0% found this document useful (0 votes)
33 views51 pages

ICT Chapter - 1 7

Uploaded by

faiqparh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views51 pages

ICT Chapter - 1 7

Uploaded by

faiqparh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 51

iCt MOS2

0|Page
Chapter 1:
Digital Devices

1|Page
Digital Devices:
Digital devices are pieces of hardware that use computers.

They enhance the way we live our lives.

 Desktop
 Laptop
 Mobile phone
 Smart phone
1.1 Know the uses of mainframe computer and examples of devices that use embedded
microprocessors:
Mainframe computers are large computers with huge processing powers.

Powerful: They can process vast amounts of data, very quickly


Large: They are often kept in special, air conditioned rooms.
Multi user: they allow serval users (sometimes hundreds) to use the computer at the same time,
connected via remote terminals ( screens and keyboards).
Mainframe such as (banks, hospitals ,airlines)
Mainframes have EXTENSIVE DATA.

Microprocessors:

Hhousehold appliances).

The device controls what a computer does; it does something with it and provides an output.
Its can process programs, remember information or perform calculations.

1.2 know the difference between laptop and desktop computers an their uses:

Desktop computers usually need peripheral devices (equipment that needs to be connected to a
computer and used with it) such as; monitor, keyboard and printer whereas a laptop include a
screen, keyboard and trackpad which makes it a portable device (easy to carry and move ).

1.3 know about types of mobile/smart phones and hoe they can connect to the network (SIM)

How do phones connect to the network (SIM):

 Allows a smartphone to connect to the cellular network to make calls.


 Mobile phones use SIM card to connect to a mobile phone.
 SIM STANDS FOR: Subscriber identity module
 A sim is used to identify the subscriber to a mobile phone.

2|Page
Smartphones: ios, Android
Mobile phones: viva
1.4 know the uses of tablet devices:

A tablet device is a very small portable computer with a touch-sensitive screen and keyboard.

 Like smartphones but have larger screens


 Many don’t have SIM slots (to make calls )

You can:
 Attach keyboards
 Pens (stylus)

1.5 Describe the purpose and uses of various digital devices for specified needs:

1. Cameras and camcorders:

Moving images (movies) are simply a sequence of images called frames

Digital cameras and camcorders are used to capture still images and moving pictures

Most digital cameras can now fill moving images< but camcorders still can photograph images.

The quality of the image depends on the quality of the lens.

A good image processor can compensate for poor lightning conditions.

Pixels : Digital images made up of tiny dots.

A camera works in much the same way as a scanner.

When a digital camera captures an image it breaks up when it sees through its lens into a grid of pixels.

2. Game consoles :

Games consoles enable users to play video games on a television screen games which are provided on
discs or as downloads from the internet, they use controllers which are often wireless to control vehicles
and all objects in the game.

Some controllers use motion sensors to allow the player to control the game with justice and body
movements.

Madern game consoles are multi-functional, they may have apps and connectivity that provides access
to local networks and the internet as well as the option to play movies and some music consoles.

Also have disc drives to play films and other contents on DVD Blu ray or 4K Ultra HD Blu ray media.

3. Home entertainment systems: ( TV, Sound Systems, Personal video recorder, BLU-player and
DVD players and game concoles)

3|Page
Televisions display still and moving pictures.
Screens Resolution : quality of the image is determined by the number of pixels used to display
the image.

HD TVs have a larger number of pixels meaning they have a higher resolution than standard TVs.

The resolution of a television in pixels is standard as horizontal pixels x vertical pixels.


Television manufactures do not specify the number of horizontal pixels x vertical pixels often
television.

4- Media players:

Media players provide video and audio connection to a television.


The content could be streamed directly from the internet or access from networked or local
storage media players can be connected to a television using a wired or wireless network here
controlled using a remote controller. In some cases a smartphone some media players often
output 4k.

1.6 Know about and understand the Navigational aids are used.

Navigational aids ( such as Sat-Nav ) can calculate the best route between two or more locations and
can provide updates to the best route if it not followed accurately.

They are commonly used in cars, delivery vans and ships.

Navigational aids use information from the GPS satellites to determine the exact location of the
device on earth. Navigation aids also use orientation sensors to know which way the device is
currently pointing, and the device display the users position and orientation on map.

GPS does not need internet connectively in order to work. However, navigation aids need internet
connectivity in order to update the map.

Smartphones are now replacing specialist in-car navigation aids. These are may navigation apps for
smartphones which have a range of features.

1.7 Know what a multi-functional devices are and give examples + coverage:

Multifunctional device : A device that doe serval different things or has serval different uses.
Coverage: When the designs of devices change so that they become similar to one another.

An example of a multifunctional device is :

4|Page
A smartphone: Is a type of mobile phone, which means it has a primary function which is to make
phone calls. It can also be used to take photographs or to function navigational aids, fitness tracker,
music player or handheld game console. That’s why a smartphone is classified as a multi-functional
device.

Convergences is where many devices, or the function of multiple devices, merge ( coverage ) into one
device. This blurs the lines between devices to the point that device is not longer a singular device, one
device has many functions.

1.8 Understand and discuss the features of digital devices for specified needs:
 Performance ( CPU,RAM)
 Probability ( easy to carry, size, weight )
 Storage ( hard disk drives, SSD, RAM)
 User interface ( CLI, menu driven, GUI (WWIP), VOICE, GESTURE)
 Connectivity ( wired, wireless, wi-fi, Bluetooth, infrared)
 Media support ( SD cards, flash memory, CD, DVD/Blu-Ray)
 Energy consumption (electricity, battery life)
 Expansion capability ( Installing additional components)
 Security features ( Username/passwords ,pins ,patterns, biometric ,locks, etc )

Peripheral devices are devices that can be connected to a computer such as, pc or tablet device.
Perhepticals can be connected inside or outside a computer and can be grouped into three groups:

 Input: Data that is entered in the computer


 Storage: The program of data is stored.
 Output: The computer communicates to the user.

