F5 CAT Notes PDF
Document Details
Uploaded by ShinyCarnelian9998
St Stithians College
Tags
Summary
These are notes on computer hardware, software, and related topics. It includes information on modular design, components, and devices that affect computer performance.
Full Transcript
Table of Contents: ================== [Table of Contents: 1](#table-of-contents) [Learning Unit 1: Hardware 2](#learning-unit-1-hardware) [Learning Unit 2: Software 8](#learning-unit-2-software) [Learning Unit 5: The Internet & WWW 15](#learning-unit-5-the-internet-www) [Learning Unit 7: Social...
Table of Contents: ================== [Table of Contents: 1](#table-of-contents) [Learning Unit 1: Hardware 2](#learning-unit-1-hardware) [Learning Unit 2: Software 8](#learning-unit-2-software) [Learning Unit 5: The Internet & WWW 15](#learning-unit-5-the-internet-www) [Learning Unit 7: Social Implications 21](#learning-unit-7-social-implications) [Learning Unit 16: Information Management 25](#learning-unit-16-information-management) Learning Unit 1: Hardware ========================= **[Modular Design]:** Computers are built with a Modular Design. This means that your computer can be put together in pieces with your requirements at mind instead of consisting of a single unit in which all the hardware is fixed. Smaller technologies are lees modular and parts are not easily replaceable. Each hardware part is a separate module connected to the MoBo via ports and slots. **Advantages of Modular Design:** - Repairs - Upgrades - Flexibility **[Components & Devices that affect Computer Performance]:** 1. **CPU:** - **Multiprocessing --** Having multiple CPUs, called cores, on a single CPU chip. Many processes can execute at the same time improving performance. For multiprocessing to be effective, it must be supported by the MoBo and the OS. - **Processor Cache --** Cache memory runs at a similar speed as CPU. It stores data that has been pre-fetched from slower RAM so that this data will be needed next by the CPU. 2. **RAM:** RAM is the main memory in chips on modules attached to dedicated slots on the MoBo. RAM stores the programs and all their data. The most used type of RAM is **DDR SDRAM (D**ouble **D**ata **R**ate **S**ynchronous **D**ynamic **RAM)**. The higher the speed of RAM, the faster it can deliver instructions and data to the cache. The quicker data moving in and out of the RAM can be accessed and moved, the faster the processor can get to processing it. The larger the cache, the more instructions can be stored at any time and less direct access to slower RAM is required. When choosing RAM consider the frequency and amount of RAM. The higher the frequency, the faster data can be transferred to and from the RAM. The larger the amount, the more data and instructions can be stored without requiring virtual memory on slower secondary storage. 3. **Graphics Card:** A graphics card consists of a processor called a **GPU (G**raphics **P**rocessing **U**nit**)**. The GPU is housed on a separate card that connects to the MoBo. The GPU processes images stored in **VRAM (V**ideo **RAM)**. The GPU allows the CPU to offload the burden of image rendering freeing up the CPU to perform other tasks. **Integrated Graphics:** Integrated graphics is more than adequate to average users than a separate graphics card. Instead of a separate GPU, its embedded into the CPU and instead of separate VRAM, the GPU shares system RAM. **[Secondary Storage]:** A faster HDD or SSD will significantly improve the approve the ability of the processing components (GPU/CPU) to access the data on secondary storage as quickly as possible. 1. **HDD vs SSD:** **HDD:** **SSD:** ------------------------------------------------------- --------------------------------------------------------------------------------------------- Contains spinning disks and movable read/write heads. No moving mechanical components. Electromechanical drive. More resistant to physical shock, runs silently, has quicker access time and lower latency. Cheaper per unit of storage. More expensive per unit of storage. Larger storage capacity. 3x less boot up time. Magnetic interference can erase data Consumes less power. File opening speeds are 30% faster. 2. **Secondary Storage Formats:** **M.2 Format** M.2 is a form factor -- it describes the shape and size of a hardware device. The M.2 connecter can access the PCI-express 3.0, SATA 3.0 and USB 3.0 bus, depending on the type of M.2 device. M.2 SSDs are small drives connected to an M.2 socket on the MoBo as opposed to SATA drives that uses cables to connect to the MoBo and provide power. M.2 drives are ideal for **SFF (S**mall **F**orm **F**actor**)** systems that have little room for cable routing. **M.2 vs SATA** They're both SSDs but with different sizes and connectors. M.2 is a small form factor and SATA is a bus type. SATA SSDs comes in 2 form factors: 2.5-inch and M.2. The 2.5-inch form factor needs 2 cables (data & power) to connect the SSD to the MoBo. M.2 SSDs has the same performance as the 2.5-inch form factor and plugs directly into the MoBo, eliminating the need for cables. M.2 SSDs comes in 2 main types: PCle bus (known as NVMe SSDs) and SATA bus. **PCle NVMe M.2 SSDs** M.2 based SSDs have **NVMe (N**on-**V**olatile **M**emory **e**xpress**)** that connects via PCI-express. SSDs are basically high-speed memory. The SATA 3.0 was limited but by accessing the PCI-express bus, NVMe drives can run at much faster speeds. NVMe SSDs produce an increase in speed over SATA SSDs. **SATA SSDs** SATA is an older, slower bus technology found in desktops and laptops. SATA drives require a SATA power cable and a separate SATA data cable unless a M.2 SATA based SSD is used. Common SATA devices include 2.5-inch SSDs, 3.5-inch mechanical hard drives and 5.25-inch optical drives. **[Choosing Input Devices]:** **Device** **Description** **Purpose and Use** --------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- --------------------------------------------------------------------------- **Keyboard** Allows a user to type data to be entered into a computer. This data is prone to errors. Data needs to be validated. Input alphabetical, numeric and special characters 1 character at a time. **Mouse** The most popular pointing device with a right and left button with a wheel which allows users to select icons. Track pads and touch screens offers the same services. Select icons, menus and dropdown boxes. **Scanner** Converts captured images to a digital format. Scanners can use Optical Character Resolution (OCR) to convert images to a text editable format. Converts printed pages to an image or a text format. **Bar Code & QR Readers** Bar Code readers read data encoded as a series of lines. A QR code contains more data than a bar code. These limit a user's input. Read prices, ISBN numbers and links to websites (QR codes). **Biometric Scanners** These capture biometric data for verification of a person's identity. The scans match the inputted data against previously saved databases to approve or deny access to the system. Access control to a building or user authentication for a device. **Microphone** Converts sound to a digital form that can be stored as a file. Suitable for video conferences, recording messages and sounds. **Webcam** A small video camera connected to a computer or built into the hardware that streams an image or video in real time to a computer network or the Internet. Suitable for video conferences. **Headphones & Headset** Headphones hear sounds from the computer without disturbing others and is usually of a higher quality than the computer's internal speaker. If a microphone is included, it is a headset and can both input and output sounds. Suitable for gaming and video conferences. **[Choosing Output Devices]:** 1. **Monitors:** A monitor is described using: - **Screen size** **--** Measured diagonally across opposite corners in inches. - **Resolution --** The number of pixels on a screen measured in width and height. - **Aspect Ratio --** The width of a monitor in relation to the height. - **Refresh Rate --** The number of frames that are displayed in a second. The monitor that you choose is usually dependant on 3 categories: - **General or business --** Monitors are used in home or work offices to display software applications that does not need graphics processing. - **Professional visuals --** Monitors that displays the image in the correct colour and to a higher resolution to that the finished product will look similar on other monitors. - **Gaming --** A monitor with a high refresh rate and a computer with a powerful graphics card. **Touch screens:** These are both input and output device eliminating the need for a keyboard and mouse saving physical space. Touch screens are easier to use, clean and sterilise, making them ideal for environments such as medical healthcare settings. 