected inside a computer by the motherboard, a printed
circuit board (or PCB).
Activity 1.1
3 4
5 6
DOWN ACROSS
1. physical components that make up a 2. a commonly used output device
computer make up a computer 3. the storage space in a computer
4. allows you to connect to other computers on a where data is temporarily kept
network while it is being processed
5. connects a monitor to a computer 7. allows you to add data to a
6. responsible for implementing calculations in a computer
computer
1. Hardware, 2. Monitor, 3. Memory, 4. Router, 5. HDMI, 6. CPU, 7. Mouse
1.1 Motherboard
Imagine you are a computer. As a computer, your body parts act as input devices.
They take signals from your environment, translate them into electrical signals
and send them to your brain. For example, if it is too cold or warm. Your brain is
like the processing device (or CPU). It receives millions of signals from your
environment, interprets them, makes decisions and finally sends commands to
your body. These commands are received by output devices that convert the
decisions from your brain into something visible that people can see. For example,
you will put a long-sleeved top on if it’s cold.
Animation showing a
motherboard, then zooming
in on the following slots:
CPU RAM ROM PCIe
PCIe ×16 (for the graphics
card) SATA Power
Figure 1.1: A motherboard is a large PCB with slots for all the hardware
Figure 1.2: Small zig-zags are added to routes to make sure the signals arrive at the
same time
Looking at Figure 1.2 you may also notice that the circuits are not always the
same width. This is because the width of a circuit determines how much data it
can carry, with wider circuits being able to transport more data. For example, a
component like the GPU requires very wide circuits because it is responsible for
QR CODE receiving and sending millions of instructions each second, while a 3,5 mm sound
port might require a lower width circuit.
Processing devices which do the hard work of manipulating the data and
performing the calculations needed by your computer. These devices receive the
data from the RAM, perform sets of instructions, and returns the processed data
to the RAM. The two most important processing devices in modern computers
are Central Processing Unit and Graphics Processing Unit. The most important
https://www.youtube.com/ components that can be connected to the motherboard are shown in the table
watch?v=zIYkol851dU
below.
COMPONENT DESCRIPTION
BIOS chip A computer’s BIOS (or Basic Input/Output System), is the first set of instructions that run every
time a computer is started up. The BIOS is stored on your computer’s ROM (or read-only
memory) and is responsible for making sure your computer starts up correctly. However, the
BIOS application can also be accessed by users to specify the hardware settings to the
motherboard.
CPU The Central Processing Unit (CPU) is the most important component of the computer. It is the
brain of the computer which runs all programs and processes all software instructions.
Central Processing Unit (CPU) is responsible for processing general instructions. Every
application makes use of the CPU to collect, decode and execute instructions as required by
the application.
GPU Graphics Processing Unit (GPU) is responsible for processing the instructions that create the
pictures on your screen, for example, three-dimensional games rely heavily on the GPU to
create their images.
MOTHERBOARD SLOTS
Did you know
To connect these components (as well as other, expansion components)
to the motherboard, motherboards contain several slots. These slots To prevent damage to the
include:
CPU, a Zero insertion force
(ZIF) socket is a type of
● CPU slot: The CPU socket (also called the ZIF socket) is used to
socket or electrical
connect the CPU to the motherboard. Intel and AMD each have their
connector that needs no
own sockets, and each brand occasionally change their standard
force for insertion. The CPU
socket when a new generation of CPUs is released. is placed on it and clamped
● DIMM slot: The DIMM slot is used to connect the computer’s RAM to into position.
the motherboard.
● PCI/PCIe: The Peripheral Component Interconnect (PCI) or PCI express slots allow you to plug
additional hardware like a GPU, sound card, ethernet card or Wi-Fi card into the computer.
● GPU/PCIe x16: this is a high-speed slot generally used for the computer’s graphics card since it
receives and sends the most data.
● SATA: The Serial AT Attachment (SATA) port is used to connect internal storage devices such as
hard drives to the computer.
● Power: the main power connection connects the motherboard to the power supply which connects
to a normal household power outlet. This supplies power to the motherboard and all connected
components.
Power
DIMM slot
SATA
CPU slot
GPU/PCIe x16
PCI/PCIe
The motherboard bus is a set of wires that connects one part of the motherboard
to communicate with other parts of the motherboard. It also serves as an interface
between the CPU and various external devices. The motherboard bus can be
one of two types:
● An internal bus is the communication highway of the motherboard, sending
data and instructions to the different parts within the motherboard. It links
the different parts of the computer to the CPU and the main memory.
● The external type of motherboard bus (expansion bus) is the interface for
peripheral devices like hard disks, CD-ROM drives, and flash drives to get
connected to the CPU. The shape of each interface is unique preventing
one from plugging a device to a wrong port, which could cause damage to
the device while being connected to the CPU.
MODULAR DESIGN
Computers are built using a modular design. This means that, rather than being
made from a single component, it is built from several different components (or
modules). Because components are not built into the motherboard (or soldered
onto the motherboard), you can remove or replace these components with new
components at any time. This allows you to create thousands of different
computers with different components, different speeds and different abilities.
Upgrade/Repair
For example, if you wanted to build a computer for use in the IT class, you might
buy a motherboard and then add an entry level CPU (like an Intel Core i3), 4 GB
The modular design also means that you can repair or replace individual parts of
the computer. If a component such as a RAM module stops working for some
reason, then you can replace just that RAM module and not have to buy a whole
new computer.
Did you know
Table 1.1: Comparison between two computers In September 2014, an
COMPONENT BASIC COMPUTER INCREDIBLE COMPUTER internet user called The Stilt
overclocked his AMD CPU
Motherboard The same motherboard for both computers from its normal speed of
4 000 MHz to an incredible
Quad(4)/Dual(2)/ Case The same case or chassis for both computers
Octo(8)... 8 722 Mhz. By 2018, this
CPU Core i3-8100 (4 × 3,6 GHz) Core i7-8700K (12 × 4,7 GHz)
64 -core was still the highest speed
Logical processors
GPU Built-in GPU 2 × GeForce RTX 2080 Ti a normal desktop CPU has
ever run at! However, the
8- 8th Generation RAM 1 × 4 GB (2000 MHz) 2 × 8 GB (3000 MHz)
100/700 manufaturer's model
CPU generated so much
K - Overclockable(Unlock)Storage 500 GB hard drive 500 GB solid-state drive heat at this temperature
X-Xtreme
P-DPU acticvated 8 000 GB hard drive that liquid nitrogen (which
S-LowPower has a temperature of
M-Mobile Other items – Liquid cooling system
–196 °C) had to be poured
Brand: AMD/Intel 900 W power supply directly onto the CPU to
Approximate cost R9 500 R82 000 keep it cool.
Control bus
System bus
Address bus
Data bus
Activity 1.2
1.2.2 Choose a term/concept from COLUMN B that matches a description in COLUMN A. Write only the letter next to
the question number (e.g. 2.1 – A). There can be more than one answer to a question.
COLUMN A COLUMN B
1. The short-term memory of the computer which can store and retrieve active A. HDMI port
programs and data at very high speeds
B. ROM
2. IT allow you to plug additional hardware like a GPU, sound card, ethernet card or
Wi-Fi card into the computer. C. Bus
3. This port allows high quality image and sound output from the computer to D. BIOS
TV screens E. Ethernet port RJ45
4. This port allows a computer to be connected to a network of other computers, F. Wi-Fi card
printers, servers and routers using a physical network cable.
G. Point-to-point
5. The path connecting different components on a motherboard.
connections
6. It stores the motherboard’s operating software, called the BIOS.
H. Ethernet card Expansion Card
7. These connections are made directly between two components on the
motherboard and do not allow additional connections to be made I. RAM
8. A popular examples of an expansion card.
9. You can enable or disable motherboard features using the _____
10. This is stored on your computer’s ROM and is responsible for making sure your
computer starts up correctly.
1.2.3 Your younger brother suggests that you upgrade the BIOS of the older motherboard for the motherboard to be
faster and more powerful.
i. What is the BIOS? BIOS vs POST vs CMOS
ii. List the FOUR main tasks of the BIOS.
iii. Where is the BIOS stored?
1.2.4 Look at the following two advertisements for desktop computers and answer the following questions.
COMPUTER 1 COMPUTER 2
Caching refers to the use of a faster medium to prevent a slower medium from
slowing down the performance of a computer.
To better understand the relationship between your computer’s cache, RAM and storage, you can think about a scenario in which
you would like to purchase something. Your money can be stored in three places:
1. Your pockets (cache)
2. Your wallet (RAM)
3. Your bank account (hard disk)
The easiest and quickest way to get access to your money is if you already have money in your pockets. If this is the case, you
can pay and immediately receive your item. However, your pockets do not have much space for money and any money found in
your pockets is removed when you wash your pants. Cache works in the same way in that it is the quickest way to store small
amounts of data but is cleared frequently.
The second easiest way to get access to your money is to look in your wallet. While a wallet allows you to store more money
(generally, enough money to do shopping), it also takes more effort to look for this money. In the same way, RAM generally allows
you to store the data you will need at any time but does not allow you to permanently store your data.
The slowest way to get access to your money is to go to the bank. This takes a much, much longer time, but the bank allows you
to store much larger amounts of money. As a result, whenever you make a big purchase (such as a house or a car), you will need
to go to the bank. In a similar way, your hard drive is much slower than either RAM or your cache, but it also allows you to
permanently store thousands of times more data. Whenever you open a new program, your computer slowly reads this data from
your hard drive into your RAM, from where it can be accessed more quickly.
TERM 1 I CHAPTER 1 HARDWARE I UNIT 1.2 Purpose and role of cache memory and caching 11
Let’s continue using the metaphor of the human body. In the human body, there
is one critical element that you still need so that you can make decisions – that is,
your memory. For example, when you see a fire burning, you do not need to do
any calculations to know that you should keep your hand out of the fire. Instead,
you learned that information through your life experiences and it is stored in your
memory. You can therefore decide what to do without calculating everything from
first principles.
Since RAM is only used for short-term memory storage, it is cleared the moment
you turn off your computer.
https://www.youtube.com/
watch?v=_0ZtFrh_q_g
https://qrs.ly/cja5pn9
TEMPORARY AND PERMANENT STORAGE
In general, computer storage and memory can be grouped into temporary
storage and permanent storage solutions. Temporary storage solutions are
motherboard
typically managed directly by the computer and all data is removed from the
temporary storage once the computer is turned off.
Activity 1.3
1.3.1 Indicate whether the following statements are TRUE or FALSE. Write ‘true’ or ‘false’
next to the question number. Correct the statement if it is FALSE. Change the
underlined word(s) to make the statement TRUE. You may not simply use the word
‘NOT’ to change the statement. NO mark will be awarded if only FALSE is written
down.
a. Without ROM, your computer would need to read and write all data it is using to
your hard drive, which is much slower and as a result, your CPU would spend a
lot of time waiting for data to be loaded.
b. The reason why BIOS settings can be stored on the ROM, is because the CMOS
continues to store the BIOS settings when the computer is switched off as it is
connected to a small battery.
c. Since RAM is only used for short-term memory storage, it is saved the moment
you turn off your computer.
d. Magnetic tape and hard disk drives use magnetic properties to store and
retrieve information, allowing large amounts of information and programs to be
stored temporarily.
e. Hard drive has a large capacity and normal speed. It can be a permanent
storage device and is user controlled.
f. Caching refers to the use of a faster medium to prevent a slower medium from
slowing down the performance of a computer.
g. CPU-cache is a small amount of RAM that is built into a hard disk drive. It stores
data being sent or received by the hard disk plates for a short period of time.
h. The hard drive is much slower than either RAM or cache, but it allows you to
permanently store a lot more data.
1.3.2 The following image indicates the sizes of L1 and L2 cache memory.
Having looked at some of the differences between mobile technologies and traditional desktop computers,
it is useful to see exactly how the different computer components influence the performance of a computer
or smartphone. The four specific components have already been discussed in the previous units, Table 1.3
summarises the most important components of a computer, as well as the factors affecting their
performance.
Computer performance can be seen and experienced by the amount of useful work that is accomplished
by a computer system. The work that is performed can be measured in terms of accuracy, efficiency and
speed of executing computer program instructions to show level of computer performance.
What’s most important in terms of computer performance, depends on the intended use of the computer.
With so many options of speeds of a CPU and the number of processing cores, to the size and speed of
the RAM all work together to enhance the overall performance of a computer system.
A single slow component such as a standard hard drive in a high-end computer as shown below would
impact the performance significantly of the computer system.
The best way to evaluate hardware components is by doing online research. Websites like Anandtech and
Guru3D.com specialises in testing hardware and will be able to tell you exactly how much faster one
component is than another. They will also provide you with up-to-date information on which components
are the best and most cost-effective to purchase.
A factor affecting a computer’s performance is the speed of the storage devices. In the previous Units, you
saw how the capacity of the RAM affects your computer’s performance. However, before the data can be
stored in your RAM, it needs to be loaded from your storage device. If the storage device has a low speed,
it might take a long time for the information to be loaded into your RAM, causing your computer to slow
down.
1.4.2 Choose a term/concept from COLUMN B that matches a description in COLUMN A. Write only the letter next to
the question number (e.g. 1 – A).
COLUMN A COLUMN B
1. CPU cache A. It is a small area on a computer’s hard drive where images and pages from
the world wide web are stored for a short period of time.
2. Disk cache
B. It is a small amount of RAM that is built into a hard disk drive which stores
3. Computers
data being sent or received by the hard disk plates for a short period of time.
4. Smartphone C. _____ have more and better communication devices, making them better at
5. Web cache connecting to the internet from anywhere in the world.
D. It is a small, high-speed cache built into the CPU where it can temporarily
store the data it needs.
E. _____ have more RAM and faster processing devices, making them better
suited to tasks that require significant processing power.
h. If a computer’s RAM capacity is too small, using the computer will become much slower as information
needs to constantly be added to and removed from the CPU.
i. Your computer (or CPU’s) cache is a slower form of memory, used to send and store all the information the
CPU needs.
j. Storage speed is unimportant when opening a program or a large data file.
k. Storage speed is important when loading your operating system.
l. Network speed also affects the computer’s performance. If the time to download a video is shorter than the
video time, the video will stutter if you try to play it on YouTube.
m. The network speed will negatively affect a computer’s performance when downloading applications or
games from the internet.
n. Buses are the electrical circuit as well as the whole communication system between two devices, including
the hardware components, the electrical requirements, the communication format and the software.
o. A faster GPU will allow you to browse the web much more quickly.
1.4.5 Answer the following questions in your own words:
a. Which four computer components can have a significant impact on a computer’s performance?
b. Why does the speed of a storage device determine how quickly a new program opens?
c. Why does the computer become slower if the RAM’s capacity is too small?
1.4.6 After owning the same computer for many years, you decide to upgrade your computer by purchasing a new
CPU. Fortunately, the CPU still uses the same socket as your motherboard, so you can install the CPU without
replacing the motherboard. However, after using your new CPU for a few days, you are disappointed that it has
not improved your computer’s speed as much as you hoped it would, especially in games.
With this scenario in mind, answer the following questions.
a. Although your computer has a brand-new CPU, you only have 2GB of RAM that is more than 10 years old.
How can RAM affect the performance of your computer?
b. Thinking back, your HDD might be even older than your RAM and runs at only 5 400 RPM. How will this
affect your computer’s performance?
c. Give three situations in which the speed of a hard disk drive is important.
d. Poor performance in games is often associated with a slow graphics card (or GPU). Why is this?
1.4.7 Sandy has been experiencing the following problems whenever she is on the network. The webpages and web
applications take a long time to open. She cannot download certain applications or games from the Internet.
Whenever her computer starts downloading updates from the Internet, she knows it Is going to take forever.
a. What causes this to happen?
b. List at least THREE other problems that she Is most probably experiencing.
c. What can she do to fix her problems?
2. Choose the answer and write ‘true’ or ‘false’ next to the question number. Correct the statement if it is FALSE.
Change the underlined word(s) to make the statement TRUE. (You may not simply use the word ‘NOT’ to change
the statement.)
a. The Peripheral Component Interconnect (PCI) slots (or expansion slots) allow you to plug additional
hardware like a GPU, sound card, ethernet card or Wi-Fi card into the computer.
b. The ROM is the short-term memory of the computer which can store and retrieve active programs and
data at very high speeds.
c. The path connecting different components on a CPU is called a bus.
d. Hard drives use the same technology as SSD’s but usually have a smaller capacity and are designed to
be a portable form of storage
e. The BIOS is the first program to run when a computer starts up.
3. List any TWO tasks that a motherboard performs.
4. What is an HDMI port? Do not just give what the abbreviation stands for.
5. List TWO ways HDMI ports can be used.
6. Briefly explain what a bus does and how it is used in a motherboard.
7. Your uncle has retired and has started a household tiles marketing business that he will run from home. He is
planning to use two rooms in the main house and the garage, which is detached approximately 10 m away from
the house, as a showroom to be fitted with multimedia display equipment. He has been reading a bit about
computer hardware and software and needs clarification from you.
a. Most of his literature refer to the modular design of the computer system.
i. What does the term modular design mean?
ii. Give TWO advantages of modular design.
b. Most books that he reads state that the performance of the computer depends on the amount of RAM it has.
i. Expand the term/abbreviation RAM.
ii. Why is RAM essential for the computer?
iii. Give THREE characteristics of RAM.
iv. RAM is usually supplied as small, rectangular electronic boards. What are these boards called?
c. Your uncle has been told that the computer system uses caching as one of its techniques to speed up its
operations.
i. Describe the term caching in a computer system.
ii. State the TWO types of caching found in the computer system.
iii. Identify TWO parts of the computer system which use caching.