1.9 Know about types of input devices/peripherals and when they could be used:

 Keyboards: They are buttons known as keys, which users press to input text or to interact
with software. Keyboards send data to the computer.
Shortcut: A combination of key presses used to access common software commands quickly.
 Pointing Devices: A pointer is used on a screen to select displayed objects.
Mouse : A mouse uses an optional sensor to recognize the movement of the device.
Tracker ball: A tracker ball is rolled to move the pointer. It dose not have buttons to press.
Track pad: A track pad surface senses finger movements, touches and presses.
Joystick: Commonly used on game controllers to move sprites around the games.
Graphic tablet: Is a flat pad used with stylus (pen shaped device) . Used for draing and
writing on tablet devices.
 Scanner ( including OCR and OMR ):

5|Page
Scanners use light sensors to record physical documents as images, which are saved as files
to the computer.
Optical Mark recognition ( OMR ) software can be also used with scanners to detect simple
marks on a document. A common use for OMR is for recognizing and recording responses to
multiple choices tests. Software allows scanners to read characters on the document and
store the result in text file. This is known as optional character Recognition

1. Barcode scanner:
A barcode is a pattern of lines and gaps that can be read by a device.
Barcodes are often used in parcels, so that they can be tracked.
The barcodes represent letters and numbers which have been used to identify an
item.

There are two types of barcode:


. Linear
. Matrix

Matrix barcodes:
Are also know as QR codes, they are newer and have more advantages over linear
codes.
They can hold much more information than linear barcodes.
They can be scanned in any angle.

Webcams:
Are specialized cameras. They are generally lower quality than camcorders, and may
have built-in microphones to capture sound. They can be used as security cameras.

Microphone:
Is used to capture sound.

Biometric scanner:

Biometric is a term given to the calculation and use of the measurable physical
characteristics of a human.

Fingerprint and retinal identification are being used in many places now and even
facial recognition systems are starting to be introduced.

Fingerprint recognition: scanners read the arches, loop and whorls in a fingerprint.
These are unique to everyone.

Facial Recognition: Identify the structure of a human face in order to identify an


individual.

6|Page
Voice recognition: This requires a microphone to capture the voice, its then
compared a saved original.

Iris recognition: Also unique to each human but its is 120 times more detailed than a
fingerprint, meaning its 120 time.

Magnetic stripe reader:

The data on the magnetic strip can easily be stolen by criminals who put the car

Through a card reader without the cards owners knowledge.

Sensors:

Sensors are used to input data about physical environment. They can automatically input data without
the need for human action.

Their output is then processed by a computer. It is the main features in a smart device such as smart
phones or smart environments.

Types of sensors:

Light

Moisture and humidity

Temperature

Proximity and distance

Motion and movement such as passive infrared sensors

Pressure

7|Page
1.10 Know about types of output devices/peripherals and when they could be used:

Output peripherals are connected to a computer and output the results of the computers processing in
various forms, including:

 Electronic display
 Printed text
 Video
 Audio
 Tactile (touch) forms

Monitor:
Allow user to see output from the computer on an electronic display.
Some monitor also have touch screen technology.

Features of monitors include:


 Screen size- Measured diagonally
 Resolution – Measured in pixels
 Energy efficiency measures-such as going into a low-power standby mode if no input is
detected.

Printer:

1. Dot Matrix:
These printers are sometimes called ‘impact” printers. This is because the printer is made by
hitting or “ impacting “ the paper through a ribbon of ink, and this process is very noisy. The
paper is often has a number of carbon copy layers so it can make serval copies of the same
document as it prints it.

2. Inkjet printers:
These printers use cartridges containing different colored ink. Tiny dots of the inks are
sprayed onto the paper to form images or text.

3. Laser printer:
These printers contain a rotating cylinder or drum that holds an electrical charge. A laser is
used to discharge certain points on these drum and draw an image. Electrically charged
toner is attracted to those points on the drum and is heated onto paper that is passed over
the drum.

4. 3D printer:
Three dimensional (3D) printers real-life versions of digital models. These printers work by
adding layers of heated material from the bottom of the modal to the top. 3D- printed

8|Page
models take a long time to create. They are often used for complex items, sometimes with
working parts.

Data projector:

Data projectors are used for home entertainment. Such as: watching television or playing
games and for giving presentations in classroom. They have the following features:

Light bulbs : These bulbs can have various brightness levels (measured in lumens ) are
expensive to replace.

Resolution: Like monitors, they use different quality screens

Zoom Functionally : The projected image can be made longer by enlarging the image using
either optical zoom or digital zoom.

Probability : Some smaller and lighter projectors are available, and these are easier to move
around.

What is a hardware?
Physical devices you can touch and see.

List examples of input devices:


Keyboard, Mouse, Light pen, Microphone, Webcam

Notes:

RAM: Random Access Memory


ROM: Random only memory
GUI: Graphical user interface
CPU: Central processing unit
SSD: Solid state drive
OCR: Optical character recognition
OMR: Optical Mark recognition

Device: Storage device are used to store data or software that is used in a computer system.

 Storage devices can be either internal or external.


 Internal device connect directly to the computers motherboard.
 External devices are connected to the computer motherboard through different ports and
adapters on the computer exterior.

9|Page
1.5.1 Know the difference between storage devices and storage media used to store data

A storage device allows users to save data and information to storage media. In other
words it is a physical device that allows communication between the storage device and
the storage media. Storage media are items that hold the data. Sometimes, storage
media is removable as is the case with CDs and DVDs.

1.5.2. Know the characteristics of hard disk drives (HDD), Solid state drives (SSD),
optical disk drives, flash memory drives.

These are the different types of storage devices:

o Hard disk drives (HDD) contain hard disk media. These drives provides a
connection from the disk to the motherboard, either directly using wireless
adapter like Wi-Fi or a wired port like USB.

o Solid state device (SSD, often referred to as flash devices) contain flash
memory media. They are otherwise identical to hard disk drives.

o Optical disk drives contain optical disk media. Newer drives are often
compatible with older media.

1.5.4 Know about types of storage media

1. A hard disk drive (HDD), hard disk, it is a storage device that stores and retrieves
digital data using magnetic storage with one or more rigid rapidly rotating platters
coated with magnetic material.

2. Optical Media: Types of optical media includes ( CDs, DVDs and Blu-ray disks)

CDs can store up to 700 MB of data. The data is written to the disk using a laser, which writes data to a
plastic layer beneath layers of aluminium and acrylic.

◾ DVDs look very much like CDs. Data is written to DVDs using a shorter wavelength of red laser light,
which allows DVDs to store more data. They can store 4.7 GB on a single-sided, single-layer disk. Double-
sided, duallayer disks can store as much as 18 GB.

