Professional Documents
Culture Documents
03 Mind Map Theory
03 Mind Map Theory
APPLICATIONS
TECHNOLOGY
MIND MAPS
The information in these mind maps is supposed to supplement the textbooks, not
replace it.
Although the author has made every effort to ensure that the information is correct,
the CAPS document must still be consulted as the primary guideline.
Processing
• the interal process
Communication where the computer
•many times you share processes data so that
the output you saved what you requisted
with other people can happen (e.g.
through e-mail etc. sorting, searching for
something on the
Information
computer)
Processing
Cycle
Output
Storage • what the computer
• to store the output gives back to you
permanently, you after the processing.
store it on a hard Normally 'soft' output
drive or a flash disk on the screen or 'hard'
output on printout
ICT refers to technologies that provide access to information through telecommunications (such as the
Internet, wireless networks, mobile phones and other communication media)
2
HARDWARE Physical keyboard
Webcam,
Digital video camera
Video & sound
Microphone (voice
recognition, record music)
3
HARDWARE
Circuit board that connects all components and parts of
(components) the computer with each other
Motherboard
Contains a couple of slots for additional cards like sound
and graphics cards
*RAM
(Primary Memory) E.g. DIMMS, DDR3/DDR4
Measured in GB
Advantage: saves cost & space because all the devices are in
Multifunction (print,
one. Disadvantage: if 1 breaks and is sent in for repairs, all the
scan, copy, fax, email) other functions are not available
Printer (hard copy -
printed page)
Printer itself is cheap
Fax
Inkjet (mostly home use) Ink is relatively cheap but cost per page is expensive
5
Memory cards for
extra storage space in
HARDWARE
e.g. smartphone or Micro SD, Mini SD, SD,
digital cameras CF, MMC
(needs card reader for
copying to computer) Advantages: cheap Capacity: the
storage media (ideal for
maximum
archiving), read-only
amount that
Disadvantages: something
Damages easily, slow can contain
Optical media CD, DVD, Blu-Ray read/write speed,
cannot store a lot of
data (small capacity)
USB Hub for Micro-USB's are used
additional USB ports for e.g. smartphones Copying contents off a
protected disc is
referred to as "ripping" a
Ideal for portable
disc
storage - larger capacity
Flash disks
than CD/DVD, fast
(electronical - flash read/write speed, does
memory) not damage easily,
Storage devices
Function: Permanent
storage of programs & data
Characteristic: Stable/non-
volatile: keeps contents
without power
6
Usually contains SSD
HARDWARE Very high screen
resolution
Ultrabook
No optical (DVD) drive
calls
Protect desktop computers against
Activate alarm / movement
Not portable
Work station (very Used by e.g. scientists /
strong computer) architects / video editors
7
The design of devices /
HARDWARE Ergonomics items to fit to humans
natural form
E.g. Chair with good backrest / table with
right height
More Effective, Accurate & More work in less time, do not make
Reliable than people mistakes, do not get tired, doesn't strike
Reasons for using ICT Communication is so much Always give examples in comparison with
easier & faster mail / letters
8
HARDWARE & SOFTWARE
Using technology to create a simulation of a
Definition 3D-environment that can be interacted with a
person in a seemingly real or physical way.
Virtual Reality
Virtual reality makes education more engaging
Uses and entertaining.
9
SOFTWARE
Graphic user interface
(graphical way for people
Menus, Icons, drop down lists
to interact with the
computer)
Control basic security (logins)
Operating system also E.g. Windows 10 (paid)
referred to as 'platform' E.g. Linux (OSS)
E.g. Android (smartphone) File management (folders, file extensions etc.)
Backup Good habits - not in the same place, safe place etc.
System Software
Utilities
Adds pieces of files that are spread over the whole HDD
together again to improve SPEED
Put potentially harmful / Quarantine: Safe area on hard drive where virus cannot
malicious software in harm anything - allows you to choose or remove
quarantine something
10
Examples of file extensions
Games
Sound (.mp3, .flac, .wav)
(files .html)
Plug-in!
Flash, Quicktime, Java
(needed for multimedia)
11
SOFTWARE Try to prevent bugs
Releases a test version namely
'Beta' version
'Backwards compatibility' -
New program can open old
files, old program can not
open new files
A problem between different
Compatibility
versions of the same software
Solve problem by upgrading
all (newest version), to
Concepts
12
NETWORKS
Can share resources like printers and Internet access
Advantages
Share of software and / or updates
Features
Can set user permissions such as access to specific folders or disable USB
drives to prevent theft of data and malware spreading
Requires good security (so unauthorised users can not access confidential
information)
an AUP is signed
Includes what may and may not be done on the network, forms of online
communication allowed, amount of data that may be used, use of flash sticks,
procedures for problems like identity theft, viruses etc., tips to prevent
copyright infringement and plagiarism.
