Computer Notes
Computer Notes
Function
LO1: Apply knowledge of how
computers function in general
Presented by [N Cekiso-Smith]
Learning Outcome 1 (LO1)
• • Identify different types of computers
• • Understand components and devices
• • Differentiate between software types
• • Explain memory and networks
Types of Computers
• Type | Capacity | Speed | Cost | Users
• Supercomputer | Extremely high | Extremely
fast | Very costly | Scientific research
• Mainframe | Very high | High | Costly | Large
organizations
• Minicomputer | Medium | Moderate |
Moderate | SMEs
• Microcomputer | Low | Varies | Affordable |
Individuals
Core Components of a Computer
• • CPU (Processor)
• • Motherboard
• • RAM
• • Power Supply
• • Hard Drive
Input, Output & Storage Devices
• Input Devices: Keyboard, Mouse, Scanner,
Webcam
• Output Devices: Monitor, Printer, Speakers
• Storage Devices: SSD, HDD, USB Drive, Cloud
Types of Computer Software
• System Software: OS, Utility Programs, Device
Drivers
• Application Software: Word Processors,
Spreadsheets, Browsers
Understanding Memory
• Primary Memory: RAM, ROM
• Secondary Storage: HDD, SSD-
• Solid state drives (SSD) and hard disk drives
(HDD) are data storage devices.
• SSDs store data in flash memory, while HDDs
store data in magnetic disks.
• SSDs are a newer technology that uses silicon's
physical and chemical properties to offer more
storage volume, speed, and efficiency.
• Measurement Units: Bit, Byte, KB, MB, GB, TB
Communication Networks
• LAN: Local Area Network - Small area like an
office
• MAN: Metropolitan Area Network - Covers a
city
• WAN: Wide Area Network - Covers a large
area like the internet
Internet, Intranet, Extranet &
WWW
• Internet: Public global network
• Intranet: Private internal network
• Extranet: Limited access for external partners
• WWW: Web-based services over the Internet
(websites)
Summary of Key Concepts
• • Computer types
• • Main components
• • Devices
• • Software
• • Memory
• • Networks
• • Web-related terms
Let’s Discuss
Not exceed 5pages include references, Tahoma-12,1.5,justify
• ASS-G-1-8
Which computer type or network are you most familiar and what
Share your Healthy and safe computing environment
Contextually differentiate and apply Security tools for data protection in your organization
Describe and discuss Malicious software and viruses and protective ways against
Discuss and explain ways of protecting computers and computing resources in your own
environment
Contextually discuss and assess Security tools used to protect data from fraud,
LO2: Apply the knowledge surrounding health, safety, information privacy, information
security and ethics in society LO2: Apply the knowledge surrounding health, safety,
information privacy, information security and ethics in society
Here are detailed student notes and two essay questions based on Assessment Criterion 1 (AC1):
A healthy and safe computing environment is explained.
1. Definition
A healthy and safe computing environment refers to the proper use of hardware, software, and
physical settings to minimize health risks and injuries, ensure user comfort, and protect equipment
and data.
2. Ergonomics in Computing
• Ergonomics is the design of the workstation to fit the user’s physical needs.
• Correct posture: Sit upright with feet flat, knees at a 90° angle.
• Take frequent breaks (20-20-20 rule: every 20 mins, look 20 feet away for 20 seconds).
• Use ergonomic furniture (adjustable chairs, footrests).
Essay Questions
Essay Question 1:
Discuss the components of a healthy computing environment and explain how ergonomic practices
can help prevent common computer-related health problems. Support your discussion with
examples.
Essay Question 2:
Describe the importance of creating a safe computing environment. Include in your answer the
measures users can take to ensure both physical and digital safety in a computer lab or workspace.
(AC2): Security tools for data protection are identified, differentiated, and applied.
• Antivirus vs Firewall: Antivirus removes threats already in the system. Firewalls block
threats from entering.
• Password Manager vs MFA: Password managers store credentials. MFA adds an extra
security step for authentication.
• Use strong, unique passwords for each account. Avoid sharing them.
Essay Questions
Essay Question 1:
Identify and compare five different security tools used for protecting digital data. Discuss their
specific functions and how they can be applied in a professional or personal computing
environment.
Essay Question 2:
Explain how individuals and organisations can use a combination of security tools to create a
strong data protection strategy. Include examples to show how each tool contributes to overall data
security.
Malicious software, or malware, is any software designed to harm, disrupt, steal, or gain
unauthorized access to computer systems and data. It operates without the user’s informed consent
and poses a threat to both individuals and organizations.
2. Types of Malware
Attaches to clean files or programs and Corrupts files, slows systems, spreads to
Virus
spreads when executed. other devices.
Replicates itself and spreads without user Consumes bandwidth, slows networks,
Worm
action. spreads quickly.
Displays unwanted ads; may track user Slows down computers and invades
Adware
behaviour. privacy.
Rootkits Hides malware from detection tools. Allows hackers full control of a system.
• Unexpected pop-ups.
• Files missing or encrypted.
6. Preventive Measures
Essay Question 1:
Define malicious software and describe the different types of malware. Explain how each type
affects computers and user data, using practical examples.
Essay Question 2:
What is the difference between a virus and other forms of malware? Discuss how malware spreads
and suggest methods to prevent infection on personal or institutional computers.
Protecting these ensures system availability, data integrity, and user privacy.
5. Network Security
• Secure Wi-Fi with strong passwords and WPA3 encryption.
Essay Questions
Essay Question 1:
Describe the different ways computers and computing resources can be protected from physical
damage, cyber threats, and user-related risks. Use real-life examples where possible.
