Full Transcript

[Cat theory paper 2] [Types of computers systems for different uses] 1. [Personal ] - Can perform a wide range of tasks - Cheap to buy - Uses basic input and output devices 2. [SOHO] Single Office/ Home Office Using computers & printers in a network 3. [MOBILE USER] - Designed...

[Cat theory paper 2] [Types of computers systems for different uses] 1. [Personal ] - Can perform a wide range of tasks - Cheap to buy - Uses basic input and output devices 2. [SOHO] Single Office/ Home Office Using computers & printers in a network 3. [MOBILE USER] - Designed for portable users - Tablets, phablets, smartphones, laptops 4. [Power] Higher specs needed for applications Expensive to buy More RAM, CPU and storage needed 5. [Enterprise] Companies that have many users over the country Uses a large network to connect [Role and use of Data, Information and knowledge, conclusion/decision as part of information management] - [Data]: unprocessed facts that are not organised in a meaning format - [Information]: is the meaningful Knowledge that we get when we have organised and processed data - [Knowledge]: includes facts, information, and skills acquired through experience or education - [Conclusion]:making a conclusion of the information that has now become knowledge [Reasons for using computers;] - [To save and be productive] [ Saving paper]: send data electronically [ Saving time]: faster to create and send information [ Saving labour:] can perform jobs that humans cannot - complex calculations(24/7) [ Saving costs]: VoIP/email/IM are cheaper than conventional methods such as phone calls. - [-To be efficient, accurate & reliability ] - [GIGO]: Garbage In Garbage Out -- refers to inaccurate input provides an inaccurate result. - [Data validation]: computers allow users to enter data more efficiently and accurately. - [-To have effective time and distance ] - [Distance]: regardless of where you are you can communicate with anyone in the world - [Time]: You can instantly communicate with anyone without having to wait - [-To be able to communicate globally ] [ Social Networking]: Can link to anyone around the world (Facebook, Twitter, Instagram) [ Web tools]: functions and features that helps users: [o Blogs/Vlogs]: Online type of dairy. [oWiki\'s]: allows user to create, edit or remove content from a webpage o RSS feeds: updates from various sources (blogs, websites) to one central place (email) [oWeb 2.0]: allows users to collaborate and share information [Convergence]: is a term used to describe a situation where multiple technologies are combined to deliver a new and more exciting product. H[ardware] [Information Processing Cycle ] - I[npu]t -Instructions given to the device [Devices]: - mouse/touch - keyboard - microphone - camera - scanner - [Processin]g -analysing and processing the instruction/s [Devices:] - CPU - RAM - ROM - graphics card - [Output] -Provides the results of the processing [Devices:]monitor - printer - speaker - projector - earphones - [Storage] -Storing the information for later use [Devices]: - hard drive - flash drive - CD/DVD - memory card - USB hub - [Communication] -To share the results to others. [Devices]: - modem - router - switch - NIC -- cables - [Multi-touch screen]: Feature of a screen that allows it to register more than one point being touched simultaneously - [HDMI]: High-definition multimedia interface is a standard/port for connecting high-definition video devices, such as computer monitors, video projectors and digital television. HDMI carries high quality video and audio signals, and there is no need for separate audio cables as with VGA - [3D printing/printers:] 3D printers can create three-dimensional solid objects (e.g. motor vehicle parts, human tissue replacement, jewellery, clothing, small buildings, small boats) from a digital model of the item by adding successive layers of material on top of one another. [Input devices] [KEYBOARD] The keyboard is the most common and important input device for desktop computers. It consists of various keys that the user presses to give commands or type letters. +-----------------------------------+-----------------------------------+ | Advantages | Disadvantages | +===================================+===================================+ | Enables the user to enter | Disabled users might find it | | information in an easy | difficult to enter | | | | | manner (very little training is | information using a keyboard | | needed) | | +-----------------------------------+-----------------------------------+ | Serves as a fast method in which | It is easy to make mistakes while | | to enter data | typing in data | +-----------------------------------+-----------------------------------+ | Keys can be programmed to serve a | To program the keys of a keyboard | | | for specific | | specific function | | | | functions, it requires a | | | specialised keyboard and | | | | | | knowledge on how to do it | +-----------------------------------+-----------------------------------+ [Mouse] A mouse is a pointing device. It allows the user to move the cursor on the computer screen, as well as point, click and select various programs and items. +-----------------------------------+-----------------------------------+ | Advantages | Limitations | +===================================+===================================+ | Easy to use and ideal for desktop | The mouse requires a flat space | | and | close to the | | | | | laptop computers | computer in order to operate | +-----------------------------------+-----------------------------------+ | A standard optical mouse is not | Uneven surfaces might affect the | | very expensive | performance | | | | | | of the mouse | +-----------------------------------+-----------------------------------+ TOUCH SCREEN the touch screen serves a dual role as both an input and an output device. The touch screen allows the user to use his or her fingers, or a stylus, to directly press buttons and select options that appear on the screen. +-----------------------------------+-----------------------------------+ | Advantages | Limitations | +===================================+===================================+ | Options can be selected faster | There are a limited number of | | than would be | options available | | | | | possible with a keyboard and | when using a touch screen | | mouse | | +-----------------------------------+-----------------------------------+ | A touch screen allows for more | The screen can get damaged and | | space as a | dirty due to | | | | | keyboard and mouse is not | constant touching | | required | | +-----------------------------------+-----------------------------------+ TOUCHPAD The touchpad is a small square or rectangular input device on a laptop. It has the samefunction as a mouse. You use it by moving your finger across the pad to move the cursor on the screen. Like the standard computer mouse, the touchpad also has two buttons. The left button is used to select objects and the right button is used to bring up a menu. It also has a function that allows the user to scroll up and down a page. While touchpads are not an efficient way to move the mouse cursor, they make it possible to use notebooks without having to use any additional devices. Advantages Limitations -------------------------------------------------------------------------------- --------------------------------------------------------------------------- Saves space in your laptop bag as you do not need to carry an additional mouse People with hand or wrist injuries might find itdifficult to use touchpad Usable when there is no flat surface for a mouse Harder to control the pointer than with a mouse DIGITAL CAMERAS A digital camera is used to capture photographs and store them on a digital memory card instead of on film. Once the image is stored, you can transfer it to your computer. You can then manipulate (edit) the image, and print it or upload it to the internet. Some digital cameras can record video images with sound. The biggest advantage is that you can preview the photo you take and delete the ones you do not want to keep. +-----------------------------------+-----------------------------------+ | Advantages | Limitatoions | +===================================+===================================+ | Easy to use and fast to upload | Requires the user to be computer | | your photos to | literate to | | | | | the computer | make full use of the camera | +-----------------------------------+-----------------------------------+ | There is no film that needs to be | With some cheaper digital | | developed | cameras, the | | | | | | resolution might be slightly | | | worse than pictures | | | | | | taken with a traditional camera | +-----------------------------------+-----------------------------------+ | Easy to delete pictures that you | Images might need to be | | do not like | compressed to reduce | | | | | | the amount of memory used, which | | | reduces the | | | | | | picture quality | +-----------------------------------+-----------------------------------+ resolution refers to the amount of detail that a camera can capture. The resolution is measured in megapixels. Generally, the higher the resolution, the clearer the photograph or video will be. A lower pixel count means that you can see the sharp edges of each pixel, which makes the image blurry (or pixelated[).] One of the biggest advantages of a digital camera is that it provides the user with a choice of camera resolution and image quality. Although the average user will most likely want to take pictures using the high-resolution setting, you should know that there are some advantages to taking lower-resolution pictures. Images with a lower resolution have a smaller file size and take up less space on a storage device. This saves time when you transfer images. It also saves money, as you can use devices with a smaller storage capacity. On the other hand, high-resolution photos have better image quality, allowing the user to crop the image as much as needed with little or no loss of quality. [WEBCAMS] A webcam is a type of digital camera that is connected directly to your computer. It makes it possible for the user to stream live videos to, or through the computer. The camera consists of a lens, image sensor and support electronics. Some webcams include a microphone, allowing you to record sound; others need a separate microphone. Laptops and notebooks have a built-in webcam and in most cases, a built-in microphone as well. Once a video image is recorded on your computer, you can either save it on the same computer, or upload it to the internet (for example, to YouTube). ADVANTAGES AND LIMITATIONS OF WEBCAMS. +-----------------------------------+-----------------------------------+ | Advantages | Limitations | +===================================+===================================+ | The camera can be left on | Most webcams produce poor-quality | | constantly and | videos | | | | | activated when the user requires | | | it | | +-----------------------------------+-----------------------------------+ | Allows people to have | The webcam needs to be connected | | face-to-face | to | | | | | conversations without the need to | the computer | | travel | | +-----------------------------------+-----------------------------------+ | Can take pictures without the | Feed when video chatting can be | | need of film | choppy | | | | | | or pixelated | +-----------------------------------+-----------------------------------+ [MICROPHONES] A microphone is an input device that makes it possible for the user to record sound, which is then stored on your computer. A variety of sounds can be recorded; including music,ambient sounds and your own voice. You can use a microphone with a digital camera or webcam to make videos, to have a face-to-face meeting, or to have a discussion over a chat program, such as Skype. +-----------------------------------+-----------------------------------+ | Advantages | Limitations | +===================================+===================================+ | Makes it possible to communicate | Requires an internet connection | | with other | to communicate | | | | | users over the internet in a fast | with other users | | and | | | | | | efficient manner | | +-----------------------------------+-----------------------------------+ | Sound can be manipulated with | Sound files can take up a lot of | | special software | storage space onyour computer | +-----------------------------------+-----------------------------------+ | Makes it possible to use | Voice-activation software might | | voice-activation software | not always be as accurate as | | | typing on a keyboard | +-----------------------------------+-----------------------------------+ SCANNERS A scanner is an input device that works a lot like a photocopy machine. However, unlike a photocopy machine, a scanner does not produce a printed copy of the scanned document; it produces a digital copy that you can save on your computer. When the document is in digital format, it can be edited and manipulated before you print it. +-----------------------------------+-----------------------------------+ | Advantages | Limitations | +===================================+===================================+ | Images and documents can be | The quality of the scanned | | stored and | document is limitedby the | | | resolution of the scanner, as | | printed later | well as the quality of the | | | original document | +-----------------------------------+-----------------------------------+ | Makes it possible for the user to | Unable to scan 3D objects | | edit stored | | | | | | Documents | | +-----------------------------------+-----------------------------------+ | Document quality might be | Prone to wear and tear and, | | improved by using | therefore, prone totechnical | | | difficulties | | special editing software | | +-----------------------------------+-----------------------------------+ [INTEGRATION OF INPUT MODES TO ENHANCE PRODUCTIVITY AND EFFICIENCY] This means that having multiple input methods in a single device can help you to become more productive and efficient with what you do. The mouse scanner is a good example of technology integration, as it combines the traditional computer mouse with scanner technology. The result is a specialised computer mouse that has the ability to scan any size document up to A4, as well as being used as a point-and-click device. Smartphones use integrated input modes to make users' lives as easy as possible. These methods of input include the following: - [Touch screen]: The touch screen can be used to play games, type messages and interact with programs. - [Microphone]: The microphone can be used to talk to people, record messages and for voice recognition. - [Camera]: The camera can be used to take pictures and videos, and to scan things like QR codes, as well as facial recognition. [Ergonomic considerations] Make sure that your keyboard is at the correct height, just above the level of your lap. Your arms should be tilting downward when typing. In many cases, this may mean that you should get an adjustable keyboard tray so that your keyboard can be tilted down and away from you. [ Keep your wrists in the neutral (straight) position.] If you have to bend your wrist up and down the whole time, it compresses structures in your wrists, and causes pain and injuries, such as carpal tunnel syndrome and tendonitis. [ Adjust the height of your chair to make sure that your elbows are at a 90-degree angle,] [or more]. Elbows that are bent at less than 90 degrees can cause arm and wrist pain. [ Keep your shoulders relaxed and your elbows at your side]. This means that your shoulders should not be raised and your arms should be roughly parallel to the floor. [ Keep a light touch on your keys when typing, as the tendons in your fingers are connected] [near your elbow]. Hitting the keys too hard may cause inflammation of the elbows. [ Align your body to the keyboard, depending on whether you use the letters or the] [numbers the most]. If you use the letters the most, centre the keyboard so that the letter B is about in line with your belly button. However, if you use your numeric keypad (or numpad) the most, move the keyboard more to the left. [ Use keyboard shortcuts or macros for common, repetitive tasks to prevent overusing] [your hands and wrists]. [ Buy an ergonomic keyboard if you already suffer from hand, wrist, arm or shoulder pains.] [WIRELESS VERSUS CABLED DEVICES] Advantages and limitations of wired input devices +-----------------------------------+-----------------------------------+ | Advantages | Disadvantages | +===================================+===================================+ | Usually cheaper than wireless | Wires take up space and might get | | devices | tangled | +-----------------------------------+-----------------------------------+ | Requires no batteries to operate | Wires are not aesthetically | | | pleasing to look at | +-----------------------------------+-----------------------------------+ | Advantages and limitations of | | | wireless input devices | | +-----------------------------------+-----------------------------------+ | Advantages | Disadvantages | +-----------------------------------+-----------------------------------+ | Saves space as there are no wires | Battery life might be an issue | | | causing the device to stop | | | working | +-----------------------------------+-----------------------------------+ | Aesthetically better than wired | Potential interference of other | | input devices | Wi-Fi signals | | | | | | might cause a decrease in | | | performance | +-----------------------------------+-----------------------------------+ | Allows flexibility of use as you | There might be some security | | can use the | issues as it is | | | | | device at a distance | easier to keylog a wireless | | | device | +-----------------------------------+-----------------------------------+ INTERNAL HARD DRIVES A hard drive is a piece of hardware in a computer in which data is stored and from which you can retrieve data. It is used to store files for your operating system, your software and personal information. Every modern computer comes equipped with an internal hard drive. Modern hard drives have the potential to store up to 12 terabytes (12 Tb) of data. This is enough space to store 3 000 000 compressed songs (such as MP3s), or 17 000 uncompressed CDs. +-----------------------------------+-----------------------------------+ | Advantages | Limitations | +===================================+===================================+ | Large capacity of storage space | Relies on moving parts and is, | | | therefore, prone to wear and tear | +-----------------------------------+-----------------------------------+ | Data can be retrieved and saved | Can easily be damaged if not | | much faster | treated with care | | | | | than from DVDs or CDs | | +-----------------------------------+-----------------------------------+ | Damaged drives can be easily | Lacks portability, as they are | | replaced | fixed inside | | | | | | the computer | +-----------------------------------+-----------------------------------+ EXTERNAL HARD DRIVES Although most hard drives are located inside the computer, there are some that are used as portable storage devices. These are known as external hard drives. Unlike the internal hard drive, external hard drives are protected by a case that is designed to prevent damage to the drive and is connected to the computer by using a USB cable. ADVANTAGES AND LIMITATIONS OF EXTERNAL HARD DRIVES The small size and portability of external hard drives ensure that they can be quickly connected to different computers and are, therefore, ideal for transferring large amounts of data, or backing up data from your internal hard drive. +-----------------------------------+-----------------------------------+ | Advantages | Disadvantages | +===================================+===================================+ | Large capacity of storage space | Relies on moving parts and is | | | prone to wear | | | | | | and tear | +-----------------------------------+-----------------------------------+ | Data can be retrieved and saved | Can easily be damaged if not | | much faster | treated with care | | | | | than using DVD/CDs | | +-----------------------------------+-----------------------------------+ | Enables transfer of data between | Slightly slower than an internal | | computers | hard drive | +-----------------------------------+-----------------------------------+ [SOLID-STATE DRIVES] The SSD is a storage device (like a hard drive) that does not use the traditional mechanical parts of standard hard drives. Instead, the drive consists of interconnected flash memory chips made of silicon. Due to this, an SSD functions more like a CPU that contains billions of small transistors; each storing one bit of data. [ADVANTAGES AND LIMITATIONS OF SOLID-STATE DRIVES] Solid-state drives, or more commonly referred to as SSDs, are generally many times faster than normal hard drives. However, since a separate transistor is needed for each bit of data stored, SSDs also usually have a much lower storage capacity and a much higher cost per gigabyte. It is, therefore, recommended that you use an SSD to improve the performance of certain programs and not as a primary storage device. +-----------------------------------+-----------------------------------+ | Advanages | Limitations | +===================================+===================================+ | Faster than a standard mechanical | More expensive than standard | | hard drive | mechanical harddrives | +-----------------------------------+-----------------------------------+ | Lower power consumption | Limited storage capacity due to | | | high cost per | | | | | | Gigabyte | +-----------------------------------+-----------------------------------+ | More durable and compact due to | Shorter life span than standard | | the absenceof mechanical parts | hard drives or | | | | | | flash drives | +-----------------------------------+-----------------------------------+ [Card reader]: A device connected to a computer that is designed to accept and read data from different types of storage media, such as SIM and SD cards and flash drives. FLASH DRIVES A flash drive is a very small (physically) portable storage device. You can connect it to your computer via a USB port. Because it is so small and highly portable, a flash drive is the best way to transfer data quickly and efficiently between two computers. A flash drive is also an ideal storage device for documents and photos. ADVANTAGES AND LIMITATIONS OF FLASH DRIVES Flash drives have a very high cost per gigabyte. Due to this, we recommend that you base your purchase on the amount of data that you want to transfer or store. +-----------------------------------+-----------------------------------+ | Advantages | Limitations | +===================================+===================================+ | Very compact and portable | Easy to lose, due to its small | | | physical size | +-----------------------------------+-----------------------------------+ | More robust than other storage | High cost per gigabyte | | devices | | +-----------------------------------+-----------------------------------+ | Does not require a power source | Shorter life span, as the flash | | to be used | memory in the | | | | | | drive can only be used a finite | | | number of times | +-----------------------------------+-----------------------------------+ OPTICAL DISC DRIVES An optical disc drive is a multi-purpose drive that makes it possible for the user to either read data from optical discs, such as compact discs (CDs), digital optical discs (DVDs) and Blu-ray discs (BDs), or to record data. This, as well as the fact that most movies and music are supplied commercially on these discs, an optical disc drive is one of the most popular storage devices. ADVANTAGES AND LIMITATIONS OF OPTICAL DISC DRIVES One of the major advantages of an optical disc drive is that it gives the user an affordable and time-efficient way of producing multiple copies of a disc that contains information. However, due to the limited storage space, this is restricted to small amounts of data. +-----------------------------------+-----------------------------------+ | Advantages | Limitations | +===================================+===================================+ | CDs and DVDs are less expensive | Data transfer and access rates | | than | are slower thaneither a hard | | | drive or flash drive | | hard drives | | +-----------------------------------+-----------------------------------+ | Certain CDs and DVDs can be used | To reuse the same disc, it | | | requires special rewritable | | multiple times | | | | CDs and DVDs, which are more | | | expensive | | | | | | Discs can easily be lost or | | | damaged | +-----------------------------------+-----------------------------------+ [COMPUTER SCREEN/monitor] The computer screen or monitor is the most important output device of any computer. It makes it possible for the user to visually interact with data and programs in a quick and easy manner. This is possible because the computer software is built around a visual representation of data; whether it is a page of text, video on the internet, or 3D elements in a game. RESOLUTION As previously discussed, resolution refers to the number of pixels on the computer screen and plays an important role in determining image quality. We will now look at some of the most common resolution-related issues that you might encounter, as well as how to fix them. Black screen: [ The screen is not plugged into the compute]r. Plugging in the screen should fix this issue. [ The setting of the screen resolution is too high]. Operating systems, such as Windows, have a built-in feature that allows you to return to your previous resolution 15 seconds after you selected a new one. Just make sure that you do not click on Keep these changes. [ The images and text on the screen look very big]. This is most likely because the resolution is very low and changing the resolution should fix the problem. This issue is sometimes caused when updating your computer's graphics drivers. [Software that enhances accessibility, efficiency, productivity ] [Voice-recognition] (or voice-activation) software enables the computer to take verbal commands given by the user, and translate and interpret them. It does this by converting the audio received from the microphone to digital signals that the computer can interpret. The signals are then compared to a database containing words, phrases and actions that should be performed. Apple's Siri and Android's Bixby both work with voice recognition. +-----------------------------------+-----------------------------------+ | Advantages | Limitations | +===================================+===================================+ | Can learn to recognise your own | Speech must be clear and distinct | | unique | | | | | | speech pattern | | +-----------------------------------+-----------------------------------+ | Works well for people with | Some versions might require | | physical disabilities | training and setup | +-----------------------------------+-----------------------------------+ | Should catch most of the spelling | Background noise can influence | | and | performance | | | | | grammar mistakes | | +-----------------------------------+-----------------------------------+ | Can capture speech much faster | Alterations to your voice, such | | than the | as a cold, might | | | | | average person can type | cause problems when using the | | | software | +-----------------------------------+-----------------------------------+ Printers A printer is a device that makes it possible to transfer text and graphic output data from your computer to a piece of paper. You can print pages of text, illustrations, diagrams and photos. ♥ Be aware of the following requirements when deciding on a printer: [♥ Budget]: Entry level A4 printers are much cheaper than photo quality A3 printers. [♥ Printer speed]: Laser printers are much faster than inkjet printers. ♥ Colour: Some printers will not be able to print in colour. [♥ Cost per page]: Laser printers are usually cheaper per page than inkjet printers. ♥ Graphics capability: Inkjet printers produce better quality graphics. [♥ Photo printing]: For photos a high-quality photo printer is needed. [♥ Paper sizes and paper type]: Common size is A4 although larger or smaller sizes are available as well as specialist printers such as label printers. [♥ System compatibility:] Newer printers may not be compatible with older computer systems. Be sure to check that a port on the computer and drivers are available. [♥ Wireless capability]: Wireless printers may be ideal when cables cannot be used. [♥ Mobility]: Printers are available that have been designed to be mobile to be used in conjunction with a mobile device such as a printer EVALUATING A COMPUTER SCREEN When looking to buy a new computer screen, there are three main things to look at: 1\. Pixels: A good number of pixels is 1 920 pixels across the width of the monitor and 1 080 pixels across the height of the monitor. This is normally represented by the resolution of the screen as 1 920 × 1 080, or full HD -- i.e. the higher the number of pixels, the better the screen. [2. Screen size]: The size of a computer screen is measured diagonally from the bottom of the screen to the top right. The measurement is made in inches and one inch is roughly 2.5 cm long. When looking at the size of the computer screen, you should take into consideration how big your desk is. A big screen can cause eye fatigue and even damage to your sight if not placed at the correct distance from your face. Any screen bigger than a 27-inch monitor will be too big for a normal-sized desk. [3. Refresh rate:] This refers to the amount of time it takes for the screen to be updated with the newest information. It is normally represented as the number of times the screen updates in one second. Most modern computer screens have a refresh rate of 60 Hz. This means that the screen is updated with new image information 60 times in one second. This should be more than sufficient for most users. However, there are advanced screens available that have a refresh rate of up to 144 Hz. These screens, like those with a higher number of pixels, will be much more expensive. [Economic and environmental considerations ] - [Laser printer]s tend to produce more prints per cartridge resulting in a printer that is cheaper to run. - [When disposing of used cartridges do so responsibly by:] Returning the cartridge to a company that will dispose of it. Refilling and re-using the cartridge. Not throwing cartridges in the rubbish bin as the contents may be toxic - [Its storage capacity], which determines how much information you can save on the device. [Its volatility,] which determines if the device will lose the data when turned off. You do not want a device that will lose all its data in case of a power outage. [Its reliability and durability], which determines how likely the device is to break down. When you store thousands of hours' worth of work or years' worth of photos on a storage device, you do not want it to break unexpectedly. [RANDOM ACCESS MEMORY RAM] is a piece of hardware (chip) responsible for temporarily storing data. It also enables the computer to work with a vast amount of information at the same time. It does this by acting as a helper to the GPU and CPU, storing the information that is currently being used, and loading the data that they may want to use next. [CENTRAL PROCESSING UNIT] It is responsible for the following tasks: Receiving and carrying out the computer's instructions Allocating more complicated tasks to other chips that will better handle the task When trying to decide which CPU is best suited for your needs, you should consider the following: Gigahertz of the processor: Gigahertz refers to the CPU frequency and is an indication of the processor's speed. Number of cores: As with the processor speed, generally more cores are better. [GRAPHICS PROCESSING UNIT] The GPU is a specialised processing unit responsible for display functions. Like the CPU, the GPU is responsible for making calculations and following instructions. However, unlike the CPU, he GPU's instructions are limited to the calculations needed to render and display images on the screen. LACK OF FREE SPACE ON STORAGE MEDIUM The storage on your computer is limited and as such, you might come across a message telling you that you do not have enough hard-drive space to copy, or save a file. This issue can be resolved by deleting some of the files that you no longer need. To determine how many files you should remove, look at the amount of free disk space that is currently available. This includes the CPU, GPU and RAM. The CPU and RAM work together to process data into information. The RAM temporarily stores the data the CPU is working on. The CPU does all of the calculations Interpret specifications regarding CPU AND RAM (BASIC) - Typing tutors/Keyboarding skills -Typing tutors can help improve the speed of typing - Note-taking software- Allows users to make notes on the device. Software can convert handwritten notes to digital. Keystroke logging: This is a method used by hackers to record your keystrokes on the computer. The keystrokes can be used to identify personal information , such as bank details and passwords. Keystroke logging, also known as key logging, is normally done with malicious so ware (malware) that is installed on your computer. ![A screenshot of a computer program](media/image2.png) Mouse is not working New technologies ![](media/image4.png) Installed applications are applications that can be accessed on your computer without the need of an internet connection. Installed applications refers to software that is permanently installed onto the hard drive of the computer +-----------------------------------+-----------------------------------+ | Advantages | Disadvantages | +===================================+===================================+ | No internet connection is needed | The user must install the | | | application on the computerbefore | | | using it | +-----------------------------------+-----------------------------------+ | Installed applications offer | When the user installs the | | users with | software on one computer and he | | | or she can only access it on that | | more features and functions | computer | +-----------------------------------+-----------------------------------+ | Data is stored on the local disk | User is responsible for backing | | of the | up and saving data | | | | | Computer | | +-----------------------------------+-----------------------------------+ Web-based applications are stored on servers on the Internet or an Intranet. Users need an internet connection to access the software. +-----------------------------------+-----------------------------------+ | Advantages | disadvantages | +===================================+===================================+ | Software does not take up any | Requires an internet connection | | disk | | | | | | space on the computer | | +-----------------------------------+-----------------------------------+ | Data is managed and backed up by | Application might be slower than | | the | an installed | | | | | software providers | application due to internet speed | +-----------------------------------+-----------------------------------+ | Can be used anywhere, provided | Interfaces of web-based | | one | applicationsare not always as | | | highly developed as those on | | has an internet connection | installed applications | +-----------------------------------+-----------------------------------+ SYSTEM REQUIREMENTS OF SOFTWARE This includes the following: The amount of hard-drive space needed to install the software The amount of RAM needed for the software to function normally The GPU and CPU required to do calculations The type of programs (usually the type of operating system) that is required for the new program to function The input and output device needed for data to be collected and displayed [The following table is an example of the system requirements that software might need in] [order to function]. Minimum requirements- The lowest specification for the software to operate at all. Recommended requirement specifications- that allow the application to work at an optimal level. UPDATING SOFTWARE Software developers regularly release updates in the form of update patches. [These patches] can vary in size, depending on the amount of new program information contained within the patch. The patches can be downloaded from the developer's website. However, most programs have a setting that automatically updates the program whenever an update is available. This setting can be changed so that it asks your permission to update the program. This is especially useful if you have limited bandwidth. [READ-ONLY FILES] Read-only files allow users to open and read the file, but no changes can be made to the file. This protects data from being changes on purpose or by accident. If you find that you cannot save or edit a file, it may be that the file had accidentally been changed to "read-only". This problem might occur due to software updates that contain a faulty code. [RISKS OF USING FLAWED SOFTWARE] As we have stated previously, not all software is perfect. Some software might contain flaws or bugs that will cause the system to produce an incorrect or unexpected result. Using such software has certain risks associated with it. These risks include the following: [Security risks]: Faulty software might not be fully secure and can contain flaws that people with malicious intent can exploit in order to access your computer and steal your data [Underperformance]: Faulty software might cause your computer to underperform due to slow system response and transaction rates. [No performanc]e: Faulty software can lead to program and computer crashes. This might require you to restart your computer. [Navigation risks]: Faulty software can cause programs that use a global positioning system (GPS) to give inaccurate results. This can lead to the user getting lost and wasting a lot of time trying to determine how to get to his or her destination. [Economical risks]: Faulty software used to make payments to workers can lead to some workers getting paid more than intended, while others might not get paid at all. User-centred design (UCD) is a design process whereby the developers design software based on the focus and needs of the users This involves a four-phase process: 1\. Identify how the user will use the product 2\. Determine the user's requirements 3\. Design the product 4\. Evaluate the product according to the user's needs, requirements and product Performance Advantages of UCD include the following: [ Meeting customers' expectations]: This will lead to an increase in sales and lower costs caused by returns and customer support. Safer products: Because UCD focuses on the user, products can be designed for specific tasks. This reduces the risk that the product will be used for the wrong task. No training: UCD allows products to be designed in a user-friendly manner. This reduces the amount of training needed to use the product and ensures that customers are not frustrated by using it. Designing websites: UCD plays an important role when designing a new website, as users need to be able to navigate and find what they are looking for without having any problems. [The following factors should be considered when designing a website]: { Visibility { Accessibility { Legibility { Language *[UCD makes it easier for a user to enter data into a database,]* as it ensures that the user enters the correct information where needed. The following factors should be considered when designing a database: { Purpose of the database { Type of data being stored { Data fields required for data entry { Data-validation techniques to protect data entry *[UCD assists in making presentations easier to present and understand]*. This can be done in the following ways: { Keep bullet points and text to a minimum { Avoid using too many transitions { Use high-quality images { Use the white space (blank space); avoid cluttering the slide with too much information and unnecessary images [Wide Area Network (WAN]) A wide area network is a network that connects computers over a wide area such as a city or province. [A WAN uses:] cables, radio waves, microwaves and satellites as communication methods. *[Purpose of WAN:]* To connect LANs together Allows communication to take place over a large distance. Centralisation of shared data THE INTERNET AS AN EXAMPLE OF A WAN The internet is a computer network that consists of billions of connected devices, allowing people to share information, obtain entertainment, or chat to one another. [Internet Services] The internet is a wide area network that can be accessed from any computing device (Computers Smartphones, etc.), as long as the computing device is connected to the internet. advantages - Allows you to chat in "real time" to other people who also have an IM client - Messages are delivered immediately after being sent, if the person is online or is connected to the internet - One can see when your message has been read - It connects people regardless of where they are located People can speak to multiple people in virtual conference/groups, share ideas and reach conclusions. DISADVANTAGES OF INSTANT MESSAGING - Because it is immediate, you have no time to reflect on the message you are sending, unlike an email where you can review the draft before sending it - Messages are not always saved - Instant messaging takes away the face to face, personal experience that people have when they are speaking to someone in person. EXAMPLES OF INSTANT MESSAGING SERVICES There are a few main instant messaging services that you most probably use on a daily basis. [Let's take a look at some examples of the most popular instant] [messenging services:] -W[hatsAp]p: This is a popular instant messaging service that is used on smartphones and computers \- [Facebook] Messenger: This service is built into Facebook [- iMessage]: This is Apple's built-in instant messaging service Volp -Voice sounds that are converted into data so that computing devices can transmit it over the internet. [Examples include, Skype, Google Hangouts, Discord and ZoiPer] [ADVANTAGES OF VOIP] -Saves money on travelling to another country to attend a meeting. \- Audio and video information can be shared. \- Enables collaboration and can strengthen relationships between colleagues who work far away from each other. \- VoIP is much cheaper than using traditional telephonic calls. \- It is expensive to set up and maintain. -You need to have an active internet connection. \- Power failures will cause a break in communications. [Good practices] -Only speak about the matters that need to be discussed at the meeting. -The video lab must be quiet and have no noisy distractions -Only run the video program during the video conferencing process. *[File Transfer Protocol (FTP]* FTP is a set of rules that networked computers use to communicate to one another. It is a language on a TCP/IP network such as the internet, examples include, FileZilla. ADVANTAGES OF USING FTP \- Easy to use (with the proper training) \- Multiple file directories can be sent at the same time \- File transfer progress is not lost if your connection fails -File transfers can be scheduled at times that are best suited to your needs DISADVANTAGES OF USING FTP -Data, username and password are shared in plain text, which makes it easy for hackers to access information -Requires training to use FTP effectively \- It is difficult to monitor mishandled data and track the source of the problem \- Not all FTP services encrypt your data, which makes it vulnerable to attack FileZilla Server: This is an FTP server available to Windows users. [File Sharing] Accessing or sharing of files by one or more users. For example: ShareIt, uTorrent and Xender Grid computing is a computer model that has been connected to a network. It has the ability to process large volumes of data with the help of a group of networked computers that coordinate to solve a problem together. Cloud computing is the use of hardware or software on a server on the internet. It allows users to use software or save data without worrying about using up storage space. ADVANTAGES OF GRID COMPUTING It can help you solve larger, much more complex problems in a much shorter time span You do not have to buy more powerful hardware as you will make better use of existing hardware