Ict Notes
Ict Notes
ICT NOTES
Hardware refers to the physical components of a computer system. It can be divided into
three main categories:
1. Internal Components:
o CPU: The brain of the computer.
o Processor: Circuit that processes information.
o Motherboard: Connects all components for communication.
2. Internal Memory:
o RAM: Fast, temporary working memory.
o ROM: Stores start-up instructions.
3. Hardware Components:
o GPU: Processes images and video.
o Sound card: Manages audio.
o NIC: Provides network connection. (
o Storage Devices: Permanent data storage (e.g., hard drive, USB).
o Input Devices: For user input (e.g., mouse, keyboard).
1. Application Software:
User-selected software for specific tasks. Examples include:
o Word Processing: Text creation/editing
o Spreadsheets: Data organization/analysis
o Database Management: Data storage/retrieval
o Control/Measurement: Uses sensors for system control
o Media Editing (Video/Graphics/Audio): Modifying media files
o Computer-Aided Design (CAD): 2D/3D design and modeling
2. System Software:
Essential for running the system and managing resources. Includes:
o Operating Systems (OS): Manage hardware, software, security, and errors.
o Compilers: Convert programming languages into machine code.
o Linkers: Combine object files into executable programs.
o Device Drivers: Control hardware and peripherals.
o Utilities: Maintain and optimize system performance.
1
Made by Manas Mokashi
Operating Systems
An OS manages hardware, software execution, input/output devices, and system security,
providing a platform for running applications.
User Interfaces (UI): The OS provides diverse ways for users to interact with the system,
each with its pros and cons:
2
Made by Manas Mokashi
Key terms:
o Fetch-Execute Cycle: The process of fetching, decoding, and executing
instructions.
o ALU (Arithmetic Logic Unit): Performs calculations.
o Control Unit: Directs operations.
o Cache & Registers: Temporary storage areas for fast access.
Advantages: High-speed data processing.
Disadvantages: Requires high power consumption and generates heat.
2. Internal Memory
Key terms:
o RAM (Random Access Memory): Volatile, temporary storage for active
processes.
o ROM (Read Only Memory): Non-volatile memory for permanent system
instructions (e.g., BIOS).
RAM:
o Advantages: Fast access, read/write capabilities, improves performance.
o Disadvantages: Loses data when power is off.
ROM:
o Advantages: Permanent storage, non-volatile, essential for booting.
o Disadvantages: Limited storage capacity cannot be altered.
3. Input Devices
Key terms:
o Devices like Keyboard, Mouse, Scanner, Microphone, and Touchscreen
allow user interaction with the computer.
Advantages:
o Keyboard: Common, easy to use.
o Mouse: Intuitive, fast for navigation.
o Touchscreen: Space-saving, intuitive.
Disadvantages:
o Keyboard: Slow for large data entry, causes repetitive strain injury (RSI).
o Mouse: Requires a flat surface, can be difficult for users with disabilities.
o Touchscreen: Prone to smudging, less precise.
3
Made by Manas Mokashi
4. Output Devices
Key terms:
o Monitor, Printer, Speakers, and Multimedia Projectors display processed
data.
Advantages:
o LCD/LED Monitors: Low power consumption, clear display.
o Laser Printer: High-speed, cost-efficient for large volumes.
o Speakers: Enhances multimedia experience.
Disadvantages:
o Monitors (CRT): Bulky, high-energy consumption.
o Inkjet Printer: Slow, ink can smudge.
o Speakers: Quality varies, high-end models are expensive.
5. Storage Devices
Key terms:
o Magnetic Storage (e.g., HDD): Uses magnetic fields to store data.
o Solid-State Storage (e.g., SSD, USB): Stores data in electronic circuits.
o Optical Storage (e.g., CD, DVD): Uses lasers to read/write data.
Advantages:
o Magnetic Storage: High capacity, low cost per GB.
o Solid-State Storage: Faster, no moving parts, portable.
o Optical Storage: Inexpensive, widely compatible.
Disadvantages:
o Magnetic Storage: Prone to mechanical failure, noisy.
o Solid-State Storage: High cost, limited write cycles.
o Optical Storage: Low capacity, easily scratched.
