Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

COMPUTER

APPLICATIONS
TECHNOLOGY

MIND MAPS
The information in these mind maps is supposed to supplement the textbooks, not
replace it.

Although the author has made every effort to ensure that the information is correct,
the CAPS document must still be consulted as the primary guideline.

Please report any omissions or errors to claire.smuts@hsrandburg.co.za

Compiled by: Claire Smuts

Translated & checked by: Fotiene Avrakotos

QR codes to videos: Fotiene Avrakotos

Revision date: 22 April 2018


Input
•give input to the
computer. Without it,
the computer does
not know what to do

Processing
• the interal process
Communication where the computer
•many times you share processes data so that
the output you saved what you requisted
with other people can happen (e.g.
through e-mail etc. sorting, searching for
something on the

Information
computer)

Processing
Cycle

Output
Storage • what the computer
• to store the output gives back to you
permanently, you after the processing.
store it on a hard Normally 'soft' output
drive or a flash disk on the screen or 'hard'
output on printout

ICT: Information and Communication Technology

ICT refers to technologies that provide access to information through telecommunications (such as the
Internet, wireless networks, mobile phones and other communication media)

2
HARDWARE Physical keyboard

(Peripheral) Keyboard (wired


Touch screen's pop-up
& wireless/
keyboard
bluetooth) For blind people - braille
keyboards, microphone
Disabilities
For visually impaired/motor skills
- keyboard with big buttons

Wireless advantages: Cables are


not in the way, can work far from
computer
disadvantages: theft risk, needs
Mouse (wired & wireless)
batteries, more expensive to buy,
interference of signals, weaker
Touch pad response time (also applicable to
Pointing stick keyboard)
Stylus
Pointing devices Can recognise more than one
'touch' and react - like
Touch screen/multi touch pinch/zoom (also applicable to
screen touch pad). For security, use a
screen lock pattern on portable
devices.
Input devices

For motor disabilities -


trackball/footpedal/
suction-blowing device

Joystick, Steering wheel,


Gaming devices
Controller (Xbox/Playstation)

Used in POS system (point of


Barcodes (uses light light sale) - for improved accuracy and
rays/ optics) speed (ensure that you can
describe the flow)

RFID - wireless (uses radio


waves)

Quick link to weblink - does not


QR codes
need to type in URL manually

Scanners Card readers (bank card) -


OTM / paypoint For security - much better than
(resolution
password, cannot forget it
measured in dpi)
Biometric - Face recognition
Linked to one person's unique
with camera, Fingerprint,
biometric features
Iris/Retina scanner

Office Flatbed (1 at a time) & Disadvantage - you have to be


Feeder (pack of paper) there in person, can endanger
scanners you

OCR - software that converts it


Character recognition
to editable text

Webcam,
Digital video camera
Video & sound
Microphone (voice
recognition, record music)
3
HARDWARE
Circuit board that connects all components and parts of
(components) the computer with each other

Motherboard
Contains a couple of slots for additional cards like sound
and graphics cards

Speed measured in = GHz

Quad core = 4 "cores"

*CPU - does the


processing/thinking Cache memory - files are kept in super quick memory so
that access to the CPU is faster (than to RAM)

Well-known make e.g. Intel / AMD


Processing components

Function: loads current programs & documents when it is


processed by the CPU so more RAM = can run more
programs simultaneously
(inside your system unit)

Feature: unstable/volatile: in other words: loses content


withouth power (temporary)

*RAM
(Primary Memory) E.g. DIMMS, DDR3/DDR4

Measured in GB

Cheapest way to upgrade computer & improve


performance

Small chip built-in on the motherboard

Helps computer 'boot' - startup process (e.g. tests if all


ROM components needed is there)
(Read only memory)

Software on ROM that contains basic instructions:


BIOS - Basic Input Output System

Onboard = built-in on computer,


* Biggest
Dedicated = separate card (better graphics)
influence on
performance/ Graphics card
speed of Has its own RAM and GPU (Graphics processing unit) thus
computer better performance since the system CPU & RAM is not
used by graphics e.g. Nvidia
PSU - Power supply unit
4
HARDWARE
Size measured in inch" diagonal over screen

(Peripheral) Resolution measured in pixels


e.g. 1920 x 1080 (also 720p, 1080p, 2K, 4K)

Aspect ratio e.g. 4:3, 16:9


relationship of length versus width

Response time e.g. 2ms (milliseconds)


