0% found this document useful (0 votes)
9 views14 pages

Cat Theory

Computer Application Technology grade 11 theory notes

Uploaded by

jasrahhussain9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views14 pages

Cat Theory

Computer Application Technology grade 11 theory notes

Uploaded by

jasrahhussain9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

M O D U L E 2.

1
Sunday, May 7, 2023 6:59 PM

• The internet
o Worldwide computer network consisting of computers devices and
networks linked using some forms of communication media

• WAN
o A network spread over a wide geographical area such as a city, country or
even continents

• ISP
o Company that has a permanent fast connection to the internet and that
sells internet access and services for a monthly fee

Most people prefer a broadband - a high speed, high bandwidth connection to the
internet

Wired VS wireless connections

• ADSL = permanent digital connection to the internet using a normal telephone line
o Split into two channels one for phone calls + and one for internet
• Fiber
o Data is transmitted along thin glass fiber tubes.
o Much faster than electrical transmission over copper cables used in
ADSL

Wired

ADSL Cheaper than cellular connections


ADSL Speeds drop the further you are away from the exchange
ADSL + Fiber more stable than cellular connections
Fiber Faster + cheaper + more stable than ADSL or cellular
Fiber Not affected by electrical interferences

Wireless

▪ Internet connectivity without ADSL or fiber line


▪ 3G or 4G dongle on a desktop
▪ Smartphone = Wi-Fi hotspot to connect other devices to the internet

Advantages Mobile access to the internet using a mobile device


Disadvantages • Limited or slow access if in area with poor cellular
coverage
• Never escape communication

Module 2.1 Page 1


• Never escape communication
• Need to limit the amount of data you use

Wi-Fi
• Way of connectivity to an existing ADSL or fiber connection wirelessly
o Fairly small area of coverage
o WIFI at a public hotspot can provide cheaper or free access
o Can use ADSL router to create own WIFI network
o Password needed the first time you connect a device to WIFI
o Your device will also detect other WIFI networks

People prefer data connection that is:


• Always on + everywhere
• Fast + reliable
• Hassle-free

✓ Always on
○ Laptop has to boot up or wake up from sleep mode before you can use it
○ Delays are difference between using mobile devices and traditional computing
devices

✓ Always connected
○ To tell you when you are being communicated with via phone, instant messaging
or VoIP services

✓ 3G/4G
○ Connect to the internet using cellular technology whenever a cellphone signal is
available

✓ Wi-Fi vs cellular
○ Usually only an issue for tablets models with Wi-Fi re less expensive
○ Makes more sense to het a model with cellular data so you can access the
internet wherever you are

Real time messaging • Instant messaging


• WhatsApp + snapchat + Facebook
messenger
Advantages • Chat in real time with more than
person at a time
• Cost effective
• Can easily witch from chat to
voice or video call
Disadvantages • No control to ensure that people
are who they say they are
• Can lead to anti-social behavior
• Creates opps for cyberstalking +
cyberbullying

VoIP Technology that allows telephone

Module 2.1 Page 2


VoIP • Technology that allows telephone
calls to be made over Lan + wans
6 internet
• Conference call technology
• Skype and other messaging apps

Advantages • VoIP calls are cheaper than


normal phone calls
• Software is generally free
• Allows you to transfer files and
make video conference calls
Disadvantages • Need an internet connection and
both users need to use the same
software
• Need to purchase credits to call
phones not on the internet
• Call quality may be poor if
internet connection is slow

Video • Allows two or more people to hold


conferencing online conferences at different
locations using a computer network
to transmit audio and video as if
they were all in the same room
• Webcam + microphone + speakers
linked to the computer
Advantages • People you are communicating with
are visible
• Cheaper than normal phone calls or
travelling to a meeting
Disadvantages • Video/audio quality can be poor on
a slow internet connection
• Can use a lot of data especially
when using video

Cloud computing • The sharing and use of resources


and applications offered as
services over the internet
• Online storage of files , web based
email
• Amazon rents and provides online
computing resources
• Google drive
• Web based word processing

Advantages • Software always up to date


• Do not have to download or install
any software
• Can use the software and access
your data anywhere

