0% found this document useful (0 votes)
114 views40 pages

CAT Theory

The document contains notes for grade 12 computer applications theory. It discusses reasons for using computers, types of computer systems, computer users, and the information processing cycle. It provides detailed explanations and examples for each topic.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views40 pages

CAT Theory

The document contains notes for grade 12 computer applications theory. It discusses reasons for using computers, types of computer systems, computer users, and the information processing cycle. It provides detailed explanations and examples for each topic.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

lOMoARcPSD|28655753

Grade 12 Final Theory Notes By Ms Shongwe

Computer Applications (University of South Africa)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)
lOMoARcPSD|28655753

. Grade 12 Theory Notes

Grade 12 CAT Theory Notes

CAT STUDENT GUIDE


 These notes cover about 95% of the theory content required to be known by a CAT
learner if he/she is going to do well his/her Theory examination
 In addition to these notes a learner must know some of the practical aspects based
on the skills taught from grade 10 to 12 .
 You are kindly advised to read them and then start your revision after you have mas-
tered your theory content.

Studying Top Ten Takeaways


1. Review your notes on a regular basis, combine your textbook notes and
teacher’s notes, and identify what you need help with – well before the
exam
2. Identify as many details about the exam as you can: it's worth, length,
content topics, it's format
3. Have up to date notes!
4. Find a good time and place to study that is free of distractions. Break up
your studying into 45-60 minute chunks with 5-10 minute breaks in be-
tween
5. When you study, don't just read your notes again and again. Instead, ex-
plain the material out loud, teach the material to a friend, do a practice
quiz, and solve problems from past exam papers.
6. Join or create a study group for an exam
7. To help you study, draw diagrams and concept maps to visually represent
the content and show relationships
8. Use Strategies to Help Reduce Forgetting such as Test yourself as you
study and Over-learn the material so that you can't forget it

Term 1
Reasons for using computers
Computers save the following
Time
• Computers work faster than human beings
• Computerised tasks save time.
• Documents can be created quickly with computers than by hand
Labour
• They reduce the labour involved in mentally intensive tasks

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


• They can perform work that would require dangerous to people and repetitive physical
tasks
Paper
• Data can be compiled electronically without using paper.
• People can send documents electronically via email without printing them.
• Customers can fill in forms electronically without the need for paper.
Efficiency
• Computers allow Users get a lot done with little effort.
• 369*computers help to record data and use data efficiently.
• -they do this by help users to work in an organised and competent way.
Accuracy
• Data validation rules and input masks can help accuracy of data entered in computers
Reliability
• They can process data reliably.
• As long as data is entered accurately, computers can produce accurate results /output.
• Computers do not get tired and angry or bored.
GIGO (garbage in, garbage out) principle:
• it means that inaccurate input will result in inaccurate output.
Effects on distance and time
• Computers and networks has helped people and companies to work together.
• Business can be done electronically and Video conferencing reduces the need to travel to
meetings.
• People can easily communicate with each other even if they are far apart
• You can send an e-mail to any part of the world without extra costs.
• Electronic communication is faster than ordinary posting of letters.
• Storing and editing data electronically saves time over paper and pen method
• Video conferencing allows people to communicate as if they are physically closer to each
other when they are far apart. This saves transport costs

Communication costs
• Electronic communication such as email, VOIP and instant messaging is much cheaper
and faster than normal posting and telephones.
• Video conferencing allows people to communicate as if they are physically closer to each
other when they are far apart. This saves transport costs
Global communication using social networks
• Social networks such as Facebook and twitter allow people around the world to share in-
formation irrespective of time and distance.
• Wiki and blogs make communicating information to users very easy
• People can conduct live seminars and workshops over internet via webcams
• These events are called webnars.

Convergence:
• Is the trend where manufacturers offer computing devices with technologies that over-
lap.
• OR Integration of many functionalities in a single device
• Example of convergence are smartphones, Multifunctional printer and tablet.
2

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


Features of smartphones
• Making calls.
• Digital camera.
• Digital video camera.
• Computers: performing functions of computers e.g e-mail facilities, browsing internet etc.
• Media player.
• GPS receivers.
Diagram showing Convergence

Data: unprocessed facts that are not organised in a meaning format


Information: is the meaningful Knowledge that we get when we have organised and processed data
Knowledge: includes facts, information, and skills acquired through experience or education
Types of computer systems

When comparing computers with each other we look at:


 How powerful they are i. The purpose they serve. networks
 Their size:
 The software they use:
 The type of operating system is called platforms.
Computers can be divided into the following groups:

1 Non portable computers


e.g computers
2 portable computers e.g laptops, Notebooks tabletse.tc
Non portable computers:
• they consist of system unit, monitor, mouse and keyboard.
• They are large in size and are not meant to be moved around more powerful than mobile
or portable computers
3

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


Example of Non portable computers: server

• A powerful computer that provides resources and services to all computers that
are linked together in a network
• Software designed to run on a smartphone is called Apps

Computer Users

1. Mobile user
• Is someone who works on a mobile computer.
• Mobile users work with basic applications such as word processing and spreadsheets.
• They rely on long battery life of their mobile devices
• Example of mobile users are Journalists.
2. Single office /small Office /home office.
• They need general entry level computers for basic administration work such as
• Accounting , database
3. Power user
• They have computing needs which require top of the range hardware and software
for their specific needs
• Examples are hard core gamers ,architects, engineers and video editing professionals
• They need faster processors, large amount of RAM, and Large storage capacities on
hard drives
• They use advances functions of their software to complete their tasks

4. Enterprise user
• An enterprise is a company that has hundreds of employees around the country
or world.
• Any employee who uses computers in that enterprise is an enterprise user
5. Personal/casual user
• Are people who do not depends on their computers for too many things .
• They do not spend too much time using their computers .
• They use computers for e-mailing, browsing web, Skype, viewing and sharing photos.
They use basic entry level PCs

Information processing cycle (IPC)

• There are five primary operations performed by computers: input, processing, output,
storage and communication.
• The five operations work together to process data into information. This is called the In-
formation Processing Cycle.

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes

Communication

Communication
- Internet
- E-mail
- Blogs
- Social Networks

Stages of the IPC

Input

• Capturing data into the system using an input device

Processing

• Operations performed on the data to produce information. The CPU is responsible for
processing data.
• The higher the speed of the CPU, the faster the CPU will process data.
• only takes place if software and data is loaded into RAM
• uses a step by step solution (called an algorithm)
• uses data that has been input, creates information that can be output
Output

• Proof that processing has taken place. Information is presented in the required format to
the user using the relevant output device.
• Output can be in form of hardcopy, softcopy, audio or video.

Storage

• Saving data for future use.


• Data and information stored on secondary storage is not lost when the computer is
switched off
• Choose appropriate storage media to use
• Use good backup policies.

Communication

• Computers are able to communicate with other computers and mobile devices to receive
and send information, access information on a shared database or exchange e-mail mes-
sages.

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


• Communication occur in various forms.

Hardware and Software, advantages and disadvantages


Input Devices

• Allows the ICT device to receive data and instructions.


• First step in any information processing system.

Keyboard
Uses Advantages Disadvantages
• Typing in text • Fastest way to enter • Not designed to be used
• Giving commands text with a GUI interface
• Easy to learn and use • Takes up space
• Can be difficult to use for
some people
• Skills required
Factors – buying decisions Problem solving
1 Ergonomic considerations  The keys are sticky: clean it with a damp cloth.
• Buy ergonomically type for Less  Wireless keyboard not responding: batteries are flat. replace
strain on wrists them.
• Make sure keyboard is comfortable to  Wired keyboard not responding: disconnect and re-connect.
use
2 Wireless vs. Cabled
• Cordless keyboards make life easier
without the wires, but more expensive

Mouse
Uses Advantages Disadvantages’ /limitations
• Interact with GUI • Easy-to-learn • Best used with a fixed
• Click, double-click, • Effective way to interact with workplace and suitable
right-click, scroll, drag GUI surface area
• Can be used whilst press- • Better devices for
ing a key on the keyboard drawing or other
graphical actions avail-
able

Factors – buying decisions Problem solving

 Ergonomic considerations • Sticky mouse: remove dust or lint underneath and use a smooth,
 Wireless vs. cabled non-reflective surface.
• Wireless mouse not responding: batteries.
• Wired mouse not responding: disconnect and re-connect.

Touch screen
Uses Advantages Disadvantages
• Replacement for mouse • Functions as both a mouse • On-screen keyboard hard-
• Addition to mouse and and keyboard er to use than a physical
keyboard • Natural input, such as ges- keyboard

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


• Best interface for sys- tures • Some touch screens need
tems with limited op- • Natural interactions, such as extra pressure to work
tions swiping, pinching, expanding • The quality of the ‘touch
• Easy to use, intuitive experience’ depends on
• Increases space available for the OS being used
the display • On-screen keyboards re-
• Increases usability of the de- duce screen display area
vice • Not easy to use for certain
tasks

Touch Pad
Uses Advantages Disadvantages
• Replaces the mouse in • The user does not have to carry • Not as accurate or precise
devices such as lap- an extra device such as a mouse as a mouse
tops • Same actions as mouse, without • Difficult to use with drag
extra surface area or desk and drop operations
• Difficult to use because of
limited size of the touch
pad

Scanner
Uses Advantages Disadvantages
• To capture images • Converts documents into digital • Quality of image depends on
from paper format for storage quality of the original image
• To capture images of • Converts image to editable text • Can be affected by dirt or fin-
text and convert with with OCR gerprints on the glass or dust
OCR to editable text • Converts old film photos into digi- on the sensor
To read barcodes tal format • Works best with single pages
• Benefits environment as less pa- • Books can be difficult to scan
per and ink are used • Can take a lot of time
Scanner-specific advantages
Office Automation POS and database Other uses

• large documents – • Library and Point of Sale • Number plates of cars can
scanned and combined in- (POS) systems as they be scanned and recorded
to a single digital file provide quick and accu- quickly on roads using
• Digital copies saves office rate input e-toll
space • Access control systems
• Scanned copies can be e- ranging from swipe cards
mailed to radio tags
• Older documents can be
archived
Scanner Problem solving
Problem solving
 Errors in image size or quality: check the settings on the scanning software.
 Non-responsive scanner: check if
 it is switched on
 it is plugged in
 it is properly connected to the USB port
 the lock switch is switched off.