◾ Blu-ray disks are similar to CDs and DVDs, but use a scratch-protection coating. Violet laser light is
used to store data at greater density than the red laser light used in DVDs. They can store 25 GB on a
single-sided disk, and double-sided disks can store 50 GB.

3. Flah Media : Flash media are more energy-efficient than hard disks as they do not have moving parts.
For the same reason, they are also less likely to fail when they are moved around. This makes them
suitable for use in portable devices.

10 | P a g e
4. Magnetic Tape: Magnetic tape was originally designed to record sound, but it is now also used to
store data.

1.5.5 Know that storage media can be recordable/ write once (R) and rewriteable (R/W)
All optical media is recordable and is known as CD-R, DVD-R or BD-R. Some CDs and DVDs can be
rewritten (CD-RW, DVD-RW), and some Blu-ray media can be written then erased and rewritten (BD-RE).

Summary:

1.5.6 Understand the terms describing the capacity of storage such as bit,byte and multiplesof these
( Kb, mb, gb, tb ) (using 1kb= 1000 bytes/ 1KiB – 1024 bytes ).

Storage media store data in binary form. This means that each bit of data holds one of two values: 0 or
1. Different media types interpret 0 or 1 differently.

11 | P a g e
12 | P a g e
Chapter 2:
Software

13 | P a g e
1.2.1 Identify the purpose of systems software and applications software

There are two types of software:

1- Application software: Communication software, presentation software, spreadsheet software.

2- Systems software: Operating system, utility software, drivers


 OS- Windows, Android, iOS
 Utility software- System restore, Defragmenter
 Drivers- Communicate to allow application software used on hardware, hardware to work
with the software.

Software Summary:
 Systems software:
1. Operating systems: Windows, Android
2. Utility software: Defragmentation, System restore
3. Driver: Communicate to allow application software to be used on hardware, hardware to
work with software.

 Application Software:
1. Communication software: Email, Instant messaging, video conferencing (Gmail,
WhatsApp, skype)
2. Presentation Software: Brands- PowerPoint, keynote
3. Spreadsheet Software: Brands- Excel, sheets, Numbers
4. Database Software: Brands- Access, SOL
5. Word processing software: Brands- Words, pages
6. Web Authoring Software: Brands- Dreamweaver, kompozer, word

1.3.2 Know about operating systems and system software tools such as utilities: ( Defragmentation,
backup, formatting ) :

System software: Programs that are designed to maintain or operate the computer system.

Utility Software: Is one form of system software, which carries out configuration and maintenance tasks.

1. Backup: Backup utilities create a copy of files and programs. Backups can be set to run automatically
(usually at a time when the system is not in use) or can be started by a user.

2. Defragmentation:

As a data is stored to a hard disk, some systems spread it across the disk wherever there is free space.
This means that sometimes data is fragmented and stored out of order or out of sequence.(not
organized)

14 | P a g e
To avoid this and to speed up the system, disk defragmentation utilities reorder the fragments of data so
data so that they are stored as close to each other as possible.

3. Compression: Compression utilities reduce the original size of a file or set of files.

4. Formatting:

Disk formatting prepares storage media such as a hard disk drive or USB flash drive for its first use. If a
disk has already been used, then formatting it will make all of the data on the disk unreadable by normal
appliances.

Disk formatting utilities make this process easy for users by providing them with the option to choose
the file system, file unit sizes and the name of the disk. Perhaps most importantly, they make sure that
the user really wants to format the disk.

1.3.3 Know about the role/function of the operating system, including basic knowledge of: ( single
user and network, memory management, resource management, security, print spooling):

The operating systems is a software program that manages the components of a computer system and
its resource.

The operating system performs many tasks such as resource allocation, scheduling, data management
and input/output control.

Examples of operating systems are windows 10, Mac OS, Linux and Unix.

1. Single- user operating systems: Only allow for a general user and do not provide the option to
customize the user interface for different users. They are often found in household appliances.

2. Network operating systems: They have additional functionality, including:

 Sending requests to a server when users log in with their username and password.
 Separating user accounts and ensuring that users cannot access each others files.
 Providing access to network storage and shared resources such as networked printers.

3. Memory Management:

The operating system allocates the required amount of money (RAM) to one or more appliances. When
the application no longer requires the memory space, the operating system makes the space available
for other applications to use.

4. Resource Management:

Systems resources include internal components, such as the processor and graphic card, and external
devices, such as printers,. As well as allocated memory, the operating system ensures the system
ensures the system resources are made available to applications when they are required. The operating
system can tell the user when the resource becomes available.

15 | P a g e
5. Security:

Operating systems can give users secure access to a computer storage and other hardware through
usernames and passwords, biometric scanning or personal access cards. This is called authentication.
Operating systems can provide software firewalls to authorise or prevent network data from remotely
accessing a service or application.

6. Print spooling:

During large print jobs, the computer will have the pages ready for the printer faster than the printer
can produce them. This operating system keeps each pages in a queue ready for printing. This process is
called print spooling.

1.3.4 Know about software applications (apps) including:

Application software: Allows users to produce a digital product. Apps usually download some servers on
the internet. Some devices, like smartphones and tablets, use operating systems that provide access to
app stores. Apps can also be installed using storage media like DVDs.

1- Office productivity tools: ( word processing, desktop publishing, spreadsheet, database, graphics
editors, photo editors, sound editors, presentation)

1- Word processing:

Word processing software lets users create documents that mostly include words. But also some
images. But also some images. They can also include tables, hyperlinks, equations, simple drawing and
shapes and charts.

Word processors are a good choice of application for creating:

 Letters
 Reports
 Essays
 Books

Some word processing applications allow people to work together on a document. Comments can be
added to the text so that the others can understand the writers intention and give feedback.

Word processing applications allow users to change the font and provide different layout views to allow
users to position text. They usually come with spelling and grammar checking tools that identify errors in
the text as the user types.

2- Desktop publishing: (DTP)

DTP software has many similar features to those in word processing software. The main difference is the
way in which the software allows users to work with complicated page layouts.

16 | P a g e
3- spreadsheet:

Spreadsheet applications are used to do calculations. Users can use and create formulae and functions
to perform automatic calculations on values that can be entered and changed later.

4- Database:

Database management systems ( DBMS ) are used to enter, edit and search data. Some systems can also
produce reports that dynamically display real-time changes to the data as it updates.