Key terms:
o Devices like Magnetic Stripe Readers, RFID Readers, and Barcode
Scanners automate data entry with minimal human input.
Advantages:
o Fast and accurate data capture.
o Secure for sensitive applications (e.g., credit card readers).
Disadvantages:
o Magnetic Stripe: Can be damaged, requires close contact.
o RFID: Susceptible to signal interception.
o Barcode: Requires line-of-sight, can be easily damaged.
4
Made by Manas Mokashi
7. Cloud Storage
Key terms:
o Cloud Storage: Stores data on remote servers accessible via the internet.
Advantages:
o Scalable storage, automatic backups, and remote access from any device.
Disadvantages:
o Security risks, ongoing costs, and reliance on internet.
Desktop Computers
Mobile Computers
Emerging Technologies
Definition: Blends the virtual and real world, enhancing immersion through technologies like
virtual reality (VR) and augmented reality (AR).
Types:
o VR: Immerses users in a fully simulated environment.
o AR: Overlays digital information onto the real world.
5
Made by Manas Mokashi
Uses: Applied in gaming, education, architecture, medicine, and retail for improved
visualization.
Disadvantages: Potential for addiction and excessive screen time.
Network Hardware
1. Router
Definition: Directs data packets between networks, such as routing internet traffic to the
correct devices on a home network.
Functions: Connects LANs to the internet (WAN), assigns IP addresses, and prioritizes data
traffic to maintain stable connections.
2. Data Packets
Definition: Small chunks of data broken down for transmission over the internet. Consists of
a header (source/destination IP), payload (actual data), and trailer (error checking).
3. IP Address
5. Hub
Definition: Connects multiple devices in a network by broadcasting data to all devices, which
can lead to inefficiencies.
6. Switch
Definition: Connects multiple devices in a network and forwards data only to the intended
recipient using MAC addresses, improving network efficiency.
7. MAC Address
8. Bridge
Definition: Connects two LANs, creating a larger network, unlike switches or hubs that
manage devices within a single LAN.
6
Made by Manas Mokashi
Wireless Networks
1. Wi-Fi
Definition: A wireless networking standard allowing devices to connect to the internet via a
wireless access point (WAP).
Advantages: Portability, cost-effective, widely compatible.
Disadvantages: Slower than Ethernet, less secure, range limitations.
2. Bluetooth
Cloud Computing
1. Cloud Storage
Network Environments
1. Internet
Definition: A global network of interconnected LANs forming a wide area network (WAN),
used to access the World Wide Web.
2. Intranet
Definition: A private network within an organization, offering secure internal resources and
information sharing.
3. Extranet
7
Made by Manas Mokashi
Network Types
Definition: A network covering large geographic areas, connecting multiple LANs via routers
and telecommunication lines.
Data Transfer
Network Issue: Sharing data over a network poses security risks such as unauthorized access
and data manipulation.
Security Risks:
o Hackers: Exploit network vulnerabilities to access or steal data.
o Insider Threats: Employees compromising security, intentionally or unintentionally.
o Social Engineering: Manipulating users to give away sensitive information or install
malware.
o Unencrypted Transfers: Data transferred without encryption, making it vulnerable.
o Weak Encryption: Outdated encryption protocols.
o Insecure Protocols: Using insecure protocols like HTTP instead of HTTPS.
Passwords
Authentication
8
Made by Manas Mokashi
o Physical Tokens: Generate one-time passwords (OTP), very secure but inconvenient.
o Electronic Tokens: OTPs generated by apps, secure and convenient.
Anti-Malware Software
Definition: Protects devices from malicious software such as viruses, spyware, and spam.
Functions:
o Scans files and attachments for malware.
o Regularly updates to block new threats.
o Quarantines infected files and uses heuristic checking to identify potential threats.
Electronic Conferencing
1. Video-Conferencing
2. Audio-Conferencing
3. Web-Conferencing
Definition: Real-time communication over the internet for large groups, typically used for
webinars and lectures.
Advantages: Pre-shared slides, instant messaging, screen sharing.
Disadvantages: Technical issues, security concerns, information overload.
1. Microprocessor
An integrated circuit that contains a CPU and executes instructions. Devices with
microprocessors are vulnerable to hacking, allowing unauthorized control of smart home
systems and monitoring user behavior.
