0% found this document useful (0 votes)
5 views45 pages

Year 9 Summer Main Note

The document explains the distinction between data and information, highlighting that data is raw facts while information is processed data that is meaningful and useful. It discusses the characteristics of information, the storage of data, and various types of computers, including their advantages and disadvantages. Additionally, it covers network devices, cloud computing, and the differences between the internet and intranet.

Uploaded by

tammytgr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views45 pages

Year 9 Summer Main Note

The document explains the distinction between data and information, highlighting that data is raw facts while information is processed data that is meaningful and useful. It discusses the characteristics of information, the storage of data, and various types of computers, including their advantages and disadvantages. Additionally, it covers network devices, cloud computing, and the differences between the internet and intranet.

Uploaded by

tammytgr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 45

Data and Information

Data are raw facts, events, numbers and transactions, which have
been collected, recorded, stored but are not yet processed. Data
consist of numbers and characters (i.e. alphabets and special symbols)
which are used to record facts and events about activities occurring in
an environment.
Information is processed data. It is obtained after subjecting data to a
series of processing operations which convert related groups of data
(raw facts) into a meaningful and coherent form. Processing could
be in the form of addition, subtracting, comparison, sorting,
rearrangement etc. This makes information useful and meaningful. In
other words, information could be defined as the desired form to which
data is finally transformed after undergoing a series of processing
We should know that the main reason why people muddle both terms: data
and information is because they are both dynamic in their state. That is, data
used as input for a computational process may be an output of an earlier
computation performed on the same computer and vice versa.
The Table below shows example of data being used as information and vice
versa.
Operation Data Information
S/N

1
Typing of students Characters like alphabets (A-Z, Set of characters (words)
name, a-z), digits (0-9), or special like Ade, 70, Sola etc.
Matriculation number and scores in characters ( +,-,*,/)
computer science

2
Computation of class average in Each student's test score in The class average score in
computer science computer science Computer science

3
Computation of a school average Each class' average score in The school's average score
score in Computer science Computer science in Computer science
If we study the Table above, we shall realise that information (output),
for a particular computational stage serves as input for the next
operation. For example, the information (set of characters like Ade, 70,
Sola etc) is what will be used as data input in the second operation
(Computation of a class average score in computer science), and the
same logic is applicable to the third operation.
The table below gives some distinctions
between data and information
DATA INFORMATION

1 Data is raw, an unchanged fact Information is an organised and sorted fact

2 It serves as input into the computer system It serves as an output from the computer
system

3 Observation and recording are done to produce Analysis of data are done to obtain
data information

4 Data is the lowest level of knowledge Information is the second level of knowledge

5 Data by itself is not significant Information is significant


Data Conversion Process
The conversion of data to information is represented diagrammatical in the
figure below
General Characteristics of Information
The following are the essential attributes of information for management decisions:

• It must be detailed enough to allow for effective decision


• It must relate to the current situation and have acceptable level of integrity
• It must be easily understood by the recipients. Presentation, in forms of charts,
diagrams and tables may be essential.
• It must be not contain unnecessary repetition
• It must be precise and have an acceptable level of accuracy to the recipient.
• It must be verifiable. Many knowledgeable people acting independently will
produce the same information.
STORAGE OF DATA
Computers run on electricity and therefore uses circuit to store and do
calculation.
Types of Circuits
a. 1 or ON (switch on)
b. 0 or OFF (switch off)
Bit: this is 0 or 1. (Binary Digit). It is the smallest unit of memory measurement.
Byte: 8 bits. It is the standard for measuring quantity of data stored on memory.
A CHARACTER is 8 bits which is a byte.
1000/1024(B) = 1Kb
1000/1024 (Kb) = (1Mb)
1000/1024 (Mb) = (1Gb)
1000/1024 (Tb) = (
Calculation
Memory
Computer System

Computer system is an electronic device use to process data.


