IT Theory
IT Theory
Table of Contents
System Technologies....................................................................................................................................................................................................2
Networking and Communications..............................................................................................................................................................................39
Data and Information..................................................................................................................................................................................................99
Solution Development..............................................................................................................................................................................................120
Social Implications...................................................................................................................................................................................................130
System Technologies
Information Technology Terminology
Information Technology
Definition: IT is the use of computers to generate, process, store, retrieve, and exchange electronic data and information.
ICT
Terminology: ICT (Information and communication technology)
People – to supply the data and to make decisions from the output supplied from the system information, which is based on the results
from processing data and the output from an ICT system.
Hardware e.g. input devices, storage, processor, output devices, communication devices, database servers, and scanners.
Communication like wifi, cabled communication media, etc.
Software – the computer programs which provide the step-by-step instructions to complete the task. Including the system software
like the operating system and application software needed at the till point to process transactions. POS (point of sale) systems refer
to the place where a sales transaction is completed, for example, at cash registers in retail stores and shops, at bars and restaurants,
hair salons, spas, etc. Restaurant POS systems allow waiters to process orders. These systems consist mostly of payment terminals,
touchscreens, and a variety of other hardware and software options.
Data – raw unprocessed input that is processed by the system to provide the information. Data can come in different formats, such as
sounds, images, and videos, etc.
Information is the processed data to produce meaningful information and the output provided by the system.
Definition: It is a system that combines hardware, software, communications technologies, and data used by people.
Data vs Information
Terminology: Data vs information
Definition: Data is raw unprocessed input vs Information is processed data to produce meaningful information
Why information is useful: It supports good decision-making as trends can be identified.
Computers
Definition: Computers are programmable electronic devices designed to accept data, perform prescribed mathematical and logical
operations at a high speed, and display the results of these operations, as information
Advantages
Allows companies to increase their productivity and therefore profit.
Connects the user to the Internet to find information.
Can collect, store, and process big data to produce information.
Reduces the time it takes to sort, organize, and search through information.
Get a better understanding of information
Allows for e-learning.
Disadvantages
Can reduce the availability of jobs
Potentially cause a risk in the loss of privacy
May develop an RSI injury and your eyes may take strain
Can cause distractions since there is too much multitasking for the human.
Can limit learning and create a dependency (you do not want to remember information as you can just search it on the internet).
Increases waste that impacts the environment.
Modular design
Definition: The modular design consists of different parts to facilitate upgrade and repair.
Types of computers:
Listed from largest to smallest and most powerful to least
Desktop System designed for regular use in a fixed location. • Easier to upgrade. • Not mobile
• Less expensive to • Need power to function.
upgrade.
• Need separate mouse,
• Less expensive to buy screen, and keyboard.
• More comfortable • Always a lot of cables to
keyboard and an easier to manage
use mouse compared to a
laptop.
Laptop Fully functional multi-purpose computer that is • Mobility due to the • Durability can damage
mobile. lightweight easier than a desktop that
stays in one place.
• Built-in battery that allows
the user to work when there • Higher cost than a
is no power similar desktop
• A greener solution than a • Security Issue: easier to
desktop since it uses less get lost or stolen
power.
• Limited battery
• Has a built-in wireless compared to a tablet
NIC to connect to a
• More expensive and
network through WiFi
difficult than desktop to
upgrade and repair
Tablets On-screen keyboard, screen size is bigger than • Portability (can work from • Hardware gets damaged
smartphone but smaller than laptop. Reading of e- everywhere and small easier
books is better on a tablet than on a smartphone. enough to put in a carry
• Lower performance
bag)
than laptop
• Screen can rotate (You can
• Difficult to work with a
choose to place the screen in
touch screen keyboard
landscape or portrait.)
• Screen size is smaller
• Handwriting recognition
than laptop
software can be used.
• Harder to add
peripherals
• Small storage space
Smartphone Smartphones are better than desktops at tasks that • Increased mobility due to • Small screen that makes
require a small mobile device, like taking photos, the lightweight input difficult
setting alarms, navigating the roads, making calls, and
• Built-in battery allowing • Lower performance
sending and receiving short-messages.
users to use the device when than a tablet
there is no power.
• Gets damaged easier
• Built-in cellular
• Gets lost or stolen easier
connection to give the user
access to the internet while
traveling.
Categories of Hardware
INFORMATION PROCESSING CYCLE
Data that will be The specific steps that must be Information produced Permanent storage of Communication
inputted into the followed to change data into from processed data data and information between devices
system information.
• Mouse • Central Processing Unit • Monitor • Hard disk drive • Network Interface
card
• Keyboard • Graphical Processing Unit • Printer • SSD
• Router
• RAM • Flash Drives
• Access point
• Blue ray
• UTP cable
• DVD
• Fibre optics
Device Description
Alternative Also called ergonomic keyboards or adjustable keyboards. It increases typing comfort and can be adjusted to user
keyboards preferences.
Pointing Any device like a mouse, stylus, touch-sensitive pad, or trackball. Device is used to manipulate the movement of a
devices cursor on a computer monitor
Pen input Using a stylus to interact with the computer, capturing data with digital ink. A stylus can be used for text entry,
drawing as a pointing device, and to complete online forms
Video input Video capture devices allow you to record a live video stream using your computer. Used for TV, making films, etc.
Data collection Data collection devices obtain data directly from a location where an event or transaction takes place. An example is
devices your mobile phone – during Covid you could track infections as well as if you were in contact with a Covid positive
person. Online tracking can give information like how many people visited the site, how long did they stay, what did
they click on. This information will assist the business to make informed decisions
Card readers A device that can read information from a card. Examples of card readers are the reading of the magnetic strip on
a credit card or SD card reader used to read the information from a memory card. Some laptops come with built-in
card readers.
Scanners Scanners allow you to scan any type of document onto your computer.
To create a soft copy from a hard copy
3D-scanners - use lasers/multiple cameras
Barcode -quick identification of items from an alphanumeric ID code
Biometric - The use of physical characteristics to identify individuals
Ports
Thunderbolt Input and output devices. To connect high-speed devices to the motherboard for data transfer to and from
the device.
Printers Inkjet: An inkjet printer operates by painting an image using a spray of ink. This is done by
hundreds of tiny nozzles that spray drops of ink directly onto the paper while moving across it.
Used to print high-quality images
Connect: USB port / Wi-Fi / Bluetooth
Ink Tank: Print heads built into the printer and use ink that is supplied continuously to the print
head from an ink tank within the printer itself. No expensive cartridges are needed. When the
ink is finished, the ink tanks are refilled from an ink bottle.
Laser: Laser printers use toner to burn images onto a paper. Even though they are more
expensive to buy, their running cost is lower than an ink tank printer. Laser printers are ideal
to use for high-volume printing.
3D: 3D printing is a process of creating three-dimensional solid objects from a digital file.
Objects are built by printing one layer at a time. e.g., prosthetics and movie props.
Advantages:
• Less waste = The production of parts only requires the materials needed for the part itself,
little or no wastage as compared to other ways where the part is cut off from large chunks of non-
recyclable material
• Cost reduction – using this method lowers the cost due to no materials being wasted.
• Reduce production time giving manufacturers a competitive advantage.
• Easier to fix and reprint errors in the design of a product
Data Definition: An optical device that projects an incoming image on a large surface to VGA/HDMI
Projector accommodate a larger audience.
There are two different types of projectors:
• Make use of VGA port – quality of image is good, can only display images.
• Making use of HDMI port – quality of image is excellent, and audio can be used.
Sound Headphones: An individual can listen privately to audio by making use of headphones. Audio
Jack/Bluetooth
Speakers: A speaker produces sound into the open air for all close by to hear
Sound card
Jack/Bluetooth
Devices
Touch Screen A touch screen is a computer display screen that serves The user can use their fingers to touch
as an input (touch) and output (image) device. pictures/words/icons on the screen to interact with. Used
in tablets, smartphones, and some high-end computers
Game Game controllers are devices designed specifically for • Gamepad.
controller use in games. They have directional inputs as well as
• Paddle.
action buttons linked to specific actions inside a game.
It also produces output through vibrations and sound. • Joystick.
• Trackball.
• Throttle quadrant.
• Steering wheel.
Digital Cameras allow you to capture images and show the They are more cost-effective as no film is needed and
cameras captured image on the screen images can be viewed and retaken if not correct. The
digital camera has a lot of extra features that can enhance
picture quality and looks
Smartboard An interactive smart or electronic whiteboard, is a tool Especially used in education that allows the educator or a
used to project the image and give input via a tool or learner to “interact” with the projected images, directly on
fingers the whiteboard.
Storage devices
Hard Disk Drive A large mechanical storage device used to store data SATA rpm (revolutions per
(HDD) permanently minute)
Solid State Drive A permanent electronic storage device that can be read and SATA
(SSD) written to at a high speed.
Used in laptops and mobile devices.
HDD vs SSD
Capacity Found in bigger capacity due to price Found in smaller capacity due to price
Fragmentation Becomes fragmented and then needs to be Does not become fragment, so no defragmentation
defragmented needed
Power Uses more power due to the moving parts A greener solution as it uses less power
Consumption
Durability Due to the moving parts, it is more likely to get The absence of moving parts means it is less likely to get
damaged damaged
External USB port Often used for backup and storing of movies Portable
hard drives since they have large storage capacities
USB flash USB port Used to transfer files and backups They are plug-and-play and are
drive available in a variety of storage
capacities
Memory card Built-in card reader • Extra storage for mobile devices
External card reader • Digital camera storage
(USB card reader
adapter)
Technique Description
Multitasking The operating system splits the CPU time between the active programs. It appears as if the computer is running
multiple programs at once, but it is still just doing one task at a time. In this way, you can run multiple applications
(or processes) on one processor seemingly at the same time.
Multithreading Instructions from the same program are divided into multiple threads. Each thread can be run independently and
executed by the CPU.
Multi- Uses multiple processors to complete tasks. Multiple cores can process multiple processes simultaneously.
processing
RAM
Definition: Random Access Memory. Temporary memory where data and instructions, which are currently in use, are stored before being
processed.
Function: All data and instructions that are currently being used are stored in RAM before it is sent to the CPU to be processed.
Characteristic:
RAM is volatile which means that all data will be erased from your RAM when your computer is turned off.
RAM is electronic and therefore faster than storage.
Measured: GB / TB
Where: Dual inline memory module (DIMM) slots on the motherboard
Performance: Important in determining the computer's processing speed (performance). The more RAM the faster the processing
speed - the more GB (capacity) the more programs can be held in the RAM at a time. Adding RAM is the most cost-effective way to
upgrade a computer and improve performance.