DBMS software features include:

- Data entry forms so users can input data


- Query editors so that users can select all data that meets certain criteria.
- Report builders so that the users can display data in a more readable format.

Image Editing: Applications that let users create and change bitmap images, such as digital photographs,
or vector graphics, such as drawings or logos.

5- Graphics Editors:

Graphics editing appliances allow users to create or edit vector graphics. Features of graphics editors
include:

- Vectorising images ( that is, converting or tracing bitmap graphics to vector graphics )
- Layers ( that is, having the ability to place some graphics on the top of others)
- Adding text
- Adding or drawing shapes and lines
- Resizing, aligning or moving shapes and lines
- Altering the colour of shapes, lines and fill areas.

6- Photo Editors:

These allow users to edit and enhance digital photographs and images. Features of photo editors
include :

- Adjusting brightness and contrast


- Resizing the image
- Altering sharpness and blurring
- Appling filters and effects such as distortion
- Red-eye removal

17 | P a g e
7- Sound Editing:

It allows users to edit audio files or to join together different audio files in order to create multitrack
music or soundtracks for video. Features of this software include:

- Cut and join audio clips


- Mute and solo some audio tracks
- After volume levels for individual tasks
- Change tempo ( the speed in which a track is played)
- Frequency equalization ( changing the levels of high and low pitch frequencies )
- Add effects like reverberation
- Applying audio processing:
 Reverse
 Noise reduction
 Normalisation
 Fade the volume in, so that it gets louder, or out, so that it gets quieter.

2- Web Authorizing :

It lets users create web pages that include text and images. Web browsers translate HTML into pages
that people can see and read. Web pages can be linked together to create a website for people create a
website for people to view on an intranet or on a web server on the internet.

3- Control software:

Control software takes input from one or more sensor(s), makes a decision based on the input valve and
then outputs something, such as a command, as a result. Control software is often used in engineering,
vehicles and building control systems.

4- Project management:

They are used to help plan and track the individual tasks in a project, so that projects managers can
make the most efficient use of the available resources. Some tasks cannot be started until a previous
task is completed or has been partly completed, so it is important for a project manager to see which
tasks are dependent on others. Project management applications can be used to allocate tasks to
individual people or groups of people, it can also provide option to be allocated for more than one task.
Some also Provide tracking as a tool for the costs and arranging resources to be delivered on time.

5- Communication Software: ( web browsers, email, social media, SMS, MMS, IM )

Communication software provides remote access to systems and allow users to contact people using the
internet. It can be used to send files and messages as text, images, audio and video.

1. web browsers:

Web browsers allow users to view pages and websites created in web authoring software and hosted on
served that are connected to the internet. These servers may be in other country.

2. Email:

18 | P a g e
Emails can be sent and received by software installed on a computer. This locally installed software acts
as a client to an email server. It often stores or uses a database of contacts, which is sometimes available
as another application.

3. Social Media :

Social media can be assessed through a web browser or by using locally installed apps.

4. SMS:

Short messaging services (SMS) applications are found on mobile phones. They allow users to send up to
160 characters per message using the mobile phone network. They do not require an internet
connection. They do not require internet connection.

5. MMS:

Multimedia messaging services (MMS) applications extend the capabilities of SMS. MMS can deliver
more than 160 characters per message and can include video, animations, images and audio. Like SMS,
they are sent using mobile phone network and do not require an internet connection.

6. Instant messaging:

Instant messaging applications are very similar to MMS applications, but they require a connection to
the internet. They can allow users to see when other users are typing, and users can prevent others
from seeing when the are typing.

1.3.5 Know about software licensing types; ( free software, open-source, proprietary software )

Sometimes, users require a software licence to be able to install and use software on a computer.

Two types of software are available:

- Free or open-source
- Propriety software

1. Free software:

Free software licences give users the right to study, modify, copy or distribute a program. The user can
decide if, and how much, to charge for a copy of the software or any service provided by the software.

2. Open-source software:

Licences make the source code available to users so that they modify how the software works, or
distribute the modified or unmodified software.

3. Proprietary software:

It is a software that is marked and disturbed by its owner under a brand name. The software can decide
the fee for the software and whether or not the software should be disturbed. Proprietary software can
be made available for a fee or free of charge. When no fee is required, it is called freeware.

19 | P a g e
1.3.6 Understand the purpose of communication software:

It is to provide remote access to systems and to exchange files and messages in text, images, audio
and/or video formats between different computers of users.

1.3.7 Know why software is updated, how it is done and possible risks to data/systems:

Updates are released by software developers for the following reasons:

- Fixing security vulnerabilities or bugs


- Increasing compatibility with newer operating systems
- Improving performances and efficiency
- Introducing new features
- Improving usability

Software updates are usually made available for download from a server on the internet. Some updates
can be scheduled to happen automatically when they are released.

It is important to back up a system and files before updating software in case the update introduces
problems such as, removing components that other software needs in order to function.

20 | P a g e
Chapter 3:
Memory

21 | P a g e
1.6.1 To know what RAM and ROM stand for :

RAM: Random Access Memory


ROM: Read Only Memory

1.6.2 Describe the characteristics of RAM and ROM, the differences between them and the impact
on the user of the size ROM/RAM.

RAM- Random access memory- violate ( Data lost if switched off )


 RAM is used for software that is running temporarily stores of data in the RAM. Reads and
writes.
 RAM holds software and data being used, gives faster access to software, multi-tasking.
RAM comes in size of 1GB, 2GB, 4GB, 6GB,8GB

ROM- Random only memory- Non volatile

ROM is used to load the main computer software ( operating system ) when the computer is booting
( starting ). Data can only be read.

Difference between RAM and ROM:

RAM: RAM is volatile. Data can be both read and written.

ROM: ROM is non-volatile. Data can only be read.

Describe the characteristics and uses of flash memory

Flash memory is a type of non-volatile. It retains information even without power. So it is ideal for
devices such as cameras, solid state drives and so on.

Examples: USB stick, SSD cards.

1.7.1 understand the function of the processing unit (CPU)

A processor is made of one or more central processing unit (CPUs). These carry out software
instructions. In processors that are made up of more than one CPU, each CPU is referred to as a core.

1.7.2 Know how the speed of a processor is measured

Processor speed is measured in clock cycles per second. This is the number of times per second the
processor can carry out one or more instructions. A user should also consider the amount of CPU can do
in each clock cycle.

