0% found this document useful (0 votes)
47 views136 pages

IT Theory

GRade 12 IT Theory

Uploaded by

hassena.haas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views136 pages

IT Theory

GRade 12 IT Theory

Uploaded by

hassena.haas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 136

IT Theory

Table of Contents
System Technologies....................................................................................................................................................................................................2
Networking and Communications..............................................................................................................................................................................39
Data and Information..................................................................................................................................................................................................99
Solution Development..............................................................................................................................................................................................120
Social Implications...................................................................................................................................................................................................130
System Technologies
Information Technology Terminology
Information Technology
Definition: IT is the use of computers to generate, process, store, retrieve, and exchange electronic data and information.
ICT
Terminology: ICT (Information and communication technology)
 People – to supply the data and to make decisions from the output supplied from the system information, which is based on the results
from processing data and the output from an ICT system.
 Hardware e.g. input devices, storage, processor, output devices, communication devices, database servers, and scanners.
 Communication like wifi, cabled communication media, etc.
 Software – the computer programs which provide the step-by-step instructions to complete the task. Including the system software
like the operating system and application software needed at the till point to process transactions. POS (point of sale) systems refer
to the place where a sales transaction is completed, for example, at cash registers in retail stores and shops, at bars and restaurants,
hair salons, spas, etc. Restaurant POS systems allow waiters to process orders. These systems consist mostly of payment terminals,
touchscreens, and a variety of other hardware and software options.
 Data – raw unprocessed input that is processed by the system to provide the information. Data can come in different formats, such as
sounds, images, and videos, etc.
 Information is the processed data to produce meaningful information and the output provided by the system.
Definition: It is a system that combines hardware, software, communications technologies, and data used by people.
Data vs Information
Terminology: Data vs information
Definition: Data is raw unprocessed input vs Information is processed data to produce meaningful information
Why information is useful: It supports good decision-making as trends can be identified.
Computers
Definition: Computers are programmable electronic devices designed to accept data, perform prescribed mathematical and logical
operations at a high speed, and display the results of these operations, as information
Advantages
 Allows companies to increase their productivity and therefore profit.
 Connects the user to the Internet to find information.
 Can collect, store, and process big data to produce information.
 Reduces the time it takes to sort, organize, and search through information.
 Get a better understanding of information
 Allows for e-learning.
Disadvantages
 Can reduce the availability of jobs
 Potentially cause a risk in the loss of privacy
 May develop an RSI injury and your eyes may take strain
 Can cause distractions since there is too much multitasking for the human.
 Can limit learning and create a dependency (you do not want to remember information as you can just search it on the internet).
 Increases waste that impacts the environment.
Modular design
Definition: The modular design consists of different parts to facilitate upgrade and repair.
Types of computers:
Listed from largest to smallest and most powerful to least

Type Function Advantages Constraints

Server To share resources, managing networks, provide


access to data, hosting websites, as well as processing
huge amounts of data.

Desktop System designed for regular use in a fixed location. • Easier to upgrade. • Not mobile
• Less expensive to • Need power to function.
upgrade.
• Need separate mouse,
• Less expensive to buy screen, and keyboard.
• More comfortable • Always a lot of cables to
keyboard and an easier to manage
use mouse compared to a
laptop.

Laptop Fully functional multi-purpose computer that is • Mobility due to the • Durability can damage
mobile. lightweight easier than a desktop that
stays in one place.
• Built-in battery that allows
the user to work when there • Higher cost than a
is no power similar desktop
• A greener solution than a • Security Issue: easier to
desktop since it uses less get lost or stolen
power.
• Limited battery
• Has a built-in wireless compared to a tablet
NIC to connect to a
• More expensive and
network through WiFi
difficult than desktop to
upgrade and repair

Tablets On-screen keyboard, screen size is bigger than • Portability (can work from • Hardware gets damaged
smartphone but smaller than laptop. Reading of e- everywhere and small easier
books is better on a tablet than on a smartphone. enough to put in a carry
• Lower performance
bag)
than laptop
• Screen can rotate (You can
• Difficult to work with a
choose to place the screen in
touch screen keyboard
landscape or portrait.)
• Screen size is smaller
• Handwriting recognition
than laptop
software can be used.
• Harder to add
peripherals
• Small storage space

Smartphone Smartphones are better than desktops at tasks that • Increased mobility due to • Small screen that makes
require a small mobile device, like taking photos, the lightweight input difficult
setting alarms, navigating the roads, making calls, and
• Built-in battery allowing • Lower performance
sending and receiving short-messages.
users to use the device when than a tablet
there is no power.
• Gets damaged easier
• Built-in cellular
• Gets lost or stolen easier
connection to give the user
access to the internet while
traveling.

Embedded Embedded devices are devices designed for a fixed


computers purpose, whether that purpose is to wake you up in the
morning, control the temperature of the air
conditioning or refrigerator or any navigation system.

Categories of Hardware
INFORMATION PROCESSING CYCLE

Input Process Output Storage Communication

Data that will be The specific steps that must be Information produced Permanent storage of Communication
inputted into the followed to change data into from processed data data and information between devices
system information.
• Mouse • Central Processing Unit • Monitor • Hard disk drive • Network Interface
card
• Keyboard • Graphical Processing Unit • Printer • SSD
• Router
• RAM • Flash Drives
• Access point
• Blue ray
• UTP cable
• DVD
• Fibre optics

Input Device Description

Device Description

Alternative Also called ergonomic keyboards or adjustable keyboards. It increases typing comfort and can be adjusted to user
keyboards preferences.

Pointing Any device like a mouse, stylus, touch-sensitive pad, or trackball. Device is used to manipulate the movement of a
devices cursor on a computer monitor

Pen input Using a stylus to interact with the computer, capturing data with digital ink. A stylus can be used for text entry,
drawing as a pointing device, and to complete online forms

Video input Video capture devices allow you to record a live video stream using your computer. Used for TV, making films, etc.
Data collection Data collection devices obtain data directly from a location where an event or transaction takes place. An example is
devices your mobile phone – during Covid you could track infections as well as if you were in contact with a Covid positive
person. Online tracking can give information like how many people visited the site, how long did they stay, what did
they click on. This information will assist the business to make informed decisions

Card readers A device that can read information from a card. Examples of card readers are the reading of the magnetic strip on
a credit card or SD card reader used to read the information from a memory card. Some laptops come with built-in
card readers.

Scanners Scanners allow you to scan any type of document onto your computer.
To create a soft copy from a hard copy
3D-scanners - use lasers/multiple cameras
Barcode -quick identification of items from an alphanumeric ID code
Biometric - The use of physical characteristics to identify individuals

Biometric input • Retinal scanner


• Voice recognition
• Fingerprint scanners.
• Face recognition scanner
Function: To identify or authenticate a person for security purposes, with information that is very difficult to be
duplicated

Ports

Type Definition Identify

VGA Analog video connection used between a computer and a monitor.

HDMI Designed to transmit high-definition audio and video signals.

USB To transfer data and instructions to and from the computer.

Thunderbolt Input and output devices. To connect high-speed devices to the motherboard for data transfer to and from
the device.

Output Device Characteristics

Device Type Characteristics Port used


Display LED (Light Emitting Diode) HDMI / AVG /
devices Thunderbolt
- Contrast ratio: Higher contrast ratio with sharper images.
- Response time: Faster (lower) response time.
- Resolution: Higher quality display.
- Purchase cost: More expensive.
- Green computing: No mercury used in the screen and therefore a greener solution. More
energy-efficient.
- Ergonomics: Offers better dimming options which is better for your eyes.
LCD (Liquid crystal display)
- Contrast ratio: Lower contrast ratio with a less clear picture.
- Response time: Slower (higher) response time.
- Resolution: Lower quality display.
- Purchase cost: Less expensive.
- Green computing: Mercury is used in the manufacturing. Once the screen reaches the end of
its life ending up on a landfill, the mercury would harm the environment. Uses more power.
- Ergonomics: LCD places more strain on your eyes.

Printers Inkjet: An inkjet printer operates by painting an image using a spray of ink. This is done by
hundreds of tiny nozzles that spray drops of ink directly onto the paper while moving across it.
Used to print high-quality images
Connect: USB port / Wi-Fi / Bluetooth
Ink Tank: Print heads built into the printer and use ink that is supplied continuously to the print
head from an ink tank within the printer itself. No expensive cartridges are needed. When the
ink is finished, the ink tanks are refilled from an ink bottle.
Laser: Laser printers use toner to burn images onto a paper. Even though they are more
expensive to buy, their running cost is lower than an ink tank printer. Laser printers are ideal
to use for high-volume printing.
3D: 3D printing is a process of creating three-dimensional solid objects from a digital file.
Objects are built by printing one layer at a time. e.g., prosthetics and movie props.
Advantages:
• Less waste = The production of parts only requires the materials needed for the part itself,
little or no wastage as compared to other ways where the part is cut off from large chunks of non-
recyclable material
• Cost reduction – using this method lowers the cost due to no materials being wasted.
• Reduce production time giving manufacturers a competitive advantage.
• Easier to fix and reprint errors in the design of a product
Data Definition: An optical device that projects an incoming image on a large surface to VGA/HDMI
Projector accommodate a larger audience.
There are two different types of projectors:
• Make use of VGA port – quality of image is good, can only display images.
• Making use of HDMI port – quality of image is excellent, and audio can be used.

Sound Headphones: An individual can listen privately to audio by making use of headphones. Audio
Jack/Bluetooth
Speakers: A speaker produces sound into the open air for all close by to hear
Sound card
Jack/Bluetooth

Devices

Device What is it Function and use

Touch Screen A touch screen is a computer display screen that serves The user can use their fingers to touch
as an input (touch) and output (image) device. pictures/words/icons on the screen to interact with. Used
in tablets, smartphones, and some high-end computers
Game Game controllers are devices designed specifically for • Gamepad.
controller use in games. They have directional inputs as well as
• Paddle.
action buttons linked to specific actions inside a game.
It also produces output through vibrations and sound. • Joystick.
• Trackball.
• Throttle quadrant.
• Steering wheel.

Digital Cameras allow you to capture images and show the They are more cost-effective as no film is needed and
cameras captured image on the screen images can be viewed and retaken if not correct. The
digital camera has a lot of extra features that can enhance
picture quality and looks

Smartboard An interactive smart or electronic whiteboard, is a tool Especially used in education that allows the educator or a
used to project the image and give input via a tool or learner to “interact” with the projected images, directly on
fingers the whiteboard.

Storage devices

Type Function Connection to Speed


motherboard

Hard Disk Drive A large mechanical storage device used to store data SATA rpm (revolutions per
(HDD) permanently minute)

Solid State Drive A permanent electronic storage device that can be read and SATA
(SSD) written to at a high speed.
Used in laptops and mobile devices.

HDD vs SSD

Feature HDD SSD

Technology Mechanical – moving parts Electronic – no moving parts

Storage Method Stores on magnetic disks Stores on flash memory

Speed Slower due to moving parts Faster since it is electronic

Cost Cheaper per GB More expensive per GB

Capacity Found in bigger capacity due to price Found in smaller capacity due to price
Fragmentation Becomes fragmented and then needs to be Does not become fragment, so no defragmentation
defragmented needed

Power Uses more power due to the moving parts A greener solution as it uses less power
Consumption

Physical Size Larger in physical size Smaller in physical size

Data Recovery Able to recover data More difficult to recover data

Durability Due to the moving parts, it is more likely to get The absence of moving parts means it is less likely to get
damaged damaged

Other Storage Devices

Device Port Function Advantage

External USB port Often used for backup and storing of movies Portable
hard drives since they have large storage capacities

USB flash USB port Used to transfer files and backups They are plug-and-play and are
drive available in a variety of storage
capacities

Memory card Built-in card reader • Extra storage for mobile devices
External card reader • Digital camera storage
(USB card reader
adapter)

DVD Smaller storage space

Blu-Ray Larger storage space and better image and


Drive audio quality

Optical Drive Use is declining because:


 Slower than a flash drive to write data to
 Easily damaged and therefore unreliable.
 Music, movies, and software can be downloaded from the internet instead.
 Storage capacity is limited compared to flash drives
 Damage easily
Motherboard
Definition: The motherboard is a large, printed circuit board with specific slots for every hardware component, which has been designed so
that only the correct components will slot in.
Purpose:
 Provides physical structure for other hardware to connect to.
 Provides power to the hardware.
 Sends data between the hardware components on the motherboard.
Processing
CPU (Central processing unit)
Definition: The CPU is responsible for processing general instructions. CPU is the brain of the computer which runs all programs and
processes all software instructions.
Function: Every application makes use of the CPU to collect, decode, and execute instructions as required by the application.
Motherboard slot: ZIF socket
Manufacturers:
 Intel
 AMD
Speed: Measured in GHz
Influence on the performance of the computer: A faster CPU with more cores will improve the performance of a computer.
Processing Techniques

Technique Description

Multitasking The operating system splits the CPU time between the active programs. It appears as if the computer is running
multiple programs at once, but it is still just doing one task at a time. In this way, you can run multiple applications
(or processes) on one processor seemingly at the same time.

Multithreading Instructions from the same program are divided into multiple threads. Each thread can be run independently and
executed by the CPU.