8. You have decided to buy the following laptop for your start-up web designing business.
Use the laptop specifications to answer the following questions
a. Identify the CPU manufacturer.
b. What is the speed of the CPU?
c. What is the size of the CPU cache and RAM?
d. Is it normal for the RAM to have a much higher storage capacity than
the cache? Give reasons for your answer.
CHAPTER
SOFTWARE
2
CHAPTER OVERVIEW
Unit 2.1 Types of operating systems
Unit 2.2 Compilers and interpreters
Unit 2.3 Overview of processing techniques
Unit 2.4 Virtual machines and virtualisation
Learning outcomes
At the end of this chapter you should be able to:
● describe the various types of operating systems in terms of cost, size, hardware
needed and platform
● explain what language compilers and interpreters are
● describe and compare three different processing techniques: multi-tasking,
multi-threading and multi-processing
● give the purpose and examples of virtual machines
● describe virtualisation
INTRODUCTION
Android succeeded in making smartphones useful, everyday tools that anyone
could use. It has millions of applications that users can install – most of them free.
It allows people to easily connect to the internet and
allows people from across the world to access the
internet from their homes. Smartphones also replace
many devices including phones, digital cameras, alarms,
music players and even computers. Finally, it works with
a larger number of different devices, many of which are
affordable. Thanks to a combination of these factors,
Android was installed on 85% of all smartphones in
2018 and 42% of all computers (including desktop
computers, notebooks and servers). In contrast, the iOS
operating systems (used by iPhone) work on a very
small number of expensive devices.
In this unit, you will look at the three operating systems (stand-alone, network and
embedded) you already know in more detail.
3
Android
Linux Network
1 3 4
Stand-alone
ACROSS DOWN
1. To manage the hardware 1. To run the software for a specific tool
and software of a computer or appliance
2. An example of an embedded 2. Many computers are connected to
operating system each other but are presented as a
3. Example of a stand-alone one computer
operating system 3. A network system that is free and
popular to use
4. This type of operating system requires
8 GB – 32 GB space
Programming languages have been designed so that humans can read and write
it more easily.
Follow the QR link in the margin to watch an old but very simple video explaining
QR CODE
the difference between compilers and interpreters.
Activity 2.3
2.3.1 List TWO differences and similarities between programming code and
machine code.
2.3.2 You are interested in IT and are work-shadowing at a friend’s IT business for the
holidays. You know that programming language is a lot easier for people to read. https://www.youtube.com/
Unfortunately, your CPU cannot understand this program since it only watch?v=_C5AHaS1mOA
understands machine code. To solve this problem, you need an interpreter or https://qrs.ly/oka5pnn
compiler.
a. What is an interpreter?
b. Explain how an interpreter works. Code to CPU - line-by line
Compiler - builds ONE executable file/ Interpre.. executes the lines as it receives it
On very old operating systems, you could only load one program into the
computer’s memory at a time. This means you could only run one program at a
time! When this program was not doing anything, the CPU would also not be
doing anything. Today, most people would not be happy with a computer that
could only run one task at time; they want to be able to multitask!
On Windows 10, you can see a list of all these tasks running in the background by
opening the Task Manager. To open the Task Manager:
● Open your Start Menu and enter the words “task manager”.
● Open the Task Manager desktop application that is found.
You can also open the Task Manager by pressing the CTRL-SHIFT-ESC hotkey on your
keyboard. Once opened, you will see a list of every process running on your computer.
On most Windows 10 computers, there will be more than 50 applications and processes
running at any time.
Figure 2.4: Example of searching for ‘task manager’ in the start menu
New words
multitasking – the ability
of the OS to quickly switch
between many computing
tasks to give the impression
the different applications are
executing simultaneously
multithreading –
Figure 2.5: Only 3% of this CPU’s capacity is being used operations within a single
application are divided into
threads. Each of the
Rather than waiting for a single program to send new instructions, processor
threads can run in parallel.
multitasking allows the operating system to send instructions from different
The OS divides processing
processes to a single processor. If the instructions are sent and completed time among each thread
quickly enough, the processor can complete all the instructions from multiple within the application
applications without causing any of the applications to slow down. In this way,
threads – a way for a
you can run multiple applications (or processes) on one processor seemingly at program to split itself into
the same time. two or more simultaneously
running tasks
MULTIPROCESSING
Where both multitasking and multiprocessing use the same processor to quickly
swap between different tasks or threads, multiprocessing uses multiple Did you know
processors to complete tasks. Today, many CPUs (including smartphone CPUs) In 1975, the computer
are made up of more than one processor (called a core). Each core is then able scientist, Fred Brooks, said
to complete program instructions on its own. that just because it takes
one woman nine months to
Technically, a CPU with four cores should be able to complete four times as many make a baby, it does not
instructions as the same CPU with only one core. However, in practice this is not mean that nine women can
make a baby in one month.
always the case. For example, in most applications the instructions need to be
This is known as Brooks’
executed one after the other. When this is the case, it does not make sense for
law and it is also true for
one core to complete the first instructions while another core completes the last
multiple processors!
instructions.
The Task Manager can also show how each of the processors is being used. To see the
processor utilisation:
● Open the Task Manager and go to the Performance tab.
● Right click on the graph and hover over the Change graph to option.
https://www.youtube.com/ ● Select the Logical processors option.
watch?v=S3I5WNHbnJ0 The graph should change from a single graph to a few smaller graphs with each graph
https://qrs.ly/oza5pny showing the utilisation of one of the processors. The Ryzen 5 1600X CPU has twelve
logical processors, so the figure below shows how much each of these processors has
been used over the last 60 seconds.
QR CODE
https://www.youtube.com/
watch?v=hwTYDQ0zZOw
https://qrs.ly/43a5po5
MULTITHREADING
Where multitasking allows your computer to complete the instructions for different
processes by quickly switching between them, multithreading completes the
instructions for multiple different tasks inside the same program (called threads)
by quickly switching between them. Instructions from the same program are
divided into multiple threads. Each thread can be run independently and executed
when the CPU has time available between tasks.
Imagine that you are browsing the internet and decide to download a large file. If
a program could only run one task at a time, you would have to stop browsing
the internet while your browser downloads this file, and you would only be able
to continue browsing the internet once the download has completed.
Fortunately, multithreading allows your computer to split this task into separate
threads, with one thread managing the downloads while another thread manages
Activity 2.4
2.4.1 On a computer, multitasking allows you to run multiple tasks at the same time.
Look at the image below and answer the questions that follow.
a. How many tasks are running at the same time based on this image?
b. Give another name for a task that runs on a computer.
c. Give TWO advantages of multitasking on computers.
d. Give ONE disadvantage of multitasking.
2.4.1 Do the following tasks on a computer that runs Windows 10. Using what you
have learnt. Determine the following:
a. How many processes are running on the computer’s operating system?
b. How many threads are running on the computer’s operating system?
Virtualisation is the act of creating a virtual device. Each virtual device acts as a
node and is allocated its own virtual hardware, CPU, RAM and storage space.
QR CODE
These virtual machines behave in the same way as a real computer. For a virtual
machine to be created, the host machine has to be capable of hosting a virtual
machine. A virtual machine must have its own operating system and its own
applications installed. The different virtual machines also do not have access to
the host computer or any of the other virtual machines.
https://www.extremetech.
If you want to see how to create your own virtual machine, you can follow the QR com/computing/198427-
code in the margin. how-to-install-windows-10-
in-a-virtual-machine
https://qrs.ly/fpa5poj
QR CODE
CHAPTER
NETWORKS
3
CHAPTER OVERVIEW
Unit 3.1 Overview of physical aspects of a network
Unit 3.2 Overview of network innovation
Learning outcomes
At the end of this chapter you should be able to:
● list and describe network communication and data transmission
● list and describe the physical limitations of networks
● describe network innovations. including VOIP, VPNs and location-based computing
● define and provide examples of location-based services websites.
INTRODUCTION
In this chapter, you will learn more about networks, and specifically the way in
which data is transferred over a network. To understand data transfer, you will Did you know
look at the different network hardware required, the limitations of networks and In 2016, Amazon Web
how data is transferred on different network sizes. Finally, the chapter will Services used a sneakernet
conclude by looking at a few interesting network innovations. to transfer 50 petabytes
(that is, 50 million
gigabytes) of data by
NETWORKS loading a truck full of
In Grade 10, you learned that networks are incredibly powerful tools that most storage devices and driving
modern people and businesses depend on daily. Networks have thousands of the data to a data centre.
To download the same
different uses, including:
amount of data from the
● sharing resources
internet using a 100 MB
● organising information
fibre connection would take
● connecting people 250 years!
● providing access to entertainment.
3.1.1 You are considering setting up a Wi-Fi network to connect the devices in your
office and have decided on the above layout.
A friend suggests setting up a wired network.
a. Define a network.
b. Give TWO reasons why you need a network.
c. State TWO disadvantages of having a computer network.
d. Which network is more suitable for home, give reasons.
A computer network refers to a group of two or more computing devices that are
connected by a communication medium allowing the computers to communicate
electronically. A computing device on a network is usually referred to as a node,
being connected to one another, it allows nodes to exchange data with one
another using a connection media between them. The links can be established
either over cable media such as wires or via a wireless media such as Wi-Fi.
NETWORK USES
Wi-Fi Wi-Fi refers to wireless LANs connecting computers and devices
using radio signals communicating through wireless access points Router "Modem-Router"
over a short range (20 m).
WiMAX Worldwide Interoperability for Microwave Access is a technology
standard for long-range wireless networking for both mobile and fixed
connections. The speed gets slower as the distance to the transmitter Approx 35km
gets longer. WiMAX is flexible and low in cost. It can be installed
quicker than other internet technologies because it can use shorter
towers and less cabling.
4G/LTE 4G/ Long Term Evolution (LTE) is a wireless broadband technology
designed to support roaming internet access by cellphones and other
handheld devices.
5G 5G (the G represents the generation) is the fifth generation of mobile
networking technology. The 5G is not a replacement for 4G, so you
will find LTE/4G and 5G technology working together. 5G has
improved speed over LTE.
DATA TRANSMISSION
MEDIA
There are two types of networks, and three types of media to support them.
These are:
WIRED NETWORKS
A wired network is a network that uses a physical media to transfer data between
two or more nodes. The transmission medium for wired networks are Unshielded
Twisted Pair (UTP) and Fibre optic cables.
WIRELESS NETWORKS
A wireless network consists of transmitters and receivers. Nodes connect
wirelessly to these transmitters and receivers to complete the network. Home
Area Networks are often Wireless Local Area Networks (WLAN).
In a star network, the devices are connected to a central node, called a switch.
Nodes communicate across the network by passing data through the hub. Two
of the biggest advantages of a star topology is that new devices can easily be
added to the network, and if any connected device breaks, it does not affect the
rest of the network. The main disadvantage is if the switch fails then the entire
network becomes unusable.
CONNECTION DEVICES
A few examples of connection devices include:
Network Interface Card (NIC): Most desktop computers have a built-in ethernet
card, which would enable it to connect to a cabled network. Your laptop or
smartphone would most likely have a built-in wireless NIC.
3.2.1 In small groups populate the table to compare the composition, media and capacity of the different networks.
PAN HAN LAN WAN
Composition
(Topology, how is everything
connected)
Media hardware
Capacity (how many people or
devices can be connected)
3.2.2 Study the following representation of a network (from Google images) and answer the questions.
In the image it is shown that the network is used to share a printer (hardware) and Internet. List THREE other
reasons for having a network.
3.2.3 A star topology is used in this representation of a network.
a. Define the term topology.
b. Explain why the star topology is overall a popular choice.
c. List ONE disadvantage of a star network.
3.2.4 Your next work-shadowing experience is to meet with management of the local Nestle factory who outsource
their IT requirements to your friend’s IT business. They want to set up a network in their canteen for staff
access. A network card is an example of an important hardware component in a network.
a. List TWO other hardware components that are needed for a network.
b. What is a network card used for?
3.2.5 Differentiate between a router and a switch.
3.2.6 Max has decided to use Wi-Max technology to connect to the Internet.
a. State TWO other technologies you could have used to connect to the Internet.
b. Justify your reason for choosing Wi-Max instead of any of the TWO ways mentioned in the above question.
c. Name the device that you will need to link your local network to the Internet.
In this unit, you will learn about three network innovations that have proven their virtual private network
staying-power. These are: (VPN) – an encrypted
connection over the internet
● voice over internet protocol (VOIP)
from a device to a network
● virtual private networks (VPN)
● location-based computing.
VOIP to VOIP calls can usually be made for free. To make these calls, both the
person making the VOIP call and the person receiving the call must have an
account with the same VOIP service (such as Skype, WhatsApp, Facetime or
Discord). If you have access to a fast internet connection, this is a great way to
contact someone for free.
VOIP to VOIP calls can even include multiple people in a chat room or conference
call. For example, the application Discord allows you to open a permanent chat
room and voice chat with your friends. Once created, you can join the room from
your phone or computer and anything you say over your microphone will be
broadcast to any friends connected to the same room.
The second type of VOIP calls are made between VOIP and a phone. These
services usually cost money but are often significantly cheaper than making a
normal phone call. You are also able to make these phone calls directly from your
computer, which can be more convenient for some people. The application
Skype allows you to make VOIP to phone calls, but there are also many private
VOIP-to-phone service providers like Vox Telecom and InterExcel.
When talking about different types of networks, it is easy to get the words internet,
intranet and extranet confused.
The internet is a global network that allows computers from around the world to
communicate and share information (such videos or webpages). There is only
one internet in the world and that is the internet that all computers share.
Finally, the word extranet is used to refer to any network that combines an intranet
with the internet. Many companies build extranets so that their employees can
get the benefit of the intranet when they are not in the same physical space as
the local network. For example, employees can use an extranet from home to
access documents shared on their company’s intranet.
https://www.hyperoffice.com/blog/2018/06/20/intranet-examples/
Video
In the past, VPNs were mostly used by companies to allow employees to connect
to their internal networks from anywhere in the country. This was useful for
employees working from home, visiting clients, or working from a different office,
and VPNs are still often used in this way.
VPNs allow people to access the internet anonymously and securely, no matter
https://www.youtube.com/ your geographical location in relation to the server. For example, if you log onto
watch?v=_wQTRMBAvzg
the American VPN server, internet companies would assume that you are in the
https://qrs.ly/9aa5q28
USA.
This is simply one of the many ways in which location-based computing is used
to improve our lives. Other uses include:
● Weather applications that tell you what the weather in your specific area will
be, based on your location.
● Food ordering applications that use your location to deliver food directly to
you.
● Car sharing services like Uber that use your phone’s location to find the
nearest Uber driver, who will then pick you up and drop you off at the
correct location.
All these technologies use a combination of GPS and mobile internet connections
to improve the service they offer you.
Activity 3.3
CHAPTER
SOCIAL IMPLICATIONS
4
CHAPTER OVERVIEW
Unit 4.1 The social implications of location-based computing
Unit 4.2 Ethical and legal issues of network use policies and practices
Unit 4.3 Capabilities and limitations of ICTs
Learning outcomes
At the end of this chapter you should be able to:
● discuss the social implications of location-based computing
● explain the ethical and legal issues of network use policies and practices
● understand the capabilities and limitations of ICTs.
INTRODUCTION
The introduction of computers in our daily lives has created various issues in our
society. These include, legal, ethical, economical issues as well as issues with
regard to the digital divide. In this unit, we will be looking at the social issues
applicable to all content that we have covered thus far in Term 1.
In fact, in Japan, so many people (mostly men) have started doing this that they
have a name: Hikikomori. According to the Japanese psychiatrist, Tamaki Saito,
hikikomori refers to ‘cooping oneself up in one’s own home and not participating
in society for six months or longer …[without] another psychological problem as
its principal source.’ A 2010 study found that more than 700 000 people in Japan
were living as hikikomori.
Location-based computing (LBC) services are applications that use the position of a device and its user
in the provision of a value-added service. Examples of these applications include services such as Tinder,
Meetup or Windy, which use the geographic location of their users to provide or augment an activity.
These applications monitor a user’s location either willingly or covertly (by others).
Because users often carry their mobile devices with them, location data may be collected everywhere and
at any time, often without user interaction. The mobile device may keep track of what a person is doing
and their location. It can reveal visits to potentially sensitive destinations, like medical clinics, courts,
political rallies, and union meetings.
LBCs introduce a set of challenges from a social perspective. Although these applications have benefits
such as an increased sense of community, connectivity and access to information and place knowledge,
they bring with them many negatives as well. These negatives are loss of personal privacy, objective
access to knowledge, and the application’s influence on our relationship to physical places.
The extent of location information has also increased the risks of stalking and domestic violence because
perpetrators are able to use or abuse location-based services to gain access to location information about
their victims. LBCs make it easy for predators to locate potential victims, and they give the criminal more
than enough information to manipulate their target. Additionally, because an increasing number of minors
carry location-enabled cell phones and devices, location privacy will also become a child safety issue.
A few years ago, some soldiers posted a picture of helicopters arriving in Iraq on a social network. The geotag
attached to the photo gave insurgents the location of where the picture was taken, and they launched a mortar
attack that destroyed four of the newly-arrived helicopters.