Virtual RAM
Definition: Space on the hard disk drive that the operating system to use as “RAM” when the RAM is full.
Purpose: When the RAM is full the operating system swaps data and information not being used between from RAM to the virtual memory
on the hard drive. All data that needs to be processed still needs to go to the RAM before being processed by the CPU.
Cache memory
Definition: To prevent the CPU from having to wait for data and instructions from the slower RAM. The CPU has a small, high-speed cache
memory built into the CPU, where it can temporarily store a small amount of the data instead of waiting for the slower RAM to send data.
Also known as CPU caching.
Caching
Type Description
Web Recently visited web pages are stored locally on the hard disk - if nothing has changed on the web page, information will
Caching be loaded from the hard disk, which is faster than loading from the slower internet.
Disk Every hard drive has a certain amount of RAM built into it to use as a cache. It stores data and files that have recently
Caching been read from the disk. This space could also be allocated in the RAM.
GPU
Where it is found:
Graphics card (Discrete/Dedicated) which could include a cooling fan and RAM
Integrated on the motherboard (built-in)
Integrated on the CPU
Function:
A discrete/dedicated GPU generates images faster than an integrated GPU.
The GPU takes the graphics processing away from the CPU, which allows the CPU to spend its time on other processing tasks,
instead of generating graphics for display.
This improves not only the quality of display but improves the general performance of the computer.
VRAM
Purpose: Video Random Access Memory is the memory used to store image data that the computer displays.
Role: It acts as a buffer between the CPU and the video card. When a picture is to be displayed on the screen, the image is first read by the
processor and then written to the VRAM.
VRAM VS RAM
Function Stores image data Temporary memory where data and instructions, which are currently in use, are stored
before being processed.
Storage RAM
Volatility Non-volatile i.e. permanent Volatile i.e. loses contents when there is no power
Cost Cheaper per GB More expensive per GB
RAM Cache
Data Stored Stores the whole program Stores recently used instructions
Software
Application software
Definition: Application software are programs designed to perform a specific task for the end-users
System Software
Categories of system software:
Operating system
Utility software
Operating system
Definition: System software that supports all the activities on a computer.
Functions:
Manages hardware and software
Provides the GUI (Graphical user interface)
Manages input and output peripherals
Manages RAM
Manages storage
Responsible for processes and tasks like multi-tasking, multi-threading, and multiprocessing
Types:
Virtualisation
o Definition: Virtualisation refers to creating an entity, referred to as a virtual machine, that only exists in software.
o Function: Often used when a programmer needs to test software they are developing. Virtualisation enables them to use one
machine to create virtual machines with different operating systems and specifications (like RAM, storage, and CPU power)
to test the software on.
o Advantages:
Another machine does not need to be bought to test software being developed.
Where certain application software can only be installed on certain operating systems, the user can create a virtual
machine with a different operating system to enable them to install any application software.
Users can hire a virtual computer from an online virtual machine provider. In this way, they can choose the hardware
configuration they need and have access to “their computer” from anywhere with an internet connection.
Less expenditure: servers, storage, and desktops, virtualisation can allow the same hardware to be used for multiple
tasks which saves money. It can also reduce the number of software licences that are needed.
Green IT: with fewer server and storage resources, the demand for power and cooling can be reduced and there will
be fewer units to dispose of.
o
Freeware Freeware software is available to you, The main advantage of freeware is It can contain viruses and Trojan
free of charge. However, the that it is free. It is also easily horses that affect the way the
developers or company that distributes accessible and generally comes with computer functions.
the software keeps the rights to the the files you need to use the
software. program
Shareware Shareware is copyright software The advantage of shareware is that The main disadvantages are that it
distributed free of charge, but after a it gives the distributor exposure cannot be modified.
trial period, it notifies the user that while giving the user time to decide
they might need to pay for the whether they want to spend money
program if they want to keep on using on the program or not.
it. Some developers distribute
shareware with a built-in expiration
date, for example after 30 days, the
user can no longer use the program,
while other types of shareware are
limited in terms of what functionality
it offers unless you buy the complete
program
Proprietary All computer software is developed Proprietary software is more stable, You must buy the software to use
Software using a source code. This code is the and technical support is easier to it. If there are any technical issues,
original design or technical blueprint access. you will have to wait for the
used to create the program. developer to address the problem
Proprietary software is where the
source code is not given to the public
or the user. It still belongs to the
distributor or developer, even if you
have bought the program
FOSS (Free Open-source software has the source It is free, and you do not need to pay Open software might not be as
and Open- code that is available to the public or to use it, which saves you money. user-friendly, especially to
Source anyone that wants to use it. It also Since the source is available to unskilled users. It is often difficult
Software) allows the user to change or modify anyone, the public can collaborate to find proper technical support or
the code itself if need be. You can also and fix bugs. Collaborators can to find drivers for some devices.
distribute this type of software to improve the performance or even The software can expose your
anyone and for any purpose. add features of good quality and computer to viruses and other
well-designed software. cyber-attacks
Utility Software
Drivers:
Definition: A device driver is system software that allows the operating system to communicate with and control hardware devices
connected to the computer
Installation manual vs plug-and-play:
Plug-and-Play is a technology that allows the operating system to automatically identify a device that is plugged into the computer
and automatically install the driver for the device.
Devices that are not plug-and-play enabled need to be installed manually. Device drivers could come with the peripheral bought on a
CD or could be downloaded from the manufacturer's website for free and then installed.
Other Utility Software
Software Description
Disk Clean- This is utility software, installed with your operating system, designed to free up space by searching the hard drive for
up files and programs no longer in use and providing the option to delete them.
Archive Less frequently used or outdated files can be compressed and stored on a secondary storage device where they can be
retrieved when necessary. The files can be retrieved if needed again in the future.
Backup Utility software used to create a duplicate copy of data on another storage device for use when the original data is
damaged or lost.
Type Description
Spyware Spyware is a piece of code that hides on your computer and tracks all your activity without your knowledge. You can
control the Spyware, by activating the pop-up blocker on your browser settings or by installing an anti-spyware software
application
Adware Adware is a type of malware that presents unwanted advertisements to the user of a computer in the form of a pop-up or a
window.
Worm A computer worm duplicates itself to spread to uninfected computers whilst staying active on the host computer.
Trojan It is software that keeps its true intentions hidden. It camouflages itself as a beneficial program so that the user will click on
the link and then installs software that will affect your system negatively
Rootkit Rootkit is a collection of programs designed to give a person control of a computer network or application. Once enabled,
the rootkit sets up a backdoor and can deliver additional malware such as ransomware, bots, key loggers, or Trojans
Spoofing Spoofing is where a replica of a website/email is created of a legit site/email to get the user to go to the fake site and enter
personal information.
Phishing Phishing is an attempt by cybercriminals to obtain sensitive information (usernames, passwords, and credit card details)
by posing as legitimate institutions, usually via email.
Pharming Pharming is a scamming practice in which your browser is directed to another IP address when you enter a URL. The aim
is often for users to input their personal information.
Security Features
Feature Description/Definition
Firewall A firewall is a network security device/software that monitors incoming and outgoing network traffic and decides whether
to allow or block specific traffic based on a defined set of security rules
Anti- An Antivirus is a software program that is designed to prevent, search, detect, and remove malicious software (Malware)
virus from your computing device.
Important:
• Ensure you have only one active anti-virus program on your computer
• Keep the virus definition up to date – to ensure it identifies new threats
Prevention of malware
Keep anti-virus software up to date to detect malware
Do not download apps from untrusted sources
Do not click on pop-ups
Be aware of phishing attempts
Threats and Preventions
Unauthorised • Physical theft of computers and portable storage devices • Biometric security
access
• Illegal access to a network or computer. • Physically locking up with
security personnel
• Activate firewall
• Make use of strong passwords
Hardware failure • Storage – HDD/SSD can malfunction, and all the data is lost • UPS (uninterruptible power
supply)
• Power – dip in power or an unforeseen power outage can damage the
computer hardware and in some cases make it impossible to retrieve the data • Backup
Definition Augmented reality technology superimposes a 3D VR a computer-generated simulated environment that can be
computer-generated image onto a user’s view of experienced by the user using specific input and output hardware
the real world and specialised software
Function • Product view –Allows customers to view and • Entertainment: for example, gaming, interactive theme parks,
interact with products or services before virtual museums, theatres, and movies.
purchasing.
• Medical field: AR can be applied so that the surgical team can
• Enhance content – People can point their device see the imaging data in real-time while the procedure is in
at a real-life object to learn whatever kind of progress
information is necessary instead of needing to
• Military: used for training simulation so soldiers can train for
search for it elsewhere.
combat situations.
• Training –AR enables users to train employees
• Education: so that large groups of students can interact in a
more thoroughly than they can through
virtual classroom with supporting data. For example: Scientific
documentation and meetings. Visualisation: uses computer graphics to show abstract or
complex ideas, like molecular models.
• Engage your audience –People are inundated
with print and television advertisements to the • Healthcare: used by doctors and nurses in many fields e.g.
point where they don’t pay much attention to them. surgery simulation, phobia treatment, robotic surgery, and skills
Inserting augmented reality into advertisements training.
will catch the eye of your target demographic.
• Fashion: for example, avatars are used to help with clothing
• Entertainment like Pokémon Go design, and virtual stores can be created.
• Heritage: for example, visitor centres like the Terracotta Army
are being created in a virtual world so that the site can be protected
from tourism.
• Business: to train new employees and provide virtual tours of
the business environment.
• Engineering: engineers can view their project virtually to
understand how it works, to spot any flaws or potential risks
before implementation.
Advantages • Enhances personal experiences • A training tool in many areas of life and can provide remote
access e.g. surgery can be performed in remote locations using
• Able to preview the product visually like fitting
robotic technology and virtual reality.
clothes, a new desk in your room
• It provides learning experiences that one cannot get from reading
• Can be used by people who are physically or
books as it immerses you in that world. This makes learning fun
mentally disabled
and can eliminate the language barrier and certain dangers
• It is more interactive and engaging than regular associated with scientific experiments.
media, which can make teaching easier
• It offers a new way of providing entertainment.
Limitations • Ensuring that the digital data is within scale with • It cannot simulate a real classroom where learning fluctuates.
the real environment can be difficult.
• Virtual reality can be addictive and detrimental to social
• In smartphones, AR must work with limited connections as it is not real-life, only a simulated world.
storage, low processing power, and a small • Virtual reality devices can be expensive.
amount of memory which limits what it is able to
• VR software takes up a lot of storage space
do.