Digital Camera
Uses Advantages Disadvantages

• To capture images • Photos in digital format • Photos are easy to lose


• To capture videos • Easy to use along with the device
• Alternative to scanners as • Not expensive to take many • The quality of photos
barcode or QR code read- photographs depends on the quality
7

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


ers if the camera is inte- • You can instantly view them of camera
grated with a smartphone • Doubles up as good video
camera
• Built into devices
• Photos are easy to share

Digital camera
Problem Solving
Resolution Image quality depends on:
 The number of horizontal and  Colour depth – the higher, the better (32 bits is cur-
vertical pixels in the image rently the maximum).
 Minimum of 300 dpi to get  Sensor size – the bigger, the better.
good images for printing
 ISO rating – the camera’s sensitivity to light.
 72 dpi suitable for
on-screen/web display
Webcam
Uses advantages Disadvantages
• Internet video communication • Cheap • Very low resolution -
• ‘Live feeds’ of events • Small - doesn’t create good
• Remote control security cameras • Often built into portable images
computers • Needs to be con-
• Allows for video calls nected to an ICT device
Problem solving where you can see the to work
 If the webcam is unresponsive, check that it is
 plugged in properly
 switched on
 selected as the current camera to be used by the software.
 The webcam software can often be used to test if the webcam is functioning properly and
Microphone
Uses Advantages Disadvantages
• Recording sound • Record dictation • Built-in micro-
• Communicating • Give voice commands phones don’t gen-
• Adds the input of sound to a erally provide high
computer quality sound
• Uses software involving • One needs to have
sound editing, analysis or the ICT device pre-
manipulation sent to record
sounds
• Difficult to use in
noisy environments

Output devices
Monitor or Display
Uses Advantages Disadvantages
• Interactive feedback • Immediate feedback • Quality of the dis-
• Extra visual alerts for hearing • Interaction between the user & play is related to
impaired people computer the size of the mon-
• Displayed content can be easily itor
changed • Size of the monitor
• Text can be enlarged for the limits portability
visually impaired / high contrast • Output is difficult to
can be used share (unless with a
• Display can be changed to suit projector)
the preferences of the user • Image quality can
be affected by am-
bient light

Factors – buying decisions


8

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


Resolution Image quality
• number of horizontal pixels mul-  Colour depth – the higher, the better (32 bits is currently
tiplied by the number of vertical the maximum).
pixels (e.g. 1024 x 768).  Pixel density – a higher pixel density makes the display
crisper, clearer and easier to read.
 Refresh rate – the higher, the better.
 Contrast ratio – the relationship between the darkest
black and the brightest white. Low contrast ratios produce
soft, ‘muddy’ images.
Problem solving

Problem Solution
The colours are faded, too strong or muddy, or the image is too Adjust the settings.
bright or too dim.
The image is ‘blocky’ or stretched. The resolution settings are probably wrong.

The image is tinted purple, blue, yellow or green. The connection is faulty and a pin in the VGA connector is
probably bent.
There is no display. The power is off/not switched on; the connection is not in
properly, the computer is not /cable is not connected.

Speakers and Headphones


Uses Advantages Disadvantages
• Play sound • Headphones – listen to • Sound quality depends
• Provide audible feedback sounds without disturbing on the quality of the pe-
to the user other people around you ripheral
• Provide extra notifica- • Speakers – a group of peo- • To play loud enough for
tions or alerts to people ple can hear sound a group you will need
with visual disabilities • Listen to voice messages or additional audio equip-
interact on Skype using ment, such as an exter-
speakers and headphones nal amplifier
• Headphones make it possi-
ble to use mobile devices on
the go

Problem Solving

If speakers or headphones are  they might be plugged into the wrong jack (e.g. the mi-
unresponsive crophone jack)
 the computer’s sound settings may be low or on mute
 the computer might be set to use the wrong sound out-
put device
 speakers that need power might be switched off or not
be plugged in

Printers

Uses Advantages Disadvantages

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


Laser printer Laser printer Laser printer
Print black and white or • Speed • Expensive to buy
colour documents • High quality text • Not the best for printing good
Inkjet printer • Low running costs quality colour photos
Print black and white or Inkjet printer • Toner is not absorbed by the
colour documents • Cheaper to buy paper
Dot-matrix printer • Best quality photographic Inkjet printer
Most often used as POS printers • Higher running costs
(Point Of Sale) printer for Dot-matrix printer • Slower printing speeds
receipts, invoices, etc. • Cheap • General print quality is not as
• Low running costs good as that of laser printers
• Can create ‘carbon copies’ Dot-matrix printer
• Low print quality

Problem solving
1 The printer is unresponsive 2 Content is incorrect or does 4 Network printer is not
 Not plugged in/ power is not make sense: working:
off  Wrong printer driver is • Network settings for
 Not properly connected. installed printer or computer are
 The wrong printer is se- wrong
lected in the print dia- 3 Poor picture quality
logue box • Ink appears faded or ir-
regular - low on ink or
toner

Factors – buying decisions

1 Speed – pages per minute 3 Resolution – higher 7 System compatibility – can it be used with a
resolution gives specific OS?
2 Colour – separate car- better image 8 Wireless capability - built-in wireless func-
tridges for colours are bet- 4 Cost per page tionality, Bluetooth, Ethernet port.
ter 9 Mobility – not generally mobile.
5 Paper – type of paper
for high quality
printouts. LCD Projector
Uses Advantages Disadvantages
To project a large image of Allows the display to be • Quality and clarity of not as good as
the display onto a surface to viewed by a large group high quality display monitors
share it with a large audi- of people • The lower contrast ratios result in
ence muddier images
• Normally limited to a 4:3 aspect ratio

Storage Devices
Other examples(optical storage devices )
......................................................................
......................................................................
......................................................................

Hard drive
It is sometimes called the secondary memory of the computer

10

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


Uses Advantages Disadvantages
• To store data and • Larger capacity • Easy to damage
software perma- than RAM • Comparatively slow – operates on a magnetic and
nently • Cheaper per GB mechanical basis
• Make backup copies than RAM
of data and soft- • Store data and
ware programs
• Act as ‘virtual
memory’
Problem solving Looking after the hard drive

1 Slow and unresponsive sys- 1 Empty the recycle bin


tem 2 Use of Disk clean-up utility
• Disk may be fragmented. It creates more space on the hard drive by
removing
2 Use a disk defragmentation • Temporary files downloaded from the
utility to internet
• re-arrange the files • Delete files and folders permanently
• to place scattered parts in- from the recycle bin
to whole chunks • Temporary files created by windows
• for faster access to the • Components of windows which are no
files. longer in use
• Installed programs that you no longer
use
3 uninstall unwanted programs

External Hard drives


Uses Advantages Disadvantages
• Store and carry media, data • Large capacity • Not physically as small as a
and software around with • Portability flash drive
you • Ease of use • As vulnerable as hard drives
• Store backups safely, away • High speed and can be damaged easily
from the computer • Reliability because they are mechanical
• Add extra storage to the and magnetic
computer, without physically
opening the computer
Types of External hard drives
2.5" external hard drives do not re- 3.5” external hard drives they do require a
quire a separate power supply as they separate power supply to work.
are powered by the USB port that
they are connected to
Flash drive
Uses Advantages Disadvantages
• To carry data and software • Portability • Easy to lose
around with you • Fast data access • More expensive per GB than
• To make backups • Cheap hard drives
• To distribute data and soft- • Larger capacities than optical me- • Lower capacities than newer
ware dia hard drives
• Industry-standard use • A limited life span in terms of
• Reliability how many times data can be
• Ease of use (in terms of adding and saved on them
deleting files)
• No need for a power source

Optical media (CDs/DVDs)


Uses Advantages Disadvantages
• To distribute software • Cheap • Slow
• To distribute content such as • Portable • Easily damaged
11

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


movies and music • Industry-standard use • Relatively small capacity (700 MB for a
• Back up CD, 4.7 to 9.4 GB for a DVD)
• Not as easy or intuitive to write to as
flash disks
• Some machines like Netbooks do not
have optical drives built-in

Problem solving
1 Often fail or experience problems 2 Easily damaged and 3 Writeable and re-writeable discs are easi-
because they get dirty. scratched. ly damaged by heat or cold.
 Clean a disc by wiping it Difficult to repair. You Nothing can be done to fix this damage.
with a soft damp cloth. usually have to re-
place it.