3. Social Interactions
9
Made by Manas Mokashi
Negative: Risk of social isolation and anxiety due to reduced face-to-face interaction.
4. Transport Monitoring
5. Autonomous Vehicles
2. Back/Neck Problems
3. Eye Strain
4. Headaches
Communication Media
Definition: Tools and channels for sharing information between a sender and a receiver. It
can be electronic (e.g., websites, multimedia presentations) or physical (e.g., newsletters,
posters).
1. Newsletters:
o Periodic publications, often distributed via email or print.
10
Made by Manas Mokashi
2. Posters:
o Visual presentations for promoting events/products.
o Advantages: Cost-effective, wide reach, long shelf life.
o Disadvantages: Limited information, lack of interactivity, can be removed.
3. Websites:
o Online platforms for information and services.
o Advantages: Media-rich, global audience, easy navigation.
o Disadvantages: Can be hacked, expensive maintenance.
4. Multimedia Presentations:
o Combine text, images, audio, and video for engaging information delivery.
o Advantages: Interactive, visually appealing.
o Disadvantages: Requires specific equipment, risk of distracting visuals.
6. Media Streaming:
o Real-time transmission of audio and video.
o Popular services: Spotify, Netflix, YouTube.
7. E-Publications:
o Digital versions of printed materials, offering portability and adjustable text size.
Mobile Communication
Definition: Transmitting information between people and devices using radio waves.
Smartphones connect via SIM cards and enable features such as SMS messaging, phone
calls, VoIP, internet access, mobile payments, and camera functions.
Computer Modeling
Computer-Controlled Systems
Definition: Systems that use computers and software to manage processes or devices.
Advantages: Increased efficiency, precision, ability to operate in hazardous environments.
11
Made by Manas Mokashi
Robotics
Definition: Robots carry out tasks using programmed instructions. They are categorized as
dumb (fixed instructions) and smart (adaptive).
Applications: Industry (quality control), transport (warehouse work), agriculture (planting),
medicine (rehabilitation), and domestic (meal preparation).
Advantages: Efficiency, precision, ability to operate in dangerous environments.
Disadvantages: Prohibitive costs, potential job displacement, limited capabilities.
Registration & Attendance: IT systems facilitate methods like magnetic stripe cards or
biometrics for tracking attendance, making the process faster and more accurate.
Recording Learner Performance: Teachers can analyze data to identify strengths and
weaknesses, inform teaching strategies, and provide progress reports.
Computer-Aided Learning (CAL): CAL enhances traditional teaching by allowing personalized
student development and providing interactive revision resources.
Advantages:
Disadvantages:
An online booking system enables customers to purchase tickets for events over the internet.
Common industries include travel, music, film, and sports.
Advantages:
12
Made by Manas Mokashi
Disadvantages:
Banking Applications
ATMs provide customers with 24/7 access to banking services, including withdrawing cash,
depositing funds, checking balances, and paying bills.
Advantages:
Disadvantages:
EFT allows for the electronic transfer of money between accounts, commonly used for salary
deposits and bill payments.
Advantages:
13
Made by Manas Mokashi
Disadvantages:
Internet Banking
Definition: Internet banking is a secure online platform for managing bank accounts through
a website or mobile app. It allows users to conduct transfers, pay bills, and manage accounts
conveniently.
Advantages:
24/7 access
Easy account management
Reduces need for branch visits, saving time and money
Potentially better interest rates
Security of transactions
Disadvantages:
Computers in Medicine
Information Systems: Designed to collect, store, process, distribute, and use information in
healthcare settings, such as accessing patient records and scheduling appointments.
3D Printers: Machines that create three-dimensional objects from digital files, with
applications in medicine including:
Expert Systems
Definition: An expert system mimics human knowledge and experience to solve problems or
answer questions.
Examples:
14
Made by Manas Mokashi
Key Characteristics:
1. Knowledge Base: A database of facts that generates rules for problem-solving and
decision-making.
2. Rule Base: A set of rules or logic applied to the knowledge base for specific
problems.
3. Inference Engine: A program that applies the rules to the knowledge base facts to
solve problems.