Screen (soft copy - thus how quickly a pixel can change from one shade to another
Specifications
electronic on screen)
Contrast ratio e.g. 1:1000000, number of variations between
Measures brightness in light and dark (lower ratio - faded image)
Projector lumens (needs expensive
bulb with limited hours) Colour depth e.g. 8-bit, 32-bit
Number of colours that a screen can display
Using a projector, an e.g. 24-bit=16.7 million colours
instructor can manipulate
Interactive whiteboard elements on the board
using finger/special pen as Use VGA (old), DVI HDMI & DisplayPort for
a mouse, directly on screen (upgrade of VGA), HDMI or high resolution and can also
DisplayPort (new) cables transfer sound

Important for people


Speakers & headphones
that are blind

speed (ppm - pages per minute), resolution (dpi), workload


Output devices

(how many pages it can print in a month/lifetime),


number of ink colour containers
(e.g. CMYK - Cyan, Magenta, Yellow, BlacK)

Default printer (indicated with ) - print to it automatically


Specifications

Printing queue - where the print jobs wait in line

Spooling - the process of sending print jobs to the queue &


the printer

Printer itself is expensive

Laser (commonly used


Toner is expensive but cost per page works out cheaper
in businesses)

Quick printing speed

Advantage: saves cost & space because all the devices are in
Multifunction (print,
one. Disadvantage: if 1 breaks and is sent in for repairs, all the
scan, copy, fax, email) other functions are not available
Printer (hard copy -
printed page)
Printer itself is cheap

Fax
Inkjet (mostly home use) Ink is relatively cheap but cost per page is expensive

For deaf people - Slow printing speed


devices that vibrate
Prints duplicates
Dotmatrix
(e.g. pharmacists)
Low resolution quality - low cost

Prints 3 dimensional solid objects from a digital 3D model by


3D printer adding successive layers of material on top of one another.

Braille printer (for blind


people)

5
Memory cards for
extra storage space in
HARDWARE
e.g. smartphone or Micro SD, Mini SD, SD,
digital cameras CF, MMC
(needs card reader for
copying to computer) Advantages: cheap Capacity: the
storage media (ideal for
maximum
archiving), read-only
amount that
Disadvantages: something
Damages easily, slow can contain
Optical media CD, DVD, Blu-Ray read/write speed,
cannot store a lot of
data (small capacity)
USB Hub for Micro-USB's are used
additional USB ports for e.g. smartphones Copying contents off a
protected disc is
referred to as "ripping" a
Ideal for portable
disc
storage - larger capacity
Flash disks
than CD/DVD, fast
(electronical - flash read/write speed, does
memory) not damage easily,
Storage devices

physical size is small

Advantages: Faster data


access, does not
damage easily (no
movable parts),
physically smaller.
Commonly used to load
SSD (Solid state drive) operating system to
(Flash memory) increase performance of
Types computer

HDD (Hard disk drive) Disadvantage: Much


more expensive than
HDD, storage capacity is
2.5" Portable (USB not so big
powered)

Kinds 3.5" External (simple


power plug in)
Hard drives
(usually connects with SATA
(secondary memory) Internal cabels)

Function: Permanent
storage of programs & data

Characteristic: Stable/non-
volatile: keeps contents
without power

Slower read/write speed


Features than RAM

1 KB = 1024 bytes Can connect multiple


Area on hard drive that
HDD's through a RAID
servers as RAM (when RAM
system
becomes full). Swop files
1 MB = 1024 KB are files that swop between
the HDD & RAM. Thrashing
Measurements of 1 GB = 1024 MB Serves as virtual memory is when the HDD is
storage devices overloaded by the fast
exchange of files between
1 TB = 1024 GB system memory (RAM) and
virtual memory (on the
HDD)
1 PB (Petabyte) = 1024 TB

6
Usually contains SSD
HARDWARE Very high screen
resolution
Ultrabook
No optical (DVD) drive

Laptop/Notebook Thin & light = expensive!


Types of Multi-purpose Devices

Laptop and tablet in one


Tablet-PC (screen can be taken off)

Small screen (<13")


Portable
(BYOD policy) Netbook Minimum specs (slow)
(bring your own (cheapest type of laptop)
device)
No optical drive
power failures and power peaks with a

Not all types can make


Tablet
UPS – uninterruptable power supply

calls
Protect desktop computers against
Activate alarm / movement

Screen size between


Phablet tablet & smartphone, can
make calls
Keep computers safe:
Lock room/office

Has GPS, camera (that can


Use cable lock

Smartphone be used as scanner),


gyroscope, accelerometer
sensor

Entry level - basic


Desktop PC computer with low specs
High-end - top specs


Server (in network)

Not portable
Work station (very Used by e.g. scientists /
strong computer) architects / video editors

Super size server - spans


many rooms - MAIN
Mainframe computer computer in big
organisation

Definition: measures physical location with geographical


coordinates with satellites
Dedicated devices

GPS regularly updated

GPS (can also be built


into smartphone/car) Can plan routes automatically

ATM (handles financial Can share your location with others


tasks)
Can keep your eyes on the road more than you could with
a printed map
Only 1 purpose
Resolution measured in
The higher, the better, but
Megapixels (MP)
takes more space
Note: Mega = million

ISO rating - light


sensitivity Optical - better quality -
done with lenses
Digital cameras
Zoom
Digital - done with
Sensor size - larger = software
better quality (e.g. DSLR)

Places GPS coordinates in


Geotagging
photo's metadata

7
The design of devices /
HARDWARE Ergonomics items to fit to humans
natural form
E.g. Chair with good backrest / table with
right height

Get different types e.g.