Multi- Uses multiple processors to complete tasks. Multiple cores can process multiple processes simultaneously.
processing

RAM
Definition: Random Access Memory. Temporary memory where data and instructions, which are currently in use, are stored before being
processed.
Function: All data and instructions that are currently being used are stored in RAM before it is sent to the CPU to be processed.
Characteristic:
 RAM is volatile which means that all data will be erased from your RAM when your computer is turned off.
 RAM is electronic and therefore faster than storage.
Measured: GB / TB
Where: Dual inline memory module (DIMM) slots on the motherboard
Performance: Important in determining the computer's processing speed (performance). The more RAM the faster the processing
speed - the more GB (capacity) the more programs can be held in the RAM at a time. Adding RAM is the most cost-effective way to
upgrade a computer and improve performance.
Virtual RAM
Definition: Space on the hard disk drive that the operating system to use as “RAM” when the RAM is full.
Purpose: When the RAM is full the operating system swaps data and information not being used between from RAM to the virtual memory
on the hard drive. All data that needs to be processed still needs to go to the RAM before being processed by the CPU.
Cache memory
Definition: To prevent the CPU from having to wait for data and instructions from the slower RAM. The CPU has a small, high-speed cache
memory built into the CPU, where it can temporarily store a small amount of the data instead of waiting for the slower RAM to send data.
Also known as CPU caching.
Caching

Type Description
Web Recently visited web pages are stored locally on the hard disk - if nothing has changed on the web page, information will
Caching be loaded from the hard disk, which is faster than loading from the slower internet.

Disk Every hard drive has a certain amount of RAM built into it to use as a cache. It stores data and files that have recently
Caching been read from the disk. This space could also be allocated in the RAM.

GPU
Where it is found:
 Graphics card (Discrete/Dedicated) which could include a cooling fan and RAM
 Integrated on the motherboard (built-in)
 Integrated on the CPU
Function:
 A discrete/dedicated GPU generates images faster than an integrated GPU.
 The GPU takes the graphics processing away from the CPU, which allows the CPU to spend its time on other processing tasks,
instead of generating graphics for display.
 This improves not only the quality of display but improves the general performance of the computer.
VRAM
Purpose: Video Random Access Memory is the memory used to store image data that the computer displays.
Role: It acts as a buffer between the CPU and the video card. When a picture is to be displayed on the screen, the image is first read by the
processor and then written to the VRAM.
VRAM VS RAM

Feature VRAM RAM

Function Stores image data Temporary memory where data and instructions, which are currently in use, are stored
before being processed.

Upgrade Cannot upgrade Upgradable and can be replaced

Speed Faster than RAM Slower than VRAM

Capacity Found in smaller capacities Found in larger capacities than VRAM


than RAM

Storage RAM

Feature Mechanical Electronic

Speed Slower – because mechanical Faster – because it is electronic

Volatility Non-volatile i.e. permanent Volatile i.e. loses contents when there is no power
Cost Cheaper per GB More expensive per GB

RAM Cache

Feature RAM Cache

Location Found on the motherboard in DIMM Slots Found on or close to CPU

Capacity Larger capacity Smaller capacity

Speed Slower Faster

Data Stored Stores the whole program Stores recently used instructions

Cost Less expensive per MB More expensive per MB

Upgradeability Easier to upgrade Difficult to upgrade.

Software
Application software
Definition: Application software are programs designed to perform a specific task for the end-users
System Software
Categories of system software:
 Operating system
 Utility software
Operating system
Definition: System software that supports all the activities on a computer.
Functions:
 Manages hardware and software
 Provides the GUI (Graphical user interface)
 Manages input and output peripherals
 Manages RAM
 Manages storage
 Responsible for processes and tasks like multi-tasking, multi-threading, and multiprocessing
Types:
 Virtualisation
o Definition: Virtualisation refers to creating an entity, referred to as a virtual machine, that only exists in software.

o Function: Often used when a programmer needs to test software they are developing. Virtualisation enables them to use one
machine to create virtual machines with different operating systems and specifications (like RAM, storage, and CPU power)
to test the software on.
o Advantages:

 Another machine does not need to be bought to test software being developed.
 Where certain application software can only be installed on certain operating systems, the user can create a virtual
machine with a different operating system to enable them to install any application software.
 Users can hire a virtual computer from an online virtual machine provider. In this way, they can choose the hardware
configuration they need and have access to “their computer” from anywhere with an internet connection.
 Less expenditure: servers, storage, and desktops, virtualisation can allow the same hardware to be used for multiple
tasks which saves money. It can also reduce the number of software licences that are needed.
 Green IT: with fewer server and storage resources, the demand for power and cooling can be reduced and there will
be fewer units to dispose of.
o

Different types of software

Type Description Advantages Disadvantages

Freeware Freeware software is available to you, The main advantage of freeware is It can contain viruses and Trojan
free of charge. However, the that it is free. It is also easily horses that affect the way the
developers or company that distributes accessible and generally comes with computer functions.
the software keeps the rights to the the files you need to use the
software. program

Shareware Shareware is copyright software The advantage of shareware is that The main disadvantages are that it
distributed free of charge, but after a it gives the distributor exposure cannot be modified.
trial period, it notifies the user that while giving the user time to decide
they might need to pay for the whether they want to spend money
program if they want to keep on using on the program or not.
it. Some developers distribute
shareware with a built-in expiration
date, for example after 30 days, the
user can no longer use the program,
while other types of shareware are
limited in terms of what functionality
it offers unless you buy the complete
program

Proprietary All computer software is developed Proprietary software is more stable, You must buy the software to use
Software using a source code. This code is the and technical support is easier to it. If there are any technical issues,
original design or technical blueprint access. you will have to wait for the
used to create the program. developer to address the problem
Proprietary software is where the
source code is not given to the public
or the user. It still belongs to the
distributor or developer, even if you
have bought the program

FOSS (Free Open-source software has the source It is free, and you do not need to pay Open software might not be as
and Open- code that is available to the public or to use it, which saves you money. user-friendly, especially to
Source anyone that wants to use it. It also Since the source is available to unskilled users. It is often difficult
Software) allows the user to change or modify anyone, the public can collaborate to find proper technical support or
the code itself if need be. You can also and fix bugs. Collaborators can to find drivers for some devices.
distribute this type of software to improve the performance or even The software can expose your
anyone and for any purpose. add features of good quality and computer to viruses and other
well-designed software. cyber-attacks

Utility Software
Drivers:
Definition: A device driver is system software that allows the operating system to communicate with and control hardware devices
connected to the computer
Installation manual vs plug-and-play:
 Plug-and-Play is a technology that allows the operating system to automatically identify a device that is plugged into the computer
and automatically install the driver for the device.
 Devices that are not plug-and-play enabled need to be installed manually. Device drivers could come with the peripheral bought on a
CD or could be downloaded from the manufacturer's website for free and then installed.
Other Utility Software

Software Description

Disk Clean- This is utility software, installed with your operating system, designed to free up space by searching the hard drive for
up files and programs no longer in use and providing the option to delete them.

Archive Less frequently used or outdated files can be compressed and stored on a secondary storage device where they can be
retrieved when necessary. The files can be retrieved if needed again in the future.

Backup Utility software used to create a duplicate copy of data on another storage device for use when the original data is
damaged or lost.

Compress Utility software used to reduce the size of a file/folders.


Malware
Malware Software with a malicious intent that is designed to steal data or destroy your computer system. It is being used to enable
cybercrimes.

Type Description

Spyware Spyware is a piece of code that hides on your computer and tracks all your activity without your knowledge. You can
control the Spyware, by activating the pop-up blocker on your browser settings or by installing an anti-spyware software
application

Adware Adware is a type of malware that presents unwanted advertisements to the user of a computer in the form of a pop-up or a
window.

Worm A computer worm duplicates itself to spread to uninfected computers whilst staying active on the host computer.

Trojan It is software that keeps its true intentions hidden. It camouflages itself as a beneficial program so that the user will click on
the link and then installs software that will affect your system negatively

Rootkit Rootkit is a collection of programs designed to give a person control of a computer network or application. Once enabled,
the rootkit sets up a backdoor and can deliver additional malware such as ransomware, bots, key loggers, or Trojans

Spoofing Spoofing is where a replica of a website/email is created of a legit site/email to get the user to go to the fake site and enter
personal information.

Phishing Phishing is an attempt by cybercriminals to obtain sensitive information (usernames, passwords, and credit card details)
by posing as legitimate institutions, usually via email.

Pharming Pharming is a scamming practice in which your browser is directed to another IP address when you enter a URL. The aim
is often for users to input their personal information.

Security Features

Feature Description/Definition

Firewall A firewall is a network security device/software that monitors incoming and outgoing network traffic and decides whether
to allow or block specific traffic based on a defined set of security rules

Anti- An Antivirus is a software program that is designed to prevent, search, detect, and remove malicious software (Malware)
virus from your computing device.
Important:
• Ensure you have only one active anti-virus program on your computer
• Keep the virus definition up to date – to ensure it identifies new threats

Prevention of malware
 Keep anti-virus software up to date to detect malware
 Do not download apps from untrusted sources
 Do not click on pop-ups
 Be aware of phishing attempts
Threats and Preventions

Threat Description Prevention

Unauthorised • Physical theft of computers and portable storage devices • Biometric security
access
• Illegal access to a network or computer. • Physically locking up with
security personnel
• Activate firewall
• Make use of strong passwords
Hardware failure • Storage – HDD/SSD can malfunction, and all the data is lost • UPS (uninterruptible power
supply)
• Power – dip in power or an unforeseen power outage can damage the
computer hardware and in some cases make it impossible to retrieve the data • Backup

Augmented Reality (AR) vs Virtual Reality (VR)

Feature Augmented Reality (AR) Virtual Reality (VR)

Definition Augmented reality technology superimposes a 3D VR a computer-generated simulated environment that can be
computer-generated image onto a user’s view of experienced by the user using specific input and output hardware
the real world and specialised software

Function • Product view –Allows customers to view and • Entertainment: for example, gaming, interactive theme parks,
interact with products or services before virtual museums, theatres, and movies.
purchasing.
• Medical field: AR can be applied so that the surgical team can
• Enhance content – People can point their device see the imaging data in real-time while the procedure is in
at a real-life object to learn whatever kind of progress
information is necessary instead of needing to
• Military: used for training simulation so soldiers can train for
search for it elsewhere.
combat situations.
• Training –AR enables users to train employees
• Education: so that large groups of students can interact in a
more thoroughly than they can through
virtual classroom with supporting data. For example: Scientific
documentation and meetings. Visualisation: uses computer graphics to show abstract or
complex ideas, like molecular models.
• Engage your audience –People are inundated
with print and television advertisements to the • Healthcare: used by doctors and nurses in many fields e.g.
point where they don’t pay much attention to them. surgery simulation, phobia treatment, robotic surgery, and skills
Inserting augmented reality into advertisements training.
will catch the eye of your target demographic.
• Fashion: for example, avatars are used to help with clothing
• Entertainment like Pokémon Go design, and virtual stores can be created.
• Heritage: for example, visitor centres like the Terracotta Army
are being created in a virtual world so that the site can be protected
from tourism.
• Business: to train new employees and provide virtual tours of
the business environment.
• Engineering: engineers can view their project virtually to
understand how it works, to spot any flaws or potential risks
before implementation.

Hardware • Smartphone • Personal Computer (PC)/Console/Smartphone/VR headset are


used to process and power the inputs and outputs.
• Sensors such as:
• Input devices allow the users to navigate and interact within a
o Accelerometer
VR environment e.g. joysticks, force Balls/Tracking balls,
o GPS controller wands, data gloves, trackpads, On-device control
buttons, motion trackers, bodysuits, treadmills, and motion
o Gyroscope platforms .
o Camera • Output devices present the VR environment to the users and
include visual, auditory, or haptic feedback often through the VR
o Light sensor
headset
• Display screen
• Camera
• And sometimes a microphone, smart glasses, and
a connection to the internet depending on the
application

Advantages • Enhances personal experiences • A training tool in many areas of life and can provide remote
access e.g. surgery can be performed in remote locations using
• Able to preview the product visually like fitting
robotic technology and virtual reality.
clothes, a new desk in your room
• It provides learning experiences that one cannot get from reading
• Can be used by people who are physically or
books as it immerses you in that world. This makes learning fun
mentally disabled
and can eliminate the language barrier and certain dangers
• It is more interactive and engaging than regular associated with scientific experiments.
media, which can make teaching easier
• It offers a new way of providing entertainment.