Activity 4.1
4.1.1 Read the below article, then debate the use of location-based computing.
T he desire to be cool and embrace new technologies definitely overtook the desire to be safe with the very buzzy
mobile, location-based apps. You’ve got to love a smartphone app that broadcasts all sorts of information about
you – your likes, your age, your job – to everyone within sight who has the same app. Because it reduces friction,
right? It makes it easier to meet that good-looking guy or girl right over there who shares your love of kiteboarding
and Gorillaz. You can cut down lame conversations about things you have no interest in at all. Cool. Right?
The hype says these apps are all about possibility. But when reality sets in, you start to think about probability. For
example, the probability that a certain percentage of the people who look appealing to you when apps like Glancee or
Highlight bring them to your attention are going to be, well, creeps – or worse. The probability that apps like these are
putting out more information about you than you’re really comfortable with. The probability that your privacy, once
compromised, will never be whole again.
TERM 1 I CHAPTER 4 SOCIAL IMPLICATIONS I UNIT 4.1 The social implications of location-based computing 49
I have put together a list of eight things everyone should know about location-based services and social networks in
general.
No. 1 – Stalkers and paedophiles will like these apps No. 6 – Small pieces of information add up
Location-based services are a dream for sexual Cisco Systems’ Lance Hayden, who is a part-time faculty
predators and other criminals. They make it easy for member at the University of Texas and a former CIA operative,
predators to locate potential victims, and then they give told me about an exercise he conducts with his students –
the criminal more than enough information to most of whom tend to have that same idea that they control
manipulate his target. the information about them on the internet. He asks them to
No. 2 – If it is anywhere on the internet, consider put together an intelligence dossier on themselves, using
it public information available only on public internet sites. Invariably,
he said, as soon as the students start their projects, they
If you think you can put something on the internet, mark
show up early for the next class to ask him how they can get
it as private, and then not worry about it becoming
all of the information about them off of the internet. So who’s
public, you are wrong. There really is no such thing as
in control?
private data. Let’s say you post something on a social
network. Your privacy settings make you feel confident No. 7 – No, you can’t have separate online and
that the post is going to be seen by no one but your offline lives
friends. There is really nothing to keep that social Another comment from those SXSW attendees was that they
network from changing its privacy policy so that such protect their lives by having separate personas – one for
friends-only restrictions just disappear. online one and one for offline. They believe that what they do
No. 3 – Your circle of friends is much bigger than on social media can be kept completely separate from what
you think they do in the workplace and other venues. Sorry to break it
to them, but social network monitoring is a thriving business.
Do you really know all of the people you have friended
Companies use such services to screen potential employees.
on Facebook? Many people have hundreds of ‘friends’
on Facebook, and not a few have thousands. That Similarly, it’s foolish to believe that you’re protected
means the friends of your friends could number in the because you’ve shut down location-based apps. If you have
hundreds of thousands. had them turned on, you have sent out information about
yourself. If you have a stalker, he could well know where you
Considering that you likely are not true friends with
live and might be waiting for you there.
your Facebook friends, it’s safe to assume that at least
some of them are less than trustworthy. And when you No. 8 – You can’t predict all the ways these things can
consider ‘friends’ of ‘friends,’ the chances that some work against you
are reprobates, sickos or perverts are much larger. Suppose you go into a car dealership today with your
No. 4 – We all make mistakes smartphone in your pocket. The salesperson could use
Highlight or Glancee to find out your marital status and how
You might decide to give these apps a try and just be
many kids you have. He can discover where you work and
careful with them. You’ll turn them on only when you are
your job title. He can see whether you have checked in at
surrounded by friends and actively seeking to contact
other dealerships via Foursquare. He might be able to learn
people. Inevitably, though, because we all make
that you have asked your Facebook friends for car
mistakes, you will forget to turn the service off from
recommendations. In short, he can arm himself with a lot of
time to time, or you will set the parameters incorrectly.
information that will be useful in any negotiation. I think I
No. 5 – People lie would rather have them just pull my credit report.
Some lies might be considered harmless enough, but The price of ignorance
the thing that worries me about location-based social
The interesting thing about that car-buying example is that
apps is that they can expose you to sociopaths and
the advantage seems to go not to the person broadcasting
criminals. A sociopath who wants to meet you would
the information, but to the one receiving it. Like so many
have no qualms about checking out your interests and
other things on the internet, these new location-based apps
then going to Facebook to revise his own to bring them
are ‘free’ services. The big problem with location-based
in line with yours. Then he’s back in your vicinity with a
services is that they can place you at the whim of anyone
profile that Highlight or Glancee is all excited about. Hey,
who chooses to abuse you. Criminals are early adopters, and
nice to meet you!
they never miss an opening. Is your need to be cool worth
the risk of being a crime victim?
[To read the full article: Source: www.computerworld.com/article/2503019/8-realities-about-location-based-apps.html,
accessed 13 June 2019]
4.1.2 Read the below article about a location-based app that is used to locate missing persons.
a. Think about all the adults and children who are being reported as going missing in South Africa. How do you
think an app like this could help police to locate these missing adults and children?
b. Do you think there are any negatives to this app. Think about what could happen if this app was hacked.
TERM 1 I CHAPTER 4 SOCIAL IMPLICATIONS I UNIT 4.1 The social implications of location-based computing 51
Individuals are going to great lengths to locate unsecured wireless access points either for their own
benefit or the benefit of others.
Activity 4.2
In a recent case, an individual found an unsecured wireless network at a Lowe’s home improvement store. After
documenting the location, he went back with a friend. Together, they hacked into the Lowe’s system with the goal
of stealing credit card numbers of the store’s customers. The men were caught after they had managed to get six
credit card numbers, but the damage could have been far worse.
When an individual accesses another person’s network and uses their resources without their permission, it can be
considered stealing. It is illegal to use someone else’s bandwidth. In addition, the owner can lose their network
access if the provider finds any unauthorised actions via their connection, illegal or in excess of allotments.
The use of wireless networks to conduct confidential business is now standard practice. Highly confidential work
like legal matters are often done on unsecured networks using mobile devices. Anyone can hack the devices that
are connected to an unsecured network and take information from these devices. These networks range from
coffee shops to public spaces, such as airports, to home networks that are often not password-protected and can
be connected to free Wi-Fi.
With these scenarios in mind, discuss the following questions in small groups.
4.2.1 Should the average person be concerned about privacy?
4.2.2 By entering your interests on a search engine, do you give a company the right to sell that information?
4.2.3 By entering your private information on a social network, does that give the company the right to sell
your information?
4.2.4 What about the information entered on a smartphone?
4.2.5 Should companies be allowed to sell this information if they inform you?
4.2.6 Is it good or bad that you receive advertisements that match your browser history?
4.2.7 Would you allow data collection if it allowed complex services (such as Google Maps) to remain free?
In the previous chapters we discussed information and communications technology (ICT) and the role it
plays in our everyday life. We also discussed some of the limitations of ICT.
Work through the table below to revise the capabilities and limitations of ICTs.
CAPABILITIES LIMITATIONS
Computers perform tasks very fast. Some CPUs can Portable device such as laptops, PDAs and mobile
execute literally ‘billions’ of instructions per second. phones are limited by their battery life. These devices
only remain charged for so long before they need to be
plugged into the mains.
If programmed properly, computers are capable of Some devices have small screens and keyboards
performing the same tasks 100% accurately every making it difficult to read large amounts of text.
time.
Computers are able to perform many tasks at the Some portable devices are heavy (especially laptops).
same time. This does not make them ideal for carrying around.
Computers will carry out boring and repetitive tasks Low bandwidth means that large files will take a long
accurately. time to transfer.
Computers can be joined together (either as a LAN The ability of an ICT system can be affected by a
or a WAN) and this allows them to easily share number of factors including: hardware, software,
resources such as printers and data. suitability of the operating systems, communication
and input.
Computer databases can store enormous amounts Necessary hardware and software can be expensive.
of data including text, numbers, images and video.
Computers can search for stored data extremely fast.
Data can be secured with passwords or encryption.
Activity 4.3
For each factor explain why it is a limitation of ICT and how it could affect a business:
● hardware
● software
● suitability of the operating systems
● communication
● input.
TERM 1 I CHAPTER 4 SOCIAL IMPLICATIONS I UNIT 4.3 Capabilities and limitations of ICTs 53
Read the following information about location-based social networking sites and answer the questions that follows
for each app.
● Plazes allows its users to create a calendar of what’s going to happen and where it is going to happen in their
current area. Users can then notify their friends by hitting the ‘spread it’ button. This is a great way for friends
to connect.
● Citysense displays a map of where people are transmitting a cell signal from so you can see where your friends
are and get up to date information of local events.
● Whrrl lets friends share reviews, photos, the latest specials, deals, and so on,of restaurants, hotels, bars, clubs,
malls, movie theaters with one another. This app uses Google maps so you can specify a location to read
reviews of businesses in a particular area and what they all have to offer in order to choose which one is best
suited to what you are looking for.
● Brightkite is similar to Twitter and has a Facebook-like friend feed so that users can comment, upload and
share pictures on the location of where they are.
● Loopt turns your mobile device into a compass that allows a map to be populated showing the locations of your
friends and where they’ve visited. Comments and suggestions are easily left for others to see and the
application also has built-in support for instant messaging services.
1. What are the social implications for the location-based app?
2. What ethical and legal issues could happen due to the policies of the app?
3. What is the advantage and disadvantage of the app?
CHAPTER
COMPUTER MANAGEMENT
5
CHAPTER OVERVIEW
Unit 5.1 Safety and security
Unit 5.2 Threats
Unit 5.3 Remedies
Learning outcomes
At the end of this chapter you should be able to:
● discuss computer management issues regarding safeguarding against threats
● provide remedies for safety and security issues.
INTRODUCTION
When talking about computer criminals, it is easy to call all computer criminals
hackers. This is an oversimplification, with the word hacker referring to a specific
type of computer criminal who uses his or her computer skills to gain unauthorised
access to data. In fact, many security experts will argue that calling a hacker a
criminal is also incorrect since many hackers do not use their computer skills for
illegal purposes but are instead paid by companies to test their security systems.
Hackers can also use their skills to expose or prevent criminal activities. This
Chapter will look at the various cybercrimes and remedies for safety and security.
A cyber gang, much like a gang in real life, is a group of people who work together
to commit crimes. Just like in real life gangs, these gangs can be made up of
many loosely organised members (like the group Anonymous) or they can be a
small team of specialists.
In this unit, you will learn more about the different computer threats and how to best protect yourself from
them. Where Grade 10 looked mostly at digital computer threats, this unit will look at computer threats
more broadly, including problems caused by human error, hardware failure, physical computer threats
(such as theft), and finally digital computer threats (such as viruses and malware).
For each threat, you will learn what the threat is and how you can prevent it from affecting you.
HUMAN ERROR
The biggest threat to your computer and your data is always you!
Another common error made by humans is capturing incorrect information. This is more commonly called
GIGO, which stands for “Garbage In, Garbage Out”. According to GIGO, if you capture inaccurate,
unreliable or nonsense information on your computer then you can expect any program that uses this
information to provide you with inaccurate, unreliable or nonsense information. For example, If you enter
someone’s email address or phone number incorrectly then you will not be able to contact that person.
You have got to be aware of accidentally exposing sensitive information due to lack of vigilance or
negligence such as leaving your computer logged in or your cellphone unlocked. For example, if you store
a scanned copy of your Identity document on an flash drive and then you leave it lying around, a person
could gain access to this document and use it to steal your identity.
Activity 5.1
5.1.1 In small groups discuss when you made a human error, the consequences and how you can remedy it in
the future.
5.1.2 Explain GIGO and human accidents in your own words.
5.1.3 Design the strongest password activity.
Write a sentence that is easy to remember. This might be a line from a song or movie, a story about a place you
have been, or any other phrase you can remember. e.g Avengers
Take the first letter from each word to make your password (including capitalisation).
e.g. AveNgerS
Can also add a symbol on the end for extra length and complexity.
e.g. @v3N93r5!
Now try and make at least 3 diffrent passwords with varried complexity. Try and expore other creative ways to
make strongest passphrase.
5.2 Threats
PHYSICAL ACCESS
One way in which data can be lost is through theft. This can be the theft of a smartphone, notebook or
computer, or simply the theft of an external hard drive or flash disk.
● Do not leave your storage devices unattended in public spaces such as in school computers.
● Make regular backups of your data.
HARDWARE FAILURE
While most hardware can simply be replaced, losing a storage device means you also lose all the data
stored on the device, which could represent the loss of many years of work.
NETWORK VULNERABILITY
The final threat you will learn about are network-based threats. Since you already know about viruses,
spoofing and phishing, this section will look at these types of network threats. The table below describes
each of these threats in greater detail.
TYPE DESCRIPTION
Virus A computer virus is malicious software that is loaded onto a user’s computer without their knowledge,
replicates itself and performs malicious actions.
Worm A computer worm is a type of malware that spreads copies of itself from one computer to another.
A worm can replicate itself without any action from the user and it does not need to attach itself to
another program to cause damage. Worms will scan a network for open ports and use those openings
to spread through the network.
Trojan A Trojan is a type of malware that is often disguised as useful software. Trojans can be used to gain
access to users’ systems. Users are tricked by social engineering executing the Trojan on their
system. Once activated, Trojans can enable cyber-criminals to gain backdoor access to your system.
One of the most dangerous types of trojan horses is called a keylogger, which recordskeystrokes.
Rootkit A third type of virus is called a rootkit.
Rootkit is malware that is designed to infect a computer and allow an attacker to install a set of tools
that grant him remote access to the computer. The rootkit is hidden within the operating system and
will be designed to hide from anti-malware applications. Rootkits act as a backdoor that gives the
attacker the ability to connect remotely to the infected machine whenever he chooses and remove or
install specific components. Gives access to the root of a drive/admin-rights
Activity 5.2
5.2.1 In small groups, mind map the three types of threats, their definitions and examples.
5.2.2 For each threat try to list or research remedies.
5.2.3 Match the COLUMN A with the correct answer in COLUMN B. Write down only the question number (1.1 –1.10)
and the matching letter (A – H) in COLUMN B in your Theory writing book, for example 1.1 – M.
COLUMN A COLUMN B
1. When sensitive information (such as usernames, passwords and banking A. Phishing
details) is obtained by sending emails to users that look like official emails. B. Ransomware
2. Refers to when a fake social media account is created to gain someone’s trust. C. Theft
3. A malicious virus that locks all a user’s files and encrypts data on the computer. D. Pharming
4. Malicious software that is loaded onto a user’s computer without their E. Virus
knowledge, replicates itself and performs malicious actions. F. Hacking
5. This is an official-looking website that requests sensitive information G. Spoofing
6. H.
7.
a. Describe TWO features in the e-mail that confirms the e-mail to be a phishing attempt.
b. Explain the main difference between phishing and pharming.
5.3 Remedies
For each threat that was discuss in the previous unit we will look at remedies so
that your system can be secure.
CREATING A BACKUP
Creating a backup is the process of making copies of your computer’s data to
use in the event that the original data or are lost or destroyed.
TYPES OF BACKUPS
DIFFERENTIAL BACKUP
Differential backups start with a full backup and after that copies those files that
have been changed since the full backup took place. So if a full backup was done
on Day 1, Day 2s differential will copy all of the files that have changed since Day
1s backup. Day 3s backup will also copy all of the files that have changed since
Day 1.
Because a full backup was taken and the differentials copied everything that
changed after that, only the full backup and the latest differential need to be
restored.
The size of the differential copy increases each time a backup is taken until the
next full version is made.
INCREMENTAL BACKUP
Incremental backups also start with a full backup. After that, a copy of the files
that have changed since the last backup is made, whether it was a full or
incremental copy. If a full backup was done on Day 1, Day 2s incremental will
back up all the files that have changed since Day 1. Day 3s incremental backup
will only copy those files that have changed since Day 2s incremental backup.
A disadvantage is that when you want to carry out a complete restore, the most
recent full backup and all of the subsequent incremental copies must be restored.
This can make the restore process a lengthier one than when using a full backup
plus the most recent differential copies only.
LOCAL BACKUP
Local backups are made on a storage medium that is kept in the same location
as the original data. It could be on an external hard drive or Network Attached
Storage (NAS). Local backups can protect data from hard drive failures, accidental
deletion and virus attacks.
OFFSITE BACKUP
When the backup storage media is kept at a different location from the source,
this is known as an offsite backup. The backup can be done locally and then the
storage medium is moved to another place. Offsite backups provide extra
protection from theft, fire and natural disasters.
ONLINE/CLOUD BACKUP
Online backups are done frequently to a storage medium that is always connected
to the source being backed up via an internet connection. Many commercial data
centres offer this as a subscription service to customers. This offers the same
protection as an offsite backup.
A UPS contains a battery that takes over when the device detects a power failure.
If a user is working on the computer when the power fails, they have enough time
to save what they are working on and shut the computer down before the battery
runs out. A UPS will also regulate any power surges so that the power surges do
not damage the computer and you do not lose any data when a power failure
occurs.
PASSWORDS
The following guidelines will help you to set a strong password. This will stop
hackers from finding out your password and using your account illegally:
● Always use at least 8 characters in your password, at least two of which are
numeric.
● Use a mixture of both uppercase and lowercase letters
● Includee a mixture of letters and numbers
● Include of at least one special character for example, ! @ # ? % *
● Do not use personal information in your password that someone else is likely
to be able to figure out.
