CAT Theory Book Grade11
CAT Theory Book Grade11
CAT Theory Book Grade11
BOOKS.
communities we operate in. This unique digital book provides the fundamental knowledge
necessary for a sound grounding from which to make practical use of the complete and
indispensable application-oriented information regarding Computer Applications Technology
(CAT) and Information Technology (IT). It is a foundational reference for today’s secondary
school learners and teachers alike – as well as for the next generation of CAT and IT students.
First published in 2019 © 2019. Copyright in the text remains with the contributors.
Restrictions
You may not make copies of this book in part or in full – in printed or electronic or audio or
copyrighted to other entities, or in a small number of cases, to seek permission from and
acknowledge copyright holders. In some cases, this may not have been possible. The
publishers welcome the opportunity to redress this with any unacknowledged copyright
holders.
Term 1
Introduction
Unit 2.1 Input devices
Various input devices
What determines the quality of the image taken by a scanner or camera?
Activity 2.1:
Unit 2.2 Output devices
Display devices
Activity 2.2:
Unit 2.3 Devices, software and equipment
Device drivers
Plug-and-play
Other equipment
OCR
Activity 2.3:
Revision activity
At the end of the chapter
Term 2
Introduction
Unit 3.1 Storage devices
Primary storage
Secondary storage
Storage media for backup
Activity 3.1:
Unit 3.2 Processing devices
Motherboard
Central processing unit (CPU)
Random-access memory (RAM) and read-only memory (ROM)
Interpret computer advertisements
Activity 3.2:
Unit 3.3 Basic troubleshooting
Storage and processing devices
Activity 3.3:
Revision activity
At the end of the chapter
Chapter 4 Software
Introduction
Unit 4.1 The role of application software
Unit 4.2 Collaboration and communication software
Multimedia software
Communication software
Activity 4.1:
Unit 4.3 Compatibility issues
Updating software
Activity 4.2
Unit 4.4 Software for physically challenged users
Activity 4.3:
Unit 4.5 Cloud-based applications
Google G Suite
Microsoft Office
Activity 4.4:
Unit 4.6 Online storage
Activity 4.5:
Revision activity
At the end of the chapter
Introduction
Unit 5.1 Basic system requirements
Activity 5.1:
Unit 5.2 Software installation
Online download
Portable storage medium installation
Activity 5.2:
Unit 5.3 File management
File types
File attributes
Import and export
Search
Activity 5.3:
Revision activity
At the end of the chapter
Terms 1, 2, 3
Introduction
Unit 6.1 Input and output devices for physically challenged users
Input devices
Output devices
Activity 6.1:
Unit 6.2 Health issues due to input and output devices
Ergonomics
Activity 6.2:
Unit 6.3 Protecting your hardware
Hardware protection
Activity 6.3:
Unit 6.4 Power supply and settings
How to protect your devices from power failures
Activity 6.4:
Revision activity
At the end of the chapter
Term 3
Introduction
Unit 7.1 Networks
Types of networks
Basic components of a network
Network software
Communications media
Network communication
Activity 7.1:
Unit 7.2 Intranet vs internet
Intranet vs internet
Activity 7.2:
Unit 7.3 Basic network security
Passwords
Usernames
Access rights
Activity 7.3:
Revision activity
At the end of the chapter
Introduction
Unit 8.1 Social issues for networks
Unauthorised access
Ethical use of networks
Acceptable use policies of schools
Activity 8.1:
Unit 8.2 Network security
Network security
Network security and BYOD
Privacy issues
Activity 8.2:
Unit 8.3 Databases and Big data
Databases
Big data
Activity 8.3:
Unit 8.4 Normal currency vs cryptocurrency
Activity 8.4:
Revision activity
At the end of the chapter
Chapter 9 Errors and bugs
Introduction
Unit 9.1 Human error
The GIGO principle
Unit 9.2 Verification and validation of data
Databases
Verification and validation
Unit 9.3 Software bugs
Unit 9.4 Hardware failures
Revision activity
At the end of the chapter
Introduction
Unit 10.1 Social-engineering tricks
What to do when you suspect you are a victim?
Activity 10.1:
Unit 10.2 Data protection
Guided Activity 10.1
Guided Activity 10.2
Guided Activity 10.3
Activity 10.2:
Unit 10.3 Protecting yourself online
Online harassment, stalking and bullying
Malware (Malicious ware)
Activity 10.3:
Unit 10.4 E-commerce and e-banking
Advantages of e-commerce
Advantages of e-banking
Activity 10.4:
Unit 10.5 How antivirus programs work
Application permissions
Activity 10.5:
Revision activity
At the end of the chapter
Term 4
Chapter 12 E-communications
Introduction
Unit 12.1 Register a web-based email address
Guided Activity 12.1
Do’s and don’ts when writing an email
Activity 12.1:
Unit 12.2 Managing email
Organise using labels
Guided Activity 12.2
Guided Activity 12.3
Guided Activity 12.4
Guided Activity 12.5
Guided Activity 12.6
Guided Activity 12.7
Guided Activity 12.8
Guided Activity 12.9
Prioritising emails
Guided Activity 12.10
Guided Activity 12.11
Guided Activity 12.12
Distribution lists
Guided Activity 12.13
Filters
Guided Activity 12.14
Guided Activity 12.15
Activity 12.2:
Revision activity
At the end of the chapter
Terms 2, 3, 4
Chapter 13 Information management
Introduction
Unit 13.1 Defining the task
Activity 13.1:
Unit 13.2 Finding information
Information-gathering tools
Activity 13.2:
Unit 13.3 Quality control of information
Evaluate questions
Evaluate information sources
Activity 13.3:
Unit 13.4 Spreadsheets and databases in data handling
Activity 13.4:
Unit 13.5 Processing data
Tools and techniques
Guided Activity 13.1
Extracting appropriate information
Unit 13.6 Analysing data and information
Adding data questions
Trends and patterns
Activity 13.5:
Revision activity
At the end of the chapter
Glossary
Dear learner
Welcome to the Theory Book for Computer Applications Technology
Grade 11. Please read the information below about the book before
you start using it. This book provides you with all the information you
need to cover the Grade 11 Computer Applications Technology
curriculum. It will also help you develop the skills, attitudes and values
you need to be successful in your studies.
INTRODUCTION
https://www.youtube.com/watch?
v=nKIu9yen5nc
Each chapter in the book has the following features, which are meant
to help you learn:
Overview
This is an overview of the contents and the units of the chapter.
Learning outcomes
These are the objectives that are addressed in the chapter. It states
what you should be able to do by the end of the chapter and gives
you an idea of what will be expected of you as a learner. After
completing each chapter, ask yourself, ‘Am I able to do everything
stated in the learning outcomes?’. If not, you should revise the
content covered in the chapter.
Introduction
The introduction is a brief summary of why you will be learning the
content that is covered in the chapter. Sometimes it will give you a
brief background of how far technology has come, while at other
times it will just give you a short summary that introduces the content
that will follow in the chapter.
New words
These are difficult words that you may not have encountered before.
Activities
These cover questions you have to answer based on the content
presented before them. Activities will help you check whether you
have understood the content presented in the book or not.
‘Something to know’, ‘Take note’ and ‘Tip’ boxes
The boxes provide extra, interesting content that might caution you to
‘take note’ of something important; or give you additional information.
Note that the content in these boxes will not be part of your exams.
QR Codes, Videos and Screen captures
These will link you to online content. When you are in the eBook, you
can easily access the links.
Revision activities
This is a revision activity based on what you have covered in the
chapter. Take time to answer the questions on your own. You teacher
may also use these to assess your performance during class.
At the end of the chapter
This is a checklist to ensure you understand all the content cover in
the chapters. These criteria are linked to the learning outcomes at the
beginning of the chapter.
Glossary
Brief explanations for new words are given in the glossary at the back
of the book.
Before getting started, watch the video in the QR code in the margin.
You can use the QR codes on these pages to link to online content for
further information on these topics.
Chapter 1
Chapter 2
Chapter 3
Chapter 6
COMPUTER ERGONOMICS
Chapter 7
Chapter 8
FIREWALLS
2018 FACEBOOK DATA BREACH
BASIC COMPUTER SECURITY PRINCIPLES
BIG DATA EXPLAINED
Chapter 10
Chapter 11
Chapter 12
INTRODUCTION
In Grade 10, you learned about the basics of computers. You were
shown that all computers use the same basic process to function,
namely the input, processing, storage, output and communication
process. This is called the information processing cycle.
UNIT
1.1 Information processing cycle
Before you can start to learn about the different types of computers
that you will come across, you need to understand the basics of how
computers work. All computers, whether they are the smartphone in
your hand or large, powerful servers, operate on the same five basic
principles. These are input, processing, storage, output and
communication. Each component of a computer performs one of
these functions, but they all work together to make the computer work.
INPUT
In the input stage, the data is entered into the computer. There are
many ways to do this. In fact, there are as many ways to input data as
there are input devices. You would have learned about input devices in
Grade 10 but just to refresh your memory, input devices are things
such as keyboards, touchscreens and microphones. The user inputs
the data (for example, by typing on a keyboard or speaking into a
microphone) into the computer. The device takes this data and
converts it into a series of 1s and 0s (this is called binary code).
PROCESSING
The central processing unit (CPU) inside the computer then takes that
binary code and does the calculations needed to get that data to
display in a way that makes sense to the user. The CPU works with the
computer’s memory to get instructions on how to display the
information from the input device and stores it as pixels in the
computer’s memory. This information is sent to the output device to be
translated and displayed in a way that is useful. All of this takes a
fraction of a second to do.
STORAGE
Storage is where the computer takes the input and stores it in its
memory banks. There are many ways to store the data, but the basic
process is as follows:
1. The CPU writes the data to the computer’s temporary storage, or random access
memory (RAM).
2. The computer then waits for the user’s command to move the data from the RAM
to more permanent storage. If that command is given, the computer writes the
data to the disk drive.
3. Lastly, the computer saves the data in a location on the drive, either the default
storage location or a location set by the user. The user can then recall this stored
information at any time.
You can also store information using external storage devices (for
example USB drives or external hard drives).
OUTPUT
Output is where the computer takes the pixels from the processing
stage and displays them in a way that the user can see them. There
are many kinds of output devices, such as printers, screens, video and
audio devices.
These devices make the raw data usable and visible, allowing human
users to interpret the data, turning it into information. This could be the
sound waves of a song or the letters in a document.
COMMUNICATION
Communication is linked to the other stages in the information
processing cycle. Each part of the cycle happens because one of the
other steps came before it, meaning that they are linked. This link is the
communication aspect of the information processing cycle. The most
visible aspect of this is the relationship between input and output. Input
and output happen almost immediately (for example typing a letter on
a keyboard makes it appear almost immediately on a screen). This is
communication between the user and the computer.
To see how this works, think about sending a WhatsApp message from your
smartphone. To start the process, you open WhatsApp and use the touch keyboard
to enter your message (this is input, output and communication). Once you press
SEND, your WhatsApp application communicates with the servers to send the
message and displays it in the current conversation (this is communication,
processing and output). The app keeps a record of the conversation on your phone,
your friend’s phone and the WhatsApp server (this is storage).
Figure 1.2: How sending a WhatsApp message works
As you can see, these processes are interlinked at every step of the
way.
Activity 1.1
1. Usually Mpumi uses the computers in her school’s computer lab to do her
homework. Mpumi’s parents recently decided to get her a computer so that she
can do more of her work at home.
a. What kind of computer should Mpumi use? Give two reasons for your
answer.
b. List two types of input devices she would need.
c. List two types of output devices she would need.
d. List two types of storage devices she would need.
e. Mpumi wants to save a Microsoft Word document on her computer as
“Geography.docx”. Explain the basic process of how she will create and save
this file on her computer. NOTE: Consider what happens during each stage of
the information processing cycle.
UNIT
1.2 Computer features and classification
Now that we understand how computers work, we can look at what types of
computers there are and their typical components. Computers can be broadly
separated into three categories, namely:
1. Non-portable: server, desktop
2. Portable: laptop, tablets, smartphones
3. Dedicated devices: ATM, smart fridge
These devices are classified according to how portable they are, what their processing
power is and what they are used for.
This unit will look at these types of computers and their typical components, as well
as look at how each type of computer can be classified.
COMPUTER CLASSIFICATION
Table 1.1 lists the different kinds of computers, what they are used for
and their processing power.
Table 1.1: Computing device classification
DEDICATED DEVICES
Computers are everywhere around you, even in places that you least
expect. It might surprise you to learn that computers are in ATMs,
point-of-sale devices (that is, tills and card machines) and even fridges
and air-conditioners.
They are usually limited in what they can and cannot do, as they are
designed to perform very specific functions.
Activity 1.2
https://www.youtube.com/watch?
v=iULC9wHu1qc
The main reason ICTs are used in the workplace is that they allow
humans to do their work faster, more efficiently and with fewer wasted
resources. Companies no longer need staff to handle physical mail as
email is faster and more effective than an employee sorting through
post and delivering it to the correct people.
HOW ICTS IMPACT THE WORKPLACE
ICTs have also changed how workplaces are organised. ICTs allow
employees to be more flexible in where, when and how they work,
giving rise to the concept of mobile or virtual offices. Mobile offices are
usually built for temporary purposes, usually within moveable,
temporary buildings (such as an old shipping container). They can be
completely virtual, with employees using mobile computing devices
(such as laptops, tablets and smartphones) to create an office space
outside of the business environment. Virtual offices can also be rented
spaces that give businesses a physical address and office-related
services (such as a telephone exchange) without the business needing
to sign business leases or hire administration staff.
Figure 1.3: ICTs connect staff working in different locations and aid
communication between them
Virtual offices are especially popular with new businesses, as there are
lower starting and administrative costs, and a higher degree of
flexibility and efficiency, since staff members do not have to handle
day-to-day administrative tasks.
This has led to a change in how companies employ staff. The rise in
flexi-time schedules (where staff work hours that suit them and not
according to rigid timetables) and mobile offices has led to something
called the decentralisation of labour. In the past, employees all worked
at a central location according to a fixed time schedule (for example, at
an office from 9 am to 5 pm). Now, employees can be scattered
across the globe, all working at different times (that may or may not
overlap with others) and in different places. Employers and employees
are able to keep in touch using the internet and various software
programs (such as Skype or email).
ICTs have also led to the rise of office automation. In some companies,
ICTs have completely replaced the need for reception staff to answer
telephones and take messages, due to messaging services and
cellular technology.
A job that is slowly being phased out of existence due to ICTs is the receptionist or
switchboard operator. Their job was to take calls and direct those calls to the
correct department or person in a company. This is now handled by automated
responses, like those used by large service providers such as MTN or Vodacom.
When you dial their customer support number from your smartphone, an
automated message plays, asking you to select a number to be put through to the
correct department to help you with your query. In some cases, you might not even
need to speak to a person, since there may be a computer on the other side of the
line that is programmed to answer your questions with a series of automated
responses.
Another change that ICTs have brought to the workplace has been the
rise of bring your own device (BYOD) policies. As smartphones and
tablets have become more cost-effective to buy, there has been a rise
in the number of companies adopting a BYOD policy. BYOD means
that businesses can avoid the costs of purchasing computing
equipment for new staff members, as staff are encouraged to bring
their own computers. Staff can also tailor their computers to their
needs. However, BYOD is mostly only cost-effective for small to
medium businesses, as larger businesses have the buying power to
make arrangements with ICT providers to get the best devices for their
staff.
BYOD polices also allow staff to take their devices home, meaning that
businesses have a lower insurance risk as they do not need to keep
expensive technology on their premises.
Activity 1.3
1. As technology is always changing and improving, people are finding more ways
to use technology to make certain processes in the workplace more efficient.
a. What are ICTs and why are they used in the workplace?
b. In the workplace, how are ICTs used to improve the way employees are paid?
c. In the workplace, how are ICTs used to improve the way employees
communicate with each other? Also mention TWO software programs that
employees can communicate with.
2. Give TWO examples of how ICTs can be used to improve a school environment.
3. Name TWO jobs, which currently exist, that you think will be replaced by ICTs in
the future. Give a reason for each of your answers.
UNIT
1.4 The value of CAT
Apart from using your computer to finish your schoolwork or do research for
projects, knowing how to use a computer is a requirement for almost any job
today. From obvious jobs, such as computer programmers and graphic designers,
to less obvious jobs, such as truck drivers and carpenters, each person entering
the job market must know how to use a computer with some degree of skill.
With computers and the internet becoming more accessible, an entirely new
workspace has opened up, where digitally savvy people are using computers and
computing technology to advertise, promote and build businesses online. Online
marketing (or digital marketing) is one of the fastest growing job sectors in the
world and skilled digital marketers are in high demand.