Limitations • Ensuring that the digital data is within scale with • It cannot simulate a real classroom where learning fluctuates.
the real environment can be difficult.
• Virtual reality can be addictive and detrimental to social
• In smartphones, AR must work with limited connections as it is not real-life, only a simulated world.
storage, low processing power, and a small • Virtual reality devices can be expensive.
amount of memory which limits what it is able to
• VR software takes up a lot of storage space
do.
• Requires a lot of computing power compared to other software
• The development and maintenance of AR
software can be expensive • The software for virtual reality is limited and in some cases
inflexible as it cannot go out of that scope.
• Could drain the battery life of the device

Difference between VR and AR: While Virtual Reality takes you into a virtual world and blocks out the real world, Augmented Reality
refers to overlaying computer-generated images on top of real-time images.
Networking and Communications
Networks
Definition: A group of computing devices connected through communication media to allow devices to communicate and share resources.
Advantages
 Communication: Networks allow users to communicate through e-mail, online chat, video calls, online conferences, and social
media.
 Sharing and Access to Resources: Peripherals such as printers and scanners can be shared by users on a network, which reduces costs
spent on hardware. Hardware such as the hard drive on the server for storage space can also be shared.
 Centralisation: Users can access data and information regardless of their physical location. This simplifies backup since all data is in
one place.
 File and Fund Transfer: Data can be transferred using a network in various ways, such as through online storage, attachments in an e-
mail, or storing data on the network server. Users can make payments through a network such as the internet.
 Productivity: Network users can share files through online storage and collaborate on the same files. This increases productivity since
multiple users can work on the same document simultaneously.
 Leisure: Users can use social media and online games for leisure.
Disadvantages
 Financial Costs: Networks have financial cost implications since a network specialist is needed to set up a network, and a permanent
network administrator needs to be employed to control the network and its users.
 Security Risks: Networks often store sensitive data. Money and time need to be spent to ensure the network is secure.
 Malware Spread: Once malware infiltrates a network that is not secure, it will spread very quickly since all devices are connected.
 Single Point of Failure: If the server breaks, no one will continue their work, causing a loss in productivity and profit. If the backup is
not up to date, there will be a loss of essential data for the company.
Overview of a LAN with a Star Topology
Network Components
Nodes
 Nodes include computers (workstations), smartphones, tablets, and peripherals such as printers.
Server
 Compared to client computers, a server is a more powerful machine with more processing power, memory, and storage space. They do
not use the network but instead provide and manage network resources to clients.
 Function: Used to manage devices, users, and data on a network.
NIC (Network Interface Card/Controller)
 Function: A hardware component that allows network devices to connect to the network for communication.
 Computing devices come with an on-board controller, meaning it is built into the motherboard.
 If the on-board NIC fails, the PCI-express slot on the motherboard is used to install another NIC.
 Types of NICs:
o Wired NIC: Provides the computer with a NIC port to connect to the UTP cable.

o Wireless NIC: Provides a mobile device like a laptop, smartphone, or tablet with the ability to connect through Wi-Fi. In an
advertisement for a device, this is indicated by the specification 802.11.

 Laptops come standard with both a wired and wireless NIC.


 Influence on the performance of the computer:
o NIC Speed measured in Mbps (Megabits) or Gbps (Gigabits per second)

o Higher number = faster.

o Can be wired, connecting a device with a cable to a network, or wireless, like connecting the laptop through WiFi to the Access
Point.
o The speed of the NIC can affect performance when it comes to:

 Loading webpages or web applications


 Downloading applications or games from the internet
 Downloading program updates from the internet
 Copying large amounts of data over the network
 Watching multimedia over the network.
o

Switch
 Function: A hardware device that connects nodes on the same network to a central point to allow communication between the nodes
by directing network traffic to the correct port. In a star topology, a switch is used as the central point to which all nodes connect.
 Example: If a computer on a network needs to print, the switch will send the data to the correct printer linked to the network.
Communication Media
Wired Communication Media:
 UTP Cables (Unshielded Twisted Pair) / Ethernet Cables: Electrical pulses are used to transmit data along twisted copper cables.
o Associated with a star topology in a LAN.

 Fibre Optic Cables: Light pulses are used for data transmission through fine glass/plastic tubes.
o Often used in the backbone of a network.

o Backbone definition: A cable that connects different network segments in a LAN.

Wireless Communication Media:


 Wi-Fi, WiMAX, and Bluetooth use radio waves for data transmission.
 Wi-Fi: Used in a network that provides wireless access to the network. Access points/Wireless base stations will be needed to provide
users with Wi-Fi access:
o An Access Point is a hardware device that contains an antenna to send and receive radio waves to allow wireless devices to
connect and communicate on a network wirelessly.
o Wi-Fi is associated with a WLAN.

 WiMAX (Worldwide Interoperability for Microwave Access): WiMAX is used in large companies or public hotspots, for example, at
airports. Advantages of WiMAX over Wi-Fi:
o Covers a larger area.

o It is more secure.

o It has higher bandwidth for faster data transfer.


o It can connect more devices than Wi-Fi.

 Bluetooth: Wirelessly connects two devices for a short period over a short distance. Bluetooth is often used in a PAN.
Wi-Fi vs Bluetooth:

Feature Wi-Fi Bluetooth

Range Longer range Shorter range

Data Transfer Speed Higher data transfer speed Lower data transfer speed

Network Connectivity Connects to a larger network Transfers data between devices (up to 8)

Similarities between Wi-Fi and WiMAX:


 Use access points/wireless base stations as hardware.
 Both use radio waves to send data to its destination.
 Signal strength is influenced by physical objects like buildings and electromagnetic interference.
How to Address Poor Wi-Fi Signal:
 Provide sufficient access points.
 Limit the interference of structures by strategically placing access points.
 Use a booster to increase signal strength.
Router/Bridge
Even though the internet is not an essential component of a network, connecting a network to the internet using a router is possible:
 Function: A hardware device that directs traffic from one point to another between different networks over the internet so that devices
can communicate.
 Uses:
o Routers could connect a network to the internet (another network type), making internet access available to all devices
connected to the network.
o Routers connect different LANs to form a WAN.

NOS (Network Operating System)


 Definition: System software that needs to be installed on the server computer to enable it to perform its functions, like allowing nodes
to communicate, share files, access hardware, and providing security features that will determine what users can access on a network.
Examples of Network Operating Systems:
 Microsoft Windows Server 2019
 Unix
 Ubuntu
Firewall
 Definition: A barrier consisting of hardware, software, or both that monitors incoming and outgoing traffic between the computer or
network and the internet.
 Function: Used as security to prevent unauthorised or malicious access on the computer or network.
Weaknesses in Communication Media:
Weakness Description

Attenuation Over distance, there is a loss of signal strength.

Eavesdropping This is when a criminal uses technology to detect a signal to steal data transmitted through the communication media.
Also known as a sniffing or snooping attack.

Differences in Communication Media:

Feature Wired (UTP) Wireless (Wi-Fi) Fibre Optic

Advantages Less expensive, Easy to install. Easier to access and connect than a cabled network More expensive, Highest
with mobile devices and in cramped places. data transfer (highest
bandwidth), Lower
attenuation.

Disadvantages Slower data transfer than Fibre Limited by the range of the radio signals and the Least expensive to
(lower bandwidth), Susceptible number of devices connected to the access point. install, Technical expert
to attenuation. Signal needs to Limited range from 10m – 100m depending on how needed to install.
be boosted after 100m. powerful the access points are, the type of
antennae used and physical obstacles.
Adding new Limited by the number of Easier to add new devices to a WLAN since they do N/A
devices available network points and not need a network point to connect to.
network cables available to
connect to.

UTP vs Wi-Fi:
 UTP is less prone to interference.
 UTP is not as slow when shared between multiple users.
 UTP is not influenced by objects like walls and trees.
 UTP has better security.
Topology
 Definition: The physical layout of devices (nodes) in a network.
Star Topology:
 Requires each device to be connected with its cable to the switch, which directs traffic to the correct destination.
Advantages of Star Topology:
 Easy to troubleshoot problems.
 If there is a cable malfunction, only that device is disconnected from the network.
 Easy to add and remove devices.
 Easy to set up.
 Stable network.
Network Types
PAN (Personal Area Network)
 Definition: A network with a small range where two devices connect for a short period. Small amounts of data are transferred
between devices.
 Communication Media:
o Bluetooth

o A cable connected to a USB port.

 Examples:
o Computer connected to a phone/printer via cable or Bluetooth.

o Bluetooth is used in a car when connecting a phone to the car radio.

o Using NFC (Near Field Communication) to transfer data and make payments.

 Uses:
o Synchronising personal devices

o Transferring data between devices

o Connections can be made to other devices in close proximity

o Connect to hardware such as a printer or scanner


HAN (Home Area Network)
 Definition: Based around a home environment with a small range.
 Communication Media:
o Wi-Fi is most often used as communication media

o Cabled connections are also possible.

 Example: Connect computers, printers, smartphones, smart TVs, smart homes, and gaming devices through Wi-Fi using the router
at home.
LAN (Local Area Network)
 Definition: A network that covers a relatively small area with a cabled connection.
 Communication Media:
o UTP/Ethernet cables

o Fibre optic cables

 Example: A school where computers in the class are connected to the network using cables.
WLAN (Wireless Local Area Network)
 Definition: A network that covers a small area with a wireless connection.
 Communication Media through Access Points:
o Wi-Fi
o WiMAX

 Advantages:
o Adding new devices to a WLAN is easy since they don't need a network point to connect to.

o The setup cost is less than a LAN.

o Connecting devices in areas where connecting via cables is difficult is easier.

o Users are more mobile since they can connect from anywhere if within the Wi-Fi range.

 Disadvantages:
o Security is a greater threat.

o Too many users affect performance/speed.

o Slower bandwidth compared to LAN.

 Example: Network laptops/tablets/smartphones connect to wirelessly in an organisation.


WAN (Wide Area Network)
 Definition: Networks that cover a large geographical area.
 Communication Media and Technology Used:
o Routers: To connect different LAN networks to form a WAN.

o Satellite.
o Radio waves like Wi-Fi and WiMAX.

o UTP and Fibre optic cables.

 Examples:
o Mobile communications networks like used on smartphones

o Banking network.

o Offices around the country of a business that needs to connect and communicate.

o The Internet.

Compare PAN/HAN, LAN, WAN in terms of composition, media and capacity:

Feature PAN HAN LAN WAN

Composition Two devices in close range A router and personal devices Switch, server, Two or more LANs
connected to it, like laptops, computers, printers connected through a
smartphones, and printers router

Media Bluetooth/cable to connect UTP and Wi-Fi UTP cables and fibre Routers, satellite, Wi-
smartphone to computer optic cables for the Fi, WiMAX, UTP, and
backbone fibre optic cables

Capacity One main device with up to 10 to 20 devices depending on the A larger number of Connects more devices
7 peripheral devices router's capability devices than HAN than a LAN

Network Design of LAN and WLAN


LANs and WLANs can be set up as a Peer-to-Peer or Client-Server network.

Feature Peer-to-Peer Client-Server

Security Limited security. Provides better security.

Installation and Easy to install and run since no server or Expert required to install, and a server and network
Running network administrator is required. administrator required.

Number of A small number of computers can be connected. A larger number of computers can be connected.
Computers

Software Software is included in the operating system of Specialised network operating system (NOS) needed for the
every peer. server.

Failure If one peer fails, the network will be unavailable If the server fails, no client can work. However, if a client
to the others. fails, the other clients will not be affected.

Network Access
Internet vs Intranet vs Extranet
Network Description
Type

Internet The global WAN consists of devices, networks, and web servers connected through various communication forms.

Intranet A private network of a company that offers restricted access to the business's data.

Extranet Used when users from outside the organisation, like their clients, are provided access to information using a username
and password. For example, signing into the extranet of the medical aid, eTolls, or local municipality account.

Username and Passwords


 Function: Used to gain access to the network and its resources.
Tips to Create a Strong Password:
 More than 8 characters.
 A combination of uppercase and lowercase letters, numbers, and special characters.
 Use meaningless "words".
 Avoid keyboard patterns and repeating characters.
 Do not use personal information others can guess.
Password Tips:
 Change passwords often.
 Do not use the same password for all accounts.
Network Confirmation
Indications that the device is connected to a network:
 The presence of extra logical drives in File Explorer under Network locations (U:).
 Access to peripherals like printers not directly connected to the computer.
 Indication in the system tray that the device is connected to the network and in Network and Internet Settings.
Network Security
 Network policies control network access and prevent the illegal use of the network.
 The network administrator will set up user access rights to access data on a network.
 They will also set permissions for users on what they can do with the data.
VPN (Virtual Private Network)
 Definition: Allows users of a network to securely log in to the network, from anywhere if they have an internet connection, to access
network resources.
 Uses: A VPN is often used when an employee is travelling or working from home and needs to access resources on the server at the
office.
 How to Log in: The user needs to be connected to the Internet. Then the user connects to the network’s server via the VPN with their
network username and password.
 Advantages:
o The user can log in to an office network through the Internet, providing them with the same security as when they would log in
on the premises of the office.
o The user has access to the same resources and data as in the office.

Remote Desktop Access


 Definition: The desktop of the remote computer appears as a separate application on the computer, which allows the user to work
with the computer as if seated in front of the computer itself. This includes taking control of the computer's mouse and keyboard and
accessing the computer's storage and software.
 Requirements: Both computers need the software installed. Third-party software like TeamViewer and AnyDesk is often used.
 Uses: IT support often uses it to assist a user in another location to install a printer or change settings on the computer. It can also be used
for training to show a user what to do from a remote location.
Location-Based Computing
 Definition: Processing, where the physical location of devices is used.
 Technology Needed:
o GPS – Most important

o Communication network for data transfer

o Service and application provider. For example: Maps, Uber, Weather, Waze

o Data and content provider

o Mobile devices/Computer

o User

 Advantages
o Profiling customers

o A company that advertises specific deals when the user is close

o Can invite someone nearby

o Location of delivery for online orders can be easily found.

o Invisible data capture

 Example Using Foursquare/Snapchat: The user will know when a friend is nearby and can invite them.
Examples Making Use of Location-Based Computing:
 Weather apps like Weather, Lightning alarm
 Direction apps like Waze, Maps, Google Maps, Maps in museums
 Social media apps that allow you to share your location and see where others are. Examples: Facebook, Foursquare, Twitter, Tinder,
Snapchat.
 Food ordering services for delivery like Uber eats and Mr Delivery
 Car-sharing services like Uber and bolt
 Gaming apps such as 'Pokemon Go' (also an example of Augmented reality)
GPS (Global Positioning System)
 Function: Allows one to locate the position of devices.
 How GPS Determines Positions: Receives signals from satellites orbiting the earth to determine the device's position.
 How it Works: By capturing signals from 3 or more satellites to triangulate data to pinpoint the location of the device.
 Used in:
o Tracking a lost or stolen device or objects like vehicles.

o Mapping apps to find:

 directions
 your location
 points of interest near you
o

o Geo-tagging: Smartphone cameras record where the photo was taken using GPS, recording the area's physical location. For
example: Linking your location on an Instagram post.
o Verification that the device was in the correct location. For example: when signing in on a new device with an account like
Gmail or an Apple ID.