2. **Printers:** **Multifunction Printer (MFP):** An MFP combines scanning, faxing with printing. The printer can be either an inkjet or a laser. MFPs are common and reasonably priced. **Photo Printers:** Photo printers immediately print photos without waiting for the photos to be professionally developed. These printers produces prints of higher quality and great colour accuracy. This printer is smaller in size, more expensive and the paper and cartridges are more expensive. **Speed and Volume:** **PPM (P**ages **P**er **M**inute**)** is the speed at which printers can print. The PPM is not necessarily critical for home or work offices but might be critical for businesses that print many documents. The frequency at which you will need to use the printer and the number of pages printed daily will indicate whether the volume is high or low. **Resolution and Colour:** **DPI (D**ots **P**er **I**nch**)** determines the printer's ability to create high-resolution, high-detail images. Monitors, tv screens and scanners use a combination of **RGB (R**ed **G**reen **B**lue**)** light to produce a variety of colours. Printers use **C**yan **M**agenta **Y**ellow and Blac**k** (CMYK) in 4 colour process printing. **Paper Type and Duplex Printing:** **Duplex printing** provides an option to print on both sides of the paper. The type and size of paper handled by the printer is influenced by the function of the business. A4 is the most common paper and heavier paper can be time consuming. **Laser vs Inkjet:** - Laser printers uses toners where inkjets use ink. Toner lasts longer thank ink, thereby reducing the running cost of the printer. - The initial cost of an inkjet printer is usually quite cheap but cartridges can be more expensive. If you have low printing volume, an inkjet can be more cost effective. - Inkjet printers are better for printing colour documents and laser printers are more suitable for printing black and white documents. - A laser printer is more cost effective if you have a high volume of printing. - Inkjet printers are smaller in size which is more suitable for home offices. **Network Printer vs Wireless Printer:** - **Network printers --** Connected to a local network to allow many computers to connect to a single printer. Network printers are compatible with a variety of operating systems. These printers can be connected through wired or wireless connections. - **Wireless printers --** The printing information is sent to the printer via a wireless connection. This printer can be connected to a network and can be used by multiple printers or it can be standalone printer for 1 computer. **[Upgrade vs Replace]:** A computer should be replaced if: - Your computer is more than 8 years old. - There are few compatible components available. - The price of the components you need to replace is close to or more than a new computer. 1. **Upgrading RAM:** If there is trouble opening new internet browser tabs or there is a delay when working with large documents, more RAM is needed. You can either add more RAM to what you currently have, provided there are slots available on the MoBo and the new RAM is like existing RAM or you can update all the RAM in your system. Adding RAM reduces the amount of virtual memory needed as more programmes and data can be stored in RAM at one time. 2. **Upgrading Secondary Storage:** If opening large documents is problematic or if your computer is displaying messages stating that you don't have enough space you need more secondary storage. An easy solution is to move all unnecessary files to another storage device or you could buy a bigger hard drive. When buying a new hard drive, consider upgrading to a solid-state drive to improve access time when saving and loading files. A faster hard drive will speed up virtual memory when the computer runs out of RAM. **[Typical Computer Systems]:** **Type of Computer** **Example Specifications** **Typical User** ---------------------------------------- --------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------ **Laptop or Desktop PC (Entry level)** Slowest CPU, minimum amount of RAM, storage and lowest screen resolution: Celeron Processor; 4 GB RAM; 500 GB Hard Drive; HD Graphics card. This PC will perform Web surfing, email, word processing and basic business tasks. It will suit users that don't need high performance or graphics capabilities. **Laptop or Desktop PC (Mid-level)** I3; 2 to 3 GHz Processor; 4, 6 or 8 GB RAM; 1 TB HDD or 512 GB SSD; UHD Graphics card. Suits users that need faster processing and improved graphic capabilities but doesn't need the expense of the best computer. **Laptop or Desktop PC (High level)** I5; 2.4 to 3.4 GHz Processor; 8 GB RAM; 2 TB HDD or 480 GB SSD; GPU. Power users who utilises the most advanced features of apps requiring the most capable machines that are optimised for their work purposes. **[Newer Technologies]:** 1. **Drones:** Drones/**UAV**s **(U**nmanned **A**erial **V**ehicles**)** are aircraft devices that fly while not being piloted. They perform actions that are either remotely controlled by a human operator or are pre-programmed to respond to sensors and make decisions. **Advantages of a Drone:** - Maintains a safe environment - Cost saving - Quality of aerial imaging - Precision - Easy to control and deploy - Package delivery **Disadvantages of a Drone:** - Privacy and spying - Vulnerable to wild animals - Easy to hack - Weather dependant 2. **Head Mounted Displays:** An HMD is worn on the head or embedded into a helmet with a small display for one or both eyes. The first HMD used a standard LCD screen to display images. **AR (A**ugmented **R**eality**)** creates an effect of digital content interacting with the world by overlaying projected images on top of a pair of see through glasses. **VR (V**irtual **R**eality**)** increases user participation bringing the user into a complete different virtual world. Learning Unit 2: Software ========================= **[Windows Security Screen]:** The Windows Security Screen is accessed by simultaneously pressing **\** + **\** + **\**. A menu appear to lock your PC, Switch users, Sign out, Change a Password and run a Task Manager. 1. **Locking & Unlocking your Computer:** - **Lock Screen --** A security measure used on devices to prevent an unauthorised user from using the device unless they are currently logged on. - This is useful on smartphones to stop accidental commands when it is still in your pocket. Lock Screens can also provide us with quick information without the need to unlock the device. A device can also be locked when a user moves away for a short period. - Instead of signing out and closing all the apps the user is working on, a user can lock the screen when they leave the device and then unlock it when they return ensuring that all the apps remain in the same state as when they left. 2. **Changing your Password:** - To protect your computer, it is important to frequently change your password. - Choose a password that is a combination of **upper case** and **lower-case letters**, **numbers**, **special characters** and **at least eight characters in length**. **[Task Manager]:** **Process --** One of the many parts of an application that is currently executing. The task manager is a program provided by the OS to monitor the system by displaying information about the computer's hardware configuration and the processes and applications running on the device. The task manager can terminate unresponsive processes and applications. The task manager can be opened from the Windows Security Screen. 