If one computer fails, the other computers will take over the work, which makes the system very reliable DISADVANTAGES OF GRID COMPUTING Training is needed to make full use of grid computing May require multiple people in order for the grid system to function ADVANTAGES OF CLOUD COMPUTING Since the cloud platform is managed and updated, it is much more reliable It can be used from any device capable of connecting to the internet DISADVANTAGES OF CLOUD COMPUTING You may experience downtime if the cloud server is undergoing maintenance Even though cloud computing uses security measures to protect your data, there is always a risk of files being compromised You do not have full control over the platform as it is owned and managed by the service provider GOVERNMENT INTERNET SERVICES Government internet services are internet services that allow users to skip queues by using government websites, from the comfort of theirhomes, to conduct business, pay bills and obtain information [SUBMITTING TAX RETURNS] Tax season is a stressful time of the year for every person involved, especially when you get to the SARS office and the queues are so long. Sometimes you need to return another day just to finish filing your taxes. Fortunately, SARS has come up with the solution of e-filing. [Electronic filing] (commonly known as e-filing) gives users a free, simple and secure way to do tax returns from the comfort of their homes. It is available 24 hours a day and allows users to see their tax status, change their information and make any payments required. You can submit tax returns via e-filing on the SARS website [PAYING YOUR TELEVISION LICENCE] You can pay your TV Licence online by using your credit card details, or online at your own banking website/banking app using the TV Licenses account details, or go to the EasyPay website for a virtual payment solution. ELECTORAL INFORMATION One of the advantages of living in a democratic country is that you are able to vote for the people you want to be in charge of your city and country. To do this, you need to know: Who the people and parties running for office are If you are registered to vote Where you should go to cast your votehat the results of the election were ![](media/image6.png) Bandwidth is the amount of data that can be transferred from one point to another, whereas broadband is a high bandwidth, high-speed connection to the internet Downloading refers to the transmission of a file from one computer to another. When downloading a file, one requests it from another computer. Uploading refers to the process of moving files from your computer and placing them on a server so that other people can see them. [Capped, Bundle Capped] refers to the limit the ISP gives to clients on the amount of data used over a certain time frame. Once a user reaches their limit (cap) a bundle can be purchased. A bundle is a specific amount of data purchased from the ISP, which might expire after a certain period [Data Transmission Speed ] Data Transmission Speed refers to the speed at which data can be transferred from one device to another via a communication channel such as wires, fibre-optic cables and wireless networks.) [If the data transmission speed is high]: Streaming of high definition videos is smooth Many users can use the connection at the same time without any \'lagging\' Cloud storage will sync faster Comparisons of transfer rates ADSL: Up to 15 Mbps 4G/LTE: Up to 50 Mbps Fibre: Up to 105 Mbps SOCIAL IMPLICATIONS OF NETWORKS TYPES OF COMPUTER-RELATED CRIMES 1\) THEFT OF COMPUTER HARDWARE Theft of computer hardware refers to the theft of physical hardware components, which includes internal components, such as RAM and graphics cards, external components such as a keyboard and mouse, as well as the theft of your laptop or smartphone. How to protect yourself:  Never leave your laptop or mobile device unattended in a public place.  Use passwords as a security method.  Use a cable to lock your equipment to a table or desk in the 2)SOFTWARE THEFT Software theft refers to the use and distribution of software obtained by illegal methods. This includes stealing a CD or DVD that contains software, as well as downloading illegal software from the internet (piracy). Guidelines to help you stay clear of software theft: Do not copy, duplicate or distribute any software without a copyright licence. Do not download and use illegal software from the internet. Do not lend your software so that an illegal copy can be made3 )BANDWIDTH THEFT Bandwith theft refers to the use of bandwidth without paying for it. Precautions include:  Having good password policies.  Being careful when installing free software from the internet, as it might be malware. -The second type of bandwidth theft is hotlinking. Hotlinking is when someone takes a 昀椀le or video from his or her website and links it to your website. This is problematic as each time a user clicks on the link in order to download the 昀椀le or view the video, your bandwidth will be used.. 4)IDENTITY THEFT Identity theft refers to stealing data that can be used to pretend that a person is someone else. Identity theft can range from stealing any personal information such as your name, your address, your favourite food or more o昀케cial information such as your ID number, telephone number, etc. To avoid these problems, do not share your sensitive information unnecessarily and protect your information using a secure password. While sharing information is part of using the internet, be selective with the websites on which you choose to share your information. If you use your email address for every website you visit, do not be surprised if you start receiving a lot of spam emails 5)THEFT OF TIME AND SERVICES Theft of time refers to a person receiving payment from his or her employer for work that the employee did NOT do. CROWD FUNDING Crowd funding is a way for individuals and organisations to raise money from a large number of people. It can be an alternative to using a bank or investment firm. Below are some examples of crowd funding: DONATION CROWD FUNDING Donation crowd funding is used to raise money for a cause. It's not just charities who can do this -- groups and individuals can also start crowd funding projects, for example to pay for a community centre or a child's surgery. REWARD CROWD FUNDING This involves funding a project for a set reward. For example, you might give money to help a band record its music and get their album in return. The reward may vary depending on how much money you give. LOAN BASED CROWD FUNDING This is also known as "peer-to-peer" (P2P) and "peer-to-business" (P2B) lending. You'll lend a certain amount of money, which should be repaid to you with interest over time. So, the idea is you get back more than you lent. INVESTMENT CROWD FUNDING Investment crowd funding (also called "equity crowd funding") typically involves buying part of a company. The part you own is called a "share". You'll usually be one of many shareholders, along with other crowd funders, investment firms and people working at the company. INTERNET ATTACKS Internet attacks or cyber attacks refers to an attack on the infrustracture of the web itself. Examples include the following: Denial-of-service (DOS/DDOS): The use of compromised computers to flood a server with requests for information. The attack can be regarded as successful if the server becomes so overwhelmed that normal users cannot connect to the system. Cyberterrorism: Attacks that only occurs in parts of a country's IT infratructure. Spoofing attacks: Spoofing attacks work by masking the attacker and making it seem as if he or she is a legitimate user. This is done by using false data to connect to the network. Sniffer attacks: Sniffer attacks works by checking the data packets sent over the network. Hackers use sniffer applications to analyse the network and access all unencrypted data being transmitted. MALWARE In our modern society, computers and smartphones are used to do everything; from transferring money with online banking, to storing personal information on the cloud. It is, therefore, very important that computer users understand the basics of computer malware, and know how to use computers and the internet safely. Table 5.2 gives some information on the most common threats and how best to avoid them. +-----------------------+-----------------------+-----------------------+ | Pharming | A scamung practice | Take note of | | | where a user is | redirection warnings | | | | | | | automatically | Check wherher the | | | redirected to a fake | site is secure | | | | | | | website even if they | Make sure that your | | | type in the correct | anti-soyware | | | | | | | URL of the official | software is up to | | | site. | date | +=======================+=======================+=======================+ | Click-jacking | Click jacking is an | Add ons can be | | | attack in which a | installed on the | | | | | | | site appears to do | browser | | | one thing but your | | | | | Sever programs can | | | click are actually | be installed to | | | redirected to do | | | | | protect users on a | | | something else | network | +-----------------------+-----------------------+-----------------------+ | Spoofing | The changing of an | Make sure the email | | | email header so | comes from a | | | | | | | that the email | trusted sender | | | appears to come from | | | | a | | | | | | | | different source | | +-----------------------+-----------------------+-----------------------+ | Spyware | Any technique or | Install | | | software that tries | anti-spyware | | | to | software. | | | | | | | monitor and track the | Do not fall victim | | | way you use your | for any internet | | | | | | | computer, once it has | hoaxes | | | done this, your | | | | | | | | information is sent | | | | to a third party. | | +-----------------------+-----------------------+-----------------------+ | Keylogger | A type of software | Make use of a | | | that records your | firewall | | | | | | | keystrokes as you | Install a password | | | type in an attempt | manager. | | | | | | | to dicover your | Keep your system | | | personal information | updated | | | | | | | | Consider anti | | | | malware software | +-----------------------+-----------------------+-----------------------+ | Computer | A program that is | Install anti-virus | | | written to disrupt | software and keep it | | Virus | | | | | the normal | updated | | | functioning of a | | | | computer. | Scan email | | | | attachments and | | | Most viruses activate | portable | | | when you open | | | | | storage devices | | | or run an infected | | | | file | Do not open email | | | | attachments or | | | | | | | | run programs from | | | | untrusted | | | | | | | | sources | +-----------------------+-----------------------+-----------------------+ | Computer | Malware that is able | Install anti virus | | | to distribute | software | | Worm | | | | | itself over a | Do not open | | | network. It is able | unrecognised or | | | to | | | | | suspicious emails | | | reproduce itself. | | | | Usually distributed | | | | | | | | via email, without a | | | | person having to | | | | | | | | run an infected | | | | program. | | +-----------------------+-----------------------+-----------------------+ | Trojan | A disruptive program | Do not run any | | | disguised as a | programs unless you | | | | | | | useful application. | are sure it is safe | | | It relies on one to | to do so | | | | | | | activate it before it | | | | can operate | | +-----------------------+-----------------------+-----------------------+ | Ransomware | Malware that makes | Install anti-virus | | | data unavailable | software and keep it | | | | | | | until you pay the | updated. | | | hacket a ransom fee | | +-----------------------+-----------------------+-----------------------+ | Adware | Software that | Install ant-malware | | | downloads itself onto | software | | | | | | | your computer and | Do not click on any | | | bombards your | unknown links | | | | | | | computer with adverts | | | | that pop us | | | | | | | | whenever you are | | | | connected to the | | | | | | | | internet | | +-----------------------+-----------------------+-----------------------+ | Scams | A message or article | Check sources for | | | intended to | reliability | | | | | | | deceive or defraud | Do not forward a | | | others | scam to others | | | | | | | | Never take any | | | | actions suggested in | | | | | | | | a scam message | +-----------------------+-----------------------+-----------------------+ BOTS A bot (short for robot) is a software application that allows the user to automate tasks and actions. On the internet, they are normally used to analyse and gather file information. An example of this is web crawlers. These bots gather, analyse and index data that can be used by search engines, such as Google. While bots can be used to make the user's life easier, they often come in the form of malware. Malware bots function by infecting the user's computer and automatically performing malicious actions, such as gathering keystrokes, obtaining financial information, gathering passwords, or opening back doors on the infected computer.' [ZOMBIES] Malware bots also have the capability to completely take over the user's computer, allowing the hacker to take control. When this happens it is known as a zombie. Hackers can use zombie computers for a wide variety of applications; including launching DoS attacks and sending spam emails in order to spread the malware. [RIGHT TO ACCESS VS RIGHT TO PRIVACY] We know by now that computer crimes depends on access to data. For one to prevent fraud and identity theft one needs to keep their data private and one needs to protect it. The important part here is to know who has the right to access data, versus your right to keep your data private. Below are a few examples to look at when it comes to the right of access versus the right to privacy: If you do your work on a computer owned by someone else, they may have the right to claim access to your data files. If you use online services such as Facebook you should be aware that their End User License Agreement states that whatever you post belongs to them. If your school has an AUP for the computer lab that you have accepted, you may have allowed people other than yourself to access your data files. AVOIDING SECURITY THREATS  Use a secure password.  Pay careful attention to the websites and links you open.  Do not share your sensitive information unnecessarily  Do not open suspicious emails  Do not download suspicious programs or attachments  Keep your antivirus application up to date: Keep your other software up to date  Use two-factor authentication whenever possible: SAFEGUARDS AGAINST CRIMINALS, VIRUSES AND THREAT FIREWALLS- The firewall is responsible for monitoring all incoming and outgoing tra昀케c on a network. If the firewall detects any tra昀케c that is not within the de昀椀ned set of security rules, it is blocked. Through this action, the 昀椀rewall prevents malware from spreading over a computer network. Examples of 昀椀rewall software include ZoneAlarm, Comodo and GlassWire. ANTIVIRUS PROGRAMS- An antivirus or anti-malware is a computer program designed to detect, identify, prevent and remove malware from your computer. Examples of antivirus programs include Bitdefender, Norton and Webroot. ANTI-SPYWARE - Anti-spyware is a type of computer program designed to prevent, detect and remove spyware programs from your computer. The anti-spyware program does this by monitoring your emails, the websites you visit and 昀椀les you download. If a malicious program is detected, the anti-spyware will prevent it from being transferred onto your computer. Examples of anti-spyware programs include Bitdefender, Kaspersky and AVG DISTRIBUTED COMPUTING POWER One of most important ways in which technology has impacted our daily lives, is through the invention of distributed computing power. Distributed computing power technologies, such as cloud and grid computing, allow users to store information on the internet, as well as increase their computing power, by using a network where one computer can use the computing power and resources of other computers. This saves users both time and money, as they do not have to invest in expensive processing equipment. Crowd funding: A process where a single idea or business practice is funded by multiple small donations from volunteer contributors, usually before the business venture is started. The contributors will then receive the product when it is finally put into production. Examples: www.indiegogo.com and www.kickstarter.com. (CAPS p. 45) BYOD: Bring your own device (BYOD) refers to a concept where employees/students are allowed to bring and use their own portable devices, such as smartphones, laptops, tablets, to work on and access the network instead of a device owned/supplied by the company/ institution. (CAPS p. 32) Big data: Very large structured and unstructured data sets that are analysed using computers to reveal trends and associations. These present challenges, such as storage, curation, querying, visualisation. (EG 2017) Cryptocurrencies (e.g. Bitcoin, Ethereum, Luno): This is a form of virtual, digital currency. Bitcoins can be exchanged for other currencies, products and services. They have caused concern because they are often used for payment in criminal activities, such as ransomware demands. However, more and more legitimate companies are accepting them as a means of payment. (EG 2017) E-learning: The creation of a learning environment where individuals use their computers to take part in teaching and learning to further their education Mobile or M-Learning: A form of education and training delivered and conducted via the internet using mobile devices, such as tablets and smartphones. It is designed to be flexible, allowing learners/workers/students access to education anywhere, anytime. (EG 2017) Virtual reality (VR): This refers to using technology to create a simulation of a 3D environment that can be interacted with by a person in a seemingly real or physical way. This is achieved by using equipment, such as helmets with screens and gloves fitted with sensors. (EG 2017) Augmented reality (AR) uses types of technology similar to VR but does not create a totally virtual environment like VR. Instead, it takes the physical world and adds (augments) objects, such as graphics, within the real world. Both VR and AR are used in areas ranging from entertainment (e.g. the augmented reality game Pokémon GO), training in aircraft simulators, and healthcare (e.g. an app used to highlight veins when a drip is inserted or surgeons being able to perform remote surgery on patients. AI (artificial intelligence): Refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions, especially traits associated with a human mind, such as learning and problem-solving. Machine learning is the study of computer algorithms that improve automatically through experience and by the use of data. It is seen as a part of artificial intelligence. 