• Requires a lot of computing power compared to other software
• The development and maintenance of AR
software can be expensive • The software for virtual reality is limited and in some cases
inflexible as it cannot go out of that scope.
• Could drain the battery life of the device
Difference between VR and AR: While Virtual Reality takes you into a virtual world and blocks out the real world, Augmented Reality
refers to overlaying computer-generated images on top of real-time images.
Networking and Communications
Networks
Definition: A group of computing devices connected through communication media to allow devices to communicate and share resources.
Advantages
Communication: Networks allow users to communicate through e-mail, online chat, video calls, online conferences, and social
media.
Sharing and Access to Resources: Peripherals such as printers and scanners can be shared by users on a network, which reduces costs
spent on hardware. Hardware such as the hard drive on the server for storage space can also be shared.
Centralisation: Users can access data and information regardless of their physical location. This simplifies backup since all data is in
one place.
File and Fund Transfer: Data can be transferred using a network in various ways, such as through online storage, attachments in an e-
mail, or storing data on the network server. Users can make payments through a network such as the internet.
Productivity: Network users can share files through online storage and collaborate on the same files. This increases productivity since
multiple users can work on the same document simultaneously.
Leisure: Users can use social media and online games for leisure.
Disadvantages
Financial Costs: Networks have financial cost implications since a network specialist is needed to set up a network, and a permanent
network administrator needs to be employed to control the network and its users.
Security Risks: Networks often store sensitive data. Money and time need to be spent to ensure the network is secure.
Malware Spread: Once malware infiltrates a network that is not secure, it will spread very quickly since all devices are connected.
Single Point of Failure: If the server breaks, no one will continue their work, causing a loss in productivity and profit. If the backup is
not up to date, there will be a loss of essential data for the company.
Overview of a LAN with a Star Topology
Network Components
Nodes
Nodes include computers (workstations), smartphones, tablets, and peripherals such as printers.
Server
Compared to client computers, a server is a more powerful machine with more processing power, memory, and storage space. They do
not use the network but instead provide and manage network resources to clients.
Function: Used to manage devices, users, and data on a network.
NIC (Network Interface Card/Controller)
Function: A hardware component that allows network devices to connect to the network for communication.
Computing devices come with an on-board controller, meaning it is built into the motherboard.
If the on-board NIC fails, the PCI-express slot on the motherboard is used to install another NIC.
Types of NICs:
o Wired NIC: Provides the computer with a NIC port to connect to the UTP cable.
o Wireless NIC: Provides a mobile device like a laptop, smartphone, or tablet with the ability to connect through Wi-Fi. In an
advertisement for a device, this is indicated by the specification 802.11.
o Can be wired, connecting a device with a cable to a network, or wireless, like connecting the laptop through WiFi to the Access
Point.
o The speed of the NIC can affect performance when it comes to:
Switch
Function: A hardware device that connects nodes on the same network to a central point to allow communication between the nodes
by directing network traffic to the correct port. In a star topology, a switch is used as the central point to which all nodes connect.
Example: If a computer on a network needs to print, the switch will send the data to the correct printer linked to the network.
Communication Media
Wired Communication Media:
UTP Cables (Unshielded Twisted Pair) / Ethernet Cables: Electrical pulses are used to transmit data along twisted copper cables.
o Associated with a star topology in a LAN.
Fibre Optic Cables: Light pulses are used for data transmission through fine glass/plastic tubes.
o Often used in the backbone of a network.
WiMAX (Worldwide Interoperability for Microwave Access): WiMAX is used in large companies or public hotspots, for example, at
airports. Advantages of WiMAX over Wi-Fi:
o Covers a larger area.
o It is more secure.
Bluetooth: Wirelessly connects two devices for a short period over a short distance. Bluetooth is often used in a PAN.
Wi-Fi vs Bluetooth:
Data Transfer Speed Higher data transfer speed Lower data transfer speed
Network Connectivity Connects to a larger network Transfers data between devices (up to 8)
Eavesdropping This is when a criminal uses technology to detect a signal to steal data transmitted through the communication media.
Also known as a sniffing or snooping attack.
Advantages Less expensive, Easy to install. Easier to access and connect than a cabled network More expensive, Highest
with mobile devices and in cramped places. data transfer (highest
bandwidth), Lower
attenuation.
Disadvantages Slower data transfer than Fibre Limited by the range of the radio signals and the Least expensive to
(lower bandwidth), Susceptible number of devices connected to the access point. install, Technical expert
to attenuation. Signal needs to Limited range from 10m – 100m depending on how needed to install.
be boosted after 100m. powerful the access points are, the type of
antennae used and physical obstacles.
Adding new Limited by the number of Easier to add new devices to a WLAN since they do N/A
devices available network points and not need a network point to connect to.
network cables available to
connect to.
UTP vs Wi-Fi:
UTP is less prone to interference.
UTP is not as slow when shared between multiple users.
UTP is not influenced by objects like walls and trees.
UTP has better security.
Topology
Definition: The physical layout of devices (nodes) in a network.
Star Topology:
Requires each device to be connected with its cable to the switch, which directs traffic to the correct destination.
Advantages of Star Topology:
Easy to troubleshoot problems.
If there is a cable malfunction, only that device is disconnected from the network.
Easy to add and remove devices.
Easy to set up.
Stable network.
Network Types
PAN (Personal Area Network)
Definition: A network with a small range where two devices connect for a short period. Small amounts of data are transferred
between devices.
Communication Media:
o Bluetooth
Examples:
o Computer connected to a phone/printer via cable or Bluetooth.
o Using NFC (Near Field Communication) to transfer data and make payments.
Uses:
o Synchronising personal devices
HAN (Home Area Network)
Definition: Based around a home environment with a small range.
Communication Media:
o Wi-Fi is most often used as communication media
Example: Connect computers, printers, smartphones, smart TVs, smart homes, and gaming devices through Wi-Fi using the router
at home.
LAN (Local Area Network)
Definition: A network that covers a relatively small area with a cabled connection.
Communication Media:
o UTP/Ethernet cables
Example: A school where computers in the class are connected to the network using cables.
WLAN (Wireless Local Area Network)
Definition: A network that covers a small area with a wireless connection.
Communication Media through Access Points:
o Wi-Fi
o WiMAX
Advantages:
o Adding new devices to a WLAN is easy since they don't need a network point to connect to.
o Users are more mobile since they can connect from anywhere if within the Wi-Fi range.
Disadvantages:
o Security is a greater threat.
o Satellite.
o Radio waves like Wi-Fi and WiMAX.
Examples:
o Mobile communications networks like used on smartphones
o Banking network.
o Offices around the country of a business that needs to connect and communicate.
o The Internet.
Composition Two devices in close range A router and personal devices Switch, server, Two or more LANs
connected to it, like laptops, computers, printers connected through a
smartphones, and printers router
Media Bluetooth/cable to connect UTP and Wi-Fi UTP cables and fibre Routers, satellite, Wi-
smartphone to computer optic cables for the Fi, WiMAX, UTP, and
backbone fibre optic cables
Capacity One main device with up to 10 to 20 devices depending on the A larger number of Connects more devices
7 peripheral devices router's capability devices than HAN than a LAN
Installation and Easy to install and run since no server or Expert required to install, and a server and network
Running network administrator is required. administrator required.
Number of A small number of computers can be connected. A larger number of computers can be connected.
Computers
Software Software is included in the operating system of Specialised network operating system (NOS) needed for the
every peer. server.
Failure If one peer fails, the network will be unavailable If the server fails, no client can work. However, if a client
to the others. fails, the other clients will not be affected.
Network Access
Internet vs Intranet vs Extranet
Network Description
Type
Internet The global WAN consists of devices, networks, and web servers connected through various communication forms.
Intranet A private network of a company that offers restricted access to the business's data.
Extranet Used when users from outside the organisation, like their clients, are provided access to information using a username
and password. For example, signing into the extranet of the medical aid, eTolls, or local municipality account.
o Service and application provider. For example: Maps, Uber, Weather, Waze
o Mobile devices/Computer
o User
Advantages
o Profiling customers
Example Using Foursquare/Snapchat: The user will know when a friend is nearby and can invite them.
Examples Making Use of Location-Based Computing:
Weather apps like Weather, Lightning alarm
Direction apps like Waze, Maps, Google Maps, Maps in museums
Social media apps that allow you to share your location and see where others are. Examples: Facebook, Foursquare, Twitter, Tinder,
Snapchat.
Food ordering services for delivery like Uber eats and Mr Delivery
Car-sharing services like Uber and bolt
Gaming apps such as 'Pokemon Go' (also an example of Augmented reality)
GPS (Global Positioning System)
Function: Allows one to locate the position of devices.
How GPS Determines Positions: Receives signals from satellites orbiting the earth to determine the device's position.
How it Works: By capturing signals from 3 or more satellites to triangulate data to pinpoint the location of the device.
Used in:
o Tracking a lost or stolen device or objects like vehicles.
directions
your location
points of interest near you
o
o Geo-tagging: Smartphone cameras record where the photo was taken using GPS, recording the area's physical location. For
example: Linking your location on an Instagram post.
o Verification that the device was in the correct location. For example: when signing in on a new device with an account like
Gmail or an Apple ID.
o FUP (Fair Usage Policy): A set amount that an ISP will determine the user can download in a certain amount of time for
uncapped lines. If they exceed the FUP, the user will be throttled by reducing the bandwidth speed they subscribed to.
Throttled
Definition: This is when bandwidth is reduced by the ISP to all activities when the network is strained or once you have exceeded your
FUP limit. You will pay more to have an unthrottled line.
Shaped
Definition: Shaping happens when an online activity gets prioritised over others when the Internet is busy. An ISP would usually do
this to ensure that everyone on the network has a great experience by ensuring that more pertinent things like video chats and VoIP calls
are prioritised when bandwidth is limited.
Connection Types
Cellular Connection:
Options for a Cellular Connection: LTE/4G/5G: Fifth-generation (5G) mobile network connection has higher speeds than 4G
If the device does not have a sim card, it could be connected through a personal hotspot provided by a smartphone or dongle
containing a sim card.
Hotspot:
Public Hotspot: A public area where internet access is available through a wireless internet connection.
Mobile Hotspot: Sharing a cellular internet connection with devices connected via Wi-Fi.
FTTH (Fibre to the Home):
Fibre cables run from a box in the street to a device called customer premises equipment (CPE). The CPE is connected to your Wi-Fi
router. This is a permanent connection with high-bandwidth (broadband) internet.
Electronic Communications
Definition: All forms of communication sent by electronic transmission.
