P2 Scope Updated
P2 Scope Updated
P2 Scope Updated
Advantages
• Hands-Free Operation: improving accessibility for users with disabilities
or during multitasking.
• Speed: Faster than typing, especially for dictation, saving time in tasks
like notetaking or command execution.
• Convenience and Efficiency: allow for quick commands and searches.
• Accuracy Improvement: Advances in AI have improved accuracy,
making it more reliable for professional use (e.g., transcription).
Disadvantages
• Performance may suffer with accents, background noise, or unclear
speech,/flu impacting reliability.
• Privacy Concerns: Voice data is often stored or processed externally, raising
privacy and security concerns.
• Learning Curve: Users may need to adjust speaking style or pronunciation for
the software to work optimally.
• High Processing Demand: Requires significant processing power, which can
drain battery life on mobile devices.
o Storage Devices
▪ Differences between SSD VS HDDs
SSD HDD
Faster read/write speed Slower read/write speed
More durable/robust Venerable to damage/ less
durable
More expensive per GB Less expensive per GB
Uses less power/energy Consumes more power
efficient
operates silently/less noise Produce noise and more
heat
No moving part Has moving part
▪ Backup vs archive
• Making copies of data for data protection, recovery in
case of loss, corruption or system failure.
o Backup is short term
• Archive-long term storage of data for historical or
legal requirements
▪ Cloud storage vs cloud computing vs Grid computing
• Cloud storage-storing/saving of files online
• Cloud computing-combines cloud storage and the use
of software online
• Grid computing/Distributed Computing-Sharing of
multiple resources/hardware to solve a single problem
over network
o Processing
▪ CPU
▪ RAM
▪ GPU-Graphic processing unit from graphic card
▪ Motherboard
o Risks associated with input devices
▪ CTS (Carpal Tunnel Syndrome)- Caused by repetitive wrist and
hand movements, often due to prolonged typing or mouse use
• Prevention- Ergonomic keyboards, proper posture,
wrist supports, and regular breaks can help reduce the
risk.
▪ RSI (Repetitive Strain Injury)- Occurs from repetitive
movement or siting for long
▪ Keylogger- A malware/physical device that records
keystrokes, stealing sensitive information (like passwords or
credit card numbers) without the user’s knowledge
• Keylogger Prevention-
o Regular software updates,
o using anti-malware
o avoiding unknown or suspicious devices
3. Software
Application software-performs specific task
MS Word, spreadsheet,
System software- controls and manage activities within the computer
• OS-controls all activities-windows, android, ios
• Utility software- maintenance of the computer
▪ Disk cleanup, compression software, defragmenter,
uninstaller, antivirus, etc
• Driver- software that OS communicates with devices
o Print driver
o Web-based and installed applications
▪ Web based- software used via internet-office 365,
▪ Installed- kept on local device/computer
Web based/online software Installed software
Accessible from any device with an only accessible on the specific
internet connection device it’s installed on
Updates done automatically Updates done manually
Easily scalable Limited scalable
Needs internet connectivity It doesn’t depend on internet
connectivity
Does not use local storage space Use local storage space
o
o Interpret system requirements
▪ System requirements-: the hardware and software needed to
make an application work.
Essential devices
• CPU
• RAM
• STORAGE/HDD/SSD
• GPU
Network technologies-Question 5(15)
o Type of network
o WAN/LAN/WLAN/GAN
▪ Roles/advantages/disadvantages
▪ Communication easier
▪ Sharing of files/hardware
o Disadvantages-security concerns/expensive to
setup
o Internet services
o VOIP
o IM
o FTP
o CLOUD/GRID Computing
▪ Advantages/disadvantages of grid/cloud
computing
o File sharing
o Government Internet services / e-government
▪ Tax returns-sars
▪ Election information
▪ TV licence repayments
▪ Traffic offence payments
• Know advantages and disadvantages
o Digital divide-gap between those who have
access to technology and those who do not have
access to technology
o Internet connections and access
o Types of connections
▪ Wireless and Wired
• Wireless-4G/5G/Wifi/Hotspot/LTE/dedicated wifi
• Wired-ADSL/SDSL/Fibre optic
o ADSL-download speed is faster than upload
speed. 50Mbps---Download-max 50 mbps
upload—25mbps
o SDSL-Both download speed and upload speed
are the same.50mbps-
o Advantages/disadvantages of ADSL/SDSL
▪ Advantages-includes wifi, able to make
landline calls
▪ Disadvantages-----may not be in your
area/ poor connection area/coverage
▪ Modem(USB Dongle) and routers/Switch
• Switch-connects computers together
• Router- connects networks together
▪ Broadband and bandwidth
• Broadband is a high speed permanent internet
connection. ADSL/4G/SDSL/LTE
• Bandwidth- amount of data from one point to
another.