It is not only people who will be working in ICT-related fields who will need to be
computer literate. In 2017, a News Corp Australia article found that by 2020,
about 90% of the Australian workforce would need to have basic computer skills to
communicate with others and to find information about their tasks and daily duties.
Studying CAT will also give you insight into how the internet and the
World Wide Web function and how they can be used to enhance your
knowledge and life.
Activity 1.4
REVISION ACTIVITY
INTRODUCTION
In Grade 10, you learned that hardware is the physical components of
a computer. This includes items such as the monitor (or screen),
keyboard and mouse.
An input device is any device that allows you to enter data into a
computer and interact with it. Common input devices include
keyboards, computer mice, touchpads and touchscreens. You also
learned about the basics of digital cameras, scanners and readers
such as radio-frequency identification (RFID), magnetic strip and OCR
readers. Other input devices are video and audio input devices such as
webcams and microphones, and biometric input devices such as
fingerprint scanners.
Output devices take the processed input from a computer and display
it in a way that is easy for humans to understand. Screens are the main
output devices of any computer. Liquid crystal displays (LCDs) and
LED screens are the most popular types. Printers are another common
type of output device. There are two main printer types, namely inkjet
and laser printers.
Headsets and speakers are designed for audio output, with other
output devices being fax machines, multifunction devices (which
combine faxing, emailing and printing) and data projectors.
Internal storage media, such as hard drives and RAM, are inside a
computer and part of it, while external hard drives and USB drives are
outside a computer and can be removed easily and quickly.
UNIT
2.1 Input devices
This unit focuses on input devices other than the mouse and the
keyboard as they were covered in Grade 10.
Colour depth is also known as bit depth and refers to the number of
bits used to indicate the colours of a single pixel. The higher the bit
number, the better the colour depth. You can see this in Figure 2.1.
Figure 2.1: 32-bit (left) versus 8-bit (right) colour depth.
The image on the left is in 32-bit colour while the image on the right is
in 8-bit colour. In the image on the left, the details in the background
are sharper and the colour of the leaf is deeper and more vibrant
compared to the image on the right.
The final quality factor is the dynamic range. This measures the range
of light the scanner can read and use to produce a range of tones and
colours.
The lens aperture is the maximum amount that the lens can open. The
wider it opens, the more light it can take in, which means that you
need less light to take a good picture.
How much a camera can zoom is determined by its focal length. The
focal length is shown by a number and the times symbol (×). A zoom
of 3× means that the longest focal length is 3× the distance of the
shortest focal length.
Activity 2.1
1. Multiple choice:
a. Which of the following does NOT determine the quality of a digital camera?
A. Resolution
B. Focal length
C. Price
D. Lens aperture
b. Which of the following is NOT an example of biometric input devices?
A. Voice recognition
B. DNA tester
C. Fingerprint scanner
D. Facial recognition
c. Which device CANNOT be used when you need to convert a physical copy of
a document into a digital copy?
A. Digital camera
B. Scanner
C. Smartphone
D. Laser keyboard
2. Match Column B with Column A:
3. Write True or False next to the question number. Correct the statement if it is
FALSE. Change the underlined word(s) to make the statement TRUE. (You may not
simply use the word NOT to change the statement.)
a. It is good practice to regularly back up your files.
b. A POS system does not need to be maintained after installation.
c. Touchscreens can be used for biometric scanning.
d. Resolution is the amount of colour an image can show.
e. Dynamic range measures the range of light a scanner can read.
4. Answer the following questions in your own words:
a. What factor determines how much a camera can zoom?
b. Give three advantages and three disadvantages of scanners as input devices.
c. Briefly describe the factors that determine a scanner’s quality.
d. Why would a Nikon Coolpix B500 or a Canon 4000D camera not be
considered an input device?
e. Describe why digital cameras in smartphones become outdated very quickly.
f. Describe the factors that determine a camera’s quality.
g. How would you use fingerprint scanners at a school?
h. Describe why a criminal might clone your fingerprints.
i. What are the advantages of POS systems and ATMs?
j. Why are touchscreens becoming more common?
k. Give two types of wireless input devices.
l. Give one disadvantage of laser keyboards.
UNIT
2.2 Output devices
Output devices form the last stage of the information processing cycle.
These are devices that translate the information from the internal
processing components of the computer and display them in a way
that makes sense to a human user. This could be text, images, sounds
or videos.
There are as many output devices as there are input devices and there
will certainly be more in the future as the way we interact with
computers changes. When you think about output devices, you no
doubt think about screens and displays, printers (including 3D
printers), speakers and headphones. But interactive whiteboards, data
projectors and GPS devices are also output devices.
In this unit you will focus on interactive whiteboards and displays and
the advantages, disadvantages and limitations of each of them. You
will also learn about the factors determining the quality of display
devices and printers, as well as the wireless technology needed for
these devices to operate correctly.
DISPLAY DEVICES
Display devices are a broad category of output devices that includes
monitors (computer screens), smartphone screens and data
projectors.
There are some display devices that act as both input and output
devices; touchscreens and interactive whiteboards are examples of
these types of devices.
Table 2.2 lists the quality specifications you should look for when
buying a new display device and gives a brief explanation of each
specification.
PRINTER QUALITY
There are many factors that can affect the quality of the prints that
come out of a printer. The most important factor is the resolution,
which is measured in dots per inch (dpi). As you learned in the section
on scanners, dpi measures how many dots there are in a square inch
of an image and the higher the dpi is, the better the image quality will
be.
In printers, dpi measures how well the printer can match the pixels per
inch (ppi) of a digital image or text. If the printer can match the ppi
exactly, the image will come out crisp and clear and will look the same
when it is printed and when it is on screen. The problem comes in
when the printer cannot match the ppi, so the image quality goes
down.
Lastly, the duty cycle also shows the printer’s quality. The monthly duty
cycle indicates the maximum number of pages a printer can print in a
month without it failing. A typical home printer will have a duty cycle of
around 5 000 pages, while large business printers will have a duty
cycle of around 200 000 pages per month.
Something to know
A printer’s dpi is usually shown just like a screen’s resolution is shown, since it is a
measure of how many dots can be made horizontally and vertically. For example, a
printer’s dpi may be shown as 1 600 × 2 000.
INTERACTIVE WHITEBOARDS
At first glance, interactive whiteboards look exactly the same as normal
whiteboards. But looking closer reveals that they are unique and an
exciting tool to use in the classroom and in business. Interactive
whiteboards can be seen as input and output devices.
Ink printer:
https://www.youtube.com/watch?
v=9yeZSaigBj4&t=10s
Laser printer:
https://www.youtube.com/watch?
v=WB0HnXcW8qQ
Something to know
A normal non-magnetic whiteboard (2 000 mm × 1 200 mm) cost about R1 750
in 2018. This is one of the biggest whiteboards available.
WIRELESS TECHNOLOGY
Wireless output devices use Wi-Fi, Bluetooth or near-field
communication (NFC) to communicate with the computer. Wireless
devices reduce the number of cables you need to connect them to
each other. Some examples of wireless output devices are wireless
printers and wireless headphones or speakers.
Activity 2.2
1. Multiple choice:
a. Which of the following cannot be a wireless output device?
A. Monitors
B. Printers
C. Headphones
D. Speakers
b. Which of the following is NOT a wireless communication medium?
A. Wi-Fi
B. Bluetooth
C. NFC
D. RSS
c. Which of the following is the duty cycle of a home printer?
A. Around 500 pages
B. Around 5 000 pages
C. Around 10 000 pages
D. Around 1 000 pages
2. Match Column B with Column A:
3. Write True or False next to the question number. Correct the statement if it is
FALSE. Change the underlined word(s) to make the statement TRUE. (You may
not simply use the word NOT to change the statement.)
a. Most wireless audio devices, such as speakers and headphones, use
Bluetooth to connect to the computer.
b. A printer’s dpi can be shown in the same way a screen’s resolution is shown.
c. Interactive whiteboards allow teachers to combine different visual learning
styles into one.
d. Interactive whiteboards are the same as traditional whiteboards.
4. Answer the following questions in your own words:
a. What would the aspect ratio be of a monitor that is 20 inches wide and 15
inches tall?
b. Name two extra features that determine the quality of a display device.
c. What are the three key advantages of interactive whiteboards in the
classroom?
d. Explain why every school in South Africa does not have interactive
whiteboards.
e. Give two advantages of wireless printers.
UNIT
2.3 Devices, software and equipment
Often you will need additional software or hardware to make sure that
your input and output devices can communicate with your computer.
In most cases, your hardware will require a device driver to make sure
that the commands it sends to and receives from your computer will
be interpreted correctly.
In this unit, you will learn more about device drivers that you need to
install yourself and plug-and-play devices. You will also look at the
physical ways devices connect to your computer. Lastly, you will look
at what OCR is and where it is used.
DEVICE DRIVERS
Device drivers are software programs that are separate from the
device. They are either given on a disk or downloaded from the
manufacturers’ websites. Your OS will use a device’s driver to
communicate with the device. The driver will help the OS understand
the information you give it through an input device or translate the
information the computer sends to an output device so that it can
display the information correctly.
PLUG-AND-PLAY
Plug-and-play devices are usually external devices but can also be
some internal components of the computer (such as graphics cards).
Examples of plug-and-play devices are headphones and speakers,
computer mice, keyboards and USB storage devices.
OTHER EQUIPMENT
Most input and output devices need to be connected to the computer
in some way for them to work. Keyboards and computer mice need to
be connected either with a wireless USB dongle or a wired USB
connector. Monitors will need power cables as well as display
connectors (such as HDMI or VGA cables). Printers and projectors can
be connected to the computer with cables, USB dongles or Bluetooth
connections.
OCR
OCR stands for optical character recognition and it is a software
program designed to convert printed characters (such as those on a
hard copy document) into digital text. This means that you can edit
and search in a scanned document in a word-processing program.
OCR is most commonly found in specialised scanners used for
archiving or document management. You can also get handheld OCR
scanners that allow you to quickly scan printed text into a digital
format. OCR enhances traditional scanning, since it saves the
documents as text and not as an image.
Activity 2.3
1. Multiple choice:
a. Which of the following is not a plug-and-play device?
A. Speakers
B. Keyboard
C. Motherboard
D. Headphones
b. Which of the following is not a connection method for a monitor?
A. HDMI
B. Bluetooth
C. VGA
D. Power cable
2. Match Column B with Column A:
REVISION ACTIVITY
INTRODUCTION
In this section, you will get more detail about the purpose of storage,
what the difference is between primary and secondary storage, why
computers need storage and what online storage is. You will be
introduced to the storage devices that do the processing in a
computer, such as the motherboard, random-access memory (RAM),
read-only memory (ROM) and central processing unit (CPU) and what
their functions are.
UNIT
3.1 Storage devices
Storage media have come such a long way since the early days of
computing, and the size of data has grown so much that it is
impossible to imagine that all it took to get humans to the moon was
about 600 MB of data.
Something to know
One gigabyte (GB) is equal to 1 024 megabytes (MB), and one terabyte (TB) is
equal to 1 024 GB.
PRIMARY STORAGE
Primary storage is also called the main or internal memory of the
computer. This storage is accessed directly by the CPU and is where
the main instructions for the computer’s operations are stored. The
CPU can access these instructions and execute them as they are
needed.
Primary storage is most often the RAM and the ROM, which will be
discussed later in this chapter. The main function of the primary
storage devices is to hold data for a short period of time while the
computer is running and power is going to the devices. This data is
removed once the power is stopped (like when the computer is shut
down).
SECONDARY STORAGE
Secondary storage is also called external, secondary or auxiliary
memory. This type of storage holds data for the long term. Data stored
on secondary storage devices can only be removed by deleting it.
Secondary memory is where the operating system, hardware drivers
and data created by the user is kept and stored permanently.
This means that, in the case of power failures, secondary storage will
preserve the information that is saved to it, even if the power to the
computer is lost, while the data on the primary storage devices will be
lost.
BACKUP DEVICES
Backup refers to the process of making copies of data or data files to
use in the event the original data or data files are lost or destroyed or
storing the copies in a different place from where you keep your
computer.
Magnetic tape has a very large storage capacity (up to 180 TB), but
can be destroyed very easily and the data can be lost.
Online storage is an option and online storage providers (such as
Amazon AWS) have relatively inexpensive packages available for
storage and archiving.
Activity 3.1
1. Multiple choice:
a. Which of the following cannot be used to back up files?
A. External HDD
B. USB drive
C. Optical disc
D. RAM
b. Which of the following is the most expensive storage?
A. RAM
B. HDD
C. SSD
D. iCloud
c. Which of the following is secondary storage?
A. RAM
B. CPU
C. HDD
D. ROM
2. Match Column B with Column A:
3. Write True or False next to the question number. Correct the statement if it is
FALSE. Change the underlined word(s) to make the statement TRUE. (You may
not simply use the word NOT to change the statement.)
a. Primary storage is accessed by the motherboard.
b. Magnetic tape has a very large storage capacity but can be easily destroyed
and the data can be lost.
c. Online storage has limited space and you must pay to get more space.
d. The main purpose of primary storage is to store data for a long period of
time.
e. Archiving is the short-term storage of information.
4. Answer the following:
a. What is the main purpose of primary storage?
b. Briefly describe the difference between primary and secondary storage.
c. What is the difference between backing up and archiving data?
d. What storage devices would you recommend to someone who needs to store
data on a server and someone who wants to store copies of their digital
photographs? Motivate your answer.
UNIT
3.2 Processing devices
MOTHERBOARD
The motherboard is one of the most essential parts of a computer. It
holds many of the components that allow a computer to function, such
as the CPU, RAM and the connectors for input and output devices.
Figure 3.1: Computer motherboard with components
https://www.youtube.com/watch?
v=cNNtTXABUA
All instructions, whether they have been generated by the system or the user, go
through the CPU. This could be anything from the operating system executing a
task to the user typing letters in a document.
A core is usually the basic computing unit of the CPU. A single core can run a
single program, problem or context. A CPU may have one or more cores to perform
tasks at any single time. Original CPUs had single cores, but manufacturers began
adding more cores to increase the performance of the CPU. A CPU with two cores
can split the task into two tasks and thereby complete it faster. This speeds up the
computer because it is, essentially, able to multitask.
A dual-core processor has two cores, so it looks like two CPUs to the operating
system. A quad-core CPU has four cores, an octa-core CPU has eight cores,
and so on. These cores also make sure that the CPU is still small enough to fit into
a single socket, taking up less space on the motherboard.
Using what you have learned so far in this chapter, you will be able to
interpret any advertisement by looking at the following key pieces of
information:
How fast is the CPU in the computer? Remember that the faster the CPU works, the
faster your computer will be able to process data. So, a 3 GHz processor is twice as
fast as a 1,5 GHz one. In this example, the CPU speed is up to 3.10 GHz.
How big is the memory? The more RAM you have, the more programs and
applications you can run at once. Most computers come with 4 GB of RAM, which
is good for users who do not need to do much more than check emails or create
some documents. Users who need their computer to do slightly more can look at
getting 8 GB of RAM, while 16 GB is good for those who will often be using more
memory-intensive programs on their computers (such as games and videos and
photo-editing software). In this example, the memory is 8 GB RAM.
How much storage capacity does it have? Most computers come with a fairly large
hard drive (about 500 GB). You can also buy external hard drives that can store
terabytes of data. Make sure you get one that will suit your needs. In this example,
the storage capacity is 1 TB.
Which operating system does the computer use? The latest operating system will
be more compatible with new programs, and will be more secure and able to
support the drivers for your hardware. In this example, Windows 10 Home is used.
Activity 3.2
1. Multiple choice:
a. The start-up process is stored on which hardware component?
A. BIOS
B. RAM
C. ROM
D. CPU
b. The speed of a CPU is measured in?
A. GHz
B. MHz
C. Hz
D. Calculations per second
c. The various components of a motherboard are connected by which metal?
A. Sulphur
B. Copper
C. Silica
D. Silver
2. Match Column B with Column A:
3. Write True or False next to the question number. Correct the statement if it is
FALSE. Change the underlined word(s) to make the statement TRUE. (You may
not simply use the word NOT to change the statement.)
a. The motherboard distributes power to the computer.
b. The RAM is stored on the BIOS chip.
c. The motherboard is the brain of the computing operation.
d. Temporary files are stored on the CPU.
e. Data stored on the RAM is permanent.
4. Answer the following:
a. Briefly describe the role and function of the motherboard and CPU.
b. Explain RAM.
c. Describe ROM.
d. Which questions should you ask yourself when looking at an advertisement
for a computer?
UNIT
3.3 Basic troubleshooting
FORMATTING
Formatting means preparing a disk to store data. Some disks, such as
flash disks or hard drives, may need to be reformatted from time to
time. Formatting will erase any data that is on the disk, so you will need
to back up the data up before you format.