Carpal Tunnel Syndrome
RSI - repetitive strain (wrists) or Gamers thumb Use ergonomically designed INPUT devices
injury
Suggestions to prevent:

Take regular breaks


Definition: Environmentally
friendly use of computers

Rather fix/ reuse any


devices

Switch off when not in use


or sleep/hibernate
Green computing

Discard responsibly - with


supplier

Print 2 per page, back to front, check print


Save paper preview, distribute electronically
Concepts

Save ink Draft mode (lighter), less pictures

Combining multiple devices


E.g. Smartphone/Tablet/
Convergence / technologies into one Smart TV
device

No piracy, respect privacy, no malware


Ethical use
(right & wrong) Digital divide is when people don't have access to technology due to a
lack in skill/knowledge or finances

Someone who uses computers for personal


Personal user reasons (minimal for work)

SOHO - Small Office Home


Business managed from a house
Office
Types of users
Anyone using computer devices "on-the-go"
Mobile user thus anyone who owns a smartphone

An enterprise) is a company which hundreds


Enterprise user or thousands of employees - each user in
such company is an enterprise user

More Effective, Accurate & More work in less time, do not make
Reliable than people mistakes, do not get tired, doesn't strike

Reasons for using ICT Communication is so much Always give examples in comparison with
easier & faster mail / letters

Save paper, labour, communication costs


Economical etc.

8
HARDWARE & SOFTWARE
Using technology to create a simulation of a
Definition 3D-environment that can be interacted with a
person in a seemingly real or physical way.

Using equipment such as helmets with screens


and gloves fitted with sensors, it allows users
How it works & Purpose to be immersed into a virtual world. E.g.
Google Cardboard, Oculus Rift, HTC Vive etc.

Explores places such as travel destinations


(using 360° videos).

Virtual Reality
Virtual reality makes education more engaging
Uses and entertaining.

Used to train employees (example pilots being


trained) without causing damage or risking
lives.
New Tegnologies

Technology is still new so there are technical


limitations such as weak hardware and low
resolution.
Limitations

Moral and ethical concerns

It takes the physical world and adds


Definition (augments) objects such as graphics within the
real world.

Simplest versions use smartphone camers, but


there are technologies such as Microsoft
Hololens that contain software, sensors, a
compass and small digital projectors which
display images onto real world objects.
How it works & Purpose
To enhance our real world for purposes such
as entertainement (e.g. Pokemon Go,
SnapChat filters) or productivity (e.g. Heathrow
Airport Guide that helps you get to the right
gate)

Entertainment and education applications


Artificial Reality include cultural apps with sightseeing and
museum guidance, gaming apps with
traditional games using AR interfaces, and
some smartphone apps that make use of AR
Uses for an entertainment and/or educational
purpose.

AR can be applied so that the surgical team


can see the imaging data in real time while the
procedure is in progress.

Due to the fact that the content is not real, it


may obscure or narrow a user's interests or
tastes

Limitations There are also privacy concerns. Image-


recognition software coupled with AR will,
quite soon, allow us to point our phones at
people, even strangers, and instantly see
information from their Facebook, Twitter,
Amazon, LinkedIn or other online profiles.

9
SOFTWARE
Graphic user interface
(graphical way for people
Menus, Icons, drop down lists
to interact with the
computer)
Control basic security (logins)
Operating system also E.g. Windows 10 (paid)
referred to as 'platform' E.g. Linux (OSS)
E.g. Android (smartphone) File management (folders, file extensions etc.)

Manage integration between software and hardware


Functions

Drivers for devices (manage communication between


device & OS - lets device be controlled)

When devices are automatically installed, it is "Plug and


Play"

Backup Good habits - not in the same place, safe place etc.
System Software

Uninstaller Used to remove programs safely from computer

Like Winzip - makes it smaller & can then email folder.


Compression (.zip / .rar) Can zip or unzip to use again (to edit)

Utilities
Adds pieces of files that are spread over the whole HDD
together again to improve SPEED

when it does not come Defragmenter


with the operating Can slow down computer speed (performance) while
system, it is a scanning
third-party utility

Search your computer for cached / temporary files or


Disc Cleanup Wizard programs that you no longer use / recycle bin that is full
and gives you the option to delete / remove.