● Never use a password that is the same as your account number.
● Do not use passwords that are easy to spot while you’re typing them in.
Passwords like 12345, qwerty (i.e., all keys right next to each other), or
nnnnnn should be avoided.
FIREWALL
A firewall is hardware, software or a combination of both, that monitors incoming
and outgoing traffic on a network. The firewall decides whether to stop the traffic
based on a set of predefined security rules. Its purpose is to create a barrier
between an internal network and incoming traffic from external sources to block
potentially malicious traffic.
ANTI-VIRUS
Antivirus software is system software designed to prevent, detect and
remove malware infections on computing devices.
VALIDATION
To prevent theft of data and personal details, computer systems must be
programmed to validate whether the user that is logging into the computer is an
authentic user or not.
Activity 5.3
5.3.1 In small groups, add to your mind map, from the previous activity, the remedies for
each threat you identified.
ELECTRONIC CHAPTER
COMMUNICATIONS 6
CHAPTER OVERVIEW
Unit 6.1 Mobile/wireless e-communication
Unit 6.2 Use of mobile technology
Unit 6.3 Use of wireless technologies
Unit 6.4 Data security
New words
social media – a form of
Learning outcomes electronic communication
through which users create
At the end of this chapter you should be able to:
online communities to
● explain the purpose, writing style and audience for e-communication
share information, ideas,
● list and describe uses of mobile technology
personal messages, and
● describe the uses of wireless technologies
other content
● describe how communication protocols are used to control data
● provide methods of practising data security. influencers – people who
have built a reputation for
their knowledge and
expertise on a particular
INTRODUCTION topic
vlogging – a blog in which
Today, young people from around the world have realised that money can be
the postings are mostly in
made if you have a large enough online following.
video form
Many brands are working with internet personalities and influencers to market podcasting – a digital
recording of music, news or
their products. YouTubers, streamers and social media celebrities are becoming
other media that can be
more professional every day, and what used to be something that anyone with a
downloaded from the
webcam and microphone could do, has suddenly turned into big business.
internet to a portable media
player
In this chapter, you will learn more about modern electronic communications,
streaming – when a
specifically, mobile communications. This will include classic forms of
multimedia file can be
communication like email and SMS, as well as modern forms like vlogging,
viewed without being
podcasting and streaming. You will also learn more about mobile devices and completely downloaded
the protocols used to transfer data between these devices.
The following are some guidelines you can follow when communicating on the
internet:
● Show people on the internet the same respect you would show to them in
person.
● Do not say things to people you would not say to them in person.
● Do not post things on the internet that you would not want your mother or
future boss to see.
● Things posted on the internet often last forever. This means that things you
post as a teenager or young adult can negatively affect the rest of your life.
● Make sure your messages are clearly written and easy to understand.
● When joining an existing conversation, speak about subjects relevant to the
topic.
● Try to make useful contributions and help people out on the internet.
● If you need help from the internet, do not expect other people to do all the
work for you. Do as much work as you can before asking your question.
● See if there are existing conversations about your topic before starting new
conversations.
● Do not spam people! Do not post the same advertisement repeatedly.
While the tips covered in this section are generally good guidelines, it is important
to note that netiquette differs from site to site and changes over time. When
joining a new website, spend some time figuring out what acceptable behaviour
is for that website before sending your own messages.
TTYL OMW
LOL OMG
BRB
a. Consider the context of the words she uses in her email messages and list TWO
e-mail etiquette (netiquette) rules that have been violated.
b. Which other e-communication medium are these words best used for?
c. Briefly explain to Jenny how she is supposed to send emails to colleagues
at work.
In this unit, you will learn more about different communication methods and how
they can be applied using wireless technology. For each technology, you will look
at what it is, how it is used, what its advantages and disadvantages are, and a
few popular examples of the tool. Let’s start with the most commonly used
technology: E-mail.
E-MAIL
Email is short for “electronic mail,” and is one of the most popular uses of
the Internet. It allows you to send and receive messages containing text, images,
or other attachments to and from anyone with an email address, anywhere in the
world.
When typing an email message, it is vital that you use good netiquette. You
should always include a subject that summarizes the topic of the email. Begin
each message with the recipient’s name and end the message with your name or
“signature”.
● communication
● sending files
● marketing
As one of the first internet services, there are millions of different email providers
today with most large web services offering a free email service. Some examples
common include::
● Gmail
Figure 6.1: Gmail is the most ● Yahoo Mail
popular free email provider ● Outlook.com
BLOGGING
The first form of one-way conversation is blogging, in which a website creator
posts short, informal stories or articles on their website. It is a discussion or
informational website published on world wide web consisting of discrete, often
informal diary style text entries.
The Audience is generally people who are interested in the content of that specific
blog.
MICROBLOG
Microblogging is a combination of blogging and instant messaging that allows
users of social platforms such as Twitter to conveniently create short messages
to be posted and shared with an audience online. Microblogs are usually limited
to 280 characters, so messages must be short and to the point.
SMS
The second oldest form of electronic communication is SMS (or short message
service). The first SMS was sent in 1992. Since the early 90s, any mobile phone
could send a short message (or SMS) to another mobile phone. These messages
had a maximum length of 140 characters (including spaces), cost a small amount
per message and were asynchronous. This made them an excellent tool for
sending small amounts of information to someone or for having short
conversations.
Today, SMSs are rarely used for personal communication since instant messaging
and social media applications can send the same short messages for free.
Instead, the only situations in which SMSs are commonly used are:
● the sender does not know the message receiver
● the sender does not have internet access needed for instant messaging
applications
● the sender does not have a phone capable of using instant messaging
applications.
● Some banks also use SMSs to notify customers of transactions on their
bank accounts.
ADVANTAGES DISADVANTAGES
Quick and easy to send More expensive than instant messaging
Available on all mobile phones Limited number of characters per message
Asynchronous communication Cannot send photos, videos or emojis Change to MMS
Can be sent without internet access Often used for marketing or spam
More affordable than a phone call
Figure 6.3: A spam SMS
The picture in the margin shows a typical example of a spam SMS.
Together with voice calls, instant messaging is the most popular method for
people to have electronic conversations in 2018. It is used to communicate with
friends and acquaintances, have group conversations, organise events and share
multimedia with people. In fact, it has become so popular that many businesses
are using instant messaging applications to communicate directly with customers
such as Absa’s ChatBanking and Afrihost’s WhatsApp Assistant.
Did you know
In 2017, more than The table below summarises the advantages and disadvantages of instant
29 million WhatsApp messaging.
messages were sent per
minute. This is equal to Table 6.2: Advantages and disadvantages of instant messaging (IM)
more than 40 billion ADVANTAGES DISADVANTAGES
WhatsApp messages
Messages are free to send Messages are not permanently saved
per day!
and backed-up
Possible to see when messages are Too informal for some settings (such as
received and read business communication)
Asynchronous communication Message recipients are under pressure
to respond to all messages.
Messages are shorter and more Can be a distraction
conversational
Can create group conversations
Can share multimedia like emojis,
pictures, videos and voice recordings
Figure 6.4: A WhatsApp The picture in the margin shows a typical example of a WhatsApp conversation.
conversation
The advantages and disadvantages of video casting are shown in the table
below.
ADVANTAGES DISADVANTAGES
Easy to connect with an audience Requires basic recording equipment
Do not have to create your own website Requires basic video editing knowledge
Does not need to be professional Can be very time consuming
PODCASTING
The final type of electronic communication discussed in this chapter is podcasting.
Podcasting (or a podcast) refers to an audio only broadcast released on the
internet. It is a free service that allows Internet users to download audio files from
a podcasting Web site to listen to on their computers or personal digital audio
players. As with blogging and vlogging, there are thousands of different types of
podcasts, from novels and dramas, to news and talk show podcasts to popular
culture and documentary podcasts, which means that there is a podcast for
every type of audience.
The advantages and disadvantages of podcasting are listed in the table below.
As soon as people start subscribing to that audio file or your CDs of Audio files
through RSS feeds, that is what turns it into a Podcast or episodes of a podcast.
When you have podcasts that talk about a certain topic then you would have a
podcast series.
ADVANTAGES DISADVANTAGES
Did you know Good to listen to while travelling Can be time consuming and difficult to
Videocasting is like make, especially scripted podcasts
podcasting, but with videos Good way to get a daily update Needs a good reader, good information
and audios. While and good writing to be interesting
videocasts may be more
Can be professional or relaxed Audience for podcasts is smaller
informative than vlogs,
there is significant overlap Can be very informative
between the two types Can be downloaded to your device and
of videos. listened to without an internet connection
Although VOIP is much cheaper than analogue phones, VOIP systems initially
suffered from many technical problems. These days VOIP is widely used and,
together with cell phones, has caused the analogue phone system to shrink to a
fraction of its original size. As you will see in the next section, VOIP is often
combined with video conferencing tools and included in smartphone applications.
This gives users the convenience of making a call from their phone, without the
cost normally associated with a call.
VIDEO CONFERENCING
Video conferencing refers to a set of technologies that allow a person to make a
video call to one or more people at the same time. These calls are like phone calls
but can also include a video broadcast of the people in the call. Popular examples
Figure 6.5: A video call made
of video call applications include Skype, FaceTime and Discord.
in Skype
Video calls are mostly used by people who want to have a comfortable
conversation. Since more than half of what people say is nonverbal (that is, body
language), being able to see the person you are speaking to helps to avoid
confusion and misunderstandings.
However, video calls and video conferences also have different uses. For example,
video calls are sometimes used to broadcast a live event to people (such as a
sporting event, childbirth or home viewing). Video conferences are also often
used in business environments, where they allow people from across the world
to attend a meeting or view a presentation.
ADVANTAGES DISADVANTAGES
Calls are free to make Requires a fast internet connection
Can contain sound and visuals Uses a significant amount of data, so can be expensive
Allows non-verbal communication Can experience delays (or lag) on slow internet
Only if camera is on! connections
Can easily transfer visual information Requires both sender and receiver to be available at the
same time
Conversation is synchronous, which means a direct
conversation can take place
Video broadcast can be disabled to decrease the
amount of data used
Activity 6.2
6.2.1 Match the COLUMN A (1.1 – 1.12) with the correct answer in COLUMN B. Write down only the question number
and the matching letter in COLUMN B (A – L).
COLUMN A COLUMN B
1. Instant messaging A. Internet service provider
2. SMS B. Social networking
3. Blog C. Website creator posts short, informal stories or articles on
4. e-mail their website
5. D. Calls made using the internet
6. VOIP E.
7. Video calls
F. Limited number of characters per message
8. Podcast
G. Too informal for some settings (such as business communication)
9. Vlog
H. Audio only broadcast released on the internet.
10. Very short stories (or “status
updates”) are posted I. Show several informal, conversational videos with the most
popular video appearing first
J. Microblog
K. Sometimes used to broadcast a live event to people
L. Electronic version of mail
In this unit, you will learn more about the use of mobile technology. The section will
look specifically at mobile phones, feature phones and smartphones.
MOBILE PHONES
Mobile phones were designed specifically to make calls and send SMSs.
Occasionally, the phones had a few additional features like a calculator or timer,
but these features were not as important as the phone’s ability to make calls and
send SMSs.
Figure 6.6: The Nokia 3310 is
one of the most popular cell
phones ever made
FEATURE PHONES
Feature phones could send multimedia messages, play music, take photos, read
emails and browse the internet. While these features are like smartphone features,
they differ in two important ways:
● feature phones had a very weak processor, low quality screen and poor camera
● applications had to be designed specifically for each feature phone and there
was no App store.
Because of these limitations, feature phones were more like “dumb phones” with
Figure 6.7: The Motorola Razr
a few extra features, while smartphones are more like computers that can run any
was one of the most popular
program designed for the operating system.
feature phones
SMARTPHONES
A smartphone has advanced features, including a high-resolution touch screen
display, WiFi connectivity, web browsing, software applications and a mobile
Operating System.
MOBILE BROWSERS
One of the biggest advantages of smartphones is that they provide access to high
speed internet and the world-wide web. To access the internet through a
smartphone, you need to use a mobile browser app such as Chrome (for Android)
or Safari (for iOS). Like a web browser on your computer, mobile browsers allow
you to visit webpages and browse the internet.
While visiting websites from your smartphone, you may notice that they look
slightly different from what you are used to. This is because mobile websites are
changed to make them easier to read from a mobile device. In general, mobile web
pages differ from their desktop pages in the following ways:
● Mobile phones are smaller, so less information can be shown per screen.
● Mobile phones can be rotated, so pages need to automatically adapt to the
width of the screen. Figure 6.9: A mobile browser
Activity 6.3
In this unit, you will learn more about the different wireless network technologies,
as well as a few of the most common protocols used to send and receive data
over these wireless networks.
WIRELESS TECHNOLOGIES
● Access points: a networking hardware device that allows other Wi-Fi
devices to connect to a wired network
● Difference in range and bandwidth: range refers to the measurement of
how far data or a signal can be transmitted and received, while bandwidth
refers to how much data you can send through the network
● Connection speed (shaping and throttling): refers to the speed that data
is transferred between a device and the internet. Throttling occurs when
your ISP intentionally slows down your internet speed, while shaping is the
lowering of available bandwidth by your ISP once you have exceeded your
monthly limit
● Blockchain: refers to a growing list of records, called blocks, that are linked
using cryptography.
Wireless access points (WAPs) are networking devices that allow Wi-Fi devices
to connect to a wired network. An access point acts as a central transmitter and
receiver of wireless radio signals. If you use a tablet or laptop to get online, you
are going through an access point, either hardware or built in, to access the
internet without connecting to it using a cable. Due to differences in the wireless
frequencies, range, bandwidth as well as technological differences, different
wireless technologies have different uses. For example, bandwidth throttling is an
intentional slowing of available bandwidth, lowering of the “speed” that’s typically
available over an internet connection. Bandwidth throttling can happen at various
places between your device (like your computer or smartphone) and the website
or service that you’re using over the internet. Another example is Internet shaping,
this is the lowering of available bandwidth by the Internet Service Provider (ISP)
to a customer when that customer has exceeded their monthly limit.
The table below summarises the most commonly used wireless network
technologies:
New words
By the end of 2018, 99% of all people in South Africa live in areas with access to
protocol – a set of rules
3G and more than 90% of people live in areas with access to 4G.
that describe how data is
The rules and regulations that need to be followed to ensure successfull communication. sent between two
computers
PROTOCOLS
In Grade 10 you learned that a protocol is a set of rules that describe how data
is sent between two computers. For two computers to understand the information
that is being sent between them, they need to use the same protocol. This tells QR CODE
the computer that is sending the data how to package the data while also telling
the computer that receives the data how to understand and interpret the data it
receives.
To see how protocols are used, you can look at four different protocols: POP3,
SMTP, IMAP and VoIP.
● POP3: POP3 (Post Office Protocol version 3) is one of the protocols that is
used to retrieve emails from your mail server. POP3 tells your email https://www.youtube.com/
application how to communicate with this server, find out if any emails were watch?v=j7kMZD81hec
sent to your address and download the emails to your computer. https://qrs.ly/35a5qee
Activity 6.4
6.4.1 Indicate whether the following statements are TRUE or FALSE. Correct the statement
if it is FALSE. Change the underlined word(s) to make the statement TRUE. (You may
not simply use the word ‘NOT’ to change the statement.)
a. SMTP is the protocol used to receive emails.
b. Services like WhatsApp or Skype use VoIP to allow users to make free voice
calls to other WhatsApp or Skype users.
c. SMTP stands for Short Message Transfer Protocol and is used to send emails.
d. POP3 is the only protocol that can be used to receive email messages.
e. HTTP and HTTPS are used to transfer files over the internet.
6.4.2 You have decided to place 3G connectivity instead of ADSL connectivity in your living
room. A wireless router will be used to connect all your mobile devices and
computers to the internet
a. What is wireless technology?
b. 3G/LTE connectivity is becoming popular in many homes. Explain what 3G is.
c. What type of network category does 3G fall in?
d. List ONE advantage 4G/LTE has over 3G.
e. What medium of data transmission is used in 3G/LTE?
6.4.3 Protocols are necessary to enable transmission across a network or the Internet.
Briefly describe where each of the following will be used.
a. VOIP
b. POP3
To keep users’ computers and data safe, computers include several security
features. In this unit, you will learn about three safety and security features,
namely:
PASSWORDS
The first security feature on most computers and online services is a password.
By adding a password to a computer, only people who know the password can
access the computer and its files.. If you create a secure password that you do
not share with other people, you should be the only person who is able to access
your computer.
For online services, anyone from anywhere in the world can try to login to your
QR CODE
account, the only thing stopping them is your password. To make sure your
password is as secure as possible, you should use the following guidelines:
● Choose a password that is long (at least 8 characters).
● Include uppercase and lowercase letters, as well as numbers, in your
password.
● Never use personal information such as a birthdate or the name of your
favourite sports team as a password.
● Create different passwords for different websites. In this way, if someone
https://informationisbeautiful.
hacks your social media account, they cannot use the same password for net/visualizations/worlds-
your online banking. biggest-data-breaches-
hacks/
● Do not share your passwords with other people and do not write your
https://qrs.ly/vca5qel
passwords down.
ENCRYPTION
The final security tool used on computers is encryption. With encryption, any data
sent between two computers is changed from something that is useful to
encrypted data that is difficult to decrypt and use by unauthorised people. The
only way to turn the encrypted data back into useful data is to know the encryption
key, which is only known by the receiving computer.