Multimedia and the Internet
Download vs Streaming
Term Description
Download The entire file is downloaded from the internet onto your device's hard drive before you can start watching. This allows the
user to view the content many times without accessing the internet every time.
Streaming The file is played while connected to the internet without downloading the file first. "Buffering" might occur with a slow
internet connection to wait for the next section to be streamed.
Live This is when the streamed video is sent over the Internet in real-time (as it happens), without first being recorded and
Streaming uploaded. A fast, reliable internet connection is needed.
Webinar
Definition: Online seminars users can join over the internet from anywhere in the world.
Advantages:
o Users can join from anywhere in the world where they have internet access
Featu Chat Video e-Mail Blog SMS Instant Microbloggi Vlog Podcast
re Rooms Conferen Messagin ng
cing g
Defini Users Multiple Electro Websites Short Both the Posting of Video Audio files
tion connect users can nic mail that are message sender short blog: made
to a join a used to regularly service and text/pictures/ Posting available to
platform meeting send, updated where the receiver audios on a videos listen to.
on the or receive with sender need a social media online. Streamed
internet conferenc and diary- needs data platform. Examples online or to
to e through forward style airtime to connectio Examples: A where download
commun the electroni posts in send. n to the Tweet on Vlogs are from the
icate and internet. c reverse internet. Twitter is posted internet on a
discuss a Applicatio message chronolo Both limited to a on: device to
particular ns used: s over gical users maximum of YouTube listen to
topic. Skype, the order, need the 280 , later. Users
Example Microsoft Internet where the same characters. Instagra will use an
s: Teams, . most applicatio Tumblr m, app like
Discord, and recent n allows a Vimeo, Apple
Amino, Zoom. post will installed. maximum of Faceboo Podcasts,
Band Protocol always Examples: 140 k Spotify, and
used: appear at WhatsAp characters. Google Play
VoIP. the top. p, Music to
Messages, search,
Messenge listen to and
r, download
Telegram, podcasts of
Signal their choice.
Writin Chatroo Video Formal Informal Informal Informal The aim is to Informal Both
g ms could conferenc – using stories writing writing be as brief as , mostly informal as
Style be es are proper and style, often style, possible. not by well as
informal mostly netiquet articles making use often professio formal
or formal. te. from a of making nals. The podcasts
formal, personal emoticons use of audio-
dependin perspecti and SMS emoticons visual
g on the ve in a language. . Video form of a
topic conversat Video and and blog.
being ional pictures are pictures
discussed style of also are also
. writing. possible. possible.
Accuracy The aim is Businesse
: Blogs to be as s also use
can be brief as WhatsAp
inaccurat possible. p for
e because: Can customer
post/send support.
immediately, Instant
They are and messagin
posted by someone can g has
anyone respond/co replaced
and are mment SMS in
their immediately. many
personal, areas.
biased
opinions.
The
informati
on is not
verified.
Could be
outdated.
Purpo A Used for Send To share Used when To Used to share Videos Audio files
se platform business and informati the receiver communi ideas with broadcast broadcasted
for users meetings receive on about or sender cate with followers ed online online for
who and online message the does not friends online. either users to
share the education s creator’s have and pre- listen to
same . containi own internet family or recorded using their
interests ng text, knowledg access or a groups of and media
to images, e that smartphone people to uploaded player/smar
discuss a or other they , by organise or tphone
certain attachm would companies events. streamed apps.
topic. ents to like to like banks live
and share and medical
from with aids to send
anyone followers notification
with an online. s, receive an
email Companie OTP when
address, s can use doing online
anywher blogs for: purchases
e in the and
world. marketing.
Email is Marketin
also g-
used to updated
advertis with news
e to and
multiple events
people during the
at once. day to
attract
visitors.
Display
upcoming
events or
informati
on about
participan
ts in an
event.
Audie A wide A wide Sent to A wide Used between Used A wider A wide It could be
nce audience audience. specific audience peers. The between audience of audience. users catching
. Anyone Anyone recipien of anyone sender needs peers or for online Anyone up on news
with an with an ts who connected to have the group followers. with an from a radio
internet internet can to the contact communica Anyone on the internet site, a podcast
connectio connection reply or internet and details of the tion. platform can connection posted for
n can could join forward interested person to view the can view leisure, or
sign in if they the in the topic communicate content. your listening to a
and registered message discussed. with them. content. It book instead
contribu or were Viewers all depends of reading it.
te to the invited to can on the
topic the comment scenario.
being meeting. on the
discussed Online page.
. conferenc
es can be
attended
either as
an active
member
where the
user can
contribut
e and ask
questions
or as an
inactive
member
where
communi
cation is
restricted.
e-Mail
Composition of an e-mail:
Each field, To…, Cc… and Bcc… can include one or many e-mail addresses.
Field Description
Cc… Carbon copy - to send a copy to other recipients. The recipient will see who else received the e-mail.
Bcc Blind carbon copy - to send a copy to other recipients. The recipient will not see who else received the e-mail.
…
Option Description
Reply Reply to everyone included in the e-mail in the To and Cc fields and the sender – attachments will be removed.
All
Attachments:
Do not send large attachments.
Do not click on attachments/links in e-mails from suspicious sources.
How Mail is Sent:
Sender sends the message ➔ Message stored on the sender's ISP server ➔ Message stored on the receiver's ISP server ➔ Message
received downloaded to the device
e-mail Address
Format: Username@ISP_ID.OrganisationType.GeographicalTerritory
Example: [email protected]
Organisation type examples:
com - Originally for commercial organizations, but any company can register for a .com domain that will cost more. No geographical
territory is added.
biz - Any business
edu - Educational
gov - Government
org - Non-profit organization
co - Business (company)
ac - Academic institution
Geographical Territory examples:
za - South Africa
uk - United Kingdom
sa - Saudi Arabia
au - Australia
fr - France
nz - New Zealand
ca - Canada
us - United States
de - Germany
ls - Lesotho
Domain
Each website has its own IP address for the server on which the website is stored. The domain name is like a nickname given to the IP
address, making it easier for us humans to remember the website's name.
Format: ISP_ID.OrganisationType.GeographicalTerritory
Example: axxess.co.za
DNS (Domain Name System)
Definition: A central location where all URLs are registered annually.
Function:
o Ensures each URL on the web is unique
e-Mail Access
Users can access e-mail through a web browser or application software like Microsoft Outlook on a computer or mobile device.
Feature Microsoft Outlook on the web Microsoft Outlook App for Mobile Devices
Internet Connection Using a web browser would need an internet Can be used to compose messages when not connected to
connection. the internet, which will send once the device is connected
again.
Access Access through a web browser. Access through an app installed from the app store.
Swipe Gestures Since a browser on a computer would be used to Swipe gestures can be used, associated with a mobile
access the mailbox, there are no swiping device.
gestures.
When Used Often used when travelling when the user needs to Give the user access to their e-mails on their mobile device
use a public computer to access their e-mail. from anywhere and anytime.
Attaching Media from Media must first be retrieved from your phone Makes it easier to attach media such as photos that are on
Mobile Device before being uploaded to the web. your smartphone to an email.
Protocols
Definition: A set of rules that describes how data is sent between electronic devices so they can communicate.
SMTP Simple Mail Transfer Used to send e-mail through the internet. (Remember S for send)
Protocol
POP3 Post Office Protocol 3 Used to receive e-mail through the internet.
IMAP Internet Message Access IMAP allows you to access your email wherever you are, from any device
Protocol where you have an internet connection. E-mails are read on the server, and
IMAP will synchronise the e-mails to any device.
FTP File Transfer Protocol Used to transfer large files from one computer to another over the Internet.
HTTP Hypertext Transfer Protocol Transfers webpage data from the webserver, over the internet, to the user's
web browser.
HTTPS Hypertext Transfer Protocol Used to securely send data from the webserver to the user's web browser over
Secure the internet.
TCP/IP Transmission Control A protocol suite used to browse web pages.
Protocol/Internet Protocol
VoIP Voice over Internet Protocol Allows the audio of telephone calls to be transferred over networks. Software
that makes use of VoIP: Skype, Zoom, Microsoft Teams, Discord
Requirements:
Advantages of VoIP:
Cheaper than telephone calls over a long distance.
Software is usually free to install.
Allows video conferencing.
Allows file transfer like documents, images, and videos while engaging in a conversation.
Disadvantages of VoIP:
Both users need an internet connection and the software installed on their devices.
Poor quality if you have a slow internet connection.
When using video, you can use up your data cap quickly, and it could become expensive.
World Wide Web (WWW)
Web Terminology
WWW (World Wide Web): Information on websites stored on web servers worldwide that we access through the internet.
Web Browser
Definition: Application software that displays web pages.
Examples: Google Chrome, Mozilla Firefox, Microsoft Edge, Safari.
Features: The address bar is used to enter the web address the user wants to view. Browsers have Back, Forward, and Reload buttons
and Bookmark Favourite webpages often used.
Mobile Browsers
Mobile browsers are designed to fit on a mobile device's smaller screen.
HTML5 designs websites to be compatible with a mobile device.
Features such as double-tapping on the screen will increase readability.
Different input types are used to complete online forms compatible with a mobile device's limited keyboard.
When the user enters the URL of a website, the browser will automatically switch to the mobile version of the site.
Mobile Apps
Many websites created mobile apps for their service for the following reasons:
An app uses less data since the interface is installed once when the app is installed on the device.
The app interface is designed for easier input from a mobile device.
Allows users to receive notifications from the app.
Ability to cache data locally on the device so that data can be accessed offline.
The user does not need to enter the URL and log in every time they want to access the app.
Website
A group of web pages under the same domain name are linked through hyperlinks and available through the internet.
URL (Uniform Resource Locator)
A URL is the pathway to a specific web page.
Example: https://www.education.gov.za/
Search Engine
Definition: A search engine runs in a web browser to provide the user with an interface to enter keywords and find related websites.
Examples: Google, Bing, DuckDuckGo, Yahoo
Searching Techniques When Desired Results are Not Found:
Add more keywords and try to be specific about your topic.
You could also use synonyms for your current keywords for better results.
Use the advanced search tools provided by your search engine to filter your results according to file size, colour, file type, time posted,
user rights, and more.
You could place your keywords in quotes, and Google will search for those exact words.
SEO (Search Engine Optimisation)
Definition: A strategy used to place a website high on a search result of search engines. The result might not be relevant to the search
the user entered.
Explanation: Companies use keywords to ensure that their page appears at the top of a search. These keywords are used to attract
users to their website, which might not be relevant to what the user entered in their search.