FORMATTING A DISK
To format a disk, you must do the following:
Step 1: Click on the Search icon on the bottom left corner of your screen.
Step 2: Type in format.
Step 3: Select Create and format hard drive partitions.
Step 4: This opens the Disk Management dialogue box.
Step 5: Right-click on the disk you want to format and click on Format.
Step 6: Choose NTFS (new technology file system) as the file system and select
Default as the Allocation Unit Size.
Step 7: Click OK to format the drive. BE VERY CAREFUL AS THIS ACTION WILL
DELETE ALL DATA ON THE DRIVE.
DISK SCANS
Disk scans can help detect and fix errors in USB flash drives, hard
drives and SSDs. There is a disk scanner built into Windows 10.
DISK CLEANUP
While you are using your computer, you generate many types of files.
These files take up space on your computer, making it slower. In Grade
10, you learned how to zip and unzip files, but this may not be enough
to speed up your system.
Windows 10 also has a built-in disk cleanup tool that will delete the
following:
Temporary files from the internet.
Deleted files and folders in the recycle bin.
Temporary files created by the operating system.
The component of the operating system you are not using.
Applications or programs that you do not use.
Figure 3.4: Disk cleanup helps with freeing up space on your computer
Activity 3.3
REVISION ACTIVITY
QUESTION 1: MULTIPLE CHOICE
1.1 Which of the following is an example of primary storage?(1)
A. Motherboard
B. ROM
C. CPU
D. USB
1.2 Which of the following types of storage is volatile? (1)
A. ROM
B. Internal HDD
C. RAM
D. Internal SSD
1.3 Which of the following is involved in the start-up of a computer? (1)
A. CPU, ROM
B. RAM, ROM
C. RAM, CPU
D. HDD, ROM
1.4 When you look at a computer advertisement, what are the most important
things to look at? (1)
A. Storage, operating system, brand
B. Memory, processing speed, external hardware
C. Software, operating system, memory
D. Processing speed, storage, memory
1.5 Formatting means ______ a disk to store data. (1)
A. Priming
B. Preparing
C. Saving
D. Processing
Look closely at the advert below and answer the following questions.
5.1 What is the speed of the CPU in the computer? (1)
5.2 How big is the volatile memory? (1)
5.3 How much storage capacity does the computer have? (1)
5.4 Which operating system does the computer use? (1)
5.5 What does the 15.6” specification in the advert refer to? (1)
5.6 What does the 1366 × 768 specification refer to? (1)
5.7 What does the SSD acronym stand for? (1)
5.8 Give TWO reasons why users would prefer an SSD instead of an HDD? (2)
5.9 Suggest ONE way you can use to transfer data from this computer. (1)
QUESTION 6: SCENARIO-BASED QUESTIONS
Ronaldo has recently bought a new external hard drive for his laptop computer,
since his laptop has started running out of space. Ronaldo’s laptop has an SSD
with a storage capacity of 500 MB, while his new external hard drive has a storage
capacity of 1 GB.
6.1 Which of Ronaldo’s storage devices has the longest lifespan? Give one
reason for your answer. (2)
6.2 When Ronaldo connects his external hard drive to his laptop, his laptop
detects it but cannot read it. What should Ronaldo do to work out what is
wrong with the external hard drive? (1)
6.3 Ronaldo finds out that he should format his new external hard disk. Why
should he do this? (1)
6.4 Over the past three years, Ronaldo’s laptop has become slower. Mention
three things that might be causing this. Also provide a possible solution to
each problem. (6)
TOTAL: [40]
INTRODUCTION
In Grade 10, you learned about what software is. Software is the
programs that contain the instructions you use to tell the computer
what you want it to do. There are two types of software:
1. Application software allows you to perform tasks on the computer, for example,
playing music or games and creating presentations, spreadsheets and
documents.
2. System software controls and manages the operations of the computer.
Application software is the most useful type of software and the one
that you interact with the most. There are different types of application
software, for example:
Word processors, such as Microsoft Word or LibreOffice Writer.
Office suites such as Microsoft’s Office Suite, which contains programs such as
Word, PowerPoint and Excel.
Internet browsers such as Google Chrome and Mozilla Firefox.
Movie and media players such as VLC media player and Windows Media Player.
System software manages the computer and the flow of data and
information by:
Translating instructions from the software to the hardware.
Sending the right instructions to the right hardware to complete the task.
Receiving information from the hardware and sending it to the software.
Allowing different applications to communicate with each other.
Checking the condition of the hardware and the software.
UNIT
4.1 The role of application software
There are different types of application software. Table 4.1 has a list of
some of these types and descriptions of what they do. This list is by no
means a full list of application software, since there is software for
everything you do on your computer and there are many different
variations of the same type of software.
Table 4.1: Types of application software
UNIT
4.2 Collaboration and communication
software
MULTIMEDIA SOFTWARE
Multimedia refers to integrating multiple forms of media into a single,
often digital, product. This could be a PowerPoint presentation that
includes videos and audio clips, a Word document with animations
and images, or a web page with interactive elements.
Something to know
You may have noticed that in the examples given above, the name Adobe pops up
quite often. Adobe Systems was founded by John Warnock and Charles Geschke in
1982, after they left the Xerox company to open a new company to sell their
product PostScript.
PostScript was a powerful computer language that described the layout of a page
to a printer, allowing the printer to reproduce in hard copy exactly what was on the
digital page.
PostScript allowed laser printing to become a reality, since the program could
guide the lasers to draw the digital page on the printer’s drum correctly. Soon,
PostScript became a staple in the advertising industry, since it allowed
advertisement creators to quickly print out a copy of their advert to see what it
would look like on a page.
Their next revolution was the Type 1 typefaces, which provided digital fonts that
could be printed at any resolution. This was ground-breaking, because at the time
more elaborate fonts would have to be lettered by hand and could only be printed
at higher resolutions or they would lose their detail. The Type library soon became
the largest collection of typefaces for personal computers in the world.
The introduction of Adobe Illustrator brought the ability to create detailed and high-
quality digital drawings, which changed the face of advertising and marketing
forever. Images could be created, manipulated, edited and updated quickly and
more easily than traditional by-hand drawings.
Each new version of Adobe’s products and each new product they bring out makes
creating high-quality multimedia content easier and faster and their products
remain some of the most popular multimedia software available.
COMMUNICATION SOFTWARE
Communication software is the group of applications that allow users
to share files, text and video or audio messages over an internet
connection. It is more than just email; communication software
includes Voice over Internet Protocol (VoIP) systems and chat
programs. Some examples of communication software are:
Email clients such as Outlook.
VoIP software such as Skype and RingCentral.
Chat applications such as Slack and WhatsApp.
Activity 4.1
1. Multiple choice:
a. Which of the following video players is only available on the World Wide
Web?
A. VLC media player
B. YouTube
C. Windows Media Player
D. iTunes
b. Which of the following is not antivirus software?
A. NOD32
B. Avast
C. AVG
D. AMG
c. What is the file extension for animated images?
A. *.jpeg
B. *.mp3
C. *.gif
D. *.mp4
2. Match column B with column A:
The huge variety of application software available and all the versions
of the same software mean there are bound to be compatibility issues,
even when people are using the same kind of software. Compatibility
issues come up when users are using the same type of software for a
task, such as word processors, that cannot communicate with each
other. This could be due to a difference in their versions or because
they are made by different companies.
In Microsoft Word for example, documents created in Word 2016 or 2013 can be
opened in Word 2010 or 2007, but some of the newer features (such as collapsed
headings or embedded videos) will not work in the older versions.
If someone using Word 2016 opens a document created in Word 2010, the
document will open in Compatibility Mode. Microsoft Office does this to make sure
that documents created in older versions still work properly.
UPDATING SOFTWARE
More and more software providers are offering subscription services for
their software. An example of this is Microsoft’s Office 365, which gives
you the full range of Microsoft Office products and access to
Microsoft’s online productivity tools, such as OneDrive (their cloud
storage service). Since Office 365 is a subscription service, you never
truly own the software and will need to renew your subscription every
year, but the software is updated once a month to make sure that you
have access to the latest features.
If the application informs you that an update is available with a link, download the
newest version and install the downloaded program. This will update the program
to the newest version without changing your settings.
If a program you use often does not inform you about an update, search the
internet once or twice a year to see if a new version has been released. If it has,
download this version and install it to update your software.
SPs often include new features as well as fixes. This is why one version
of a program or operating system can be very different to another on a
different computer.
Most, if not all, operating systems and software programs provide SPs
free of charge as either a manual update from the developer’s website,
or through an auto-update feature within the program or operating
system.
Something to know
Since releasing Windows 10, Microsoft has moved away from SPs and instead
releases regular major features updates.
Activity 4.2
1. Write True or False next to the question number. Correct the statement if it is
FALSE. Change the underlined word(s) to make the statement TRUE. (You may not
simply use the word NOT to change the statement.)
a. Microsoft Office 2016 is an example of a subscription service.
b. Microsoft refers to their patches as hotfixes.
c. An installed service pack (SP) also usually updates the version number for
Microsoft Office.
d. Most SPs are provided for a fee.
2. Answer the following questions in your own words:
a. Explain what a compatibility issue is.
b. Describe what backwards compatibility is.
c. Why are more software companies offering subscription services for their
products?
d. Elaborate on the main difference between buying software and using a
subscription service.
UNIT
4.4 Software for physically challenged
users
In this unit, we will take a closer look at the software incorporated into
most software for able-bodied users that makes it easier for physically
challenged users to use.
Each assistive technology input and output device comes with
specialised software to interpret the input correctly to give the correct
output. For example, text-to-speech software converts text on a page
to speech, allowing visually impaired users to “read” the page. Some of
the more complex input and output devices, such as gesture-
controllers and sipand-puff devices, need specific software to work
correctly. This software is usually included with the devices.
While alternative input and output devices and accessibility software are important
components in giving physically challenged users the opportunity and ability to use
computers, these devices cannot work properly if the information they are
interacting with has not been put together with accessibility in mind.
This is especially important when it comes to accessing the internet. Screen
readers can struggle with interpreting websites that have not been designed for
visually impaired readers. Since websites and web pages are mostly designed as a
visual experience, users who cannot see these visual elements struggle to interact
with the sites.
There are, however, ways that designers and developers can make their websites
more accessible to visually impaired or blind users, for example:
Giving links and buttons descriptive labels (saying “click here to sign up” instead
of just “click here”)
Giving images and graphics good descriptions and Alt Text.
Using headings to organise the content on a website’s pages.
Using descriptive titles for pages.
Closed captions, which describe all the audio elements of a video and not just
the dialogue, can also help deaf and hearing-impaired users watch videos and
learn from them.
https://youtu.be/7Rs3YpsnfoI
You can see what range of accessibility options your computer has by
clicking on the Windows icon, searching for Control Panel and clicking
on Ease of Access.
Activity 4.3
2. Write True or False next to the question number. Correct the statement if it is
FALSE. Change the underlined word(s) to make the statement TRUE. (You may not
simply use the word NOT to change the statement.)
a. To find accessibility options, you need to click on Ease of Use.
b. Speech recognition software reads text aloud for blind users.
c. Closed captions can help deaf and hearing-impaired users watch videos.
3. Answer the following questions in your own words:
a. What are accessibility settings? Give two examples.
b. How do you access the accessibility features in Windows 10?
c. Give one example of software for physically challenged users.
d. Why is it important to design websites with accessibility in mind?
e. List four ways in which website developers can make their websites more
accessible.
UNIT
4.5 Cloud-based applications
With the rise in internet access and smartphone use, more people are
turning to online or cloud-based applications to get their work done,
since they can access these programs wherever they are as long as
they have an internet connection. Cloud-based applications are any
applications that are accessed using an internet connection instead of
being stored in a device’s memory.
Gmail, Google’s online email client, was more popular in 2018 than
Microsoft’s Outlook. Online service providers are also offering cloud-
based applications to businesses.
GOOGLE G SUITE
Google’s G Suite is a free, online-only office suite. You can use it (with
Google Docs and its companion applications Google Sheets and
Google Slides) to create more or less the same documents you can
create using more traditional desktop office suites (such as Microsoft
Office). Google G Suite is offered with Google Drive, Google’s cloud
storage platform, and Gmail.
To access Google Docs, you will need to go to Google Drive. You can do this by
clicking on this icon in your Gmail account, followed by clicking on Google Drive.
You need to set up a Gmail account to get access to Google Docs.
You are also able to share this software across multiple devices you
own, for example a laptop, smartphone and tablet.
Activity 4.4
1. Multiple choice:
a. Which of the following is Google’s online storage service?
A. Google Drive
B. Google Docs
C. Chrome
D. OneDrive
b. Which of the following is NOT part of the Microsoft Office 365 package?
A. Outlook
B. OneNote
C. PowerPoint
D. Notepad
c. Which application does not need an internet connection to work?
A. Notepad
B. Google Docs
C. Office 365
D. Google Maps
2. Match Column B with Column A:
3. Write True or False next to the question number. Correct the statement if it is
FALSE. Change the underlined word(s) to make the statement TRUE. (You may
not simply use the word NOT to change the statement.)
a. You have access to a full range of formatting options in Google Docs.
b. Microsoft Office 365 is a free service.
c. You can use Office 365 on multiple devices.
d. Google Docs is a free, online-only office suite but you pay for extra storage.
e. Google Drive is separate from your Gmail account.
4. Answer the following questions in your own words:
a. Explain what a cloud-based application is.
b. List the steps taken to access Google Drive and open a spreadsheet.
c. List two advantages Google Docs has over Microsoft Word.
UNIT
4.6 Online storage
While storing information online seems like you are sending your
information into the cloud, you must remember that this information
does get stored on a physical computer somewhere, usually on a
server in a server farm.
Figure 4.4: Online storage services include Apple iCloud, Google Drive and
Dropbox
Activity 4.5
1. Multiple choice:
a. Which of the following is not an example of online storage?
A. iCloud
B. Google Drive
C. Google Docs
D. Dropbox
b. Which of the following has potentially the largest storage space?
A. Primary storage
B. Cloud-based storage
C. External HDD
D. SSD
2. Match Column B with Column A:
3. Write True or False next to the question number. Correct the statement if it is
FALSE. Change the underlined word(s) to make the statement TRUE. (You may
not simply use the word NOT to change the statement.)
a. Online storage has limited free space and you pay to get more space.
b. Dropbox is only compatible with the Microsoft Windows operating system.
c. Spotify songs are stored on a cloud-based storage system.
4. Answer the following:
a. Explain how your data can potentially be lost when using cloud storage.
b. List THREE advantages of cloud-based storage.
REVISION ACTIVITY
4.5 Your teacher has asked you to create a presentation that includes at least
one video, some audio clips and an animation. Which three software
programs will you use to make these multimedia items and why? (6)
4.6 Describe the difference between a service pack and a patch. (4)
4.7 Provide two reasons why it is important to update your software regularly.(2)
4.8 Give one advantage Microsoft Word has over Google Docs. (1)
TOTAL: [40]
List and describe basic system requirements and how they relate to software
Discuss the difference between installing software from an online download and
a portable storage medium
Describe the installation process
Explain how to manage files and folders on a computer
INTRODUCTION
In this chapter, you will learn what basic system requirements are and
how they link to software. You will learn how to install software from a
portable storage medium (such as a CD) and from an internet
download, as well as dig deeper into file management and what file
attributes are. You will also learn how to import and export files and
how to search for files.
UNIT
5.1 Basic system requirements
System requirements are the minimum necessary specifications that
you will need to make sure that the software runs smoothly and does
not overwork the hardware on your computer. It is basically a list of
what you need to make sure that a game or program runs properly.
If your computer does not meet these requirements, you may not be
able to install the software or, if you can install the software, it may run
slowly. The system requirements for software are usually printed on the
package that the software comes in or are listed on the software’s
website.
Figure 5.1 below shows the list of system requirements for installing
Photoshop.
Knowing what the system requirements are for the software you will be
using most often will help you decide what computer to buy when you
are shopping for one. Most of the information you will need will be on a
label on the computer or will be listed in an advertisement for the
computer.
System requirements will also let you know if you need to purchase
any additional hardware (such as microphones when using audio
recording software). Hardware items, such as printers, also come with
system requirements. For example, a printer may only be compatible
with Windows 8.1 and 10 or Apple’s macOS and cannot be connected
to a computer running Windows 7.
For your computer to be able to run all the newest gaming software,
you would need to look at the graphics card. A GPU is a
programmable logic chip to render images, animations and video for
the computer’s screen. GPUs can be located in plug-in cards, in a
chipset on the motherboard or in the same chip as the CPU. The
gaming software’s system requirements will recommend the size of the
additional GPU.