Connecting to the Internet


Bandwidth
 Definition: Bandwidth refers to how much data you can send through the network per time unit.
 Measured: Kilobits per second (Kbps) or Megabits per second (Mbps)
 Broadband: High bandwidth
Range
 Definition: Range refers to measuring how far data or a signal can be transmitted and received. This term is mainly used with radio
waves such as Wi-Fi, WiMAX, and Bluetooth.
CAP
 Definition: The amount of data an ISP allows a person to upload and download per month. This mostly applies to cellular data
contracts.
o Uncapped: Unlimited data is available to an internet subscriber. Most FTTH contracts include uncapped.

o FUP (Fair Usage Policy): A set amount that an ISP will determine the user can download in a certain amount of time for
uncapped lines. If they exceed the FUP, the user will be throttled by reducing the bandwidth speed they subscribed to.

Throttled
 Definition: This is when bandwidth is reduced by the ISP to all activities when the network is strained or once you have exceeded your
FUP limit. You will pay more to have an unthrottled line.
Shaped
 Definition: Shaping happens when an online activity gets prioritised over others when the Internet is busy. An ISP would usually do
this to ensure that everyone on the network has a great experience by ensuring that more pertinent things like video chats and VoIP calls
are prioritised when bandwidth is limited.
Connection Types
Cellular Connection:
 Options for a Cellular Connection: LTE/4G/5G: Fifth-generation (5G) mobile network connection has higher speeds than 4G
 If the device does not have a sim card, it could be connected through a personal hotspot provided by a smartphone or dongle
containing a sim card.
Hotspot:
 Public Hotspot: A public area where internet access is available through a wireless internet connection.
 Mobile Hotspot: Sharing a cellular internet connection with devices connected via Wi-Fi.
FTTH (Fibre to the Home):
 Fibre cables run from a box in the street to a device called customer premises equipment (CPE). The CPE is connected to your Wi-Fi
router. This is a permanent connection with high-bandwidth (broadband) internet.
Electronic Communications
Definition: All forms of communication sent by electronic transmission.
Multimedia and the Internet
Download vs Streaming

Term Description

Download The entire file is downloaded from the internet onto your device's hard drive before you can start watching. This allows the
user to view the content many times without accessing the internet every time.

Streaming The file is played while connected to the internet without downloading the file first. "Buffering" might occur with a slow
internet connection to wait for the next section to be streamed.
Live This is when the streamed video is sent over the Internet in real-time (as it happens), without first being recorded and
Streaming uploaded. A fast, reliable internet connection is needed.

Webinar
 Definition: Online seminars users can join over the internet from anywhere in the world.
 Advantages:
o Users can join from anywhere in the world where they have internet access

o Saving on travel costs/time

o Expand the knowledge base

IPTV (Internet Protocol Television)


 Definition: Viewing television content over the Internet.
VOD (Video on Demand)
 Definition: A paid-for service on the internet, which allows the user to choose when and what to watch.
 Explanation: Monthly payment is usually required to access these services, and the content is available for a limited period.
 Examples: Netflix, Showmax
Compression
 Definition: A Microsoft Windows computer has built-in compression software to decrease the size of a file or folder.
 Lossless Compression: Compresses data without losing data. Used where data cannot be lost, like an MS Word document.
 Lossy Compression: Losing some insignificant detail of the file. Used in media files such as videos and images.
Compression Standards for Lossy Compression:
 Sound: MP3 – removes sounds humans can’t hear.
 Video: MPEG-2/MPEG-4/MP4/avi
 Images: JPEG (often used for website images) – looks at pixels and removes what it can without changing what the picture looks like.
Advantages of Compressing Media Files Used Online:
 To decrease the size of the video file for faster file transfer.
 Reduce the amount of storage space needed on the webserver.
 Allows streaming services to find a compromise between video quality and streaming speed.
Disadvantage:
 Loss of quality.
Types of e-Communication

Featu Chat Video e-Mail Blog SMS Instant Microbloggi Vlog Podcast
re Rooms Conferen Messagin ng
cing g

Defini Users Multiple Electro Websites Short Both the Posting of Video Audio files
tion connect users can nic mail that are message sender short blog: made
to a join a used to regularly service and text/pictures/ Posting available to
platform meeting send, updated where the receiver audios on a videos listen to.
on the or receive with sender need a social media online. Streamed
internet conferenc and diary- needs data platform. Examples online or to
to e through forward style airtime to connectio Examples: A where download
commun the electroni posts in send. n to the Tweet on Vlogs are from the
icate and internet. c reverse internet. Twitter is posted internet on a
discuss a Applicatio message chronolo Both limited to a on: device to
particular ns used: s over gical users maximum of YouTube listen to
topic. Skype, the order, need the 280 , later. Users
Example Microsoft Internet where the same characters. Instagra will use an
s: Teams, . most applicatio Tumblr m, app like
Discord, and recent n allows a Vimeo, Apple
Amino, Zoom. post will installed. maximum of Faceboo Podcasts,
Band Protocol always Examples: 140 k Spotify, and
used: appear at WhatsAp characters. Google Play
VoIP. the top. p, Music to
Messages, search,
Messenge listen to and
r, download
Telegram, podcasts of
Signal their choice.

Writin Chatroo Video Formal Informal Informal Informal The aim is to Informal Both
g ms could conferenc – using stories writing writing be as brief as , mostly informal as
Style be es are proper and style, often style, possible. not by well as
informal mostly netiquet articles making use often professio formal
or formal. te. from a of making nals. The podcasts
formal, personal emoticons use of audio-
dependin perspecti and SMS emoticons visual
g on the ve in a language. . Video form of a
topic conversat Video and and blog.
being ional pictures are pictures
discussed style of also are also
. writing. possible. possible.
Accuracy The aim is Businesse
: Blogs to be as s also use
can be brief as WhatsAp
inaccurat possible. p for
e because: Can customer
post/send support.
immediately, Instant
They are and messagin
posted by someone can g has
anyone respond/co replaced
and are mment SMS in
their immediately. many
personal, areas.
biased
opinions.
The
informati
on is not
verified.
Could be
outdated.
Purpo A Used for Send To share Used when To Used to share Videos Audio files
se platform business and informati the receiver communi ideas with broadcast broadcasted
for users meetings receive on about or sender cate with followers ed online online for
who and online message the does not friends online. either users to
share the education s creator’s have and pre- listen to
same . containi own internet family or recorded using their
interests ng text, knowledg access or a groups of and media
to images, e that smartphone people to uploaded player/smar
discuss a or other they , by organise or tphone
certain attachm would companies events. streamed apps.
topic. ents to like to like banks live
and share and medical
from with aids to send
anyone followers notification
with an online. s, receive an
email Companie OTP when
address, s can use doing online
anywher blogs for: purchases
e in the and
world. marketing.
Email is Marketin
also g-
used to updated
advertis with news
e to and
multiple events
people during the
at once. day to
attract
visitors.
Display
upcoming
events or
informati
on about
participan
ts in an
event.

Audie A wide A wide Sent to A wide Used between Used A wider A wide It could be
nce audience audience. specific audience peers. The between audience of audience. users catching
. Anyone Anyone recipien of anyone sender needs peers or for online Anyone up on news
with an with an ts who connected to have the group followers. with an from a radio
internet internet can to the contact communica Anyone on the internet site, a podcast
connectio connection reply or internet and details of the tion. platform can connection posted for
n can could join forward interested person to view the can view leisure, or
sign in if they the in the topic communicate content. your listening to a
and registered message discussed. with them. content. It book instead
contribu or were Viewers all depends of reading it.
te to the invited to can on the
topic the comment scenario.
being meeting. on the
discussed Online page.
. conferenc
es can be
attended
either as
an active
member
where the
user can
contribut
e and ask
questions
or as an
inactive
member
where
communi
cation is
restricted.

e-Mail
Composition of an e-mail:
Each field, To…, Cc… and Bcc… can include one or many e-mail addresses.

Field Description

To… The main recipient/s of the e-mail.

Cc… Carbon copy - to send a copy to other recipients. The recipient will see who else received the e-mail.
Bcc Blind carbon copy - to send a copy to other recipients. The recipient will not see who else received the e-mail.

Reply and Forward

Option Description

Reply Reply to only the sender – attachments will be removed.

Reply Reply to everyone included in the e-mail in the To and Cc fields and the sender – attachments will be removed.
All

Forward Send the message to someone else – attachments are included.

Attachments:
 Do not send large attachments.
 Do not click on attachments/links in e-mails from suspicious sources.
How Mail is Sent:

Sender sends the message ➔ Message stored on the sender's ISP server ➔ Message stored on the receiver's ISP server ➔ Message
received downloaded to the device
e-mail Address
Format: Username@ISP_ID.OrganisationType.GeographicalTerritory
Example: [email protected]
Organisation type examples:
 com - Originally for commercial organizations, but any company can register for a .com domain that will cost more. No geographical
territory is added.
 biz - Any business
 edu - Educational
 gov - Government
 org - Non-profit organization
 co - Business (company)
 ac - Academic institution
Geographical Territory examples:
 za - South Africa
 uk - United Kingdom
 sa - Saudi Arabia
 au - Australia
 fr - France
 nz - New Zealand
 ca - Canada
 us - United States
 de - Germany
 ls - Lesotho
Domain
Each website has its own IP address for the server on which the website is stored. The domain name is like a nickname given to the IP
address, making it easier for us humans to remember the website's name.
Format: ISP_ID.OrganisationType.GeographicalTerritory
Example: axxess.co.za
DNS (Domain Name System)
 Definition: A central location where all URLs are registered annually.
 Function:
o Ensures each URL on the web is unique

o Links the URL to a unique IP address

e-Mail Access
Users can access e-mail through a web browser or application software like Microsoft Outlook on a computer or mobile device.

Feature Microsoft Outlook on the web Microsoft Outlook App for Mobile Devices

Internet Connection Using a web browser would need an internet Can be used to compose messages when not connected to
connection. the internet, which will send once the device is connected
again.
Access Access through a web browser. Access through an app installed from the app store.

Swipe Gestures Since a browser on a computer would be used to Swipe gestures can be used, associated with a mobile
access the mailbox, there are no swiping device.
gestures.

When Used Often used when travelling when the user needs to Give the user access to their e-mails on their mobile device
use a public computer to access their e-mail. from anywhere and anytime.

Attaching Media from Media must first be retrieved from your phone Makes it easier to attach media such as photos that are on
Mobile Device before being uploaded to the web. your smartphone to an email.

Protocols
 Definition: A set of rules that describes how data is sent between electronic devices so they can communicate.

Type of Protocol Expand Description


Protocol
IP Internet protocol A numerical address that uniquely identifies a computer on a network.

SMTP Simple Mail Transfer Used to send e-mail through the internet. (Remember S for send)
Protocol

POP3 Post Office Protocol 3 Used to receive e-mail through the internet.

IMAP Internet Message Access IMAP allows you to access your email wherever you are, from any device
Protocol where you have an internet connection. E-mails are read on the server, and
IMAP will synchronise the e-mails to any device.

FTP File Transfer Protocol Used to transfer large files from one computer to another over the Internet.

HTTP Hypertext Transfer Protocol Transfers webpage data from the webserver, over the internet, to the user's
web browser.

HTTPS Hypertext Transfer Protocol Used to securely send data from the webserver to the user's web browser over
Secure the internet.
TCP/IP Transmission Control A protocol suite used to browse web pages.
Protocol/Internet Protocol

VoIP Voice over Internet Protocol Allows the audio of telephone calls to be transferred over networks. Software
that makes use of VoIP: Skype, Zoom, Microsoft Teams, Discord
Requirements:

A stable internet connection.


The same version of software must be installed on both devices.
Hardware like a webcam, speakers, and a microphone/headset.
To make calls to certain numbers - credits need to be purchased.

