1. Information Technology (IT) and Information and Communication Technology (ICT)
1.1. Information Technology (IT)
• Definition: IT refers to the use of computers, storage, networking devices, and other physical devices, infrastructure, and processes to create, process, store, secure, and exchange all forms of electronic data.
• Examples:
○ Data storage systems
○ Computer networks
○ Software applications
1.2. Information and Communication Technology (ICT)
• Definition: ICT encompasses all technologies that provide access to information through telecommunications. It focuses on communication technologies including the internet, wireless networks, cell phones, and other communication mediums.
• is the combination of computer-based technologies (such as computing devices and smartphones) with communication technologies
• Examples:
○ Internet services (e.g., email, VoIP)
○ Social media platforms
○ Mobile communication technologies
Importance:
• Enhances efficiency and productivity in various sectors such as education, healthcare, and business.
• Facilitates global connectivity and information sharing.
Advantages:
• Improved Communication: Instant communication across the globe.
• Access to Information: Vast resources available online for learning and research.
• Automation: Streamlines processes and reduces human error.
Disadvantages:
• Digital Divide: Not everyone has equal access to technology.
• Privacy Concerns: Risk of data breaches and misuse of personal information.
• Dependence: Overreliance on technology can lead to reduced human interaction and skills.
2. Digital Divide and Digital Citizenship
2.1. Digital Divide
• Definition: The gap between individuals, households, businesses, and geographic areas at different socio-economic levels regarding access to information and communication technologies.
Causes:
• Economic disparities
• Geographic location (urban vs. rural)
• Educational differences
• Age and disability factors
Implications:
• Limits opportunities for education and employment.
• Hinders access to vital information and services.
Bridging the Gap:
• Government initiatives to provide affordable internet access.
• Educational programs to improve digital literacy.
• Investment in infrastructure in underserved areas.
2.2. Digital Citizenship
• Definition: The responsible and appropriate use of technology and the internet by individuals.
Key Principles:
• Digital Literacy: Understanding how to use digital technologies effectively.
• Online Etiquette: Respectful and appropriate behavior online.
• Security Awareness: Protecting personal information and understanding online risks.
• Legal Understanding: Awareness of laws related to digital content and conduct.
Importance:
• Ensures safe and respectful online environments.
• Promotes responsible use of technology.
• Protects individuals from cyber threats and legal issues.
3. Computing Devices
3.1. Types of Computing Devices
• Desktop Computers: Traditional personal computers designed for regular use at a single location.
• Laptops: Portable computers that integrate all components into a single unit.
• Tablets: Portable touch-screen devices without a physical keyboard.
• Smartphones: Handheld devices combining mobile phone capabilities with advanced computing features.
• Servers: Powerful computers that provide services and manage network resources.
• Embedded Systems: Specialized computing systems integrated into larger devices (e.g., microwave ovens, cars).
Advantages and Use Cases:
• Desktops: High performance and upgradeability; suitable for intensive tasks like gaming and graphic design.
• Laptops: Portability; ideal for students and professionals on the move.
• Tablets: Lightweight and user-friendly; good for media consumption and casual use.
• Smartphones: Highly portable and multifunctional; essential for communication and quick access to information.
• Servers: Critical for businesses; manage data, applications, and network services.
• Embedded Systems: Enhance functionality and efficiency of everyday appliances.
4. Smartphone Sensors and Mobile Device Terminology
4.1. Smartphone Sensors
• Accelerometer: Detects orientation and movement; used for screen rotation and fitness tracking.
• Gyroscope: Measures rotation; improves motion detection for gaming and augmented reality.
• Proximity Sensor: Detects objects close to the screen; turns off display during calls to save battery.
• Ambient Light Sensor: Adjusts screen brightness based on surrounding light conditions.
• GPS Sensor: Provides location data for navigation and location-based services.
• Fingerprint Sensor: Enhances security through biometric authentication.
• Barometer: Measures atmospheric pressure; aids in improving GPS accuracy and weather forecasting.
Advantages:
• Enhanced User Experience: Provides intuitive and responsive interactions.
• Improved Functionality: Enables advanced features like health monitoring and secure payments.
4.2. Mobile Device Terminology
• Resolution: Number of pixels displayed on the screen; higher resolution means sharper images.
• Battery Capacity: Measured in milliampere-hours (mAh); indicates how long a device can operate before recharging.
• Processor (CPU): The brain of the device; handles all instructions and operations.
• RAM: Temporary memory that stores data for running applications; more RAM allows smoother multitasking.