4. Interface: A method for users to interact with the system and provide input.
5. Explanation System: Offers reasoning behind decisions or recommendations and
provides a percentage probability of accuracy.
Advantages:
Consistent results
Faster responses
Ability to store copious amounts of data
Unbiased decisions
Disadvantages:
Point of Sale (POS): Terminals that read barcodes for automatic stock control.
EFTPOS: Allows electronic payments through cards and devices, including methods
like Chip and Pin, and contactless payments.
Internet Shopping:
Recognition Systems
Optical Mark Recognition (OMR): Detects marked areas on paper for data collection (e.g.,
multiple-choice exams).
Optical Character Recognition (OCR): Converts printed or handwritten text into digital
format, useful for digitizing documents and reading number plates.
15
Made by Manas Mokashi
RFID: Uses radio waves to identify and track objects, with applications in stock tracking and
identification systems.
NFC: A subset of RFID that allows communication between devices in close proximity,
often used in contactless payments.
Satellite Systems
GPS: A satellite system for tracking exact locations, using orbiting satellites for signal
transmission. It has a wide coverage area but requires a direct line of sight.
GIS: A geographic information system for storing and analyzing geographic data, useful in
various applications such as emergency services and environmental monitoring.
Media Communication
Definition: Involves creating, transmitting, storing, and delivering media content via
satellites. It enables global broadcasting and communication but can be affected by weather
and requires maintenance.
Research Methods
Research methods are techniques used by systems analysts to evaluate the current IT system.
They help identify areas for improvement. The four main research methods include:
1. Observation: Watching users interact with the system to understand its functionality.
o Advantages: Reliable, inexpensive, provides a comprehensive view.
o Disadvantages: Users may alter behavior when observed.
16
Made by Manas Mokashi
Data Flow Diagrams (DFDs) help visualize the system’s inputs, outputs, and processing. A
requirements specification outlines how the new system will function.
Analysts must identify suitable hardware and software, considering factors like compatibility,
cost, functionality, and ease of use, ensuring choices align with user needs.
Testing Strategies
Test strategies ensure that all parts of a system work correctly. Testing involves:
Evaluating data structures, file structures, input/output formats, and validation routines.
Creating a test plan with test data, expected outcomes, actual outcomes, and remedial
actions.
System Implementation
Data Transfer: Moving data from the old system to the new one.
Changeover Methods:
o Direct Changeover: Immediate replacement of the old system with the new one.
o Parallel Running: Both systems operate simultaneously for a period.
o Pilot Running: Implementing the new system in a small, controlled environment.
o Phased Implementation: Gradually replacing parts of the old system.
Documentation
Identify limitations based on these evaluations and recommend improvements to enhance the
system.
17
Made by Manas Mokashi
Email:
Definition: A method for exchanging messages and files over the internet.
Main Uses: Personal communication, professional correspondence, and marketing.
Company Guidelines: Include the purpose of emails, acceptable language, and email
security measures (e.g., anti-virus software).
Acceptable Language: Use professional tone; avoid offensive language, illegal
material, and ensure clear subject lines.
Protect sensitive information with strong passwords, spam filters, and antivirus
software.
Netiquette:
Internet etiquette that emphasizes respect and consideration for others online,
including clear and respectful communication.
Email Groups:
Spam:
The Internet:
18
Made by Manas Mokashi
Social Networks:
Platforms like Facebook and Instagram for users to connect and share content, often
requiring profile creation.
Web Browsers:
Software for locating and displaying web content, featuring bookmarks and history.
URLs:
Search Engines:
Tools for locating web pages related to user queries, functioning through crawling,
indexing, and ranking.
Evaluating Information:
Internet Protocols:
19
Made by Manas Mokashi
Physical Safety
Definition: Physical safety refers to creating a secure environment while using technology,
addressing risks that could lead to severe injury or death.
Common Safety Risks:
o Electrocution: Prevent by keeping liquids away from electrical equipment, ensuring
cables are insulated, and using non-conductive materials.
o Fire Hazards: Avoid overloading sockets by using surge protectors and ensuring
adequate plug availability.
o Equipment Overheating: Ensure proper ventilation, keep flammable materials away
from heat sources, and regularly check for equipment damage.
o Trip Hazards: Secure cables with ties, keep them away from walkways, and consider
wireless devices to minimize cables.
