Uploaded by anapearce13

grade 9 theory exam

advertisement
HARDWARE AND SOFTWARE
Hardware (physical components that make up a computer system.)

Can be internal or external
External hardware devices
1.
2.
3.
4.
Monitors
Keyboards
Mice
Printers
Internal hardware devices
1. Motherboard
 Printed circuit board found in a computer
 Allows CPU to function
 Contains several sockets and slots to connect to other computers
 Acts as HUB that other devices connect to
2. Central processing unit (CPU)
 Interprets and executes demands from hardware/software
 Made up of 3 main components:
­ Arithmetic logic unit (ALU)
­ Control unit
­ Immediate access store (RAM)
 Forms part of the motherboard
3. Random access memory
 Internal chip where data is temporarily stored (temporary/volatile memory)
 Can be written and read from
 All content is lost when computer has been powered off
4. Read only memory
 Internal chip where data is permanently stored (non-volatile)
 Data cannot be altered
 Contains Boot file (tells computer what to do when staring up)
5. Video card
 Enables computer to display images on the monitor
6. Sound card
 Enables computer to produce sound, connect to microphones
7. Internal hard disk drive (HDD)/ solid state drive (SDD)
 Stores data (text, photos, music, etc.)
 Stores most system and application software
Software (programs for controlling the operations system of a computer)
a. APPLICATION SOFTWARE (programs allowing user to perform specific tasks)
 Word processor: manipulates text documents
 Spreadsheets: organize and manipulate numerical data
 Database: organize, manipulate, analyze data
 Applications: runs on smartphones/tablets
 Photo editing: manipulate digital data
 Video editing: manipulates videos to produce video editing
 Graphics manipulation: bitmap, vector images can be changed
 Control and measuring allow computer to interact with sensors
b. SYSTEM SOFTWARE (programs that control the computer)
 Operating system program required to control input and output operations
Allows users to communicate with the system
Controls system resources
 device drivers allow hardware devices to communicate with computer operating
system
 compilers convert programs language to binary code
 linkers link code that programmer writes with other resources
 utilities help users with everyday tasks
USER INTERFACES: set of programs that do all the things needed to make a computer work
­
­
­
Human Computer Interface (HCI): controls what computer sees on screen
Graphic User Interface (GUI): interact with computer using pictures/icons
Command Line Interface (CLI): communicating with computer via keyboard
Backing storage: secondary storage device for data
External storge: separate from computer, plugs into USB port
TYPES OF COMPUTERS
LAPTOP
DESKTOP




Easy upgrade
Large screen
Internet
Keyboard and mouse
 Not portable
 Use a lot of space




SMARTPHONE




Pocket size
Calls, emails, text
Network
Transfer data
 Small screen
 Low battery life
Great for work
Functions
Network
Large screen
 Large/heavy
 Difficult to upgrade
TABLET




Portable
Easy to use
Network
Transfer data
 Expensive
 Lack ports
IMPACTS OF EMERGING TECHNOLOGY
1. Artificial Intelligence
 computer systems that perform tasks usually carried by humans
 voice recognition, language translation
2. Driverless cars
 Guided by a GPS, Wi-Fi, and spatial laser sensors
 Probably safer (no driver to cause accidents)
 Some may lose jobs, privacy concerns
3. 3D and Holographic Imaging
 Creation of 3D images that change when you move
 Has been improved in hospitals (used by surgeons to plan/evaluate procedures)
4. Computer Assisted Translation
 Translation by computer without human involvement
 CAT system creates and manages translation memory
­ Translators can reuse existing strings of previously translated text
5. Vision enhancement
 Implant placed in retina of a blind person (wear glasses that have video camera
mounted on it )
­ Data flows from camera to pocket computer where data is processed
­ Resulting information is sent along optic nerve to brains visual cortex
6. Robotics
 Able to copy actions of humans
 Produce work more consistently (more precise at task, work continuously)
 Can work in areas that are dangerous for humans
 Don’t need to be paid
7. Biometrics
 Provide strong authentication (fingerprints, retina scans, DNA, voice patterns)
­ Verification (to make sure person is who they say they are)
­ Identification (to identify a person in a crowd)
­ Screening (to match a person who may be on watchlist for security purpose)
8. Quantum Photography
 Uses physics to generate a key that relies on light (photons)
 Enables secret kept being sent from sender to receiver (used to decrypt encoded
messages)
 If eavesdropper looks at encrypted key, changes occur to particles of light being
observed.
9. 3D printers
 Make many 3D objects, using different materials
 printing layers of thousands of materials to form an object
10. drones
 aerial vehicle that crosses boundaries between robotic, aeronautics, electronics
 controlled by phone/remote
 military use, weather analysis, search rescue, deliveries
11. virtual reality
 computer generated environment used to immerse and perform actions
 used for virtual walkthrough museums,
 car manufacturers can create prototypes of new vehicles
 astronauts/pilots/medical students/use for training
CHANGE IN WORK PATTERNS