• Storage: Internal space for saving files and applications; can be expandable via SD cards.
• Operating System (OS): Software that manages hardware and software resources; examples include Android and iOS.
5. Modular Design
5.1. Definition
• Modular Design: An approach where a system is divided into smaller parts (modules) that can be independently created, modified, replaced, or exchanged between different systems.
Applications:
• Computers: Components like RAM, storage drives, and GPUs can be upgraded or replaced without changing the entire system.
• Smartphones: Some models allow swapping out batteries or adding modules for enhanced camera or audio capabilities.
Advantages:
• Flexibility: Easy to upgrade and customize according to user needs.
• Cost-Effective: Replacing individual modules is cheaper than buying a new device.
• Ease of Repair: Damaged modules can be replaced without extensive repairs.
Disadvantages:
• Complexity: May lead to more complex designs and potential compatibility issues.
• Bulkiness: Modular components can add size and weight to devices.
• Market Adoption: Limited support and availability of modular components in the market.
6. The Motherboard
6.1. Definition
• Motherboard: The main printed circuit board (PCB) in a computer that connects and allows communication between various components such as the CPU, RAM, storage devices, and peripherals.
6.2. Key Components
• CPU Socket: Where the processor is installed.
• RAM Slots: Hold memory modules.
• Expansion Slots: Allow additional cards (e.g., graphics, sound cards) to be connected.
• Chipset: Manages data flow between components.
• Power Connectors: Supply power to the motherboard and connected components.
• BIOS/UEFI Chip: Stores firmware that initializes hardware during boot-up.
• I/O Ports: Connect external devices (e.g., USB, HDMI, Ethernet).
Types of Motherboards:
• ATX: Standard size for desktops; offers multiple expansion slots.
• Micro-ATX: Smaller than ATX; fewer expansion slots but more compact.
• Mini-ITX: Very small form factor; used in compact and portable systems.
Importance:
• Serves as the backbone of the computer, integrating all components and ensuring they work together seamlessly.
Considerations When Choosing a Motherboard:
• Compatibility: Must support chosen CPU, RAM type, and other components.
• Expansion Options: Sufficient slots and ports for current and future needs.
• Form Factor: Size should match the computer case and intended use.
7. Storage
7.1. Types of Storage Devices
• Hard Disk Drive (HDD):
○ Description: Uses magnetic storage to store and retrieve digital information.
○ Advantages:
§ High storage capacities at a lower cost.
§ Suitable for large amounts of data storage.
○ Disadvantages:
§ Slower read/write speeds compared to SSDs.
§ More susceptible to physical damage due to moving parts.
• Solid State Drive (SSD):
○ Description: Uses flash memory to store data; no moving parts.
○ Advantages:
§ Faster data access and boot times.
§ More durable and energy-efficient.
○ Disadvantages:
§ Higher cost per gigabyte than HDDs.
§ Limited write cycles over the device's lifespan.
• Hybrid Drive (SSHD):
○ Description: Combines HDD and SSD technologies; stores frequently accessed data on SSD portion.
○ Advantages:
§ Balances cost and performance.
§ Improved speed over traditional HDDs.
○ Disadvantages:
§ Performance not as high as pure SSDs.
§ More complex technology can mean higher failure rates.
• External Drives:
○ Description: Portable storage devices connected via USB or other interfaces.
○ Advantages:
§ Easy data transfer between systems.
§ Provides additional storage without internal installation.
○ Disadvantages:
§ Potential for data loss if damaged or lost.
§ Slower access speeds compared to internal drives.
• Cloud Storage:
○ Description: Stores data on remote servers accessed via the internet.
○ Advantages:
§ Access data from anywhere with internet connection.
§ Automatic backups and scalability.
○ Disadvantages:
§ Dependent on internet connectivity.
§ Concerns over data security and privacy.
7.2. Storage Measurements
• Bytes: Basic unit of digital information.
• Kilobyte (KB): 1,024 bytes.
• Megabyte (MB): 1,024 KB.
• Gigabyte (GB): 1,024 MB.
• Terabyte (TB): 1,024 GB.
Factors to Consider When Choosing Storage:
• Capacity Needs: Amount of data you need to store.
• Speed Requirements: How quickly you need to access data.
• Budget: Cost considerations for storage solutions.
• Reliability: Importance of data integrity and backup solutions.
8. USB Ports
8.1. Definition
• Universal Serial Bus (USB): A standard interface that allows communication between devices and a host controller, such as a personal computer.