Today, most websites use the HTTPS (HyperText Transfer Protocol Secure)
protocol which ensures that all data sent to and from the website is encrypted.
Most online services today also encrypt personal user information in their
databases, which means that, even if a hacker gets access to the database, they
cannot just read all the user’s usernames and passwords.
MULTI-LAYER VERIFICATION
Multi-layer authentication is an authentication method, much like a password, in
which a computer user is granted access only after successfully giving two or
more pieces of evidence to an authentication mechanism:
● knowledge (something the user and only the user knows) e.g. your ID
number or mother’s middle name
● possession (something the user and only the user has) e.g. accept
verification on another device
● and inherence (something the user and only the user is) e.g. voice or
fingerprint verification
6.5.1 Match the COLUMN A (1.1 – 1.12) with the correct answer in COLUMN B. Write
down only the question number and the matching letter in COLUMN B (A – L).
COLUMN A COLUMN B
1. Firewall A. This protocol tells your email application what
2. Password information is needed to successfully send an
email
3. Encryption
B. Wireless LANs connecting computers and
4. Protocol
devices using radio signals communicating
5. VOIP through wireless access points over a short range
6. Wi-Fi
C. These are installed on the user’s computer and
7. POP3 protects a single computer.
8. Software firewall D. A security feature on most computers and online
9. HTTPS services
10. SMTP E. A set of rules that describe how data is sent
11. Hardware firewall between two computers
12. Bluetooth F. Determines how the voice data should be sent
and received
G. This works by allowing any data you request or
send to go through while blocking any
unrequested information
H. Any data sent between two computers is
changed from something that is useful to
encrypted data that looks like nonsense.
I. This one of the protocols that is used to retrieve
emails from your mail server.
J. This protocol ensures that all data sent to and
from the website is encrypted
K. Connects devices over short distances using
radio waves.
L. This is installed between a local network and the
internet and protects all the computers on the
network.
6.5.2 A password is used to protect your computer from others accessing it. Answer the
following questions regarding security of a computer.
a. Explain how using a password for online services can protect you.
b. List THREE ways to make your password secure.
c. What is encryption?
d. What do most websites use to enable encryption?
COLUMN A COLUMN B
1. SMTP A. Skype
2. Social Networking B. Audio only broadcast released on the internet.
3. VOIP C. Instant messaging
4. Asynchronous D. Very weak processor, low quality screen and poor camera
communication E. Installed on a server or router that protects all the computers on the
5. Cell phone network.
6. Podcast F. Virtual community that communicates and interacts via the internet
G. Like Wi-Fi, but has a much bigger range of up to 50 km
7. Feature phone
H. Protocol responsible for delivery of mail
8. POP3
I. These phones were designed specifically to make calls and send SMSs
9. HTTP
J. One of the protocols that is used to retrieve emails from your mail server.
10. WiMAX
K. Determines how web pages are viewed
11. Software firewall
CHAPTER
SOCIAL IMPLICATIONS
7
CHAPTER OVERVIEW
Unit 7.1 Effects of digitalisation
Unit 7.2 Protecting your online identity
Learning outcomes
At the end of this chapter you should be able to:
● describe the effect of digitalisation on future careers
● explain the effect of digitalisation on the workplace and employment practices
● describe ways to protect your online identity.
INTRODUCTION
Combined the computer, mobile phone, internet and the World Wide Web now
affect most Western people’s lives on an everyday basis. More than half of the
world’s population is connected to the internet in one form or another. Technology
has provided an interconnectedness in society and paved the way for digitalisation.
Figure 7.1: In the industrial revolution, machines did simple, repetitive tasks
Activity 7.1
Digitalisation is the integration of digital technologies into everyday life and the
computerisation of systems and jobs for better ease and accessibility. We see
this mainly in the rise and effect of social media on society, businesses use of cell
phones to keep up to date with their customers, and entrepreneurs starting
companies. Let’s look at the future of careers due to digitalisation to see how
digitalisation has affected the workforce.
SOCIAL IMPLICATIONS
There are ethical and social issues with information systems to show how it has
impacted society.
Our current society is very dependent on information systems which has become
a part of our daily life in almost every aspect, the workplace, our private life’s, the
government and even to individuals with no access to these systems are affected
in some way.
Impact on society:
● Sharing of Information
● Education
● Enviroment
● Political
ETHICS
Ethics is referring to the right and wrong of an individual acting on free will using
choicechoice to determine their behaviour.
Not all ethical choices are the right ones and some behaviour creates social
issues. This issues are related to privacy and security.
Figure 7.2: Not all ethical choices are the right ones
The table below lists and describes a few of the ICT careers.
Virtual offices that businesses can rent are like shared working spaces. Once rented, the business gains
access to a business address, conference rooms, printing and faxing services, a phone number and a
receptionist. However employees will still work remotely.
DECENTRALISATION OF LABOUR
Decentralising labour means that people no longer have to be together in an office to perform many
different types of jobs. This means that they can work from home and avoid drains on their time such as
sitting in rush hour traffic every day. The fact that internet speeds have vastly increased in recent years
means that people can still attend meetings when necessary, using video conferencing.
OFFICE AUTOMATION
Office automation is the collective hardware, software and processes that
allow automation of the information processing and communication tasks in
an organisation. Computer technology and software are used to digitise,
store, process and communicate most routine tasks and processes in a
standard office. This allows office workers to have more time for other tasks.
Automating tasks in the office can have both positive and negative effects on
workers. Certain tasks can be performed more quickly and accurately using
a computer, which would allow the workers to spend more time on other
aspects of their jobs. Workers may be resistant to the fact that they would
have to learn how to work with computing devices in order to complete these
tasks and they may feel that their jobs are threatened by the devices.
ARTIFICIAL INTELLIGENCE
Artificial intelligence (or AI) refers to a field of computer studies in which
programmers try to create or simulate human intelligence in machines. In the
workplace, the goal of AI is to allow computers to do tasks that typically
Figure 7.3: Google Assistant can
require human intelligence. This can be anything from analysing data to
understand natural language
directing phone calls to the correct employee. questions
Not all AI programs have to talk like humans. Instead, some AI programs can
see the world and act according to what they see. For example. self-driving Figure 7.4: Google’s self-driving
cars need to constantly analyse the world around them to drive safely. At the cars are much safer than human
end of 2018, Google’s self-driving cars (called Waymo) have driven more than drivers
15 million kilometres on public roads without causing a single accident. They
have, however, been involved in a few accidents where humans drive into them!
Most modern accounting packages use similar technology to automatically classify receipts and expenses.
This is one example of office automation, where AI helps to automatically complete tasks that used to be
done manually. Other office automation examples include:
● ordering new stock before it runs out
● paying employee salaries automatically
● giving voice directions on phones
● receiving and processing payments.
Collectively, these tasks have dramatically reduced the number of administrative staff that is needed in
most offices.
ROBOTICS
Robots can effectively be used to perform tasks that would be too dangerous for Did you know
a human to perform or that require a large degree of repetiton. They could also be Professional
used to perform tasks that require strength beyond what a human being would services such as
Exoskeleton have. accountants and
lawyers have seen
With the combination of Artificial Intelligence and robotics, society will start to see significant
the automation of certain tasks. productivity
improvements
Once again, these advances will create new jobs such as the research and thanks to
designing of these systems. computers while
also seeing
increased
While AI and automation might sound bad for employees, especially in a country
employment
like South Africa with a high rate of unemployment, these changes are good for
opportunities
most people. As automation decreases the cost of labour, the price of goods and
thanks to changes
services go down. When people save money on these goods and services, they in the economy.
can spend more money on other items that then require more human labour.
An important thing to remember is that human qualities such as social, emotional, and higher cognitive
skills, involving creativity, critical thinking, and complex information processing, will also become more
valuable.
Activity 7.2
7.2.1 Complete the table, explain how digitalisation has affected either positively or negatively, these areas:
AREA EFFECT OF DIGITALISATION
safety
productivity
accessibility
sustainability
privacy
7.2.2 Read the below case studies and give your opinion about whether digitalisation has positively or negatively
affected our lives. Support your choice with facts.
Everyday objects such as watches, Digitalisation can help in providing electricity to the 1.1 billion
home appliances and cars are being people who still lack access to it. In certain countries in
connected to communications sub-Saharan Africa, mobile phones are more dominant in
networks – the ‘internet of Things’ homes than electricity. Mobile phones and their network cell
(IoT) – to provide a range of services towers, may be able to help provide access to a large type of
and applications, such as personal energy services. New digital tools can also promote
healthcare, smart electricity grids, sustainability, including satellites to verify greenhouse gas
surveillance, home automation and emissions and technologies to track air pollution at the
intelligent transport neighbourhood level.
Activity 7.3
Case Study 1
Case Study 2
Back in 2011, former Alaska governor Sarah Palin Palin’s official Twitter account at the
time, AKGovSarahPalin (now@SarahPalinUSA), found itself lost in a sea of fake
accounts.
In one incident, a Palin impersonator tweeted out an open invite to Sarah Palin’s family
home for a barbecue. As a result, Palin’s security staff had to be dispatched to her
Alaska residence to deter would-be partygoers.
Many public figures and politicians, like the 2016 presidential candidate Donald Trump,
have a host of fake accounts assuming their identity.
TERM 2 I CHAPTER 7 SOCIAL IMPLICATIONS I UNIT 7.2 Protecting your online identity 89
1. Explain how digitalisation is reducing the amount of staff needed for the below careers.
FARMER
SECRETARY
MECHANIC
MEDICAL FIELD
2. Provide the job description for the below careers. Explain if you would you like to work in this career.
CHAPTER
DATABASE MANAGEMENT
8
CHAPTER OVERVIEW
Unit 8.1 Database software
Unit 8.2 Database types
Unit 8.3 Database-related careers
Learning outcomes
At the end of this chapter you should be able to:
● describe examples of database management software (DBMS)
● explain how database management decisions are made
● list and describe different database careers
INTRODUCTION
A database is an organised collection of data regarding a specific topic. More
specifically, a database is an electronic system that allows data to be easily
stored, organised, processed and changed.
In this chapter you will learn about different types of database management
software, how to make database management decisions, and about database
management careers.
Using the information learned in this chapter, you will be ready to design and
create databases. https://www.youtube.com/
watch?v=Ls_LzOZ7x0c
If you want to learn a bit more about how and why databases are used, you can
TRO –SHORT LINK
watch the video in the QR link.
You can be assured that your school has some form of database that stores all of your information such
as your marks, subjects, teachers and probably your address details. This database can be accessed and
searched at any time to check your marks. Your teachers will also enter your marks on this system and
will be able to go back to marks from previous terms to monitor your progress throughout the year.
If there is data that needs to be stored, programmers prefer to store it in a database.
This unit will briefly look at three different database decisions that should be made. These are:
● Should the database be installed on a desktop or a server?
● Should a distributed database be used?
● What software should be used?
DESKTOP OR SERVER
When planning a database, the first thing you need to consider is whether you will need a desktop or
server based database. This will be determined by the following two factors:
● Size: How much data will be stored in the database.
● Accessibility: How that database will be accessed by users. Will it be accessed on the same
computer every time or will it need to be accessed by many users from different locations.
A desktop database will be used for a small database that is only being accessed by a single user on a
single computer. An example could be if you decided to keep a database of your movie collection.
A server database is stored on a dedicated server that is connected to the internet so that multiple users
from multiple locations can access the database. A server would be required if the database held a large
number of records such as the details of the customers of a cellphone company.
DISTRIBUTED DATABASE
It is a database that runs on a server first so all
multiple users can connect to it.It can be stored
locally at your organisation premises or anywhere
online/cloud. All the resources that are allocated to
this Database are being shared amongst all the
users that are connected to it at any instatnce. It
supports multi-user.
● Runs on a server locally or online
● All resources are always shared
● Supports multiple users at a time
● the two types include Workgroup and
Enterprise database
Amazon is known as the world’s largest online shopping website, a few years ago,
Amazon Web Services (AWS) was responsible for almost all of Amazon’s profit for the
year. Many of the world’s most successful websites and web applications are hosted on
AWS, including Airbnb, Netflix, Reddit and Pinterest.
Figure 8.1: Many websites are hosted using Amazon Web Services
This does not mean everything always goes well for Amazon! An Amazon employee one
day made a typing error when running an SQL command and accidentally disabled
many AWS servers. As a result, thousands of websites went offline including incredibly
popular websites like Slack, Medium and Expedia. These websites stayed offline for
hours while Amazon restarted the servers.
Or as a writer from USA Today described the situation: ‘When Amazon sneezes, the
Internet catches a cold.’
Activity 8.2
The table below lists and describes a few of the most popular ICT careers. This includes a few careers you
learned about previously, but also adds new careers.
TITLE DESCRIPTION
Database administrator A database administrator is the primary person involved in managing the data of a
company or program. Database administrators are responsible for:
● designing and building databases
● providing access to the data
● defining and creating users
● securing the data and limiting database access as required
● setting up an appropriate database backup
● creating and enforcing database policies
● monitoring and maintaining the database.
Database programmer A database programmer is any employee whose primary job is to create database
and database queries. Database programmers are responsible for:
● create database and database structures
● develop database queries
● optimise database performance
● responsible for data integrity in a database
● maintain data security in a database.
Database analyst A database analyst is responsible for working with companies to identify opportunities
to set up and improve their data systems. Database analysts have the following
responsibilities:
● plan and design databases
● add and remove fields from existing database
● design the technical requirements of the databases
● plan how the information will flow through this database.
Database project manager A database project manager is the person who must make sure that any database
projects are completed on time, at the right cost and at the right quality level. To do
this, they take responsibility for:
● developing project schedules
● defining project goals
● monitoring project schedules
● monitoring and managing project quality
● enforcing company standards within the project
● selecting, managing, training and leading team members
● developing database plans, policies and procedures for the company
● managing, monitoring and forecasting the project’s finances.
8.3.1 What are the main roles of the following careers, that is, what do people in those
careers do?
a. Database administrator
b. Database programmer
c. Database analyst
d. Database project manager
8.3.2 If you could choose one of these careers, which would it be? Give reasons for
your answers.
1. Match the COLUMN A with the correct answer in COLUMN B. Write down only the
question number (1.1–1.6) and the matching letter (A–F) in COLUMN B, for example
1.6–F.
COLUMN A COLUMN B
1. Size A. Powerful since they can be expanded easily and
2. Desktop software make use of the power and bandwidth provided
by multiple computers
3.
B. Amount of data that will be stored on the
4. Distributed
database.
database
5. Database C.
programmer D. Designed to work on a user’s personal computer.
6. Database analyst E. Working with companies to identify opportunities
to set up and improve their data systems.
F. Creates database and database structures
2. The database will be designed on one computer and will run on one standalone
computer.
a. What is the name given to this type of database?
b. Give an example of a program that can be used to design the database
mentioned in the previous question
c. What is the name given to a database that is shared on the internet?
d. Give TWO examples of programs that can be used to design the database
described in the previous question.
COLUMN A COLUMN B
1. Distributed A. Create database tables
database
B. An example of a typical desktop database
2. Spotify
C. One example of how a DBMS is used
3. Database
D. Responsible with working with companies to
4. DBMS software
identify opportunities to set up and improve their
5. Database analyst data systems
6. Microsoft Access E. Databases that are not stored and run from a
single computer (or server), but instead are stored
on multiple computers at the same time
F. Used to store data
17. The following screenshot is an example of a possible database that can be used.
It is created in Microsoft Access. A database analyst was asked to help with this.
CHAPTER
DATABASE DESIGN
9
CHAPTER OUTCOMES
Unit 9.1 Characteristics of quality data
Unit 9.2 Creating a simple database
Unit 9.3 Working with data
Unit 9.4 Setting up relationships
Learning outcomes
At the end of this chapter you should be able to:
● describe the characteristics of quality data
● describe how data should be organised in a database
● describe the characteristics that make information valuable
● design and create a simple database with a single table
● add, edit and delete data to and from the database
● process, sort and query data from the database
INTRODUCTION
In the previous chapter, you learned a bit more about databases and database
management software (or DBMS). In this chapter, you will learn how to design
your own databases. This includes making decisions such as:
● deciding which data to record
● deciding how to group the data
● deciding which fields to use in your tables
● deciding what type of valuable information should be stored in these fields
● deciding how to maintain data.
In fact, for every database you design, you will be faced with hundreds of choices,
layouts and decisions. These decisions can often make it feel overwhelming to
start working on a database. The goal of this chapter is to not only give you
guidelines that will help you to create the best possible database, it will also show
you how to complete each step along the way. By the end of the chapter, you will
have created a database that can be used, as it is, in an instant messaging
application.
Once data has been processed into information, this information can be
interpreted to provide knowledge, which allows yoou to make decisions based
on that knowledge.
A database is designed to store data (facts), these facts are organised within the
database so that they can be sorted or extracted in response to a user’s
requirements which will allow them to make a decision.
For example, your school probably has a database containing the details all of the
books in your school library, with data such as author, subject, title, ISBN number,
and so on.
If you were given a History project to research the history of your city, you would
be able to search the database for books on written about this subject. With a list
of the available books the database provides, you would be able to decide which
of them to use for your research to get the information you required for your
project.
Let’s first clarify the different terms that will be used and how they relate to each
other:
● Data is raw material; and information is when data is organised and
presented by someone. For example, if I take individual pictures of all the
learners in your school, the collection of photographs is data. When the
photographs are re-organised into each class unit, then the photographs
become information.