If your computer does not meet all the requirements to run specific
software or communicate with a specific device, you will not
necessarily have to buy a whole new computer. It is possible to
upgrade your RAM, GPU or CPU. You can, for example, upgrade your
operating system or you can install the latest device drivers to make
sure that your computer and hardware can communicate with each
other.
Activity 5.1
UNIT
5.2 Software installation
Once you have worked out what requirements you need to install
software, you will need to begin the installation process. Before
installing the software, you need to:
1. Download the software files from a website; or
2. Purchase a CD or DVD from a store.
After downloading the installation software, you can install it. Usually
this installation software is an installation wizard to assist you with the
installation process.
ONLINE DOWNLOAD
The most common way to get new software is to download it from the
internet. To do this, you must go to the website where the software is
available and download the files. Make sure that you download
software from trusted publishers or verified retailers only. This ensures
that you are getting the software you want and that you do not
accidentally download malware or a virus.
You will usually use a credit card to buy the software to download.
Once you have purchased the software, you will click on the download
link to begin the process.
You can also buy software from app stores, such as Google’s Play
Store, Apple’s App Store or the Windows Store. The software you are
looking for is usually sorted according to its category, for example,
gaming, word processing or design.
DOWNLOADING CHROME
To get this software, you will need to go to a store and buy the product
and bring it home with you to install. You do this by inserting the disk
into your computer’s optical disk drive (its CD or DVD player). The
installation program will usually start automatically but you can also
look for the setup program to start the installation.
UNINSTALL A PROGRAM
Step 4: Click on Apps & Features in the left pane. A list of all installed apps will
appear.
Step 5: Click on the one you want to uninstall and then click on the Uninstall
button (if this button is greyed out, it is a system app and cannot be
uninstalled).
Step 6: Click on Uninstall in the pop-up window that appears and wait for the
system to uninstall the app.
Activity 5.2
1. Write True or False next to the question number. Correct the statement if it is
FALSE. (You may not simply use the word NOT to change the statement.)
a. You completely eradicate the associated files and folders when you uninstall
a program.
b. Some installation software files are sold on a flash disk.
c. The installation wizard will guide you through what to do when installing
software.
d. Most hardware is already installed on the Microsoft operating system, thus
most hardware are plug-and-play devices.
e. Most primary hard drives are saved with the drive location of E:\.
UNIT
5.3 File management
When you are setting up a file management system, there are several
key things you need to look out for. You will need to know what types
of files you are creating and how big those files are (so that you know
how much of your computer’s resources they are using).
It also helps you to understand certain attributes that files have, such
as hidden and read-only, and how to import/export files and how to
search folders and drives for a specific file. This section will look at
these aspects of files.
FILE TYPES
In Grade 10, you learned about file extensions and how they give you
an idea of what content is likely to be in the file. File extensions usually
link to a specific file type. For example, seeing a file that ends in .docx
will let you know that it is a Microsoft Word document. File types
indicate the specific characteristics of a document and will let the
operating system know which program to use to open that file.
Something to know
When you are organising files, you can either organise them by file type
or by subject.
PROPERTIES
The file Properties window shows you a range of information about a
file, such as its file type, size and when it was last modified. It can also
show you information on where a photograph was taken (its geo-
location) and even what type of camera was used to take it. The
Properties window will also give you information on how you can
manipulate the file.
FILE PROPERTIES
2. Click on Properties.
The Properties dialog box will give you information about the file, as
you can see in the example above.
The General tab shows you the basic information about the file,
including its name, size and location on the C:\ drive. It also shows
attributes such as “read-only” and “hidden”. Clicking on Advanced will
show you more attributes for the document. We will discuss these in
more detail later on in this unit.
The Security tab allows you to change what access the system and
other users have to the file. The Details tab gives you more in-depth
details about the file, including its word count and what template was
used to create it. The Previous Versions tab allows you to see if there
are other versions of the file.
FILE ATTRIBUTES
File attributes are settings linked to computer files that give or deny
certain rights to how a user or the operating system can access that
file. There are several types of file attributes, but the most important are
“read-only” and “hidden”.
Read-only files cannot be changed, edited or saved. They can only be
opened and read. This is done to protect the data in the file from being
edited accidentally. Hidden files are any files with the “hidden” attribute
turned on. This means that these files are invisible while browsing
through folders – you cannot see them without specifically allowing all
of them to be seen.
You can also use this function to convert files from one file type to
another. Importing files also allows you to quickly and easily move your
files from one computer to another, especially if you are moving from
an Apple product to a computer that uses the Microsoft Windows
operating system.
SEARCH
You can use File Explorer to search for a file you saved. This is
especially helpful if you have many files or you have forgotten where a
particular file is stored. If you remember the file name, you can simply
enter that in the search box in File Explorer.
You can also search by file type or size. Using an asterisk wildcard (*)
will let you search for groups of files, for example:
*.txt searches for all text files.
Home* will search for all files that start with “home”, such as homework.docx or
homedesign.psd.
Activity 5.3
1. Multiple choice:
a. Which attribute allows the user to view but not edit the file?
A. Hidden
B. Security
C. Read-only
D. Sharing
b. Which one of the following file extensions is not used in typing a report?
A. .txt
B. .docx
C. .pdf
D. .png
c. Which of the following file extensions is not part of the Microsoft Office 365
package?
A. .txt
B. .docx
C. .xlsx
D. .pttx
2. Match Column B with Column A:
3. Write True or False next to the question number. Correct the statement if it is
FALSE. (You may not simply use the word NOT to change the statement.)
a. You can find a complete list of all file types at FileInfo.com.
b. The file extension can indicate what type of data is on the file as well as what
program is needed to open the file.
c. The most important file attributes are security and sharing.
4. Answer the following in your own words.
a. How do file extensions help you identify the type of document?
b. Give two examples of standard file types.
c. What does the Properties window tell you about a file?
d. Explain how you can see the file properties of a document.
e. What are read-only and hidden files?
f. Explain how you search for a file in Windows 10.
REVISION ACTIVITY
QUESTION 1: MULTIPLE CHOICE
1.1 Which of the following is not a system requirement? (1)
A. Type of CPU
B. Type of RAM
C. Type of operating system
D. Storage capacity
1.2 A hidden file is ___________. (1)
A. A file that cannot be changed
B. A file that cannot be edited
C. A file that will not display
D. A file that cannot be saved
1.3 A software installer will use ___________. (1)
A. A password
B. An online verification system
C. A CD
D. An installer wizard
1.4 Which of the following is an example of a program setup file? (1)
A. Word.docx
B. Photoshop.psd
C. Chrome.exe
D. Notepad.rtf
1.5 A license agreement indicates the manufacturer’s __________. (1)
A. Terms of use
B. Contact details
C. Rules and regulations
D. Terms of agreement
QUESTION 2: TRUE OR FALSE
2 Write True or False next to the question number. Correct the statement if it is
FALSE. Change the underlined word(s) to make the statement TRUE. (You
may not simply use the word NOT to change the statement.)
a. Before a person can use installed software, he or she must accept the
license agreement. (1)
b. Uninstalling software involves removing the program and all its files from
your computer. (1)
c. File properties are settings linked to computer files that give or deny
users access to certain rights. (1)
d. Importing a file converts it from one format to another. (1)
e. Windows Explorer is used to search for files on a computer. (1)
INTRODUCTION
This chapter will focus on input and output devices for physically
challenged users, the health issues associated with hardware devices,
how to protect your devices from theft or damage and how to protect
your devices from power surges and power failures.
UNIT
6.1 Input and output devices for
physically challenged users
INPUT DEVICES
Braille keyboard
On-screen or virtual keyboards
Microphones
Keyguards
Head-mounted pointers
Gesture-recognition devices
Sip-and-puff devices
Keyboard and mouse settings can also be customised to make input
easier for physically challenged users. Sticky keys allow users to use
common keyboard shortcuts without needing to hold down all the keys
at the same time, for example, when using the Paste command, users
do not need to hold down the Ctrl and V keys at the same time. They
can instead press the keys one at a time.
OUTPUT DEVICES
Physically challenged users can also use a variety of output devices to
access information on their computers. Headphones and speakers
can, for example, be used with various types of screen-reading
software, such as screen-magnifying programs or physical magnifiers
mounted onto their screens, to make sections of the screens easier to
read.
Braille interfaces work by raising metal or plastic pins on a surface,
allowing blind users to read what is on their screens. These devices
can only read basic text documents.
Activity 6.1
1. Multiple choice:
a. Stephen Hawking was diagnosed with?
A. ALS
B. ADHD
C. CTS
D. Parkinson’s disease
b. Which of the following is NOT a device for the physically challenged?
A. Microphones
B. On-screen or virtual keyboards
C. Monitor
D. Keyguards
2. Match Column B with Column A:
3. Write True or False next to the question number. Correct the statement if it is
FALSE. Change the underlined word(s) to make the statement TRUE. (You may
not simply use the word NOT to change the statement.)
a. Braille interfaces are for deaf people.
b. The Paste keyboard shortcut uses the Ctrl + P keys.
c. Sighted users may not be able to use screen readers.
4. List the advantages and disadvantage of the following devices:
a. On-screen or virtual keyboards
b. Braille keyboards
c. Head-mounted pointers
d. Gesture-recognition devices
e. Sip-and-puff devices
UNIT
6.2 Health issues due to input and
output devices
With more and more people using computers in their daily lives, certain
health issues surrounding computer use have come up in recent years.
Some of these have to do with the impact that using a computer has
on your body, for example, repetitive strain injuries (RSIs) to wrists
and back and eye strain from bad posture and lighting.
This section looks at how to prevent these health issues to make sure
that you stay healthy.
ERGONOMICS
Ergonomics is concerned with how to design/arrange furniture and
equipment in a way that will make people more comfortable and
efficient in their work. It also looks at how people interact with their
input and output devices to minimise the amount of physical strain
placed on their bodies. Therefore, ergonomically designed computer
mice, keyboards, desks and chairs have been developed to reduce
RSIs, carpal tunnel syndrome and back strain.
Ergonomics also determine how people should sit (their posture), how
they should look at a screen and how often they should get up.
Figure 6.3: Good ergonomics
https://www.youtube.com/watch?
v=bLBKUbnLYTs
Computer and smartphone screens can be set to have less blue light,
lessening the glare and reducing eye strain. They can also be tilted until
you find a comfortable viewing angle.
Activity 6.2
1. Multiple choice:
a. Which of the following equipment does not carry a lot of germs?
A. Smartphones
B. Computer mice
C. Keyboards
D. Monitors
b. Which one of the following is not an effect of sitting for too long in front of a
computer?
A. Obesity
B. Increased blood pressure
C. Hair loss
D. High blood sugar
c. Which of the following is not an injury due to improper ergonomics?
A. Repetitive strain injury
B. Computer vision syndrome
C. Repetitive strain injury
D. Back strain
2. Write True or False next to the question number. Correct the statement if it is
FALSE. Change the underlined word(s) to make the statement TRUE. (You may
not simply use the word NOT to change the statement.)
a. Repetitive strain injuries and eye strain are examples of health issues due to
input and output devices.
b. Hardware needs to be protected from theft and damage.
c. Computer and smartphone screens can be set to have less red light,
lessening the glare and reducing eye strain.
d. You will have good back support when you place your hips and back on the
back of the chair.
3. Answer the following questions in your own words:
a. Define ergonomics.
b. List two ways that you can keep your hardware clean and hygienic.
c. List three ways that you can reduce the amount of strain on your body.
UNIT
6.3 Protecting your hardware
Knowing how to protect your hardware so that it carries on working
correctly is as important as knowing what hardware is used for and the
health risks associated with using input and output devices. This unit
looks at protecting your hardware from theft, damage and power
surges. You will also learn about the optimal power settings for your
devices and how your devices can contribute to energy savings.
HARDWARE PROTECTION
Hardware needs to be protected from two major things, namely theft
and damage. Because your hardware is expensive and sensitive
equipment, you must make sure that you do your best to keep it safe
and in good working condition for as long as possible.
To protect your hardware from everyday wear and tear, you should
keep the following in mind:
Always use a screen protector and case for smartphones and
tablets.
Avoid spilling liquids on keyboards and mice.
Make sure that any device drivers you need are up to date and
correctly installed.
Activity 6.3
UNIT
6.4 Power supply and settings
Each piece of hardware you use will need to draw on some kind of
power to operate, whether it is plugged directly into a power supply
(such as monitors and desktop computers), operates with batteries
(such as most wireless devices and smartphones, tablets and laptops),
or draws power from the computer it is plugged into (such as wired
keyboards and mice).
You should adjust your screen brightness to suit the area, time of day
and lighting. Even lowering the brightness by a small amount can save
power and limit the strain you put on your eyes.
When you buy new hardware, you should look for devices that have an
Energy Star rating. Devices with an Energy Star rating are usually
more energy efficient, meaning they use less energy to perform the
same tasks as devices that are not rated.
HOW TO PROTECT YOUR DEVICES FROM POWER
FAILURES
Uninterruptible power supplies (UPSs) can protect your devices from
unexpected power failures and even power surges. UPSs are plugged
directly into the main power supply to charge their batteries and will
immediately start providing power to the computers connected to
them in the case of a power failure.
Activity 6.4
1. Write True or False next to the question number. Correct the statement if it is
FALSE. Change the underlined word(s) to make the statement TRUE. (You may
not simply use the word NOT to change the statement.)
a. Devices with an Energy Star rating are usually more energy efficient.
b. All the data on your hard drive will be lost in case of a power failure.
c. Your display should never be brighter or darker than the area you are using it
in.
2. Answer the following questions in your own words:
a. Describe a UPS.
b. Explain how you would protect your device from power failure.
REVISION ACTIVITY
In 1973, the Defence Advanced Research Projects Agency (DARPA) in the United
States began researching the techniques and technologies needed to develop
communication protocols that would allow computers in the same network to
communicate with each other across multiple linked networks. This was called the
“Internetting” project and it resulted in what we know as the internet today. This
was also the first functioning example of LANs communicating with each other.
Before this, computers could only communicate with each other if they were
connected in the same network.
INTRODUCTION
In Grade 10, you learned about home area networks (HANs) and
personal area networks (PANs). HANs are very small networks that
usually cover a single home. PANs, on the other hand, are much
smaller and are usually designed to serve a single user.
In this section, you will learn about local area networks and wide area
networks and how they are generally used.
https://www.youtube.com/watch?
v=nojwX3_XZBs
UNIT
7.1 Networks
TYPES OF NETWORKS
LANs may serve only one or two users (for example in a home) or they
can serve hundreds of users (in an office building or on a school
campus). No matter how many users LANs serve, they are all designed
to share resources such as internet connections, printers or server
connections. Most LANs use either wireless or wired connections or a
combination of the two to connect devices. For example, desktop
computers and laptops can be connected to the network with cables
while the printer and mobile devices are connected using wireless
connections.
Figure 7.1: A LAN in which computers are connected in the same room
Workstations will have input and output devices because they are
designed to be used by humans. Some workstations, such as those
designed to run computer-aided design (CAD) applications, will be
more powerful than the computers you can buy to use at home.
Servers are usually only used for one type of task, for example:
Email servers send and receive emails and store each user’s email
information (their email address, username and password). Email
servers can be local, such as those used by businesses, or global,
such as Gmail. You interact with email servers through an email
client, such as Microsoft Outlook or Gmail.
Web servers are where the World Wide Web is. You will use a web
browser, such as Google Chrome or Internet Explorer, to interact
with a web server. Web servers deliver web pages to you when you
request them, but they are also where you can upload data to cloud
storage systems or your own website.
Database servers are usually local servers that cannot be accessed
by users outside the network they are connected to. Users can
access database servers using specialised software (such as
Microsoft SQL) to interact with them.
A file server is a computer responsible for the central storage and
management of data files so that other computers on the same
network can access the files.
Something to know
NETWORK SOFTWARE
Network software refers to a range of software aimed at the design,
implementation and operation of computer networks. It exposes the
inner workings of the network to the network administrators, assisting
them in managing and monitoring the network. It also allows multiple
devices such as desktops, laptops, tablets, mobile phones and other
systems to connect to each other as well as to other networks.
COMMUNICATION MEDIA
Network connections can be wired or wireless. Wired network
connections use ethernet cables to connect all the devices in a
network, such as the computers, routers and switches. Ethernet
cables are made up of several twisted pairs of wires inside a plastic
casing and have a connector on either end called an RJ45 connector,
which plugs into network ports on the various devices.
ETHERNET VS WI-FI
https://www.youtube.com/watch?
v=I6wfN4Y7dOU
WIRED SPEEDS
For wired networks, the speed of the network is determined by the
rated speed of the cables you use. The most common cable speed is
1 Gb (gigabit), these cables can transfer 1 000 Mb data per second.
WIRELESS SPEEDS
The speed of wireless networks depends on the standards they use.