payroll workers
­ workers still employed in admissions learn to use new technologies
Typing
­ In modern day, documents are word processed/ produced on computers using
software
Car production workers
­ Robots are used in production lines
IT specialism
­ >80% of jobs that are in greatest demand globally, are IT related
Smart working styles
­ Online collaborations (videoconferencing, and VOIP)
­ Training events now moved online
­ Automated telephone messages
Increase employment due to IT
­ Increase in employment in other fields (web-designers, computers programmers,
delivery)
Web designer
­ Nowadays, artists and designers use computers to design and create their websites.
Computer programmer
­ Involves using special coded language that helps communicate with machine
­ Creates computer systems for education, health, finance, host of other fields
Delivery drivers
­ Online shopping and e-commerce are very popular, need for delivery is increasing
­ More delivery drivers needed by many courier companies that are operating now
Working Patterns




Job Sharing (job shared between 2 or more workers)
Flexi-Hours (employee can vary when they come to work)
Part-Time (full-time divided by 2 part-time workers)
Compressed (work their full hours for the week in less days)
Advantages and disadvantages of micro processed-controlled devices
Advantages
Disadvantages
 Save energy
 Lead to wasteful society
 Easy to program them to do specific
 Leaving devices on standby wastes
tasks
electricity
 Far more efficient
 We’re not very confident around
electronics
Advantages and disadvantages of micro processed-controlled devices in the home
Advantages
 No longer have to manual tasks
 Time for leisure activities
 Can control home devices with your
phone
 Smart fridge leading to healthier
lifestyle
Disadvantages
 Can lead to unhealthy lifestyle
 People become lazy
 People become less fit
 Potential to lose household skills
POTENTIAL HEALTH PROBLEMS RELATED TO PROLONGED USE OF IT EQUIPMENT
1. REPETETIVE STRAIN INJURY (RSI)
 CAUSED BY EXERTION OF WRIST MUSCLE
 JOB ROTAION STRATEGIES MINIMIZE RISKS OF RSI
2. BACK PROBLEMS
 SIT TOO LONG IN HUNCHED POSITION
 ADJUSTABLE CHAIRS/TAKE SHORT BREAKS
3. EYESIGHT PROBLEMS
 DUE TO DIRECTION OF LIGHTING AND THE GLARE
4. STRESS
5. OVERUSE OF THUMBS, WRISTS, EYES, NECK, AND BACK MUSCLES ARE COMMON TOO
PREVENTIONS
­ ADJUST YOUR CHAIR TO THE RIGHT ANGLE/POSITION
­ TAKE SHORT BREAKS EVERY COUPLE HOURS
­ POSITION YOUR SCREEN IN APPRORAITE POSITIONS
­ EXERCISE AND EAT SENSIBLY
SAFTEY AND SECURITY
HACKING
 It is unauthorized access to someone’s computer system
What effects does hacking have?