● Knowledge is information read, heard, or seen, and understood.
In order for the computer to use the data to produce accurate results that allow
decision making, the data has to be of a good quality.
CHARACTERISTIC DESCRIPTION
Accurate It is important that the data in your database is accurate, which
means both error-free and precise. If you created a weather
database, then recording the wrong prediction for the wrong day
may result in people expecting sunshine instead of rain. Similarly,
recording a comma inaccurately is the difference between a
weather prediction of 27,2 °C (a nice warm day) and 2,72 °C
(a very cold day)! High quality data must be accurate.
Correctness Inaccurate data is the downfall of a database, you might as well
not have any data. This is the basis of decision making, incorrect
data will lead to incorrect decisions.
TERM 3 I CHAPTER 9 DATABASE DESIGN I UNIT 9.1 Characteristics of quality data 103
For the rest of the chapter, you will work towards building a database for a new messaging
app called Secret Messaging Service (or SMS for short).
TERM 3 I CHAPTER 9 DATABASE DESIGN I UNIT 9.1 Characteristics of quality data 105
Based on these three questions, you can determine whether certain types of information are valuable to
the application and should be recorded and stored in the database.
If you would like all the data to use a format like “5th Grade”, you could enforce this using data validation.
You could also set the field to only accept numbers or integers (like 1, 2 and 3) and then link this field to a
different table where 1 is equal to “1st Grade” and 2 is equal to “2nd Grade”.
There are many ways of standardising your database, so it is up to you to choose a method that works.
Field names and table names are also usually written in lowercase (so user_name rather than UserName).
value
One of the attributes of a record...
A field is part of a record and contains a single piece of data for the
subject of the record.
The primary key of a table is a field that is used to uniquely identify each
record in a table. Microsoft Access automatically creates a primary key
field called “ID” for each table. This field type is set to AutoNumber, which
means it will automatically increment a unique number for each record. In
general, it is a good idea to keep this field. However, ID is not a good,
descriptive name so it should be changed.
Since the “username” is also a unique field, it is a good alternate key for
your users table. An alternate key is a field that also uniquely identifies
each record but is not the primary key.
TERM 3 I CHAPTER 9 DATABASE DESIGN I UNIT 9.1 Characteristics of quality data 107
By breaking the data into logical pieces, you can send a customised greeting
message like “Welcome, John!”. If the data is grouped, you would need to create
a string handling script to find the first name.
To understand the problem, look at the following set of marks and average:
What do you think the average should be? Depending on how you design the
calculated field, the average could be 62.5%, it could be 83.3%, or you could
receive an error. Since only one of these values will be correct based on the
school’s rules, you need to think carefully about how you program the field to
ensure it always gives the correct answer.
TERM 3 I CHAPTER 9 DATABASE DESIGN I UNIT 9.1 Characteristics of quality data 109
9.2.5 Suggest one form of data validation for each of the four fields. Give reasons for your answers.
Look at the “movies” table from the previous unit.
STUDIO_
ID TITLE INCOME_BILLION GENRE STUDIO_NAME
LOCATION
1 Avatar R39.0 Science fiction Fox Los Angeles,
United States
2 Titanic R30.6 Historical drama Paramount Los Angeles,
United States
3 Star Wars: The Force R29.0 Science fiction Disney Hollywood,
Awakens United States
4 Avengers: Infinity War R28.7 Superhero Disney Hollywood,
United States
5 Jurassic World R23.4 Action Universal Los Angeles,
United States
6 Marvel’s The Avengers R21.3 Superhero Disney Hollywood,
United States
7 Furious 7 R21.2 Action Universal Los Angeles,
United States
8 Avengers: Age of Ultron R19.7 Superhero Disney Hollywood,
United States
9 Black Panther R18.9 Superhero Disney Hollywood,
United States
10 Harry Potter and the R18.8 Fantasy Warner Brothers Hollywood,
Deathly Hallows Part 2 United States
9.2.6 What is the difference between data, information and knowledge? Provide your own example.
9.2.7 What is the aim of grouping data?
The first step to building the SMS database is to create the database. To do this, you need to:
1. install database software 2. create the SMS database 3. create the first table.
Since this database will be used for rapid-application development (RAD), we will use Microsoft Access to
create it. Microsoft Access is an easy to use DBMS with a what you see is what you get (abbreviated as
WYSIWYG) user interface. This means you can create the database visually and you can see the changes to
the database as you make it.
However, as a programmer you will be working with databases for the rest of your life, which means you will
be using SQL for the rest of your life. This database is an excellent opportunity to start using SQL, so the SQL
command for each still will be shown. At the end of the chapter, the same database used throughout the
chapter will be recreated quickly in SQL, with each line of code explained.
AS YOU BEGIN WORKING WITH DATABASES, YOU WILL NEED TO KNOW THE FOLLOWING
KEY TERMINOLOGY:
Field: A field is part of a record and contains a single piece of data for the subject of the record.
Primary Key: A field that uniquely identifies each record in the table.
Composite/Combined Primary Key: Is a set of more than one key that, together, uniquely identifies
each record.
Foreign Key: A foreign key is a primary key in one table that appears as a field in another table.
Data-types of fields: The fields within a database often require a specific type of data to be input. Data-type
that each field stores has to be declared/set. Common datatypes are: text, number, data, time Yes/No,etc.
Record: A record is composed of fields and contains all the data about one particular person, company, or
item in a database
Table: A database table is composed of records and fields that hold data. Each table in a database holds
data about a different, but related, subject.
Relationship: Is a situation that exists between two relational database tables when one table has a foreign
key that references the primary key of the other table. Relationships allow relational databases to split and
store data in different tables, while linking disparate data items.
CREATING A DATABASE
Now you are ready to create your first database.
To create a database in
Microsoft Access:
1. Open the Start Menu and
search for “Access”.
2. Click on the Access item to
open the application.
TERM 3 I CHAPTER 9 DATABASE DESIGN I UNIT 9.2 Creating a simple database 111
3. Once Access is open, double click on the Blank database option in the
main window.
4. Enter the name “SMS.accdb” in the File name text box at the bottom of the File New
Database window.
5. In the window that opens, click on the Open icon next to the File Name text
box.
6. In the File New Database window that opens, select an appropriate folder to save
your database and click OK.
7. Click OK to close the window, then click on the Create button to create
the database.
The SMS database should now open in Access.
Congratulations, you have just created your first empty database!
TABLE
You must choose which of two tables to create first: “users” or “messages”. The
“users” table will contain all the users’ information, while the “messages” table will
contain the messages sent between users.
There are two possible approaches:
● Create the central table of your database first, because this is the most
important table in your database. In the SMS database, the “messages”
table contains the most important data in your table, so it would be the
central table of your database.
● Create the table that is not dependent on any other tables first, because this
table can be created without relying on any other tables. In the SMS
database, the “users” table is independent of the other tables, since you can
know who the users are without having any messages, but you cannot have
messages without knowing which users sent them.
For this example, we will follow the second, more common, approach and create
the users table first.
If Access automatically created an empty table for your database. This default table is
called “Table1” and can be found in the All Access Objects panel on the left side of
Access.
To rename the “Table1” table to “users”:
1. Open Access.
2. Inside Access, open the “SMS.accdb” file. You should see the file in the Recent
panel on the left of the Access window. If not, click on the Open Other Files button
and open it from the folder where you saved the database previously.
TERM 3 I CHAPTER 9 DATABASE DESIGN I UNIT 9.2 Creating a simple database 113
5. Enter the name “users” for the table and press Enter.
6. Click on the Save icon to save your database.
Did you know
Take note, when creating a new table, you may be unable to rename it immediately.
The easiest way to save a However, by pressing on the Save icon, Access will ask you to enter a name for your
database in Access is to database. You can use this opportunity to rename it.
press the CTRL + S hotkey.
Remember to save your
work regularly.
Congratulations you have just renamed the existing default table “table1” to “users”!
You may not always have an existing table to rename. To create a new table in Access:
1. Open Access and the “SMS” database.
Did you know
2. Open the Create ribbon at the top of the Access window.
Since this table was newly
3. Click on the Table option.
created in the example, it is
impossible to rename it
normally. Instead, you must
save the database to
rename the table.
For your application to work, the only fields that you require are:
● username
● password.
It is possible that, in the future, you may want to use email to authenticate user
accounts (like Facebook) or link user accounts to phone numbers (like WhatsApp),
but for now you do not need either of those fields.
However, before you can create your two fields you need to select a data type for
them.
TERM 3 I CHAPTER 9 DATABASE DESIGN I UNIT 9.2 Creating a simple database 115
8. Using the Fields ribbon, change the Field Size of the “username” field to 30. This will
limit the number of characters that can be entered into this field to 30.
9. Repeat the process for your second field and call it “password”. The password field
should not be unique, since users are allowed to have the same password.
10. Set the Field Size of the password field to 20.
11. Save your database using the CTRL + S hotkey.
Congratulations, you have just created your first two fields in Microsoft Access!
With your username and table created, you are ready to start adding data to it.
9.3.1 You have been asked to create a book database for your local library. The database needs to store the following
information:
Book name
Language
Release date
Publisher name
Copies in library
Author name and surname
Date of birth
Nationality
Based on this scenario, answer the following questions.
a. How many tables will you need to record this information?
b. What will the tables be called?
9.3.2 Your school is trying to build a database of all the students and their sports. You have been asked to update the
school’s database to record this information. This will consist of adding the following fields:
Student name and surname
Birthdate
Grade
Sport
Team
Team coach
Practice days and times
a. How many tables will you need to record this information.
b. What will the tables be called?
c. Do the fields include a primary key?
d. Can student name and surname be used as a primary key? Give reasons for your answer.
e. Which of the fields above are not atomic? How would you split these fields?
9.3.3 Complete the following tasks for both databases.
a. If required, install the database software on your computer.
b. Create the “books” and “sports” databases.
c. Add the required tables to the databases.
d. Add fields of the correct type to the tables.
TERM 3 I CHAPTER 9 DATABASE DESIGN I UNIT 9.2 Creating a simple database 117
Now that you have a database, you need to test whether it will work in your
application. At this stage in the rapid application development cycle, you are not
ready to give the application to your friends so that they can create their own
usernames. This means that, to test the database, you will need to add your own
mock data.
In this section you will learn how to add data, change data and modify data in
your database.
USERNAME PASSWORD
LovelyLethabo P@ssw0rd
K!ll3r Pupp!3s
Shadowzzz password
stefan SimpleDistantNear
JK St@rt123
Now that you have your data, you can add it to your table. To do this:
1. Open the “users” table of your “SMS” database.
2. In the first cell of the “username” column, enter “LovelyLethabo” (without the
quotation marks) and press Enter.
3. In the first cell of the “password” column, enter “P@ssw0rd” and press Enter.
4. You have just added your first record! Did you see that the userid incremented
automatically?
Repeat this process until you have added all five records to your table.
5. Click on the Save icon (or press the CTRL + S hotkey) to save your table.
TERM 3 I CHAPTER 9 DATABASE DESIGN I UNIT 9.3 Working with data 119
In general, you should think carefully before deleting any records. Since databases are relational, deleting
a field on one record might cause errors on many other tables. In general, it might be better to add a
Boolean field to your table that you can use to enable or disable users. You should also think carefully
before deleting any tables from a database. Once a table has been deleted, it is gone forever! Unlike many
other actions, you cannot use the Undo button to correct your mistake if you accidentally a table.
9.4.1 Choose the answer and write ‘true’ or ‘false’ next to the question number. Correct the statement if it is FALSE.
Change the underlined word(s) to make the statement TRUE. (You may not simply use the word ‘NOT’ to change
the statement.)
a. You should think carefully before deleting any records. Since databases are flat, deleting a field on one
record might cause errors on many other tables.
b. It might be better to add a Boolean field to your table that you can use to enable or disable users.
c. Once a table has been deleted, you can use the UNDO button to correct your mistake if the table was
accidentally deleted.
9.4.2 a. Give a step-by-step procedure of how you would add someone with the username “Fahd_here” and
password “MyKitt3n$f00D” to your messaging database.
b. Let’s say they want to change their username to I.am.Fahd, how will you do that in the database?
Take note, the table above should not be added to your database as it is. Instead, the data should be placed in
the correct fields and tables of your database.
b. Add at least ten records based on your own school to the “sports” database. Make sure to include records
for both tables.
TERM 3 I CHAPTER 9 DATABASE DESIGN I UNIT 9.3 Working with data 121
Having successfully created your first table and added data to it, you are ready to create additional tables
and set up the relationships between them. In this unit, you will therefore learn how to:
● plan the relationships between your tables
● create additional tables
● create the relationships.
DESIGNING RELATIONSHIPS
To plan the relationships between your tables, you can create an entity relationship diagram (ERD). These
diagrams show the tables in your diagram, the fields in each table, and the relationships between the fields
of different tables. This section will look at how an ERD can be drawn in two phases:
● first, the tables will be drawn
● second, the relationships between the tables will be drawn.
An ERD is used to map the relationships between your tables. To create an ERD for your first table:
1. On a piece of paper, draw a square with enough space to list all the fields of your table.
2. Inside the square, at the top, write down the name of your table (“users”).
3. Underneath the table name, make a list of all the table’s fields.
4. Draw a line between the table’s name and the table’s fields,
as shown in the image below.
QR CODE
5. On the right-hand side of the square, write down the data type for http://plantuml.com
each field.
TRO –SHORT LINK
6. Draw a line between the field names and their data types.
Congratulations, you have just created the first table for your entity diagram! In the next example, you will plan the
remaining tables for your database using an ERD.
Using information, you can link each message to a specific sender and receiver based on their unique user
IDs. However, without recording when the message was sent, the messages may not appear in the
correct order in your application. You should therefore add a fourth field (called timestamp) to your table.
You should also add a “messageid” primary key to your table, to ensure that each message can be
uniquely identified.
userid PK messageid PK
Your ERD should now have two tables on it (as is shown below).
Zero or many
One or many
user_id PK message_id PK
user_id PK message_id PK
5. Next, ask yourself, what is the minimum and maximum number of messages a single user can send? Since a
user can send no messages or many messages, the minimum is zero and the maximum is many.
6. To indicate this relationship, draw the zero to many symbol at the connecting point of the line connects
to the “messages” table.
user_id PK message_id PK
However, this is not the only relationship between the two tables. The “userid” is also related to the “receiverid” field.
Since the app is just for direct communications between two users at this stage (and not for group chats), the
relationship between the “userid” and “receiverid” is the same as the relationship between the “userid” and
“senderid”. Adding this relationship to the ERD you obtain your final diagram.
user_id PK message_id PK
Congratulations, with these relationships drawn, any database administrator can look at your ERD and immediately
understand that the two tables are related using two one-to-many relationships.
https://www.youtube.com/ https://www.youtube.com/
watch?v=QpdhBUYk7Kk watch?v=-CuY5ADwn24
TRO –SHORT LINK TRO –SHORT LINK
3. If this is the first time you add relationships to your table, the Show Table window should open automatically. If it
does not, click on the Show Table button from the ribbon.
4. In the Show Table window, select each of the tables and click on the Add button.
5. Once all the tables have been added to the Relationships window in Access, click on the Close button.
6. Use the CTRL + S hotkey to save your table.
The two tables have now been added to the Relationships view of Access, which is arranged just like an ERD!
Once the tables have been added to the Relationships view, you are ready to create the relationships.
9.5.1 An _____ shows the tables in your diagram, the fields in each table, and the relationships between the fields of
different tables.
9.5.2 True or false? The exact positioning of your tables on an ERD does not matter, as long as they are logically
organised and there is enough space between them.
9.5.3 Explain a many-to-many relationship in your own words.
9.5.4 Using the techniques learned in the previous sections, create the “messages” table designed above and add at
least five records to it. While completing this activity, make sure that the:
a. table and field names are entered correctly.
b. primary key for the “messages” table is renamed correctly.
c. data types are selected correctly. Take note, the “message” field should have the Long Text type, while the
“timestamp” field should have the Date and Time type.
9.5.5 Once the “messages” table has been created, you should add the following data to it:
If you get stuck with this activity, watch the video in the QR code to see how the
tables are created and the data added.
Video
9.5.6 Based on the “message” table above, answer the following questions.
a. Which field is the primary key? Show a video of how the table
b. How many foreign key fields are there? Give a reason for your answer. is created, the fields are
c. To which field (or fields) are the foreign key fields linked? created and set up, and the
data is entered into the table.
9.5.7 Based on the “books” database created in Activity 6.4, answer the following
questions.
a. Draw an entity relationship diagram.
b. Based on the ERD, what are the primary key fields for the “books” and
“authors” tables called?
c. What is the relationship between the “books” and “authors” table?
d. Based on the ERD, is it true that one author can have multiple books? If yes,
give examples to support your answer.
1. Your local library has asked you to write a program that will help them to keep track of which member has taken
out which book. The following database tables have been designed to store data for the library.