SSD (Solid State Drive)


• Much faster than normal hard drives. (advantage )
• No moving parts – can’t be damaged by being dropped or moved whilst in use(advantage).
• Much more energy-efficient, durable and run quieter than traditional (mechanical) hard drives.(Advantage)
• Much more expensive and have smaller capacities than traditional hard drives. (Disadvantages)
• Sizes range from 8 GB to 750 GB (in early 2013), but sizes are increasing rapidly.

Communication Devices
3G Modem
uses Advantages Disadvantages
• Can access the Internet wher- • Easy to install and use (use USB • Can get lost or stolen fairly easily
ever there is cell phone recep- port) • Not always as reliable as a fixed
tion • Small enough to take with you line connection
for Internet access on any com- • 3G Internet connection depends
puter on the coverage and strength of
• The 3G/4G network is fast the 3G signal

ADSL modem/router
Uses Advantages Disadvantages
• A digital link to the telephone • You can make and receive • Needs specialised equipment in-
company’s network phone calls and be connected stalled at the telephone ex-
• Includes the functionality of a to the Internet at the same time change, better suited for urban
small switch, wireless (WiFi) • Cheaper connections to the In- areas
connectivity and a router ternet than 3G • Speed drops the further the fur-
• A router is a device that con- • More stable as it does not de- ther you are away from the tele-
nects two different networks pend on things like cellphone phone exchange
to each other. reception • Designed for fast downloads and
• a switch acts as a central con- • Allows wireless connection to slower uploads
nection point in a network so router to share an Internet
that devices can be able to connection
communicate

Buying a computer

Some general considerations when buying computers:


 Need to be mobile?  Current standard specifications • Always buy the best product that your
 Hardware specifications of for an entry-level and a more budget will allow -
the software you want to advanced computer in the cate- • RAM installed, the size of storage and
use gory you are considering type of processor will determine the
12

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


 A legal operating system pro- performance of the computer
vided?

Buying a computer – system unit (CPU or processor)


• Responsible for running pro- • Multiple cores (e.g. quad-core) – like Standard entry-level processor should be
grams and processing data having more than one processor on sufficient for personal users, SOHO users and
• Speed’ – measured in Giga- the chip mobile users
hertz (GHz) /Meghertz • Brand name (AMD or Intel) and Power users – the best CPU they can afford
model (such as Intel i7) can also be
used to identify the processor in an
advert

Buying a computer – system unit (Memory (RAM)


Temporary storage area for data and • If you use more than 4 GB of RAM, • For any user the more memory that
programs that are being processed you will need to make sure that you you have installed, the better.
(volatile). are using a 64-bit version of an op- • Power users working with programs
RAM can also be identified by terms erating system, otherwise you won’t such as those used for video editing
such as DIMMS, DDR3 or DDR-4 RAM. be able to access the entire amount will definitely require more
of RAM you have. memory.

Buying a computer – system unit (Hard Disk Drive (HDD)


• The main, permanent storage • Besides the capacity, hard drives • Most users will almost never fill the default
area for all your data and soft- can be identified in adverts by hard drive size PC.
ware terms such as SATA and the • Power users may need to install a series of
speed at it which rotates, meas- hard drives that act as one unit, which is
• A special computer, such a file ured in RPM. sometimes referred to as RAID technology
server in a network, will have a • Solid State Drives (SSDs) use
number of large hard drives, be- technology that is similar to flash
cause it has to store all the users’ memory.
files.

Buying a computer – system unit(DVD Drive)


• An optical drive that can play, • DVD drives – less important • Often listed as a multi-drives – they read and
read and write CDs and DVDs than they were in the past. write (or burn) DVDs and CDs.
• Flash drives, external hard
drives and even the Internet
are used to transfer and back
up information.

Buying a computer – system unit (port)


• Used to connect external devices • Most computers will have a • While WiFi is not technically a port, many
to the computer. network port to connect to a computers now have built-in support for WiFi.
• Most devices can connect to a cabled network.
USB port. • Modern computers might also
have a FireWire or Thunder-
bolt port for high speed data
and video connections.

Buying a computer – peripherals or devices that connect to the computer(Monitor)


• The most common output device • The popularity of tablets and • Power users such as gamers, video editors,
for soft copy output smartphones has led to a lot photographers and architects often need
• For most users an entry-level more applications (even Win- larger displays, or they might even connect
monitor will do just fine. dows 8) which are designed to multiple monitors.
work well with touch screens.

Buying a computer – peripherals or devices that connect to the computer(Printer)


13

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


• Used to produce hard copy out- • Type of printer – factors such as • A SOHO or even a personal user – consider a
put – laser, ink-jet and dot-matrix running costs, speed, the print multi-function printer
printers quality (dpi) and wireless con- • Mobile user may want a mobile printer that
nection works with batteries

Buying a computer – peripherals or devices that connect to the computer(External (portable) storage)
• Storage devices that connect to • All users can use external hard • SOHO and power users usually have a need
the computer drives as storage for music and for a large external storage device.
• For most personal users a flash videos and to back up.
disk is the quickest and simplest • All users find cloud storage use-
way to transfer data and even ful.
make some measure of backup.

Buying a computer – peripherals or devices that connect to the computer(Scanner)


• Image scanners: capture an image • Personal users will seldom need a • SOHO or power user who needs to scan doc-
of whatever is placed in the scan- scanner – uments and convert them into editable text
ner Barcode scanners: read bar- • they can just as easily photograph needs a good quality scanner and an OCR pro-
codes the image as scan it. gram.
• SOHO or power user who runs a business that
deals with images or photos – probably a good
idea to get a good quality scanner.

Buying a computer – peripherals or devices that connect to the computer


Visually impaired / Blind Hearing impaired / Deaf Motor control (paralysed / poor motor control /
arthritic / etc.)

• Braille keyboard and Braille • Vibration devices • Eye tracking devices


‘display’ • Head movement devices
• Magnification devices • Large key (outsized) keyboards
• Large-key keyboards • Large trackballs
• Braille printers • Joysticks
• Foot pedal control devices
• Sip and puff devices

The value of ICT


Efficiency, productivity accuracy
Getting things done with less What you get done in a Ensuring that there are no errors in in-
cost and effort. specific amount of time put or output.
for a specific cost (we are
focused on increasing
productivity, which means
getting more stuff done in
the same amount of time
and for the same cost
Efficiency, productivity and accuracy – choice of hardware

Typing in text or data the Video editing Converting existing docu-


whole day (as done by a typ- ments to digital format
ist, writer or data capture)

 Good quality ergonomic keyboard • Largest, fastest  Automatic sheet feeding scanner
possible HDD
• Min 8 GB RAM, if

14

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


possible more
• TWO monitors

Selling products at a till and


Competitive gaming Digital artist
stocktaking
Gaming mouse Pressure sensitive drawing tablet Barcode scanner

Accessibility
 ICT makes knowledge and resources accessible to all kinds of people all over the world.

Remote surgery Data/information access using the Internet Distance education

Cellphone banking such as Making computers more accessible for disabled


M-Pesa users

New technology
What is really important to understand about new technology is the following:
 It will be smaller, cheaper,  It will be designed to be mobile.  It will be designed to be
faster and more powerful  The battery life should be longer than constantly connected and
than what we have today. today. communicating.
 It will use more and more It will combine new tech-
sensors. nologies to allow easier
and more effective input
and output

Software

Choosing the right software


The purpose of the software Web-based applications vs. installed applications
• Many applications available Advantages of web-based applications Disadvantages
• Often basic software could be adequate
• Sometimes you may need more advanced pro- • Use the software from any com- • Software might not have all
grams puter / mobile device anywhere in the features/ capabilities of
the world (with Internet connec- traditional ‘desktop’ versions.
tion). • Cannot work with the soft-
• Software always up-to-date. ware if you do not have an In-
• Don’t have to download or install ternet connection.
application – saves storage space.

Web-based applications – examples


Google Calendar Office 360/365 and Google Drive • Facebook apps

Create and schedule events. Web-based office suites from Mi- Apps (applications) that are writ-
These schedules can be shared. crosoft and Google respectively. ten especially to work within
Add a location via Google Maps. Create, edit and store documents, Facebook

15

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


spreadsheet and presentations on
the Web.

Advantages of web based applications Disadvantages of web based applications


 Can lose access to your critical data (internet outage, vendor
 It is generally free to use. downtime, etc.)
 It does not need to be installed  Slower data entry
on the local hard drive, and  Someone else holds and controls your data
therefore, it saves space. 
 It is easier to share and
collaborate on documents.
 You can access your documents
in any location where you have
Internet access (including on mobile devices).

Installed Software
Advantages Disadvantages
 Never lose access to your data  Not easily accessible everywhere, but can be done with re-
 No internet required mote desktop
 Faster data entry, reporting, etc…  Must be installed on each computer
 Can be customized to meet your specific  You must make your own backups
needs
 You own and control your own data
 Less expensive over time

Adobe Photoshop Express Compatibility


• Web-based image editing app from Adobe Software compatibility: - Compatibility with the operating system
• can be used to edit photos on blogs and social  Compatibility between versions of the same application
networking sites directly.  One can usually save files in older formats for compatibility
(e.g. by using the Save As option).

System requirements
• Minimum or recommended requirements. Software Minimum and recommended
• E.g. Photoshop system requirement

Minimum requirements are those need-


Processor Intel Pentium 4 or AMD Athlon 64 processor
ed to load and run the program, but
these will not guarantee good perfor-
Memory 1 GB of RAM mance.

