0% found this document useful (0 votes)
53 views12 pages

ICT - Theory

Uploaded by

hanimeezan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views12 pages

ICT - Theory

Uploaded by

hanimeezan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

ICT - Theory

Page 3 backlinks

Chapter 1 - Components of a Computer


System

CPU:
Brain of Computer
Commands all functions in the computer

Intel and AMD Manufacture them

Memory Types:
RAM (Random Access Memory)

ROM (Read Only Memory)


RAM ROM

Random Access Memory Read Only Memory

Temporarily Stores Can only be read


Instructions

Volatile - If computer is Non-Volatile


offed, memory lost

Stores data for software Holds boot up


running currently in the instructions to start a
computer computer

Cache :
Fastest Memory
Holds Normal used Data

Stores data from RAM

External Hardware : Hardware Present Outside the CPU


Case

Internal Hardware : Hardware Present Inside the CPU


Case

Parts and their Function :


CPU : Carries out System Instructions

Motherboard : Connects main components of the computer system


Graphics Card : Device attached to Motherboard to help with graphics
Sound Card : Enables computer to input and output sounds

Internal Hard Disk : Stores info like files


Network Card : Connects computers together.

Types of Software: (Set of Instructions run in a computer


system)
Application : Apps created to do specific Tasks

System : Controls Hardware Devices (OS, Complier, Anti-virus)

AI : Develops software with human-like intelligence

Impacts of AI on our lives:


Increase free time

Increase our personal safety (by having robots do dangerous tasks)


Can Predict Weather

Can Improve Medical Care by assisting Doctors and surgeons

Biometrics: Authentication techniques requiring unique


characteristics of an individual.

Biometric Types:
Fingerprints
Voice Recognition

Eye Recognition

Impacts of Biometrics:
Better house security
Better airport security
Better mobile security

OS : Software that controls general operation of system

Types of User Interfaces:


GUI : Icons to run commands, uses graphics, has menus, Too much
memory, Requires OS

CLI : Only text, user uses commands, more power, difficult to learn
Dialogue-Based Interfaces
Gesture-Based Interfaces

Types of Computers:
Laptop - Portable, Comes with accessories, can connect to Wi-Fi, can use
electric power, Not as powerful as PC
Desktop - PC, has separate accessories, Unportable, Cheaper than Laptops,
Used in office, requires external power source, used in offices
Tablet: Similar to laptop but smaller, Touch screen technology, limited ram,
more expensive than laptops

Smartphones: Portable, Tiny, Less heat released, Touch screen, used for
browsing and calling

Phablet: Have same features and drawbacks of Tablets and Smartphones

Chapter 2 - Input and Output Devices

Input Devices are used to enter data and output devices


are used to display data

Input Devices:
Keyboards

Numeric Keypad
Ergonomic Keyboards - For health issues like Carpel Tunnel
Touchpad

Tracker ball
Mouse
Remote Controls use Infrared Signals.

Joysticks are like pointer devices for gaming


Scanner : Hard Copy => Soft Copy
Light Pens : Used to point with greater accuracy and to draw on CRT
Monitors.

Digital Camera : Has video Cards which can be transferred to computers


Webcam : Directly connect to PC without memory

Microphone : Input Device for Audio


Sensors : Analogue Data => Binary Data - by using an Analogue Digital
Converter (ADC) -

Sensor Examples:
Temperature

Humidity
Pressure

Light

Direct Data Entry:


Magnetic Strip Reader: Reads info on a magnetic strip from a credit/debit
card

Contactless Card Reader: Detects Card's Radio Wave to pay without a pin.

Chip and Pin reader : Makes payment from card with pin.
RFID Readers: Use Radio Waves and capture data from RFID Tags with
Antennas. Used to track items in stores and for livestock tracking

Optical Mark Reader (OMR) : Reads Pencil Marks in MCQ Exams and Tests

Optical Character Reader (OCR) : Scans Human Text and Converts it to a


digital form
Barcode Reader : Reads barcode tags
QR Code Reader : Reads QR Codes ( and Stores 4296 Characters OR 7089
Digits)

Output Devices : (Allow data to be output from the


computer):
CRT Monitors : Old and Cheap and Can use Light Pens
TFT Monitors: Thin Film Transistors, New, Flat, Thin, Portable, Found in
laptop computers
LCD : Liquid Crystal Diode, TV and Monitors, Poor Color Contrasts (Led to
Light Emitting Diodes being Introduced -LED-)

Projector: Used for presentations and Home Cinemas


Laser Printers: Quick, Quiet, Used for bulk, Very High quality, Produce
Ozone so separate room required
Inkjet Printers: Slow, Loud, Medium Quantities, High Quality

Dot-matrix Printers : Loud, Slow, Poor Quality, Used for receipts and Wage
slips, Has a pressing head so it is an impact printer
3D Printers : Print 3D Objects

Methods of 3D Printing:
Additive Manufacturing : Layer by Layer

Subtractive Manufacturing : Huge block and cut it to make product

Control Applications:
Actuators : Used to Control Devices. Takes Digital signals from computers
and used it to operate devices

Buzzer

Heater
Motors

Chapter 3 - Storage and Media Devices

Backing up : Copying files or data to a different medium


incase there is an issue with the original storage device

Storage Media is the hardware where the data is stored while the storage
device is used to read the data from the storage media.