You can lose all your data
Hackers could use your personal data to impersonate you, they might apply for a credit card
and apply for loans in your name.
 Businesses could lose order or customer information
 Hackers could leak top-secret information, which could cause a huge worldwide security
problem.
 Hackers can see everything, and this leads to decreased privacy
What can I do to protect my data from hacking?
 Use authentication
 Keep copies of all your files onto another device in case you do get hacked
 Use user ids and passwords
 Make files unreadable by using data encryption
 Don’t keep the same password for all accounts, change passcodes regularly.
 Make sure you’ve got a strong password, weak passwords are easily guessed
Biometric data




records used to identify people e.g., fingerprints, face ID etc.
physiological biometric data: physical aspects. fingerprints and retina scan
behavioral biometrics: signatures, handwriting, and voice patterns
verification or identification
KEY TERMS:
1. digital certificate: method of keeping emails or messages private (name, email, serial
number, a public key, expiration date, digital signature)
2. public/private key: held in two files that allow you to create a digital certificate
3. Secure socket layer (SSL): protocol for managing security of a message transmission on the
internet.
Difference between SSL and digital certificate?
Digital certificate establishes credentials, SSL manages security of messages transmitted on the
internet.
Encryption
Making data difficult to read by scrambling mathematically, before reading contents must be
decrypted.
How to know if website is secure




Sometimes you get warning messages
Most websites display an icon to show they are secure (usually small, locked padlock)
Check if URL is http:// or https://
Red – out of date
Yellow – authenticity of certificate cannot be verified
White – normal validation
Green – extended validation. Browser and website are encrypted.
Phishing

Criminal activity trying to find sensitive information, such as passwords or banking details by
fraudulent means.
Pharming

Hacker installs malicious program on computer. Program code cause any clicks you make to
be redirected to another website without you knowing.
 Dns server converts letter-based website name into digits
Key terms
Dns server: domain name system server. Turns friendly version of domain name into numbers
Vishing

Combination of voice and phishing. Fraudsters obtain personal details of a victim through
their landline telephone.
How to guard against phishing, vishing, pharming






Do not open if you don’t recognize sender of email
Look at file name before opening as it could eb executable (.exe, .bat, .com, .reg)
Do not reply if it asks for personal information
Check if it looks legit
Be sus if they ask to provide personal info
Don’t respond to smishing messages
 Forums are online place to discuss topics with others. Moderated forum- all posts are
approved beforehand by moderator
 Internet is generally unmoderated cause no one owns the internet
 Email spam /junk mail/ unsolicited bulk email (UBE). Click on link and u may be sent to
phishing website
COMPUTER VIRUS:

piece of software that infects a computer by installing itself and copying itself into other
computers without you knowing
 virus might install spyware (records activities of user, passwords being entered and
transmits info to person who wrote the malware
how to protect computer from viruses
 install anti-virus
 install anti-malware software
 never download and install software from untrusted internet sites
 don’t open email attachments unless you have scanned them
 run virus scan on memory stick/ CD ROM before opening any files.
FIRE WALLS



Protective barrier between you and any other computers that you are connected to
Computer hardware or software that can help protect your network by filtering traffic and
blocking outsiders from gaining unauthorized access to private data.
Firewall will close off all port services that you are not using. if it did not do that, then your
computer could eb entered through the unused port number
CHAPTER 9: AUDIENCE
Already know a few facts about audience, now take it step-by-step
1.
2.
3.
4.
5.
Define who your audience is: who will be receiving the presentation
Define what you need to know about them: know audiences’ knowledge about topics
Decide how to conduct your analysis, create the means of carrying it out: collect information
Select representative group from your intended audience
Analyze your findings
Why is it important to need solutions to meet needs of audience?
*
*
*
*
Language used – use appropriate terms and language
Multimedia – use sound, video, animation
Length of presentation – short, sweet, straightforward, and easy to understand
Interactive presentation – ask easy to understand questions to get people to take part
LEGAL, MORAL, ETHICAL, AND CULTURAL APPRECIATION