Disc Scanner Scan & fix flash- and Hard drives

Prepares the drive for storing files. Often used in case of


Format corruption/virus contamination because it wipes the
content of the storage medium.

Update, update, update


Examples: Kaspersky, McAfee, Norton EsetNOD32.
virus definitions so that it Free: Windows Defender, AVG Free Edition
can be recognised!

Scan internal / external


Can slow down computer speed (performance) while
harddrives / flashsticks for
Antivirus scanning
viruses

Put potentially harmful / Quarantine: Safe area on hard drive where virus cannot
malicious software in harm anything - allows you to choose or remove
quarantine something

System software manages Application software are


resources on computer / allows programs for personal use /
computer to be used tasks

10
Examples of file extensions

Graphics & Design Photoshop, Paint Jpeg, bmp, png

.docx, .xlsx, .accdx, .pptx


Application Software
Word, Excel, Access, Powerpoint Share document with formatting =
.rtf, without formatting = .txt, in
table format = .csv (comma
separated values)
Office Suite
Other people cannot easily change
content

.PDF (E.g. Adobe Reader - free)


Can open even if you do not have
the original software
(retains formatting)
Communication Outlook, Skype, WhatsApp

Games
Sound (.mp3, .flac, .wav)

Entertainment Windows Media player, VLC


Videos (.mpg, .mp4, .avi, .wmv,
.mov)

Chrome, Firefox, Internet


Explorer, Microsoft Edge, Safari
Webbrowser
SOFTWARE

(files .html)
Plug-in!
Flash, Quicktime, Java
(needed for multimedia)

Free, may share and use freely Remember metadata?


Freeware
e.g. Adobe Reader Information about a file
– e.g. author, editing
Can be used free for a while time, type of camera,
Shareware (trial software
(test period), then pay or lose music genre etc.
also falls under this) (some or all) functionality

E.g. Linux, Android, Open Office,


Types

Like freeware, but can change Ubuntu


Free and Open Source
source code and program
Software (FOSS) further Advantage: Many people can work
on code

EULA: End-user license agreement

License Agreement (EULA) (also


for free, share & OSS) Single user

Site License (many computers on


Proprietary (paid) one site for one company)

When software/anything is shared


Piracy (software piracy) illegally. Fight through: serial key /
online activation

11
SOFTWARE Try to prevent bugs
Releases a test version namely
'Beta' version

Specific problem made in


software when created
Necessary due to software
error / bug
Bugs can be security gaps
Updates
which gives hackers a 'way in'

Software solution for one


Patch
specific problem

Collection of all previous


Service Pack
patches & new features

If a program does not respond Press CTRL+ALT+DEL / Open


"End task" - Ends the program
/ hangs Task Manager

'Backwards compatibility' -
New program can open old
files, old program can not
open new files
A problem between different
Compatibility
versions of the same software
Solve problem by upgrading
all (newest version), to
Concepts

standardize (same version) or


to export file to older version

Just enough so that program


Minimum specifications
can install and work
System compatibility - is the
computer hardware sufficient
for the software Enough so that program
Recommended specs works fully (excellent), smooth
output

Computer reads to you what is


Text-to-speech
on the screen
(speech synthesis)
(requires speakers - output)

Computer can respond / type


Speech-to-text your voice commands
(requires microphone - input)
Software Accessibility options
(For people with Magnification
disabilities/disabled))
Black background with white
High contrast theme text for people who are
struggling to see

Help people to press shortcuts


Sticky Keys
etc. 1 button at a time

Folders within folders in


logical order
File management
File path e.g. C:\My Step-by-step indication in
Documents which folders a file is stored

12
NETWORKS
Can share resources like printers and Internet access

Data is kept in 1 central location / central storage

Easy communication between users

Advantages
Share of software and / or updates
Features

Can make backups from 1 central location

Can set user permissions such as access to specific folders or disable USB
drives to prevent theft of data and malware spreading

Viruses spread easily

Must have a lot of knowledge to draw up


Disadvantages

Requires good security (so unauthorised users can not access confidential
information)

Acceptable use policy

Definition: Contract / agreement between user and institution


In school/work environment
Concepts

an AUP is signed
Includes what may and may not be done on the network, forms of online
communication allowed, amount of data that may be used, use of flash sticks,
procedures for problems like identity theft, viruses etc., tips to prevent
copyright infringement and plagiarism.