22 | P a g e
23 | P a g e
Chapter 4:
Digital
communication

24 | P a g e
2.1.1 Know the range of ways that digital devices communicate:

1. Satellite:

Satellites transmit data to and from digital devices. The following use satellite communication:

• GPS

• Television

• Telephones

• Military

2. Broadcast ( TV, Radio ) :

• Transmitters broadcast television and radio


signals that are received by a viewer’s antenna

• The antenna sends the signal to the television


or radio, which is converted into images and
audio

3. Wied (cables) :

• Devices can use cables to communicate with each other via a wired connection. There are many
types of wired connection, eg:

• HDMI

• USB

• Ethernet

4. Wireless :

Wireless communications is the transmission of voice and data without cable or wires.

E.g:

 Smartphone
 Air pods
 Smart Watch

2.1.1 Know that digital devices can communicate device to device and by using networks :

1. Local area Network (LAN):

Connects devices that are in a small geographic area (e.g. building/group of buildings)

e.g. school, Home,, Small businesses.

25 | P a g e
Benefits of connecting to a LAN:

 Share periphetals ( printers )


 Share storage and data
 Media Streaming
 Shared internet access

2. Wide Area Network (WAN):

A computer network over a large geographical area. A computer network across cities and countries.

E.g. Internet or large government computer networks.

3. Personal area network (PAN):

A small computer networks connects devices that are all near one user.

E.g. Smartphone, Laptop and Smart Watch.

4. Tethering:

It allows another device to connect to a ‘ host device ‘ to share it’s broadband connection.

2.1.3- 2.1.4. Know the types of wireless communication and the differences between Wi-fi and
Bluetooth and when each is best used:

There are different types of wireless communication:


Wi-Fi – Used in home and office networks. Uses the IEEE 802.11 specification of
standards
Bluetooth – lets devices connect over short distances to transfer small files
GPS – Used for Satellite communications and by Navigation Aids to calculate exact
location of a device.
3G/4G/5G – Also known as mobile broadband. Used to provide internet access to
mobile phones and tablets when no wi-fi is available
Infra-Red (IR) – Often used in remote control devices
Near-Field Communications (NFC) – Used in mobile phones and payment cards

Bandwidth: The number of bits that can be carried by a connection in one second.

Buffer: An area of memory used to temporarily store data, especially when streaming video.

Latency: The amount of time it takes to send data between devices.

Domain: The name used to identify a web server

26 | P a g e
• Devices can also use wireless connectivity to communicate with each other. There also many
types of wireless connection. Wi-Fi and Bluetooth are the most common types of wireless
connections.

• Bluetooth is easier to use and consumes less power than Wi-Fi because it only requires an
adapter on each connecting device. Wi-Fi is more secure than Bluetooth. Bluetooth is less
secure than other wireless technologies such as WiFi. Wi-Fi allows more devices and users to
communicate at the same time.

Method Technology Uses


Wi-Fi Wireless Home and office networks
Bluetooth Wireless (Radio waves) Lets devices connect over
shared distances to transfer
small files.
3G and 4G Mobile communication ( Mobile Used to provide internet access
broadband ) to mobile phones and tablets
when no wi-fi is available.
Infra- red Infra-red light ( part of Often used in remove control
electromagnetic spectrum) devices.
NFC ( Near- field Wireless technology Used in mobile phones and
communication) payment cards.

2.2.1 Understand factors influencing the speed and volume of data transfer:

Transfer Method: Wireless methods have limited frequencies, whereas


wired methods have more bandwidth available.

Interference: Can be caused by signals from devices and can disruption


and interference

Blockages: Walls reduce the strength of wireless signals which reduces


the available bandwidth

Distance: More distance = weaker wired/wireless signal

2.2.2 Understand the benefits and drawbacks of wired versus wireless communication in local
networks.

27 | P a g e
2.2.3. Understand the significance of bandwidth and latency, and their impact on the ‘user
experience’:

Latency:

Latency is the delay in time it takes to transfer data between devices

Also affects the speed of transfer

You can check the latency by pinging a domain

Bandwidth:

Bandwidth is the number of bits that can


be carried by a connection in one second

More data needs faster speeds to


transfer data

The higher the bandwidth the more data


can be transferred every second

Note:

28 | P a g e
• Bandwidth is the number of bits that can be carried by a connection in one second
• A buffer is the memory where data is stored temporarily when video streaming
• Latency is the delay in time it takes to transfer data between devices
• the longer we wait for data, the worse the user experience.
• If you have small bandwidth, you are more likely to experience congestion which means
a slower Internet connection

2.2.4. Understand the features of broadband, mobile broadband and cellular networks:

Broadband: Fast access to the internet through a connection to an Internet Service Provider (ISP).

• They use fibre optic cables or copper cables

Cellular Networks: Another name for mobile phone networks.

WI-FI Specification of Standards:

• IEEE 802.11 is the standard specification for wireless communication

• Each revision is marked with letter after the number, e.g 802.11a

Mobile Broadband:

• Provides high-speed wireless connectivity using 3G, 4G or 5G to connect to the mobile phone
network – which acts as the user’s ISP

Topic Questions:

1. What are the types of network?

LAN- local area network

WAN- Wide area network

PAN- Personal area network

2. What types of wireless connections are there?

. Wi-Fi

. Infra-Red

. Bluetooth

3. What are the types of internet connections?

29 | P a g e
. Broadband

. Dial-up/Narrowband

. 3G

.4G

.Satellite

4. Give two types of wireless connectivity that a tablet computer can use.

. Wi-Fi

. Bluetooth

30 | P a g e
Chapter 5:
Networks

31 | P a g e
2.3.1. Know about network operating systems and how devices are identified on a network:

Network operating systems provides additional functionality to stand-alone operating systems. It also
provides access to network storage and shared resources.

Features of network operating systems:

. Passing usernames and passwords to a server for checking when a user logs in.

. Separating user accounts to ensure users cannot access other users files.

. Providing access to network storage & other shared resources.

Requirements for network connection:

. protocols: Rules that allow the exchange and transmission of data between devices.

Internet Protocol (IP): An IP address is a unique address that networked


devices use to send data to each other.

Media Access Control (MAC): MAC addresses are universally unique


identifiers given to the Network Interface Card of every device

Device name: A device name is a name given to computers on a network


to identify them. They are not used by computers to communicate.