Legal covers the law
Morality governs the private and personal interactions between people and is usually
determined by private data
Ethics governs professional interactions
Cultural refers to attitudes, values, and practices shared by society/group of people
KEY TERMS:
1.
2.
3.
4.
5.
Sustainable approach: seeking to minimize minimum effect (doesn’t damage livelihood of future
generations)
Copyright: refers to legal right of owner of intellectual property / the right to copy
Intellectual property: ideas and skills of other people that belong to them
Copyright law: law protects books/music/art/other written or recorder in the same way
Software copyright: protecting software from being used by a person with no permission
Owner will create license that defines T&C’s of its use if they want to be paid
 Anything that breaks the law is illegal
 Morality covers the human desire to distinguish between right and wrong
 Unethical is breaking any sort of code of conduct
KEY QUESTIONS TO DETERMINE WHETHER ETHICAL ISSUES MAY RISE
1. Does the product reflect/offend the conventions of society?
2. What impacts might the product have on people’s cultural sensibilities
3. What the implications are for the future and making sure products aren’t too damaging on
environment
4. What about sustainability, recycling, and conservation
ENVIRONMENTAL ISSUES
Types of issues designers may feel they have a responsibility to take into consideration include:
 Use of technology materials that limit the damage to the world’s environment
 Use of renewable energy that is replaced/cannot be used up
 Materials that are renewable are ones that can be replaced at least as fast as they’re used
 Reusable product (can be reused without need for processing)
 Recycling and reusing
POLICING THE INTERNET



control sites that are used to block those that a government does not want to us to use
Often blocked to stop what is seen as inappropriate material
Sites sometimes blocked if it is thought that they could lead you to info thought to be
unsuitable.
Chapter 10: COMMUNICATION
COMMUNICATE WITH OTHER USERS USING EMAIL





Several applications that can be used (email being the most common)
Internet can also be used for personal and group communication (email arrives instantly but
actual speed depends on how often emails are checked/read)
Communicating computers must both have email application on them (doesn’t have to be
the same kind)
Messages can be:
1. Composed
2. Files attached
3. Recipients chosen
4. Message sent from email application
Receiver can (1) read the message, (2) extract file, (3) see who sent the email
Advantage
­
­
­
Communication is addressed to person whereas letters are delivered physically whether the
person is there or not.
Receiver can collect it wherever they are using a computer
Ability to stay in touch is important to travelers, especially businesspeople that need to be
mobile
Constraints
Laws of the country
1. ACCEPTABLE LANGUAGE
­ Way you word your message may be formal, or casual, or brief, depending on your
audience
­ You need to consider…
 Who your audience is
 What their relationship is to you
 What sort of impression will your message give about you
­ Tips for emailing
 Decide whether it should be brief or more professional (proofread, check for
grammar errors, spelling etc. )
 If you wouldn’t say it to their face, DON’T SEND IT!!!
 Use subject line to indicate what email is about (some people don’t open
emails with no subject.)
 Use appropriate greetings and signings. Important to sign your name at the
end of an email.
 Use CC box if you want to send a copy of the email to someone.
(BCC box is if you want to send email to someone without them knowing
you’ve done so)
 Be brief and clear in your email
2. NETIQUETTE AND COPYRIGHT (interNET ettIQUETTE)
­
Courteous when you are posting online and respecting views of others
­ General rules to observe…






No personal abuse
You can strongly disagree with others POV, but still be polite
Don’t spam
Write clearly
Watch what you post because once it’s out, it’s out forever
Don’t post copyrighted material or you could be prosecuted owner
*emails can be used as evidence in a court of law in some countries if they constitute harassment*
3. NEED FOR SECURITY
­
­
Priority for business as threats from hackers, virus, spam, phishing grow
Failure to provide security could lead to virus infection that could destroy systems
 Loss of systems could severely damage a business if data/records are lost.
 May be held liable for losses suffered through infection you unknowingly
passed to others.
A PACKET SNIFFER







is a program that can sniff out and decode each packet flowing over a digital network.
Relatively simple for it to spot an email. It may see a subject line or part of an SMTP
command
On its route to recipient, email passes through hardware, cables and airspace operated by
different countries or organizations
Anywhere during journey it could be scanned to find out if it resembles spam or if it contains
malware
Emails need to be encrypted
Transport layer security (TLS) – method used to ensure emails can’t be intercepted
Make sure you keep your password safe, and change it regularly
SPAM (Junk mail you haven’t asked for)
When you use the internet to sign up to any website, you may be asked to (un)tick a box if you agree
to be sent correspondence from other similar sources