Module 2.1 Page 3


your data anywhere
Disadvantages • Only effective if you have a fast ,
reliable internet connection
• May have to pay a monthly fee
• Software might not have all the
features or capabilities of locally
installed software

Online storage • Keeping your data in the cloud


Advantages • File extensions are not blocked
• Online storage system backs up
the files
• Can save up space on local hard
drive
Disadvantages • Amount of space allocated for
saving file can be quite small for
free usage - must pay a
subscription fee to get extra
• People you have shared folders
with can remove files by mistake

File sharing - • Sharing files via any kind of


Email emailing platform + software
attachments
Advantages • Inexpensive way to transfer files
• Relatively fast method
Disadvantages • Not suitable for large files
• Some email systems block certain
file extensions
• Not always secure on the number
if recipients

File sharing - File • A protocol used for the transfer


transfer protocol of files between remote computers
without an internet connection
• Files are uploaded to an ftp server
or downloaded from an ftp server
• Cloud storage services have largely
taken over this function for most
users

Grid computing • Resources of different computers


are shared and used at the same
time to solve a single problem -
increases the total processing
power
• Used for scientific or technical
applications that require large

Module 2.1 Page 4


applications that require large
amounts of data to be processed
or high processing power

Examples • A scientist can use an entire


network of computers to analyses
data
• A businessman can access an entire
network of computers to forecast
the growth of particular stock
Advantages • Cost effective solution with the
ability to use many resources
• Provides a method to solve
problems that need a lot of
processing power
• Saves money and resources by
using the power of idle computers
Disadvantages • A fast network connection
between the computers and
network is necessary
• The computers that are used may
not be fast enough or might be
slowed down
• The computers may be affected by
malware infections

Government • Renewal of tv licenses


internet services • Election information accessed
online
• UIF + tax details added and
updated
• Telephone accounts and call logs
• Passports and ID documents
Advantages • Better communication between
government depts and citizen
• Access to services anytime
anywhere any place
• Immediate feedback
Obstacles • The digital divide
• The initial cost to develop these
sites
• Concerns about the security +
privacy and use of information
• Blame technology for what might
actually be a human error

Module 2.1 Page 5


M O D U L E 2.2
Sunday, May 7, 2023 1:05 PM

TECHNIQUES AND TOOLS FOR CYBER CRIME

 Social engineering
○ Any attempt to manipulate or con someone I to giving out confidential
information which can be used to impersonate them to install malware

 Malware
○ Any software that is written with negative intentions

 Phishing
○ It refers to attempts from people to con the user into giving out confidential
details such as pin numbers + passwords by posing as legitimate organization
usually via email

 Pharming
○ Scamming practice where user is redirected to another fake website even when
the user types in a valid URL in their browser. A criminal can use any data
inputted by the user

 Click - Jacking
○ An attack where a site appears to one thing but your clicks are redirected to do
something else

 Spoofing
○ E-mail spoofing is the forgery of an email header so that the email appears to be
from a different origin or person

 Spyware
○ Technique or software that tries to monitor and track the way you use your
computer and then reports this information to a third party

 Keylogger
○ Kind of spy that records your keystrokes + movements of your mouse +
screenshots of what is displayed in your screen as you type in an attempt to
discover your usernames and passwords

 Computer Virus
○ Malware written to disrupt the normal functioning of a person's computer
without their knowledge or consent.
○ Used to turn your computer into a bot to spread malware or to create security
loopholes for other programs to exploit

 Computer worm
○ A computer worm is malware that is able to distribute itself over a network
normally via email =, without a person having an infected program

 Trojan
Type of malware which is a destructive program disguised as a useful application.