Wi-Fi standards are certified by the Institute of Electrical and
Electronics Engineers (IEEE). The main IEEE standard for wireless
networks is 802.11 and there are a number of specifications under this
banner.
Now that you have a better understanding of what a LAN is and how they are
created, you will be able to take what you have learned and use it to interpret
advertisements for network devices. There are several key pieces of information
you will need to look out for when it comes to deciding which networking devices
you want to buy.
Look at the rated speed for NICs and cables and match them to make sure that
your data is transferred as quickly as possible. Make sure that WNICs are using the
newest wireless standard (802.11ac).
NETWORK COMMUNICATION
Now that you understand how networks are connected, you need to
understand how the different components of a network communicate
with each other. Wired and wireless networks use very different
communication media to connect the various components.
WIRED COMMUNICATION
There are two types of cables that connect modern wired networks to
each other, namely unshielded twisted pair (UTP) cables and fibre optic
cables. UTP cables are commonly used to connect LANs and
telephone networks as they are easy to make and set up and are
relatively cost-effective.
They are made up of two cables that are twisted together (the twisted
pair) to cancel out electromagnetic interference from outside sources.
They are called unshielded because no extra interference shields, such
as metal meshes or aluminium foil, are added to the cables.
Fibre optic cables, on the other hand, are made of thousands of very
thin strands of pure glass, called optical fibres, inside an insulating
jacket. Instead of using electrical signals, fibre optic cables use light to
transmit data very quickly.
Fibre optic cables are largely replacing metal cables since they are
more flexible and lighter and can transmit data over longer distances
with lower rates of data loss. The most common application for fibre
optic cables is in internet connections.
COPPER VS FIBRE
https://www.youtube.com/watch?
v=Bw2NFBDxR8
WIRELESS COMMUNICATION
As you know, wireless connections allow you to transfer data over a
distance without using cables, wires or physical connectors. Most
common wireless communication uses radio waves to send data from
one point to another.
Activity 7.1
UNIT
7.2 Intranet vs internet
While they may sound like the same thing, there are actually a fairly
large number of differences between the internet and an intranet. In
this unit, you will learn about these differences as well as what an
extranet and a virtual private network (VPN) are.
INTRANET VS INTERNET
An intranet is a private, web-based network that is only available to an
organisation’s staff. Intranets work using internet protocols to share
data and information across the network. To put it simply, an intranet is
like a private internet. Very often, a company’s intranet will have
information on it that the company does not want the public to have
access to, such as employee contact details and calendars.
The internet itself is publicly accessible and is not the World Wide Web
(WWW), which is simply a way to access information over the internet.
Access to the internet is usually provided by ISPs.
INTRANET VS EXTRANET
https://www.youtube.com/watch?
v=zlEstGNVdwo
Activity 7.2
In our modern age, more and more of our important and personal data
is being stored digitally and hackers and other criminals want to get
hold of that information. That is why it is extremely important that the
networks we use daily are secured and protected.
In this unit, you will learn about the basics of passwords, usernames
and access rights, and how those three factors combine to secure a
network.
PASSWORDS
Passwords are the most basic form of network security. Passwords, at
their core, are a secret string of letters, numbers and symbols created
by users or generated by a computer to limit or restrict access to a
system.
More often than not, you will need to pick your own password to make
sure that it is something you can remember.
USERNAMES
Usernames are a unique identifier given to any person who uses a
secure computer network. Usernames are also called an account
name, login ID or user ID. Usernames are most commonly used with
passwords and can be used on computers or websites.
ACCESS RIGHTS
On a computer, for example, a user may only have access to a
personal folder where they can open, read, write, create and delete
files and folders. A user with administrative rights can access all the
files and folders on a computer and can make changes that will affect
all users.
Activity 7.3
1. Read the following case study and answer the questions which follow:
REVISION ACTIVITY
INTRODUCTION
We live in a digital world where everything about us, from our holiday
pictures to our names and ID numbers, is somewhere on a computer.
Companies are storing more of their private information on networks
and people are using cloud storage to save more of their personal
information online. With the click of a button, you can find out more
about strangers on the other side of the world than you ever could
before.
This is why network security is more important than ever. In this world,
where all the information you need about someone is so easily
available, attackers want to get their hands on this information and use
it.
UNIT
8.1 Social issues for networks
UNAUTHORISED ACCESS
Unauthorised access on a network is when someone gains access to
a network using someone else’s credentials or through other illegal
methods. Accessing a network, website, account or service that you
do not have permission to access is illegal.
The chances are very high that your school has an AUP that you had
to read and then sign or acknowledge in some way. This section will
look at the basics of AUPs for schools and what guidelines they should
contain. The AUP is there to protect the users (and the organisation)
when they use ICT facilities and when they are online.
ACCEPTABLE USE POLICIES OF SCHOOLS
In a school, an AUP can cover a wide range of computing devices and
networks and is a contract between the user (learner) and the
organisation (school) that outlines what the user can and cannot do on
a particular network.
Activity 8.1
UNIT
8.2 Network security
https://www.youtube.com/watch?
v=OQyXMYh6qLo
The first and most important is security software for your devices.
Firewalls are built into most routers and computers to stop unwanted
traffic getting onto your network. Firewalls are basically the security
guards of a network. Everything that comes into your network from the
internet should be going through a firewall.
Most organisations have network security policies that outline the rules
that are in place to protect the network. One of the most common
policies is to give staff a username that they can use to log into the
network and have them choose a password. When you need to
choose a password, there are a few things you must keep in mind:
The longer your password, the more difficult it is to crack. Make sure
your password is at least 10 characters long or use a passphrase
that is at least 15 characters long.
Make sure that your password is something you can remember
without needing to write it down. If you need to write your password
down, make sure that you keep it hidden and mixed in with other
notes, so it is not clear which one is your password. Keep these
notes away from your computer.
Do not use your name, a family member’s name or the name of a
pet. A password that cannot be linked to your personal information
is the best kind.
Your password should not be something easy to guess, such as
“password” or “12345”.
Make sure that your passwords are a mix of uppercase and
lowercase letters, numbers and special characters.
Make sure that your passwords do not follow a pattern on the
keyboard (such as “asdfgj”).
Never give out your password to anyone and try not to share your
account details with anyone.
You are responsible for keeping your password safe. Anything that is
done on a network using your password and username will be your
responsibility. To make sure your passwords are safe, you should
change them every two months or so and you should never use the
same password for different websites and networks.
Read the case study below and answer the questions that follow.
On the 25th of September 2018, Facebook announced that a security flaw in its
website allowed hackers to access the personal data of roughly 90 million users of
the social network. The attackers used a vulnerability in Facebook’s “View As” tool,
which allows users to see what their profile looks like to other people. By using this
vulnerability, the attackers stole Facebook access tokens that they could use to
take over almost 50 million user profiles.
An access token is a short line of code stored in your browser or device that keeps
you logged into your account without you needing to log in each time you want to
access the website that issued it. Facebook quickly patched the bugs in the code
that gave the attackers access and logged 90 million users out of their accounts
(the 50 million that were compromised and 40 million that were potentially
compromised) on the web and on their mobile devices. Users who were logged out
were greeted with a message explaining what had happened when they logged
back in and a link to more details about the breach. Facebook also temporarily
disabled the “View As” feature while they worked to patch up the code.
According to later reports, Facebook security personnel first noticed that something
was wrong when they spotted a spike in unusual activity on the 16th of September
2018 and began investigating. The vulnerability had been in place since July 2017,
which means that attackers could potentially have had access to the accounts for a
long time.
The attack also left vulnerable users’ other accounts where they had used
Facebook to login to those sites. Facebook advised users to change their
passwords and use their accounts’ security and login page to see where they had
been logged in with their Facebook credentials.
This data breach came hot on the heels of another scandal involving Facebook and
a company called Cambridge Analytica, where it was found that Cambridge
Analytica used the data from 50 million Facebook accounts, kept the data and used
it to influence the 2016 American Presidential Campaign.
1. Do you think that Facebook did the right thing by logging users out before
informing them of the data breach?
2. How do you think Facebook’s security team could have handled the
vulnerabilities better?
3. Do you think that Facebook is doing everything it possibly can to protect its
users’ privacy following the two major scandals?
4. What advice would you give to users whose accounts were affected by the
data breach?
https://www.youtube.com/watch?
v=6p_q_Xp--Rs
NETWORK SECURITY
Any time a network becomes accessible, it becomes vulnerable to
attack. This is especially true of networks that connect to the internet.
Another security concern for networks is making sure that the devices
that connect to them are not making them open to attacks.
Because of these issues, companies that use a BYOD policy must set
up a clear AUP for their staff regarding what they can and cannot do
with their devices.
PRIVACY ISSUES
With so much of what you do every day taking place on computers
and online, privacy and who has access to your information has
become a major issue. Networks have become powerful tools to
access, collect, store and share personal data. Very often this data is
used to provide a company’s customers with a better service, or to
make it easier and quicker for your doctor to access your medical
history, for example. But this data can also be used by cyber-criminals
to commit fraud or to steal.
It is the network owner’s responsibility to make sure that the data their
network stores and shares is accessed legally and that this data is only
used for what they say its use will be. It is also their responsibility to
make sure that this data is secure and safe.
PERSONAL RESPONSIBILITY
While it is true that network administrators must make sure that their
networks are secure, you also have a responsibility to make sure that
you do not expose a network you are using to attacks.
You do this by keeping the following tips in mind when using a
network:
Make sure that your devices have up-to-date antivirus software
installed and that you never click on suspicious links or reply with
personal information to suspicious emails.
Respect others’ privacy and products. Do not download or share
content that has been obtained illegally (such as pirated movies or
music) or content that violates someone else’s copyright.
Be careful what your share about yourself on the internet.
Follow the AUPs of any network you are using.
If you keep these tips in mind, you can help make the networks you
use more secure for everyone else.
Activity 8.2
1. What are the main concerns with BYOD policies in the workplace?
2. How can companies avoid security and usage issues in a BYOD environment?
3. List two tips you should keep in mind when using a network.
UNIT
8.3 Databases and Big data
DATABASES
Networks must be protected to safeguard the personal information
stored on them. This is especially true of networks that have
databases, since these are where personal information is stored.
Databases are often the targets of cybercrimes, so database security
is extremely important.
BIG DATA
Big data, a term that describes the massive amounts of data that are
generated every day by every single person, plays a major role in
privacy concerns. More and more companies are collecting this data
and storing it on databases to use in marketing or product
development. Big data is used in online services like:
Online banking: Proper analysis of big data can help detect any and
all the illegal activities that are being carried out, like the misuse of
credit cards, misuse of debit cards, customer statistics alteration and
money laundering.
Booking reservations: Big data from several sources has helped
travel agencies, hotels and the tourism industry better understand
what customers are looking for and this has led to more direct
reservations.
E-learning: Big data that is being collected is related to the students,
faculties, courses and results. This can provide insights to improve
the effectiveness of educational institutes.
Social websites: Users of social websites share photographs,
personal data and make comments on posts by other users. This
information is used by social websites to provides users with
personalised content and also to assist advertisers to hyper-target
users.
Activity 8.3
In small groups discuss if and how big data has social implications for:
Online banking
Booking reservations
E-learning
Video conferencing
Social websites
UNIT
8.4 Normal currency vs cryptocurrency
Activity 8.4
REVISION ACTIVITY
INTRODUCTION
There are two major factors that can lead to a computer giving you the
incorrect results when you enter data, namely human error and bugs.
In this chapter, you will learn about the effect that human error has on
data input and the accuracy of data, how data is verified and
validated, and what software bugs and hardware failure are and how
they can affect your computer.
UNIT
9.1 Human error
If the user makes a mistake when entering data, the computer will not
be able to pick up on that. This is why we verify and validate data
before analysing it.
UNIT
9.2 Verification and validation of data
DATABASES
As you learned in Term 1, a database is a collection of a large amount
of data, which is organised into files called tables.
When discussing data, you need to remember that there are many
different types of data. The most common data types, and the ones
you are most likely to deal with, are:
strings
numeric data
boolean data
date and time data.
Data verification is the process of checking that the data a user has
inputted is correct. This can be largely automated, providing someone
has set up the rules on the spreadsheet or database. For example, the
age range of high-school students is usually 14 to 18 and the
spreadsheet can be set up to only accept an age in that range. This is
called a range check. This does not always mean that the data will be
100% correct though. If a student is 15 and the user types in 17, the
data is still valid in the range, it is just not correct.
Data verification is mainly used when data is entered into a system
manually (that is, a human has entered the data into the database or
spreadsheet) and there is a possibility that there will be errors in the
data.
Data validation, on the other hand, is the process of making sure that
the data that has been transferred from one source to the other
matches the original data. For example, if you entered the results of a
survey into a spreadsheet, you will check that the results you have
match the results you entered.
Data validation also checks to see that the data is complete and
matches the requirements of the system in which you entered it. In
Access, this is done using data validation rules and input masks.
There are several ways to validate data. These are shown in Table 9.1.
Table 9.1: Data validation techniques
UNIT
9.3 Software bugs
Software bugs are called bugs because the first known programming flaw was
caused by a moth that flew into a Harvard Mark II computer in 1946.
Most bugs are caused by human errors made when the source code for the
program was written. Some bugs might not have a serious effect on how the
program functions and may not be found for a long time, but a program may also
be called “buggy” when it has several bugs that make it almost unusable. In some
serious cases, programs may have bugs creating security flaws that can lead to a
computer being accessed by cyber-criminals.
In the late 1990s, there was widespread fear that when the clock struck midnight
on 1 January 2000, the Millennium Bug would cause software systems around the
world to collapse, leading to an economic and social shutdown of the world.
This fear was caused because of a problem in the way that some early computers
were programmed. They were only designed to handle years that contained two
digits, so instead of using 1992, they would use ’92. People started fearing that
date-related processes would happen incorrectly for dates and times after 31
December 1999, since there was no way for the computer to tell the difference
between the years 1900 and 2000, and that the computers would stop working
when the date rolled over.
The idea that a simple change in the date could cause major computer systems to
crash caused widespread panic due to the story being covered often in the media
and being mentioned in reports on the topic from major corporations.
Needless to say, when the time came, no major computer failures happened. No
one is sure if this was because many governments and companies upgraded their
software or because there was nothing to fear in the first place.
UNIT
9.4 Hardware failures
FOR ENRICHMENT
Spectre and Meltdown are two hardware failures that affect CPUs built by Intel,
AMD and ARM and can allow attackers to potentially steal sensitive data such as
banking details and passwords. They were discovered in 2017 by a team from
Google’s Project Zero and several academic researchers from around the world.
Their results revealed that these failures had been in the hardware since about
1995 but that they had been previously undetected. They work by exploiting
something called speculative execution (or the way a processor knows which task
to fetch based on guessing what should happen next in the process and begins
fetching instructions from where it thinks the program will go, without knowing for
sure). This helps to speed up the computer’s processors.
Combined, these two failures affect nearly every modern computer, including
smartphones, tablets and PCs from different vendors running different operating
systems. This is because the two failures are a fault in the processors themselves
and are not linked to a flaw in any software.
While at the end of 2018 hackers had not released any software that could exploit
these failures, computer and smartphone manufacturers advised that users should
download and install the latest security fixes as they become available.
REVISION ACTIVITY
INTRODUCTION
The internet is one of the most amazing inventions of our modern age.
At the click of a button, you have access to millions of people across
the world. Using a simple search, you can access information. You can
learn almost anything on the internet and can teach yourself everything
from simple activities such as cooking to more complex things such as
making your own furniture.
But there is also a dark side to the internet. Digital crimes are carried
out by criminals like hackers who want to steal your information and
data, and cyberbullies and stalkers who harass people online. Knowing
how to protect yourself from these criminals and crimes is an important
part of your online life.
UNIT
10.1 Social-engineering tricks
Social-engineering techniques:
Activity 10.1
Kevin Mitnick is known as the world’s most famous hacker. He was one of the
first computer hackers to be prosecuted and labelled as a computer terrorist,
after leading the FBI on a three-year manhunt for breaking into computer
networks and stealing software from Sun, Novell and Motorola.
Mitnick started hacking when he was only 16 or 17 years old and later
became known more for his use of social engineering to get access into
networks than actually hacking them. For example, he called an employee of
Motorola and convinced her to send him the code for one of the Motorola cell
phones. With this, he was able to use an elaborate social-engineering scheme
by manipulating the telephone network and setting up call-back numbers
within Motorola’s campus. He even convinced a manager in operations to tell
one of the employees to read off his SecurID code any time he needed it, so
that he could access the network remotely.