Computer does three things
• Helps enter data (INPUT)
• Process the data (PROCESS)
• Result is then shown (OUTPUT)
Benefits of using the computerized system rather
than the paper based system

1. Reports can be generated very quickly


2. Very large amount of information could be store on a small storage
device
3. More than one person can access a particular information at a time
4. Data can be searched and retrieved very quickly
Problems of using the computer

1. Setting up the computer is expensive


2. Training cost for professionals who will use the computer
3. If power goes off the unsaved work goes
4. System failure could lead to loss of sensitive files
5. Computer is garbage in Garbage out
6. Unauthorized users can have access to your file. Like hackers
Types of Computers
Desktop Computers
Desktop usually refers to a general-purpose computer that is made up of a
separate monitor, keyboard, mouse, and processor unit. It is distinguished
from, for example, a laptop computer by the fact that it is made up of
several separate components, which makes it not very portable.
Uses:
1. Personal and business work
2. educational use

3. general entertainment
4. gaming device
Advantages:
1. They are easier and less costly to upgrade and
expand. 2. Spare parts
are standardized, which makes them cheaper.
3. No critical power consumption because they plug into a
wall socket. 4. Due to fixed positions,
they are less likely to be damaged or stolen.
5. As they usually have wired connections,
they have more stable internet access.
Disadvantages:
1. They are not particularly portable because they are made up of separate
components.
2. More complicated because all the components need to be hooked
up by wiring, which also clutters up the desk space.
3. Because they aren’t
portable, files must be copied to another portable storage device to take work
elsewhere.
Mobile Computers
Laptop computer(Or notebook)
refers to a type of computer where the monitor, keyboard, pointing device
and processor are all together in one unit. This makes them extremely
portable. lightweight (to aid portability). Low power consumption (and also
long battery life). Low heat output (cooling is very important).
Uses:
1. Personal and business work
2.
educational use
3. used as a gaming device.

4. general entertainment
Advantages:
1. Portability: all components are in a single unit, so they can be taken
anywhere.
2. Because of one single unit, there are no trailing wires and desk
clutter. 3. take up much less room on a desk,
so they can be easily used in public spaces.
4. portability allows them to take full
advantage of Wi-Fi features.
Disadvantages:
1. portability makes it easier for them to be stolen.
2. limited battery life means the user needs to carry a
charger at all times. 3. keyboards and
pointing devices may be awkward to use.
4. not easy to upgrade, like adding more RAM.
Smartphones

Allow normal phone calls to be made, but also have an operating system (such
as iOS, Android, or Windows), allowing them to run a number of computer
applications (known as apps or applets). Smartphones communicate with the
internet either by using Wi-Fi hot spots or by using 3G/4G/5G mobile phone
networks.
Uses:
1. They allow users to send/receive emails.
2. They allow users to use a number of apps.
3. They allow
users to use a camera feature (to take photos or videos).
4. They allow users to use an MP3/4 player (for music
and videos).
Advantages:
1. very small in size and lightweight, makes them portable.
2. connecting to the internet while on the move.
3. because they use Wi-Fi and mobile phone networks, they can be
used almost anywhere. 4. they have apps which can tell instant location,
which is a feature that isn’t available in either desktops or laptops.
5. they have reasonable
battery life.
Disadvantages:
1. Small screens and keyboards make pages difficult to read.
2. more difficult and slower when typing things in.
3. Web browsing and photography can quickly drain the battery.
4. Memory size in most phones is not very large when compared
to laptops and desktops. 5. Not all website features are compatible
with smartphone operating systems. 6. Because of their small
size, it is much easier to lose a smartphone or for it to be stolen compared to laptops or
desktops.
7. The data transfer rate using mobile phone networks can be slower than with Wi-
Fi.
Tablets

They work similarly to a smartphone. The only main difference is that they
are somewhat bigger in size as compared to a smartphone.
Uses:
1. They allow users to send/receive emails.
2. They allow users to use a number of
apps. 3. They
allow users to use a camera feature (to take photos or videos).
4. They allow users to use an MP3/4 player (for music
and videos).
Advantages of tablets compared
to laptops
1. very fast to switch on (no time delay waiting for the operating system to
load up).
2. fully portable – they are so lightweight that they can be carried
anywhere. 3. touch screen technology means
they are simple to use and don’t need any other input devices.
4. not much heat,
they use solid-state technology.
5. The battery life of a tablet is a lot longer.
6. when the power button is
pressed, it goes into standby but remains connected to the internet so the
user still hears alerts when emails or other ‘events’ are received.
Disadvantages of tablets compared
to laptops
1. tend to be rather expensive when compared to laptops.
2. they often have limited memory/storage when
compared to a laptop.
3. typing on a touch screen can be slow and error prone
compared to a standard keyboard.
4. laptops tend to support more le formats than tablets.
Networks & the E ects of Using Them
Networks