Disk space 1 GB of available hard disk space is necessary Recommended specifications are the
higher requirements or specifications
DVD-ROM drive The DVD-ROM drive is used to install the software needed in order for the software to run
efficiently and smoothly.
Graphics require- 1024 x 768 display (1280 x 800 recommended)
ments 256 MB of video RAM

Operating system Microsoft Windows XP with Service Pack 3,

Windows Vista Home Premium


(Service Pack 2 recommended), or Windows 7 or 8

Application software
Common applications

16

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


Office suite: is a collection of productivi- Word processing – create, edit, Spreadsheet – budgeting, financial
ty/application programs distributed together as format or work with a document. and business planning, analysis.
one unit

Advantages of office suites Presentation – creating slides to get Database – collect, store, search,
 It is often cheaper than purchasing each your message across to an audi- filter and report on data.
program individually. ence.
 Easier to install one single package and
keep it updated.
 Similar interface in all programs makes it
easier to ‘learn’ and work with.
 They are designed to be able to swop
and share data.

Productivity software for the mobile user


• Lightweight versions of productivity • Apple’s mobile versions Office suites for mobile devices.
software for mobile devices. • Pages (word processor)
• Quick office and Documents To Go • Numbers (spreadsheet)
• Keynote (presentation soft-
ware)

Reference Software Web browsers E-mail software


• The Web much easier to use; mostly more up to Application that allows a user to  Basic e-mail software – receive
date than a CD/DVD. view and display web pages . mail, read it, reply to it and create
• Reference software has become very unpopular on • searching for information your own messages.
desktops and laptops; making a re-appearance on • interacting socially with friends by  Complex e-mail software, such as
mobile devices. using social networking sites Outlook – includes a database of
• using browsers in business and contacts, a to-do list and a calen-
commerce dar function
• providing entertainment
• running web-based applications

Document management software – using the PDF Software that enhances accessibility, efficiency and
productivity
• Create your document using Voice recognition software
whatever software you want to use. • Voice recognition – the ability to talk to the computer
• Then create a PDF file by and for it to ‘understand’ you.
• using the Save As option
• using PDF creation software Advantages Disadvantages
• You can send it to anyone and they will
• Allows disabled users to •
Have to invest a lot of time and ef-
see the document the way you created
control a computer by fort to train the computer to rec-
it (even if they do not have the soft-
verbalising instructions. ognise your voice.
ware used to create the original docu-
• Enter text by dictating it • Background noise and a poor quali-
ment).
rather than typing it. ty microphone can have a serious
• Situations where you impact on the effectiveness.
can’t afford the distrac- • Need a good quality, high-speed In-
tion of looking at a ternet connection for voice recog-
screen and typing nition packages that make use of
servers on the Internet.
Software that enhances accessibility, efficiency and productivity
Voice recognition on computer Voice recognition on Note-taking software
smartphones and tablets • Allows you to mix text images, links
• Dragon Dictate series by Nuance soft- • You can TELL your to web pages and sound bites, etc.
ware. smartphone or tablet to do • You can record a session that you
• Some operating systems now include simple things like make ap- are taking notes in and it will syn-
dictation voice recognition that works pointments, write SMS mes- chronise the notes that you write
in any software where you enter text. sages, search the Web and with the recording.
17

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


get weather updates. • Examples: OneNote, Evernote
• Using this software depends Note-taking software: features to look for – it
on a good Internet (3G) con- can
nection. • make handwritten notes
• Two popular examples: Siri • use handwriting recognition to
and Dragon Mobile Assistant. convert handwritten notes to typed
text
• use sound recording and synchroni-
sation
• insert sketches, pictures) and links
or web pages
• use OCR software on text in images
• search for items in notes, even if
they are handwritten or if they are
the text in photos
• order and arrange your notes
• synchronise between devices

Education or training software Fixing software problems

Advantages: Basic troubleshooting 2 Read-only files


• Work at your own pace. 1 ‘Freezing’ – non-responsive • A file may appear as read-only when you
• Immediately assessed and given tasks or programs load it from a read-only location, such as
feedback. • The software seems to a DVD.
• Motivated to learn by the immediate ‘freeze’ and become Copy the file to another location and
feedback and competition against non-responsive. remove the read-only property or save it
yourself and others. • The rest of the system under a different file name.
works fine.
Close the ‘frozen’ application by
pressing Ctrl+Alt+Delete to force
it to shut down.

When Software ‘crash’ Bugs – why we need to keep • Two common ways of fixing bugs in soft-
 Reboot your system and try again. software updated ware:
 Run the problem software with no • Any software will initially have • A patch is an update that can be down-
other programs running. bugs in it. These are not virus- loaded to fix a specific bug in your soft-
 Make sure your software is up to es, but are ‘mistakes’ or errors ware.
date. that were introduced when • A service pack is a release of corrections
 Check the online forums and help the programmers wrote the and new features since the release of
system. system. the original software.
 Inform the company’s support of the • • Most programs allow you to download
problem updates from the website of the vendor.

User-centred design(UCD)
Layout Font and colour Use of instructions and
Layout
graphics
• Don’t put too much on a single • Appropriate colour combi- • Use simple concise language
page, slide, etc. nations • Use commonly known icons
• Group related items together • No distracting colours and • Use clear graphs, diagrams and
• Use ‘white space’ fonts tables
• Use clear labels and headings • Legible text sizes
• Consistency • Use formatting to empha-
size important concepts

18

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes

User-centred design
Some steps to include in the process of user- Advantages of UCD Disadvantages of User Centered Design
centred design:  More effective and safer  User-centric design is expensive
• Put the needs of the user first. products  Difficulty to translate certain types of
• Create a sample interface. Get real users  Users feel sense of owner- data into design
to use it and comment on it. ship in products  Products takes more time
• Go back and make changes. Then test  There is less of a require-  Item may be too complicated and
again. Repeat this until the final product ment to redesign and inte- specific for public use leading to be-
is as good as it can get. grate products into the coming more expensive
environment
 More assistance in users
expectation of products

Computer Management
System software and computer management
What happens when a computer is switched on The role of the operating system
1 Computer looks for instructions to fol-
low (on ROM) Provides user Managing Managing
interface: programs: hardware:
2 Instructions perform some basic hard-
ware tests(BIOS) • To allow us to • Manage • Disk man-
interact with which pro- agement
3 Find the operating system
the computer grams and • Memory
4 Load operating system into memory - via a GUI tasks can manage-
control of the computer handed over to use the CPU ment
operating system Providing basic securi- •
ty:
5 Process of loading the operating system Multitasking: ability of the
is called booting the computer • User and password operating system to load and
control
• Basic protection process multiple tasks at the

Common file types and extensions


JPEG, BMP, GIF, WMF, TIF, PNG • DOCX, XLXS, PPTX, AC- • MP3, MP4, WAV, CDA, WMA

Graphic file

Created by a graphics program CDB Created by any media player


or • Word processing program
it can be inserted into a file by (Word), spreadsheets They require a lot of storage
Office files

Audio files

most programs such as MS- (Excel), presentations space on a hard drive


Word (PowerPoint) and data-
bases (Access)

• MPEG, ASF, WMV, AVI • TXT • RTF


files
Rich text format

• Created by any media • Similar to word • Allows basic formatting to be


Video files

player program. processing files, except applied and saved. Can be


They require too much stor- that no fonts, styles, opened in any word processor
Text file

age space on the hard drive colours or formatting is or a utility like WordPad
saved

• EXE or COM • PDF • ZIP or RAR


• • •
Portable document

Actual programs, not Used to distribute Compressed to save


data files, that run (or document files, space. The files in a com-
Compressed

pressed or ‘zipped’ folder


Program Files

/zipped file

execute) when read by free utili-


opened ty program, can- have to be decompressed
not be edited. or ‘unzipped’ in order to
format

open and use them

19

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes

Term 2 Theory Notes .Network Technologies .


The Internet

A worldwide computer network that consists of computers and networks that are linked using telephone lines,
undersea cables, satellite and microwave connections for the purpose of communicating and sharing re-
sources.it is a good example of Wide area network

WAN: is a wide area network set up to facilitate communication and the transfer of files over a wide geo-
graphical area

Internet Service Provider(ISP)

a company that has a permanent, fast connection to the Internet and sell access and services for a monthly fee

ISPs offer the following services

Criteria to consider when choosing a type of Internet connection.


• Mobility
• Speed of the line /connection
• Cap-amount of data that can be used for uploading / downloading in a given period of
time usually a month .
• Shaped /unshaped –Shaped means certain internet services are given high priority than
others .
Unshaped-they have equal priority.
Broadband: a high speed permanent internet connection

Wired versus wireless connections


 Wired connections – ADSL
A permanent digital connection to the Internet that operates through a fixed landline

 More bandwidth for downloading than uploading.

Wired connections – ADSL


Cost of Internet connection includes a monthly ISP cost and a fixed monthly cost for the line rental.
20

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


Advantages
 Make phone calls on your landline and use the line for Internet access at the same time.
 A permanent connection which is always on.
 Includes Wi-Fi connectivity.
Disadvantages
 ADSL may not be available in your area.
 Data speed may be limited by your physical location.
 Not a mobile solution
Modem / router
 Data Terminating Devices that use different technologies to send and receive data over different media.