8.2. Types of USB Ports
• USB Type-A: Standard rectangular connector found on most computers.
• USB Type-B: Square-shaped connector used for printers and other peripherals.
• USB Type-C: Reversible connector supporting higher data transfer rates and power delivery.
• Micro USB: Smaller connector used for mobile devices and accessories.
8.3. USB Standards
• USB 2.0:
○ Speed: Up to 480 Mbps.
○ Usage: Common for keyboards, mice, and flash drives.
• USB 3.0 and 3.1:
○ Speed: Up to 5 Gbps (3.0) and 10 Gbps (3.1).
○ Usage: External hard drives, high-speed peripherals.
• USB 3.2 and USB4:
○ Speed: Up to 20 Gbps (3.2) and 40 Gbps (USB4).
○ Usage: High-performance devices, displays, and external GPUs.
Advantages:
• Versatility: Supports a wide range of devices.
• Hot Swapping: Devices can be connected and disconnected without rebooting.
• Power Delivery: Can provide power to charge and operate devices.
Disadvantages:
• Bandwidth Limitations: Older standards have slower data transfer rates.
• Physical Durability: Frequent plugging/unplugging can wear out ports.
• Security Risks: Potential for malware transfer via USB devices.
9. Random Access Memory (RAM)
9.1. Definition
• RAM: A type of volatile memory that stores data and machine code currently being used. It allows data to be read and written quickly in any order.
9.2. Types of RAM
• DRAM (Dynamic RAM): Needs to be refreshed thousands of times per second.
• SRAM (Static RAM): Faster and more reliable but more expensive; used for cache memory.
• DDR SDRAM (Double Data Rate Synchronous DRAM):
○ DDR3, DDR4, DDR5: Successive generations offering increased speed and efficiency.
9.3. Importance of RAM
• Performance: More RAM allows a computer to handle more tasks simultaneously and run complex applications smoothly.
• Multitasking: Enables efficient switching between multiple applications.
• Speed: Faster RAM improves overall system responsiveness.
Factors Affecting RAM Performance:
• Capacity: Measured in GB; determines how much data can be stored temporarily.
• Speed: Measured in MHz; higher speeds allow faster data transfer.
• Latency: Lower latency results in quicker access times.
Advantages:
• Speed: Provides quick access to data for active processes.
• Flexibility: Easy to upgrade by adding more modules.
Disadvantages:
• Volatility: Data is lost when power is turned off.
• Cost: High-capacity, high-speed RAM can be expensive.
10. Read-Only Memory (ROM), BIOS Chip, CMOS, and Firmware
10.1. Read-Only Memory (ROM)
• Definition: Non-volatile memory that permanently stores data; cannot be easily altered or reprogrammed.
Functions:
• Stores essential instructions for booting up the computer.
• Contains firmware for hardware devices.
Advantages:
• Stability: Data remains intact without power.
• Security: Prevents accidental or malicious modification of essential data.
Disadvantages:
• Inflexibility: Difficult to update or change stored data.
10.2. BIOS (Basic Input/Output System) Chip
• Definition: Firmware stored on a ROM chip on the motherboard that initializes and tests hardware during the booting process.
Functions:
• Performs POST (Power-On Self-Test) to ensure hardware components are functioning.
• Provides a runtime environment for the OS.
• Manages data flow between OS and attached devices.
Advantages:
• Reliability: Ensures system stability during startup.
• User Configuration: Allows users to change system settings via BIOS setup utility.
Disadvantages:
• Legacy Limitations: Older BIOS versions have limitations in hardware support and interface.
10.3. CMOS (Complementary Metal-Oxide-Semiconductor)
• Definition: A small amount of memory powered by a battery that stores BIOS settings.
Functions:
• Retains system time, date, and hardware configuration settings.
Advantages:
• Low Power Consumption: Battery ensures settings are maintained without power.
Disadvantages:
• Battery Dependency: CMOS battery failure can lead to loss of settings.
10.4. Firmware
• Definition: Software programmed into hardware devices, providing low-level control for the device's specific hardware.
Functions:
• Manages basic operations and provides control over hardware functions.
Advantages:
• Efficiency: Tailored specifically for the hardware, ensuring optimal performance.
• Stability: Less prone to bugs and errors compared to higher-level software.
Disadvantages:
• Update Complexity: Firmware updates can be risky and may render hardware unusable if done incorrectly.
11. Central Processing Unit (CPU)
11.1. Definition
• CPU: The primary component of a computer that performs most of the processing operations; considered the brain of the computer.