Metadata
Definition: Additional information about a file that is saved with the file.
To access some metadata of a file, right-click on the file in File Explorer and click on properties.
W3C (World Wide Web Consortium)
Definition: An international non-profit organisation that develops web standards for the world wide web. Their mission is to lead the
World Wide Web to its full potential.
Search Types
Mediated Search
Definition: Search is done in an online database containing a list of sites in different categories to provide more relevant and up-to-
date results.
Disadvantage: Fewer results.
How Lists are Compiled:
o People are paid to compile lists of websites into categories that are useful and up-to-date.
o Social networks: Can be used to find helpful content to populate website lists on certain topics according to likes.
Semantic Search
Definition: Automatic searches for information based on webpages' metadata, the user's online profile, and the immediate
environment.
Web Development
Web Design Technology
HTML (HyperText Markup Language)
A set of mark-up codes used by a web designer to create web pages that the user will view in a web browser.
CSS (Cascading Style Sheets)
Each style is defined and provided with a different name used in the HTML document.
The format is determined in one place and can then be applied to all the website's web pages.
Advantages: Changes are made in one place which:
o Saves time.
o Used to make a webpage interactive. For example: Dropdown menus, images that change when the mouse moves over them.
PHP
Definition: A scripting language that executes on the server BEFORE downloading the webpage to the computer.
Explanation: A database stores information about users to provide dynamic web pages.
SQL
Explanation: SQL queries interact with the website database to make it dynamic and interactive. SQL is also used to add and remove
user data from the database.
AJAX (Asynchronous JavaScript and XML)
Definition: A combination of XML and JavaScript is used to allow small parts of a webpage to refresh without reloading the entire
page.
Examples: Google Maps, where the user can zoom in and out, and Google search, which autocompletes keywords while the user is
typing.
XML
Definition: A mark-up language used to describe, store and transport data.
Explanation: Own tags and symbols can be designed to describe content as opposed to HTML.
Summary of Code Used for an Interactive Web:
Type Languages Extension Interpreted
Scripting JavaScript, Perl, Ruby, .php / .asp / .jsp / .ajax / .aspx Interpreted by another program like HTML at
Languages Python, SQL, PHP runtime.
Client-Side JavaScript, HTML, CSS .htm or .html Executes inside a web browser on the user’s
computer AFTER the web page has downloaded.
Server-Side Perl, Ruby, Python, SQL, Will not be .htm or .html but Executes on the server BEFORE downloading the
PHP, ASP.net, HTML-5 rather .php / .asp / .jsp / .ajax / .as webpage to the computer. Used for dynamic
px websites.
Definition A website that displays the same information A website where different users will see different content even if they
to all users viewing the site. are visiting the same site.
Updates Not often updated and done by the Users create their content and view other's updates, which is
updated often.
webmaster.
Advantages
Simple to design – no web design Adapted to user needs and preferences.
programming skills needed.
Used for online stores.
Do not need much server power.
Make social networks possible.
Pages do not need to be updated frequently.
More comprehensive, interactive web experience.
Can create customisable pages or pages that need to be updated
often.
Internet Growth
Web 1.0
Definition: Provides the same content to all users and contains hyperlinks to other webpages or websites. Static HTML web pages are
stored on servers.
Explanation: Content is not updated regularly. Webmasters review content and keep the website up to date where needed. The only way
users can provide feedback is by sending an email.
Examples: A school's website.
Web 2.0
Definition: Dynamic web pages which are interactive and allow users to add content. Content is stored for each individual and
displays differently to each user that logs in.
Browser Technologies Used:
o AJAX
o JavaScript
Examples: Wikis, blogs, YouTube videos, social networking sites, online shopping, media repositories, e-learning websites.
Web 3.0 / Semantic Web
Definition: A web that can interpret information like humans to provide useful content tailored to user needs. Semantic web uses
metadata to:
o To supply additional data on which specific searches are done.
Advantages:
o Establishes user needs according to their online profile and environmental context without human intervention.
Technologies Used:
o Artificial intelligence
o Data mining
o Big data
o Blockchain
o Machine learning
o AR and VR
o Interests
o Site searches
Skills Needed:
o Software programming skills
Web Author
Responsible For: Writing and editing the text and creating videos used on a website.
Graphic Multimedia Designer
Definition: Someone who designs the appearance of a website like, for example, the buttons, icons, animation, and pictures.
Internet of Things (IoT)
Definition: Electronic devices connected to the Internet can be controlled and communicate with each other without human
interaction. The Internet of Things describes the network of electronic devices that have sensors and software – built into it, which will
communicate over the internet without any human interaction.
Explanation: IoT was made possible by Web 3.0
Ways Devices Can Connect to the Internet:
o Wi-Fi
o Cellular connection
Advantages:
o IoT can be used to monitor items remotely.
o IoT can be used to keep a log of data, which can aid in decision-making
Examples:
o Connected security. You can open your electronic gate and watch video cameras placed around your property by accessing the
cameras via the internet, using your phone.
o Household appliances can be operated, for example, using an app on your smartphone. This system allows you to turn the lights
in your house on and off through a smartphone app. Robot vacuum cleaners can be started while not at home.
o Connected cars – a car that can communicate bi-directionally with other systems outside the car. This allows the car to share
internet access, and therefore data, with other devices both inside and outside the vehicle. Soon cars will be able to communicate
with each other for safety-critical applications.
Online/Cloud Services
Online Storage
Definition: Storing files on a storage medium connected to a server and accessed over the internet.
Examples: Dropbox, iCloud, OneDrive, Google Drive
Advantages:
o Access on multiple devices
Disadvantages:
Need fast and reliable internet
The free space provided is limited, and you will have to pay for more storage.
If the company you are backing up with closes down or they have hardware issues, all your files can be lost.
You need to rely on the company's security to protect your data.
Cloud Synchronisation
Definition: Software monitors the changes made to your files and mirrors the changes to the online storage and back to all the devices,
which will now have the same updated version of the files.
Advantages:
Allows the user to access the latest version of the files on different devices.
Share with others to collaborate.
Make a duplicate copy off-site.
File Sharing
Definition: Giving someone access to the files/folders you have uploaded to cloud storage to enable them to collaborate.
Collaboration
Simultaneous Editing: All users can change and update the same document when using the online application of the software for
editing.
o Example: Google Docs, iWork
o Explanation: This is made possible through file sharing so that a group of people have access to the same file(s) through an
online storage service.
Online Backup
How it Works:
o There is a backup schedule that is set to backup automatically at set intervals.
o Can be used from any computer connected to the internet, regardless of that specific computer's specifications.
Disadvantages:
Need a good internet connection.
If the company no longer exists and did not inform you, you might lose all your data.
Monthly payment is often required.
You rely on the company to have good security and backup policies.
SaaS: Software as a Service
Definition: You pay a regular subscription fee and gain access to the services provided by SaaS.
Examples: Adobe Creative Cloud, Microsoft 365
NOTE: A software application can often be stored locally on the computer to work offline. Once the computer connects to the internet, the
data would sync with the cloud account.
BitTorrent
Definition Is a Peer-to-peer protocol for sharing large files over the Internet making use of BitTorrent software
Software Examples:
o µTorrent
o BitComet
o qBittorrent
Peers
A swarm of peers consists of:
Seeders: Devices that downloaded the entire file and are sharing the files with others.
Leeches: Devices are downloading the files but not seeding yet.
Torrent
Definition: A torrent is a small file that does not contain the actual shared file, but a list of seeders, the users can download the files
from. The more seeders there are, the faster the download will be.
File extension: .torrent
How does it work?
A large file is split into sections and shared via several peers instead of all users downloading the file from a single server, which makes it
faster. A torrent is generated by the server and shared through the software to show available seeders the other peers can download from.
Advantages
The software usually freeware to install.
Larger files are downloaded faster.
Reduces the cost of the server to the host from which the file is downloaded.
Disadvantages
Risk of downloading malware already in the file.
Illegal to use BitTorrent for copyright files, and pirated material is often available.
Network traffic could be slow when sharing popular files.
Big Data
Definition: This is a massive amount of complex data being generated, gathered, and stored which can be used to make informed
decisions about a business.
Characteristics:
o Volume: The amount of big data is huge since it is collected from many devices and sources (forms, IoT, databases, etc.).
o Variety: Big data comes in various data types as it is collected from various different sources.
o Velocity: The speed at which big data is generated. Big data needs to be generated quickly and should be updated in real-time.
o Value: Companies should find the information extracted from big data useful to make decisions about their business.
Challenges:
o Data capture
o Analysing data
o Sharing data
o Security
Examples:
o Customer profiling: By using big data, you can gain an insight into your customers. Businesses can get a comprehensive
description of a customer, including demographics and consumption patterns. These patterns allow a business to improve profits
by supplying what customers want according to knowledge gained.
o Advanced patient care: Real-time monitoring and body sensors of patients allow monitoring of their physical vital signs to be
done every few hours. This can lower costs of hospital care as less attention is needed by a nurse, because a computer can
analyse the big data. Wireless sensors can capture and transmit patient vitals far more frequently than human beings, and these
measurements can be analysed in real-time for advanced care. Diagnosis times are shortened, and treatments are prescribed
quicker. This is also an example of 4IR in the medical field.
o The agricultural sector. Sensors on fields and crops provide data on the soil conditions, wind direction and speed, fertiliser
requirements, water availability, and pest infestations. Farm equipment like tractors is equipped with GPS units to find their
optimal usage. Analysis of big data can also help prevent spoilage by moving products faster and more efficiently. Drones can
patrol fields to alert farmers to crop ripeness or potential problems. RFID-based traceability systems can provide a constant data
stream on farm products as they move through the supply chain, from the farm to the compost or recycle bin. Individual plants
can be monitored for nutrients and growth rates. The sensors, GPS, drones, RFID system and all the other technology used to
collect the data is an example of 4IR.
Blockchain
Definition: A growing list of records, called blocks, linked using cryptography.
Cryptography: The use of algorithms to encrypt and decrypt information so that only the intended recipient can read it.
Function: The data in the blocks cannot be altered, which ensures security and allows for transparency.
Advantages:
Increased transparency
Better security
Increased operational efficiency
How Does it Work?
It records transactions as blocks of data and chains them together using a hash, a unique value for each block. Blockchain uses a peer-to-peer
network, which allows everyone to have access to the records stored in a distributed database.
Examples:
This technology is used in cryptocurrency transactions like BitCoin, medical records, collecting taxes, and keeping track of a
diamond from when it has been mined to its final owner.
Walmart makes use of Blockchain to determine where in the supply chain, from farmer or manufacturer, distribution and
transportation, all the way to the customer, a product got damaged.