Module 2.2 Page 6


○ Type of malware which is a destructive program disguised as a useful application.
Could delete files on your computer + scan your computer for personal
information
○ They rely on you to activate them

 Ransomware
○ Malware that encrypts data until you pay a ransom fee

 Adware
○ Software that downloads onto your computer and bombards your computer with
adverts that pop-up whenever you are connected to the internet
Bots
○ A computer that has been compromised and can be controlled remotely when it
is on and connected to the internet. Also called a zombie

CATEGORIES OF COMPUTER CRIME

 Harassment
○ Cyberstalking
○ Spam = unwanted and sometimes embarrassing adverts through email
○ Uploading unauthorized pictures on the web
○ Cyberbullying

 Internet Attacks
○ Attacks on businesses
○ Attacks on websites
○ Cyberterrorism
○ Denial of service

 Computers + theft
○ Bandwidth
○ Identity theft
○ Processing time and power
○ Data/intellectual property
○ Money
○ Copyrighted material

 Protecting yourself against computer crime


○ Software to help computer
▪ Anti-virus software - Software that scans files for different types of
malware
▪ Uses signatures and definitions to detect the signs of specific traces that
a specific type of malware leaves in your system
○ Precautions
▪ Be careful when installing free software from the internet as there might
be malware
▪ Have good password policies\
▪ Check that e-banking and e-commerce sited that you use starts with
https://

What not to do on the internet

Module 2.2 Page 7


 What not to do on the internet
○ Do not give out personal information
○ Do not click on links in pop-ups and do not click on popup windows
○ Do not click on links in phishing emails or in other types of email scams
○ Do not open attachments
○ Do not perform financial transactions on public computers

 Access vs privacy
○ If your workplace has computer usage policy you have accepted other people
might have access to your files
○ If you work on someone else's computer they can claim access to your data files
○ Free online services can use your data as adverts
○ Online services such as Facebook own everything you post to the site

 PARANOID ABC
○ A - assume nothing
○ B - believe no one
○ C - check everything

Module 2.2 Page 8


M O D U L E 2.3
Friday, May 12, 2023 1:31 PM

• Strengths and advantages of digital communication


○ Easy to communicate digitally
○ Connect and communicate worldwide
○ Used where you are on multiple devices
○ Faster than conventional methods\

• Weaknesses + Disadvantages
○ Depends on internet coverage and internet speed
○ Require other people to be connected digitally
○ Relatively expensive equipment and high data costs in SA

• Good Practices
○ Keep time zones in mind
○ Keep differences in bandwidth in mind
○ Digital communications are largely impersonal and faceless
○ You are not able to undo something you have said

USE OF DIGITAL COMMUNICATIONS

• E - mail
○ Composing + sending of mess gases electronically over a network
including the internet
○ Gmail + Outlook have a calendar , contact list, task list and
archive features to help you to be organized

• E - mail Calendar
○ Reminders about events + appointments
○ Sync the dates with you mobile device
○ You can access your schedule wherever you are

• E - mail Tasks
○ Add tasks to a to-do list
○ Assign a due date

• E - mail contact list


○ Address book or contact list
○ Contacts can be organized into groups
○ It can be configured to automatically add email address to the
list when you use them

• E - mail Archiving
○ Tidy up inbox by moving messages from inbox to an archive
folder without deleting them

MODULE 2.3 Page 9


• Social networking sites
○ Stay in touch and communicate with others all over the world
○ Advertise and market products or services
○ Network with people with similar interests

• Blogs + vlogs
○ Web blogs are websites that are updated often with news and
events in chronological or sequential order
○ Form of blog which uses video as the medium

 Publishing a blog
○ Website that allow you to create an account, set up your blog
and host your blog
▪ Word press + Blogger + Type pad + Weebly
○ Create an account on the website of a blog provider
▪ Decide a name
▪ Choose your theme and first post ideas
▪ Save draft of the post until you have completed the post

• Podcasts
○ Audio File
○ Can be downloaded individually
○ Can be produced by professionals or amateurs
○ Video podcast includes video clips or photos
▪ Can be used to download radio shows
▪ For educational purposes
▪ For tourists and visitors

• Wikis
○ Allows for the collaborative and creating of the content of web
pages
○ Take the form of a web page and access to them is usually free
○ How can be they
▪ Creating company intranets
▪ Creating community websites
▪ Creating reference sites

• GPS technology
○ Smartphones + cameras and other devices have GPS facilities
○ Some Businesses send out unique advertising to their customers
as they enter the vicinity

• Web browser
○ An application that allows you to navigate view and interact with
content on the web
▪ Fire Fox + Google chrome + Microsoft Edge