TABLE: tblBooks TABLE: tblMembers
FieldName Example of Data FieldName Example of Data
BookID 001 MemberID 001
BookName Double Dexter Name Annie Black
Author Jeff Lindsay Address 101 Wisteria Road, Durbanville
Genre Crime ContactNumber 082 121 5687
BookReplacementCost 199.99 Blacklisted No
Available Yes
Give the name of ONE field in each of the tables that can could be used as an acceptable primary key field.
a. There is currently no relationship between the two tables. Which fields will you use from each table to create
a one to many relationship? Draw the relationship with the two tables in your workbook.
b. Describe a sensible way of relating the data in the two tables. You may add any fields or tables that you feel
are necessary to achieve the goal.
c. The tblMembers table displays sample data, but the field data types have not been given. Suggest data
types for each of the fields listed in the tblMembers table.
d. Differentiate between data validation and data verification, providing an example in each case to illustrate
your answer.
e. Should the tables be renamed to Table 1 and Table 2? Justify the response to your answer with a
suitable explanation.
2. The Water Department has designed a database to store information relating to South African Dams and the
Towns that are fed by these Dams. Examine the layout of the database and answer the questions that follow:
CHAPTER
SOCIAL IMPLICATIONS
10
CHAPTER OVERVIEW
Unit 10.1 The effects of computer and human error
Unit 10.2 The effects of cybercrime
Learning outcomes
At the end of this chapter, you will be able to:
● discuss the effects of inaccurate and invalid – data input, unverified data, software
bugs and incorrect hardware/software configurations
● discuss the effects of identity theft, business data theft and virus attacks to
companies (ransomware and malware).
INTRODUCTION
Database design and management takes a team to ensure quality data and
valuable information is used to make decisions in a company. In the previous
chapters we discussed these concepts and what it takes to create a database.
In this unit, we will look at the social issues applicable to databases content.
10.1.1 Can you remember how to create a strong password? Discuss this with a
partner and come up an example of a strong password.
10.1.2 a. In pairs, discuss how you can accidently delete files.
b. Is it a common occurrence for people to handle data carelessly?
Explain why you say so.
10.1.3 Explain to your partner what a firewall is and how software security can make
it stronger.
10.1.4 Explain phishing and how it can affect a security breach.
10.1.5 Controlling access to sensitive data is a basic part of any security. However,
many organisations are granting complete access to all employees by default
unless it is specifically restricted. Discuss how this can be dangerous to security
within a company.
Sometimes the reported computer problem is not really a computer problem, but rather a human problem.
The truth is that in many situations, a computer problem is not caused by a virus, a bug or a software
problem, but rather by a user making a mistake.
The table below summarises four types of computer problems, two of which are caused by computer
users.
PROBLEM DESCRIPTION
Inaccurate and Information that is input by the user is erroneous. Human errors and poor auditing and
invalid – data input control procedures of the data lead to inaccurate data capture.
Causes for data to be inaccurate: missing data, wrong data, Inappropriate data, Non-
conforming data, Duplicate data and Poor data entry.
Unverified data When data entered into a computer is not verified, these data types can often be stored
incorrectly, causing serious errors. Data verification is necessary to determine whether data
was accurately captured from the source to the computer. A type of Data Verification is
double entry and proofreading data.
Software bugs Software bugs are errors, flaws or faults in a computer program that causes it to produce
incorrect or unexpected results, or to behave in unintended ways. Software bugs change the
user’s experience of the program, or cause the program to crash.
Incorrect hardware/ Computer software (including the operating system) has certain expectations about the
software system it will operate on. These expectations include minimum hardware requirements and
configurations specific hardware components. Installing software on an incorrect hardware configuration
can cause instability and crashes.
Activity 10.2
10.2.1 At Cedar High School, safety, documentation and the international issues are considered and discussed at the
school governing body meeting. The safety of the data in the school can be threatened, therefore taking away
the trust that the parents have in the school management. Human errors, hardware and software issues may
also damage the school’s data.
a. Explain hardware that can damage data on a computer.
b. List THREE common human errors that contribute to loss of data.
c. Explain the GIGO (Garbage In, Garbage Out) concept, which also contributes to messy data.
d. Suggest THREE physical measures that can be taken by the school to protect the data on the computers
e. Social networking poses a threat to data. Describe TWO ways in which social networking can become a
threat to data.
TERM 3 I CHAPTER 10 SOCIAL IMPLICATIONS I UNIT 10.1 The effects of computer and human error 131
Most people working online experienced cybercrime. Cybercrime not only affects individuals and
organisations, but also society. Cybercrime can have long lasting effects on the people targeted. As a
result, governments need to spend significant amounts of time and money fighting these criminals.
In this unit we will discuss the effects of identity theft, business data theft and virus attacks on a company.
IDENTITY THEFT
Identify theft is the collection of the victim’s personal information by hackers to enable someone to
masquerade as the victim. This could be the hacker or some other person he sold the information to.
Examples of stolen data and a possible effect on the victim:
● Financial information like credit card numbers, retail store account numbers will allow the
cybercriminal to run up debt in the victim’s name.
● Medical insurance information will allow the cybercriminal to get treatment in the victim’s name
and could use up all the medical cover due to the victim.
● Driver’s license information will allow the cybercriminal to run up traffic fines in the victim’s name.
The victim could end up with a criminal record, a poor credit rating and not being able to pay for medical
treatment.
MALWARE
Malware is malicious software written to destroy a computer system, to obtain business data theft or
personal information.
Malware viruses and worms usually spread and slow down the operation of the computer system. This
decreases the efficiency of all aspects of the business that depends on the computer system.
Malware Trojans and spyware are usually use to obtain data and grant access. It is used for identity theft
and business data theft.
In all these cases the business has to spend to clean the system and protect it
from more attacks. Good updated antivirus software would be required.
Activity 10.3
1. Read the case studies on human error and answer the following questions.
a. What type of human error happened?
b. How could it have been avoided?
c. What is the effect of the error?
Case Study 1
TERM 3 I CHAPTER 10 SOCIAL IMPLICATIONS I UNIT 10.2 The effects of cybercrime 133
These databases are used to make many critical decisions affecting peoples’ lives. Someone can be arrested
and detained or denied a mortgage or the use of a credit card based on the data stored in them. Yet the sheer
size of these databases, as well as the procedures used to collect, process and maintain the data in them,
ensure that they will contain many inaccuracies. A study done by Kenneth Laudon for the Office of Technology
Assessment (OTA) found that only 25.7 percent of the records sent by the FBI’s identification division were
‘complete, accurate and unambiguous.’ A higher percentage, about 46 percent, of the criminal history records
in the NCIC met these standards. When Laudon checked a sample of open arrest warrants on file with the FBI
against records in the local court houses where they originated, he found that over 15 percent of them were
invalid, either because there was no record at all of them or they had already been cleared or vacated. Thus
15 percent of the warrants on record put their subjects at risk of being arrested for no justifiable reason.
Case Study 2
Michael DuCross was stopped for a routine traffic violation, when a check with the NCIC showed that he was
AWOL from the Marine Corps. DuCross was arrested and held for five months before it was found that he had
not been AWOL at all, but had been discharged legitimately.
In 1999, Phillip Cummings, a help desk worker at a software firm, took a spreadsheet of logins and passwords
when he quit, granting him access to a number of credit reports. The criminals he sold the reports to stole $50
to $100 million – no small sum for the 33,000 people whose reports were stolen.
Malcolm Byrd was sitting at home in 2003 when police officers came to his home and arrested him on a
warrant for cocaine possession. Though eventually his name was cleared, Byrd learned that a criminal had used
his name when he was arrested. He spent some time in jail before finally being released.
2. Read the case studies on cybercrime and answer the following questions.
a. What type of cybercrime happened?
b. How could it have been avoided?
c. What is the effect of the cybercrime?
Case Study 1
Alina got hit by a ransomware attack that encrypted and locked 5,726 files. The malware was so powerful that it
was almost impossible to recover the information.
She contacted the attacker through the ransomware’s communication feature. The ransomware creators, told
her she can either pay to get her files back or lose them forever. Despite backing up her files 6 months ago, she
decided that losing half a year’s worth of photos, documents and other files was too much, and so decided to
pay the ransom. The price to unlock her files was $500.
Case Study 2
Andy Greenberg, once took part in a ground-breaking experiment which tested how car hacking could be done.
His car would be remotely hacked while he was behind the wheel. As Andy drove on the highway, the hackers
started to take control of the car. First, they activated the air vents and windshield wipers. Next, the transmission
was cut and finally, they remotely activated the breaks. Even though Andy tried to control his car, the hackers
had more power. The experiment uncovered a massive flaw cars which was later fixed.
CHAPTER
INTERNET AND WWW
11
CHAPTER OVERVIEW
Unit 11.1 Evolution of the internet
Unit 11.2 Big data concepts
Unit 11.3 Multimedia as part of internet technologies
Unit 11.4 Compression technology
Learning outcomes
At the end of this chapter you should be able to:
● describe the evolution of the internet in terms of software and applications
● explain the differences between downloading, streaming and live streaming
● describe the role of multimedia on the internet
● explain how multimedia compression technology works
INTRODUCTION
The internet has not just changed the way we work or find information, it has also
changed the way we are entertained. One of the clearest examples of this can be
seen in the development and incredible growth of eSports. eSports is a general
term that refers to computer games being played professionally. Thanks to the
internet, eSports has become a massive spectator sport with thousands of
professional eSports athletes and millions of viewers per day.
In this chapter, you will learn more about these technologies and how they have
changed the way people live.
11.1.1 Give ONE word/term for each of the following descriptions. Write only the word/
term next to the question number.
a. The composing, sending and receiving of messages electronically over a
network, including the internet.
b. The part of the internet where websites like Facebook and Google can be
found.
c. Each computer on the internet has a unique internet address.
d. To make it easier to find a specific computer on a network, a person or
company can purchase a this for themselves.
e. A device that is used in a wired network to connect the LAN to the internet.
11.1.2 To make sure everything is covered for the gala, regular meetings with the
committee is important. The best way for them to stay connected is through the
internet.
a. There is some confusion between the terms internet and World Wide Web
(WWW). Distinguish between these two terms by describing both.
b. Name the protocol used for sending e-mail via the internet.
c. List ANY two devices required to connect to the internet using a 4G
connection.
In Grade 10, you learned that the world-wide web (or WWW) is the part of the
internet where websites like Facebook and Google can be found, while the
internet is the network connecting computers all over the world. Each computer
on the internet has a unique internet (or IP) address. For example, if you have an
IPv4 address, your computer’s IP address might be: 102.250.56.11
Each number can range from 0 to 255 and can be represented by 1 byte (or 8
bits) of information. To make it easier to find a specific computer on a network, a
person or company can purchase a domain for themselves that is linked to their
IP address. Any person entering the name of their domain (for example, google.
com) in a web browser will then automatically be taken to the linked IP address.
The world wide web changes almost as frequently as fashion changes. Every
year, websites rush to be the first to adopt the newest web development trends,
styles and best practices.
QR CODE
More than simply the way the internet looks, the way we use the internet has https://www.youtube.com/
watch?v=HoVT7qIyarE
changed dramatically in last 20 years. The most significant of these changes are
https://qrs.ly/8ja5qix
captured using the names Web 1.0, Web 2.0 and Web 3.0
TERM 4 I CHAPTER 11 INTERNET AND WWW I UNIT 11.1 Evolution of the internet 137
Web pages from that era were static pages with all the information programmed
directly onto the web page. As a result, these web pages stayed the same way
until a web developer changed the web page’s code. Web pages from that era
were also not interactive, so once a user landed on a web page, the only thing
they could do was read the information and look at the pictures.
Figure 11.2: Marshall Brain’s personal web page is a Web 1.0 page
WEB 2.0
Once sites like Google, MySpace and later YouTube, Twitter and Facebook
started appearing, the internet had changed. Websites became interactive and
dynamic. Instead of simply providing information, websites became applications
that allowed users to search, send messages, post updates and watch videos.
With Web 2.0, users play a role in the development of content, whether through
posting a status update on Facebook, uploading a video on YouTube, or writing
an article for Wikipedia. Using this model, Wikipedia has become the world’s
largest encyclopaedia with articles on 6 million different topics in more than 100
languages. Every month, 120 000 Wikipedia visitors from around the world
update existing articles or write new articles.
Web 3.0 will be able to get the context from the user; and then be able to provide
the user with the most useful information. Web 3.0 can be likened to an artificial
intelligence assistant that understands its user and personalizes everything.
For example, if someone is preparing for a vacation and needs to search for
cheap flights and accommodations, they have to look through a lot of information
on the web and compare different options and the search might take hours. Web
3.0 search engines or assistants will be able to gather all of this information and
present it to the user in a very intelligent way and even make highly accurate and
favorable suggestions. Did you know
Designed for particular purmuse -
NOT multi-purpose device! In 2017, the video
INTERNET OF THINGS (IOT) (CHARACTERISTICS AND USES) streaming website Netflix
offered a $1 000 000 prize
The Internet of Things is the network of physical devices that are embedded with
to anyone who could
electronics, software, sensors, actuators, and connectivity, which enables these
improve their movie and
devices to connect and exchange data. This creates opportunities for more direct television series
integration of the physical world into computer-based systems. IoT results in recommendation algorithm.
efficiency improvements, economic benefits, and reduced human effort. A team called Pragmatic
Chaos won the prize by
Examples include: writing an algorithm that
● Connected security system where you are able to turn on and off the was 10% better than
lights in your house through a smartphone app. You can also open your Netflix’s own algorithm.
electronic gate and watch video cameras placed around your property.
● Household appliances, can be operated, for example, by using an app on
your smartphone. Here are some examples.
Figure 11.4: Applications that can control different appliances in your home
TERM 4 I CHAPTER 11 INTERNET AND WWW I UNIT 11.1 Evolution of the internet 139
One of the biggest developments on the internet has been the rise of web applications.
These are websites that, rather than providing information, work like desktop
applications. Thanks to the growth of these applications, the distinction between
websites, web applications and desktop applications have become incredibly thin.
Popular web applications include:
● Office 365: Microsoft Office, with all the typical features, available from a web page.
● Google Drive: Google’s free-to-use office suite and online backup application.
● Gmail: Google’s online email client is the most popular email client in the world.
● Messenger: Facebook’s online instant messaging service.
● Trello: An online project management application used by many businesses.
● Sketchpad: An online drawing application and sketching application.
In 2015, Google announced that Assassin’s Creed Odyssey, the newest game in
Ubisoft’s incredibly popular series of action role-playing games, would be playable
through the Google Chrome web browser. As one of the most graphically demanding
games available in 2018, this will continue to make the distinction between an
application and a web application even smaller.
11.2.1 Match the COLUMN A with the correct answer in COLUMN B. Write down only the
question number (1.1–1.6) and the matching letter (A–F) in COLUMN B, for
example 1.1-A.
COLUMN A COLUMN B
1. Website A. Office 365
2. 1 Byte B. Webpages became more interactive
TERM 4 I CHAPTER 11 INTERNET AND WWW I UNIT 11.1 Evolution of the internet 141
Big data isn’t easy to define because everyone uses it differently. However, big
data generally is:
● large datasets
● the category of computing strategies and technologies that are used to
handle large datasets.
There are four characteristics of big data. These are listed in the table below:
There are many different uses for big data but we will look at three, namely:
● Customer profiling: by using big data, you can gain an insight into your
customers. Businesses can gain a comprehensive and data-based
description of a customer that includes variables such as demographics,
and consumption patterns. These patterns give you insights as to who your
customers are, what they want and what they need, allowing you to connect
with your customers in a way that appeals to their interests.
● Advanced patient care: In the past, nurses and doctors monitored patients’
physical vital signs every few hours but a patient’s condition may have
declined between the time of scheduled visits. Or if a patient has been
discharged, there is no way to monitor their progress, if they skip their
medications or ignore dietary and self-care instructions given by their doctor
after leaving the hospital.
Activity 11.3
In small groups research other uses for big data. Share your findings with the class.
TERM 4 I CHAPTER 11 INTERNET AND WWW I UNIT 11.2 Big data concepts 143
These websites are considered streaming websites, which refer to the way in
which the media is sent to users. In the next section, you will learn more about
the difference between downloading, streaming, live streaming and video-on
demand services. You will also learn a bit more about multimedia compression
and how this affects both bandwidth usage and video quality.
DOWNLOADING
Downloading is the easiest way to share media on the internet. The media owner
can simply upload the file to their website and then share a link to that file with
website visitors. To play an item shared like this:
1. open the website in your web browser
2. download the media file to a location on your hard drive
3. open the media file on your hard drive using any installed media player.
Since the media file has been saved to your hard drive, you can play it as many
times as you like (even without an internet connection).
Figure 11.5: Downloaded media like movies can be played using a media player
STREAMING
Since downloaded media is difficult to monetise, most large online multimedia
companies share their media through streaming. To play streaming media:
1. open the website in your web browser
2. open the media file in your web browser
3. the media file should start playing automatically.
With media streaming you never save the media file to your hard drive. Instead,
the moment you click the play button on the website, your computer downloads
a few seconds of the media in the background and shows it to you. As you play
these downloaded seconds, your computer downloads the next few seconds.
This is called buffering and your computer continues to buffer and play the
media until you reach the end of the item.
Figure 11.6: The buffered section of the video is indicated by light grey line below
the video
When you then close your browser, all these buffered seconds are deleted from
your computer. As a result, you will need to stream the video again the next time
you want to watch it.
TERM 4 I CHAPTER 11 INTERNET AND WWW I UNIT 11.3 Multimedia as part of internet technologies 145
Before finishing this unit on media streaming, there are two specific types of streaming websites you
should also be aware of:
● live streaming websites: As the name suggests, live streaming websites like Twitch.tv allow ‘live’
videos to be streamed. These videos show a live broadcast of something happening, whether it is a
game being played, a music concert or a sporting event.