Advantages of VoIP:
 Cheaper than telephone calls over a long distance.
 Software is usually free to install.
 Allows video conferencing.
 Allows file transfer like documents, images, and videos while engaging in a conversation.
Disadvantages of VoIP:
 Both users need an internet connection and the software installed on their devices.
 Poor quality if you have a slow internet connection.
 When using video, you can use up your data cap quickly, and it could become expensive.
World Wide Web (WWW)
Web Terminology
 WWW (World Wide Web): Information on websites stored on web servers worldwide that we access through the internet.
Web Browser
 Definition: Application software that displays web pages.
 Examples: Google Chrome, Mozilla Firefox, Microsoft Edge, Safari.
 Features: The address bar is used to enter the web address the user wants to view. Browsers have Back, Forward, and Reload buttons
and Bookmark Favourite webpages often used.
Mobile Browsers
 Mobile browsers are designed to fit on a mobile device's smaller screen.
 HTML5 designs websites to be compatible with a mobile device.
 Features such as double-tapping on the screen will increase readability.
 Different input types are used to complete online forms compatible with a mobile device's limited keyboard.
 When the user enters the URL of a website, the browser will automatically switch to the mobile version of the site.
Mobile Apps
Many websites created mobile apps for their service for the following reasons:
 An app uses less data since the interface is installed once when the app is installed on the device.
 The app interface is designed for easier input from a mobile device.
 Allows users to receive notifications from the app.
 Ability to cache data locally on the device so that data can be accessed offline.
 The user does not need to enter the URL and log in every time they want to access the app.
Website
A group of web pages under the same domain name are linked through hyperlinks and available through the internet.
URL (Uniform Resource Locator)
 A URL is the pathway to a specific web page.
Example: https://www.education.gov.za/
Search Engine
 Definition: A search engine runs in a web browser to provide the user with an interface to enter keywords and find related websites.
 Examples: Google, Bing, DuckDuckGo, Yahoo
Searching Techniques When Desired Results are Not Found:
 Add more keywords and try to be specific about your topic.
 You could also use synonyms for your current keywords for better results.
 Use the advanced search tools provided by your search engine to filter your results according to file size, colour, file type, time posted,
user rights, and more.
 You could place your keywords in quotes, and Google will search for those exact words.
SEO (Search Engine Optimisation)
 Definition: A strategy used to place a website high on a search result of search engines. The result might not be relevant to the search
the user entered.
 Explanation: Companies use keywords to ensure that their page appears at the top of a search. These keywords are used to attract
users to their website, which might not be relevant to what the user entered in their search.
Metadata
 Definition: Additional information about a file that is saved with the file.
 To access some metadata of a file, right-click on the file in File Explorer and click on properties.
W3C (World Wide Web Consortium)
 Definition: An international non-profit organisation that develops web standards for the world wide web. Their mission is to lead the
World Wide Web to its full potential.
Search Types
Mediated Search
 Definition: Search is done in an online database containing a list of sites in different categories to provide more relevant and up-to-
date results.
 Disadvantage: Fewer results.
 How Lists are Compiled:
o People are paid to compile lists of websites into categories that are useful and up-to-date.

o Social networks: Can be used to find helpful content to populate website lists on certain topics according to likes.

Semantic Search
 Definition: Automatic searches for information based on webpages' metadata, the user's online profile, and the immediate
environment.
Web Development
Web Design Technology
HTML (HyperText Markup Language)
 A set of mark-up codes used by a web designer to create web pages that the user will view in a web browser.
CSS (Cascading Style Sheets)
 Each style is defined and provided with a different name used in the HTML document.
 The format is determined in one place and can then be applied to all the website's web pages.
 Advantages: Changes are made in one place which:
o Saves time.

o Provides consistent formatting throughout the website.

 File Extension: .css


JavaScript
 Definition: A scripting language because another program interprets it like HTML at runtime.
 Characteristics:
o Executes inside a web browser on the user’s computer.

o JavaScript runs AFTER the web page has downloaded.

o Used to make a webpage interactive. For example: Dropdown menus, images that change when the mouse moves over them.

PHP
 Definition: A scripting language that executes on the server BEFORE downloading the webpage to the computer.
 Explanation: A database stores information about users to provide dynamic web pages.
SQL
 Explanation: SQL queries interact with the website database to make it dynamic and interactive. SQL is also used to add and remove
user data from the database.
AJAX (Asynchronous JavaScript and XML)
 Definition: A combination of XML and JavaScript is used to allow small parts of a webpage to refresh without reloading the entire
page.
 Examples: Google Maps, where the user can zoom in and out, and Google search, which autocompletes keywords while the user is
typing.
XML
 Definition: A mark-up language used to describe, store and transport data.
 Explanation: Own tags and symbols can be designed to describe content as opposed to HTML.
Summary of Code Used for an Interactive Web:
Type Languages Extension Interpreted

Scripting JavaScript, Perl, Ruby, .php / .asp / .jsp / .ajax / .aspx Interpreted by another program like HTML at
Languages Python, SQL, PHP runtime.

Client-Side JavaScript, HTML, CSS .htm or .html Executes inside a web browser on the user’s
computer AFTER the web page has downloaded.

Server-Side Perl, Ruby, Python, SQL, Will not be .htm or .html but Executes on the server BEFORE downloading the
PHP, ASP.net, HTML-5 rather .php / .asp / .jsp / .ajax / .as webpage to the computer. Used for dynamic
px websites.

Static vs Dynamic Websites

Feature Static Website Dynamic Website

Definition A website that displays the same information A website where different users will see different content even if they
to all users viewing the site. are visiting the same site.

Examples of Image, video, sound Image, video, sound, database files


Files

Updates Not often updated and done by the Users create their content and view other's updates, which is
updated often.
webmaster.

URL .htm /.html .php / .asp / .jsp / .ajax / .aspx

Examples A school or company website Facebook, Blogs, Twitter, Amazon, Takealot

Advantages
Simple to design – no web design Adapted to user needs and preferences.
programming skills needed.
Used for online stores.
Do not need much server power.
Make social networks possible.
Pages do not need to be updated frequently.
More comprehensive, interactive web experience.
Can create customisable pages or pages that need to be updated
often.

Disadvantages Need more development resources, Need powerful servers, Need


server-side programming and database skills.
Cannot be interactive.
Cannot adapt to user's needs.

Internet Growth
Web 1.0
 Definition: Provides the same content to all users and contains hyperlinks to other webpages or websites. Static HTML web pages are
stored on servers.
 Explanation: Content is not updated regularly. Webmasters review content and keep the website up to date where needed. The only way
users can provide feedback is by sending an email.
 Examples: A school's website.
Web 2.0
 Definition: Dynamic web pages which are interactive and allow users to add content. Content is stored for each individual and
displays differently to each user that logs in.
 Browser Technologies Used:
o AJAX

o JavaScript

 Examples: Wikis, blogs, YouTube videos, social networking sites, online shopping, media repositories, e-learning websites.
Web 3.0 / Semantic Web
 Definition: A web that can interpret information like humans to provide useful content tailored to user needs. Semantic web uses
metadata to:
o To supply additional data on which specific searches are done.

o Searching is more relevant to the user.

 Advantages:
o Establishes user needs according to their online profile and environmental context without human intervention.

o Provides content personalised for specific users.

 Technologies Used:
o Artificial intelligence

o Data mining

o Big data

o Blockchain

o Machine learning

o AR and VR

 Examples: Smart homes and the Internet of Things.


Storing Data from the Web
Local Storage
Cookies
 Definition: A small text file that is stored on the computer's hard drive when a website is visited. The file records the user's preferences
for the specific site.
 Explanation: When the user visits a site, the data in the cookie is sent to the webserver to customise the website to their previous
preferences. If the user changes any settings on the site, the cookie is modified and stored again.
 File Extension: .txt with a limit of 4kb.
 Cookies Contain:
o An ID unique to the computer

o Information like the time the site was visited

o Links the user clicked on

o Interests

o Site searches

o Preferences on the site like language and location

Effects of Deleting Cookies:


 The next time you open that webpage, only default settings are available since your preferences are stored in cookies.
 You will no longer be automatically signed into websites where you saved the username and password.
Online Data Storage
Data can be stored on the web server's database to create dynamic pages according to the user's profile.
Advantages:
 More data can be stored than in a cookie.
 Data can be accessed faster. This is important when using social media sites or online shopping since the user might not always use the
same device when using the website or app.
Web Careers
Web Designer
 Responsibilities:
o Designing the layout of web pages

o Identifying features for the website

o Designing the look and feel of the website.

 Skills Needed:
o Software programming skills

o Graphic design skills

o Creativity and imagination

o Knowledge of advances in computer technology.

o Knowledge on HCI principles

Web Author
 Responsible For: Writing and editing the text and creating videos used on a website.
Graphic Multimedia Designer
 Definition: Someone who designs the appearance of a website like, for example, the buttons, icons, animation, and pictures.
Internet of Things (IoT)
 Definition: Electronic devices connected to the Internet can be controlled and communicate with each other without human
interaction. The Internet of Things describes the network of electronic devices that have sensors and software – built into it, which will
communicate over the internet without any human interaction.
 Explanation: IoT was made possible by Web 3.0
 Ways Devices Can Connect to the Internet:
o Wi-Fi

o Cellular connection

o Physical cable connection

 Advantages:
o IoT can be used to monitor items remotely.

o IoT can be used to notify users of any changes.

o IoT can be used to keep a log of data, which can aid in decision-making

o Effective tracking of assets, like stock control.

o Acquiring sensor-driven insights, for example, climate control.

 Examples:
o Connected security. You can open your electronic gate and watch video cameras placed around your property by accessing the
cameras via the internet, using your phone.
o Household appliances can be operated, for example, using an app on your smartphone. This system allows you to turn the lights
in your house on and off through a smartphone app. Robot vacuum cleaners can be started while not at home.
o Connected cars – a car that can communicate bi-directionally with other systems outside the car. This allows the car to share
internet access, and therefore data, with other devices both inside and outside the vehicle. Soon cars will be able to communicate
with each other for safety-critical applications.

Online/Cloud Services
Online Storage
 Definition: Storing files on a storage medium connected to a server and accessed over the internet.
 Examples: Dropbox, iCloud, OneDrive, Google Drive
 Advantages:
o Access on multiple devices

o Share with others, which allows for collaboration

o A small amount of space for free

o Synchronisation of data files across all your devices.

o Access to all your files where you have an internet connection

Disadvantages:
 Need fast and reliable internet
 The free space provided is limited, and you will have to pay for more storage.
 If the company you are backing up with closes down or they have hardware issues, all your files can be lost.
 You need to rely on the company's security to protect your data.
Cloud Synchronisation
 Definition: Software monitors the changes made to your files and mirrors the changes to the online storage and back to all the devices,
which will now have the same updated version of the files.
Advantages:
 Allows the user to access the latest version of the files on different devices.
 Share with others to collaborate.
 Make a duplicate copy off-site.
File Sharing
 Definition: Giving someone access to the files/folders you have uploaded to cloud storage to enable them to collaborate.
Collaboration
 Simultaneous Editing: All users can change and update the same document when using the online application of the software for
editing.
o Example: Google Docs, iWork

o Explanation: This is made possible through file sharing so that a group of people have access to the same file(s) through an
online storage service.

Online Backup
 How it Works:
o There is a backup schedule that is set to backup automatically at set intervals.

o Uses incremental backup.

o Files are encrypted for better security.

o Charges per month per user.

 Examples: CrashPlan, Carbonite, Acronis


Disadvantages:
 Need internet access to sync and access your files.
 Limited free storage space, and if you need more, you need to pay for it.
 If the company you are backing up with closes down or they have hardware issues, all your files can be lost.
 You need to rely on the company's security to protect your data.
Cloud Applications
 Definition: The use of software offered over the Internet like cloud applications and SaaS.
Cloud Applications
 Definition: Making use of a browser through the internet to gain access to application software. The software often has an option to
install, but it is unnecessary.
 Examples: Microsoft 365, iWork and Google Workplace such as Google Docs, Gmail Calendar, Forms etc.
 Advantage:
o Minimal setup required.
o Software is updated automatically on the cloud computers.

o Can be used from any computer connected to the internet, regardless of that specific computer's specifications.

o Easier to collaborate or share information with other users.

Disadvantages:
 Need a good internet connection.
 If the company no longer exists and did not inform you, you might lose all your data.
 Monthly payment is often required.
 You rely on the company to have good security and backup policies.
SaaS: Software as a Service
 Definition: You pay a regular subscription fee and gain access to the services provided by SaaS.
 Examples: Adobe Creative Cloud, Microsoft 365
NOTE: A software application can often be stored locally on the computer to work offline. Once the computer connects to the internet, the
data would sync with the cloud account.
BitTorrent
 Definition Is a Peer-to-peer protocol for sharing large files over the Internet making use of BitTorrent software
 Software Examples:
o µTorrent

o BitComet
o qBittorrent

Peers
A swarm of peers consists of:
 Seeders: Devices that downloaded the entire file and are sharing the files with others.
 Leeches: Devices are downloading the files but not seeding yet.
Torrent
 Definition: A torrent is a small file that does not contain the actual shared file, but a list of seeders, the users can download the files
from. The more seeders there are, the faster the download will be.
 File extension: .torrent
How does it work?
A large file is split into sections and shared via several peers instead of all users downloading the file from a single server, which makes it
faster. A torrent is generated by the server and shared through the software to show available seeders the other peers can download from.
Advantages
 The software usually freeware to install.
 Larger files are downloaded faster.
 Reduces the cost of the server to the host from which the file is downloaded.
Disadvantages
 Risk of downloading malware already in the file.
 Illegal to use BitTorrent for copyright files, and pirated material is often available.
 Network traffic could be slow when sharing popular files.
Big Data
 Definition: This is a massive amount of complex data being generated, gathered, and stored which can be used to make informed
decisions about a business.
 Characteristics:
o Volume: The amount of big data is huge since it is collected from many devices and sources (forms, IoT, databases, etc.).

o Variety: Big data comes in various data types as it is collected from various different sources.

o Velocity: The speed at which big data is generated. Big data needs to be generated quickly and should be updated in real-time.

o Value: Companies should find the information extracted from big data useful to make decisions about their business.