If you’re aware and read this properly then you can avoid spam.
Most spam will be from emails you have not agreed to receive
Spammers will get your email by buying lists of email addresses from people who have
legally collected them.
HOW TO DEAL WITH SPAM
 Read T&C’s: look for any check boxes they you may be opting into/out of
 Use the ‘unsubscribe’ option
 Use the ‘mark as spam’ and ‘Block Senders’ feature on your email account
 Make sure your password is safe
 Keep your antivirus program up to date
EFFECTIVE USE OF THE INTERNET
KEY WORDS:
1. Internet service provider allows a connection to the internet
2. Hypertext transfer protocol: used by worldwide web to define how web page is formatted or
transferred
3. Hypertext transfer protocol secure variant: HTTP using a secure encrypted link
4. Hyperlink: clickable area or word on a web page that lets you jump to different pages
5. Uniform resource locator: unique web address of every page on the world wide web
INTERNET is a global network of interconnected computer networks used to connect people,
communities, and countries worldwide
INTRANET is a private computer network within an organization. Even though intranet uses internet
technologies, it is safeguarded from the global network.
DIFFERENCE BETWEEN THE WEB AND THE INTERNET




Internet brings people together globally
The internet is used for email that uses Simple Mail Transfer Protocol (communication
protocol for mail servers for transmitting data)
The web is a way of accessing information using the internet (it uses HTTP to transmit data
allowing applications to communicate and share information)
The web uses browsers such as Internet Explorer, Safari, Chrome to access webpages linked
via hyperlinks
The structure of a URL(uniform resource locator)
Unique address of any web page. It works in a similar way to writing an address on the outside of an envelope
to show where you want the letter to go. URL is made up of several parts: the first part can also specify other
protocols such as https or ftp
Acronym
Protocol
When it is used
FTP
File transfer protocol
Transfer files from one host to
another. Downloading or uploading
a file
HTTP
Hypertext transfer protocol
Used by WWW to define how a web
is designed and transferred
SSL
Secure socket layer
Enable encrypted link between a
server and a browser all data
passing between them remains
private
HTTPS
Hypertext transfer protocol secure
HTTP is using SSL to protect against
eavesdropping
WEB BROWSERS AND SEARCH ENGINES
Web browser
­ App to go online
­ Software application used to retrieve web pages from servers on the internet and to
display them to the user
Search engine
­ A website with indexed pages
­ Used to enable you to search the internet to find information
­ you will see a box for you to type in the key words to be searched for you will get a
list of pages that best match your key words
YOU USE A WEB BROWSER TO ACCESS INFORMATION OVER THE INTERNET AND THE SERCH ENGINE WILL FIND IT FOR YOU
BLOGS AS A MEANS OF COMMUNICATION



used either as a diary of thoughts or to share ideas and opinions and links
people reading your blog have facility to comment directly on any of your entries
really useful for sharing information
WIKI AS A MEANS OF COMMUNICATION





allows you to become a participant in its creation
you can either create or edit the site contents
it is a collaborative site that’s always being revised
no one can change a post or a comment
a blog is more about individual opinion and wiki about group consensus
SOCIAL NETWORKING WEBSITES AS A MEANS OF COMMUNICATION







large companies are using it for marketing and branding.
Large organizations monitor discussions about company products
They can communicate messages about what they offer
Tweets and blogs also help organizations to create communities which help in promotion of
their products or service
Social media is more cost effective than traditional approaches to marketing
Direct messaging
­ Allows you to send a direct message to “friends” inside a social network
­ Directly from one person to another without having to use email
­ Social medias direct message does have a limited number of characters allowed
Messages need to be kept succinct and focused
Advantages and disadvantages of using the internet
One of the main reasons we spend a lot of time on devices, but you need to be alert when using the internet
ADVANTAGES
DISADVANTAGES
Limitless amount of available information
Searches for relevant info are not always as fast as you like
Speed of accessing information
Not always easy to find reliable information
Carry out research from home
Possibility of theft of personal information
Provides platforms for other products such as
VOIP
Entertainment
Viruses
Online services
Spamming
Extreme images, opinions, violence, and dangerous sites
available
Download music and software
Storage in the cloud
HOW TO EVALUATE THE RELIABILITY OF INFORMATION FOUND ON THE INTERNET