When to back up data:


Incase Data is lost (In set intervals like every month)
Incase you are victim to hackers

If data needs to be transferred , it is easy to use a different medium


Types of Data Access :
Serial Access : Checking all data on the device until the specific data is
found (ex : Magnetic Hard Disk Drive)

Direct Access : Checking only specific data required (faster than serial
access)

Magnetic Storage Devices: (Serial Access Only)


Hard Disk Drive: Fast Data Transfer Rate, Has moving parts unlike SSD, can
cause latency issues
Portable Hard Drives : Connects to a computer using a USB Port, Stores
Backed up data

Magnetic Tapes : Large Organizations back up data daily on this, Huge


Storage Capacity, Long Term use. Slow Data Access Times but fast data
transfer rate

Optical Media :
CD-R / DVD-R : They must be burned to become a CD-ROM or DVD-ROM,
Can Only be recorded once

CD-RW / DVD-RW : Can be written many times however it is expensive

CD-ROM/DVD-ROM : Read Only storage media


Blu Ray : Uses blue rays instead of red and stores very large files like HD
Movies

CD's and DVD's use pits and lands to store data

Solid State Media :


SSD : Store data and are very fast with no latency issues
Pen Drives : Small portable devices used to transport data
Memory Cards:
SD : Small card with high capacity memory
XD Card : Removable memory for digital cameras
CFast Card : Developed to allow usage of solid-state technology in a
small portable device.
Data Capacity of Devices:
CD ROM 700 MB
DVD 4.7GB

Blu Ray 27-50GB

Chapter 4 : Networks and its Effects

Network : 2 or more computers connected together to


share data.

Data is transferred by being split into many packets which then arrive and
are combined together again. A packet can have:
IP of sender

IP of Receiver
Packet Size

Number of Packets used for the whole message

Network Devices:
Hub : Connects many computers. Is not smart meaning if there is a
command sent to 1 desktop. It is sent to all desktops. Creates a LAN
Switch : Connects many computers but is smart. Creates a LAN and uses
MAC Addresses

Bridges : Connect 2 LANs to make 1 LAN


Router : Connects Computers to the internet and sends packets through
networks using the most efficient route from its routing table
NIC (Network Interface Card) : Allows a device to connect to a network.
Contains the MAC Address.

Wi-Fi:
Wireless Networking Technology
Easy to connect devices
Limited Area of Network

Bad Signals

Can be hacked easily

Bluetooth:
A Wireless Technology used to make short range connections
Can be hacked easily

Very slow data transfer rate

Types of Networks:
LAN : One Building, Easy to manage Files
WLAN : Same as LAN but wireless and use ACCESS POINTS instead of
SWITCHES

WAN : 2 or More Lan together, Very large area

Intranet : Private network for organizations, can be accessed by authorized


people only

Authentication Methods :
Zero Login (Using Biometrics)
Magnetic Stripes
Smart Cards (Contactless Card)

Physical Tokens (A unique physical device)


Electronic Tokens (2FA and OTP)

Conferencing Methods:
Video
Video and Sound used

Carried out in real time


Webcam, Monitors, Speakers, Microphones
Setting up requires training
Audio
Requires Sound only

Organizer dials participants and sets up the meeting

Can be carried over internet using VOIP (Voice over internet


Protocol)

Web
Webinar
Requires Stable Internet Connection

Participants have to download a software


Participants can join, leave and unmute

ABOVE OPTIONS CAN BE TOGGLED

Chapter 5 - The Effects of using IT

Using Microprocessor devices can improve or worsen :


Lifestyle

Leisure Time
Social Interaction

Data Security

They can be Labour saving devices as well

Smart Motorways are used to control traffic.

How do autonomous vehicles work ?


They use sensors , cameras, actuators and microprocessors

Microprocessors use data from sensors and cameras to signal the actuators
to do tasks such as:
Change Gear
Apply break
Steering Wheel

Algorithms are very complex

There is also Autonomous trains which can improve punctuality and


Autonomous Airplanes

Potential Risks of using IT :


Back and Neck problems
RSI

Eyestrain
Headaches

Ozone Irritation

Chapter 8 - Safety and Security

Safety Issues :
Electrocution due to drinks or improper insulation

Fire Hazards due to overheating or over plugged wall sockets


Tripping Hazards due to wires
Personal Injury due to devices breaking the desk

Data security :
Hacking is gaining unauthorized access of data . Use firewalls and strong
passwords

Phishing is when a scammer sends an email with a legitimate looking link


impersonating a company to steal your login credentials. Be careful when
opening links. Smising involves SMS while Vishing involves Voice
Pharming is when code is installed on your computer so that when you visit
are legitimate site you are redirected to a bogus website. Use anti spyware
Key logger allows a hacker to access all the keys which you have pressed
on a keyboard. Use anti spyware and touchpad
Virus replicates itself with the purpose of tampering files

Spam is junk email sent in mass to many users

Cookies store small bits of data used to identify the computer and network
Firewalls monitor incoming and outgoing traffic and warn a user of potential
threats

Secure socket Layer (SSL) allows data to be sent securely . This is mostly used
in websites as the https protocol

Chapter 10 - Communication

Learn this from the book

FINISH THIS DURING SCHOOL DAYS AFTER DAILY TASKS

You might also like