Wireless connections – Dedicated WiFi technology (e.g. iBurst or Neotel)

 You can only access this type of network using a modem supplied by the company.
 Coverage is limited to where the company has placed radio towers.
Wireless connections – The existing cellular technology (3G/4G)
 These technologies are implemented by a cellular communications company (for example, Vodacom,
MTN, 8ta and Cell C) using their existing infrastructure.
Advantages
 Mobile access 24/7 to the Internet from anywhere in the world.
 Use smartphone or tablet to access the Internet.
 No cables to connect to the Internet.
Disadvantages and limitations
 Limited or slow access if in area with poor coverage.
 No cables to connect to the Internet.
 Never escape communication (such as e-mail and browsing).
 Online privacy or security could be an issue
Wi-Fi.
A way of connecting to an existing Internet connection (e.g. an ADSL connection) wirelessly.
 Multiple devices can connect to a single Wi-Fi access point.
 Wi-Fi can provide faster data at a lower cost than if you access the Internet using a 3G connection.
 Wi-Fi connection at home: mobile devices use cheaper faster data; devices detect Wi-Fi automatically.
 Public Wi-Fi (Hotspots or access points): restaurants, hotels, airports and shopping malls provide Wi-Fi
connectivity as a service.
 Hotspot’ or an ‘access point’.
 Protected by a password.
 Public Wi-Fi can be free or charged per hour.
 Efficient if you are using a laptop and don’t have a 3G modem.
Internet access using smartphones and tablets
People prefer data communication that is as follows:
 Always on and everywhere
 Fast and reliable
 A hassle‑ free connection
People expect their mobile devices:
 To be ‘always on’
 To be always connected
 To tell you when you are being communicated with via phone, SMS, instant messaging, e-mail or even
through services such as VoIP.
How does it work?
 Most mobile devices have built-in 3G cellular technology and the hardware to connect to any standard
Wi-Fi network.
 Connect to the Internet using cellular technology whenever there is a cellphone signal available.
 Automatically switch over to a Wi-Fi connection whenever one is available because Wi-Fi data is usually
faster and cheaper than cellular data
Internet services
Real‑ time messaging: is a type of online chat in which users communicate directly with each other trans-
mission over the Internet without any delay
 IM (Instant Messaging) and chat
21

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


 Mxit, BBM (BlackBerry Messenger Services) and WhatsApp and online applications such as Google
Chat, IM facility in Facebook.
Advantages
 Cost effective.
 Chat in real‑ time with more than one person at a time.
 Indicate if available to ‘chat’.
 Some applications can be used on a variety of operating systems.
Disadvantages and limitations
 Leads to anti‑ social behaviour.
 Creates opportunities for cyber‑ stalking, cyber‑ bullying and identity theft, etc.
 No control to ensure that people are who they claim to be.
VoIP
 Protocol that allows telephone calls to be made over LANs, WANs and the Internet.
 Voice is transmitted on a network in the same way in which data is transmitted.
 Conference call technology.
Advantages
 VoIP calls are cheaper than normal phone calls.
 The software is generally free.
 VoIP allows you to transfer files, as well as make video conference calls.
Disadvantages
 Need an Internet connection; both users need to use the same software.
 Need to purchase credits to call phones that are not on the Internet.
 Call quality may be poor if you have a slow Internet connection.
 You can quickly use up your data cap, especially when using video
Good practices when using VoIP software such as Skype

 Check times zones before calling someone in another country.


 Only use video when necessary.
 Use decent headset and microphone.
 Pay attention to your contact’s status
Video conferencing
 Video conferencing is an application that allows two or more people to hold online conferences at dif-
ferent locations using a computer network to transmit audio and video as if they were all in the same
room

Advantages of video conferencing


 People you are communicating with are visible.
 Cheaper than normal phone calls or travelling to a meeting.
 Meetings can be arranged in a short time
Disadvantages of video conferencing
 You need a fast Internet connection.
 You use a lot of data (cap) especially when using video.

Good practices when video conferencing


 Work in a well-lit location.
 Make sure what your camera can ‘see’.
 Test the sound and video before you make the call.
Cloud computing
The sharing of resources offered as services over the Internet
 The online storage of files
 The use of programs that run on servers on the Internet (you see the interface to the software in your
web browser and use the software as if it is running on your computer)

22

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes

Advantages
 Software is always up‑ to‑ date.
 Don’t have to download or install any software.
 Can use the software and access your data anywhere in the world as long as you have an In-
ternet connection.
 Does not take up space on your local computer.
 Server may be more powerful than your own CPU.
 Can share documents with other users.
 Documents automatically get backed up by the system.

Disadvantages and limitations


 Can only be used effectively if you have a fast, reliable Internet connection.
 No longer have full control over the security of your data or backup.
 May have to pay a monthly fee.
 Software might not have all the features or capabilities of desktop software.
 Might run slower, depending on the speed of your Internet connection.

File sharing – e-mail attachments


 Inexpensive way to transfer files, relatively fast method.
 But: not suitable for large files, some e-mail systems block some file extensions, not always
secure, restrictions on the number of recipients, have to send to each recipient.
File sharing – File Transfer Protocol (FTP)
 A protocol used for the fast and easy transfer of files between remote computers that have an
Internet connection.
 Files uploaded to FTP server, users download from FTP server.

Advantages
 Large files can be transferred easily.
 Security can be maintained by using a username and password.
 Transfer of a file can be scheduled for time when network is not so busy.
 Disadvantages and limitations
 People do not know how to use FTP.
 Connections can be interrupted.
 Not all companies have FTP servers.
 FTP can be quite technical – people prefer drag and drop facilities.
File sharing – Online storage: keeping your data in the cloud. e.g

Advantages
 An a simple, cost‑ effective method to share and transfer files.
23

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


 File extensions are not blocked.
 The system backs up the files.
 You can save space on your local hard drive.
 You can use these systems to synchronise (‘sync’) your files.
 Disadvantages and limitations
 The amount of space allocated for saving files is quite small for free usage.
 The people you have shared folders with or given access to these files can remove the files by
mistake.
Grid computing
 A system whereby the resources of different computers are shared and used at the same time
to solve a single problem.
 Uses distributed processing where the processing that is necessary to solve a problem is dis-
tributed amongst computers, which increases the total processing power.
 Used for scientific or technical applications that require large amounts of data to be pro-
cessed, or high processing power.
 Examples
 A scientist studying scientific concepts has the ability to use an entire network of computers in
order to analyse data.
 A businessman has the ability to access an entire network of computers in order to forecast
the growth of particular stock

 Advantages
 Offers a cost‑ effective solution and the ability to use many resources.
 Provides a method to solve problems that need an enormous amount of processing power.
 Saves both money and resources by utilising the power of ‘idle’ computers.

 Disadvantages and limitations


 A fast network connection between the computers and networks is necessary.
 The computers that are used may not be fast enough or might be slowed down.
 The computers may be affected by malware infections.
Government Internet services
Examples

Advantages
 Improved communication.
 Better access to services.
 No long queues or long travel distances.
 Immediate feedback.
 Up-to-date information and documents.
 Increased efficiency and lower costs.
 Smartphones can access many sites and services.
 Need for hard copies is reduced – green computing
Obstacles
24

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


 The Digital Divide.
 The initial cost.
 Concerns about the security, privacy and use of information.
 You’re at the ‘mercy of technology’.
 Blame technology for what might actually be human error.
 Two systems need to be maintained – the traditional ‘manual’ system and the electronic ‘self-
service’ system

Social Implications

social implications .computer crime


Types of theft.
Hardware theft. Software theft Information theft
It means stealing computer It takes 3 forms Refers to the theft of personal or
equipment.  Someone steals software confidential information such as
Mobile devices are at high risk media credit cards numbers etc.
because of their size and  Software Piracy  Information transmitted over
weight that allows them to be  Intentionally erase programs network poses a high degree
packed into pockets and bags Case 1 of risk because it can be in-
easily. Software not stored in secured tercepted during transmis-
Laptops of executives are at locations are stolen away. sion.
risk because of the software and Hardware containing the soft-  Protection against information
confidential information they ware can steal. theft.
contain .  Implement identification and
Case 2 authentication systems such as
Protection against hardware Discontented or disgruntled em- the use of usernames and
theft: ployees may remove the soft- passwords.
ware they have written for the  Use encryption or coding to
 .use motion sensors company. protect sensitive information.
 Lock computer rooms They may pose a sabotage Encryption is the process of con-
 Install CTV cameras threat to the company data and verting readable characters into
 Use biometric security to ac- networks . unreadable characters to prevent
cess computer rooms unauthorized access.
Identity theft. Case 3 Use digital signatures.
It is the process in which a crim- Pirated software is distributed Digital signature : is an encrypted
inal uses the identity of a person for money or malicious reasons code that a person ,website or
dishonestly. Software piracy has the following company attaches to an electron-
To prevent identity theft negative effects on the end-user. ic message to verify their identi-
 Use caution when giving out  No access to technical sup- ty.
personal information. port
 Protect your personal mail and  No upgrades
be careful how you dispose of  Incomplete or virus contami- Digital certificate : is an electron-
e-mail. nated products ic document that guarantees that
 Beware of scam a user or website is legitimate.
Protection against software theft
Bandwidth theft  Keep original copies in a se- Internet related fraud scams
It means using bandwidth that cured location.
you have no authorized access  Back up data files and media Scam: is the process in which
to. in case of theft. criminals get people to give them
Prevention of bandwidth theft.  Use licensed software and money by tricking them.
 Use of username and abide by the specific condition .1. Phishing
passwords on the ADSL of use. Is the fraudulent practice of send-
hardware. ing emails purporting to be from
reputable companies in order to