1. **Processor / CPU:** - The type and speed of the processor are indicated in the top right corner. - In the image, the processor is an Intel i7 with a speed of 2.6 GHz. - The graph shows the real time overall CPU usage is 43%. - Some processors have more than 1 core, each split into 2 logical cores. - This CPU has 6 cores producing 12 logical cores. The usage of each core can be viewed individually. Some cores can be busier than others, depending on the processes that they are executing. - Details of processor cache memory are also included. (See Form 4 work) - 12 MB is the largest and slowest cache which can be on the MoBo or the CPU. 2. **Memory / RAM:** - A real time graph of RAM usage can be viewed. - The total RAM in the computer is shown in the top right corner as 16 GB. - The speed of the RAM is 266 MHz on 2 slots. - The "2 of 2" indicates that both RAM are used with no free slots available. - The slots used, speed and form factor is important information when buying replacing RAM. - The memory panel shows 2 graphs: the top graph shows total memory usage over a 60 second period and the graph below it shows how the memory is currently allocated. 3. **Secondary Storage:** - The type (**S**olid **S**tate **D**rive) and size (1024 GB) of the hard drive is listed in the top right corner. - The top graph displays the hard drive activity over a 60 second period. The bottom graph displays the transfer speeds in MBs per second over a 60 second period. - Disk 0 has 2 drives, "G:" and "C:". The G: drive is synchronised to a cloud-based Google Drive but is stored on the C: drive. The "C:" and "G:" drives are shown in Windows Explorer under This PC. - The D: drive is a second, unused mechanical hard drive installed on this computer. **Disk Optimisation:** - If your mechanical hard drive is slow to respond and slow to load and save files, it may benefit from disk optimisation. When many files are repeatedly loaded, lengthened and saved on a hard drive, the newly added part to the file is placed in the next vacant area on the hard disk, effectively storing the file in fragments across the hard drive. This will increase the time taken to access the fragments. - **Defragmentation --** The process of moving the file fragments so that they are stored together on the hard drive which improves access time. - If your hard drive is an SSD, defragmentation is not needed as an SSD has no moving parts. Instead, a function called TRIM is used to remove data that is no longer in use. - Disk optimisation will detect the type of drive and apply the appropriate mechanism to improve the efficiency of the drive. - The OS is set to weekly analyse the drives. (See pg. 20 for image) If the drive is showing a high level of fragmentation, then Optimize. Optimisation can take a long time to complete. 4. **Processes:** - The Processes tab shows a list of **3 executing categories**: the **Apps** group shows the same list in the Fewer details view, the **Background processes** and **Windows processes** list processes that the user has not specifically loaded. Windows processes include the processes and services that are part of the Windows operating system. - Next to each process, the **CPU**, **Memory**, **Disk** and **Network** usage is displayed as percentages. These values are constantly changing as you use your computer. **Terminate a Process:** Should an application become sluggish, fail to respond, consume a lot of resources, behave unexpectedly or cannot be closed, it should be terminated. Ending a process can result in the loss of unsaved data, thus you should save the data before ending the process but this is not always possible if the app does not respond. Do not end Background or Windows processes as it may negatively affect the computer. Rather close offending apps, reboot the computer or search online how terminating the process affects the PC. **[Windows OS Management]:** 1. **Storage Sense:** Storage Sense is a Windows 10 operating system feature which automatically frees up space on the local hard drive. It deletes unnecessary files like internet files, app temporary files and Recycle Bin contents including the Downloads folder. These settings can be customised. 2. **Regional Settings:** The regional settings of the Microsoft OS will influence how your date/time, numeric and currency data types appear after applying formatting options. Windows provides support for many languages, including currency and date/time formats for the regions that use those languages. 3. **Personalisation:** Windows provides many settings to personalise, secure and customise your computer. 4. **Privacy:** The Windows OS has many controls and options to limit the use of your data. This includes the information you share with Microsoft and access that individual apps have to your location, camera and microphone. **Location:** Location tracking for the device you are using can be turned off. This will affect apps such as Google Maps and any search that is enhanced by using your location. 5. **Connections:** Most desktop computers connect to a network using an Ethernet port. Laptops usually provide both an Ethernet connection and a Wi-Fi connection. Desktop computers can use a USB wireless adaptor which allows the computer to connect to a Wi-Fi network or the circuitry is built onto the motherboard. Provided that your computer is Wi-Fi enabled, you can connect to a Wi-Fi network for internet access. **Wi-Fi:** By selecting the Network icon in the taskbar, it will display the current and available connections. It is advisable to not join open networks that are not secured because they are more likely to download harmful malware onto your computer. **Airplane Mode:** Airplane mode is useful to quickly turn off all wireless communications on your device such as Wi-Fi, cellular data, Bluetooth, GPS and **N**ear **F**ield **C**ommunication **(NFC)**. **Mobile Hotspot:** A computer can be turned into a Wi-Fi hotspot allowing devices to connect to the computer and share the internet connection. **Camera:** Most devices have a built-in webcam or an external webcam which can present a security risk. It is possible that the webcam is being accessed by an unwanted party to monitor your actions. One way to solve this problem is to block access to the camera by apps at the operating system level. Another way is to physically cover the camera when it is not in use. 6. **Update & Security:** **Windows Update:** Windows update is a service provided by Microsoft which fixes bugs, improves security to protect Windows from malware and malicious attacks, updates drivers for popular hardware devices and adds new features to the Windows operating system. **Backup & Recover:** Microsoft has 2 backup tools for Windows users: - **File History --** Backups of data files stored in your libraries to a different storage device like an external hard drive. You can add or exclude folders to be backed up. - **System Image Backup --** Creates a copy of the entire operating system including any applications that may be installed. System Image Backup cannot restore individual files, as it restores the entire image. This copy must be created frequently to have the latest version of your Windows 10. Before starting a backup, you must set up an external source on which to save your image file. The best option is to use removable storage like an external drive or a shared network folder that can be disconnected and stored in a separate safe location. Cloud storage cannot be used as a backup. (See pg. 29 to pg. 31) 7. **Your Phone:** The "Your Phone" app in Windows 10 can share photos, notifications and text messages from your phone to your computer. It can also make and receive calls on your computer without touching your phone. 