A virtual private network (VPN) is a technology that creates a safe and


encrypted connection over a less secure network, such as the Internet

Virtual Private Network (VPN)


The benefit of using a secure VPN is it ensures the appropriate level of security
to the connected systems when the underlying network infrastructure alone
cannot provide it

PAN - Personal area network -


can fit on 1 table Additional advantages:
Easily add more computers/devices
Faster to set up because there is no
HAN - Home area network - need to lay cables
2 or more rooms Better portability of devices
Types

(no cables)
LAN - Local area network -
WLAN - Wireless LAN
more computers in 1 room Additional disadvantages:
Security risk is extra high for hackers
Can use up internet data if others
WAN - Wide area network -
gain access
E.g. Gauteng
Signals can be disrupted
Can be slower than cabled network
GAN - Global area network - due to obstructions like walls
e.g. Internet world wide

13
NETWORKS File server Controls which sites may be
visited

Server: Provides services/resources Can monitor usage of


Proxy server (internet server)
to computers in the network individual people
such as printers & Internet.
Special server operating system Does central web storage
E-mail server (web caching) and save data
(e.g. Windows Server 2016)

Controls all the printers in


Print server
the organisation

Must connect to network to


Thin client work - basically just a screen,
keyboard & mouse

Workstation/Client: Uses the Can function as standalone


Fat client
services/resources provided by the server computer
- therefore not as powerful
Network Interface
Card/Controller
Must have a NIC in computer
*Switch: A device that connect devices on To connect 1 device to a
to connect to network network, note: you also get a
the network (internally - many devices to
wireless NIC
Hardware Needed

each other)

Better because it's more


*Modem: Convert digital signals from
stable & faster signal
your devices to signals that
can be sent over your Internet
connection and vice versa
General advantages of cables Less knowledge needed to
above Wi-Fi set up vs. wireless network

Better security (people do


Cables - UTP (common network cable - not hack into it so easily)
cheaper) - uses RJ45 port or FIRE OPTIC
(use light beam = fast data transfer)
'Backbone' = connects two
LANs to each other
*Router: Connect a network to another Fibre obtic usually used as
one - eg. your home to the Internet 'backbone'
Note: Fibre is very expensive,
requires training to install &
breaks very easily
Can "tether" your phone also
use like a USB Dongle
Dongle: Looks like a flash disk in which a
SIM card can be inserted to use cellular
Internet on a computer/laptop Also get a Wi-Fi Dongle -
does not connect by USB (for
charging only). Also known as
pocket Wi-Fi
*Wi-Fi access point: A network device
that allows a Wi-Fi device to connect to
a wired network

Wi-Fi Repeater: Used to extend the


coverage area of your WiFi network. It
receives your existing WiFi signal,
amplifies it and then transmits the
boosted signal.

*Firewall: Hardware/system software * In a standard home Router, these


that monitors access/ control from the
five devices/features are merged
network/devices to and from another
network (like the Internet)

14
INTERNET
Cheaper than regular calls (only uses
data)
INTERNET is a global network that is
publicly available Can send video & audio

INTRANET is shared content that is


Can make calls wherever Internet access
only accessible to members of a single VoIP = Voice over Internet
is available
Protocol e.g. Skype
organisation.
Available on different devices like
EXTRANET is a private network that Instant messaging (WhatsApp, computers & smartphones
uses Internet technology and the Facebook Messenger,
public telecommunication system to Hangouts, Skype chat) Video usage can use a lot of data
securely share part of a business's (especially with a high resolution
webcam)
information or operations with Fax to email
suppliers, vendors, partners,
customers, or other businesses. An
Grid computing: Using multiple Use of programs through a web browser
extranet can be viewed as part of a
computers' processing - runs and is installed on Internet servers
company's intranet that is extended to instead of on own computer
power to solve 1 problem
users outside the company. (as if it were 1) e.g. SETI

Saas - Software as a Service - where you


pay a monthly/annual fee and receive
FTP = File transfer protocol -
the software as a service on the web
share of large files over a long
distance through the Internet
No installation/updates required

Services: Cloud computing


(web applications)
Internet

Your own computer does not have to be


so powerful because it works from the
Internet server
Netiquette = Good manners
on the Internet
Do not type in capital letters A lot of people can easily work together
(shout) on a document

Good spelling
Do not send large email Disadvantages: Internet access required,
attachments programs usually contain less features
versus "desktop version", many types
are SaaS (need to pay) only some free

Storing information/files on Internet


servers

Can get information anywhere if you


have Internet access

Can serve as a "Backup" for your data

Cloud storage Synchronises devices with the same


content
The INTERNET is a global network
of computers Disadvantages: requires internet
connection for access to data, you only
The WWW is only one of the get a small amount of space for free
(need to pay after that), up and
services on the Internet that downloading data costs money, no
displays web pages control over backup and security

15
INTERNET To: to whom the e-mail is addressed

CC: other people who are being copied to take note - everyone can see each other's email
addresses

BCC: people who are copied but cannot see each other's addresses (Netiquette - BCC people
when emailing a group)

RE: an email reply automatically gets this prefix in front of the subject

FW: an email sent to someone else automatically gets this in front


of the subject

E-mail Subject line: the subject of the email

Reply to all: when there is more than 1 person in the To or CC field


you can "reply to all" and send a message to the same big audience
(use with consideration!)