 Challenges:
o Data capture

o Storage space of data

o Analysing data

o Sharing data

o Security

 Examples:
o Customer profiling: By using big data, you can gain an insight into your customers. Businesses can get a comprehensive
description of a customer, including demographics and consumption patterns. These patterns allow a business to improve profits
by supplying what customers want according to knowledge gained.
o Advanced patient care: Real-time monitoring and body sensors of patients allow monitoring of their physical vital signs to be
done every few hours. This can lower costs of hospital care as less attention is needed by a nurse, because a computer can
analyse the big data. Wireless sensors can capture and transmit patient vitals far more frequently than human beings, and these
measurements can be analysed in real-time for advanced care. Diagnosis times are shortened, and treatments are prescribed
quicker. This is also an example of 4IR in the medical field.
o The agricultural sector. Sensors on fields and crops provide data on the soil conditions, wind direction and speed, fertiliser
requirements, water availability, and pest infestations. Farm equipment like tractors is equipped with GPS units to find their
optimal usage. Analysis of big data can also help prevent spoilage by moving products faster and more efficiently. Drones can
patrol fields to alert farmers to crop ripeness or potential problems. RFID-based traceability systems can provide a constant data
stream on farm products as they move through the supply chain, from the farm to the compost or recycle bin. Individual plants
can be monitored for nutrients and growth rates. The sensors, GPS, drones, RFID system and all the other technology used to
collect the data is an example of 4IR.

Blockchain
 Definition: A growing list of records, called blocks, linked using cryptography.
 Cryptography: The use of algorithms to encrypt and decrypt information so that only the intended recipient can read it.
 Function: The data in the blocks cannot be altered, which ensures security and allows for transparency.
Advantages:
 Increased transparency
 Better security
 Increased operational efficiency
How Does it Work?
It records transactions as blocks of data and chains them together using a hash, a unique value for each block. Blockchain uses a peer-to-peer
network, which allows everyone to have access to the records stored in a distributed database.
Examples:
 This technology is used in cryptocurrency transactions like BitCoin, medical records, collecting taxes, and keeping track of a
diamond from when it has been mined to its final owner.
 Walmart makes use of Blockchain to determine where in the supply chain, from farmer or manufacturer, distribution and
transportation, all the way to the customer, a product got damaged.
 To buy and sell non-fungible tokens (NFT).
Security Services
Multi-Factor Authentication (MFA)
 Definition: Users are authenticated for online services through more than one required security and validation procedure. At least 2
verifications:
o Something the user owns: An identification card/access card/Smartphone

o Something the user is: Biometrics

o Something the user knows: Password or pin

 How it Works: A password is originally needed to log in; then, an OTP is sent to another device via SMS/email to verify.
 Advantages:
o Protection in layers improves security. For example: When you add a new beneficiary while doing online banking, you need to
approve the transaction in the banking app on your smartphone.
o Achieves compliance requirements because the POPI act requires companies to use all possible security measures to protect the
user’s information.

 Disadvantages:
o Inability for a user to log in due to theft of a smartphone or physical device, which is required and may not be available.

o The cost of setting up this system is high for the business.

One Time Pin (OTP)


 Definition: A password valid for only one login session, on a computing device for security. OTPs are often used in MFA and are an
example of a security token valid only for a specific time limit.
Advantages:
 Safe from re-use attacks: A fraudster who uses trickery to capture your OTP can’t reapply it since it’s no longer valid for future login
sessions.
 Allows you to keep your emails safe: OTPs are generally received on mobile devices via SMS; hence, you don’t need to access your
email while connected to an unsecured Wi-Fi hotspot.
 Convenient to use: Most individuals own a mobile phone, and SMS functionality exists on every device, making one-time passwords
convenient to use.
Disadvantages:
 Could get out of sync: Algorithm-based OTPs need to cope with drifting out of sync with the authentication server if the system needs
the OTP to be submitted by a deadline.
 Can lock you out of your account: If your OTP device is ever stolen or lost, multiple login attacks by the hacker can permanently
lock you out of your account.
 Cost: The cost of setting up this system is high for the business.
Security Token Valid with Time Limit
 Definition: A token generated by a service that will expire after a certain amount of time.
 Examples: OTP, an e-mail sent to verify the user's e-mail address when a new account is opened or when a reset of a password is
required from an online service.
 Advantages:
o Can be used to reset passwords.

o Ensures security when doing online transactions through an OTP.

Disadvantages:
 If the user lost their device, an OTP cannot be received.
 If the e-mail address on the site is incorrect, the user will not receive the token.
 If the user is unable to use the token, it will expire.
Encryption
 Definition: Using code/a set of rules to change data to be meaningless for security purposes.
 Function: Provides security of data.
 Opposite: Decrypt
Secure Sockets Layer (SSL)
 Definition: An encryption protocol uses two separate keys: a public key to encrypt and a private key to decrypt sensitive data
transmitted over the Internet.
 Uses: Used for online transactions and can be identified with URLs starting with https.
Digital Certificate
 Definition: An electronic document used to verify the authenticity of an organisation online.
 Function in SSL: A digital certificate, which is renewed annually, is used to verify the validity/authenticity of a person or
organisation.
Certificate Authority (CA)
 Definition: An organisation that issues digital certificates like Thawte and Verisign.
Digital Certificate Contains:
 Public key
 Details about the organisation who owns the public key
 The organisations domain name
 Digital signature of the certificate authority
 The dates for which the certificate is valid.
Data and Information
Number Systems
Numbering Systems
 General number system:
o Called the decimal system

o Base 10

o Consists of the numbers 0..9

 Computer number systems:


o Binary system:

 Base 2
 Consists of the numbers 0 and 1
o

o Hexadecimal system:

 Base 16
 Consists of the numbers 0..9, A..F
o


Bits
 Definition: Binary digit (0 or 1)
Byte
 Consists of: 8 bits
Basic Data Types

Data type Number of bytes Range

Byte 1 0..255

ShortInt 2 -32768 .. 32767

Integer 4 -2147483648… 2147483647

ASCII
 Definition: General standard for representing 256 characters and numbers using a unique numeric code, e.g., Alt + 136 = ê.
UTF-8
 Also called: Unicode
 Definition: Expansion of the set of characters that can be represented in one byte.
Conversions Between Different Numbering Systems
1101.1012 = 1 x 23 + 1 x 22 + 0 x 21 + 1 x 20 + 1 x 2-1 + 0 x 2-2 + 1 x 2-3 = 13.625
1A5F.3016 = 1 x 163 + A x 162 + 5 x 161 + F x 160 + 3 x 16-1 + 0 x 16-2 = 6751.1875
Method 1: Add the values for placeholders in the binary numbering system until the requested decimal value is reached. Indicate the values used
by a '1' and those not used by a '0'.
Example: Convert 634 to binary.

29 28 27 26 25 24 23 22 21 20

512 256 128 64 32 16 8 4 2 1

1 0 0 1 1 1 1 0 1 0

512 + 64 + 32 + 16 + 8 + 2 = 634
Answer: 634 = 10 0111 10102
Method 2: Divide the number by 2 repeatedly until the answer for the division is 0. Write down the remainder from bottom to top.
Example: Convert 634 to binary.
 634 ÷ 2 = 317 remainder 0
 317 ÷ 2 = 158 remainder 1
 158 ÷ 2 = 79 remainder 0
 79 ÷ 2 = 39 remainder 1
 39 ÷ 2 = 19 remainder 1
 19 ÷ 2 = 9 remainder 1
 9 ÷ 2 = 4 remainder 1
 4 ÷ 2 = 2 remainder 0
 2 ÷ 2 = 1 remainder 0
 1 ÷ 2 = 0 remainder 1
Answer: 634 = 10 0111 10102
Method 1: Add the values for placeholders in the hexadecimal numbering system until the requested decimal value is reached. Indicate the
values used by a '1' or the alphabetical symbol and those not used by a '0'.
Example: Convert 4289 to hexadecimal.

163 162 161 160

4096 256 16 1

1 0 C 1

4096 + 192 + 1 = 4289


Answer: 4289 = 10C116
Method 2: Divide the number by 16 repeatedly until the answer for the division is 0. Write down the remainder from bottom to top.
Example: Convert 4289 to hexadecimal.
 4289 ÷ 16 = 268 remainder 1
 268 ÷ 16 = 16 remainder 12 (C)
 16 ÷ 16 = 1 remainder 0
 1 ÷ 16 = 0 remainder 1
Answer: 4289 = 10C116
Data Reliability in Computing
 Issue: String variable declared too "short". Not enough memory is allocated. Additional characters will be omitted.
 Example:
o Declaration: Variable: string [5]

o Assignment: Variable: = 'Pieter-Jan';

o Result: Value stored in the variable is 'Pieta'

 Issue: Numbers that are too large for the declared data type. Not enough memory is declared. When the maximum for the data type is
reached, overflow occurs, starting at 0.
 Example:
o Declaration: iVariable: Byte;

o Assignment: iVariable: = 200 + 120;

o Result: Value stored in iVariable is 65 (the maximum storable in a byte data type is 255)

 The result of an operation is too small for the device to store.


 Usually occurs with real numbers.
Data Collection with RFID Technology
Definition
 Data is collected for processing using radio frequency identification.
 Radio waves identify an object with an attached tag.
Types
 Passive:
o Powered by the incident electromagnetic wave from the reader

o Short operating range

 Active:
o Powered by a battery

o Range up to 100 meters

Advantages
 Store more data and are more interactive than barcode systems.
 Do not need a direct line of sight.
 Several tags can be identified simultaneously by the same reader.
 Fast, accurate data capture
 Can be read even if the object moves
 Can be reused
 Tag data is encrypted
Disadvantages
 Susceptible to certain materials and environmental factors
 Vulnerable to software attacks
 Privacy concerns
 Interference from companies with the same technology
Examples
 Low frequency (few inches range): Animal tracking, access control, car key fobs, asset tracking, healthcare
 High frequency (30 cm range): Library books, personal ID cards, airline baggage, credit cards
 Ultra-High frequency (25-100 m range): Supply chain tracking, manufacturing, pharmaceuticals, electronic tolling, vehicle tracking,
auto manufacturing, construction
RFID Technology Components
 Stores data and tag ID on a microchip
 Transmits data
 Sends data to the antenna
 Transmits the tag's data to the reader
 Can be integrated on the tag or standalone
 Size determines communication distance
 Generates electricity
 Converts radio waves into digital data
 Receives data as soon as the tag passes/swipes or is within a suitable distance
 Imports captured data to the IT system/database or IoT
Other Data Collection Methods and Characteristics
 NFC (Near Field Communication): Transmits data through electromagnetic radio waves over very short distances.
 Manual Data Entry: Prone to human error and time-consuming.
 Barcode Scanner: Eliminates human error, fast, used in supermarkets.
 Online Mark/Tests: Platforms like Moodle automatically mark multiple-choice questions, ensuring speed and accuracy.
 Robots: Utilize sensors to collect data during processes like manufacturing (e.g., cars).
 Existing Documents: Information can be extracted from forms, receipts, and invoices.
Workflow
 The sequence in which tasks are performed
 Illustrates data flow
 Example: A report due on a specific date necessitates a date field.
Business Plan
 A plan to ensure business success
 Includes targets, objectives, and timelines for measuring progress
Invisible (Unnecessary) Data
Definition
 Capture of additional and/or unnecessary data
 Used in ways a person is unaware of (e.g., selling)
 Creates a profile for targeted advertising
Capture of Invisible Data
 Credit/Loyalty Cards: Usage patterns reveal information about a person.
 Forms: Often request irrelevant data that may be sold.
 Internet: Emails, social networking sites, bookmarks, likes, and browsing history are tracked.
 E-tags: Determine travel habits.
 Telecommunications: Call records, including recipients, frequency, and duration, are collected.
Invisible (Meta) Data
Definition
 Information or data about other data
Examples
 Images: Size, resolution, date, color depth
 Web Pages: Utilize meta tags (HTML tags) to store information not displayed to users.
Data in a Database
Database Definition
A collection of logically related information organized and stored for easy access, management, and updates.
Structure of a Database Table
 Field: Smallest addressable unit/fact of data.
 Record: Collection of fields containing details about a particular entity.
 Table: Group of related data in a table format within a database, consisting of columns and rows.
 Relational Database: Multiple tables linked together.
Primary Key (PK)
 Unique identifier for each record.
 Cannot be repeated.
 Cannot be empty.
 Can be composite (made up of multiple fields).
Foreign Key (FK)
 A field in a relational database that links tables.
 Must always have a corresponding record in the primary table.
Relationships
 One-to-Many Relationship (1 - ∞):
o The PK is on the "1" side, and the FK is on the "many" (∞) side.

o A specific record can only appear once in the primary table (PK).

o The linked record can appear multiple times in the secondary table (FK).