He also managed to hack into their development servers for cell phones and
find the source code to all the different cell phones.
When Mitnick was eventually arrested in 1995, he was held for four-and-a-
half years without a trial. In the end, he signed a deal and admitted to causing
between $5 million and $10 million in losses to Motorola and other
companies, although he kept saying that the purpose of his hacking was never
for personal gain – he did it for the fun of being able to do it.
MITNICK INTERVIEW
https://www.youtube.com/watch?
v=c76ezYgIN28
UNIT
10.2 Data protection
It is important to back up your data regularly, since hardware can fail or
accounts can be compromised. Backing up data lets you protect and
store information.
CREATING A BACKUP
Because a back up is simply a copy of your computer’s data, it can be
created using the Copy and Paste functions.
1. Start by setting up a backup schedule to work out how often you will create a
backup.
2. Buy an external hard drive to use for the backup.
3. On the scheduled backup day, connect the external hard drive to your computer.
4. Select the files or folders you would like to back up and copy them using the
Copy command.
5. Create a folder on the external hard drive with the correct date in the name.
6. Paste all the copied files and folders into this folder.
7. Disconnect the external hard drive and store it in a safe location.
8. Repeat these steps on each scheduled backup day.
To recover the files from this backup, simply connect the backup hard
drive to your computer and copy the damaged or missing data back
onto your storage device.
The problem with using Copy and Paste to back up your data is that
the backups must be done manually. As a result, it is possible to forget
to create backups. These backups will also be much larger, since each
backup will contain all the files and folders you copied, even if some of
these folders have not changed since the previous backup.
1. Buy an external hard drive to use for the backup and connect it to your computer.
2. Open the Start menu and enter the words Control Panel. This will open the
window.
3. Click on the Backup and Restore (Windows 7) option to open the Backup and
Restore window.
4. Click on the Set Up Backup option.
5. Select the external hard drive as the location where you would like to save the
backup.
6. If all your files are stored in your private folders (such as the Documents, Music
and Videos folders), use the Let Windows Choose option. Otherwise, select the
Let Me Choose option and manually choose the folders that should be backed
up.
7. Click on the Save Settings and Run Backup option to create a backup of all your
files.
This will restore your files to where they used to be, thus replacing all lost files.
A backup server works for people or businesses that have a lot of files
they want to keep backed up online, so that, should one of the
computers suddenly stop working, the files can still be obtained from
the cloud backup server.
Activity 10.2
Answer the following in your own words.
1. Is it really necessary to back up the content of your computer? Why or why not?
2. Talk to at least two people you know who have their own computers.
a. Find out if they back up their information? Why or why not?
b. What do they back up?
c. How many times do they back up their information?
d. How do they back up their information?
3. What would be a practical and workable solution for you to back up your
information?
UNIT
10.3 Protecting yourself online
https://www.youtube.com/watch?
v=usclHi8jk2w
Something to know
A study that was done in 28
countries, including South Africa, in
2018, found that South Africa
showed the highest prevalence of
cyberbullying, with an increase of
24% from 2011. This could be
attributed to the increased use of
social media in South Africa.
If you are bullied or harassed, you can call Childline South Africa on
0800 055 555.
MULTI-STEP VERIFICATION
Two-factor authentication, or multi-step verification, prevents anyone
from logging into your accounts using just your username and
password. Instead, they need a second factor (which is usually a
physical device such as your phone) to access your account.
CYBERBULLYING
https://www.pacerteensagainstbully
ing.org/experiencing-bullying/cyber-
bullying/
Activity 10.3
1. Read the following case study and answer the questions that follow.
Thando is a young woman who has always had weight and confidence issues.
After she decided to improve herself and started following an exercise and diet
regime, her friends encouraged her to take photos of herself to show the world
her new-found body and self-confidence. Thando decided to share her
progress and photos with her friends and family. When she uploaded her new
photos on Facebook, a lot of people liked them. Unfortunately one person
started to post horrible comments about her appearance and character.
When Thando’s sister saw these comments, she became worried that they
would affect her sister’s new-found confidence and her mental and physical
health. She decided to talk to Thando about possible solutions to the problem.
Both Thando and her sister eventually reported the person to Facebook and
asked that Facebook remove that user’s offensive comments and block their
account.
UNIT
10.4 E-commerce and e-banking
When using online services such as online banking or shopping, you
must be careful that your information is not stolen. Your banking or
credit card information can be used to make multiple purchases.
You should always check that the website URL has an “https”
extension whenever you are making a transaction online. The “s”
stands for secure and it means that the website has something called
a Secure Sockets Layer (SSL) certificate. This creates an encrypted
link between you and the server, making the data that you and the
server send and receive secure and private. This protects your data
from being intercepted and stolen.
ADVANTAGES OF E-COMMERCE
Below are some of the advantages that e-commerce holds for the
consumer, which is you.
There is a very wide range of products and services available.
There are no geographical limitations. It is just as easy to buy
something from the USA or Europe as it is to buy it in South Africa.
It definitely saves you time, for example travel time, waiting time and
searching time.
It is available 24/7.
RISKS OF E-COMMERCE
Unfortunately, there are also certain risks related to e-commerce, such
as:
Fraud: Because transactional data is transmitted over the internet, it
has become one of the target areas of cybercriminals. Financial
information can be hacked or stolen, leading to purchases made by
people who are not the rightful owners of that information.
Customers sometimes complain that they have not received their
packages and it is difficult to determine whether that is true or not.
Online security: There are many security threats such as malware,
spam mail and phishing that can cause you harm.
Exchanging a product that does not fit the online description can be
difficult.
INTERNET BANKING
ADVANTAGES OF E-BANKING
Below are some of the advantages of internet banking:
It is convenient, as customers have 24-hour access to the bank,
seven days a week.
It can be done from any location where you have Internet.
RISKS OF E-BANKING
Although online banking is secure enough to use on a daily basis, you
should know about these risks:
Fraudulent transactions
Online theft of your access ID/user ID or PIN/password could
happen.
Banking apps can be compromised.
Activity 10.4
UNIT
10.5 How antivirus programs work
APPLICATION PERMISSIONS
When you install an app on your smartphone or tablet, you will need to
give it permission to access certain functions on your device. For
example, when you install a navigation app (such as Google Maps),
you will first be asked for permission to access the device’s GPS
location.
Using app permissions means that you can control what capabilities or
information the app can access.
Activity 10.5
REVISION ACTIVITY
Describe and discuss what Voice over Internet Protocol (VoIP) and video
conferencing are
Discuss the advantages and disadvantages of VoIP and video conferencing
Describe the different types of transactions you can perform online
Define the Internet of Things (IoT)
Explain the advantages and disadvantages of social media
Discuss good and bad practices on social media platforms
Describe the limitations of fixed internet access
Discuss mobile internet access in relation to Wi-FI hotspots, WiMAX, Bluetooth
and mobile internet
Differentiate between different email applications
Describe the key factors that define the usability of websites and how websites
link to word processing and forms
INTRODUCTION
The internet has changed the way we communicate with each other
and the way we interact with the world. More people are making calls
and reading their news online than ever before and the number keeps
on growing.
UNIT
11.1 Internet communication
VIDEO CONFERENCING
Video conferencing is linked to VoIP and is often offered as part of a
VoIP contract. Video conferencing works by using an online platform to
make or receive video calls. The most popular of these platforms is
Skype, which is also a p opular VoIP platform.
Activity 11.1
UNIT
11.2 Online transactions
The most popular is the EFT (electronic funds transfer), which allows
you to log onto a banking website (or smartphone app) and send
money from your account to another account.
Most travel agencies, hotels and airlines have websites where you can
book all you need for your trip. You can use the World Wide Web to
search for specials. You can also use airline websites for online flight
check-in before you get to the airport.
Harry wants to surprise his wife with tickets to see her favourite band perform. He
checks the ticket website and sees that all the Johannesburg shows are sold out,
but there are still tickets available in Cape Town. He buys the tickets and decides
that they should make a short holiday of their trip. He then goes to a website that
compares flight prices. Harry enters the dates for when he wants to fly down and
return, and finds a result that matches his budget. He books two tickets for those
flights. Then he realises they will need somewhere to stay. Harry goes to an
accommodation comparison site and enters the dates to check for availability. He
sees that a lovely hotel close to the concert venue is offering an early booking
special, so he books a room for a week. He logs onto his banking app and
transfers his booking fee and deposit to the hotel. He also takes the time to reserve
a rental car for the week. Following this, Harry decides to buy his wife a birthday
gift while he is online and visits some shopping websites to look for a purchase. All
of this takes him an hour from the comfort of his couch.
Activity 11.2
1. Why would a person use online banking for EFTs?
a. Would you use it? Why or why not?
2. What are some of the drawbacks of online shopping?
a. Have you done online shopping? Write a paragraph on your experience. Or
explain why you do or do not like online shopping.
3. Give three examples of different online transactions (not banking or shopping).
UNIT
11.3 The Internet of Things (IoT)
INTERNET OF THINGS
EXPLAINED
https://www.youtube.com/watch?
v=uEsKZGOxNKw
BENEFITS OF IoT
The IoT can be used to connect “smart homes”, where you can use
your smartphone to control everything from the temperature of the air-
conditioners to the music that plays when you walk in the door.
The IoT can also be used to build “smart cities”, where transportation
and the movement of people can be controlled and monitored and
made more efficient.
Smart buildings can reduce energy costs by using sensors that detect
how many occupants are in a room. The temperature can adjust
automatically – for example, turning the air conditioner on if sensors
detect a conference room is full or turning the heat down if everyone in
the office has gone home.
Activity 11.3
Read the extract below and answer the questions that follow:
Modern cities are brimming with objects that receive, collect and transmit data.
This includes mobile phones but also objects actually embedded into our cities,
such as traffic lights and air pollution stations. Even something as simple as a
garbage bin can now be connected to the internet, meaning that it forms part of
what is called the internet of things (IoT). A smart city collects the data from these
digital objects, and uses it to create new products and services that make cities
more liveable.
Although they have huge potential to make life better, the possibility of increasingly
smarter cities also raises serious privacy concerns. Through sensors embedded
into our cities, and the smartphones in our pockets, smart cities will have the
power to constantly identify where people are, who they are meeting and even
perhaps what they are doing.
https://m.youtube.com/watch?
v=ChbjZHW2Wwk
Activity 11.4
In small groups, research the influences of the Fourth Industrial Revolution on the
following sectors:
Retail
Building
Social
Travel
Activity 11.5
UNIT
11.5 Social media
Social media has become a staple of our digital lives, from tweeting
your thoughts on Twitter, to sharing pictures of your life on Instagram.
Social media is used to market products, make announcements and
stay in touch with the people who matter to you.
Something to know
Figure 11.5: The reasons why people used social media in 2018
ADVANTAGES
You can connect with anyone, anywhere in the world, staying in touch
with friends who have moved away or family members who live in
other countries.
Using social media keeps you up to date with what is happening in the
world in real time. This is especially true of sites such as Twitter, where
those on the ground at major events can tweet what is happening as it
happens.
DISADVANTAGES
Something called the social media bubble draws people to
communities where their views (and only their views) are supported
and encouraged. This can lead to people being misinformed about the
world or only getting one opinion on an issue.
BEST PRACTICES
There are several good, common-sense practices you can follow when
using social networking sites:
Manage your privacy settings: Learn about and use the privacy and
security settings on your social networking sites. They help you
control who sees what you post and manage your online experience
in a positive way.
Keep personal info personal: Be careful how much personal
information you provide on social networking sites. The more
information you post, the easier it may be for someone to use that
information to steal your identity, access your data, or commit other
crimes such as stalking. Restrict who can have access to different
types of information on your profile. Avoid publishing personal
information like email addresses, home address and phone
numbers.
Think carefully about who you allow to become a “friend”.
Restrict the amount of time you spend on social networking sites:
Many companies and schools block social media websites as a
result of the abuse of resources like bandwidth, especially by
downloading and uploading large files, photographs and videos.
Activity 11.6
UNIT
11.6 Internet access
WI-FI HOTSPOTS
A Wi-Fi hotspot is a wireless access point that you can connect to
using the wireless connectors in your computing device. When we talk
about Wi-Fi hotspots, we are usually talking about the publicly
accessible connection points that businesses supply (usually for free)
to their customers.
You can also create a wireless hotspot in your home by using a router
with a wireless connector, or on the go by using your cellular phone or
other devices capable of connecting to the internet.
WiMAX
WIMax is used to connect multiple devices over a longer range than
Wi-Fi could and as a replacement for the GSM connections standards
for mobile devices. WiMAX can cover long distances (like a cellphone
signal network) and deliver high-speed internet access (like broadband
connections).
https://youtu.be/jzxZUJmOu30
BLUETOOTH
Bluetooth is a wireless communication standard that allows electronic
devices to connect to and interact with each other wirelessly. Bluetooth
does not rely on mobile data, cellular signal or Wi-Fi to connect, as
long as the devices that want to connect are within range of each other
(and have each other’s pass codes), they can connect.
You can use NFC at a local supermarket, train station, taxi or coffee
shop that supports contactless payments via your phone’s NFC chip.
MOBILE INTERNET
Mobile internet (or mobile broadband) is the term used to describe the
wireless internet access you can get through cell phone towers and
other digital devices that use portable modems (such as tablets and
smartphones).
With mobile internet, you can use your smartphone as a modem. You
can turn your smartphone into a Wi-Fi dongle to connect other devices
to the internet using something called tethering. Using your
smartphone as a modem gives you access to the internet in areas
where there are no Wi-Fi hotspots.
MORE ON 5G
https://m.youtube.com/watch?
v=MC_Sfkh5-zQ
Activity 11.7
1. Briefly discuss the limitations of fixed internet access, paying particular attention
to the South African context.
2. What is a Wi-Fi hotspot and give an example of one?
3. What does WiMAX stand for?
4. What is Bluetooth and how does it work?
5. List the two most common types of mobile internet connections and describe how
they differ from each other.
UNIT
11.7 Browser and email software
EMAIL
Email is a widely used form of communication. It consists of software
for creating, sending, receiving and organising electronic mail (or
email). Modern desktop email clients like Microsoft Outlook, Windows
Live Mail and Mozilla Thunderbird offer advanced features for
managing email, including WYSIWYG editors for composing email
messages, anti-spam and anti-phishing security protection, advanced
search capabilities, and rules and filters for more efficiently handling
and organising messages and email folders.
A large number of online email services, called webmail, exist with
features and functionality for managing email similar to their desktop
email software counterparts. Some of the more popular online email
services are Yahoo! Mail, Gmail, Hotmail (Windows Live Mail) and AOL
Mail.
Figure 11.7: The Gmail, Outlook and Apple Mail application logos
UNIT
11.8 Usability of web pages and
websites
Website usability looks at how user-friendly a website or web page is.
There are five key factors that determine the usability of a site:
Readability: This feature is one of the more important aspects of web
design usability. Readable text affects how users process the
information from the content. Poor readability scares readers away
from the content. On the other hand, done correctly, readability
allows users to efficiently read and process the information in the
text. You want users to be able to read your content and absorb it
easily.
Navigation: Navigation is very important to ensure users are able to
find what they are looking for easily and intuitively. The structure of
the navigation should be simple and the main links (or menu system)
should be easy to locate and identify. They should always appear in
a consistent position on the website. Links should be short and it
should be simple to figure out what the link is leading to. Web
designers should ensure that no broken links occur on the site.
Consistency: This feature affects both usability and readability.
Consistency means, for example, that all headers of the same
importance should be treated the same in terms of size, colour and
font etc. For example, all <h1> headers in an article should look
identical. This consistency provides users with a familiar focus point
when they are scanning the text, and it helps to organise the
content.
Layout: Layout refers to how the various elements (text, graphics,
buttons, etc.) are arranged on a web page. Pages should be
designed and laid out in a way best suited to their intended audience
or readers. Text and graphic objects on the page should be adapted
to fit standard monitor sizes and resolutions.
Typography: Typography refers to fonts and how they are put
together. The font you use on your website needs to meet two
specific criteria:
1. How easy is it to read?
2. Can it be rendered in HTML?
Each of these factors covers a single aspect of the website and they all
need to work together to create a user-friendly website.
Activity 11.8
1. Below are two websites that sell car engines. Look at the navigation designs of
these websites and answer the following questions.
Website A
Website B
a. Which website has the best readability? Give two reasons for your answer.
b. Which website has the best navigation? Give two reasons for your answer.
c. Which website has the best consistency? Give two reasons for your answer.
d. Which website has the best layout? Give two reasons for your answer.
e. Which website has the best typography? Give two reasons for your answer.
2. Based on your comparisons of the two websites, which website do you prefer.
Give two reasons for your answer.