25

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


Theft of time and services induce individuals to reveal person-
Internet attacks: are attacks on the This occurs when employees al information
network, computers and data from are paid for time and services The main purpose of phishing
anywhere on the internet. They that they did not provide. is to trick you into providing
include Theft of time occurs in the your personal or financial details.
A. DOS(denial of service): following cases – late arrival at
In this attack a computer re- work, early departure, taking Prevention.
ceives a huge amount of useless long lunch hours or breaks .  Never click a link in an e-
data in such a way that the mail message
computer/network becomes too Prevention  Do not respond to unsolicited
slow.  Allocate username and pass- e-mails.
B. Sniffer attacks :is a small pro- words to each employee so  Do not give your personal de-
gram or device that can read that the company can moni- tails to anyone online.
data packets being sent to tor their employees com- Pharming
other users over a network. puter activities all times Is a process whereby users are
A criminal may use this method  Implement acceptable use redirected to a fake website even
to try to find out what type of policy for computer equip- though they enter correct URL.
data is being sent over a net- ment and devices.
work  Implement surveillance tech- The fake website will request you
Bots : a robot is a computer niques to monitor employees to enter your confidential infor-
that has been compro- Taking over PCs mation.
mise(infected ) and can be con- Bot/web robot: is a program E-mail spoofing:
trolled remotely when it is on that performs repetitive tasks on a It is the forgery of an e-mail header
and connected to internet. network. so that the e-mail appears to be
Botnets: are large networks of Cybercriminals install malicious from a different origin (or person)
bots they work together to bring bots in a user’s computer to per-
down websites and corporate form automated tasks on their be- Click jacking: Users are tricked into
networks. half. clicking on an item on a webpage
Internet attack can be virus, Zombie: is a computer under the which acts as a concealed (hidden)
worms, Trojan horses and worms control of a bot. link.
Virus: Botnet is a zombie army, which is a Security issues
Is a damaging program that can network of bots and zombies. .1. Malware
copy itself , infecting the com- prevention Is short for malicious software
puter and altering the way it  User password to protect Is any type of software that is
operates without permission or your computer , internet capable of infecting your com-
knowledge of the user, and connection and online trans- puter without your permission.
spreading from one computer actions You must install anti-malware to
to another.  Update your internet security protect your computer against
Worm: is a program that repli- software regularly. malware infection.
cates on a network using resources  Be vigilant Update your malware regularly as
so that the network slows down new malware emerge every day.
or shut down completely. Right to access versus right to Firewall: is specialized soft-
privacy ware/hardware that prevents un-
Trojan: is a program hidden inside Information privacy: is the right authorized access to an internal
legitimate program that is trig- of individuals and companies to computer network.
gered by a condition or action. prevent or restrict the collection .2. Spyware
Prevention of Internet attacks and use of information about Is a malware that gathers infor-
 Never open an e-mail them. mation off your computer , with-
attachment unless it is Privacy laws have been passed out your knowledge or consent .
from a trusted source which controls the storage and .3. Adware
 Watch out for viruses disclosure of personal data such Is any application that displays
and hoaxes as online advertisement on web
 Ensure that data is  People must be informed if pages , e-mail or other internet
encrypted before data data about them is being col- services
transmission. lected. .4. Pop ups
 Employees working with per-
sonal information are re- Is and advertisement that opens
stricted to the information in a new window usually displayed
Avoiding security threats they need to perform their in a webpage in the user's web

26

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


 Restrict access by using duties browser, while he/she is working
username and pass- Misuse of personal information on a computer..
words to log on to a
computer or network  Personal information can .5. Keylogging
 Have a written policy be used for identity Is a program that records every
(AUP) that outlines the theft, fraud, stalking keystroke a user makes on a key-
activities for which the ,abusive etc board and reports to a third
computer and network  A company may leak per- party
may and may not be sonal information ena- They are dangerous type of spy-
used . bling it to be accessed ware.
 Use firewall improperly. Harassment: is when you are
 Never open an e-mail at-  Personal information is continuously bothered with mes-
tachment immediately if inadequately protected sages or data that you not want
the antivirus software against contamination to receive .
flags it as infected. with false data.
 Do not respond to unso- Most misuse of information result Cyber-attacks : is an attack on
licited e-mail message. in financial loss, emotional stress or the infrastructure of the web
 Ensure that data is en- even physical violence. itself
crypted during data
transmission over net- Social engineering : is any at-
works. tempt to manipulate or con
Protection against computer someone into revealing infor-
crime mation such as passwords or
Use ABC account number
Assume nothing: don’t assume
you are safe and protected.
Believe no one: check up on
people you are interacting with.
Check everything: bad spelling and
grammar.
Check incorrect website URLs.
These things can help you decide
if an e-mail or website is legiti-
mate or not.
Safeguard against criminals ,viruses and threats
 Never start a computer with removable media inserted in the rives in the ports unless the me-
dia are uninfected .
 Install antivirus and antispyware on your computer. update the antivirus regularly.
 Delete chain letters and spam
 Do not clicks on pop up messages and adverts.
 Never give your login details to anyone else.
 Back up your data.
 Do not provide personal information such as credit card numbers or passwords
 Check the reputation of online shops before making any purchases
The impact of technology on the global community.
Grid/distributed computing computing advantages of dis- Disadvantages
is the use of the resources of tributed computing  Requires faster connec-
many computers in a network to tions and connectivity
solve a single problem at the same  More processing power errors may occur.
time? and allows for sharing  Security issues are a chal-
of resources and corre- lenge.
sponding costs  Requires skilled techni-
 Scalability. Adding of cians and programmers.
computing devices as
needed.
 If one computer is not
available, another one can
be used.

27

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes

Grade 12 Term 3 Theory Notes


An operating system (OS) is system software that manages computer hardware and software resources and pro-
vides common services for computer programs
Functions/role of operating system
• Provide basic security
• Provide a user interface/GUI
• Starting up and shutting down a computer (Booting a computer)
• Manage software
• Manage memory
• Co-ordinate tasks
• Configure devices/Install drivers
• Manage hardware/peripherals/manage resources/manage storage/file management, etc.
Roles in detail
1. Booting a computer
Boot sequence : refers to the initial set of instructions that the computer performs when the power is
switched on.
BIOS(Basic input output system) it performs the POST( power on self-test ) to ensure that the computer
hardware connected to the computer is correctly installed and is fully functional. Bios are an example
of firmware.
Cold booting : when you switch on a computer that was completely off . That is called cold booting
Warm booting: restarting a computer that is already on.
2. Managing programs
Single user /single tasking operating system.
Allows only one user to run one program at a time .e.g when working on a word processing , if you
want to check your e-mails you must close the word processing and then open your e-mail programs
.Most smartphones and mobile devices have single user/single tasking operating systems .
Single user/Multitasking operating system.
Allows a user to work on two or more programs that reside in memory.
Computers have multicore processors which allow multiple programs to run at the same time.
Multiuser operating system

It is an operating system that allows two or more user to run a program simultaneously
Network servers allow multiple users to connect to the server at the same time
Task Manager
Is a utility program that displays a list of processes that are being executed by the processor at any
given period of time .
To access the task manager you must use the following keys. Press them at the same time.
ALT + CTRL + DEL
3. User interface

Is a combination of software and hardware that helps people and computer to communicate each oth-
er?
Types of user interfaces
GUI: graphical user interface.
The user interact with the computer using a series of windows and click on icons , menus buttons , or
other visual components to give instructions to the computer e.g windows

Command line interface

28

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


: the user has to type commands into the computer or use special keys to execute commands and task
.Commonly used by systems administrators for system trouble shooting and maintenance.
Disadvantage: user must know the exact spelling ,grammar and punctuation to be able to use it.
4. File management
File management program: Help users to organize and work with files and folders e.g creating shortcuts
, creating folders. Copying, etc.
My documents /Grade 12/CAT/Notes
What is the name given to the sentence above?
………………………………………………………………………………………………………..
File extension :
………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………………
File attributes
They indicate whether a file is read only, hidden, ready for archiving ( backing up),compressed and en-
crypted
Read only file : when a file / folder is read only , it can be viewed but cannot be changed /changes can-
not be saved.

Hidden file: is a file that exists on a computer, but don't appear when listing the files.
Metadata of a file
Metadata describes other data. It provides information about a certain item's content. For example, an image
may include metadata that describes how large the picture is, the color depth, the image resolution, when the
image was created, and other data. A text document's metadata may contain information about how long the
document is, who the author is, when the document was written, and a short summary of the document.

Compressing /decompressing files and folders

Compressing: is also called zipping a file.


It is the reduction of the overall size of a file so that it occupies disk space .
Windows has a built in compression utility called win zip.
A zipped file has the extension .zip extension

Reasons for compressing files


 To save disk space
 To save data transmission time when uploading or downloading as attachment
Decompressing: also known as unzipping.
Is restoring a file to its original state?

Searching:
Used to specify various criteria to find a file.
You can find a file by
 Specifying file type
 A word/ phrase in the document itself.
 The date when it was created.

