ICT

1. Introduction to ICT

Key Concepts

  • Data vs Information

    • Data: Raw facts

    • Information: Processed, meaningful data

    • ICT Devices: Computers, smartphones, routers, servers, projectors

  • Importance of ICT: Communication, education, business, entertainment, research


2. Computer Hardware

Hardware Categories

  1. Input Devices โ€“ Keyboard, mouse, scanner, microphone

  2. Output Devices โ€“ Monitor, printer, speakers

    ICT (Information and Communication Technology) refers to technologies that provide access to information through telecommunications.
    It includes computers, the internet, networking, digital communication tools, and electronic services.

  3. Processing Devices โ€“ CPU, GPU

  4. Storage Devices โ€“ HDD, SSD, USB, cloud storage

  5. Peripheral Devices โ€“ Webcam, external drive

Computer System Components

  • CPU (brains of the computer)

    • ALU, Control Unit, Registers

  • RAM vs ROM

    • RAM: Temporary, volatile

    • ROM: Permanent, non-volatile


3. Software

Types of Software

  1. System software โ€“ Operating systems (Windows, macOS, Linux), device drivers

  2. Application software โ€“ MS Office, browsers, games

  3. Utility software โ€“ Antivirus, file compression, disk cleanup

Operating System Functions

  • File management

  • Device control

  • Memory management

  • Multitasking

  • User interface


4. Networking & Internet

Basic Networking Concepts

  • Network Types

    • LAN, WAN, MAN, PAN

  • Network Devices

    • Router, switch, modem, hub

  • Network Topologies

    • Bus, star, ring, mesh

Internet Concepts

  • IP Address

  • Domain Name

  • DNS

  • Bandwidth

  • Cloud computing

  • Cybersecurity basics


5. ICT in Everyday Life

Applications

  • Education โ€“ e-learning, virtual classrooms

  • Business โ€“ e-commerce, digital payments, CRM software

  • Health โ€“ Telemedicine, digital records

  • Government โ€“ e-governance, digital ID systems

  • Communication โ€“ Social media, email, instant messaging


6. Cybersecurity

Common Threats

  • Malware (virus, worm, Trojan)

  • Phishing

  • Hacking

  • Ransomware

  • Identity theft

Protection Methods

  • Strong passwords

  • Two-factor authentication

  • Regular updates

  • Backups

  • Antivirus software

  • Safe browsing habits


7. Digital Ethics & Safety

  • Digital footprint

  • Copyright and plagiarism

  • Online etiquette

  • Data privacy

  • Responsible social media use


8. Productivity Tools

Examples:

  • Word processors โ€“ MS Word

  • Spreadsheets โ€“ Excel

  • Presentation software โ€“ PowerPoint

  • Collaboration tools โ€“ Google Workspace, Teams

  • Databases โ€“ Access, MySQL


9. Basic Troubleshooting

  • Restart device

  • Check cables and connections

  • Verify network settings

  • Update software

  • Run antivirus scan

  • Use Task Manager / Activity Monitor


10. Key Terms to Review

  • Algorithm

  • Firewall

  • Cache

  • Encryption

  • HTML/CSS

  • Cloud storage

  • ISP

  • Operating system


If you want, I can also make:
โœ… A condensed revision sheet
โœ… Flashcards
โœ… Practice quiz
โœ… A printable PDF version
Just tell me, BOLOM!