0% found this document useful (0 votes)
12 views9 pages

ICT SA1 Notes

The document covers essential topics in digital literacy, including network security, file permissions, and the protection of personally identifiable information (PII). It also discusses the benefits and limitations of various online communication methods and the Internet of Things (IoT), highlighting both its advantages and associated risks. Additionally, it provides an overview of using MS Excel for data management and creating pie charts, as well as using Canva for design projects.

Uploaded by

y.mihika.123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views9 pages

ICT SA1 Notes

The document covers essential topics in digital literacy, including network security, file permissions, and the protection of personally identifiable information (PII). It also discusses the benefits and limitations of various online communication methods and the Internet of Things (IoT), highlighting both its advantages and associated risks. Additionally, it provides an overview of using MS Excel for data management and creating pie charts, as well as using Canva for design projects.

Uploaded by

y.mihika.123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

1.

Digital Literacy: Safety and Well-being

1.1 Network Security


- Definition: Protection of network infrastructure from unauthorized access, misuse, or disruption.
- Goals: Integrity, confidentiality, and availability of data.
- Methods: Use of technologies, policies, and procedures to safeguard data.

1.2 Securing Network Using File Permissions


- File System: Files are stored in directories, managed by an OS.
- System Administrator: Has control over file permissions.
- Types of File Permissions:
1. Read (r): View-only access.
2. Write (w): Allows editing but not executing.
3. Execute (x): Allows running executable files (e.g., scripts).

1.3 Network Permissions


- Definition: Access levels for users or devices within a network.
- Methods:
1. Firewall: Controls traffic flow using IP addresses, ports, and protocols.
2. VPN: Provides secure remote access using encrypted tunnels.
3. Username-based Authentication: Identity verification through unique usernames and passwords.
4. Multi-Factor Authentication (MFA): Adds extra security by requiring multiple forms of verification.
5. Encryption: Converts data into unreadable cipher text to protect transmission.
6. User Training: Educating users on secure practices, like strong passwords and phishing awareness.

1.4 Personally Identifiable Information (PII)


- Definition: Information that can identify an individual (e.g., name, address, financial info).
- Protection: Safeguarding PII is critical for privacy and security.

1.5 Protecting Personal Identity with Non-Identifiable Usernames


- Anonymity and Privacy: Avoids revealing real-world identity.
- Reduced Targeting: Lowers risk of targeted attacks.
- Mitigates Social Engineering: Makes it harder for attackers to manipulate users.
- Limited Tracking: Prevents extensive profiling by third parties.
- User Control: Empowers users to manage their online presence.

1.6 Personal Responsibility for Digital Activity, Safety, and Well-being


- Password Security: Use strong, unique passwords.
- Privacy Settings: Adjust privacy controls on platforms.
- Online Awareness: Stay informed about online threats.
- Avoid Oversharing: Be cautious about sharing personal information.
- Device Security: Secure devices with locks and antivirus software.
- Responsible Social Media Use: Be mindful of content shared and avoid cyberbullying.
1.7 Benefits and Limitations of Online Communication
- Video Communication:
- Benefits: Visual cues, collaboration, global connection.
- Limitations: Requires bandwidth, can be distracting.

- Audio Communication:
- Benefits: Efficient, allows multitasking, conveys tone.
- Limitations: Lacks visual cues, may have background noise.

- Text Communication:
- Benefits: Asynchronous, provides written record, accessible.
- Limitations: Lacks nuance, can be time-consuming.

1.8 Internet of Things (IoT)


- Definition: Network of interconnected devices that collect and exchange data.
- Benefits:
1. Automation and Efficiency: Streamlines processes.
2. Data Collection: Enables analysis for improved decision-making.
3. Convenience: Enhances daily life through smart devices.
4. Safety and Security: Improves monitoring and predictive maintenance.
5. Healthcare: Supports remote monitoring and personalized care.

- Risks:
1. Privacy Concerns: Data breaches.
2. Security Vulnerabilities: Cyberattacks.
3. Interoperability Issues: Communication problems between devices.
4. Reliability Issues: Hardware/software failures.
5. Regulatory Compliance: Adherence to laws in regulated industries.

Summary
- Network security, PII protection, and responsible digital behavior are essential for safety and well-being
in a connected world.
- Different communication methods offer varied benefits, and IoT brings both convenience and risk.

2. Pie Charts in MS Excel:

2.1 MS Excel Overview

• MS Excel: Part of Microsoft Office suite, used for data organization, performing
calculations, and creating charts.
• Cell: A rectangular box formed by the intersection of a row and a column.
• Cell Address: Also called cell reference, used to identify a cell (e.g., A1, D2). There are
three types of references:
1. Relative reference
2. Absolute reference
3. Mixed reference

2.1.4 Features of MS Excel

• Ribbon: Located at the top, containing different tabs for functionalities.


