ICT - Theory
ICT - Theory
Page 3 backlinks
CPU:
Brain of Computer
Commands all functions in the computer
Memory Types:
RAM (Random Access Memory)
Cache :
Fastest Memory
Holds Normal used Data
Biometric Types:
Fingerprints
Voice Recognition
Eye Recognition
Impacts of Biometrics:
Better house security
Better airport security
Better mobile security
CLI : Only text, user uses commands, more power, difficult to learn
Dialogue-Based Interfaces
Gesture-Based Interfaces
Types of Computers:
Laptop - Portable, Comes with accessories, can connect to Wi-Fi, can use
electric power, Not as powerful as PC
Desktop - PC, has separate accessories, Unportable, Cheaper than Laptops,
Used in office, requires external power source, used in offices
Tablet: Similar to laptop but smaller, Touch screen technology, limited ram,
more expensive than laptops
Smartphones: Portable, Tiny, Less heat released, Touch screen, used for
browsing and calling
Input Devices:
Keyboards
Numeric Keypad
Ergonomic Keyboards - For health issues like Carpel Tunnel
Touchpad
Tracker ball
Mouse
Remote Controls use Infrared Signals.
Sensor Examples:
Temperature
Humidity
Pressure
Light
Contactless Card Reader: Detects Card's Radio Wave to pay without a pin.
Chip and Pin reader : Makes payment from card with pin.
RFID Readers: Use Radio Waves and capture data from RFID Tags with
Antennas. Used to track items in stores and for livestock tracking
Optical Mark Reader (OMR) : Reads Pencil Marks in MCQ Exams and Tests
Dot-matrix Printers : Loud, Slow, Poor Quality, Used for receipts and Wage
slips, Has a pressing head so it is an impact printer
3D Printers : Print 3D Objects
Methods of 3D Printing:
Additive Manufacturing : Layer by Layer
Control Applications:
Actuators : Used to Control Devices. Takes Digital signals from computers
and used it to operate devices
Buzzer
Heater
Motors
Storage Media is the hardware where the data is stored while the storage
device is used to read the data from the storage media.
Direct Access : Checking only specific data required (faster than serial
access)
Optical Media :
CD-R / DVD-R : They must be burned to become a CD-ROM or DVD-ROM,
Can Only be recorded once
Data is transferred by being split into many packets which then arrive and
are combined together again. A packet can have:
IP of sender
IP of Receiver
Packet Size
Network Devices:
Hub : Connects many computers. Is not smart meaning if there is a
command sent to 1 desktop. It is sent to all desktops. Creates a LAN
Switch : Connects many computers but is smart. Creates a LAN and uses
MAC Addresses
Wi-Fi:
Wireless Networking Technology
Easy to connect devices
Limited Area of Network
Bad Signals
Bluetooth:
A Wireless Technology used to make short range connections
Can be hacked easily
Types of Networks:
LAN : One Building, Easy to manage Files
WLAN : Same as LAN but wireless and use ACCESS POINTS instead of
SWITCHES
Authentication Methods :
Zero Login (Using Biometrics)
Magnetic Stripes
Smart Cards (Contactless Card)
Conferencing Methods:
Video
Video and Sound used
Web
Webinar
Requires Stable Internet Connection
Leisure Time
Social Interaction
Data Security
Microprocessors use data from sensors and cameras to signal the actuators
to do tasks such as:
Change Gear
Apply break
Steering Wheel
Eyestrain
Headaches
Ozone Irritation
Safety Issues :
Electrocution due to drinks or improper insulation
Data security :
Hacking is gaining unauthorized access of data . Use firewalls and strong
passwords
Cookies store small bits of data used to identify the computer and network
Firewalls monitor incoming and outgoing traffic and warn a user of potential
threats
Secure socket Layer (SSL) allows data to be sent securely . This is mostly used
in websites as the https protocol
Chapter 10 - Communication