32 | P a g e
2.3.2 Understand the function of components of wired and wireless systems:

1. Cables:

2. Wireless Access point (WAP):

. Allow Wi-Fi devices to connect to wired


networks.

. Often built into other hardware (router).

3. Switch :

Connects devices on a network

WAP can connect to wired network


via Switch

Switch ensures data reaches the


correct device

33 | P a g e
4. Gateway:

A gateway connect two different types of network.

For Example: A LAN is connected to a WAN using a gateway.

5. Router:

A router stores the addresses of all devices that are connected to it so that it can forward network traffic
to its destination using the quickest route.

*Most routers are used in homes include a switch and a wireless access point. They also act as
gateways; connecting the LAN to the internet; which is a type of WAN. Home routers are dynamically
allocated an IP address by the internet service provider (ISP).

6. Booster:

A booster is used to amplify the signal in a network so that its range can be extended. For homes and
offices.

7. Server:

A server is a computer that shares its resources with connected devices.

* Computers connected to a server are known as clients. ( A computer connected to a server).

- Authentication Server:

An authentication server checks usernames and passwords. Including Applications and Storage.

- Print Server:

A print server manages multiple printers at a time; dealing with print requests from client computers
and adding jobs to a queue so that so that individual printers are not overloaded with requests.

- File Server:

File servers allow users to access shared and private storage.

- Application Server:

34 | P a g e
Application servers provide clients with access to applications that can be run directly from the server.

2.3.3. Know the role of these for connecting to and using the internet;

Connect to the internet:

. Users subscribe to an ISP to allow them to access the internet.

. Users use web browser to access the internet

. Users use search engines to find information on web pages.

. Filter software is to prevent users from accessing inappropriate information/content.

1. Web Browser:

A web browser is a type of software application used to request and display information stored on web
servers. E.g. Web browsers, Google Chrome and Internet Explorer.

2. Internet service provider (ISP):

- ISP stands for Internet Service Provider


- To connect to the internet, users need an ISP.
- ISP provides connections to the telecommunication infrastructure ( the network of facilities
owned by private and public organizations that are used to transfer data).
- E.g. Ooredoo, Vodaphone and O2

3. Search Engine:

A search engine provides users to find information in web pages stored on web server. Users enter
keywords that describe the information they want to find.

The search engine then compares the keywords with those in its database of web pages and returns the
results that are closest match to the keywords.

E.g. Google, Yahoo, Bing

4. Filter Software:

Filter software prevents users from accessing inappropriate information. When a user tries to access a
web page, the URL address and content are compared against two lists of URL and keywords stored in
the filter software database.

The two list are the blacklist and whitelist.

If the results match anything in the blacklist then the user will not be able to access or view the web
page.

If the results match anything in the whitelist then the user is allowed to access and view the web page.

35 | P a g e
If it is in neither then the user can view the information. This is useful to schools and parents to protect
children from accessing disturbing or inappropriate content.

E.g. Kaspersky, Net Nanny, Content Barrier X9.

2.4.1-2.4.2. Know about peer-to-peer and client-server networks and know about about the role of
servers in a client-server network:

A LAN is a network contained to a small area such as a home or office network. Computers in a network
can be connected using one of the two different models:

 Peer-to-Peer

 Client- Server

Peer-To-Peer Networks:

Computers in a peer-to-peer network share their resources with other computers in the network, but
the do not access servers.

Client-Server Networks:

It is a network that uses servers and clients.

2.4.3 Understand the benefits of using a local area network:

- Access to shared peripherals.


- Access to shared storage and data
- Flexible access
- Media streaming ( including movies, music and gaming)
- Communication (being able to send messages and files to others on the network)
- Shared access internet

2.4.4 Understand the benefits of using a client-server network:

36 | P a g e
- Control of user access rights ( Users or groups of users, can be given access to some resources
and restricted from accessing others)
- Centralized administration ( Resources and user accounts can be managed by an individual, or
individual group of servers and administrators.)
- Centralized Backup ( User data is protected from loss because backups can be automated for all
users).
- Shared software ( Can provide access to shared software).
- Shared storage and file access ( Sharing storage means that users can make files available to
other. File permissions can be set for individual files, folders or drives, allowing users to access
data applications allowing them to work anywhere where there is a client).
- Roaming profiles ( This is the ability to log into any computer in an office and see your settings
and files).

2.5.1 Know about and understand the use of different forms of securing data:

1. Logins and passwords:

Users log in to computers on a network to access centrally managed resources. Passwords are used to
authenticate a user to the network. An authentication server can be used to manage the authentication
of a user to a range of network resources and services.

2. Firewalls:

A firewall is used at the gateway to a network. It controls the network traffic to and from a network,
particularly the traffic from the internet. Firewalls prevent unauthorized users from accessing network
devices and resources. Firewalls are available as hardware and software.

3. Encryption:

Encryption is the process of encoding, scrambling or jumbling data so that unauthorized users are
prevented from being able to understand it.

- One method used to encrypt text is called a Caesar Cipher. This method shifts each letter to the left by
a set number of places. The number of places which the letters have been shifted is known as a key. A
Caesar Cipher is quite easy to crack, but most modern encryption is much more secure. There are two
types of encryption:

. Symmetric key encryption ( uses the same key at both ends of the process, meaning that the same key
is used to encrypt and decrypt the data).

. Public key encryption ( Uses two mathematically related keys called a key pair,. One key is used to
encrypt the data and a different key is used to decrypt it ).

4. WEP/WPA:

- Wireless Encryption Protocol (WEP):

It is used to secure the wireless transfer of data. It is the least secure wireless data encryption
method because, every device on the wireless network uses the same key for every transfer.

- Wi-Fi Protected Access (WPA):

37 | P a g e
It is a security protocol designed to provide better encryption than WEP, WPA generates a new

Key for each device on the wireless network.

5. Virtual Private Network (VPN):

A VPN provides access to a private LAN from a remote location. The connection to the LAN is created
using the infrastructure of a public network like the internet. An individual might use a VPN to:

. Access their employers network when working from home

. Access computers in a different geographical location.

. Make secure payments

6. File Access Rights :

File access rights are also known as file permissions. They can be set for individual files, folders or drives,
and they ensure that users are either allowed to read only or allowed to read and write to the file, folder
or drive.