Query
The ability to extract information from a table based on specific criteria.
Entity Relationship Diagrams (ERD)
Diagrams illustrating relationships between entities.
 Rectangles represent entities.
 Entity names (singular nouns) are written in capital letters inside the rectangles.
 Straight lines and symbols represent relationships between entities.
 Verbs describe the relationships.
Well-Designed Database Planning
 Tables required.
 Fields within each table.
 Data type, size, and format for each field.
 Primary key for each table.
 Foreign keys for relational tables.
Normalization
The process of organizing data in a database to:
 Protect data.
 Enhance flexibility.
 Reduce/prevent redundant data.
 Reduce/prevent inconsistent data dependency (fields not related to the PK).
In short: Ensure data is not repeated, queries and reports are easily created, and anomalies are prevented.
Advantages of Normalization
 Increased efficiency
 Minimized memory and storage waste
 Elimination of errors and inconsistencies
Data Redundancy
 Unnecessary repetition of data across different fields, leading to update irregularities.
 Deliberate repetition or distribution of the database over different storage media for backup purposes.
Anomalies
 Flaws in a database due to poor planning.
 Insert Anomaly: New data cannot be entered because the field/attribute depends on another field/attribute.
 Remove Anomaly: Deleting data unintentionally removes unrelated data.
 Update Anomaly: Changing data requires modifications in multiple places/records.
Information Management Steps
1. Obtain necessary data.
2. Process data to obtain information.
3. Transform information into knowledge.
4. Utilize information for decision-making.
GIGO (Garbage In, Garbage Out)
 If data is captured incorrectly, the results will be inaccurate.
Data Maintenance
 Adding new records.
 Deleting unnecessary/old records.
 Editing/updating existing records.
Defensive Programming to Capture Quality Data
Definition
Techniques to prevent user-made errors that would halt program execution.
Data Validation (Test for Data Entry)
 Format Check: Ensure correct date formats, character specifications, etc.
 Data Type Check: Validate data types entered into fields.
 Boundaries/Interval/Range Check: Enforce valid ranges for data (e.g., high school grades 8-12).
 Check Digit: Apply mathematical formulas to verify number validity.
Verification
 Can be performed manually.
 Algorithms compare different data copies.
 Valid data is not necessarily correct data; accuracy must be checked.
Quality Data
Definition
Data that is accurate, valid, complete, up-to-date, and relevant.
Characteristics of Quality Data
 Accuracy: Data must be correct; the computer cannot determine data entry correctness.
 Validity/Correctness: Data must be acceptable/reasonable.
 Completeness: All fields must contain data, and fields should be comprehensive.
 Currency: Data must be relevant to the current situation/circumstances.
 Relevance: Unnecessary data collection should be avoided.
Data Integrity of Quality Data
Definition
Refers to the completeness, accuracy, and consistency of data.
Physical Integrity
Can be affected by power outages, mechanical problems, etc.
Logical Integrity
 Data must be logical and valid.
 Achieved through data validation and correct use of FKs and PKs.
Types of Logical Integrity
 Entity Integrity: Each record has a unique PK.
 Referential Integrity: FKs always refer to an existing record in another table, preventing deletion of referenced records and ensuring
records in the foreign key table have a corresponding record in the primary table.
Data Independence of Quality Data
Definition
Separation between software using database applications (including the GUI) and the actual data structures managed by the DBMS server.
Advantages
 Users cannot change the data structure and format.
 Multiple applications can access the same data.
 The DBMS software handles data management.
Processes to Ensure Quality Data
 Data Security: Protection of data against loss/theft through physical security, access control (passwords, biometric security, permissions,
encryption), and input validation to prevent hacking.
 Audit Trail: Records changes made to the database, including the type of action, user, timestamp, and sometimes old and new values.
Improves accountability but can slow down processing.
Parallel Data Sets (Mirroring)
 Maintaining multiple copies of a dataset.
 Requires significant storage space.
 Copies should be stored in physically different locations.
Transaction Processing
Definition
A software system that captures and processes daily business activities.
Characteristics
 Groups interdependent transactions together.
 The DBMS only processes transactions if all individual transactions within the group are completed.
 If some transactions fail, completed transactions within the group are "rolled back" to prevent data inconsistency.
Transactions
Any activity involving data creation, editing, storage, or deletion controlled by the DBMS.
Transaction Operations
 Record Lock: Only one user can modify a specific record at a time.
 Edit: A record loaded into memory for modification is only "posted" to the database after changes are saved.
 Delete: Marks a record as "deleted" without actual removal.
 Insert: Creates a new record in memory, which is only posted to the database after all information is entered.
 Post: DBMS applies changes to the database.
 Refresh: Reloads information from storage to memory.
 Purge/Consolidate: Permanently removes "deleted" records from the database.
 Previous/Next/First/Last: Navigates through records in the database.
 Rollback: DBMS reverts the database to its state before a transaction/group of transactions was performed.
Database Management
DBMS (Database Management System)
Software that enables working with electronic databases.
DBMS Processes
 Database creation.
 Database structure modification.
 Data addition, modification, and deletion.
 Querying and searching.
 Data processing for information display.
DBMS Categories
 Spreadsheet databases (e.g., Microsoft Access).
 Server DBMS.
Spreadsheet DBMS
 Suitable for single-user or small-scale multi-user applications (<10 users).
 All components are within a single application.
Server DBMS
 Users access data indirectly through specially developed client software/applications (e.g., POS system).
 Client software can run on different computers.
 Server software executes queries/requests and provides results to client software.
 Queries/requests often use SQL.
 Supports a large number of users.
Centralized Database
 A single database instance stores all data.
 Can experience slow network traffic and high data costs due to large data transfers.
 Risk of downtime if the central database fails or network problems occur.
Distributed Database
 Data and DBMS components are stored across servers in multiple locations.
 Suitable for large numbers of users or businesses spread over a wide geographical area.
Properties of Distributed Databases
 Require complex security due to increased risk.
 Data Synchronization: Ensures the database is up-to-date across all locations.
 Duplication: Each location has a complete copy of the database, requiring substantial storage space.
 Partitioning: Each location manages its own data and uploads data to the central database according to a schedule, typically during off-
peak hours.
Data Warehousing
 Central storage for large amounts of data.
 Created by integrating data from multiple sources.
 Handles "older" data for historical analysis.
 Data is transferred from active to inactive databases, standardized in a temporary workspace, and finally loaded into the data warehouse.
 Data in the warehouse is not modified; only queries and analysis are performed.
Big Data
Extremely large datasets analyzed computationally to reveal patterns, trends, and associations, particularly related to human behavior and
interactions.
Characteristics of Big Data: Volume, Variety, Velocity, Veracity, Variability, Value.
Data Mining
 Searching for patterns, relationships, and trends within data stored in a data warehouse to improve business efficiency and profitability.
 Employs complex algorithms to group and reorganize data to uncover new patterns.
 Combines statistical analysis, artificial intelligence, database design, pattern recognition, and mathematics.
Role of People in Data Mining
 Data Selection and Preparation: Ensure data usefulness by removing incomplete and invalid records.
 Software and Algorithm Development: Create tools for data mining processes.
 Result Interpretation and Validation: Analyze and verify results for correctness, applicability, and accuracy.
Advantages of Data Mining
 Powerful CPU capabilities.
 Lower equipment costs.
 Efficient software and processing techniques.
 Increased storage capacity and reduced storage costs.
Database Careers
Database Administrator (DBA)
 Designs, manages, and maintains databases.
 Controls user rights and permissions.
 Performs routine maintenance, backups, and data recycling.
 Monitors database performance.
Database Analyst
 Modifies the underlying database structure.
 Analyzes system and database efficiency.
 Recommends database improvements and maintenance.
 Requires knowledge of hardware, software, and business principles.
Database Programmer
 Develops user interfaces for databases and applications utilizing the database.
Project Manager
 Plans and manages the course of IT projects, including overall planning, goal setting, and project progress tracking.
Solution Development
Introduction to Algorithms
Basic Concepts of an Algorithm
 An algorithm is an ordered set of steps to complete a task or solve a problem.
 Represented using pseudocode or flowcharts.
Steps for a Good Algorithm
 Limited steps.
 Easy to understand, detailed, specific, clear, and unambiguous steps.
 Each step:
o Performs a single task.

o Is at the most basic level (not broken down further).

 Clear ending conditions for repetitions.


 At least one output.
Pseudocode
 An artificial, informal language to help programmers develop algorithms.
 Text-based representation of an algorithm.
 Each step is on a separate line.
 Uses keywords like INPUT for user input.
Flowcharts
 Diagrams visualizing the steps in a process.
 Use standard shapes to represent different actions.
 Clearly show the control flow of an algorithm.
Basic IPO Table (Input, Processing, Output)
 Describes information processing using three columns:
o Input: Data required by the algorithm.

o Processing: Steps performed on the input data.

o Output: Results produced by the algorithm.

Trace Tables
 Help programmers track variable values during program execution.
 Consist of columns representing variables, conditions, or outputs.
 Useful for identifying potential errors.
Introduction to Solution Development Using a High-Level Programming Language
Introduction to Programming Tools
 A general-purpose programming language and IDE.
 Used for rapid application development across multiple platforms.
 Compiles to native code for various operating systems.
 Translates entire source code into machine code.
 Creates an executable file runnable without the compiler.
 Executes code line by line, translating and running each line immediately.
 Slower than compiled programs but allows for immediate feedback during development.

Feature Compiler Interpreter

Execution Entire program at once Line by line

Output Intermediate machine code No intermediate code

Environ- Production Development


ment

Examples Delphi, C, C++, Java Python, PHP, Perl, Ruby

Variables and Constants


 Names representing memory locations used to store data.
 Have data types specifying how the data is interpreted.
 Global Variables: Accessible throughout the program.
 Local Variables: Accessible only within a specific code block.
var
VariableName: DataType;
content_copy
Use code with caution.Delphi
 Must start with a letter or underscore.
 Can contain letters, numbers, and underscores.
 Case-insensitive.
 Values that remain fixed during program execution.
 Literal Constants: Values directly written in the code.
const
ConstantName = Value;
content_copy
Use code with caution.Delphi
 Improved readability.
 Clear indication of unchanging values.
 Easier code modification.
 Reduced risk of errors.
Data Types
 Classifications that determine:
o The type of data a variable holds.

o Valid operations on that data.


 Integers, floating-point numbers (real), characters, strings, arrays, dates, timestamps, Booleans, etc.
Operators
 Compare two values and return a Boolean result.
 Examples: >, <, <=, >=, =, <>.
 Combine Boolean expressions.
 Examples: AND, OR, NOT.
 Perform arithmetic operations.
 Examples: +, -, *, /, DIV, MOD.
Mathematical Functions
 Built-in functions for common mathematical operations.
 Examples: Trunc, Round, Frac, Sqr, Sqrt.
Casting
 Converting data from one type to another.
 Example: StrToInt (string to integer), IntToStr (integer to string).
Basic String Handling
 A sequence of characters controlling output formatting.
 Examples: #9 (tab), #13 (newline).
 Manipulate and analyze strings.
 Examples: Length, Copy, Pos, Trim, UpperCase, LowerCase, Insert, Delete.
Event Handling (Click)
 Code executed when a specific event occurs (e.g., a button click).
 Event handlers are Delphi procedures associated with events.
Conditional Constructs/Selection Structures
 Control program flow based on conditions.
 Execute code blocks based on a condition's truth value.
 Can include an optional else block for alternative execution.
 IF statements placed within other IF statements for more complex logic.
 Simplify selection logic when there are multiple possible values for a single variable.
Basic Validation Techniques
 Ensure data integrity by checking user input.
 Verify that the entered data matches the expected data type.
 Validate data within a specific range or against specific criteria.
Exception Handling
 Prevent program crashes due to runtime errors.
 Use try...except blocks to catch and handle exceptions gracefully.
Debugging Techniques
 Execute code line by line and inspect variable values.
 Violations of programming language rules (e.g., missing semicolons, incorrect variable names).
 Flaws in the algorithm's logic, leading to incorrect results.
 Errors occurring during program execution (e.g., division by zero, file not found).
Iteration Constructs/Looping Structures
 Repeat code blocks multiple times.
 Executes a fixed number of times.
 Uses a loop counter variable.
 Executes as long as a condition is true.
 ITC Principle:
o Initialize the loop control variable.

o Test the condition.

o Change the loop control variable within the loop.

 Executes at least once and continues until a condition is true.


 ITC Principle:
o Initialize the loop control variable.

o Change the loop control variable within the loop.

o Test the condition.

Application Development Using a High-Level Programming Language


Arrays
 Data structures holding collections of elements of the same data type.
 Linear Search: Checks each element sequentially.
 Binary Search: Efficiently searches sorted arrays by repeatedly dividing the search interval in half.
 Selection Sort: Repeatedly finds the minimum element and swaps it to its sorted position.
 Bubble Sort: Iterates through the array, comparing and swapping adjacent elements to move the smallest/largest element to its sorted
position.
Time & Date Manipulation
 Delphi uses the TDateTime type to represent date and time information.
 Date, Time, IsLeapYear, DaysInAMonth, FormatDateTime, DateTimeToStr, DateToStr, TimeToStr, LongMonthNames.
Text Files
 Store data as sequences of ASCII characters.
 Allow for persistent data storage and retrieval.
 AssignFile, Append, CloseFile, EoF, FileExists, Readln, Rewrite, Reset, Write, Writeln.
Procedures and Functions
 Procedures or functions defining an object's behavior.
 User-defined Methods: Created by the programmer.
 Functions: Return a value.
 Procedures: Perform actions without returning a value.
 Values passed to procedures and functions.
 Value Parameters: The procedure receives a copy of the argument's value.
Object-Oriented Programming (OOP)
 A blueprint for creating objects.
 Defines the properties (data) and methods (behavior) of objects.
 An instance of a class.
 Has its own state (values for its properties) and behavior (methods).
 A visual language for modeling software systems.
 Class Diagrams: Illustrate classes, their properties, methods, and relationships.
 Constructors: Initialize object properties when an object is created.(Called by Obj.create)
 Accessors (Getters): Retrieve object property values.
 Mutators (Setters): Modify object property values.
 Auxiliary Methods: Provide additional functionality related to the class.
 toString Method: Returns a string representation of an object.
 Destructor: Releases resources held by an object when it is no longer needed.(Called by a Obj.free procedure)

 Encapsulation: The protection of attributes (variables) from who has access to them (can address/use them) through the location of where
they are declared. (declaring private/ public and parameters)