To buy and sell non-fungible tokens (NFT).
Security Services
Multi-Factor Authentication (MFA)
Definition: Users are authenticated for online services through more than one required security and validation procedure. At least 2
verifications:
o Something the user owns: An identification card/access card/Smartphone
How it Works: A password is originally needed to log in; then, an OTP is sent to another device via SMS/email to verify.
Advantages:
o Protection in layers improves security. For example: When you add a new beneficiary while doing online banking, you need to
approve the transaction in the banking app on your smartphone.
o Achieves compliance requirements because the POPI act requires companies to use all possible security measures to protect the
user’s information.
Disadvantages:
o Inability for a user to log in due to theft of a smartphone or physical device, which is required and may not be available.
Disadvantages:
If the user lost their device, an OTP cannot be received.
If the e-mail address on the site is incorrect, the user will not receive the token.
If the user is unable to use the token, it will expire.
Encryption
Definition: Using code/a set of rules to change data to be meaningless for security purposes.
Function: Provides security of data.
Opposite: Decrypt
Secure Sockets Layer (SSL)
Definition: An encryption protocol uses two separate keys: a public key to encrypt and a private key to decrypt sensitive data
transmitted over the Internet.
Uses: Used for online transactions and can be identified with URLs starting with https.
Digital Certificate
Definition: An electronic document used to verify the authenticity of an organisation online.
Function in SSL: A digital certificate, which is renewed annually, is used to verify the validity/authenticity of a person or
organisation.
Certificate Authority (CA)
Definition: An organisation that issues digital certificates like Thawte and Verisign.
Digital Certificate Contains:
Public key
Details about the organisation who owns the public key
The organisations domain name
Digital signature of the certificate authority
The dates for which the certificate is valid.
Data and Information
Number Systems
Numbering Systems
General number system:
o Called the decimal system
o Base 10
Base 2
Consists of the numbers 0 and 1
o
o Hexadecimal system:
Base 16
Consists of the numbers 0..9, A..F
o
Bits
Definition: Binary digit (0 or 1)
Byte
Consists of: 8 bits
Basic Data Types
Byte 1 0..255
ASCII
Definition: General standard for representing 256 characters and numbers using a unique numeric code, e.g., Alt + 136 = ê.
UTF-8
Also called: Unicode
Definition: Expansion of the set of characters that can be represented in one byte.
Conversions Between Different Numbering Systems
1101.1012 = 1 x 23 + 1 x 22 + 0 x 21 + 1 x 20 + 1 x 2-1 + 0 x 2-2 + 1 x 2-3 = 13.625
1A5F.3016 = 1 x 163 + A x 162 + 5 x 161 + F x 160 + 3 x 16-1 + 0 x 16-2 = 6751.1875
Method 1: Add the values for placeholders in the binary numbering system until the requested decimal value is reached. Indicate the values used
by a '1' and those not used by a '0'.
Example: Convert 634 to binary.
29 28 27 26 25 24 23 22 21 20
1 0 0 1 1 1 1 0 1 0
512 + 64 + 32 + 16 + 8 + 2 = 634
Answer: 634 = 10 0111 10102
Method 2: Divide the number by 2 repeatedly until the answer for the division is 0. Write down the remainder from bottom to top.
Example: Convert 634 to binary.
634 ÷ 2 = 317 remainder 0
317 ÷ 2 = 158 remainder 1
158 ÷ 2 = 79 remainder 0
79 ÷ 2 = 39 remainder 1
39 ÷ 2 = 19 remainder 1
19 ÷ 2 = 9 remainder 1
9 ÷ 2 = 4 remainder 1
4 ÷ 2 = 2 remainder 0
2 ÷ 2 = 1 remainder 0
1 ÷ 2 = 0 remainder 1
Answer: 634 = 10 0111 10102
Method 1: Add the values for placeholders in the hexadecimal numbering system until the requested decimal value is reached. Indicate the
values used by a '1' or the alphabetical symbol and those not used by a '0'.
Example: Convert 4289 to hexadecimal.
4096 256 16 1
1 0 C 1
Issue: Numbers that are too large for the declared data type. Not enough memory is declared. When the maximum for the data type is
reached, overflow occurs, starting at 0.
Example:
o Declaration: iVariable: Byte;
o Result: Value stored in iVariable is 65 (the maximum storable in a byte data type is 255)
Active:
o Powered by a battery
Advantages
Store more data and are more interactive than barcode systems.
Do not need a direct line of sight.
Several tags can be identified simultaneously by the same reader.
Fast, accurate data capture
Can be read even if the object moves
Can be reused
Tag data is encrypted
Disadvantages
Susceptible to certain materials and environmental factors
Vulnerable to software attacks
Privacy concerns
Interference from companies with the same technology
Examples
Low frequency (few inches range): Animal tracking, access control, car key fobs, asset tracking, healthcare
High frequency (30 cm range): Library books, personal ID cards, airline baggage, credit cards
Ultra-High frequency (25-100 m range): Supply chain tracking, manufacturing, pharmaceuticals, electronic tolling, vehicle tracking,
auto manufacturing, construction
RFID Technology Components
Stores data and tag ID on a microchip
Transmits data
Sends data to the antenna
Transmits the tag's data to the reader
Can be integrated on the tag or standalone
Size determines communication distance
Generates electricity
Converts radio waves into digital data
Receives data as soon as the tag passes/swipes or is within a suitable distance
Imports captured data to the IT system/database or IoT
Other Data Collection Methods and Characteristics
NFC (Near Field Communication): Transmits data through electromagnetic radio waves over very short distances.
Manual Data Entry: Prone to human error and time-consuming.
Barcode Scanner: Eliminates human error, fast, used in supermarkets.
Online Mark/Tests: Platforms like Moodle automatically mark multiple-choice questions, ensuring speed and accuracy.
Robots: Utilize sensors to collect data during processes like manufacturing (e.g., cars).
Existing Documents: Information can be extracted from forms, receipts, and invoices.
Workflow
The sequence in which tasks are performed
Illustrates data flow
Example: A report due on a specific date necessitates a date field.
Business Plan
A plan to ensure business success
Includes targets, objectives, and timelines for measuring progress
Invisible (Unnecessary) Data
Definition
Capture of additional and/or unnecessary data
Used in ways a person is unaware of (e.g., selling)
Creates a profile for targeted advertising
Capture of Invisible Data
Credit/Loyalty Cards: Usage patterns reveal information about a person.
Forms: Often request irrelevant data that may be sold.
Internet: Emails, social networking sites, bookmarks, likes, and browsing history are tracked.
E-tags: Determine travel habits.
Telecommunications: Call records, including recipients, frequency, and duration, are collected.
Invisible (Meta) Data
Definition
Information or data about other data
Examples
Images: Size, resolution, date, color depth
Web Pages: Utilize meta tags (HTML tags) to store information not displayed to users.
Data in a Database
Database Definition
A collection of logically related information organized and stored for easy access, management, and updates.
Structure of a Database Table
Field: Smallest addressable unit/fact of data.
Record: Collection of fields containing details about a particular entity.
Table: Group of related data in a table format within a database, consisting of columns and rows.
Relational Database: Multiple tables linked together.
Primary Key (PK)
Unique identifier for each record.
Cannot be repeated.
Cannot be empty.
Can be composite (made up of multiple fields).
Foreign Key (FK)
A field in a relational database that links tables.
Must always have a corresponding record in the primary table.
Relationships
One-to-Many Relationship (1 - ∞):
o The PK is on the "1" side, and the FK is on the "many" (∞) side.
o A specific record can only appear once in the primary table (PK).
o The linked record can appear multiple times in the secondary table (FK).
Query
The ability to extract information from a table based on specific criteria.
Entity Relationship Diagrams (ERD)
Diagrams illustrating relationships between entities.
Rectangles represent entities.
Entity names (singular nouns) are written in capital letters inside the rectangles.
Straight lines and symbols represent relationships between entities.
Verbs describe the relationships.
Well-Designed Database Planning
Tables required.
Fields within each table.
Data type, size, and format for each field.
Primary key for each table.
Foreign keys for relational tables.
Normalization
The process of organizing data in a database to:
Protect data.
Enhance flexibility.
Reduce/prevent redundant data.
Reduce/prevent inconsistent data dependency (fields not related to the PK).
In short: Ensure data is not repeated, queries and reports are easily created, and anomalies are prevented.
Advantages of Normalization
Increased efficiency
Minimized memory and storage waste
Elimination of errors and inconsistencies
Data Redundancy
Unnecessary repetition of data across different fields, leading to update irregularities.
Deliberate repetition or distribution of the database over different storage media for backup purposes.
Anomalies
Flaws in a database due to poor planning.
Insert Anomaly: New data cannot be entered because the field/attribute depends on another field/attribute.
Remove Anomaly: Deleting data unintentionally removes unrelated data.
Update Anomaly: Changing data requires modifications in multiple places/records.
Information Management Steps
1. Obtain necessary data.
2. Process data to obtain information.
3. Transform information into knowledge.
4. Utilize information for decision-making.
GIGO (Garbage In, Garbage Out)
If data is captured incorrectly, the results will be inaccurate.
Data Maintenance
Adding new records.
Deleting unnecessary/old records.
Editing/updating existing records.
Defensive Programming to Capture Quality Data
Definition
Techniques to prevent user-made errors that would halt program execution.
Data Validation (Test for Data Entry)
Format Check: Ensure correct date formats, character specifications, etc.
Data Type Check: Validate data types entered into fields.
Boundaries/Interval/Range Check: Enforce valid ranges for data (e.g., high school grades 8-12).
Check Digit: Apply mathematical formulas to verify number validity.
Verification
Can be performed manually.
Algorithms compare different data copies.
Valid data is not necessarily correct data; accuracy must be checked.
Quality Data
Definition
Data that is accurate, valid, complete, up-to-date, and relevant.
Characteristics of Quality Data
Accuracy: Data must be correct; the computer cannot determine data entry correctness.
Validity/Correctness: Data must be acceptable/reasonable.
Completeness: All fields must contain data, and fields should be comprehensive.
Currency: Data must be relevant to the current situation/circumstances.
Relevance: Unnecessary data collection should be avoided.
Data Integrity of Quality Data
Definition
Refers to the completeness, accuracy, and consistency of data.
Physical Integrity
Can be affected by power outages, mechanical problems, etc.
Logical Integrity
Data must be logical and valid.
Achieved through data validation and correct use of FKs and PKs.
Types of Logical Integrity
Entity Integrity: Each record has a unique PK.