Data Protection
Data Protection Act (DPA): A law that safeguards personal data from misuse, with some
exemptions (e.g., domestic use, law enforcement).
Data Protection Principles:
1. Fair Processing: Clear communication about the purpose of data collection.
2. Specified Purposes: Data must be used only for the purposes initially stated.
3. Adequate and Relevant: Only necessary data should be collected.
4. Accuracy: Data must be kept accurate and updated as needed.
5. Retention: Data should not be kept longer than necessary.
6. Rights Compliance: Individuals must have access to their personal data upon
request.
Personal Data: Any information that can identify an individual (e.g., name, address, date of
birth).
Sensitive Data: A specific category of personal data requiring stricter protection (e.g.,
medical history, racial origin).
E-Safety
Safe IT Practices
Using the Internet: Utilize trusted websites and avoid sharing personal information.
Email Safety: Be cautious with emails from unknown senders and refrain from sharing
personal data.
20
Made by Manas Mokashi
Social Media: Use privacy settings, block/report unwanted contacts, and avoid posting
location details.
Online Gaming: Use anonymous usernames, never share personal or financial information,
and report inappropriate behavior.
Hacking
Phishing
Definition: Phishing is a form of social engineering that involves sending fraudulent emails to
obtain personal information.
Effects: Can result in unauthorized access to personal data, identity theft, and fraudulent
activities on bank accounts.
Prevention:
o Anti-spam filters
o Training staff to recognize fraudulent emails
o User access controls to prevent opening potentially harmful files
Pharming
Definition: Pharming redirects users from legitimate websites to fraudulent ones to steal
sensitive information.
Effects: Can lead to unauthorized access to personal data and identity theft.
Prevention:
o Keep anti-malware software updated
o Regularly check URLs
o Ensure the padlock icon is visible in the browser
Smishing: Involves SMS messages to trick individuals into sharing sensitive information.
Vishing: Involves fraudulent phone calls impersonating legitimate companies.
21
Made by Manas Mokashi
Effects: Can lead to unauthorized access to personal data and identity theft.
Prevention: Similar measures as those for phishing, including awareness and education.
Malware: Software created to harm computer systems, causing issues like file deletion,
corruption, and system slowdown.
Types of Malware:
o Computer Virus: Self-replicating program that can corrupt files.
o Trojan: Disguised as legitimate software, containing harmful code.
o Spyware: Monitors user activities and gathers sensitive information.
Prevention:
o Proper coding practices
o Up-to-date anti-malware software
o Firewalls
o User education
Card Fraud
Threat: Fraudsters gain illegal access to credit/debit cards via shoulder surfing, card cloning,
and keylogging.
Prevention:
o Covering PINs during entry
o Using chip-enabled cards
o Regular anti-virus scans to detect keyloggers
Protection of Data
Secure Storage: Data should be stored in an encrypted format and protected using
authentication.
Methods:
o Biometrics
o Digital certificates
o Secure Socket Layer (SSL)
o Encryption
o Firewalls
o Two-factor authentication
Biometrics
Digital Certificates
22
Made by Manas Mokashi
Contents: Include public key, subject information, issuer information, validity period, and
digital signature.
Definition: A protocol that encrypts data transmitted over the internet to prevent
interception.
Usage: Commonly used to protect online transactions.
Encryption
Definition: The process of converting plain text into ciphered text for secure storage,
utilizing complex algorithms.
Firewall
Definition: A security measure requiring two forms of identification for access, adding an
extra security layer beyond passwords.
Passwords
Definition: Digital locks preventing unauthorized access, often stored as encrypted text.
Security Practices: Strong passwords and regular changes are crucial for security.
Copyright
Definition: Legal protection for intellectual property under the Copyright, Designs & Patents
Act, making unauthorized copying or distribution illegal.
Prohibited Actions: Copying, issuing, or renting original works without permission.
Software Piracy
There are six categories of validation which can be conducted on fields and data
types, these are
o Range check
o Length check
o Type check
o Presence check
o Format check
23
Made by Manas Mokashi
o Check digit
24