Use of wildcards
There are 2 so called wildcards used to narrow file searching process.
 They are asterisk (*) which represent any number of unknown characters.
 The question mark (?) which represents a single unknown character
Example

T*.doc Search for all word documents starting with the letter t
*t* Search for all word documents that contain the letter t in their filename
*t.doc Search for all word documents ending with the letter t
CAT? Xlsx Search for all Ms excel files starting with the letters CAT followed by any 3 characters
in the filename.
File conversion: reasons for converting a file are:
 From a latest version to an older version.
 Change a file from one type to another. E.g word to html.
29

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes

Importing and exporting


Exporting:
Export feature creates a file in a format that another application can read.
Importing:
The importing feature in a program allows you to bring in and use data from another source

Windows utilities
Utility program: is a program that assists the user to manage , maintain and control operations of com-
puter and its resources .

User can buy stand - alone utility programs such as anti-viruses or compressing software to pro-
vide features not usually built into operating system.

Backing -up
Back up utilities enable users to make copies of certain files or entire hard drive .
This facility helps to protect user against accidental loss of files as a result of system failure., hardware
or software theft, malicious software theft, malicious software attacks or natural disaster.

Rules back ups


• Must be kept offsite
• Must be done regularly.
5. Operating system utilities and stand-alone utilities
Scheduling tasks and updates
•Task schedule : enable you to create and schedule tasks for your computer to carry out automatical-
ly , at a time that you specify.
•Triggers and actions
A trigger causes a task to run and an action is the work that is performed when the task run.

Stand -alone utilities


•Antivirus software
Antivirus program must be updated regularly so that it is able to combat the latest threats
Antivirus program can identify quarantine or remove infected files.
Updating an antivirus enables the database of the program to definition files to identify latest viruses.
General troubleshooting using utilities.
Disk defragmentation: it speeds up the time taken to access a file.
The process must be done when computers are not in use.
Disk scanner: it detects and repairs damaged files and read errors on your disk to improve the perfor-
mance of the computer. .
Factors which influence computer performance
a) Processor type and speed
Modern computers have multicore processors which are single chips containing more than one pro-
cessor core e.g dual core , quad core.
Multicore processors increase the performance of the computer considerably.
Processor speed also called clock speed determines how faster the processor runs
Common manufacturers of processors are Intel and AMD
The higher the clock speed of
The processor, the faster the processor can process data.
Clock speed is measured in Gigahertz.
b) RAM:
The larger the RAM , the better the performance of the computer .
The more RAM the computer has , the more applications you can open at the same time and the
faster the computer will responds.
Speed of RAM is measured in Megahertz (MHz)
Size of RAM is indicated on adverts in Gigabytes (GB)
Faster RAM is more expensive.
c) Number of running applications and caching
Windows is a multitasking system which means that it can run more than one program at a time .
The more running programs there are , the slower each one will run.

30

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


Cache memory: is special , high speed memory that stores frequently used instructions and data and
allows a processor to access data more rapidly than from RAM.
When a processor requires instructions it searches in the following order

First cache memory RAM  secondary storage e.g HD

Caching: process where data that is frequently used is kept in a place where it is quicker to access .
Web caching: is whereby the websites that are frequently visited are saved on a user’s computer.
This speed up access time to the website and protects bandwidth.
Disk caching: is a process where files are kept in a fast piece of memory
d) HD space and Disk fragmentation
Less HD storage space can slow down the performance of the computer.

Disk fragmentation: also can slow down a computer. The HD must be defragmented on a regular basis.
e) Effects of malware
Malicious software such as viruses, worms , bots , Trojans and spyware can cause performance degrada-
tion such as
• Sending annoying messages
• Prolonging system start-up
• Missing files
• Application crashes
Digital communication

Video conferencing

Real time meeting between people who are geographically separated using a network or internet to
transmit audio and video data .

It requires a microphone, speakers, a video camera and video conferencing software

Webcams can be used for video conferencing but the image quality is not as good as a digital or
video camera.

Advantages

 Eliminates travelling and accommodation expenses


 Meeting can be organized in a short period of time.
 Allows for flexibility- employees can work from their homes

Disadvantages

 Poor hardware, software and internet connectivity and lack of participant skills can reduce the
efficiency of video conference.
 Lack of direct face to face contact can detract from business relationships

Good practices

 Early planning is necessary to ensure success.


 Appoint site facilitators and technicians to handle video conferencing.
 Use appropriate dress code during video conference meeting and stay focused.

E-mail

Is the transmission of messages via computer networks?

It can be used to share videos , photos and other files as attachments .

Advantages

31

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


 It is faster
 It is cheaper
 Can attach any file to an e-mail message
 Can communicate with more than one person at the same time.
 Can archive or store messages for a long for reference?

Disadvantages

 The volume of messages received may be overwhelming. absence


 Message tone can be misunderstood in the in the absence of face to face gestures.
 Risk of spam and junk mails
 Risk of virus infection.

Good practices

 Keep messages as short as possible.


 Use a reputable ISP that filter spam
 Respond to messages promptly
 When responding to a message or questions in previous messages include the original messages.
 Always include a subject line
 Always re-read and check message before you send it.

Advantages of digital communication.

 Supports green computing


 Messages can be stored on devices for longer times
 Provides facilities such as video conferencing which save a lot of time , money and effort.
 Enables grid computing
 It enables telecommuting so that people can work in the comfort of their homes .

Disadvantages

 Risks of cyber- addiction and social withdrawal


 Sending large number of messages at the same time can cause the server to malfunction.
 Require greater bandwidth for data transmission.

Good practices of digital communication

 Ensure you have up to date antivirus program


 Do not respond to unsolicited e-mail messages.
 Delete chain letters.
 Do not click on pop up messages and adverts when browsing internet.
 Proof read and edit messages before sending them.
 Do not type message in capital letters.
 Never agree to meet people face to face whom you have met online

Social networking sites


 Are websites where users set up their personal online profiles and build social groups with
others . based on common interests
 Companies are using social networks to reach out to customers and public.
Popular social networks are
 Face book
 MySpace
 Twitter
32

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes

People, institutions and companies use social networks to


 stay in touch and communicate
 advertise and market products or services
 network with people with similar interests
 communicate news about an organisation or club
Creating a profile on Facebook
 Go to the Facebook website (www.facebook.com) and follow the easy instructions to sign up.
 Supply an e-mail address.
 Once you have signed in, you can start adding your profile information.
 Now you are ready to add ‘friends
Managing your Facebook account
 Account Settings – change your username and password and the way you receive notifications, etc.
 Privacy Settings – limit who can view your information, including photos and posts and set who can
post to your wall.

Blogs/logs
Blog/web log is an informal website used as an online personal journal / dairy by an individual to share
opinions and ideas on a particular top with other users
Volga: Is a video blog.
Allows users to video their message instead of entering text via regular blog.

Blogosphere: a worldwide collection of vlogs. Blogs are used for


• Sharing personal experiences
• Citizen Journalism
• New media news blog sites
• Corporate information blog sites
RSS feeds: rich site summary or really simple syndication.
 Is a format for delivering regularly changing web content such as blogs, news headlines , music
podcasts etc.
 A RSS document or RSS feed usually contains headlines , summaries and links to full version
of the content
RSS aggregator / reader/feed reader -is the software needed to read RSS feed.
Podcasts and vodcast
Podcast: is a digital media file consisting of audio files that is subscribed and distributed over internet
and downloaded onto pcs and portable devices .
Vodcast: podcast that contain video and usually audio.
Wiki: is a collaborative website containing a store of information that is created and maintained by
a community of users worldwide.
 Users can add and change content.
 Many wikis are open to modification by the general public .e.g. is encyclopaedia Wikipedia
Global positioning system (GPS)
 Is a navigation system that uses signals from a satellite to calculate exactly where you are in the
world?
Uses of GPS
 It can be used to determine the best route between 2 points
 Workout directions to a place
 Find an alternative route to avoid traffic jams
 Locate a stolen vehicle or lost person
 Calculate speed and time between points

33

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


Advantages of GPS
 It helps a user to get directions
 It can help to locate a person quickly if he/she is lost
 GPS software is regularly updated to cover the whole world.
Disadvantages
 Signals may be blocked by storm or heavy cloud cover.
 It requires power to work so it must be connected to power source
 GPS devices are small and they can be easily lost/stolen

New trends and technologies.