8. **Accounts:** **Your Accounts:** This option will allow you access to your different accounts and let you customise them. This includes setting Administrator Rights, changing your password and changing your icon picture. To do this you will need to go to the Windows Settings and access the Email & Accounts option. **Email Synchronisation:** Email synchronisation is extremely useful because it allows you to synchronise an email account across multiple devices. This ensures that each device will be updated with any additional emails and any changes you have made in your email account on any device. **[Apps]:** Most apps are installed to a default location with pre-selected options (known as a **typical installation**) for components to be installed. A user can choose to accept these defaults or customise the installation (**custom installation**) to include or exclude certain components. A **full installation** includes all the possible components. 1. **Uninstall:** To remove an app, it must be correctly uninstalled to remove the application, short-cuts and any other leftover files. Most apps that are installed provide their own uninstall feature which is the best way to uninstall because all the related information should be removed. **[Management of Files & Folders]:** Windows provides File Explorer to manage files and folders. File Explorer was done in depth in **Unit 1 of Grade 10**. 1. **File Metadata:** When a file is created in Windows, information about this file is added to the properties of the file. The properties of the file includes the date and time when the file was created, the author of the file and the size of the file. The properties are called metadata. 2. **File Search:** We have often stored many files in a folder making it difficult to find the file in the vast list of files. Windows File Explorer allows you to list the files according to the name of the file, the date the file was created, the type of file and the file size but this not always sufficient. **Search using the Search Bar:** If you know the exact name of the file that you are looking for, then you can type the whole name or part of the name, with or without the extension into the Search Bar which appears in the top right corner of the File Explorer window. **Wild Card Search:** If you are unsure of the full name of the file or the exact extension of the file, then a wildcard can be used. The wildcard is the **\*** character and it allows all files and folders with at least part of the name, to be found. This is useful when you are searching for multiple files with similar names. 3. **File Conversion:** File Conversion is best achieved by the app itself. If you look at the options given to you when saving, for example, a Word Document, one of the criteria's you have is File Type. If you click on the down arrow, you will see all the File Type Options you have for saving the file. **[Application Software]:** 1. **Risks of Using Flawed Software:** Software that is flawed contains errors. These errors can vary from the entire application crashing or the application not producing the expected results. Examples of software errors include: - Incorrect calculations - Allowing incorrect data to be entered - Inadequate software performance - Software that is difficult to use - Inadequate security controls The risk of using flawed software depends on the extent that the individual or business relies on the software to function. If the software is essential then the software failure can stop productivity, frustrate clients, interrupt daily transactions and ultimately lead to financial losses. 2. **Software that Enhances Input:** Almost all programs need data to be entered before it is processed and outputted. Data can be entered using keyboards, scanners and webcams. Data that is entered via a keyboard is the most prone to error. Whilst the use of scanners can eliminate the user's typed input, it is not always possible. At some stage, a user must type the data using a keyboard. The user can use short-cut keys to save time when entering data. To improve speed and accuracy, online typing tools can be used to test a user's keyboarding skills and find areas for improvement. These typing tools allows the user to practise and improve keyboarding skills. 3. **Digital / Virtual Assistants:** A digital or virtual assistant is a program that understands voice commands and can perform electronic tasks for the user. The user can speak the commands and the digital assistant will carry out the task. Virtual assistant can be used to answer questions, control home automation devices, play music and videos and manage tasks such as an email and to-do lists. Today, popular digital assistants are pre-installed on devices, these include Siri, Google Assistant, Cortana and Alexa. **[Artificial Intelligence]:** AI is a branch of science which deals with helping machines find solutions to complex problems in a more human-like manner. This generally involves borrowing characteristics from human intelligence and applying them as algorithms in a computer friendly way. Computers are well suited to performing simple mechanical computations which humans are ill-suited for. With more complex problems, computers are not programmed to understand the context of a situation and to adapt. AI aims to improve machine behaviour in tackling such complex tasks. Most of AI's research is aimed at understanding our human intelligent behaviour. Humans have an interesting approach to problem-solving which is based on abstract thought, high-level deliberative reasoning and pattern recognition. AI can help us understand this process by recreating it, then potentially enabling us to enhance it beyond our current capabilities. Fields of study in AI include weather, space exploration, driverless transport, financial markets, logical games like chess and user interfaces including speech recognition. **Advantages of AI:** - **Increased efficiency --** Computers can make reliable and critical decisions based on past events. - **Reduced human risk --** AI can make real time decisions in dangerous areas. - **Aid in decision making --** Decisions can be quickly made based on a large volume of data and provide a probable outcome. - **Availability --** Computers work 24/7. **Disadvantages of AI:** - **Cause of unemployment --** AI replaces those who are unable to reskill themselves. - **High initial investment --** Implement costs of AI is high. - **Increased dependency on machines --** Computers do not understand human emotions and can cause problems due to the dependency on it. - **Lack of creativity --** A machine will never be as creative as a human. Learning Unit 5: The Internet & WWW =================================== **[Internet Connections]:** When connecting a device to the internet there are a variety of options available. We can connect wirelessly using mobile technologies discussed in **section 5.4 of Learning Unit 5 in Grade 11**, using an outdated ADSL connection or with a fibre optic connection. - **Asymmetric Digital Subscriber Line (ADSL) --** A permanently connected internet access service that uses your telephone line to send and receive internet data at much faster speeds than a conventional dial-up connection. You can make and receive telephone calls while online. Since users mostly receive data than upload data, the download speed is faster than the upload speed. - **Fibre To The Home (FTTH) --** Provides a fibre-cabled connection from a service provider to a home or business provided there are fibre cables laid in the neighbourhood. The user will need a router that can connect their LAN to fibre-cable with a special port for the fibre-cable. The router will provide other Ethernet LAN ports and a Wi-Fi hotspot. Before choosing between mobile technologies such as 3G, LTE, 4G, 5G, satellite or cable technologies such as ADSL or FTTH we need to understand the terms used to describe the features of the connection. 