7. Transaction Logs and backups :

A transaction log can help to identify which computers and network devices have been accessed. This
can allow administrators to identify any unusual activity that might be a threat to data security. A
backup is a copy of one or more files.

38 | P a g e
Chapter 6:
Operating
Online
39 | P a g e
3.1.1 Be aware of risk to data and information:

1. Unauthorized Access:

Access to networks by users who are not permitted to access them is called unauthorized access.

Unauthorized users can attempt to gain access to networks directly by themselves.

2. Deliberate damage by malware:

Malware: Software that is created with the intention to do harm.

Malware can show messages, play sounds, delete files or reprogram systems to perform tasks that will
harm the system and the connected hardware.

Some malware (Known as ransomware) threatens to delete a users files or places restrictions a users
accesses to software or resources until money is paid, usually to an anonymous account.

3. Accidental Deletion:

Users can sometimes delete files or even the entire contents of a drive by mistake. This can happen if:

- They pass a key on a keyboard by accident.


- They format media on the wrong storage device.
- Their devices loses power unexpectedly.

4. Theft of personal data ( phishing, pharming):

Phishing is a technique used by criminals to get personal information and payment details from the
users. It involves sending large numbers of messages that appear to be from real organizations such as:
shops, banks or charities. Phishing messages are often sent by email ( provide information by replying to
message or pressing on a link to fill in the users personal information). It can also be sent via SMS or
instant message apps.

Pharming is a technique used by criminals to gain personal information and payment details from users.
Criminals create fake versions of trusted websites to trick users into entering their login details, which
are then used by criminals to enter the users account. Often the URL of pharming website is designed to
be very similar to the URL of the real website.

3.1.2 Know about methods available to secure data and personal information online:

1. Firewalls:

Firewalls control the data travelling into and out of a network. They examine the network addresses and
ports of the data. They then compare those details to a list of rules that can be changed by network
administrators. The list of rules determines what should be allowed to travel into and out of the
network.

2. Encryption:

Encryption uses a key to scramble data into an unreadable form. If encrypted data is interpreted on the
network. It is useless unless the interceptor has or can identify the key.

40 | P a g e
3. Passwords, PIN, biometrics, CAPTCHA tests, security questions:

Passwords, PINs and biometrics are used online to authenticate a user so that they can access an online
system, such as webmail or online bank account.

Users should make sure that their passwords is:

- More than eight characters long


- A mix of letters, numbers and symbols
- A mix of uppercase and lowercase letters
- Made up of random characteristics ( that is, not common words, names or dates)\
- Changed Frequently
- Something that they have not used before.

4. Anti-malware, anti-virus, anti-adware, anti-spyware:

Anti-Malware:

Anti-malware prevents malware from accessing or operating on computers. It scans computer files in
rest time and allows users to scan files, folders, disks or whole systems.

Anti-virus:

A virus is malware that uses networks to spread to connected devices. Viruses spread vis communication
software such as email or web browsers. Viruses often look like normal files.

Anti-virus software constantly checks files that are downloaded and loaded by a computer for sign of
virus definitions.

Anti-virus software has to be updated regularly because virus code can be changed, either automatically
or by the developers of the virus.

Anti-Adware:

Adware: Displays unwanted adverts to users. Anti-adware software detects, quarantines and removes
adware.

Anti-Spyware:

Spyware secretly monitors and records computer data and user input.

5. Access rights and files permission:

Permissions: Authorization settings that provide the ability for a user or users to access files, folders or
drives.

41 | P a g e
6. Secure websites :

Hypertext Transfer Protocol (HTTPS) is used to exchange data between a web server and a client server.

HTTPS keeps communications private and provide security for users online accounts. Web browsers
often show that a website is secure by displaying a green padlock in address bar.

7. Not opening email attachments or following web links:

Users should always be careful when opening email attachments or hyperlinks in email and other
messages. This is because some are fake and designed to steal users personal information. Users should
ensure that their anti- malware software is up to date and be especially careful if;

- They do not recognize the sender


- The text is general, impersonal or irrelevant to the user
- The text contains spelling or grammatical errors
- The text contains a message telling the user to do something immediately
- The user doesn’t recognize the URL.

8. Backup procedures:

Backups create one or more copies of data. A backup usually stored to an external storage device. This
makes the data more secure, because the backup files will be safe even if the original storage device
fails or is damaged, lost or stolen.

Loss of files or damage to files can be caused by:

o Theft
o Malware
o Flooding or fire
o Power cuts

Good ideas for backup procedures are as follows:

o Set automatic backups


o Do not use optical media because they deteriorate over time and fragile.
o Stores copies at multiple locations
o Store important data in a fireproof safe.

3.1.3 Know about online payment systems:

Third party payment systems: PayPal, Bank cards, contactless card using NFC.

Online third-party payment processors like PayPal allow users to create an account so that they can
send and receive money using email accounts for identification.

42 | P a g e
Bank Cards:

Bank cards allow customers to pay for goods and services online and in shops. When paying online, you
usually need to enter the:

- Card Number
- Expiry Date ( and sometimes the start date) of the card
- Name on the card
- Three- or four- digit card security code (CSC).

* The card number is not the same as the bank account number.

Contactless payment using NFC:

Near Filed Communication (NFC) is used in payment cards to allow the transfer of payment data. The
payment does not require a PIN or any form of user-authentication. If a card reader is in range and
requesting payment, then the contactless card will take payment up to a maximum amount.

* N FC cards are wrapped in foil to prevent the very weak signals from being intercepted by criminals.

43 | P a g e
Chapter 7:
Impact of
The
internet
44 | P a g e
The Internet:

The internet is not the same thing as the World Wide Web. The internet is the interconnected network
of computers that provides many online services to users. The World Wide Web is just one use of the
internet.

Protocols are used by applications to transfer data across the internet. These protocols include:

- IMAP ( Internet message access protocol ) for email


- FTP ( File transfer protocol ) for sending files
- SSH ( Secure shell ) for secure remote logins
- VoIP ( voice over internet protocol ), used for voice call services like skype.
- XMPP ( Extensible messaging presence protocol ), used for messaging services like WhatsApp.
- HTTP ( hypertext transfer protocol ), used for the World Wide Web

3.2.1 Know about the impact of the internet on employment such as; new job opportunities as the
nature of a job changes, new skill requirements and potential job loss.