Senseye: is a software that will be installed in the future to enable users to control their phones
or devices using eye movement
Web browser: Application software that allows users to access and view web pages.
Bookmarks also called favourites

 Is a saved web address that a user can access by clicking on its name in a list?
 Is a filling system for URLs?
 Bookmark is a simple way of saving a site that you like so that you can find it later without
going on the web to search for it.
History: is a folder that stores information about all websites you visit and information you are fre-
quently asked to provide such as your name and surname
Pop up: is a small web browser window that appears on top of the website you are viewing .
Popup windows often open as soon as you visit a website are usually created by advertisers
Pop up blocker: is a feature that can be used to stop most of pop ups from opening.
home page : the first page that is displayed when a website is first opened .
Blocking websites: Means restricting websites users can access by using content advisor.
Web caching : is the process whereby web pages that the user browse are automatically stored on
the computer HD in an cache area allocated to your browser.
Web cache is a temporary memory.
Browser plug –INS: Small applications that acts as an add-on to a web browser so it can display additional spe-
cialised content. They are usually free.
Needed when you want to open pages with content such as videos, sound or even documents directly in the
browser e.g. Flash player, quick time and adobe acrobat reader.
Social implications

34

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


The impact of technology on the global community
 People communicate on a global scale
 Work, business and competition take place on a global scale
 The flow of information is difficult to control and restrict
 Telecommuting is possible
 Computer fraud takes place
 Many people suffer from information overload
Information overload
 Occurs when there is too much complex information and user to determine which information is
really important.
 Information overloading induces user confusion and stress.is too overwhelmed
How to cope with information overload
 Learn to read quickly and accurately and to identify the key points in what you are reading.
 Learn to analyse and compare sources.
 Take a disciplined and structured approach to dealing with information.
 Don’t add to the problem by unnecessarily forwarding information to others.
How social networking contributes to the impact of ICT
 They are free.
 They require users to register to be able to use the services.
 They encourage people to get as many other people to join as possible.
 They can make money by gathering information about their users and selling that information, or by
selling targeted advertising to marketing companies
Examples of social networks
MySpace
 Combination between a blog and Facebook.
 MySpace has become an online community where musicians, film studios and celebrities, etc. com-
municate directly with their fans. New albums, tours, behind-the-scenes information, gossip and so on
is shared.
Twitter
 Microblogging service.
 Microblogging : is a web service that allows the subscriber to broadcast short messages to other sub-
scribers of the service
 Twitter allows people to send messages to their ‘followers’.
 Each message is called a ‘tweet’.
 You can follow a specific topic by searching for a ‘hash tag’.
Facebook
 Allows people to connect and to keep up to date with friends and family no matter where they are lo-
cated in the world.
 Users can also set up or join user groups.
 Businesses and celebrities can create ‘fan’ pages.
 Facebook is also trying to become the default security provider for many websites or Internet services.
Virtual communities
 Second Life is an example of a virtual community.
 MMORPG (Massively Multi-Player Online Role Playing Game, e.g. World of War craft) where people log
in and ‘become’ a character that they have created in a world that only exists online.
 Main impact is as a form of entertainment

Google+
 Social networking service.
 Competes with Facebook and Twitter.

35

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


Kick-starter
It tries to ‘crowd source’ funding for projects.
 You produce an idea for a product.
 You create a presentation.
 You work out a business plan.
 You offer rewards for people who contribute to the project.
 You have a limited time to reach your target level of funding
Interest
 Acts like a virtual public pin board.
 The ‘pin boards’ are themed so you can find one that interests you, or you can create your own.
 Creative ideas and entertainment.
Waze
 Uses social networking to gather real-time information about traffic, roads and points of interest that
everyone can access and use.
Foursquare
 A service that helps you to track and meet your friends.
 It works by allowing you to ‘check in’ to a physical place by using your smartphone.
 Your friends can see where you are, so if you check into a coffee shop, the service will tell you if any of
your friends have checked in nearby and you can easily arrange to meet.
How technology can benefit or harm society
Employment
 New entrepreneurial opportunities and jobs are created by the IT sector.
 Job losses and unemployment.
Education
 ICT improves access to information and resources.
 Higher education requirements – digital divide.
Culture and languages
 People are better able to record and communicate things that reflect their own culture so that their
culture can be preserved or shared with the world.
 Dilution of cultures towards a standard, western-dominated ‘world culture’ occurs as people aspire to
what seems to be new, modern and exciting, whilst they ignore their own cultures and languages.
Individual ‘connectedness
 People are able to ‘connect’ with others around the world.
 Connectedness is ‘virtual’ and not real.
Impact of computer technology on global community
 Telecommuting: is working from a remote location not in the same space (i.e. traditional office) as co-
workers or people you do business with.
 It has enabled employees to work from homes
Advantages
 Employees can work flexible hours.
 Work and children care can be combined.
 No waste of time and money travelling to work.
 Less vehicle emission to negatively impact on the environment.
 Employees can stay with the company even if it relocates
Disadvantages
 A disadvantage of telecommuting is that there are a variety of distractions that you will have
to deal with while working from home that you would not have to deal with at an office.
 The lack of direct supervision can make it difficult to clearly define your job duties at times,
and communication can be misinterpreted.
 Also, if you are a social person, you could suffer from isolation.
 Computer fraud
36

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


 Computers have increased the chances of fraudulent acts.
 Examples of global fraud are spoofing, phishing etc.

New Technology/Terms (CAPS)


As per the CAPS document, new technology or terms relating to hardware and software may be
assessed during each examination. The following list contains the new technology/terms that may
be examined, as well as a short definition of each:

3D printing/printers: 3D printers can create three-dimensional solid objects (for example mo-
tor vehicle parts, human tissue replacement, jewellery, clothing, et cetera) from a digital mod-
el of the item by adding successive layers of material on top of one another.

BYOD: Bring Your Own Device refers to a concept where employees/students are allowed to
bring and use their own portable devices such as smartphones, laptops, tablets, et cetera to
work on and access the network instead of a device owned/supplied by the compa-
ny/institution.

Click-jacking: Users are tricked into clicking on an item on a webpage which acts as a con-
cealed (hidden) link.

Geotagging: A process where the geographical position where a photograph was taken is
added to the metadata of a file, for example adding the latitude and longitude.

LTE (Long Term Evolution): A standard used in wireless communication which provides for
high-speed data transfer between cellular devices (such as smartphones and tablets) and ISPs.
It is the next generation of cellular connectivity after 3G, sometimes also called 4G.

Micro USB: A smaller version of a USB port, usually found on portable devices such as
smartphones.

 Phablet: A smaller version of a tablet, which (over and above tablet features) also incor-
porates features found on a smartphone, such as voice calls and SMSs.

Multi-touch screen: A feature of a screen that allows it to register more than one point being
touched simultaneously (together).

Phablet: A smaller version of a tablet which (over and above tablet features) also incorpo-
rates features found on a smartphone such as voice calls and SMSs.

URL shortening: URL shortening is a tool or service used to convert a long URL to a shorter
version. This shorter version of the URL will take a user to the same web address, but is easier
to remember and/or type out.

802.11 a/b/g/n: Refers to a set of specifications and protocols used in communication on a


wireless network. The letters (a, b, g, n) indicate different versions of the Wi-Fi standard (each
with different speeds, et cetera)

37

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


NFC: Near Field Communication is a standard that allows devices such as smartphones to
connect wirelessly, for example to exchange files, by touching them together or bringing them
into close proximity.

Crowd funding: A process where a single idea or business practice is funded by multiple small
donations from volunteer contributors, usually before the business venture is started. The
contributors will then receive the product when it is finally put into production. Examples in-
clude www.indiegogo.com and www.kickstarter.com.
• Card reader: A device connected to a computer that is designed to accept and read data
from different types of storage media, such as SIM and SD cards and flash drives.
• HDMI: High-definition multimedia interface is a standard/port for connecting high-
definition video devices, such as computer monitors, video projectors and digital television.
HDMI carries high quality video and audio signals, and there is no need for separate audio ca-
bles as with VGA.
• Big data: Very large structured and unstructured data sets that are analysed using com-
puters to reveal trends and associations. These present challenges, such as storage, cura-
tion, querying, visualisation.
• Bitcoin: This is a form of virtual, digital currency. Bitcoins can be exchanged for other cur-
rencies, products and services. They have caused concern because they are often used for
payment in criminal activities such as ransomware demands. However, more and more legiti-
mate companies are accepting them as a means of payment.
• Digital migration: A process in which broadcasting services using traditional analogue
technology are replaced with digital technology.
• Internet of Things (IoT): This refers to the trend whereby all sorts of objects and devices
are increasingly being connected to one another via the Internet.

Mobile or M-Learning: A form of education and training delivered and conducted via the In-
ternet using mobile devices, such as tablets and smartphones. It is designed to be flexible,
allowing learners/workers/students access to education anywhere, anytime.

Ransomware: A type of malware designed to encrypt or block access to your computer sys-
tem and files until you pay a sum of money ('ransom').

Screen lock pattern: A way of locking a device by setting up a pattern you must draw or trace
on the screen to unlock the device.

Shaping (Network tuning): A technique whereby certain network (Internet) services, e.g. e-
mail, are given preference while others, such as social networking services, are given less pri-
ority, thus performance is maintained for the more critical services.

Throttling (Policing): This occurs when your ISP slows down your Internet connection. This
most often occurs when you have been deemed by your ISP to have downloaded excessive
amounts of data. Each ISP has an acceptable use policy (AUP) which specifies how this is de-
termined and implemented.

Virtual reality (VR): This refers to using technology to create a simulation of a 3D environ-
ment that can be interacted with by a person in a seemingly real or physical way. This is
38

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)


lOMoARcPSD|28655753

. Grade 12 Theory Notes


achieved by using equipment, such as helmets with screens and gloves fitted with sensors.
Augmented reality uses similar types of technology, but does not create a totally virtual envi-
ronment like VR.

Adware - a type of software that automatically displays or downloads advertisements on a


computer screen, smartphone, etc. when a user is online.

Technology/Terms no longer to be examined


As technology improves many technologies may become obsolete or will no longer be relevant
and will thus not be examined. In other cases, the set differences between devices/technologies
may become blurred. As a result, these concepts will not be examined in order to avoid confusion
for the learners as well as markers.

Concepts/Technologies no longer to be assessed from 2016 and onwards include:

 Differences between laser and inkjet printers regarding printing quality and number of
pages printed per cartridge
 CRT monitors.

 GOOD LUCK WITH THE EXAMS!

End of Grade 12 notes.

39

Downloaded by Buhle Mngomezulu (buhle02mngomezulu@gmail.com)

You might also like