3. Name two things that can be done to improve the website you least prefer.
REVISION ACTIVITY
5.1 What does the term Internet of Things (IoT) refer to? (2)
5.2 Refer to paragraph 1. Many examples of IoT are given that could improve
“liveability” in a city. Elaborate on any TWO of these examples (or give your
own) by describing how they would improve citizens’ lives. (2)
5.3 How do the Internet of Things and big data relate to each other? (2)
5.4 Discuss two challenges a city would face when trying to implement the
systems necessary to create smart cities, besides the challenge of funding
such a project? (2)
5.5 Many citizens of such smart cities say that privacy concerns are only relevant
to people who have something to hide. Do you agree or disagree with this
statement? Motivate your answer in a short paragraph. (2)
INTRODUCTION
An electronic communication device refers to any type of computerised
device (instrument, equipment or machine) or software that can
compose, read or send any electronic message using radio, optical or
other electromagnetic systems. An electronic message can be a text
message, electronic mail, an instant message like WhatsApp,
teleconferencing, social networking, Skype, blogs or even access to an
internet site.
UNIT
12.1 Register a web-based email
address
Having an email address is a must in this day and age. You will use
your email address for many online activities, such as signing up for a
social media account or filling out online applications. Luckily, creating
an email account using a web-based service is relatively easy. In this
section, you will learn how to create a Gmail account.
https://support.google.com/
7. Pay careful attention to the items on the sign-up form that are optional. You can
skip these items if you want to. For Google, submitting a phone number or
recovery email address allows Google to help you recover your password if you
forget it.
8. Fill in your birthday and gender before clicking next.
9. Read through Google’s Privacy and Terms agreement.
10. Read through the custom options and select which information Google is allowed
to record about you.
11. Once you have selected options you are comfortable with, click I agree.
12. The moment you click I agree, Google will create your new email account for
you.
DO’S AND DON’TS WHEN WRITING AN EMAIL
Bowvalleycollege.libguides.com
There are certain “rules” to follow when you are writing an email, such
as:
Always make sure that your subject line is a clean and brief
indication (summary) of what the email is about.
Use a more professional salutation. If you do not know the person
you are writing to, start your email with “Dear (insert name)”. If the
situation is not as formal, you can use “Hi” or “Hello” instead. NEVER
use any slang form of greeting such as “Yo” or “Howzit” in an email.
Do not try to be funny when writing an email. It can easily be
misunderstood and seldom works out the way you want it to.
Remember, the recipient cannot see your facial expressions.
Always proofread your message before you send it. Use your
spellchecker to make sure that there are no spelling mistakes or
typos. People are judged by the way their emails look.
Do not assume that the recipient knows what you are talking about.
Even if you think that they should know, make sure that your email
can be read and understood without pre-knowledge. It can be very
frustrating to look back through a whole string of emails to try and
find something that was said previously.
Always reply to an email. Even if you do not have the answer right
away, let the recipient know that you have received their mail and will
get back to them.
Do not overuse exclamation marks. People interpret this as
aggressive behaviour and seldom respond positively.
Never send an email when you are angry. First think about what you
want to say and how you want to say it. You can even save the email
in the Drafts folder and go back to it after you have cooled down.
Bad emails can never be retracted.
Do not copy the whole world in your email. Send it only to the people
who would really be interested in it.
Do not play email ping-pong. If you have to reply more than twice to
the same topic, rather pick up the phone and call the person.
Do not send large attachments. Rather send a link to download the
file or compress it before attaching it.
Activity 12.1
In this chapter, you will learn how to work with Gmail, but the process
is the same for most other web-based email applications, such as
Outlook.com or Hotmail.com.
Labels are a great way to organise Gmail. They are like tags you can
add to emails you send or receive. Unlike folders, you can add more
than one label to an email. You can also colour-code these labels to
make it easier to see into which category an email falls.
Figure 12.1: Emails can be colour-coded according to their labels
Also remember, you can add more than one label to your emails. An
email coming from your school about an upcoming swimming event
can be labelled both School and Activities.
7. Check Nest label under: and select a label from the drop-down menu.
1. In the section of the Labels tab, click Edit in the Actions column for the label you
want to move.
2. Check Nest label under and select a destination from the drop-down menu.
1. In the section of the Labels tab, click Edit in the Actions column for the label you
want to move.
2. To move the label beneath another label:
a. Make sure Nest label under: is checked.
b. Select the label under which you want to move the label from the drop-down
menu.
3. To move the label to the top, make sure Nest label under: is not checked.
4. Click Save.
1. Select each message by checking the box to the left of each message you want to
label.
2. Click the Labels icon in the menu.
3. Check the boxes next to each label you want to assign to your selected messages
or click Create new to assign a new label to the messages.
Guided Activity 12.6
1. Click the Menu button in the lower right corner of the message.
2. Move the pointer down to Labels.
A slide-out menu will show you labels you have already created, if any, and give
you the option of creating a new label.
You can delete an entire label you no longer want at any time. Doing so will not delete
the emails that carry that label, however. To delete a label:
All labels are coloured by dark grey text on a light grey background. To customise your
label colours, you must do the following:
PRIORITISING EMAILS
You can use the Gmail star system to prioritise your emails so that you
can easily find the most important ones later.
By default, the Gmail stars are yellow. You can, however, change the
colour as well as the type of the stars to suit your own needs.
5. Drag icons from the Not in use section to the In use section to add different types
of stars.
3. To find a message with a particular type of star, search using “has:” with the
star’s name (e.g. “has:red-bang”).
1. Default: You can choose which emails you want to see first.
2. Important first: Puts all email marked important at the top of your inbox.
3. Unread first: Puts all unread email at the top of your inbox.
4. Starred first: Puts all starred email at the top of your inbox.
5. Priority inbox: This option lets Gmail sort and prioritise emails for you.
To decide which type of email you want to see at the top of your inbox:
You can, for example, have a personal distribution list called “family”
that includes the email addresses of all your relatives. Rather than
typing or selecting each address, you just use the list address. A
distribution list is different from an email list in that members cannot
directly send emails to other members who are on it.
Something to know
This can also be done by clicking on
the waffle icon ( ) and then clickiang
on Contacts. You may need to click
on More first to see the link to your
contacts.
This will open a page with all your contacts’ details on it.
2. Select your contacts by hovering your mouse over each contact’s profile picture
or placeholder.
3. Click the checkbox that appears below your cursor and repeat this process for
each contact you want to add.
4. Click the Labels icon in the upper right corner of the page. A dropdown menu will
appear.
5. Click on Create label. This prompts a pop-up window.
6. Type in the name of the distribution list, for example “Friends”. This is the name
that you will use in the To field when you want to send an email.
7. Click OK at the bottom right corner of the pop-up window. This will save your list
of contacts as a label.
To send an email to your distribution list, you will follow the normal email
procedures, typing in “Friends” in the TO field.
FILTERS
Filters help you to set up rules for how Gmail should handle your
incoming emails, for example it can send an email to a label, or it can
archive, delete, star or automatically forward the email.
Filters are relatively easy to set up using search criteria in Gmail itself.
1. Click the Settings gear icon near the top right corner of the Gmail screen.
2. Follow the Settings link in the menu that comes up.
If you used this option while in a specific email, Gmail automatically fills in the
“from” email address for you:
6. After selecting the criteria for your filter, click the Create filter with this search link
to specify what Gmail must do with emails that match this filter.
1. Skip the inbox: Archive the email so that it does not appear in your inbox.
2. Mark as read: Have the email appear in your inbox as an already-read item.
3. Star it: Automatically star the email.
4. Apply the label: Apply a specific label to the email.
5. Forward it to: Automatically forward the email to a different email address.
6. Delete it: Send the email to the trash.
7. Never send it to Spam: Prevent Gmail from tagging the email as spam.
8. Always mark it as important: Automatically tag filtered emails as important.
9. Never mark it as important: Tell Gmail not to tag filtered emails as important.
10. Categorise as: Automatically categorise filtered emails.
11. Also apply filter to matching conversations: Automatically applies the selected
conditions to every email in your account that matches the selected filter criteria.
Guided Activity 12.15
Activity 12.2
REVISION ACTIVITY
QUESTION 1: MULTIPLE CHOICE
1.1 Which of the following is NOT electronic communication? (1)
A. Instant messaging
B. Teleconferencing
C. Faxing
D. Social networking
1.2 Which of the following can be done with Gmail labels? (1)
A. Creating filters
B. Prioritising emails
C. Archiving emails
D. Organising emails
1.3 What does the following process show? (1)
Step 1: In the section of the Labels tab, click Edit in the Actions column for
the label you want to move.
Step 2: Check Nest label under and select a destination from the drop-
down menu.
Step 3: Click Create or Save.
A. How to move a label under another label
B. How to filter your inbox
C. How to move an email under a label
D. How to star an email
1.4 When would you use the Gmail star system? (1)
A. To highlight all your important emails
B. To delete an email
C. To organise all your emails
D. To find a specific email
1.5 You and a specific group of your friends share inspirational quotes with each
other every day by email. Which of the following make this process easier?
(1)
A. Star system
B. Labels
C. Distribution list
D. Filters
INTRODUCTION
Data is all around us and we create data with our every action, both
online and in the real world. Data can be used in various industries to
draw many insights into the way people shop, travel and interact with
companies, brands and other people.
You need to keep in mind that the order of this cycle is not set in stone
and you may need to go back to refine or redo previous steps, but the
further along in the cycle you get, the harder it is to go back and do
earlier steps. This is why it is important that you do steps one and two
as well as possible before moving on.
If you do not have the right information, you will not be able to solve
your problem or complete your task properly, be it completing your
PAT or even writing this textbook.
UNIT
13.1 Defining the task
It may seem obvious but before you can successfully complete any
task or investigation, you need to understand exactly what it is that you
are going to do. This is why you need to carefully consider the task you
have been given by breaking it down into smaller sections and
describing it in your own words, called the task definition.
Something to know
UNDERSTANDING TASKS
Julia, Mbali and Shiven are on the organising committee for the Grade 12 dance.
They have each been given a task to complete to better help the organisers
understand what the Grade 12s want:
Julia has been asked to find out how many Grade 12s would be interested in
bringing a partner from outside the school to the dance and to give a report to
the teacher supervisor, Mr Smith.
Mbali has been asked to find out what theme the Grade 12s want for the dance
so that she can let the decorating committee know what they need to buy.
Shiven has been asked to find out about the music.
Julia begins by breaking down her task. She decides that the best way to go about
gathering the information is through an online survey. She first has to design the
survey and then distribute it. She decides to use Google Forms for her survey and
sends the link to the Grade 12 WhatsApp group. She asks people to please fill in
her survey by Friday. Once she has this information, she downloads the report that
Google Forms generates and gives it to Mr Smith.
Mbali also decides to break down her task but immediately runs into a problem.
She has no clear idea of what the decorating committee is willing to spend on
decor and they have not given her suggestions for themes. Mbali realises that if
she were to ask the Grade 12s what theme they would want, she would end up
with a different response for each person.
Mbali will need to get more information before she can complete her task. She
decides to ask the decorating committee the following questions:
Are there any theme suggestions?
Is there a budget and how does that limit the theme?
The decorating committee tells her that they have three theme ideas. Now that she
has this information, she can define her task. She decides a simple survey will also
help her get the information the decorating committee needs.
Shiven’s task is too vague. He will need to get more information on the following:
Is the school willing to pay for a band or DJ? Or should he ask for a learner
volunteer?
Will there be sound equipment available or will the performers need to provide
their own?
What kind of music do the Grade 12s want at the dance?
What kind of music will the school not allow?
Only when he has this information, will he be able to define his task and give the
appropriate solution.
Activity 13.1
UNIT
13.2 Finding information
INFORMATION-GATHERING TOOLS
After you have identified the task definition, you will have to gather data
and information. In this phase, you must consult different types of
information sources to understand the subject of your investigation
better.
Activity 13.2
Using the task definition you created in Activity 13.1, answer the following questions
to determine how you will research the topic and obtain the information you need for
the task you defined.
UNIT
13.3 Quality control of information
EVALUATE QUESTIONS
When you are looking for the data you need to complete your task, you
can ask yourself questions to guide you. There are two main types of
questions, namely open-ended and closed-ended questions.
While both types of questions are good for gathering data, closed-
ended questions are only useful in the early stages of the data
gathering process when you are trying to find as much data related to
your topic as possible. This is because they put an end to the
conversation. Closed-ended questions are good for surveys or where
your respondents do not have the time to spend thinking about their
answers.
EVALUATE WEBSITES
When you are doing research online, it is important to think about the
websites you are using. Not all websites are created equal and many
may contain misleading, or even false, information. Much as you
evaluate the quality of the information you receive, you must also
evaluate the quality of the websites you visit and use.
There are some key questions you can ask yourself about the websites
you are visiting and using, for example:
Who supports this website?
Who is this website aimed at?
Who is the author? What are their credentials?
How is the content organised? Do all the links on the pages work?
How easy is it to navigate around the website? Is the design pleasing
and attractive? How quickly does the site load?
What is the grammar and spelling like?
Is the content objective or does it support a single opinion?
Something to know
These are all important questions to ask when looking at a website. Let
us look at each point in detail to understand why you should ask these
questions.
Authority: Look at the web address of the website. The domain
name can help you determine if the information has been published
by a credible source, for example .ac says that it is published by a
university, .gov refers to the government, etc.
Look for the author’s name. If they choose to remain anonymous,
ask yourself why. A quick Google search will also show you if they
have any qualifications in the field they are writing about. This is
especially important in scientific or technical articles, since you would
want an expert telling you how to do something or explaining
something to you.
The grammar and spelling on the site are also extremely important. If
a website is filled with grammar and spelling errors, it may not be the
most authoritative or authentic source for the information you are
looking for.
Affiliation and objectivity: You should always be aware of who owns
or financially supports it. This could be a good indicator of whether
there will be bias in the information. Take a close look at the content
and try to work out if it is biased or supports one opinion too heavily.
Biased content is the opposite of high-quality content, as it has a
very narrow view on a subject.
Try to use websites supported by, or linked to, established
institutions such as government agencies, non-profit organisations or
educational institutions. Remember, objective sites present
information with a minimum of bias.
Audience: You should also make sure that the website’s target
audience (the people it is aiming its content at) is appropriate for your
needs. A website aimed at young children will not help a university
student with their research, while a website aimed at giving
information to doctors will not help an engineer in their research.
Make sure that the content you are looking at is appropriate for your
needs.
Content: Another important thing to look at is how the content of the
website is arranged. Does it make sense or is the information
scattered all over the place? Is it easy to find what you are looking for
or do you have to spend ages trying to figure out the website’s
navigation? Also check to see if all the links work, in articles and on
the website itself. Broken links are often a sign of a badly maintained
or spammy website.
Currency and design: Is the website designed well and does it look
professional? If not, this could be a sign that the website is old and
outdated or just badly designed, which could mean that the
information you find there will be the same. Apart from being very
frustrating, websites that load slowly are often badly designed. This
could be an indicator of badly written or inaccurate information.
EVALUATE INFORMATION
It is most likely that your primary source of information will be the
internet. Understanding the quality of information is important, since
the internet is a place where anyone can upload information or make
claims. You will need to look carefully at the information you use to
discuss the task. You should look at the source of the information and
try to find out who has an interest in this data (this is especially
important when it comes to scientific papers). You should also think
about what people will gain by spreading certain types of information
on the internet.
There are five key things that determine the quality of information:
Authority: This is based on who created the information. If the video
you are watching was not created by someone with knowledge in
the field, then the information they are giving you might not be the
best out there. Always do research on the people who give you
information. Authority also indicates that the information is accurate.
Accuracy: Look for how complete the information is and compare
the information from one source against the information from a few
others. If the facts match, you can be fairly sure that the information
is accurate. Make sure that there is something backing up the facts
you receive. Check the source of those facts as well.
Currency: Check how current the information is. More up-to-date
information tends to be more accurate. A technology blog from 2010
will be less relevant, and therefore less accurate, to your research
than one from 2017. Information from the last ten years is seen as
current.
Objectivity: Make sure that the author is being objective. Look out for
information that is sponsored by a company (that is, if it is a type of
long-form advertisement called a sponsored post). This information
may be biased towards the facts that the sponsor wants to
represent to make their product or information seem like the best.
Relevance: Lastly, look at how well the information covers the topic
you are researching. If the information only covers a small portion of
the topic, then it is possibly not the best information to use. You
need to look for information that answers about 80% of any question
you are trying to find the answer for.
Activity 13.3
UNIT
13.4 Spreadsheets and databases in
data handling
Spreadsheets can also be used as a modelling tool, that is, you can
use them to predict trends. As an example, if a company wants to find
out what would happen if it reduced the price of one of its products, it
could use a spreadsheet to analyse the changes to its profit margins.