Attachment: attach a file to email


(size limited to a certain number of MB)
Mail rule: automatic actions in an e-mail program
according to rules you specify

Flags/Tasks: you can add emails (or your own items) to a task list in the email software,
specifying due date and even set reminders

Registrations for new sites / services are usually done with an email address or Social network
Registration account. A CAPTCHA is then also asked to verify that it is a human attempting the registration,
Internet Services

and not a computer (which would probably be a DDoS attack).

Definition: Online service or technology that allows people with similar interests to
communicate with each other regardless of time or distance

E.g. Facebook, Twitter, Instagram. Often use a URL-shortener service to shorten URL's before
posting to social media (no problems with character limitations and just looks neater)

Benefits: Allow groups to create virtual communities or pages for businesses/famous people,
etc.
Huge audiences to share your life with
Can inform family members/friends about your life
Social Businesses can place cheap and targeted ads and
networks interact with their customers

Disadvantages: Thinking that friends on social media are real friends


Danger of Cyber stalking/Cyberbullying
Danger of online predator/pedophiles
Someone who does not know you, may monitor your online habits to take advantage of it (to
your detriment)
May be addicted to social networks

Protect yourself/your business:


Do not publish offensive content
Do not accept friend requests if you do not know the person

Audio file downloaded from the Internet that can be played on computers or devices such as
Podcast
smartphones e.g. with radio programs/training etc. (Vodcast - when it includes video)

One-way flow of information broadcasted over the Internet to a large audience that may consist
Webcast of audio, video and/or presentation slides
Audience does not usually contribute to content

Interactive meeting or seminar. The content is usually education-based. The audience is usually
Webinar
smaller and takes part in the conversation through surveys, Q & A etc.

16
INTERNET Encripted connection is
indicated with https - don't do
www.[websitename].
transactions on public
Web address = URL [organisation].[location]
computers
E.g. www.hsrandburg.co.za
Research seller's reputation
Portal - access point to looking at gradings and
many at www reviews before first purchase

Advantages: available any time


Services e.g. e-banking, of day from the comfort of
e-commerce your own home, can do better
comparisons (price, variety
etc.)
Wiki - website where
people work TOGETHER to Disadvantages: can fall victim
create/compile it to scams if user doesn't do
sufficient research
Content aggregator: Gather
Types information from many Online transactions are verified
websites - like RSS feeds
World Wide Web

using a OTP (one-time


password) on your cell

Crowd funding platform (website): a process where a single idea


or business practice is funded by multiple small donations from
volunteer contributors, usually before the business venture is
started. The contributors will then receive the product when it is
finally put into production

Good blog habits: Update


Blog (like a online diary, regularly, use pictures/videos,
chronological) respond to readers'
(Vlog = video blog) comments. Create using
Wordpress, Tumblr etc.

Effective searching on WWW:


Home button (page on which
 Add more key words your browser opens
 Use advanced search or you can go back to)

like -word to exclude terms Back / Forward


 Use filters e.g. when it was
posted / type of source Favourite / Bookmark - save
the link to the website for
(news/ image etc.)
future use

Features History - return to


chronological history of
Browser plug ins: To see previously visited addresses
multimedia e.g. Flash Player,
Quicktime. Address bar - where the URL
Program = web browser, of the website shows (also
eg. Chrome, Firefox. search bar)
Use Search engine = e.g.
The program/application
Google, Bing, Yahoo! Tabbed browsing - so that
used to visit/view web
Software that allows a user many web pages can be open
pages to search for information on at once
the www using keywords
(like a library assistant)
Webpages that have
previously been visited are
Webcaching =
stored on the "local pc" (faster
access in future & saves data)

17
INTERNET Definition
Very large structured (clean data) and unstructured (e.g. free text
tweets/reviews) data sets that are analysed using computers to reveal trends.

Purpose Reveals patterns and trends relating to human behaviour and interactions

To optimize and improve lives. E.g. shopping habits, health risks and indicators
Big data Uses
of serious illnessess.

Massive skill shortage on interpreting big data.

Required hardware and software is extremely expensive.


Limitations
Shortage of space to store all the data

Privacy concerns

The trend whereby all sorts of objects and devices are increasingly being
Definition connected to one another via the Internet, communicating independent of
human interaction.