Referential Integrity: FKs always refer to an existing record in another table, preventing deletion of referenced records and ensuring
records in the foreign key table have a corresponding record in the primary table.
Data Independence of Quality Data
Definition
Separation between software using database applications (including the GUI) and the actual data structures managed by the DBMS server.
Advantages
Users cannot change the data structure and format.
Multiple applications can access the same data.
The DBMS software handles data management.
Processes to Ensure Quality Data
Data Security: Protection of data against loss/theft through physical security, access control (passwords, biometric security, permissions,
encryption), and input validation to prevent hacking.
Audit Trail: Records changes made to the database, including the type of action, user, timestamp, and sometimes old and new values.
Improves accountability but can slow down processing.
Parallel Data Sets (Mirroring)
Maintaining multiple copies of a dataset.
Requires significant storage space.
Copies should be stored in physically different locations.
Transaction Processing
Definition
A software system that captures and processes daily business activities.
Characteristics
Groups interdependent transactions together.
The DBMS only processes transactions if all individual transactions within the group are completed.
If some transactions fail, completed transactions within the group are "rolled back" to prevent data inconsistency.
Transactions
Any activity involving data creation, editing, storage, or deletion controlled by the DBMS.
Transaction Operations
Record Lock: Only one user can modify a specific record at a time.
Edit: A record loaded into memory for modification is only "posted" to the database after changes are saved.
Delete: Marks a record as "deleted" without actual removal.
Insert: Creates a new record in memory, which is only posted to the database after all information is entered.
Post: DBMS applies changes to the database.
Refresh: Reloads information from storage to memory.
Purge/Consolidate: Permanently removes "deleted" records from the database.
Previous/Next/First/Last: Navigates through records in the database.
Rollback: DBMS reverts the database to its state before a transaction/group of transactions was performed.
Database Management
DBMS (Database Management System)
Software that enables working with electronic databases.
DBMS Processes
Database creation.
Database structure modification.
Data addition, modification, and deletion.
Querying and searching.
Data processing for information display.
DBMS Categories
Spreadsheet databases (e.g., Microsoft Access).
Server DBMS.
Spreadsheet DBMS
Suitable for single-user or small-scale multi-user applications (<10 users).
All components are within a single application.
Server DBMS
Users access data indirectly through specially developed client software/applications (e.g., POS system).
Client software can run on different computers.
Server software executes queries/requests and provides results to client software.
Queries/requests often use SQL.
Supports a large number of users.
Centralized Database
A single database instance stores all data.
Can experience slow network traffic and high data costs due to large data transfers.
Risk of downtime if the central database fails or network problems occur.
Distributed Database
Data and DBMS components are stored across servers in multiple locations.
Suitable for large numbers of users or businesses spread over a wide geographical area.
Properties of Distributed Databases
Require complex security due to increased risk.
Data Synchronization: Ensures the database is up-to-date across all locations.
Duplication: Each location has a complete copy of the database, requiring substantial storage space.
Partitioning: Each location manages its own data and uploads data to the central database according to a schedule, typically during off-
peak hours.
Data Warehousing
Central storage for large amounts of data.
Created by integrating data from multiple sources.
Handles "older" data for historical analysis.
Data is transferred from active to inactive databases, standardized in a temporary workspace, and finally loaded into the data warehouse.
Data in the warehouse is not modified; only queries and analysis are performed.
Big Data
Extremely large datasets analyzed computationally to reveal patterns, trends, and associations, particularly related to human behavior and
interactions.
Characteristics of Big Data: Volume, Variety, Velocity, Veracity, Variability, Value.
Data Mining
Searching for patterns, relationships, and trends within data stored in a data warehouse to improve business efficiency and profitability.
Employs complex algorithms to group and reorganize data to uncover new patterns.
Combines statistical analysis, artificial intelligence, database design, pattern recognition, and mathematics.
Role of People in Data Mining
Data Selection and Preparation: Ensure data usefulness by removing incomplete and invalid records.
Software and Algorithm Development: Create tools for data mining processes.
Result Interpretation and Validation: Analyze and verify results for correctness, applicability, and accuracy.
Advantages of Data Mining
Powerful CPU capabilities.
Lower equipment costs.
Efficient software and processing techniques.
Increased storage capacity and reduced storage costs.
Database Careers
Database Administrator (DBA)
Designs, manages, and maintains databases.
Controls user rights and permissions.
Performs routine maintenance, backups, and data recycling.
Monitors database performance.
Database Analyst
Modifies the underlying database structure.
Analyzes system and database efficiency.
Recommends database improvements and maintenance.
Requires knowledge of hardware, software, and business principles.
Database Programmer
Develops user interfaces for databases and applications utilizing the database.
Project Manager
Plans and manages the course of IT projects, including overall planning, goal setting, and project progress tracking.
Solution Development
Introduction to Algorithms
Basic Concepts of an Algorithm
An algorithm is an ordered set of steps to complete a task or solve a problem.
Represented using pseudocode or flowcharts.
Steps for a Good Algorithm
Limited steps.
Easy to understand, detailed, specific, clear, and unambiguous steps.
Each step:
o Performs a single task.
Trace Tables
Help programmers track variable values during program execution.
Consist of columns representing variables, conditions, or outputs.
Useful for identifying potential errors.
Introduction to Solution Development Using a High-Level Programming Language
Introduction to Programming Tools
A general-purpose programming language and IDE.
Used for rapid application development across multiple platforms.
Compiles to native code for various operating systems.
Translates entire source code into machine code.
Creates an executable file runnable without the compiler.
Executes code line by line, translating and running each line immediately.
Slower than compiled programs but allows for immediate feedback during development.
Integers, floating-point numbers (real), characters, strings, arrays, dates, timestamps, Booleans, etc.
Operators
Compare two values and return a Boolean result.
Examples: >, <, <=, >=, =, <>.
Combine Boolean expressions.
Examples: AND, OR, NOT.
Perform arithmetic operations.
Examples: +, -, *, /, DIV, MOD.
Mathematical Functions
Built-in functions for common mathematical operations.
Examples: Trunc, Round, Frac, Sqr, Sqrt.
Casting
Converting data from one type to another.
Example: StrToInt (string to integer), IntToStr (integer to string).
Basic String Handling
A sequence of characters controlling output formatting.
Examples: #9 (tab), #13 (newline).
Manipulate and analyze strings.
Examples: Length, Copy, Pos, Trim, UpperCase, LowerCase, Insert, Delete.
Event Handling (Click)
Code executed when a specific event occurs (e.g., a button click).
Event handlers are Delphi procedures associated with events.
Conditional Constructs/Selection Structures
Control program flow based on conditions.
Execute code blocks based on a condition's truth value.
Can include an optional else block for alternative execution.
IF statements placed within other IF statements for more complex logic.
Simplify selection logic when there are multiple possible values for a single variable.
Basic Validation Techniques
Ensure data integrity by checking user input.
Verify that the entered data matches the expected data type.
Validate data within a specific range or against specific criteria.
Exception Handling
Prevent program crashes due to runtime errors.
Use try...except blocks to catch and handle exceptions gracefully.
Debugging Techniques
Execute code line by line and inspect variable values.
Violations of programming language rules (e.g., missing semicolons, incorrect variable names).
Flaws in the algorithm's logic, leading to incorrect results.
Errors occurring during program execution (e.g., division by zero, file not found).
Iteration Constructs/Looping Structures
Repeat code blocks multiple times.
Executes a fixed number of times.
Uses a loop counter variable.
Executes as long as a condition is true.
ITC Principle:
o Initialize the loop control variable.
Encapsulation: The protection of attributes (variables) from who has access to them (can address/use them) through the location of where
they are declared. (declaring private/ public and parameters)
Social Implications
Ethics
Definition
ICT ethics concerns the moral principles guiding an individual's behavior when using Information and Communication Technologies (ICT). It
encompasses responsible and ethical decision-making regarding technology use.
Software License Agreements
Definition
Legal agreements outlining the terms of software use. Different types exist:
Proprietary Software: Users pay for use, the developer retains ownership, copying is prohibited.
Open-Source Software (OSS): Free to use, source code is accessible for modification, typically cannot be modified for profit.
Freeware: Free to use, may be copyrighted, restrictions on commercial use may apply.
EULA (End User License Agreement)
Single-User License: For use on one device by one user.
Multi-User License: Allows multiple users or devices.
Site License: Covers a group of users or devices within an organization.
Licenses for Creative Commons
Public Licenses: Indicate permitted uses of copyrighted software.
Creative Commons: Legal tools granting permission for sharing and use. Example: ShareAlike licenses for adapted work.
Copyleft: Permits copying and use with specific conditions, often for non-commercial purposes. Example: Some Delphi versions
donated to schools.
Piracy
Definition
Illegal copying, distribution, or use of software without the owner's permission.
Copyright Infringement
A crime involving unauthorized duplication and sharing of intellectual property.
Examples: Selling illegal software copies, distributing copyrighted content.
Reasons to Avoid Piracy
Protects creators' rights and incentivizes innovation.
Prevents financial losses for software developers.
Upholds ethical standards and respects intellectual property rights.
Social, Ethical, and Legal Issues Pertaining to ICTs
Ethical Questions About Piracy
Social Impact: Negative economic effects, reduced government revenue, job losses.
Ethical Concerns: Stealing intellectual property, unfair to creators.
Legal Implications: Criminal penalties, fines, imprisonment.
Copyright
Definition
Legal protection granting exclusive rights to copy, distribute, and create derivative works of original creations.
Copyleft
Definition
Licensing allowing others to copy and use work under specific conditions.
Copyleft Rules
Attribution: Credit must be given to the original creator.
Non-Commercial: Use restricted to non-profit purposes.
Share-Alike: Derivative works must have the same license.
Non-Derivative: Prohibits modifications to the original work.
Examples
Citing sources in academic work.
Using and distributing open-source software.
Economic Reasons for Using Computers
Advantages
Reduced Paper Use: Promotes a paperless environment.
Increased Productivity: Automates tasks, improving efficiency.
Lower Communication Costs: Enables affordable global communication.
Enhanced Accuracy: Reduces errors in data processing and decision-making.
Improved Reliability: Consistent and dependable results.
Digital Divide
Definition
The gap between individuals with and without access to digital technologies and knowledge.
Contributing Factors
Education: Higher education levels correlate with increased technology use.
Income: Lower income limits access to technology and infrastructure.
Location: Rural areas often lack adequate technology access.
Age: Generational differences influence digital literacy.
Ergonomics, Green Computing, and Health Issues
Ergonomics
The study of designing and arranging workspaces to optimize user well-being and overall system performance.