1. **Broadband & Bandwidth:** - **Broadband --** Refers to the high-speed transmission of data, voice and video over long distances. - **Bandwidth --** The maximum amount of data that can be transmitted over an internet connection in a second. It was originally measured in bits per second (bps) but is now measured in megabits per second (Mbps) and gigabits per second (Gbps). - **Internet Speed --** How fast it will take to upload or download data on your computer's connection. The speed of an internet connection can change over time. You can test the internet speed using a device with a web browser connected to the internet. 2. **Data Cap & Data Bundle:** - **Data Caps --** The maximum allowed amount of data in a month for an agreed-upon charge. A user can buy a **data bundle** from the service provider at a set price. Depending on your usage requirements, data bundles may be more cost effective than purchasing data on a pay-as-you-go basis. Most service providers have a variety of data bundle packages available to suit a user's needs. When the user exceeds the limit dictated by their data bundle. They are charged at a higher rate for further data use or the user's transfer rate per second is throttled. 3. **Throttling & Shaping:** You may be fortunate enough to have an uncapped internet connection but this does not always mean you will get the maximum speed that you paid for. Service providers may share the bandwidth between many users, making them more affordable but in effect slower. - **Contention Ratio --** The number of users that share a single connection. - **Throttling --** The intentional slowing or speeding up of an internet connection by the ISP. - **Shaping --** When the restrictions are applied to a certain type of data. Throttling is used to regulate network traffic and minimise bandwidth congestion caused by a high number of users simultaneously connected to the internet during peak times. Throttling can also be applied to a single user if they exceed their data bundle. This reduction can be applied to all types of data. **[Internet Browser Features]:** 1. **Caching:** Web pages can be cached both on the local browser cache and on the proxy cache. The first request to the web page by a user in a network will access the internet and store a copy in the user's browser cache. If someone else in the organisation requests the same web page, the request will be fulfilled by the proxy server without accessing the internet and the web page is sent to the 2^nd^ user's computer where the page is again cached on their local browser cache. **Browser Cache:** Every time a website is accessed a copy of the website is kept on the local hard disk. This cache also stores all the files that you have downloaded from the web. If web pages are accessed from the browser cache, they will load faster than from a remote web server. However, the pages stored in the cache may not be the latest version. You can customise your browser to check for updated pages according to one of several options that are offered. **Web Cache / Proxy Server Cache:** Web cache or proxy server cache stores the recently accessed web pages on a server in a network. If anyone on the network tries to access a site that has been previously accessed, the site will be delivered from the organisation's site, not from the remote web server. The site in the web cache may not be the latest version but it is much quicker and reduces overall network traffic. 2. **Plug-Ins & Browser Extensions:** **Plug-In --** A software module that adds a special feature to an existing computer program to customise the program. Web browsers used to allow executable files as plug-ins, though they are now discouraged. Adobe Flash Player is an example of a plug-in. **Browser Extension --** A small software module that provides customisation for a web browser. Browsers allow many extensions but many browsers comes with unwanted activities such as pop-up ads. Extensions such as Google Chrome's Adaware can be installed in a web browser to block annoying activity, resulting in a faster browsing speed protecting the user from cyber threats. Entire websites can also be blocked using extensions by using the URL of the website or by blocking these URLs with the firewall. **[Internet Searches]:** 1. **Search Engine Optimisation (SEO):** SEO is a combination of strategies to increase the number of visitors to a website by obtaining a high-ranking placement on the **S**earch **E**ngine **P**age **R**esults **(SEPR)**. It explains to search engines that the subject being searched for is best provided by your website. SEO comes in many forms: **On-Site/Page SEO Elements:** On page SEO is a technique used within a website to increase its search engine ranking and to make the page more efficient internally. - **Title Tag --** This an HTML feature, which defines a web page title and gives an overall description of the content. - **Meta Description --** This is an HTML feature that contains a 160-character description of the content of a web page. - **Header Tags --** This gives your content structure and meaning and act as a summary of the content. \\ tags provide section headings. \\ and \\ tags provide subheadings. - **Internal Links --** Provides a user with links to other content on the site, making the site easier to navigate and hence more useful. - **Image Name and ALT Tags --** If you are using pictures on your site, consider appropriate keywords for both the name of the image and the ALT tag. **Off-site Elements:** Off-site elements are external actions that increases the ranking of a website in search engines. - **Links --** Create trust in your website by building relationships with respected people who have great content on their websites and who links their website to yours. - **Social --** Collect likes and shares from social media influencers. The better your content, the more likely it will be shared. **Good Content:** By ensuring that the content on your website is reliable, well written and useful is the easiest way to satisfy users and search engines. Whilst it is important to ensure the website looks god and the content is well structured, it is important that the subject matter is relevant and well written. **[Web-based Applications]:** 1. **Government Services:** As we move into a digital age, the government offers many services online to help users save time. - **Drivers License --** The booking of tests, card renewals and professional driving permits. - **Identity --** Apply for a smart identity card and/or passport. - **Tax --** Submit your tax returns electronically. - **Education --** Check matric results, find a place for tertiary studies or to apply to schools. - **Labour --** Register for available jobs, submit UIF declarations. - **TV --** Pay your SABC TV license online. - **Postal services and Traffic fines --** Renew your post box and pay traffic fines online. 2. **Wikis:** A wiki is a collaborative tool created for people to contribute and modify content to share ideas through simple webpages that are linked together. The pages can be created and edited by all the users of the site. Wikipedia is a popular online encyclopaedia project. 