▪ Data transmission speeds-Mbs/ Gbps
▪ Internet service providers (ISP)-Factors when choosing ISP
• CAP/UNCAP and bundles!
• Cap-limited amount of data over certain period
• Uncap-unlimited amount of data over certain period
of time
• Hard CAP/Soft CAP
o Hardcap-all internet services are stop when
cap is used up
o Softcap- certain internets services can still be
accessible when cap is used up
▪ Shaped/ Unshaped
• Shaped-unequal preferences to certain internet
services interms of speed
• Unshaped- equal preferences
▪ Downloading /Uploading
▪ Coverage vs access point (WAP)
▪ ISPs offer-
• Internet services-wired or wireless
• Spam filtering
• Provide email services
o Telecommuting-working from home/away from workplace
o Throttling- ISP reduces your internet speed.
o Distributed computing power/grid computing- the use of multiple
computer systems as if they were one computer to solve single problem.
o
o IOT- devices increasingly connected to internet
▪ Eg, smart tv, smart fridge, etc.
Social implications-question 6
o Right to access and the right to privacy
o Internet attacks
o DoS/DDOS attacks-computers bombarded with huge amount of data
to slow down the computer or network.
o Sniffer attack-program that reads packets of data being sent to
computer or network.
o Bot/Botnet/Zombies/Ransomware
▪ Ransomware is A type of malware designed to encrypt or block
access to your computer system and files demanding a sum of
money ('ransom')
o Bots are programs that perform automated tasks/repeated tasks over the
Internet.
o Group of bots are called botnet(bot network)
o Zombie refers to a device that has been compromised by malware
and is now under the control of a remote attacker
o Social Engineering-tricked/deceived into getting sensitive information.
▪ Phishing- using emails to get sensitive information
▪ Pharming-link/website/URL
▪ Click jacking-concealed/hidden link
▪ Smishing-SMS to deceive into getting sensitive information
▪ Baiting-using one’s curiosity
▪ Pretexting-fake identity to deceive someone into getting
sensitive information
▪ Spoofing- forgery email header to deceive someone into
getting sensitive information.
o Computer crimes/fraud
▪ Theft of hardware/software
• Protecting hardware
o Chain
o Cabinet
o Security doors
o Alarm systems
o Bolt/fix with bolt
o Biometric access, etc
• Protecting software
o Backup
o Security access/ password
o authentication
Multi-touch screen: Feature of a screen that allows it to register more than one point being
touched simultaneously. -zoom in
HDMI: High- port for connecting high-definition video devices. It carries high quality video
and audio signals. -high resoultion
3D printing/printers: 3D printers can create three-dimensional(3D) objects (e.g. motor
vehicle parts, human tissue replacement, jewellery, clothing, small buildings, small boats)
from a digital model of the item by adding successive layers of material on top of one
another.
Standards for wireless communication : provides for high-speed data transfer between
cellular devices (such as smartphones and tablets) and ISPs. Each generation, e.g. 5G or 6G,
increases the capacity and speed of previous mobile connections.
802.11 a/b/g/n: refers to a Wi-Fi connectivity standard.
NFC: Near field communication (NFC): standard that allows devices such as smartphones to
connect wirelessly simply by touching them together or bringing them into close proximity
to, for example, exchange files by just touching two smartphones together or for sending a
file from a smartphone to a printer wirelessly. Tap to pay
Video communications – platforms for communicating visually using internet such as Zoom,
Microsoft Teams and Google Meet.
URL shortener: This is a tool or service, such as TinyURL.com, which converts a long URL to a
shorter version. Easier to remember and/or type out.
Internet of Things (IoT): The trend whereby devices are increasingly being connected to one
another via the internet. This can range from surveillance systems to geysers, washing
machines, 'smart' vehicles and traffic lights, etc. Various sensors in the devices can produce
data for all sorts of purposes, including diagnostics and running systems more efficiently.