AUTHORSHIP – who wrote it?
ACCURACY – is it free from spelling and grammar errors?
CURRENCY – does document show publication date and is it still relevant and up to date?
BIAS – does the site reflect just one individual view?
Is the site associated with politics or a particular philosophical belief?
COUNTRY AND DOMAIN – is it a government site? An educational site?
Although many country codes are not strictly controlled, it is worth looking to see what the
country code is
CHAPTER 11: FILE MANAGEMENT
Goal of file management is to make sure you can quickly find what you’re looking for
*
*
*
File name: a way to identify a file
File extension: a way to identify the type of file
Comma separated value: data saved in table structured format
Identify different file types and their uses



Files become corrupt when you try open a file, while another is open, that wasn’t an
expected type for that application
To recover a file, you might have to perform a complete system restore back to the time you
made the error
You can open a file created in another application if you save the data file in a format that is
able to read by other applications
Exports and imports files of different types

Standard file types have been developed they can be understood by varies applications
If you have a spreadsheet saved in .csv format it can be used with any spreadsheet program.
However, they are different to other spreadsheet file types because you can only have a single
sheet in any one csv file and it won’t save details of columns, cells, or formatting, or formulas.
Only saves in the form of text file with information separated by commas
Advantages: data can be much faster to import spreadsheet data rather than entering data
Disadvantage: when you save data, it’ll tell you editing you have used will not be saved


If you import a csv, you need to save it as file type .xls
Other file types can be imported and opened such as…
­ .xml – because computer systems and databases contain data in compatible
formats. Xml will provide software and hardware independent of storing data
stor3ed in plain text to make it easier to be shared between different applications
­ .zip: uses compression technology as an efficient way of distributing data
­ .pdf: allows you to open/read files using free downloadable reader application
­ .txt: plain text file with no formatting
STORING AND LOCATING FILES
Few tips for managing your files
 Give every file a name that immediately tells you what’s in it
 Make folders to hold files of a similar nature
 Keep your folders in hierarchical structures
File names:

Important to decide on a method that suits you and keep it consistent
 Include date the document was composed in your file name
 Indicate what is in the document on the file name
 Before you finalize the save, specify which folder the files should be stored in
REDUCING FILE SIZE FOR STORAGE OR TRANSMISSION

Compress files to achieve faster transmission times for electronic files which’ll result in lower number
of bytes used to store and then transmit file
 Achieve through process of compression to encode files data into more efficiently by altering
structure of data temporarily
 2 different compression; lossy and lossless
Lossless compression
 Reduces files with no loss of information during process
 Enables original file to be recreated exactly when uncompressed
 File uncompressed, it is reconstructed by using reference points to put back original file
 Mainly used for documents, text and numerical data where it is essential not to lose any information
 Zip-lossless compression type that detects patterns and replaces them with single characters
Lossy compression




Works by eliminating some bits of info to reduce file size; permanently deletes unnecessary data
Often used with images, audio, graphic because loss of quality is usually a reasonable option
With lossy compression, original file is not retained
Joint Photographic Experts Group (JPEG) is an example of lossy compression
TEXTING ENCODING




Usually file type .txt means that you can share text files without needing to know how text is
stored
Text you see on screen is stored as numerical values in text files and your computer
translates these values into characters that you can read
does this by an encoding standard
An encoding standard is numbering schemes that assign each text character in a character
set to a numeric value
Character set can include letters, numbers, and symbols
different languages consist of different sets of characters
EXTENSION
IDENTIFICATION
USES
.bmp
bitmap image file
store bitmap digital images
.css
cascading style sheets
describes how HTML elements are to be
displayed on screen
.csv
comma separated values
importing and exporting important info
.db
database files
storing info in structured database format
.gif
graphical interchange
format
image format
.htm
hypertext markup language
used for containing html language which
constructs a web page
.jpg
joint photographic experts’
group
digital image format which contains compressed
image data
.mdp
image file created by
FireAlpaca
format used to save images
.pdf
portable document format
used when you need to save files that can’t be
modified
.png
portable network graphic
used to offer a clear background to partially
transparent image
.ppt
PowerPoint
file extension for presentation file format used
by PowerPoint
.psd
photoshop document
supports layer of graphics in a single file
.rtf
rich text format
let’s you exchange text files between different
word processors
.tif
tagged image format
computer file format for storing raster graphics
image
.txt
text documents
store notes, step-by-step instructions,
manuscripts
.zip
compress 1 or more files into one place, reducing
overall size
Download