Social Implications
Ethics
Definition
ICT ethics concerns the moral principles guiding an individual's behavior when using Information and Communication Technologies (ICT). It
encompasses responsible and ethical decision-making regarding technology use.
Software License Agreements
Definition
Legal agreements outlining the terms of software use. Different types exist:
 Proprietary Software: Users pay for use, the developer retains ownership, copying is prohibited.
 Open-Source Software (OSS): Free to use, source code is accessible for modification, typically cannot be modified for profit.
 Freeware: Free to use, may be copyrighted, restrictions on commercial use may apply.
EULA (End User License Agreement)
 Single-User License: For use on one device by one user.
 Multi-User License: Allows multiple users or devices.
 Site License: Covers a group of users or devices within an organization.
Licenses for Creative Commons
 Public Licenses: Indicate permitted uses of copyrighted software.
 Creative Commons: Legal tools granting permission for sharing and use. Example: ShareAlike licenses for adapted work.
 Copyleft: Permits copying and use with specific conditions, often for non-commercial purposes. Example: Some Delphi versions
donated to schools.
Piracy
Definition
Illegal copying, distribution, or use of software without the owner's permission.
Copyright Infringement
 A crime involving unauthorized duplication and sharing of intellectual property.
 Examples: Selling illegal software copies, distributing copyrighted content.
Reasons to Avoid Piracy
 Protects creators' rights and incentivizes innovation.
 Prevents financial losses for software developers.
 Upholds ethical standards and respects intellectual property rights.
Social, Ethical, and Legal Issues Pertaining to ICTs
Ethical Questions About Piracy
 Social Impact: Negative economic effects, reduced government revenue, job losses.
 Ethical Concerns: Stealing intellectual property, unfair to creators.
 Legal Implications: Criminal penalties, fines, imprisonment.
Copyright
Definition
Legal protection granting exclusive rights to copy, distribute, and create derivative works of original creations.
Copyleft
Definition
Licensing allowing others to copy and use work under specific conditions.
Copyleft Rules
 Attribution: Credit must be given to the original creator.
 Non-Commercial: Use restricted to non-profit purposes.
 Share-Alike: Derivative works must have the same license.
 Non-Derivative: Prohibits modifications to the original work.
Examples
 Citing sources in academic work.
 Using and distributing open-source software.
Economic Reasons for Using Computers
Advantages
 Reduced Paper Use: Promotes a paperless environment.
 Increased Productivity: Automates tasks, improving efficiency.
 Lower Communication Costs: Enables affordable global communication.
 Enhanced Accuracy: Reduces errors in data processing and decision-making.
 Improved Reliability: Consistent and dependable results.
Digital Divide
Definition
The gap between individuals with and without access to digital technologies and knowledge.
Contributing Factors
 Education: Higher education levels correlate with increased technology use.
 Income: Lower income limits access to technology and infrastructure.
 Location: Rural areas often lack adequate technology access.
 Age: Generational differences influence digital literacy.
Ergonomics, Green Computing, and Health Issues
Ergonomics
The study of designing and arranging workspaces to optimize user well-being and overall system performance.
Guidelines for Safe Computer Use
 Proper posture, seating, and monitor placement.
 Regular breaks to prevent repetitive strain injuries.
Green Computing
Environmentally responsible use of computers and resources.
Examples
 Printing responsibly.
 Using energy-efficient devices and power management features.
 Recycling electronic waste.
Health Issues
 Eye Strain: Prolonged screen time.
 Musculoskeletal Problems: Poor posture, repetitive motions.
 Obesity: Sedentary behavior.
 Computer Stress: Anxiety related to technology use.
Repetitive Strain Injury (RSI) and Carpal Tunnel Syndrome (CTS)
Pain and discomfort caused by repetitive motions, often associated with keyboard and mouse use.
Fake News
Definition
Fabricated news stories spread online, often sensationalized for specific purposes.
Purpose
 Generating ad revenue.
 Discrediting individuals or entities.
 Causing confusion and distrust.
Protection
 Verify information from multiple reputable sources.
 Avoid sharing unverified news.
 Be cautious of emotionally charged content.
Malware
Influence on Society
 Lost productivity due to malware removal and system recovery.
 Disruption of business services and financial losses.
 Eroded trust and confidence in affected organizations.
 Data breaches and compromised personal information.
Types of Cybercriminals
 Social Engineers: Deceive individuals into revealing sensitive information.
 Hackers: Gain unauthorized access to computer systems.
 Crackers: Engage in illegal hacking activities.
 Cyber Gangs: Organized groups committing computer crimes.
 Virus Authors: Create and spread malicious software.
Social Websites and Social Engineering
Social Engineering Techniques
 Baiting: Luring users with attractive offers to download malware.
 Phishing: Using deceptive emails to obtain sensitive information.
 Email Hacking and Spamming: Compromising email accounts for spam campaigns.
 Pretexting: Creating false scenarios to gain trust and access to information.
 Quid Pro Quo: Offering fake services in exchange for valuable data.
Social Engineering on Social Websites
 Exploiting personal information shared on social media for identity theft.
 Creating fake profiles to deceive users and gain their trust.
Ways to Commit Cybercrimes
 Backdoors: Secret entry points into software bypassing security measures.
 Trojans: Malicious software disguised as legitimate programs.
 Distributed Denial-of-Service (DDoS) Attacks: Overloading systems to disrupt services.
 Botnets: Networks of infected computers controlled remotely.
 Internet Fraud: Scams targeting individuals online, such as phishing and identity theft.
Examples of Cybercrimes
 Identity Theft: Stealing personal information for financial gain or other illegal activities.
 Bandwidth Theft: Using internet bandwidth without authorization.
 Service Theft: Unauthorized access to online services using stolen credentials.
 Internet Attacks: Malicious actions targeting computer systems and networks.
 Unauthorized Remote Control: Gaining control of a computer without the owner's consent.
Effects of Cybercrimes
 Financial losses for individuals and businesses.
 Damage to reputation and loss of trust.
 Disruption of services and productivity.
 Emotional distress for victims of identity theft and other cybercrimes.
Safe Email and Internet Use
Guidelines to Avoid Threats
 Use strong, unique passwords.
 Be cautious of suspicious links and attachments.
 Protect personal information.
 Keep software up to date.
Email Etiquette (Netiquette)
 Write clear, concise emails with relevant subject lines.
 Proofread for errors and avoid using all caps.
 Be mindful of attachments and recipients.
 Avoid gossip, inflammatory remarks, and online arguments.
Location-Based Computing
Definition
Processing data that utilizes the geographical position of devices.
Social Implications
 Privacy concerns due to continuous location tracking.
 Potential for misuse, such as stalking or harassment.
 Ethical considerations regarding data collection and use.
Benefits
 Enhanced community awareness and connectivity.
 Improved access to location-specific information and services.
Disadvantages
 Increased vulnerability to privacy violations.
 Potential for bias in location-based data analysis.
 Risks associated with location tracking, especially for vulnerable individuals.
Capabilities and Limitations of ICTs
Benefits
 Speed and efficiency in data processing.
 Accuracy and consistency in task execution.
 Storage and retrieval of vast amounts of data.
 Global communication and collaboration.
Limitations
 Dependence on hardware, software, and internet connectivity.
 Security vulnerabilities and the risk of cybercrime.
 Ethical concerns related to data privacy, job displacement, and the digital divide.
Impact on the Human Race
 Transformation of various sectors, including healthcare, education, and business.
 Increased reliance on technology for communication, information access, and daily tasks.
 Ethical and societal implications requiring careful consideration and responsible use.
Effects of Digitalization
Definition
The integration of digital technologies into everyday life and business processes.
Future Careers
 Digital Forensic Investigator: Collects and analyzes digital evidence for legal proceedings.
 3D Architect/Printing Operator: Designs and creates three-dimensional models and objects.
 Privacy Consultant: Advises organizations on data privacy and compliance regulations.
 Medical Nanobot Technician: Develops and maintains nanorobots for medical applications.
Impact on the Workplace
 Mobile Offices: Enable flexible work arrangements and remote work opportunities.
 Virtual Offices: Provide shared workspaces and amenities for remote workers.
 Decentralization of Labor: Allows employees to work from different locations.
 Office Automation: Automates routine tasks, improving efficiency and productivity.
Benefits of Digitalization
 Enhanced communication and collaboration.
 Increased efficiency and productivity.
 Access to a global workforce and resources.
Challenges of Digitalization
 Job displacement due to automation.
 Increased digital divide.
 Cybersecurity threats and data privacy concerns.
Artificial Intelligence (AI)
Definition
The development of computer systems capable of performing tasks that typically require human intelligence.
Examples
 Data analysis and prediction.
 Chatbots and virtual assistants.
 Self-driving cars.
Benefits
 Automation of tasks, improving efficiency and accuracy.
 Creation of new job opportunities in AI development and related fields.
Disadvantages
 Job displacement in certain sectors.
 Ethical concerns regarding bias, privacy, and the responsible use of AI.
Robotics
Definition
The design, construction, operation, and application of robots.
Examples
 Industrial robots for manufacturing and assembly.
 Surgical robots for precision medicine.
 Service robots for domestic and commercial tasks.
Benefits
 Increased efficiency, productivity, and accuracy.
 Ability to perform dangerous or repetitive tasks.
Disadvantages
 Job displacement in certain industries.
 High initial investment and maintenance costs.
 Ethical considerations regarding robot autonomy and potential impact on society.
Protecting Your Online Identity
Definition
Safeguarding personal information and reputation in the digital world.
Ways to Protect Privacy
 Comply with data protection regulations (e.g., GDPR, CCPA).
 Limit personal information shared on social media.
 Use strong passwords and enable two-factor authentication.
 Be cautious of phishing scams and suspicious emails.
 Regularly review privacy settings on online accounts.
Information Systems
Definition
Organized systems for collecting, storing, processing, and disseminating information.
Impact on Society
 Facilitate communication, collaboration, and access to information.
 Support various industries, including healthcare, education, and business.
 Influence political processes, environmental management, and social interactions.
Threats Caused by Computer and Human Error
 Inaccurate data entry and manipulation.
 Software bugs and system vulnerabilities.
 Incorrect hardware or software configurations.
 Human errors, such as weak passwords and social engineering susceptibility.
Effects of Data Breaches and Cybercrime
 Identity theft and financial losses.
 Reputational damage and loss of trust.
 Disruption of services and business operations.
Big Data
Definition
Extremely large and complex datasets requiring advanced processing tools.
Advantages
 Valuable insights for business decision-making.
 Improved customer experiences and targeted marketing.
 Enhanced product development and innovation.
Disadvantages
 Privacy concerns and potential for data misuse.
 Risk of discrimination based on data analysis.
 Cybersecurity challenges and the protection of sensitive information.
Applications of Big Data
 Online banking fraud detection.
 Personalized travel recommendations.
 Data-driven educational insights.
 Targeted advertising on social media.
Influences of Globalization
Definition
The interconnectedness of nations through increased trade, investment, technology, and cultural exchange.
Results of Globalization
 Enhanced communication and collaboration.
 Increased competition and innovation.
 Spread of information and ideas.
Advantages
 Economic growth and job creation.
 Access to a wider range of goods and services.
 Cultural exchange and understanding.
Risks of Globalization
 Job displacement in developed countries.
 Exploitation of workers in developing countries.
 Cultural homogenization and loss of diversity.
Industrial Revolutions (4IR)
Definition
The current phase of industrial advancement characterized by the integration of digital, physical, and biological systems.
Technologies
 Internet of Things (IoT).
 Artificial intelligence (AI).
 Robotics and automation.
 Big data analytics.
Impact
 Transformation of various industries, including manufacturing, healthcare, and agriculture.
 Creation of new job opportunities and economic growth.
 Ethical and societal considerations, such as job displacement and the digital divide.
Mobile Technology
Advantages
 Instant communication and access to information.
 Convenience and portability.
 Entertainment and social networking.
 Increased productivity and efficiency.
Disadvantages
 Cost of devices and data plans.
 Potential for addiction and distraction.
 Health concerns, such as eye strain and sleep deprivation.
 Privacy and security risks.
Negative Impact of Mobile Technology
 Erosion of privacy due to data collection and tracking.
 Cyberbullying and online harassment.
 Spread of misinformation and fake news.
 Negative impact on mental health and well-being.
IoT (Internet of Things)
Advantages
 Improved efficiency and automation.
 Enhanced data collection and analysis.
 Personalized experiences and customized services.
Examples
 Smart homes, cities, and transportation systems.
 Wearable health trackers.
 Precision agriculture and environmental monitoring.
Distributed Computing Power
Definition
Harnessing the processing power of multiple interconnected computers to solve complex problems.
Advantages
 Cost-effective alternative to supercomputers.
 Increased processing power for demanding tasks.
 Collaboration and resource sharing among researchers.
Examples
 Scientific research, such as drug discovery and climate modeling.
 Data analysis and processing for large-scale projects.
Wikis
Definition
Collaborative online platforms allowing users to create and edit content.
Advantages
 Vast and constantly updated information base.
 Collaborative editing and knowledge sharing.
 Accessibility and ease of use.
Disadvantages
 Potential for inaccuracies and bias.
 Vandalism and the spread of misinformation.
 Privacy concerns related to personal information.
Cookies
Definition
Small text files stored on a user's computer by websites to track browsing activity.
Purpose
 Personalize user experiences.
 Track website traffic and user behavior.
 Target advertising based on browsing history.
Anonymity
Advantages
 Increased freedom of expression.
 Protection from censorship and retaliation.
 Support for whistleblowers and victims of abuse.
Disadvantages
 Potential for misuse, such as harassment and cybercrime.
 Reduced accountability for online actions.
Global Unique Identifiers (GUIDs)
Definition
Unique identification numbers generated by software to identify objects or entities.
Advantages
 Ensure uniqueness across different systems and platforms.
 Facilitate data management and tracking.
Disadvantage
 Potential privacy concerns if linked to personal information.

You might also like