11.2. Components of CPU
• Control Unit (CU): Directs operation of the processor; tells the computer's memory, ALU, and input/output devices how to respond to program instructions.
• Arithmetic Logic Unit (ALU): Performs arithmetic and logical operations.
• Registers: Small, fast storage locations that temporarily hold data and instructions.
11.3. CPU Performance Factors
• Clock Speed: Measured in GHz; higher speeds mean more instructions processed per second.
• Cores: Multiple cores allow parallel processing; improves multitasking and performance.
• Threading: Ability to handle multiple threads per core; enhances performance in multithreaded applications.
• Cache Memory: Small, fast memory inside the CPU; stores frequently accessed data for quick retrieval.
CPU Brands and Examples:
• Intel: Core i3, i5, i7, i9 series.
• AMD: Ryzen 3, 5, 7, 9 series.
Advantages of Powerful CPUs:
• Speed: Faster processing of tasks and applications.
• Efficiency: Handles complex and resource-intensive applications smoothly.
• Multitasking: Supports running multiple applications simultaneously without lag.
Disadvantages:
• Cost: High-performance CPUs can be expensive.
• Power Consumption and Heat: May require better cooling solutions and consume more power.
12. Cache Memory and Caching
12.1. Cache Memory
• Definition: A small-sized, high-speed memory located inside or close to the CPU that stores copies of frequently used data from main memory (RAM).
12.2. Levels of Cache
• Level 1 (L1): Smallest and fastest; integrated within the CPU core.
• Level 2 (L2): Larger than L1; slightly slower but still faster than main memory.
• Level 3 (L3): Shared among CPU cores; larger and slower than L2 but faster than RAM.
12.3. Caching Mechanism
• Function: Reduces the time to access data from the main memory by storing frequently accessed data in cache.
Advantages:
• Improved Performance: Speeds up data retrieval and processing.
• Efficiency: Reduces workload on main memory, improving overall system responsiveness.
Disadvantages:
• Cost: Cache memory is more expensive per byte than RAM.
• Complexity: Managing cache coherency and consistency adds complexity to system design.
13. GPU, Graphics Cards, and VRAM
13.1. Graphics Processing Unit (GPU)
• Definition: A specialized processor designed to accelerate graphics rendering and perform parallel processing tasks.
Types:
• Integrated GPU: Built into the CPU; suitable for basic graphics tasks.
• Dedicated GPU: Separate graphics card; provides higher performance for gaming, video editing, and 3D rendering.
13.2. Graphics Cards
• Components:
○ GPU: Core processor handling graphics computations.
○ VRAM (Video RAM): Dedicated memory for storing image data.
○ Cooling System: Keeps the GPU temperature within safe limits.
○ Output Ports: Connects to display devices (e.g., HDMI, DisplayPort).
Advantages of Dedicated Graphics Cards:
• Performance: Handles complex and high-resolution graphics smoothly.
• Offloads CPU: Frees up CPU resources by handling graphics processing independently.
• Enhanced Visuals: Supports advanced visual effects and higher frame rates.
Disadvantages:
• Cost: High-end graphics cards can be expensive.
• Power Consumption: Uses more power and generates more heat.
• Size: May require larger computer cases and adequate cooling.
13.3. VRAM (Video RAM)
• Definition: Specialized memory used by the GPU to store image data and textures for rapid access during rendering.
Importance:
• Performance: More VRAM allows for higher-resolution textures and smoother graphics performance.
• Multitasking: Supports multiple monitors and complex graphical applications simultaneously.
Types:
• GDDR5, GDDR6: Common types with varying speeds and bandwidths.
14. Expansion Cards and Motherboard Slots
14.1. Expansion Cards
• Definition: Circuit boards inserted into expansion slots on the motherboard to add or enhance functionalities.
Common Types:
• Graphics Cards: Enhance visual processing capabilities.
• Sound Cards: Improve audio output quality.
• Network Interface Cards (NIC): Provide network connectivity.
• TV Tuner Cards: Allow reception of television signals.
• USB Expansion Cards: Add additional USB ports.
14.2. Motherboard Slots
• PCI (Peripheral Component Interconnect): Older standard for connecting expansion cards.
• PCI Express (PCIe): Current standard offering faster data transfer rates; comes in different sizes (x1, x4, x8, x16).
Advantages:
• Customization: Allows users to tailor systems to specific needs.
• Upgradeability: Easy to add new features without replacing the entire system.
Disadvantages:
• Compatibility: Must ensure expansion cards are compatible with motherboard slots.