● video on demand websites: Video on demand (VOD) websites, like Netflix and Showmax, allow
you to watch broadcast television shows and events ‘on demand’. Unlike YouTube and Facebook
that allow anyone to upload videos, VOD service providers are more like satellite television providers
in that they specialise in high-quality, professionally produced television series and movies. Unlike
with television, you can watch these episodes and movies whenever you want to.
For videos that are watched only once, there are no differences between downloading and streaming in
the amount of data and bandwidth used. The only difference is whether the data is saved on your computer
(as with downloading) or displayed and deleted (as with streaming). However, when a video is watched
more than once, the downloaded file will not use any additional data (since it is already saved on your hard
drive), while the streamed file will need to be streamed again, using the same amount of data as the first
time. As such, downloading videos will save data if the video will be watched more than once. Fortunately,
thanks to media compression (which you will learn about next), these streamed media files do not require
as much bandwidth as they used to.
Activity 11.4
11.4.1 One of the reasons to connect the devices to the internet is watching online television programs. You can either
stream or download the programs. Differentiate between streaming and downloading
11.4.2 List TWO ways you can listen to music using the internet.
11.4.3 Discuss why there aren’t any popular sites that allow music or video to be downloaded freely.
11.4.4 One of your clients has indicated that he might need your services since they are planning to go into partnership
with a popular Internet Protocol TV (IPTV) company which also offers VOD services.
a. What is the internet?
b. Differentiate between IPTV and VOD services. Indicate where each one may be used.
11.4.5 The following advertisements were placed on advertising boards outside the administrative building:
a. What is a Wi-Fi?
b. Advertisement C suggests that
streaming can take place live
online. Explain the term
streaming.
c. List TWO ways you can
download a music video using
the internet.
Streaming or downloading media, especially videos, from the internet can require a lot of bandwidth and
use a significant portion of your bandwidth limit. To give you an idea, the table below shows a rough
estimate of how much data different internet activities use per hour.
Take note that this is for a single person. If four people watch an average of two hours of high quality
videos per day, they will use 240 Gb in a month!
High quality videos differ from low quality videos in two important ways:
● High quality videos have a higher resolution
● High quality videos may have a higher frame rate
The resolution of a video refers to the number of pixels shown on the screen at any time. Every pixel is a
single dot of a specific colour (recorded as a mixture of red, green and blue). It is the most basic unit of
colour and resolution. When creating a digital video, every part of the picture is converted into pixels. The
more pixels that are used, the higher the quality of the image. The figure below shows the letter R at seven
different resolutions. With anything less than 100 pixels (10 × 10), it is completely impossible to see what
is being shown, and the image only becomes clear at 2 500 pixels (50 × 50).
Figure 11.7: The higher the pixel count, the better the image quality
Video compression allows video streaming sites to dramatically decrease the size of videos without
significantly decreasing the quality of the videos. As a result, 1 second of raw video uses the same amount
of data as a 10-minute compressed video (like an WebM or MP4 video) with the same resolution and
frame rate!
After a file has been compressed, it is saved in a compressed file format. The table below lists and
describes a few of the most popular compressed file formats.
TERM 4 I CHAPTER 11 INTERNET AND WWW I UNIT 11.4 Compression technology 147
11.5.1 The following statements are either true or false. State whether each statement is
True or False. Correct each of the false statements by rewriting the statement to
make it true. In other words, replace the bold-printed, underlined portions with the
correct term.
a. The resolution of a video refers to the number of pixels shown on the screen at
any time.
b. The less a file is compressed, the smaller the file becomes but the worse its
quality becomes.
c. The more pixels that are used, the higher the quality of the image.
d. Each pixel is represented by 3 bytes of data this is 1 byte for each colour.
e. Video compression artefacts can save a lot of space by only recording the pixels
that change noticeably from one frame to the next.
11.5.2 The Dance Society at the school needs to share a video of their dancing competition
amongst each other. They are suggesting that you compress the file for better quality.
a. Mention the main disadvantage of media compression.
b. It is suggested that you compress the file using JPEG format. Indicate why this
is not possible and provide an appropriate compression format.
c. Discuss how compressing a file affects the quality of the file.
11.5.3 Why won’t YouTube allow you to freely download Netflix videos to watch?
11.5.4 What is the difference between a live-streaming website and a video-on-demand
website?
11.5.5 How do high quality videos differ from low quality videos? Explain this in your own
words, referring to the resolution and frame rate.
11.5.6 How does video compression work?
a. Explain the purpose of video compression.
b. What is an example of a compressed image file?
TERM 4 I CHAPTER 11 INTERNET AND WWW I UNIT 11.4 Compression technology 149
Characteristics:
– Volume
– Variety
– Velocity
– Value
Big Data
Definition Uses:
1.
2.
3.
TECHNOLOGIES 12
CHAPTER OVERVIEW
Unit 12.1 Types of websites and supporting technologies
Unit 12.2 Internet-related careers
Learning outcomes
At the end of this chapter you should be able to:
● give an overview of internet services technologies
● compare static vs dynamic sites and location-based services sites
● explain the function of HTTP, HTTPS
● describe the purpose, advantages and limitations of multi factor authentication, one
time pin (OTP) and security token valid for limited period
● describe internet related careers
INTRODUCTION
In 2018, there were more than 1,8 billion websites in the world, which means that
there is probably a website for every topic you can think of. Databases are
especially important on websites where users create the content (like YouTube,
Facebook and Wikipedia), since it would be impossible for a data capturer to add
this information manually. Instead, these websites are set up so that any
information entered by users are automatically stored in different databases. This
includes items like status updates, likes, tweets and any videos or pictures the
user uploaded. The databases also store the user’s personal information, such as
their email address, username and password.
TYPE DESCRIPTION
Advocacy Advocacy websites are websites that fight to change laws or public
opinion. This can be about any topic that they feel strongly about.
Blog A website that posts short, informal stories about any topic, so that
the newest story appears at the top of the website.
Business A website run by a business as a way of marketing the business and
communicating with customers.
Content A website that gathers news and information from many different
aggregator area websites and provides links to the most interesting information.
Educational A website meant to educate people. You can find both general and
very specific educational websites.
Information A website that provides people with information on a specific topic.
News A website that provides up to date news on several different topics.
New news is usually posted daily.
Personal A website about a single person. A personal website can be a
marketing tool for individuals, but it can also simply be a place to
share things with the world.
Portal A website that brings several different types of websites together.
They are designed to be the one place you go to for everything but
are often not that good at any specific thing.
Search engine A website that allows you to find information on the internet. Search
engines are central to how you use the internet.
Shopping A website that helps you to do your shopping online. Different online
shopping websites exist for different types of products.
Social network A website that connects you to people by making friends, seeing what
they are up to, and posting your thoughts and photos.
Web application An application that runs directly on a website, like a word processing
application or a fitness tracker.
Wiki A website that people across the world can build and edit together.
The most famous is Wikipedia, the online encyclopaedia, although
wikis exist for many different topics.
12.1.1 In small groups, look at each website and discuss the following questions:
a. Define each type of website.
b. How is each website different and unique? What purpose does this serve?
Websites are made up of web pages. When the information that will be displayed
on a web page are coded directly into the web page, the web page is called
static. In contrast, when the web page is a container that collects information
Did you know
from a database based on user inputs (), the web page is called dynamic. Remember, not everything
you read on the internet is
Websites can also be categorised based on criteria, such as whether the website true. Creating a website
is static or dynamic, uses location-based services and has been made accessible does not make you an
to mobile devices. The remainder of this unit will look at these characteristics. expert on a topic!
STATIC WEBSITES
Static websites are websites where the information is coded directly into the
website using HTML. This means that the content of the website will never
change, unless someone changes the HTML of the website. It also means that a
web developer has developed a separate HTML file for each page of the website.
ADVANTAGES
● Easy to host and develop.
● Affordable to host and develop.
● Can display multimedia.
DISADVANTAGES
● Changes affecting multiple pages (such as to the header and footer) need to be
made on each page.
● Need to be a web developer to add content. Did you know
● Information updates less frequently.
If Wikipedia was a static
● Need to code a separate web page file for each page of your website.
website, anytime they
● Website is not interactive.
wanted to change their
● Changes are time consuming to make.
logo, or add an item, they
would need to open
millions of pages to make
DYNAMIC WEBSITES that change. This would
In contrast, in a dynamic website the information displayed on the website is make it impossible for
stored in a database and dynamically loaded onto pages based on the user’s Wikipedia to make any
request. When the user visits the page about Bafana Bafana, a request is sent to large-scale changes to
the Wikipedia database that retrieves all the information for the Bafana Bafana their website.
webpage. This information is then placed into a standard Wikipedia web page
template. If a different page is visited, then new information is requested and
placed into the same standard web page template.
TERM 4 I CHAPTER 12 INTERNET SERVICES TECHNOLOGIES I UNIT 12.1 Types of websites and supporting technologies 153
ADVANTAGES
● Changes to the template can be made once and immediately affect all pages.
● Can be updated without programming knowledge.
● Scripts can be used to update the website to only show the most relevant information.
● Can interact with the user.
● Since the content is dynamic, users are more likely to revisit the site to read the new content.
● Can display multimedia.
DISADVANTAGES
● Requires more knowledge to develop the initial website.
● Takes longer and is more expensive to develop.
● A single template mistake can affect all pages using that template.
Other websites like Facebook and Google make use of location-based services to determine which
advertisements and search results to show to users, while a service like Google Maps uses your location
to find the shortest route to nearby locations.
SUPPORTING TECHNOLOGIES
Part of the evolution of the internet has been the development of technologies that help people use the
internet. The following are some of the most important technologies:
● HTTP (Hypertext Transfer Protocol) is the protocol that controls how web pages are sent from a
web server to a user’s web browser. It helps to transfer information like document, file, image, video
between computers over internet
● HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP in which data is
encrypted before it transferred. This type of technology is used by, for example, banks because of all
the sensitive information their clients access when doing transactions on internet banking.
TERM 4 I CHAPTER 12 INTERNET SERVICES TECHNOLOGIES I UNIT 12.1 Types of websites and supporting technologies 155
12.2.1 Give ONE word/term for each of the following descriptions. Write only the word/term next to the question
number (1.1–1.5) in your theory writing book.
a. This type of website is used to fight to change laws or public opinion. This can be about any topic that they
feel strongly about.
b. A website that gathers news and information from many different area websites and provides links to the
most interesting information.
c. A website that brings several different types of websites together
d. A website that connects you to people by making friends, seeing what they are up to, and posting your
thoughts and photos.
e. An application that runs directly on a website, like a word processing application or a fitness tracker.
f. A website that posts short, informal stories about any topic, so that the newest story appears at the top of
the website.
g. A website about a single person.
Peter has this idea of creating a website where he can load the programmes and show information
on the gala. People must also be able to enter the gala online. The swimmers must use the web
pages as a platform to write blogs and be able to upload videos of their events.
12.2.2 Should he create a Web 1.0 or a Web 2.0 website? Give a reason to support your answer.
12.2.3 Seeing the needs for the web page, should you suggest Peter to a static page or a dynamic page? Support your
answer with a reason for your choice.
a. List TWO advantages of a static page.
b. List TWO advantages of a dynamic page.
12.2.4 Peter wants to assign a person to upload blog posts as the event is progressing, allowing users to view and
comment on the event in real-time. What do we call this?
12.2.5 Explain to Peter the difference between HTTP and HTTPS and which is better to use.
12.2.6 Compare the types of security services.
With the incredible growth of the internet, millions of internet-related jobs were
created worldwide. These jobs range from web content developers, to
independent web designers, to specialist back-end web developers!
The table below will briefly summarise five of the most important internet-related
careers. It is important that you pay careful attention to the different job titles,
since small differences in the titles can result in completely different jobs!
TITLE DESCRIPTION
Web designer A web designer is the person who designs a website.
This includes:
● designing the layout of web pages
● identifying features for the website
● designing the look and feel of the website.
● coding the website, although this function is often left to
specialised web developers.
Web author ● A web author is responsible for writing and editing the text
and creating the videos that are used on a website. Even
though this does not require extensive programming
knowledge, websites succeed or fail based on the quality of
the content they create.
Graphics and ● The graphics and multimedia designer is responsible for
multimedia designer creating all the graphical elements on the website. This
includes all the buttons, icons and pictures shown on a
website. The graphics of a website create a first impression,
and many visitors will not look at the content of a website if
it does not have professional graphics.
Activity 12.3
TERM 4 I CHAPTER 12 INTERNET SERVICES TECHNOLOGIES I UNIT 12.2 Internet-related careers 157
CHAPTER
SOCIAL IMPLICATIONS
13
CHAPTER OVERVIEW
Unit 13.1 Social implications of big data
Unit 13.2 Influences of globalisation and fourth industrial revolution (4IR)
Learning outcomes
At the end of this chapter you should be able to:
● discuss the social implications of big data with regards to online services and video
conferencing, interactive whiteboards, social websites
● describe the influences of globalisation and fourth industrial revolution (4IR).
INTRODUCTION
Big data has many positive aspects and has given us insights in all industries,
some examples were discussed in Chapter 11. However, big data is constantly
evolving and is difficult to monitor or analyse. Organisations and tech departments,
government agencies, consumer protection groups and consumers are struggling
to keep up with the continual changes.
Big data has become capital. The value that the world’s biggest tech companies
offer comes from their data, which they’re constantly analyzing to produce more
efficiency and develop new products.
TERM 4 I CHAPTER 13 SOCIAL IMPLICATIONS I UNIT 13.1 Social implications of big data 161
In small groups discuss if and how big data has social implications on:
● Online banking
● Booking reservations
● E-learning
● Video conferencing
● Interactive whiteboards: Read the following article for further information:
Figure 13.1: Learners benefit from access to education through its Smart School initiative.
Sectors which the Fourth Industrial Revolution has impacted greatly includes:
● Agricultural sector: AI-powered machine vision systems can measure crop
populations and detect weeds or plant pests and use robotic sprayers to
precisely apply herbicides.
● Healthcare sector: Precision medicine helps doctors analyse a patient’s
genome sequence, medical history, and lifestyle, making a diagnosis
more reliable.
Activity 13.3
In small groups research the influences of the Fourth Industrial Revolution on the following
sectors:
● Retail
● Building
● Social
● Travel
TERM 4 I CHAPTER 13 SOCIAL IMPLICATIONS I UNIT 13.2 Influences of globalisation and fourth industrial revolution (4IR) 163
1. Read the following and then answer the questions that follow.
Margaret and Joe have decided to sail around the world with their two children. They have several
concerns including:
● the weather that will affect their route
● schooling for the children
● accommodation in a foreign country when they want to travel inland
● transport to various tourist destinations
● social platform if they have any queries with sailing or to connect with like-minded people
● using currency in foreign countries
● connecting to their office and continuing to work.
a. How can big data and globalisation make this family’s experience easier?
b. Suggest apps that use big data for each concern that they have.
c. For each app that you suggested, provide the pros and cons of using that app.
2. What are interactive whiteboards and how can they benefit the classroom experience?
3. Do some research, then explain what the Fourth Industrial Revolution and what impact it is having on society.
synchronous (communication) real- time VOIP (voice over internet protocol) the
communication between two people set of rules that makes it possible to use
the internet for telephone or videophone
system software a type of computer program
communication
that is designed to run a computer’s
hardware and application programs VPN (virtual private network) an encrypted
connection over the internet from a device to
T a network
taskbar the bar at the bottom of the screen that
W
contains the start button on the left side and
the systray on the right. it also includes the WAN (wide area network) a network that
current time on the far-right side and can hold covers a large area. this could include all
shortcuts to programs directly to the right of the people in a suburb or city, but it is most
the start button often used to refer to the internet, the world’s
largest WAN
terabyte (TB) a terabyte is a unit of information
equal to one million million (1012) bytes WAP (wireless access point) a wireless
receiver which enables a user to connect
thread a way for a program to split itself into
wirelessly to a network or the internet
two or more simultaneously running tasks
window an area on the screen that displays
touch typing typing without looking at the keys
information for a specific program
U wizard a dialogue box that instructs you step
USB (Universal serial bus) a common interface by step what information it needs to create a
that enables communication between devices shortcut
and a host controller such as a personal world wide web it refers to the millions of
computer websites that are hosted on the internet
user interface the way in which people interact
with computer programs or a website
username a username is a word, phrase,
number or combination of characters that
uniquely identifies a user on any computing
device or related service that requires user
authentication
utilities small programs which help users to
maintain their computers
You can use the QR codes on these pages to link to online content for further
information on these topics.
Chapter 1
QR CODE ........................................................................................................... 3
QR CODE ........................................................................................................... 4
QR CODE ........................................................................................................... 13
Chapter 2
QR Code ............................................................................................................. 29
QR Code ............................................................................................................. 32
QR Code ............................................................................................................. 32
QR Code ............................................................................................................. 35
QR Code ............................................................................................................. 35
QR Code ............................................................................................................. 35
Chapter 3
QR CODE ........................................................................................................... 44
Chapter 6
QR CODE ........................................................................................................... 77
QR CODE ........................................................................................................... 79
Chapter 7
QR CODE ........................................................................................................... 86
QR CODE ........................................................................................................... 91
Chapter 9
QR CODE ........................................................................................................... 122
QR CODE ........................................................................................................... 125
QR CODE ........................................................................................................... 125
Chapter 11
QR code.............................................................................................................. 138