4IR (the fourth industrial revolution): 4IR is a way of describing the blurring of boundaries between the physical, digital and biological worlds. It is a blend of advances in artificial intelligence (AI), robotics, the Internet of Things (IoT), 3D printing, genetic engineering, quantum computing and other technologies. It creates many products and services that are fast becoming essential to modern life and is the collective force behind disrupting almost every business sector. 5IR (the fifth industrial revolution): 5IR runs and develops alongside 4IR and uses the advantages 4IR brings to put the focus back on humans and human endeavour, defining the ethics and impact of technology developed in the 4IR. Blockchain: The name of a whole new technology. It is a sequence of blocks or groups of transactions that are chained together and distributed among the users. \'The blockchain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions, but virtually everything of value.\' -- Don & Alex Tapscott It works as an indisputable record of transactions that do not require reliance on an external authority to validate the authenticity and integrity of the data. Transactions are typically economic, but we can store any kind of information in the blocks. ![](media/image8.png) ![](media/image10.png) Internet technologies: URL shortener: This is a tool or service, such as TinyURL.com, which converts a long URL to a shorter version. This shorter version of the URL will take a user to the same web address, but is easier to remember and/or type out. (CAPS p. 25) Internet of Things (IoT): This refers to the trend whereby all sorts of objects and devices are increasingly being connected to one another via the internet. This can range from surveillance systems to geysers, washing machines, \'smart\' vehicles and traffic lights, etc. Various sensors in the devices can produce data for all sorts of purposes, including diagnostics and running systems more efficiently. (EG 2017) Autonomous vehicles: A self-driving car, also known as an autonomous vehicle, driverless car, or robo-car is a vehicle that can sense its environment and move safely with little or no human input. Drone technology: A drone, is an unmanned aircraft. Essentially, a drone is a flying robot that can be remotely controlled or fly autonomously through software-controlled flight plans in their embedded systems, working in conjunction with on-board sensors and GPS. They are widely used in agriculture, photography, game ranging, parcel deliveries, etc. Wearable devices and technologies: Wearable technologies such as electronic mobile devices worn as accessories or part of clothing, e.g. smartwatches or fitness/health trackers, smart glasses, continuously generating data from various environments and communicating with other devices/PC/networks. Shaping (Network tuning): A technique whereby certain network (internet) services, e.g. e-mail, are given preference while others, such as social networking services, are given less priority, thus performance is maintained for the more critical services. (EG 2017) Throttling (Policing): This occurs when your ISP slows down your internet connection. This most often occurs when you have been deemed by your ISP to have downloaded excessive amounts of data. Each ISP has an acceptable use policy (AUP) which specifies how this is determined and implemented. (EG 201 Modem: Hardware device that allows a computer to send and receive data over a telephone line, satellite or cable. Router: A device that connects a network to other networks wirelessly or through cables.Near Field Communication: - A standard that allows devices to connect wireless by bringing them closer to each other, e.g. sharing files between smartphones. ADVANTAGES ower efficient \- Measure of security: data can only be collected in proximit DISADVANTAGES Not all devices have NCF - Devices need to be very close to collect data A service pack is a collection of all the patches/updates up to a specific point in time (including new features) distributed as one package. Global positioning system (GPS)  Is a navigation system that uses signals from a satellite to calculate exactly where you are inthe world? Uses of GPS  It can be used to determine the best route between 2 points  Workout directions to a place  Find an alternative route to avoid traffic jams  Locate a stolen vehicle or lost person  Calculate speed and time between points 33 Advantages of GPS  It helps a user to get directions  It can help to locate a person quickly if he/she is lost  GPS software is regularly updated to cover the whole world. Disadvantages  Signals may be blocked by storm or heavy cloud cover.  It requires power to work so it must be connected to power source  GPS devices are small and they can be easily lost/stolen Wiki: is a collaborative website containing a store of information that is created and maintained by a community of users worldwide.  Users can add and change content.  Many wikis are open to modification by the general public.e.g. is encyclopaedia Wikipedia Web browser: Application software that allows users to access and view web pages. Bookmarks also called favourites  Is a saved web address that a user can access by clicking on its name in a list?  Is a filling system for URLs?  Bookmark is a simple way of saving a site that you like so that you can find it later without going on the web to search for it. \\Blocking websites: Means restricting websites users can access by using content advisor. History: is a folder that stores information about all websites you visit and information you are fre quently asked to provide such as your name and surname Pop up: is a small web browser window that appears on top of the website you are viewing. Popup windows often open as soon as you visit a website are usually created by advertisers Pop up blocker: is a feature that can be used to stop most of pop ups from opening. Browser plug --INS: Small applications that acts as an add-on to a web browser so it can display additional spe cialised content. They are usually free. Needed when you want to open pages with content such as videos, sound or even documents directly in the browser e.g. Flash player, quick time and adobe acrobat reader. Web caching : is the process whereby web pages that the user browse are automatically stored on the computer HD in an cache area allocated to your browser. home page : the first page that is displayed when a website is first opened Blocking websites: Means restricting websites users can access by using content advisor. Information overload  Occurs when there is too much complex information and user to determine which information is really important.  Information overloading induces user confusion and stress.is too overwhelmed How to cope with information overload  Learn to read quickly and accurately and to identify the key points in what you are reading.  Learn to analyse and compare sources.  Take a disciplined and structured approach to dealing with information.  Don't add to the problem by unnecessarily forwarding information to others. A podcast is a free service that allows internet users to pull audio 昀椀les from a podcasting website to listen to on their computers or audio players. A vodcast allows users to pull video 昀椀les from a podcasting website The 昀椀le extension consists of the letters that follow after the full stop in the 昀椀le name. .txt for text 昀椀les created in Notepad or other text editors  docx (or doc) for 昀椀les created in Microsoft Word  xlsx (or xls) for 昀椀les created in Microsoft Excel  pptx (or ppt) for 昀椀les created in Microsoft PowerPoint .pdf for PDF 昀椀les that are opened in a PDF reader (such as Adobe Acrobat) .html or htm for web pages .png, jpg, ti昀昀 for images  mp3 for music 昀椀les  mp4 for video 昀椀les

Use Quizgecko on...
Browser
Browser