• Home Tab: Basic operations like font, autosum, editing.
• Insert Tab: Insert tables, charts, images, etc.
• Page Layout: Control appearance of sheets, margins, and orientation.
• Formulas Tab: Offers built-in functions for data manipulation.
• Data Tab: Operations like removing duplicates, accessing external data.
• Review Tab: Spell check, thesaurus, translate, and worksheet protection.

2.1.5 Managing Spreadsheets

• Creating a New Sheet: Click the “+” button or right-click and choose “Insert >
Worksheet.”
• Navigating Sheets: Use the tabs at the bottom, right-click for options like renaming,
moving, or copying sheets.

2.1.7 Saving Workbook

• Save the Workbook: Click on the Office button/File tab > Save As > Enter file name >
Click OK.

2.2.1 Planning a Survey

• Survey Goal: Decide what data you want to collect.


• Types of Data:
• Quantitative: Numerical, used for comparison.
• Qualitative: Descriptive.
• Survey Methods:
• Questionnaires: Collect both quantitative and qualitative data.
• Interviews: Mainly used for qualitative data.

2.3.1 Steps to Create Google Form

1. Start a New Form: Choose a template or create from scratch.


2. Name and Describe: Give the form a title and description.
3. Set Up Questions: Use multiple-choice, short answers, etc.
4. Set Up Responses: Ensure the “Accepting responses” toggle is on.
5. Integrate with Google Sheets: Automatically store responses.
6. Adjust Settings: Control response limits, email collection, quiz setup.
7. Preview and Send: Test the form before sharing via email or links.
2.4 Pie Charts in Excel

• Definition: A pie chart is a circular graph representing a single data series, where each
slice corresponds to a portion of the whole.

2.4.2 Types of Pie Charts in Excel

1. 2-D Pie Chart: Basic pie chart showing data slices.


2. 3-D Pie Chart: Adds depth for a 3D appearance.
3. Pie of Pie Chart: Displays a portion of the pie as another smaller pie chart.
4. Bar of Pie Chart: Displays a portion of the pie as a bar chart.
5. Doughnut Chart: A variation of a pie chart with a hole in the center.

Steps to Create a 2-D Pie Chart

1. Select Data: Choose the range of data for the chart.


2. Insert Chart: Go to the “Insert” tab and choose the 2-D pie chart option.
3. Interpretation: Each slice represents a data point, showing proportions.

2.5 Data Tables

• Data Table: A structured format for organizing and analyzing data.


• Field: Column storing one fact, the heading is the field name.
• Record: Row representing a single entry with multiple fields.
• Primary Key: A unique identifier for each record.

2.6 Data Validation, Sorting, and Filtering

• Data Validation: Set rules (criteria) to ensure data accuracy.


• Sorting: Arrange data in ascending or descending order.
• Filtering: Select and display only the records that meet specific criteria.

2.6.4 Adding Calculations

• Formulas: Add calculated fields based on existing data, e.g., weight/50 to calculate
delivery charges.
3. Spotlight Design in Canva

3.1 What is Canva?


Canva is an online design tool allowing users to create posters, business cards, brochures, invitations, and
more. It is free and web-based, accessible from any internet-enabled computer.

3.2 The Home Screen


The home screen displays your designs and options to create new ones. You can organize designs in
folders and access Canva’s design courses and inspiration section.

3.3 Create a Design


Click on “Create a Design” or “More…” to choose from numerous templates. Custom dimensions can
also be set for designs.

3.4 Design Templates


Canva provides templates for social media, documents, marketing materials, events, ads, and more, which
are fully customizable.

3.5 Blank Canvas


After selecting a design type, you’ll be taken to a blank canvas where you can start adding elements like
text, images, and more.

3.6 Layouts
Layouts are pre-designed templates, partially or fully customizable. Some are free, while others require
payment.

3.7 Elements
Elements in Canva include photos, grids, frames, shapes, icons, charts, and more. You can also upload
your own images.

3.8 Text
Canva provides different text options, including headings, subheadings, and body text, as well as more
stylized text elements.

3.9 Background
You can set a solid or patterned background or use an image from Canva or your own upload as the
background.

3.10 Uploads
Users can upload images from their computers or Facebook, which will remain available for future use in
Canva.

3.11 Moving and Positioning Elements and Text


Elements and text can be moved by dragging or using additional options like transparency and layer order
(move forward/back).

3.12 Downloading, Printing, or Posting Design


Download your design in various formats (JPG, PNG, PDF). Each format serves different purposes like
web, print, or sharing.

3.13 Downloading with Paid Content


If using paid content, you’ll be prompted to pay before downloading. Canva identifies the paid elements
used.

3.14 Objectives for Students


Students should choose a topic, conduct research, and use Canva to create an infographic. Peer review and
proper citations should be included.