• Resource Usage: Additional cards consume power and can generate heat.
15. Data Transfer, Buses, and Point-to-Point Connectors
15.1. Data Transfer
• Definition: The movement of data between computer components or systems.
Key Concepts:
• Bandwidth: The amount of data that can be transferred in a given time.
• Latency: The delay between data request and data transfer.
15.2. Buses
• Definition: Communication systems that transfer data between components inside a computer.
Types of Buses:
• Data Bus: Carries actual data.
• Address Bus: Carries information about where data should go.
• Control Bus: Carries control signals coordinating various activities.
Common Bus Systems:
• Front-Side Bus (FSB): Connects CPU to main memory.
• PCIe Bus: Connects expansion cards with high-speed data transfer.
Advantages:
• Efficiency: Facilitates organized and efficient data flow within the system.
Disadvantages:
• Bottlenecks: Limited bandwidth can slow down system performance.
15.3. Point-to-Point Connectors
• Definition: Direct connections between two components, allowing dedicated communication paths.
Examples:
• Direct Media Interface (DMI): Connects CPU and chipset in Intel systems.
• HyperTransport: Used in AMD systems for connecting CPU and other components.
Advantages:
• High Speed: Dedicated paths reduce congestion and increase data transfer rates.
• Low Latency: Direct connections minimize delays.
Disadvantages:
• Complexity: Increased number of connections can complicate system design.
16. Factors Influencing Performance of a Computer
16.1. Key Factors
• Storage Type and Capacity: SSDs offer faster access times than HDDs; sufficient capacity ensures smooth operation.
• RAM Size and Speed: More and faster RAM enables better multitasking and application performance.
• CPU Specifications: Higher clock speeds, more cores, and larger cache improve processing capabilities.
• Cache Memory: Larger and faster cache reduces data access times.
• GPU and VRAM: Powerful GPUs and ample VRAM enhance graphics performance.
• Buses and Connectors: High-speed buses and efficient connectors facilitate rapid data transfer.
• Network Interface Card (NIC): Determines the speed and reliability of network connections.
Optimizing Performance:
• Balanced Components: Ensuring all components complement each other to avoid bottlenecks.
• Regular Maintenance: Updating drivers, cleaning hardware, and managing storage space.
• Overclocking: Increasing component speeds beyond default settings (with caution due to heat and stability considerations).
17. Motivating a Typical Computer System Based on User Requirements
17.1. Identifying User Needs
• Basic Use: Browsing, office applications, media consumption.
• Professional Use: Graphic design, video editing, software development.
• Gaming: High-performance requirements for processing and graphics.
• Educational Use: Portability and versatility for students.
17.2. Configuring the System
• Processor: Choose appropriate CPU based on task complexity.
• Memory: Allocate sufficient RAM for multitasking and application demands.
• Storage: Decide between SSD, HDD, or hybrid solutions based on speed and capacity needs.
• Graphics: Select integrated or dedicated GPU depending on graphical requirements.
• Peripherals: Include necessary devices like monitors, keyboards, and printers.
• Budget Considerations: Balance performance needs with financial constraints.
Example Configuration for a Graphic Designer:
• CPU: Intel Core i7 or AMD Ryzen 7.
• RAM: 16GB or more.
• Storage: 512GB SSD for operating system and applications; additional HDD for file storage.
• GPU: Dedicated graphics card like NVIDIA GeForce RTX series.
• Monitor: High-resolution display with accurate color reproduction.
• Peripherals: Graphics tablet, high-quality printer.
18. Gig Economy
18.1. Definition
• Gig Economy: A labor market characterized by short-term contracts or freelance work as opposed to permanent jobs.
18.2. Characteristics
• Flexibility: Workers choose when and where to work.
• Diverse Opportunities: Range from ride-sharing and food delivery to freelance writing and programming.
• Technology Driven: Relies heavily on digital platforms and mobile apps to connect workers with clients.
Advantages:
• For Workers:
○ Flexible working hours.
○ Opportunity to work on varied projects.
○ Potential for additional income streams.
• For Employers:
○ Access to a broad talent pool.
○ Cost savings on benefits and office space.
○ Scalability according to demand.
Disadvantages:
• For Workers:
○ Lack of job security and benefits.
○ Income instability.
○ Potential for exploitation.
• For Economy:
○ Challenges in labor regulation and taxation.
○ Impact on traditional employment structures.
Impact of ICT:
• Enables Connectivity: Platforms like Uber, Airbnb, and Upwork facilitate gig work.