Routers A device that enables data to be sent between different types of


networks. It can be connected through cables or wirelessly to connect a LAN
to the internet. It can be used for:
1. connecting networks and devices to the internet. 2.
storing computer addresses. 3.
Routing data packets.
When a data packet is received, the router checks if the packet is intended
for it or another network. The data packet is routed to the local switch/hub if
it's meant for its network. If not, the data packet is sent to the relevant
router, which sends it to the relevant device.
They consult routing tables to know where to send the data.
Common Network Devices
1. Network Interface Cards (NIC): These are needed to allow a device to connect to a network.
Turns binary
data into an electrical signal that allows network access. Usually integrated into the motherboard.
Each NIC is given a unique hardwired media access control (MAC) address. Media access control
(MAC) address: a number that uniquely identies a device when connected to a network. The rst six
hex digits identify the manufacturer’s code, and the next 6 identify the device’s serial number.
2. Hubs: they are hardware devices that can have several other devices connected to them. They
are used to connect devices together to form a local area network (LAN). It takes a data packet
received by one of its ports and sends it to all relevant or irrelevant devices that are connected to it.
It is not very secure to broadcast data to all devices. Unnecessary network trac.
3. Switches: intelligent hubs. Used to connect devices to form a LAN. Unlike hubs, the switches
store the MAC addresses of all devices on a lookup table. So, it only sends data to the relevant
device. In summary:
Both are used to connect devices in LAN. Both use data packets. Hubs send data to every device on
the network. Switches send data to a relevant device only. Switches have better security. Switches
use lookup tables to determine the destination for a data packet. Switches use MAC addresses for
relevant device locations.
4. Bridges: Devices that connect one LAN to another LAN that use the
same protocol. Unlike routers, they can’t communicate with external
networks, such as the Internet. Comparison:
Bridges connect LANs together; routers connect various types of networks
together. Bridges scan MAC addresses while routers scan the IP addresses.
Both send out data in the form of data packets. Bridges connect networks
with the same protocol; routers can connect networks with dierent
protocols. The router uses routing tables to direct data packets, but
bridges don’t. Bridges have only two ports; routers have multiple ports
Wi-Fi & Bluetooth
Similarities
1. Both are used for wireless communication between devices. 2. They both use
electromagnetic radiation as the carrier of data transmission.
Bluetooth uses:
1. When transferring data between 2 or more devices that are very close together. 2. When the
speed of data transmission isn’t crucial. For low-bandwidth applications.
Wi-Fi uses:
1. Full-scale networks. 2. When
the data transfer rate is crucial. 3. For uses
where a higher range and better security are required.
Differences and similarities:
1. Bluetooth uses a transmission frequency of 2.4 GHz, whereas Wi-Fi uses a 2.4 – 5.0 GHz range.
2. Wi-Fi has a much faster data transfer rate.
3. Wi-Fi has a higher geographical range in which it is
effective. 4. Bluetooth only allows up to 7 devices to be
connected simultaneously, whereas the number of devices connected to a Wi-Fi network depends on the
router/routers used. 5. Bluetooth uses key-matching encryption.
However, Wi-Fi uses WPA (Wi-Fi protected access) and WEP (wireless equivalent privacy).
Cloud Computing
This method is where data is stored on remote servers accessed online.
The three types of cloud storage are:
1. Public Cloud - The customer and the cloud storage provider are dierent
companies.
2. Private Cloud - The customer and the cloud storage provider
are a single organization.
3. Hybrid Cloud - Combines public and private cloud
options and allows sensitive data to remain private while providing public
cloud services for less sensitive information.
Cloud data is duplicated and stored on other servers to ensure availability
during system failures, upgrades, and maintenance.
Advantages:
Services can be scaled up or down according to changing requirements. Cloud
storage eliminates the need for a business to purchase expensive equipment for
infrastructure and maintenance. Readily available globally, allowing both remote
working and data sharing. Providers oer high levels of ensuring that services are
always available. It can oer an almost unlimited amount of storage. A backup of
the data from the cloud will allow full data recovery in case of incidents.
Files can be synced across multiple devices. There is no need to carry storage
devices around.
Disadvantages:
A stable internet connection is always required. Data storage in clouds may be
vulnerable to security breaches. The user depends on the storage provider for
reliability and availability of services. The services may become expensive as the
amount of storage or bandwidth required increases.
Common Network Environments
1. Internet:
The Internet is a very large global network that consists of many other