3.15 Download Your Design


After completing a design, click “Download” and select your desired format. Make sure to choose quality
or page number options as needed.

QUESTION & ANSWERS

Q1. What are the file permissions?


Ans. File permissions are determined by the System Administrator—who is simply a user of the
administrator account on a computer or a user who manages the system of a network of
computers.
There are three types of the file permissions-
1.Read (r) – allows the user to read the file but not make any other edits.
2. Write (w) – allows the user to read and write the files, so they can make changes to the
file, but they cannot execute a file if it is a program.
3. Executable(x) – allows the user to execute the file. So if this file is a python code or bash
script the user would have to have execute permissions to be able to run that program.
Most files have default read permissions for most or all users.

Q2. What is the role of Two-Factor Authentication (2FA) in access control?


Ans. a. Two-Factor Authentication (2FA) adds an extra layer of security beyond a username and
password.
b. It requires users to provide two or more forms of identification like common factors
include something you know (password), something you have (security token), or
something you are (biometric data).
Q3. Which mechanisms are used to enforce network permissions?
Ans. Network permissions are enforced using several mechanisms, including:
a. Firewalls
b. Virtual Private Networks(VPN)
c. Username-based Authentication
d. Two-Factor Authentication(2FA)
These mechanisms work together to enforce network permissions and ensure that only
authorized users or devices have access to network resources while protecting against
unauthorized access or malicious activities.

Q.) Short Answer Questions

Q.1 How can individuals ensure responsible use of social media?


Ans. a. Responsible social media use involves being mindful of the content shared, respecting others'
privacy, and avoiding cyber bullying.
b. Users should also be cautious about the information they consume on social media.

Q.2 State the three key aspects of personal responsibility in the digital field.
Ans. a. Password Security
b. Online Awareness
c. Device Security

Q.3 Why is regularly backing up data part of an individual's digital responsibility?


Ans. Regularly backing up data is an essential digital responsibility that helps individuals protect their
valuable information.

Q.)Short Answer Questions


Q.1 Which are the different methods of online communication?
Ans. There are three different methods of online communication:
a. Video Communication
b. Audio Communication
c. Text Communication

Q.2 What are the benefits and limitations of text communication?


Ans. Text Communication benefits are:
a. Asynchronous Communication: Text allows for asynchronous communication,
enabling users to respond at their convenience.
b. Record Keeping: Text messages provide a written record of conversations, facilitating
documentation and reference.
c. Global Reach: Text is language-independent, making it suitable for communication
across diverse linguistic backgrounds.
d. Accessibility: Text communication is often accessible to individuals with hearing
impairments.
Text Communication limitations are:
a. Lack of Nuance: Text lacks the nuance of tone and non-verbal cues, leading to
potential misinterpretations.
b. Time-Consuming: Typing can be time-consuming, particularly for lengthy or
complex messages.
c. Emotional Disconnect: The absence of visual and auditory elements may create a
sense of emotional disconnect.

Q.3 What are the limitations of audio communication?


Ans. The limitations of audio communication include:
a. Lack of Visual Cues: Without visual cues, nuances in communication may be lost,
leading to potential misunderstandings.
b. Limited Expressiveness: Some emotions or intentions may be challenging to convey
through audio alone.
c. Background Noise: Environmental noise can disrupt audio calls, affecting
communication clarity.

Q.)Short Answer Questions

Q.1 What are the benefits of using IoT?


Ans. 1. Automation and Efficiency:
IoT enables automation of various processes, leading to increased efficiency and
productivity in industries such as manufacturing, agriculture, and healthcare.
2. Data Collection and Analysis:
IoT devices collect vast amounts of data from sensors, which can be analyzed to gain
insights into consumer behavior, optimize operations, and improve decision-making
processes.
3. Improved Convenience:
IoT devices enhance convenience in daily life by providing smart home solutions,
wearable devices, and connected appliances that offer seamless integration and
control.
4. Enhanced Safety and Security:
IoT applications improve safety and security through features like remote
monitoring, surveillance, and predictive maintenance in critical infrastructure, smart
cities, and transportation systems.

Q.2 What are the risks involved in IoT?


Ans.
1. Privacy Concerns: IoT devices collect and transmit vast amounts of personal data,
raising concerns about privacy breaches, unauthorized access, and misuse of sensitive
information.
2. Security Vulnerabilities: IoT devices are often vulnerable to cyberattacks due to
inadequate security measures, potentially leading to data breaches, identity theft, and
disruption of critical systems.
3. Interoperability Issues: With the proliferation of IoT devices from different
manufacturers, interoperability challenges arise, hindering seamless communication
and integration between devices and platforms.
4. Reliability and Dependability: IoT devices may suffer from reliability issues such as
software bugs, hardware failures, and connectivity problems, impacting their
dependability for critical applications.

You might also like