3. **Global Positioning System (GPS):** The GPS is a satellite-based navigation system made up of at least 24 satellites. A GPS works in any weather conditions, anywhere in the world, 24 hours a day, without any subscription fees or setup charges. 4. **Geotagging:** Geotagging or GPS photo tagging is the process of embedding information/metadata about the location to digital media. The information in a geotag may include coordinates, bearings, altitude, distances or even place names. This information can be used by search engines to make connections between the image and the location the image shows or where and when it was taken contributing to the website's SEO. It can also be used to organise your photos stored in the cloud. Geotagged photos can be embedded into maps to show images or websites related to a location. 5. **Location-Based Services (LBS):** Location Based Services are services that use the geographical position of a device to provide contextual information. LBS mostly uses GPS technology to track the user's location, provided the service is enabled. If a GPS does not give an accurate result, the location can be determined using cell towers. The most recognised LBS is Google Maps. LBSs are used in the following way: - **Store Locators --** By using LBSs, customers can quickly find the location of the nearest store. - **Proximity-based Marketing --** Local companies can push adverts to users within a certain area. - **Travel Information --** An LBS can deliver real-time information such as weather reports. - **Roadside Assistance --** Many RA companies provide an app that allows them to track your location. - **Mobile Workforce Management --** For companies that employ people out in the field or at multiple locations, an LBS allows staff to check in at those locations using their mobile devices. - **Fraud Prevention --** An LBS is used by banks where a security system matches a customer's location through their smartphone to a credit card transaction. - **Social Networking --** Users can tag their location on social media and view events that are happening nearby. **[Chatbots]:** A chatbot is a software application that is used to carry out online conversations using text or voice commands. This AI powered software is mostly used by organisation to improve customer service programs. Customers interact with the chatbot to gain insight into their queries. Chatbots are like digital assistants but with a few differences. Digital assistants use natural language processing and AI to make them "learn" from previous commands. Chatbots will not "remember" the conversation if it is broken or interrupted. Chatbots are programmed with a simple set of rules with limited decision making. **[Surface, Deep & Dark Web]:** 1. **Surface Web:** The surface web is the part of the World Wide Web that is indexed by search engines and hence searchable with standard web search engines. 2. **Deep Web:** The deep web is made up of non-indexed pages and hence cannot be accessed by search engines. Deep web content includes anything behind a paywall or requires sign-in credentials or any content that is blocked to indexing by web crawlers. The size of the deep web is estimated to be above 90% of the internet with only a small portion being accessible through a standard browser. The deep web contains unlinked content, limited access content, private content and information archived in searchable databases accessed by a deep web search engine. **Advantages of the Deep Web:** - Increased depth and thoroughness of content - More efficient, retrieves higher quality and more relevant content **Disadvantages of the Deep Web:** - Deep web search engines tend to be slower - The search string must be precise - Can return sensitive personal information - There is a risk of encountering illegal, harmful and criminal activity 3. **Dark Web:** The dark web is a part of the internet that is not indexed by search engines. The dark web is intentionally hidden from search engines, uses masked IP addresses and is accessible only with a special web browser. The dark web is estimated to be about 5% of the total internet and a part of the dark web is a hub for illegal activity. Not all the dark web is used for illicit purposes. **Advantages of the Dark Web:** - Difficult to block it - Helps people to maintain privacy and freely express their views - Can be used to find criminals **Disadvantages of the Dark Web:** - Slow connection - Easy way to commit crimes - Can be used to violate peoples' privacy **[Cryptocurrency]:** Digital currencies can make payments quickly, inexpensively and without unnecessary intermediaries. This new form of money requires an internet supported device to access the funds. There are different types of digital currencies, one being cryptocurrencies that rely on blockchain technology. 1. **Introduction of Blockchain Technology:** Example: A physical arcade token Alice hands the token to Bob, completing the transaction. No party is needed to verify the transaction. If the token is digital then Alice can email Bob a digital arcade token. Alice will still have a copy of the token which she could email to Charlie, effectively "spending" it twice. The answer is to keep track of the digital arcade token in a ledger. The legend will record when Alice gives Bob the digital token. The ledger is entrusted to a 3^rd^ party, which we will call Dave. Dave will hold the ledger and make sure that it is correct. If Alice and Bob cannot trust the 3^rd^ party, they could distribute the ledger to all their friends which decentralises trust. Because the ledger is digital, all copies of the ledger must be synchronised. If most participants agree that the transaction is valid, it will get added into the ledger. When many people have a copy of the same ledger, it becomes more difficult to cheat. 2. **Details of Blockchain Technology:** A blockchain is a decentralised, distributed and public digital ledger to create trust. Blockchains act as a shared database, distributed across peer-to-peer networks with no point of failure. No individual entity can own a blockchain network and no one can change the stored data without the consensus of its peers. New data can be added to a blockchain only if the nodes of the network all agree. If one node changes its local copy, the other nodes can reject it. Cryptocurrencies are a type of digital currencies that uses blockchain technology making it almost impossible to counterfeit or double-spend. This technology is popular because of its security. There are still incidents of fraud but these incidences have made investors very cautious. Governments worldwide have criticised the currencies because of their lack of control over the currencies. It is crucial to avoid the confusing the dark web with the cryptocurrencies often used to make purchases there. It is true that cryptocurrencies are often used for transactions on the dark web but one does not have to use the dark web to use cryptocurrencies. Learning Unit 7: Social Implications ==================================== **[Impact on Society]:** The impact of computers on society has been discussed in various measures in **Learning Unit 10 of** **Grade 10** and in **Learning Unit 8 of Grade 11**. Refer to these sections in conjunction with the following topics. 1. **Distributed Computing Projects:** **Distributed Computing --** The technique of using the unused power of networked computers. In utilising the idle CPU time of networked computers, the server can complete computations that would be impossible to process on a single computer. Users can volunteer for their computers to form part of a project by installing the relevant software on their computers. By spreading the task between many computers, no single computer will spend a lot of time on computation and no expensive supercomputer is required. 