Guidelines for Safe Computer Use
Proper posture, seating, and monitor placement.
Regular breaks to prevent repetitive strain injuries.
Green Computing
Environmentally responsible use of computers and resources.
Examples
Printing responsibly.
Using energy-efficient devices and power management features.
Recycling electronic waste.
Health Issues
Eye Strain: Prolonged screen time.
Musculoskeletal Problems: Poor posture, repetitive motions.
Obesity: Sedentary behavior.
Computer Stress: Anxiety related to technology use.
Repetitive Strain Injury (RSI) and Carpal Tunnel Syndrome (CTS)
Pain and discomfort caused by repetitive motions, often associated with keyboard and mouse use.
Fake News
Definition
Fabricated news stories spread online, often sensationalized for specific purposes.
Purpose
Generating ad revenue.
Discrediting individuals or entities.
Causing confusion and distrust.
Protection
Verify information from multiple reputable sources.
Avoid sharing unverified news.
Be cautious of emotionally charged content.
Malware
Influence on Society
Lost productivity due to malware removal and system recovery.
Disruption of business services and financial losses.
Eroded trust and confidence in affected organizations.
Data breaches and compromised personal information.
Types of Cybercriminals
Social Engineers: Deceive individuals into revealing sensitive information.
Hackers: Gain unauthorized access to computer systems.
Crackers: Engage in illegal hacking activities.
Cyber Gangs: Organized groups committing computer crimes.
Virus Authors: Create and spread malicious software.
Social Websites and Social Engineering
Social Engineering Techniques
Baiting: Luring users with attractive offers to download malware.
Phishing: Using deceptive emails to obtain sensitive information.
Email Hacking and Spamming: Compromising email accounts for spam campaigns.
Pretexting: Creating false scenarios to gain trust and access to information.
Quid Pro Quo: Offering fake services in exchange for valuable data.
Social Engineering on Social Websites
Exploiting personal information shared on social media for identity theft.
Creating fake profiles to deceive users and gain their trust.
Ways to Commit Cybercrimes
Backdoors: Secret entry points into software bypassing security measures.
Trojans: Malicious software disguised as legitimate programs.
Distributed Denial-of-Service (DDoS) Attacks: Overloading systems to disrupt services.
Botnets: Networks of infected computers controlled remotely.
Internet Fraud: Scams targeting individuals online, such as phishing and identity theft.
Examples of Cybercrimes
Identity Theft: Stealing personal information for financial gain or other illegal activities.
Bandwidth Theft: Using internet bandwidth without authorization.
Service Theft: Unauthorized access to online services using stolen credentials.
Internet Attacks: Malicious actions targeting computer systems and networks.
Unauthorized Remote Control: Gaining control of a computer without the owner's consent.
Effects of Cybercrimes
Financial losses for individuals and businesses.
Damage to reputation and loss of trust.
Disruption of services and productivity.
Emotional distress for victims of identity theft and other cybercrimes.
Safe Email and Internet Use
Guidelines to Avoid Threats
Use strong, unique passwords.
Be cautious of suspicious links and attachments.
Protect personal information.
Keep software up to date.
Email Etiquette (Netiquette)
Write clear, concise emails with relevant subject lines.
Proofread for errors and avoid using all caps.
Be mindful of attachments and recipients.
Avoid gossip, inflammatory remarks, and online arguments.
Location-Based Computing
Definition
Processing data that utilizes the geographical position of devices.
Social Implications
Privacy concerns due to continuous location tracking.
Potential for misuse, such as stalking or harassment.
Ethical considerations regarding data collection and use.
Benefits
Enhanced community awareness and connectivity.
Improved access to location-specific information and services.
Disadvantages
Increased vulnerability to privacy violations.
Potential for bias in location-based data analysis.
Risks associated with location tracking, especially for vulnerable individuals.
Capabilities and Limitations of ICTs
Benefits
Speed and efficiency in data processing.
Accuracy and consistency in task execution.
Storage and retrieval of vast amounts of data.
Global communication and collaboration.
Limitations
Dependence on hardware, software, and internet connectivity.
Security vulnerabilities and the risk of cybercrime.
Ethical concerns related to data privacy, job displacement, and the digital divide.
Impact on the Human Race
Transformation of various sectors, including healthcare, education, and business.
Increased reliance on technology for communication, information access, and daily tasks.
Ethical and societal implications requiring careful consideration and responsible use.
Effects of Digitalization
Definition
The integration of digital technologies into everyday life and business processes.
Future Careers
Digital Forensic Investigator: Collects and analyzes digital evidence for legal proceedings.
3D Architect/Printing Operator: Designs and creates three-dimensional models and objects.
Privacy Consultant: Advises organizations on data privacy and compliance regulations.
Medical Nanobot Technician: Develops and maintains nanorobots for medical applications.
Impact on the Workplace
Mobile Offices: Enable flexible work arrangements and remote work opportunities.
Virtual Offices: Provide shared workspaces and amenities for remote workers.
Decentralization of Labor: Allows employees to work from different locations.
Office Automation: Automates routine tasks, improving efficiency and productivity.
Benefits of Digitalization
Enhanced communication and collaboration.
Increased efficiency and productivity.
Access to a global workforce and resources.
Challenges of Digitalization
Job displacement due to automation.
Increased digital divide.
Cybersecurity threats and data privacy concerns.
Artificial Intelligence (AI)
Definition
The development of computer systems capable of performing tasks that typically require human intelligence.
Examples
Data analysis and prediction.
Chatbots and virtual assistants.
Self-driving cars.
Benefits
Automation of tasks, improving efficiency and accuracy.
Creation of new job opportunities in AI development and related fields.
Disadvantages
Job displacement in certain sectors.
Ethical concerns regarding bias, privacy, and the responsible use of AI.
Robotics
Definition
The design, construction, operation, and application of robots.
Examples
Industrial robots for manufacturing and assembly.
Surgical robots for precision medicine.
Service robots for domestic and commercial tasks.
Benefits
Increased efficiency, productivity, and accuracy.
Ability to perform dangerous or repetitive tasks.
Disadvantages
Job displacement in certain industries.
High initial investment and maintenance costs.
Ethical considerations regarding robot autonomy and potential impact on society.
Protecting Your Online Identity
Definition
Safeguarding personal information and reputation in the digital world.
Ways to Protect Privacy
Comply with data protection regulations (e.g., GDPR, CCPA).
Limit personal information shared on social media.
Use strong passwords and enable two-factor authentication.
Be cautious of phishing scams and suspicious emails.
Regularly review privacy settings on online accounts.
Information Systems
Definition
Organized systems for collecting, storing, processing, and disseminating information.
Impact on Society
Facilitate communication, collaboration, and access to information.
Support various industries, including healthcare, education, and business.
Influence political processes, environmental management, and social interactions.
Threats Caused by Computer and Human Error
Inaccurate data entry and manipulation.
Software bugs and system vulnerabilities.
Incorrect hardware or software configurations.
Human errors, such as weak passwords and social engineering susceptibility.
Effects of Data Breaches and Cybercrime
Identity theft and financial losses.
Reputational damage and loss of trust.
Disruption of services and business operations.
Big Data
Definition
Extremely large and complex datasets requiring advanced processing tools.
Advantages
Valuable insights for business decision-making.
Improved customer experiences and targeted marketing.
Enhanced product development and innovation.
Disadvantages
Privacy concerns and potential for data misuse.
Risk of discrimination based on data analysis.
Cybersecurity challenges and the protection of sensitive information.
Applications of Big Data
Online banking fraud detection.
Personalized travel recommendations.
Data-driven educational insights.
Targeted advertising on social media.
Influences of Globalization
Definition
The interconnectedness of nations through increased trade, investment, technology, and cultural exchange.
Results of Globalization
Enhanced communication and collaboration.
Increased competition and innovation.
Spread of information and ideas.
Advantages
Economic growth and job creation.
Access to a wider range of goods and services.
Cultural exchange and understanding.
Risks of Globalization
Job displacement in developed countries.
Exploitation of workers in developing countries.
Cultural homogenization and loss of diversity.
Industrial Revolutions (4IR)
Definition
The current phase of industrial advancement characterized by the integration of digital, physical, and biological systems.
Technologies
Internet of Things (IoT).
Artificial intelligence (AI).
Robotics and automation.
Big data analytics.
Impact
Transformation of various industries, including manufacturing, healthcare, and agriculture.
Creation of new job opportunities and economic growth.
Ethical and societal considerations, such as job displacement and the digital divide.
Mobile Technology
Advantages
Instant communication and access to information.
Convenience and portability.
Entertainment and social networking.
Increased productivity and efficiency.
Disadvantages
Cost of devices and data plans.
Potential for addiction and distraction.
Health concerns, such as eye strain and sleep deprivation.
Privacy and security risks.
Negative Impact of Mobile Technology
Erosion of privacy due to data collection and tracking.
Cyberbullying and online harassment.
Spread of misinformation and fake news.
Negative impact on mental health and well-being.
IoT (Internet of Things)
Advantages
Improved efficiency and automation.
Enhanced data collection and analysis.
Personalized experiences and customized services.
Examples
Smart homes, cities, and transportation systems.
Wearable health trackers.
Precision agriculture and environmental monitoring.
Distributed Computing Power
Definition
Harnessing the processing power of multiple interconnected computers to solve complex problems.
Advantages
Cost-effective alternative to supercomputers.
Increased processing power for demanding tasks.
Collaboration and resource sharing among researchers.
Examples
Scientific research, such as drug discovery and climate modeling.
Data analysis and processing for large-scale projects.
Wikis
Definition
Collaborative online platforms allowing users to create and edit content.
Advantages
Vast and constantly updated information base.
Collaborative editing and knowledge sharing.
Accessibility and ease of use.
Disadvantages
Potential for inaccuracies and bias.
Vandalism and the spread of misinformation.
Privacy concerns related to personal information.
Cookies
Definition
Small text files stored on a user's computer by websites to track browsing activity.
Purpose
Personalize user experiences.
Track website traffic and user behavior.
Target advertising based on browsing history.
Anonymity
Advantages
Increased freedom of expression.
Protection from censorship and retaliation.
Support for whistleblowers and victims of abuse.
Disadvantages
Potential for misuse, such as harassment and cybercrime.
Reduced accountability for online actions.
Global Unique Identifiers (GUIDs)
Definition
Unique identification numbers generated by software to identify objects or entities.
Advantages
Ensure uniqueness across different systems and platforms.
Facilitate data management and tracking.
Disadvantage
Potential privacy concerns if linked to personal information.