The internet has had an impact on individuals employment, often requiring people to learn new skills so
they can change the way they work.

New job opportunities as the nature of a job changes:

As the internet changes the work that people do, this provides new job opportunities.

New Skills:

Many employers now require employees to use the internet for work, meaning that employees need to
learn new skills.

Potential job loss:

If employees do not keep updating their skills in the use of the internet, they may not have the skills
required to carry out new work. If they are not willing or able to retrain, they could lose their jobs.

3.2.2 Know about the impact of the internet on working practices, including: collaborative working,
flexible or mobile working.

Collaborative Working:

Collaborative working allows work to be split into a number of individual tasks, each of which can be
done by a different employee. Collaborative working also allows more than one person to work on a
task at the same time.

Flexible Working:

Flexible working is a way of working that suits an employees needs.

45 | P a g e
3.2.4 Know about social impacts of the internet such as:

The internet has had a huge impact on the way in which people socialize, particularly thanks to the rise
of social media sites.

Social Interaction:

Social interaction is the communication with and reaction with others.

Humans are naturally social, which means that they require social interaction with others. Humans feel a
need to connect with each other and to participate actively in the world around us.

Cyberbullying:

Cyberbullying: Using the internet to send text, images or multimedia in order to upset or embarrass
someone.

Physical Activity:

Access to online goods and services means that people do not have to leave the comfort of their homes
to shop, go to the bank or even go to school. This will implement people in staying in their places
without moving which results in health problems and low fitness.

3.2.5 Understand how to stay safe online.

To stay safe when using the internet, users should follow three main rules:

 Zip It
 Block It
 Flag It

Zip it:

Keep your personal information private and do not share it with strangers.

Examples of personal information you should not share including your :

o Location
o School Name
o Phone Number
o Real Name
o Photos
o Mailing Address or Email Address

You can also use privacy settings to stop strangers from viewing your profile.

Block It:

Always block offensive messages or friend requests from strangers on social networking sites. Do not
open suspicious attachments or links.

46 | P a g e
Flag it:

You should always tell an adult if something online upsets you or if someone you don’t know requests to
meet you.

3.3.1-3.3.2 Understand how the availability of digital devices and the internet enables individuals to
work from home and know the benefits and drawbacks of working from home for individuals and
organizations.

Benefits of working from home:

Benefits to individuals:

- No need to travel to work.


- Saves Money
- No need to wear uniform or business clothes.
- Can work in comfortable environment.

Benefits to organizations:

- Can attract a talented, motivated workface.


- Do not need to buy or rent office space or furniture for employees.
- Workers may work more effectively at home.

Drawbacks to individuals:

- May be distractions at home.


- Suffer from a lack of social interaction with colleagues.
- Feel disconnected from the company.

Drawbacks to organizations:

- May be concerns about data security.


- May be more difficult to manage and support employees who are not in the office.
- Employees working at home might not work as hard.

3.4.1 Understand the positive impacts of the internet

1. Improved communication:

Organizations can communicate and interact with their customers and employees more easily and in
real-time using email, instant messaging and social media. They can provide up to date information for
customers easily.

2. Access to global markets:

The internet has made it easier for organizations to advertise and sell to customers in countries around
the world. In addition, the internet has also ensured that manufactures have easier access to businesses
that produce materials and parts and can communicate more easily with them. Also, by internet
organizations can employ people in other countries.

47 | P a g e
3. Information that is managed and used:

Organizations can make use of big data to understand the behavior of their customers, improve the
customer experience and make their processes more efficient.

3.4.2. Understand the negative impacts of the internet:

1. Security Issues:

The data stored by organizations is often private and valuable. If data is stored in a central location.
Organizations use the internet to provide their employees with access to their systems while working
from home. They can also use the following methods:

 Allowing employees to transfer a copy of the organizations data to home via email.
 Providing remote access to the data stored in the organizations building. Such as; by using a VPN
 Storing data on another company’s servers and providing access to that data.

2. Risk of Hacking:

There are three main ways in which unauthorized users can gain access to systems:

 Authorized users reveal their login details, either intentionally or unintentionally.


 Unauthorized users intercept the data, either as it is transferred over the internet from the
organizations to the employees computer or as it is transferred within the employees LAN after
it has been transferred via the internet WAN.
 Unauthorized users hack into the organizations systems.

3. Greater Competition:

The use of the internet means that organizations must now complete in a global marketplace.

Some types of organizations and even whole industries have been put at risk due to the way in
which the internet has provided new channels for trade and distribution of goods and services.
There are many examples of this:

 Music and film retailers have been threatened by the increased use of online downloads and
streaming.
 DVD rental companies have had to deal with similar challenges, as more people now watch
films online.
 Record labels have been threatened by the fact that independent artists can publish and
distribute their music online.
 Estate agents have lost business as individuals advertise their properties online.
 Postal services have been negatively affected by people’s ability to send messages and
digital media instantly.

3.5.1 Understand the impact on society of the ability of individuals to have less-restricted access to
networks at any time.

The Internet has enabled people to broadcast their own message and interact with global
audiences (through social media, YouTube etc)

48 | P a g e
 Online content is still controlled to an extent by moderators.

 Often based on your browsing history (think targeted ads)

 User Generated – created by the individuals who use the service.

 Digital Humanitarian Movement – a group of people working together using ICT to promote
human welfare.

3.5.2 Know about the gap between the information rich and information poor.

Information Rich: People with good access to information provided by communication technologies.

Information Poor: People with limited access to information provided by communication technologies.

3.5.3 Understand the causes and implications of unequal access to ICT (locally, globally).

Below are some of the causes that lead to unequal access to ICT.

3.5.4 Know about the impact on individuals and communities of limited or no access to digital
technologies.

 Have less communication with other people.


 Makes them more isolated and can reduce their understanding of different cultures.
 Reduces availability of good and services, entertainment, and education
 Some argue it builds stronger communities as it increases the amount of time people spend
with each other.

3.5.5 Understand the impact of changes in ways of socializing.

 People use the internet to connect to people around the world.

49 | P a g e
 Can also cause individuals to become isolated from their families as they spend more time
looking at the screen of their digital devices.

 Status updates allow people to know what others are doing without interacting with them

 Some people argue that social media make friendship meaningless as strangers are labelled as
‘friends’

50 | P a g e

You might also like