Autonomous vehicles: A self-driving car, also known as an autonomous vehicle, driverless
car, or robo-car is a vehicle that can sense its environment and move safely with little or no
human input.
Drone technology: A drone, is a flying robot that can be remotely controlled or fly
autonomously. They are widely used in agriculture, photography, game ranging, parcel
deliveries, etc.
Wearable devices and technologies: devices worn as accessories or part of clothing. e.g.
smartwatches or fitness/health trackers, smart glasses, continuously generating data from
various environments and communicating with other devices/PC/networks.
Shaping (Network tuning): A technique whereby certain internet services, e.g. e-mail, are
given preference while others, such as social networking services, are given less priority, thus
performance is maintained for the more critical services. (unshaping-equal preferences)
Throttling (Policing): This occurs when your ISP slows down your internet connection. This
most often occurs when you have been deemed by your ISP to have downloaded excessive
amounts of data. Each ISP has an acceptable use policy (AUP) which specifies how this is
determined and implemented.
Geo-tagging: A process where a geographical position of where a photograph was taken is
added to the metadata of a file(additional information of a file).
Click-jacking: Users are tricked into clicking on an item on a web page which acts as a hinden
link.
Ransomware: A type of malware designed to block access to your computer system and files
until you pay a sum of money ('ransom').
Screen lock pattern: A way of locking a device by setting up a pattern you must draw or
trace on the screen to unlock the device.
Authentication (Internet safety): Two-factor (two-step) authentication: includes the use of
CAPTCHA, OTP (one-time pin/password), ApproveIt messages, etc.
Crowd funding: A process where a single idea or business practice is funded by multiple
small donations online . The contributors will then receive the product when it is finally put
into production. Examples: www.indiegogo.com and www.kickstarter.com.
BYOD: Bring your own device (BYOD) refers to a concept where employees/students are
allowed to bring and use their own portable devices, such as smartphones, laptops, tablets,
to work on and access the network instead of a device owned/supplied by the company/
institution.
Big data: Very large structured and unstructured data sets that are analysed using
computers to reveal trends and associations. These present challenges, such as storage,
curation, querying, visualisation.
Cryptocurrencies (e.g. Bitcoin, Ethereum, Luno): This is a form of virtual, digital currency.
Bitcoins can be exchanged for other currencies, products and services. They have caused
concern because they are often used for payment in criminal activities, such as ransomware
demands. However, more and more legitimate companies are accepting them as a means of
payment.
E-learning: The creation of a learning environment where individuals use their computers to
take part in teaching and learning to further their education
Mobile or M-Learning: A form of education and training delivered and conducted via the
internet using mobile devices, such as tablets and smartphones. It is designed to be flexible,
allowing learners/workers/students access to education anywhere, anytime.
Virtual reality (VR): This refers to using technology to create a simulation of a 3D
environment that can be interacted with by a person in a seemingly real or physical way.
This is achieved by using equipment, such as helmets with screens and gloves fitted with
sensors.
Augmented reality (AR): it takes the physical world and adds objects, such as graphics,
within the real world.
Both VR and AR are used in areas ranging from entertainment (e.g. the augmented reality
game Pokémon GO), training in aircraft simulators, and healthcare (e.g. an app used to
highlight veins when a drip is inserted or surgeons being able to perform remote surgery on
patients.
AI (artificial intelligence): Refers to the simulation of human intelligence in machines that
are programmed to think like humans and mimic their actions.
Machine learning is the study of computer algorithms that improve automatically through
experience and by the use of data. It is seen as a part of artificial intelligence.
4IR (the fourth industrial revolution): It is a blend of advances in artificial intelligence (AI),
robotics, the Internet of Things (IoT), 3D printing, genetic engineering, quantum computing
and other technologies.
It creates many products and services that are fast becoming essential to modern life and is
the collective force behind disrupting almost every business sector.
5IR (the fifth industrial revolution): 5IR runs and develops alongside 4IR and uses the
advantages 4IR brings to put the focus back on humans and human endeavour, defining the
ethics and impact of technology developed in the 4IR.
Blockchain: It is a sequence of blocks or groups of transactions that are chained together
and distributed among the users.