interconnected networks The World Wide Web is a vast collection of web pages
that can be accessed using a web browser. The World Wide Web allows you to
access information by using the internet
Characteristics:
It is an open network, meaning everyone can access the same resources and
information as everybody else. People from all over the world can communicate
with each other in real-time. Available to anyone who has a suitable device and
access to any one of the interconnected networks.
Uses:
1. Education and training 2.
Social Networking
3. Online shopping
4. Entertainment
Intranet
Usually private and are used to send information securely and safely. Access to an
organization’s Intranet is restricted and only accessible to authorized users such as
employees. Intranets have
many advantages over the internet, such as:
1. Better bandwidth than the internet.
2. Data is kept within the organization.
3.Less chance of hacking and attacks
4. Administrators can manage access to
external sites and links.
Characteristics:
A private network that is accessible to employees within a company or organization.
Usually behind a rewall to ensure security.
Allows for document sharing and the use of collaboration tools between users. It can
be customized to meet the specic requirements of the business. Users will require a
username and password to access the Intranet.
Extranet:
Private Intranet that also allows access by selected parties that reside outside of the
organization. These parties, for example, maybe customers, key stakeholders or clients. Users
will have an authorization level once they have successfully logged in, which will determine
which resources they may access.
Similarities between the Internet, Intranet and extranet are as follows: 1.
They are all web-based technologies
2. They allow users to access information remotely
3. They all use client-server architecture
4. They all use security measures such as authentication and encryption
5. They all promote and facilitate information and resource sharing
Differences between the internet, intranet and extranet are as follows: 1. The
internet is a global network, whereas an intranet/extranet is a private network contained within
an organization 2. The use of the
internet covers a wide range of purposes, whereas an intranet/extranet is designed for specific
users and purposes. 3. Much information is publicly available,
whereas an intranet/extranet is not. 4. The Internet is not owned solely by
one person or organization, whereas the organization usually owns intranets/extranets.
Network Types
1. Local Area Network (LAN): networks usually contained within a single building or small
geographical location. It is made up of hubs and/or switches, which will connect several
devices together. One hub or switch commonly connects to a router, allowing LAN
connectivity to other outside networks such as the Internet.
Advantages:
Allows centralized management of updates, backups and software installations.
 Can secure its devices with the use of firewalls, antivirus software and other security
features to prevent unauthorized access.
 A LAN allows users on the network to share resources such as printers and other
peripherals.
Disadvantages:
The network may not function correctly in case of hardware failure.
They are more prone to attacks than standalone computers.
Data and peripheral accessing can be slow, based on network trac.
 LAN networks require maintenance to ensure the software is up-to-date.
Wireless Local Area Network
Local (WLAN):
Area Networks allow devices to connect wirelessly rather than using physical cables.
Wireless Access Points (WAPs) are connected to an existing wired network, which provides
wireless connectivity. Support a vast range of devices, such as smartphones and laptops, are
very popular in public areas such as shopping malls.
Advantages:
 Allows users to connect anywhere in the range of a Wireless Access Point (WAP).
 They can be used in various indoor and outdoor environments, making them highly exible.
 As the requirements change, additional WAPs can be added relatively easily.
 Printer access can be given to wireless devices.
Disadvantages:
 The strength of their signals can beffected by obstacles such as walls.
 Speeds can be affected by high-traffic areas.
 It can sustain interference from other devices which can affect performance and connectivity.
 Can be vulnerable to security threats due to signal interception.
Wide Area Networks (WAN):
is formed by several LANs connected through a router. It is expensive. However, it comes
with a more enhanced security. Additional hardware is needed for a WAN: Routers,
modems, and proxy servers.
Advantages:
 Provide the ability to connect geographically dispersed locations, such as offices in
different cities or countries.
 Administrators can monitor and manage the network infrastructure from a single
location.
Disadvantages:
 Setting up and maintaining a WAN can be expensive, especially compared to LANs.
 Cover larger distances and rely on public networks or leased lines, which can introduce
latency and affect
 WANs are subject to the reliability and availability of external service providers.
Network Issues and Communication
Connection to a network exposes a user to:
Hacking: Unauthorized access given to the computer. This can lead to