2. **Information Overload:** Information overload is caused by the excessive quantity of information available today. It leads to difficulties in understanding an issue leading to ineffective decision making. Users must manage the volume of information they receive. **How to Avoid Information Overload** --------------------------------------- -------------------------- Unplug Clear your mind Manage your information Set limits Get everyone involved Prepare for the next day Keep it simple 3. **Social Networking Techniques:** Social networking allows users to collaborate, communicate and connect with other others. The websites allow users to develop profiles describing their interests, achievements and personal history. Users can upload personal resources and connect with multiple networks via the internet. Refer to the types of social media in **section 6.1.5, Learning Unit 6 in Grade 11**. **Digital Footprint:** **Digital Footprint --** A trail of data created while using the internet both intentionally and unintentionally. - **Passive Digital Footprint --** This is your unintentional online data trail. For example, a more personal is your search history, which is saved by some search engines while you are logged in. - **Active Digital Footprint --** This includes data intentionally submitted online. For example, sending an email and the more emails you send, the more your footprint grows. All activity such as posting and liking quickly expands your digital footprint. The more you interact with social media websites, the larger your digital footprint will be. **Crowdfunding:** - **Crowdfunding --** Using the internet to raise money for a project by raising small amounts of money from many people. To create a successful crowdfunding campaign, the user must convince many people that their project is worthwhile. In the case of donations, the contributor will not receive anything in return, whilst in new business ventures investors may receive a return on their investment if the business is successful. With regards to loans, the money donated is expected to be repaid with interest. **Virtual Communities:** - **Virtual Community --** An online group of individuals who shares interests, fears and personal opinions usually through social media platforms. Members of a virtual community can interact with other people across the world who have different ethnic, racial sexual, religious and political backgrounds. **[Computer Crime]:** Computer crime has been discussed in **Learning Unit 10 of Grade 10** and **Learning Unit 8 of Grade 11**. The following is an extension to these sections. 1. **Theft:** **Hardware Theft:** Theft of either the software or data or the hardware is a huge concern to the security of a computer or network. If the hardware is stolen, the software goes with it. The hardware and applications may be replaced at considerable cost and should be insured. If the data is stored remotely or is regularly backed up it can be easily replaced. If the data is confidential, it should be encrypted. **Software Theft:** Software theft means the unauthorised or illegal copying, sharing or usage of copyright-protected software programs. Software theft can be carried out by anyone who then distributes the unauthorised software copies to users. Software theft is committed when someone: - Steals software media - Deliberately erases programs - Illegally copies or distributes a program - Registers or activates a software program illegally **Information/Data Theft:** Data theft is when digital information stored on electronic devices is copied from a victim to compromise their privacy or to obtain confidential information. This information can be used for identity theft, to drain a bank account or to blackmail a user. **Theft of Time & Services:** - **Theft of Time --** When an employee accepts payment for work not done or the time that they should have spent doing work related tasks. - **Theft of Service --** When a person intentionally uses a service without paying for the service. **Bandwidth Theft:** Stealing wireless bandwidth is connecting to the internet through a wireless internet router which does not belong to you or you do not have permission to use. People who pay for their wireless service expect it to function optimally but suffer from slower performance or intermittent disconnection due to bandwidth theft. In more malicious cases, it can be used to gain access to the owner's computer and commit identity theft. Because it is so easy to do and because Wi-Fi is so common, bandwidth theft happens often and is rarely even punished. 2. **Fraud Scams:** Internet fraud uses online services to take advantage of people or trick them into giving away their personal and financial information. This information is often obtained using social engineering techniques described in section **8.3.1, Learning Unit 8 of Grade 11**. Examples of internet scams include: - **Phishing Email Scams --** Cyber criminals send emails to users to attempt to trick them into providing them with valuable and sensitive information. The messages seems legitimate but then users are redirected to a fake login page that resembles the real website. - **Nigerian 419 Scams --** This scam involves an emotional message from a scammer requesting help in retrieving a sum of money from some institution. Usually, a smaller amount is required to release these funds whereby a % of the larger sum is promised. Once hooked, the user is required to pay more and more money with the user never receiving any of the promised funds. - **Greeting Card Scams --** Scammers send birthday or holiday messages to users so that when the user opens the email and views the card, malware is installed on the user's device. This malware takes the form of annoying pop-ups, joins the device to a botnet or ransomware. - **Bank Loan or Credit Card Scam --** Any bank offers that guarantees loans of large amounts of money that have been pre-approved by the bank, generally are too good to be true. Many people have lost money by paying the "mandatory" processing fees required by scammers. 3. **Crime using Deep & Dark Web:** Cyber criminals often choose to use the dark web to facilitate malicious activities because of all the illegal marketplaces and forums on the dark web where criminal activities are advertised. It is not illegal to browse the dark web but it is illegal to trade on it regarding illegal subjects. Cyber-attack services include access to botnets capable of **D**istributed **D**enial **o**f **S**ervice **(DDoS)** to temporarily disable websites. Exploring the dark web can be dangerous. Think twice before clicking any returned search links since there is no ruling authority to regulate the dark web. The result of the search could return links to illegal activities. Exploring a search engine's results may leave you vulnerable to nefarious characters and sites designed to spread malware or hack your computer. Since the dark web differs from the visible web, it is important to take extra security precautions to protect your computer and any other computers on your network. **Pornography:** There is a misconception that pornographic films are legal in South Africa, which is not completely true. In 2006, websites hosting sexually explicit content were banned by the Government and were punishable under the Film and Publications Act 1996. In 2007 a "sex blogger" was the first to be arrested and charged under this offence. Any online pornography where the source is a South African server is illegal whilst pornographic films and photographs originating from different countries are entirely legal. It is also illegal for any person under the age of 18 to participate in or view a pornographic film. 4. **Cryptocurrencies in Crime:** Digital currencies are a frequent target of criminals who use techniques such a phishing, scamming and hacking. Crypto also provides opportunities for criminals to hide behind the privacy and