(no cables)
LAN - Local area network -
WLAN - Wireless LAN
more computers in 1 room Additional disadvantages:
Security risk is extra high for hackers
Can use up internet data if others
WAN - Wide area network -
gain access
E.g. Gauteng
Signals can be disrupted
Can be slower than cabled network
GAN - Global area network - due to obstructions like walls
e.g. Internet world wide
13
NETWORKS File server Controls which sites may be
visited
each other)
14
INTERNET
Cheaper than regular calls (only uses
data)
INTERNET is a global network that is
publicly available Can send video & audio
Good spelling
Do not send large email Disadvantages: Internet access required,
attachments programs usually contain less features
versus "desktop version", many types
are SaaS (need to pay) only some free
15
INTERNET To: to whom the e-mail is addressed
CC: other people who are being copied to take note - everyone can see each other's email
addresses
BCC: people who are copied but cannot see each other's addresses (Netiquette - BCC people
when emailing a group)
RE: an email reply automatically gets this prefix in front of the subject
Flags/Tasks: you can add emails (or your own items) to a task list in the email software,
specifying due date and even set reminders
Registrations for new sites / services are usually done with an email address or Social network
Registration account. A CAPTCHA is then also asked to verify that it is a human attempting the registration,
Internet Services
Definition: Online service or technology that allows people with similar interests to
communicate with each other regardless of time or distance
E.g. Facebook, Twitter, Instagram. Often use a URL-shortener service to shorten URL's before
posting to social media (no problems with character limitations and just looks neater)
Benefits: Allow groups to create virtual communities or pages for businesses/famous people,
etc.
Huge audiences to share your life with
Can inform family members/friends about your life
Social Businesses can place cheap and targeted ads and
networks interact with their customers
Audio file downloaded from the Internet that can be played on computers or devices such as
Podcast
smartphones e.g. with radio programs/training etc. (Vodcast - when it includes video)
One-way flow of information broadcasted over the Internet to a large audience that may consist
Webcast of audio, video and/or presentation slides
Audience does not usually contribute to content
Interactive meeting or seminar. The content is usually education-based. The audience is usually
Webinar
smaller and takes part in the conversation through surveys, Q & A etc.
16
INTERNET Encripted connection is
indicated with https - don't do
www.[websitename].
transactions on public
Web address = URL [organisation].[location]
computers
E.g. www.hsrandburg.co.za
Research seller's reputation
Portal - access point to looking at gradings and
many at www reviews before first purchase
17
INTERNET Definition
Very large structured (clean data) and unstructured (e.g. free text
tweets/reviews) data sets that are analysed using computers to reveal trends.
Purpose Reveals patterns and trends relating to human behaviour and interactions
To optimize and improve lives. E.g. shopping habits, health risks and indicators
Big data Uses
of serious illnessess.
Privacy concerns
The trend whereby all sorts of objects and devices are increasingly being
Definition connected to one another via the Internet, communicating independent of
human interaction.
Sensors in devices produce data (see big data) that can be used for diagnostics
Purpose
and running systems more efficiently.
Internet
New Trends
of
Devices can communicate without human intervention to automate and
Things Uses improve processes and reporting, e.g. heartrate monitor in smartwatch triggers
alarm when your sleep cycle is at its lightest
Send money anywhere in the world at any time - no limits. Decentralised from
Purpose
banks and governments so no interference and minimal 'bank' charges.
Bitcoin Bitcoins can be exchanged for other currencies, products, and services. They
have caused concern in that they are often used for payment in criminal
Uses
activities such as ransomware demands. However, more and more legitimate
companies are accepting them as a means of payment.
Not very widely accepted yet. Bitcoin wallets can be lost. Currency is extremely
Limitations
volatile.
A form of education and training delivered and conducted via the Internet
using mobile devices, such as tablets and smartphones. It is designed to be
Mobile or M-learning
flexible, allowing learners/workers/students access to education anywhere,
anytime.
18
INTERNET
Use headings, short paragraphs,
columns
theme
Layout
Text and graphics should fit on a
How different elements standard screen
are placed
19
INTERNET Can it use it anywhere BROADBAND =
Cellular (any High speed data transfer
connection using a 3G (older)
SIM card)
Technologies
4G / LTE (newer - faster)
Capped / Amount of data that you can upload and download in a specific
uncapped data period (ADSL & Fibre = monthly packages)
Companies can prioritise which services can get full speed according
to their own needs
Affected by walls /
Wifi (802.11) - Wireless technology blockages
20
NETWORKS / INTERNET
Hoax: something distributed with the intention to deceive - usually false, sometimes
Safe usage
Scam: a misleading, dishonest offer/action e.g. a false online shop that steals your
money and doesn't send you the product
Phishing: a scam where an Internet user is tricked (e.g. by deceptive email message)
Be aware of: into revealing confidential info (usually on a fake website looking like the organisation's)
which the scammer can use for identity theft or fraud etc.
Spoofing: faking an email header to look like it came from someone else. Often used in
phishing & spam to get people to trust the origin.
Many connected "bots" that include worms, trojans, spam, etc. Spread with other
people's infected computers (single: bot/zombie) over the Internet without them being
aware of their computers being used
Botnet
Commonly used for a DDoS attack where masses of useless data or requests are sent to
a network or computer. This can reduce the speed drastically or crash the entire network.
The illegal use of someone else's personal information (such as ID number) especially in
Identity Theft
order to obtain money or credit
21
NETWORKS / INTERNET
Types
Rootkit: a collection of tools (programs) that enable
administrator-level access to a computer or computer network
Sniffer attack: small program that can read data packets over a
network
22
INFORMATION MANAGEMENT
Is the author / organisation reliable
Is this objective?
Printed media e.g. books
More up to date
Gather data
23
INFORMATION MANAGEMENT
Types: pie (to compare parts of a
Large variety of graphs whole), column (compare things
(note Access also has graphs) between different groups), line
(track changes over time)
Has objects like Queries, Forms Report - to create neat reports with
and Reports grouping
24