Activity 13.4
UNIT
13.5 Processing data
There are several techniques or tools you can use to do this. These will
be discussed below.
TOOLS AND TECHNIQUES
Manipulating data is the process of sorting, arranging or moving the
data without changing it. To manipulate data, you should first keep the
following in mind:
You need to know the features of the programs you are using and
how to use them.
Make sure that the data is in the correct format for what you need to
do. If it is not, you will need to reformat it or export it into the most
appropriate format.
You might have to use more than one tool to process the data
correctly.
The tools you can use include sorting, formulae and functions and
queries. Sorting changes the order of the data. It can be done to
numerical data (sorting numbers from lowest to highest) or strings
(sorting text alphabetically). This is mostly done in spreadsheets.
This is an important function to use in Excel as you might want to arrange data
alphabetically, from highest to lowest, or order it by colour or icon. This will help you
to visualise and understand your data better.
You can, for example, sort text from A to Z or Z to A, numbers from smallest to largest
or vice versa, and dates from oldest to newest, or newest to oldest. You can also sort
according to your own custom list or format.
1. To sort text:
a. Select a cell in the column you want to sort.
b. On the Data tab, in the Sort & Filter group, do one of the following:
To quick sort in ascending order, click (Sort A to Z).
To quick sort in descending order, click (Sort Z to A).
2. To sort numbers:
a. Follow steps one and two above.
b. On the Data tab, in the Sort & Filter group, click Sort.
c. In the Sort dialog box, under Column, in the Sort by box, select the first
column that you want to sort.
d. Under Sort On, select the type of sort. Do one of the following:
i. To sort by text, number, or date and time, select Values.
ii. To sort by format, select Cell Color, Font Color, or Cell Icon.
e. Under Order, select how you want to sort. Do one of the following:
i. For text values, select A to Z or Z to A.
ii. For number values, select Smallest to Largest or Largest to Smallest.
iii. For date or time values, select Oldest to Newest or Newest to Oldest.
iv. To sort based on a custom list, select Custom List.
f. To add another column to sort by, click Add Level, then repeat steps c. to e.
You can also use the various formulae and functions in a spreadsheet
program (such as Microsoft Excel) to help you process data. You will
have seen most of the functions in action in your practical lessons on
Excel; but a list of functions is included below:
SUM calculates the total of a range of numbers.
AVERAGE gives the average of a range of values.
MIN returns the minimum value in a list of values.
MAX returns the maximum value in a list of values.
COUNT counts the numbers in a list of values.
COUNTIF is used for counting cells within a specified range that
meet a certain condition.
Something to know
These functions let you interpret large sets of data but are not very
good for visualising the data. You can use charts and graphs to
visualise data and analyse trends.
If this spreadsheet was in a database, with the exact same headings and
information, Mrs Dlamini would only need to use a single query to do exactly what
she did on the spreadsheet.
UNIT
13.6 Analysing data and information
After you have collected your data and formatted it, you will need to
analyse your results and compare them to a question. But how do you
do this? The best way to support or disprove your question is to look
at trends and patterns. This section looks at how to verify and validate
your data, how to add data questions to your data to help analyse it
and how to analyse for trends and patterns.
You may also see a link between the cost of computing devices going
down while their processing power and speed goes up as the
technology improves over time. This is called a correlation trend.
Patterns are a little different. Data does not always move up or down
over time. Data can also repeat itself in a predictable way or form a
shape when placed in a graph. This type of data pattern is usually
described in terms of its features, like centred, spread or shape. Table
13.1 describes these patterns and gives an example of each.
Table 13.1: Data pattern types
Activity 13.5
REVISION ACTIVITY
3.2 Which of the following types of graph would best represent the following
scenario? (3)
A. Bar graph
B. Line graph
C. Histogram
D. Pie chart
QUESTION 4: SHORT QUESTIONS
4.1 List two tools you can use to gather data. (2)
4.2 What is the difference between a trend and a pattern? (2)
4.3 Why should you avoid questions that start with “Why”? Also mention how you
can prevent this. (2)
5.7 Based on this scenario, identify the two problems Nomfundo must solve.(2)
5.8 What information-gathering method Nomfundo can use to solve this
problem? Give a reason for why she should use this method, and a reason
for why she cannot use the other two methods. (4)
5.9 What two tips would you give Nomfundo about creating questions? (2)
5.10 Create two questions that Nomfundo can ask her school peers to find the
information she needs. (2)
TOTAL: [40]
A
acceptable use policy (AUP) a document stipulating constraints and practices that a
user must agree to for access to a corporate network or the internet
adware any software application that allows advertising banners to be displayed
when another program is running
ALS a disease that gradually paralyses people
analogue signal a continuous signal. It is the opposite of a digital signal that sends
information in groups
archive refers to materials (such as recordings, documents, or computer files) that
have been stored on a system for easy access when needed
arithmetical deals with non-negative real numbers
automated teller machine (ATM) an electronic banking outlet that allows customers
to complete basic transactions without going into the bank
B
bandwidth a measurement of the ability of an electronic communications device or
system (such as a computer network) to send and receive information
basic input/output system (BIOS) a ROM chip found on motherboards that allows
you to access and set up your computer system at the most basic level
biased having or showing an unfair tendency to believe that some people, ideas, etc.,
are better than others
binary code a coding system using the binary digits 0 and 1 to represent a letter,
digit, or other character in a computer or other electronic device
bit short for binary digit and is a single unit of information that can have a value of
either 0 or 1
bring your own device (BYOD) the practice of allowing employees to purchase and
use their own computing devices for work instead of the business supplying the
device
C
carpal tunnel syndrome a condition that causes pain and weakness in the wrist,
hand, and fingers
credentials a piece of information that is sent from one computer to another to check
that a user is who they claim to be
D
data loss prevention policy a strategy for making sure that end users do not send
sensitive or critical information outside the corporate network
defragmenting the process of reorganising a hard drive’s data to help increase the
time it takes to run a program and open files
disk fragmentation when information is deleted from a hard drive and small gaps are
left behind to be filled by new data. As new data is saved to the computer, it is
placed in these gaps. If the gaps are too small, the remainder of what needs to be
saved is stored in remaining gaps
downtime time during which a computer is out of action or unavailable for use
E
email spoofing the forgery of an email header so that the message appears to have
originated from someone or somewhere other than the actual source
ergonomics a science that deals with designing and arranging things so that people
can use them easily and safely
ethical refers to doing things that won’t do harm to people or the environment
export (data) refers to converting data into another format than the one it is currently
in
F
file transfer protocol (FTP) a way to transfer data, particularly files, from one
computer to another, usually over the internet but also over a local network
firewall a software program or hardware device that acts as a filter for data entering
or leaving a network or computer
format (a disk) refers to preparing a disk to store data
fragmentation when you save a file onto your computer, the computer breaks the file
up into smaller pieces in order to store the file on your hard drive
G
geolocation the identification or estimation of the real-world geographic location of
an object
graphics card a circuit board inside a computer that allows it to receive and show
pictures and video
H
high-definition multimedia interface (HDMI) a digital interface used to transmit
audio and video data in a single cable
I
information and communication technology (ICT) a field of study related to
computers and communication networks
internet protocol (IP) a standard set of rules for sending and receiving data over the
internet
intranet a private network for a corporation or organisation that only those with
permission can use
L
light emitting diode (LED) a device that lights up and displays information when
electricity passes through it
local area network (LAN) a computer network that covers a small area in which the
computers in the network share resources, such as internet connections, printers
and server connections
M
malware malicious software used by cybercriminals
megapixel the resolution of the amount of detail that a camera can capture
memory card a type of storage media
N
near field communication (NFC) a short-range wireless technology that enables
simple and secure communication between electronic devices
O
octa-core (processor) a processor with eight cores
P
passphrase a secret phrase that helps protect accounts, files, folders, and other
confidential information
password a string of characters used for authenticating a user on a computer system
pattern refers to data that can also repeat itself in a predictable way or form a shape
when placed in a graph
pixel refers to any one of the very small dots that together form the picture on a
television screen, computer monitor, etc.
pixels per inch (ppi) measures the number of pixels per line per inch in a digital
photo
plagiarism the act of copying someone else’s work and publishing it as your own
Q
quad-core (processor) a processor with four cores
R
random-access memory (RAM) a very fast short-term data storage device that can
only store a small amount of information at a time
read-only memory (ROM) stores the basic instructions for what needs to happen
when the computer is switched on
really simple syndication (RSS) a way to easily distribute headlines, updates and
content to many people at once
repetitive strain injury a painful medical condition that can cause damage to the
hands, wrists, upper arms, and backs, especially of people who use computers
resolution the ability of a device to show an image clearly and with a lot of detail
S
salutation a greeting
secure sockets layer (SSL) an encrypted link between you and the server, making
the data you and the server send and receive secure and private
social engineering the use of deception to manipulate individuals into giving away
confidential or personal information that may be used for fraudulent purposes
sorting the process of arranging data into meaningful order so that you can analyse it
more effectively
spam unwanted or irrelevant messages that are sent over the internet or through
emails
spyware software installed on a computing device without the user’s knowledge that
is designed to gather data from that device
structured query language (SQL) a query language used for accessing and
modifying information in a database
T
tertiary storage a third level of storage in a computer build to provide huge storage
capacity at low cost
U
upward trend means moving in a direction from lower to higher
V
validate the process of comparing data with a set of rules to find out if data is
reasonable
verify the process of checking that the data entered exactly matches the original
source to find out if data is accurate
video conferencing a live, visual connection between two or more people in separate
locations for the purpose of communication
virtual keyboard a computer keyboard that is operated by typing on the screen rather
than by pressing physical keys
Voice over Internet Protocol (VoIP) a telephone connection over the internet
volatile memory computer storage that only maintains its data while the device is
powered
W
wireless access point (WAP) a wireless receiver that enables a user to connect
wirelessly to a network or the internet
website spoofing the act of creating a website as a hoax, with the intention of
misleading readers that the website has been created by a different person or
organisation
wireless local area network (WLAN) a small network of computers covering a small
area, such as a home, office building or school, but with the ability to connect
wireless devices such as smartphones, laptops and tablets to the LAN
Contents
Cover
Title Page
Copyright
Contents
Term 1
Chapter 1 General concepts of computing
Introduction
Unit 1.1 Information processing cycle
Input
Processing
Storage
Output
Communication
Activity 1.1:
Unit 1.2 Computer features and classification
Computer classification
Dedicated devices
Activity 1.2:
Unit 1.3 The role of ICTs in the workplace
How ICTs impact the workplace
Activity 1.3:
Unit 1.4 The value of CAT
Career options and the impact on careers and fields
of study
Activity 1.4:
Revision activity
At the end of the chapter
Chapter 2 Input, output and other devices
Introduction
Unit 2.1 Input devices
Various input devices
What determines the quality of the image taken by a
scanner or camera?
Activity 2.1:
Unit 2.2 Output devices
Display devices
Activity 2.2:
Unit 2.3 Devices, software and equipment
Device drivers
Plug-and-play
Other equipment
OCR
Activity 2.3:
Revision activity
At the end of the chapter
Term 2
Chapter 3 Storage, memory and processing devices
Introduction
Unit 3.1 Storage devices
Primary storage
Secondary storage
Storage media for backup
Activity 3.1:
Unit 3.2 Processing devices
Motherboard
Central processing unit (CPU)
Random-access memory (RAM) and read-only
memory (ROM)
Interpret computer advertisements
Activity 3.2:
Unit 3.3 Basic troubleshooting
Storage and processing devices
Activity 3.3:
Revision activity
At the end of the chapter
Chapter 4 Software
Introduction
Unit 4.1 The role of application software
Unit 4.2 Collaboration and communication software
Multimedia software
Communication software
Activity 4.1:
Unit 4.3 Compatibility issues
Updating software
Activity 4.2
Unit 4.4 Software for physically challenged users
Activity 4.3:
Unit 4.5 Cloud-based applications
Google G Suite
Microsoft Office
Activity 4.4:
Unit 4.6 Online storage
Activity 4.5:
Revision activity
At the end of the chapter
Chapter 5 Hardware, software and computer management
Introduction
Unit 5.1 Basic system requirements
Activity 5.1:
Unit 5.2 Software installation
Online download
Portable storage medium installation
Activity 5.2:
Unit 5.3 File management
File types
File attributes
Import and export
Search
Activity 5.3:
Revision activity
At the end of the chapter
Terms 1, 2, 3
Chapter 6 Social implications of hardware
Introduction
Unit 6.1 Input and output devices for physically
challenged users
Input devices
Output devices
Activity 6.1:
Unit 6.2 Health issues due to input and output devices
Ergonomics
Activity 6.2:
Unit 6.3 Protecting your hardware
Hardware protection
Activity 6.3:
Unit 6.4 Power supply and settings
How to protect your devices from power failures
Activity 6.4:
Revision activity
At the end of the chapter
Term 3
Chapter 7 Networks and internet technologies
Introduction
Unit 7.1 Networks
Types of networks
Basic components of a network
Network software
Communications media
Network communication
Activity 7.1:
Unit 7.2 Intranet vs internet
Intranet vs internet
Activity 7.2:
Unit 7.3 Basic network security
Passwords
Usernames
Access rights
Activity 7.3:
Revision activity
At the end of the chapter
Chapter 8 Social implications of computer networks
Introduction
Unit 8.1 Social issues for networks
Unauthorised access
Ethical use of networks
Acceptable use policies of schools
Activity 8.1:
Unit 8.2 Network security
Network security
Network security and BYOD
Privacy issues
Activity 8.2:
Unit 8.3 Databases and Big data
Databases
Big data
Activity 8.3:
Unit 8.4 Normal currency vs cryptocurrency
Activity 8.4:
Revision activity
At the end of the chapter
Chapter 9 Errors and bugs
Introduction
Unit 9.1 Human error
The GIGO principle
Unit 9.2 Verification and validation of data
Databases
Verification and validation
Unit 9.3 Software bugs
Unit 9.4 Hardware failures
Revision activity
At the end of the chapter
Chapter 10 Social issues and online protection
Introduction
Unit 10.1 Social-engineering tricks
What to do when you suspect you are a victim?
Activity 10.1:
Unit 10.2 Data protection
Guided Activity 10.1
Guided Activity 10.2
Guided Activity 10.3
Activity 10.2:
Unit 10.3 Protecting yourself online
Online harassment, stalking and bullying
Malware (Malicious ware)
Activity 10.3:
Unit 10.4 E-commerce and e-banking
Advantages of e-commerce
Advantages of e-banking
Activity 10.4:
Unit 10.5 How antivirus programs work
Application permissions
Activity 10.5:
Revision activity
At the end of the chapter
Chapter 11 Internet and the World Wide Web
Introduction
Unit 11.1 Internet communication
Voice over Internet Protocol (VoIP)
Video conferencing
Activity 11.1:
Unit 11.2 Online transactions
Activity 11.2:
Unit 11.3 The Internet of Things (IoT)
Activity 11.3:
Unit 11.4 Fourth Industrial Revolution (4IR)
Activity 11.4:
Activity 11.5:
Unit 11.5 Social media
Advantages
Disadvantages
Best practices
Activity 11.6:
Unit 11.6 Internet access
Mobile internet access
Activity 11.7:
Unit 11.7 Browser and email software
Email
Unit 11.8 Usability of web pages and websites
Link to word processing and forms
Activity 11.8:
Revision activity
At the end of the chapter
Term 4
Chapter 12 E-communications
Introduction
Unit 12.1 Register a web-based email address
Guided Activity 12.1
Do’s and don’ts when writing an email
Activity 12.1:
Unit 12.2 Managing email
Organise using labels
Guided Activity 12.2
Guided Activity 12.3
Guided Activity 12.4
Guided Activity 12.5
Guided Activity 12.6
Guided Activity 12.7
Guided Activity 12.8
Guided Activity 12.9
Prioritising emails
Guided Activity 12.10
Guided Activity 12.11
Guided Activity 12.12
Distribution lists
Guided Activity 12.13
Filters
Guided Activity 12.14
Guided Activity 12.15
Activity 12.2:
Revision activity
At the end of the chapter
Terms 2, 3, 4
Chapter 13 Information management
Introduction
Unit 13.1 Defining the task
Activity 13.1:
Unit 13.2 Finding information
Information-gathering tools
Activity 13.2:
Unit 13.3 Quality control of information
Evaluate questions
Evaluate information sources
Activity 13.3:
Unit 13.4 Spreadsheets and databases in data handling
Activity 13.4:
Unit 13.5 Processing data
Tools and techniques
Guided Activity 13.1
Extracting appropriate information
Unit 13.6 Analysing data and information
Adding data questions
Trends and patterns
Activity 13.5:
Revision activity
At the end of the chapter
Glossary