Sensors in devices produce data (see big data) that can be used for diagnostics
Purpose
and running systems more efficiently.
Internet
New Trends

of
Devices can communicate without human intervention to automate and
Things Uses improve processes and reporting, e.g. heartrate monitor in smartwatch triggers
alarm when your sleep cycle is at its lightest

Internet connection required


Limitations
Privacy concerns about data being gathered about your behaviour

A form of virtual, digital currency. Most well-known example of a


Definition
cryptocurrency.

Send money anywhere in the world at any time - no limits. Decentralised from
Purpose
banks and governments so no interference and minimal 'bank' charges.

Bitcoin Bitcoins can be exchanged for other currencies, products, and services. They
have caused concern in that they are often used for payment in criminal
Uses
activities such as ransomware demands. However, more and more legitimate
companies are accepting them as a means of payment.

Not very widely accepted yet. Bitcoin wallets can be lost. Currency is extremely
Limitations
volatile.

A process in which broadcasting services using traditional analogue


technology are replaced with digital technology. This provides better quality
Digital migration
pictures and sound as well as electronic programming guide. However, there
will be more costs for the user.

A form of education and training delivered and conducted via the Internet
using mobile devices, such as tablets and smartphones. It is designed to be
Mobile or M-learning
flexible, allowing learners/workers/students access to education anywhere,
anytime.

18
INTERNET
Use headings, short paragraphs,
columns

Bullets / numbered lists works well

Group information that belongs


together logically
Readability
Background should be easy on the
eyes (not too bright)

Use standard capital and lowercase


letters - ALL CAPS is difficult to read

Fonttype, size and colour should be


readable

Links should be easy to find,


especially main menu
(home/contact us etc.)

Links should be short and


understandable
Navigation
All hyperlinks should work

Links should all look the same


Usability of websites
- basic principles Same basic layout for all webpages
in the website
Consistency
(the same everywhere)
Use the same colour / font types /
World Wide Web

theme

Has to be suitable for target market


(website for young kids would look
different than one for teenagers)

Layout
Text and graphics should fit on a
How different elements standard screen
are placed

Websites should load quickly (not


too much multimedia)

Needs to be easy to read

Needs to match content (can't use a


Typography funny font for serious content)
The placement and
formatting of text Use general font types so that it's
available on all computers
Websites specifically
Mobile websites designed for
Not to many font types on one
smartphones/tablets website

19
INTERNET Can it use it anywhere BROADBAND =
Cellular (any High speed data transfer
connection using a 3G (older)
SIM card)

Technologies
4G / LTE (newer - faster)

Fixed connection at home

Cheaper than cellular only if data


usage is high
ADSL More stable connection than
cellular (using copper
telephone line)

Asymetrical = Download speed


high, upload speed slower

Highest data speed

Strongest signal (little interference)


Fibre

Not easily damaged by lightning

ISP - internet service How much data you may use


provider = connect Every ISP has an AUP (Acceptable (even though you are
you to Internet (e.g. Usage Policy) uncapped) without them
Mweb / Vodacom) throttling you

The amount of data that can be


sent/received in a certain time.
Bandwidth Upload (data sent) vs
download (data is received) speeds
usually differ
Specifications

Capped / Amount of data that you can upload and download in a specific
uncapped data period (ADSL & Fibre = monthly packages)

Companies can prioritise which services can get full speed according
to their own needs

Home use (ISP) Full speed all day:


E-mail, regular browsing
Shaped / (low data usage services)
unshaped
"Streaming" video (video that
will never be stored on your
Low speed by day (services that
computer)
have high data usage), usually full
speed night hours e.g.:
Gaming / Torrents / VoIP
Use so much data that they
Throttling drastically lower your overall Letter after 802.11 refers to
speed (penalty) speed e.g. b/g/n

Can use any of the


Cabled technologies listed above

Affected by walls /
Wifi (802.11) - Wireless technology blockages

Type of Bluetooth - short distances - WiFi hotspot - area with


connections pair devices WiFi coverage

NFC - near field communication WiMAX - tower that broadcast


like file transfer between mobile Wi-Fi to a large area (few kms)
phones / payments with NFC bank
cards - just tap

20
NETWORKS / INTERNET

URL starts with https


Features of secure
Address bar turns green
websites
Lock icon shows
Critical to update
your antivirus, Unexpected pop-ups (don't click on it)
operating system Unknown attachments / programs
& browser
Spam: unwanted or intrusive advertising on the Internet

Hoax: something distributed with the intention to deceive - usually false, sometimes
Safe usage

ridiculous information/stories (fake news)

Scam: a misleading, dishonest offer/action e.g. a false online shop that steals your
money and doesn't send you the product

Phishing: a scam where an Internet user is tricked (e.g. by deceptive email message)
Be aware of: into revealing confidential info (usually on a fake website looking like the organisation's)
which the scammer can use for identity theft or fraud etc.