• Pop-up blocker
○ Is a small web browser window that appears on top of the
website you are viewing . Usually created by advertisers and

MODULE 2.3 Page 10


website you are viewing . Usually created by advertisers and
often open as soon as you visit a website

• Blocking of websites
○ Reasons for blocking websites
▪ Avoid phishing
▪ Prevent further targeting by spammers
▪ Parental access
• Caching
○ Web browsers temporarily store web documents such as HTML
pages + images on disk + caching
○ To reduce bandwidth usage and to allow previously visited web
pages to load quicker

• Browser plug - ins


○ Web pages sometimes contains specialized content
○ Plug - in is usually free
○ Increasingly browsers that have the capacity to display
specialized content

• Browser add-ons
○ Are useful hard party apps that can be downloaded to extend
the functionally of a browser beyond browsing

MODULE 2.3 Page 11


M O D U L E 2.4
Sunday, May 14, 2023 2:49 PM

 The impact of technology on the global community

➢ People communicate on a global scale


➢ Work + businesses and competition take place on a a global scale
➢ Telecommuting is possible
➢ Computer fraud can take place

 How to cope with information overload

➢ Learn to read quickly and accurately, identify the key points


➢ Learn to analyze and compare sources
➢ Take a disciplined and structured approach
○ Limit time spent on dealing with information
○ Filter email into categories
○ Use search tools properly

 Social networking services

➢ They are free


➢ They need users to register them
➢ They encourage people to get other people to join

⚫ Twitter
○ Microblogging service
○ Twitter allows people to send messages to their followers

⚫ Facebook
○ Free service that allows people to connect and to keep up to date wish
friends and family
○ Users can also set up or join user groups

⚫ Virtual communities
○ When a website is focused on serving the needs of people with a specific
shared interest it helps to create a virtual community

⚫ Kickstarter + IndieGoGo
○ You can produce an idea for a product
○ You create a presentation
○ You can work out a business plan

 How technology can benefit or harm society

MODULE 2.4 Page 12


⚫ Employment
○ New entrepreneurial opportunities and jobs are created by the IT sector
○ Job losses and unemployment of computer automation and outsourcing

⚫ Education
○ ICT improves Access to information + resources
○ Higher education requirements + digital divide

⚫ Culture + Languages
○ People are better able to record and communicate things that reflect
their own culture so culture can be preserved or shared with the world

⚫ Individual connectedness
○ People are able to connect with others around the world
○ Connectedness is virtual + not real

MODULE 2.4 Page 13


NETWORKS
Sunday, May 14, 2023 4:00 PM

• HAN - HOME AREA NETWORK


○ Used for communication among digital devices within a home
○ Allows for various devices to connect and share information with each
other

• WAN - WIDE ARE NETWORK


○ Type of computer network that spans a large geographic area such as
country + continent or even the whole world
○ Connection of smaller area networks such as LANs
○ Fiber optic cables

• PAN - PERSONAL AREA NETWORK


○ Type of network used for communication among personal devices within a
short range.
○ Exchange of data without cables

• Bandwidth VS Broadband
○ Band is the amount of data that can be transmitted through a network
connection in a given time measured in bps
○ Broad is the hight speed internet connection that can transmit large
amounts of data simultaneously
○ Band is used to transmit data
○ Broad refers to a specific type of band that uses a wide range of
frequencies to transmit data
○ Band is any type of connection
○ Broad is a wired connection
○ Band is available everywhere
○ Broad is only available in urban and suburban areas only

• ADSL VS CELLULAR
○ Is a type of wired broadband internet connection that use traditional
copper telephone lines
○ Cellular usese wireless technology
○ ADSL is typically faster depending on plan and location
○ Cellular speed depends on the coverage area and siganl strenght
○ ADSL is more reliable than cellular internet since it is a wired connection
and is not affected by weather or enviromental factors
○ Cellular can be affected by signal interference + network congestion +
weather conditions
○ ADSL is typically only available with access to traditional copper telephone
lines whuich may limit availability in certain rural or remote areas
○ Cellular is widely available
○ ADSL is more affordable and cellular is more expensive

EXTRA MODULE 2 Page 14

You might also like