anonymity. **[Online Authentication]:** 1. **Multi-Step Verification:** This is when there is more than 1 stage involved in ensuring a user is authentic to improve a system's security. If a hacker steals your password in single-step authentication, they have complete access to the user's resources. In multi-step verification, a 2^nd^ or even 3^rd^ form of authentication is required. This could include biometric authentication, a one-time pin or answers to predetermined questions. Learning Unit 16: Information Management ======================================== If you were asked to write a set of instructions for a computer, it would be divided up into 3 main parts. These parts are: - **INPUT** - **PROCESSING** - **OUTPUT** Raw data is input and processed into output in the form of information. This concept was introduced in **Learning Unit 12 in Grade 10**. **[Simple Input Processing Output (IPO) Examples]:** 1. **Example 1: ATMs to Withdraw Cash** We insert our bank card **(INPUT)** and enter our **P**ersonal **I**dentification **N**umber **(PIN) (INPUT)**. We then select the account and the amount to withdraw **(INPUT)** and the ATM then checks to see that enough funds are available **(PROCESSING)**. If available, the **A**utomatic **T**eller **M**achine **(ATM)** dispenses the money and the transaction slip **(OUTPUT)**. 2. **Example 2: Microwave Ovens** We select the power and time settings **(INPUT)**, open the door and insert the food **(INPUT)**. We click the Start button **(INPUT)**. The oven then microwaves food at the selected power settings and for the specified time **(PROCESSING)**. When the process is complete, we remove the cooked food **(OUTPUT)**. 3. **Example 3: Air Conditioner** We select the mode of cooling or heating and the temperature required **(INPUT)**. The unit checks to see what the current temperature is **(INPUT)** and adjusts **(PROCESSING)** the cooling/heating **(OUTPUT)** by comparing the required temperature with the room's temperature. 4. **Example 4: Spreadsheet Application** We enter values in cells A1 and B1 **(INPUT)** and the formula "=A1+B1" in cell C1 **(INPUT)** and press \. The calculation is performed **(PROCESSING)** and the result is displayed in cell C1 **(OUTPUT)**. 5. **Example 5: Calculator** We enter a number, add an operation key and enter a second number **(INPUT)**. We then press the equal button **(PROCESSING)** and the answer is displayed on the screen **(OUTPUT)**. **[Extending the IPO Model]:** The IPO model can be extended to include storage space. A problem can be analysed to describe how the data will be permanently stored. This could be a text file, a spreadsheet or a database on the local computer, computer network or in the cloud. 1. **Example 1: Student Enrolment** When students apply to a college or university, they fill in an admission form. This form contains the raw facts about the student. The data is entered into a computer database **(INPUT)** and permanently stored **(STORAGE)**. There are many processes that can be undertaken with this data, to name a few: select all the students are applying for the first year of study; select all students who have an average of above 80% and select all students who wish to reside in residence **(PROCESSING)**. The results are stored for further use **(STORAGE)**, displayed on a monitor and emailed to the applicant **(OUTPUT)**. 2. **Example 2: Census Data of a Country's Citizens** All citizens of a country must be counted on a regular basis. In South Africa, this is done once every 10 years. Each citizen fills in a form with their particulars **(INPUT)** and then this data is compiled and manipulated **(PROCESSING)** to get information such as total population. This information can be stored **(STORAGE)** and displayed on a monitor or printer **(OUTPUT)** or can be further manipulated. **[Analysing more Advanced Examples (page 324 -- page 327)]** **[Selecting the Appropriate Software Package]:** +-----------------------+-----------------------+-----------------------+ | **Generic Software | **Brand Name | **Uses** | | Application** | Application | | | | Examples** | | +=======================+=======================+=======================+ | **Word Processor** | MS Word, | Word processing, | | | | document design and | | | Apple Pages | layout, writing | | | | documents, memos, | | | | creating electronic | | | | forms and reports, | | | | Curriculum Vitae (CV) | | | | and letters. Some | | | | basic calculations | | | | and data manipulation | | | | can be done. | +-----------------------+-----------------------+-----------------------+ | **Spreadsheet** | MS Excel, | Advanced data | | | | calculations, data | | | Apple Number | extraction and | | | | information displays, | | | | creating budgets, | | | | graphs and | | | | summarising data in | | | | pivot tables. Limited | | | | data layout and data | | | | manipulations can be | | | | done. | +-----------------------+-----------------------+-----------------------+ | **Database** | MS Access, FileMaker | Advanced data | | | | manipulations , | | | | information | | | | extraction and | | | | calculations can be | | | | performed. Data can | | | | be summarised in | | | | cross tab queries and | | | | can be entered in | | | | customised forms with | | | | data validations. | | | | Reports can be | | | | generated with | | | | calculations and | | | | groupings. | +-----------------------+-----------------------+-----------------------+ | **E-mail Program** | MS Outlook, iCloud | Receiving, sending, | | | Mail | storing and working | | | | with emails. | +-----------------------+-----------------------+-----------------------+ | **Presentations** | MS PowerPoint, Apple | Used to display data | | | Keynote | and information, | | | | usually in the form | | | | of a slide show for | | | | presentation | | | | purposes. | +-----------------------+-----------------------+-----------------------+ This table lists the most common applications software most users will need and that will be required to produce a suitable solution to a PAT. There are, however, more advanced software applications for use in specialised and specific circumstances. 1. **Using a Spreadsheet & Database for Data Analysis:** - Spreadsheets are a valuable tool for organising groups of data in a logical manner. - When the volume of data becomes too large or too complex, a database is more suitable. - Spreadsheets can be used to organise data into tables, display information in graphs, sort by different levels or groupings which makes the data easier to interpret. - Spreadsheets can be used to organise a variety of data types such as numeric, text and dates. Databases can include other types of data such as images and documents. - Spreadsheet data can be accessed by filtering and sorting; however, databases can access data by matching complex criteria across many tables. - If a spreadsheet has many worksheets, it is difficult to compare and analyse the data across multiple sheets. A database can easily compare and analyse data stored in multiple tables. - Data redundancy is removed in a correctly normalised database so that anomalies do not occur. - Data integrity can be ensured in a database using a referential integrity which is a set of rules to keep the data consistent and prevent data entry or deletion roles. - A database can be set up to display data based on a user's role in an organisation. A spreadsheet displays all data to all users making it difficult to find information and less secure. - Both a spreadsheet and a database can summarise data using calculations, pivot tables (spreadsheets) and cross tab queries (database). 2. **Presenting your Information & Research:** Once your PAT has been completed, the results and conclusion should be presented using a presentations package such as PowerPoint covered in **Learning Unit 11 in Grade 10**.