Spoofing: faking an email header to look like it came from someone else. Often used in
phishing & spam to get people to trust the origin.

Pharming: a scamming practice in which malicious code is installed on a PC/server,


misdirecting users to fraudulent websites even if they type the correct URL.
Similar to Phishing but without a lure.

Click-jacking: a scam in which a disguised link (which cannot be seen or detected) is


inserted above a legitimate link. Users think they are clicking on a link/image but they
actually click on an invisible link above it which can contain a malicious program.

Capital and lowercase letters, numbers, symbols, no patterns (passphrase - longer


Good passwords
phrase is much safer - not with words from dictionary). Use a Password Manager.

Unauthorized duplication of copyrighted content that is then sold at substantially lower


Piracy
prices in the 'grey' market

Hacker Identify security gaps in an ICT system


Criminal

Cracker Identify security gaps and use it for criminal purposes

Many connected "bots" that include worms, trojans, spam, etc. Spread with other
people's infected computers (single: bot/zombie) over the Internet without them being
aware of their computers being used
Botnet
Commonly used for a DDoS attack where masses of useless data or requests are sent to
a network or computer. This can reduce the speed drastically or crash the entire network.

The illegal use of someone else's personal information (such as ID number) especially in
Identity Theft
order to obtain money or credit

21
NETWORKS / INTERNET

Adware: a software application where adverteising banners are


displayed while the program is running

Back door: a means of access to a computer system that bypasses


security mechanisms

Keylogger: a type of spyware that records a user's keystrokes


invisibly and sends it to the attacker

Spread through emails,


(any malicious software)
Malware

internet, flash discs,


pirated software etc. Ransomware: a type of malware designed to encrypt or block
access to your computer system and files until you pay a sum of
money (‘ransom’)
Prevent through antivirus
software

Types
Rootkit: a collection of tools (programs) that enable
administrator-level access to a computer or computer network

Spyware: program in someone's computer to secretly gather


information about the user and send it to advertisers or others

Sniffer attack: small program that can read data packets over a
network

Trojan: a seemingly useful computer program that contains


hidden instructions which when activated by the user, perform a
malicious action (such as destroying data files)

Worm: a program that duplicates itself without the action of a


user and destroys data and files on a computer

22
INFORMATION MANAGEMENT
Is the author / organisation reliable

Date of creation / update of


information (NB because it could
have changed in the meantime)

Evaluate reliability Does it match other sources?

Is this objective?
Printed media e.g. books

Good language / no spelling mistakes

Already electronic / less typing time


Research (published
information on internet & More sources available
books / newspapers, Electronic sources eg. Internet
interviews) articles, e-encyclopedias
Easier to search

More up to date
Gather data

A legal right / ownership of your own


Copyright intellectual material

To present someone's work /


intellectual material as your own
Plagiarism (copy a source's information just like
that) without their
permission/acknowledging them

E.g. Questionnaires, surveys,


interviews, votes
Faster to complete

Closed questions: limited, Less errors when data is being


possible answers captured

Opinion polls (to get people's Easier to analyse / compare


Open questions: unlimited information
opinions)
number of answers/opinions

Online - Greater audience / more


variety of people

Distributed easier / easier to get back


Advantages of electronic /
online questionnaire (vs printed
Data refers to raw facts in
questionnaire)
itself is not useful Data validation can be done

Information is data that is Already electronic - No need to


useful / processed retype

23
INFORMATION MANAGEMENT
Types: pie (to compare parts of a
Large variety of graphs whole), column (compare things
(note Access also has graphs) between different groups), line
(track changes over time)

Pivot Tables - to automatically


Spreadsheet
summarize data quickly
Research / Data presentation / analysis

Made for / focuses on


calculations / functions /
Import refers to open a numerical data

file that is in a format


different from the format Data validation (also in Excel) -
specify rules for data using criteria
the application creates on
its own.
Input masks - to enforce a pattern
e.g. number plate
Export refers to convert a
file into another format
than the one it is currently Default values - where a common
Techniques like value repeats often e.g. Gender,
in. Home Language

Primary key - unique field to identify


table records (compulsory and must
be unique)

Lookup wizard / dropdown list (also


in Excel) - to avoid mistakes & make
data input easier
Database
Query - to extract specific
information

Has objects like Queries, Forms Report - to create neat reports with
and Reports grouping

Presentation of data better than Form - easy format for people to


Excel: especially Report enter data

Styles - can then create an


automatic table of contents

Citations e.g. (Wikipedia, 2015) -


Footnote1 - to give more shortened version of source
information about something
Word processing
Automatic bibliography - full list of
References: sources and all their information

Can work together on Index - an alphabetical list of


words/conceptsand the pages on
documents with Track Changes
which they appear (for ease of
reference)

24

You might also like