Essay Question 2:
Discuss the importance of combining physical, software, and network security measures to protect
computing resources. Include preventive strategies for both personal and institutional settings.
AC5): Security tools used to protect data from fraud, hackers and other interruptions are
described.
Student Notes: Security Tools for Protecting Data from Fraud, Hackers, and Interruptions
1. Why Data Protection Matters
• Prevents financial fraud, identity theft, and data loss
5. Good Practices
Essay Questions
Essay Question 1:
Describe five security tools that can protect data from fraud, hackers, and other interruptions.
Explain the function of each tool and how it contributes to a secure computing environment.
Essay Question 2:
Explain how organisations can combine different security tools and user practices to defend against
data breaches and service disruptions. Include examples from either business or educational
settings.
1. What is Netiquette?
Netiquette (network etiquette) refers to the set of rules and good manners for respectful and
responsible behaviour when communicating online. It applies to emails, social media, chats,
forums, and virtual classrooms.
2. Importance of Netiquette
Use proper Avoid slang, all caps (shouting), or Improves clarity and shows
language unclear writing. professionalism.
Don’t share someone else’s information Protects others and prevents legal
Respect privacy
or images without consent. issues.
Acknowledge Cite when using other people’s ideas, Avoids plagiarism and builds
sources quotes, or work. credibility.
Essay Questions
Essay Question 1:
Explain what netiquette is and describe six key rules that should be followed in online
communication. Support your answer with real or hypothetical examples.
Essay Question 2:
Discuss why netiquette is important in academic and professional settings. How can following
netiquette help build a positive digital presence and prevent conflict?
CML TUTORIAL 3
LO3: Perform basic computer operations to their field
Topic: AC1 - A Computer is Switched On and Off
1. Switching On a Computer (Booting Process)
• When the power button is pressed, the computer starts the booting process.
• The power supply sends electricity to the motherboard and other components.
• The BIOS (Basic Input/Output System) or UEFI (Unified Extensible Firmware
Interface) initializes.
• BIOS runs the POST (Power-On Self-Test) to check basic hardware (RAM, processor,
storage, keyboard).
• If POST is successful, the bootloader is located in storage (like SSD or HDD).
• The bootloader loads the Operating System (OS) into RAM, allowing the user to
interact with the system.
Example:
When a user presses the power button on a laptop, the Dell logo appears, followed by Windows
11 loading on the screen. This is the process of booting.
2. Types of Booting
• Cold Boot (Hard Boot):
Starting the computer from a completely powered-off state.
o Example: Turning on a desktop in the morning after it was switched off overnight.
• Warm Boot (Soft Boot):
Restarting the computer without turning off the power (using restart command or key
combination like Ctrl + Alt + Del).
o Example: After installing new software that requires restarting the PC.
Topic: AC3 - Different Desktop and Control Panel Components Are Identified
1. Desktop Components
The desktop is the main user interface that appears after logging on. It allows users to interact
with files, folders, and applications.
Key Desktop Components:
• Icons:
Small graphical representations of programs, files, folders, or shortcuts.
Example: Recycle Bin, This PC, Microsoft Word shortcut.
• Taskbar:
A horizontal bar at the bottom of the screen showing open applications, quick launch
icons, system tray, and the clock.
Example: Open applications appear as buttons; the Start button is also here.
• Start Menu (Windows OS):
Provides access to installed applications, settings, power options, and search.
Example: Click Start to find installed programs like Excel or Settings.
• Wallpaper/Background:
The image or color displayed behind desktop icons.
Example: User can set a company logo or personal photo.
• System Tray (Notification Area):
Shows system notifications, time, date, volume control, Wi-Fi status, and antivirus alerts.
4. Practical Examples
• Opening a file: Double-click on the file icon.
• Accessing file options: Right-click on the file to see a menu.
• Selecting multiple items: Hold Ctrl, and left-click on each file.
• Dragging a file: Left-click and hold the file, drag it to a new folder, and release.
Main screen area where icons, files, and Icons like 'This PC,' 'Recycle Bin,'
Desktop
folders appear. or shortcuts.
Horizontal bar (usually at the bottom) Start button, open programs, time
Taskbar
showing open programs and tools. and date.
Located on the right side of the taskbar Volume, battery status, Wi-Fi
System Tray
showing system notifications. signal.
Quick Allows fast access to frequently used Chrome, File Explorer, Email
Launch Bar applications. shortcut.
Window Buttons to minimize, maximize/restore, or The 'X,' '□,' and '_' buttons in the
Controls close a window. upper-right corner.
Allow users to scroll up, down, left, or right Scroll bar on the right of a web
Scroll Bars
in a document or webpage. browser or Word document.
Alt + Tab Keyboard shortcut to switch between Pressing Alt + Tab to move from
(Windows) open applications. browser to PowerPoint.
Multiple desktops Create virtual desktops for different Desktop 1 for work apps; Desktop 2
(Windows) tasks. for entertainment.
Would you also like a simple step-by-step illustrated guide on multitasking using
screenshots?
If yes, say "Yes, multitasking guide."
Here are detailed notes with examples and three essay questions for AC7: A dialog box is
used.
Detailed Notes
Topic: AC7 - Using a Dialog Box
1. What is a Dialog Box?
A dialog box is a small window that appears on the screen to:
• Request user input.
• Provide information.
• Ask the user to make a decision before continuing.
Dialog boxes are part of the Graphical User Interface (GUI).
2. Types of Dialog Boxes
Input Box Allows the user to enter data. Enter your name for a form.
Asks for confirmation before an action "Do you want to delete this file?"
Confirmation Box
is done. [Yes][No]