identity theft or the misuse of personal information.
Phishing: Phishing involves getting sensitive information, such as
usernames, passwords, and credit card details, for malicious reasons by
mimicking a reliable webpage on the network
Pharming: This is malicious code installed on a user’s computer or a
web server; the code will redirect the user to a fake website without
their knowledge (the user doesn’t have to take any action, unlike
phishing). Viruses: Program code that replicates (copies itself) to delete
or corrupt files and cause the computer to malfunction
Security and autientication methods
Passwords
It is a common form of security often accompanied by a username or email
address.
There are many ways to enhance the security of your password, such as the
following: Ensure that the password is changed regularly in case it has been
obtained illegally or accidentally Ensure that the password uses a combination
of uppercase, lowercase, numbers and special characters to make the password
more dicult to guess. iloveict is a weak password 1lov3ICT# is a strong password
Anti-spyware software can be run regularly to ensure that your information,
including your password, is not passed to an unauthorized third-party user.
Other Authentication Methods
1. Zero login: A security concept that eliminates traditional login methods, such
as usernames and passwords, using biometrics or other authentication factors
for seamless and password-less access. 2.
Biometric Recognition: These authentication methods use unique physical or
behavioural characteristics, such as ngerprints, iris scans, or voice recognition,
to verify a person's identity.
3. Magnetic Stripes: These are authentication features on cards storing data
magnetically. They enable secure identication and authorization by containing
encoded information that magnetic stripe readers can read.
4. Smart Cards: Smart cards are portable devices with integrated circuits to store and
process data. They are used for authentication, identication, and secure transactions
in various applications such as banking, telecommunications, and access control.
5. Physical
Tokens: It is a type of authentication that takes the shape of a solid object. The user
demonstrates ownership of the token through interaction with a login system. Physical
tokens have embedded clocks that create one-time passwords (OTPs) when a PIN and
other authentication information are entered. 6. Electronic Tokens are applications
that users install on their hardware, such as smartphones. Say a person wants to
access a website on a tablet computer. To access this website, users must first
authenticate themselves using electronic tokens. The user has already set up the
electronic token app with their smartphone. The user launches the app on their
smartphone when the website asks them to verify their identity. The program creates
an OTP that is only good for a short period of time
Anti-malware Software
Anti-malware software is designed to protect devices against viruses and
malicious software. It has 3 primary purposes: detect, prevent and remove
malicious software. It is installed onto a computer system and will operate
in the background.
Standard features of Anti-Malware software include the following:
Comparing the scanned les against an extensive database of known
threats Real-time scanning Regular updates to gather an up-to-date list of
known threats Quarantine of infected les Quarantining les allows threats
to be automatically deleted. Allows the user to determine if the le is a
legitimate threat and not a false positive.
Heuristic Checking: Instead of relying solely on a database of known
viruses, this method looks for behavioural patterns and other features in a
file to identify possible risks
The Effects of Using IT

Microprocessor-Controlled Devices
A microprocessor-driven labour-saving machine enables users to focus on
other activities while the machine completes its work. The second
generation of devices containing microprocessors is more user-friendly and
has more functionality, such as "intelligent tuning" in television sets.
Advantages of microprocessor-controlled labor-saving devices
1. No need to do manual tasks at home
2. More time for leisure activities
3.No need to stay home while chores are being done web-enabled
devices allow devices to be switched on or of while the owner is out
4. Automated burglar alarms give a higher sense of security
and well-being
5. smart fridges and freezers prevent food waste by keeping track of
products’ expiry, availability, etc.
Disadvantages of microprocessor-controlled labor-saving devices:
1. Unhealthy lifestyle due to inactivity caused by devices doing all tasks 2.
Tend to make people lazy 3.
Potential deskilling
4. Any device containing a microprocessor and can
communicate using the internet displays a threat of cybersecurity breaches
General advantages of using a microprocessor-controlled device:
1. Save energy due to being efficient, as well as turning off after inactivity

2. Can be easier 'programming' these devices to perform tasks rather


than turning knobs and pressing buttons manually
General disadvantages of microprocessor-controlled devices:
3. Can be more complex to operate for technophobes
4. leaving devices on standby is wasteful

You might also like