• Data Management: Efficient handling of transactions, reviews, and communications.
• Mobile Accessibility: Smartphones and apps make gig opportunities accessible anywhere.
SOFTWARE TECHNOLOGIES: SOFTWARE
Summary Notes on System Technologies: Software (Gr 10-12)
1. System Software
System software is essential for managing hardware and software resources. It includes operating systems (OS) and utility programs.
• Advantages:
○ Facilitates user interaction with the computer.
○ Manages hardware resources efficiently.
○ Provides a platform for running application software.
• Examples: Windows, macOS, Linux, Android, iOS.
2. Various Types of Operating Systems
Operating systems vary based on cost, size, hardware requirements, and platform.
• Types:
○ Windows: Widely used, compatible with most hardware, but can be expensive.
○ macOS: Optimized for Apple hardware, intuitive UI, but limited to Apple devices.
○ Linux: Open-source, free, highly customizable, but may require technical expertise.
○ Android/iOS: Mobile operating systems, with Android being more customizable and iOS more secure.
• Advantages:
○ Customization (Linux).
○ User-friendly interfaces (Windows, macOS).
○ Platform-specific optimizations (iOS for Apple devices).
• Disadvantages:
○ Cost (Windows, macOS).
○ Compatibility issues across different platforms.
3. Managing Disk Drives and Files
Disk management involves organizing and maintaining files on storage devices.
• Tools: Disk Defragmenter, Disk Cleanup, File Explorer.
• Advantages:
○ Efficient data retrieval.
○ Prolongs the life of storage devices.
• Disadvantages:
○ Fragmentation can slow down performance.
○ Improper management can lead to data loss.
4. Memory Management
Memory management ensures that each process has sufficient memory to function.
• Concepts: RAM, Virtual Memory, Paging, Segmentation.
• Advantages:
○ Prevents memory leaks.
○ Optimizes performance.
• Disadvantages:
○ Poor management can cause system crashes.
○ Virtual memory can slow down performance if overused.
5. Types of Processing and Task Management
Different processing methods improve task efficiency.
• Types:
○ Multi-tasking: Running multiple tasks simultaneously.
○ Multi-threading: Running multiple threads within a task.
○ Multi-processing: Using multiple CPUs for task execution.
• Advantages:
○ Increases efficiency and speed.
○ Better resource utilization.
• Disadvantages:
○ Complex to implement.
○ Can cause system instability if not managed properly.
6. Programming Languages: Compilers/Interpreters
Programming languages are converted into machine code via compilers or interpreters.
• Compiler: Translates the entire program at once.
• Interpreter: Translates the program line by line.
• Advantages:
○ Compilers: Faster execution after compilation.
○ Interpreters: Easier debugging.
• Disadvantages:
○ Compilers: Slower compilation time.
○ Interpreters: Slower execution time.
7. Virtual Memory
Virtual memory extends physical memory by using disk space.
• Advantages:
○ Allows running larger applications than the available RAM.
○ Enhances multitasking capabilities.
• Disadvantages:
○ Slower than physical memory.
○ Overuse can lead to thrashing.
8. Virtualisation
Virtualization allows multiple operating systems to run on a single physical machine.
• Advantages:
○ Efficient use of hardware.
○ Reduces costs by consolidating resources.
• Disadvantages:
○ Performance overhead.
○ Complexity in management.
9. System Software vs. Application Software
• System Software: Manages hardware and provides a platform for applications (e.g., OS, drivers).
• Application Software: Performs specific tasks for users (e.g., Word processors, games).
10. Software Distribution Models (Grade 10)
Different models determine how software is delivered and used.
• Types:
○ Single-user license: Allows installation on one device.
○ Site license: Permits installation on multiple devices within an organization.
• Advantages:
○ Site licenses are cost-effective for organizations.
○ Single-user licenses are simpler to manage.
• Disadvantages:
○ Site licenses can be expensive upfront.
○ Single-user licenses limit flexibility.
11. Types of Computers and Their Operating Systems (Grade 10)
Different types of computers use various operating systems.
• Examples:
○ Desktops: Windows, Linux, macOS.
○ Laptops: Windows, Linux, macOS.
○ Servers: Linux, Windows Server.
○ Mobile Devices: Android, iOS.
12. EULA, Intellectual Property, and Types of Licenses (Grade 10)
• EULA (End-User License Agreement): A legal agreement between the software provider and the user.
• Intellectual Property: Legal rights over creations of the mind.
• Types of Licenses:
○ Proprietary: Restricted use (e.g., Windows).
○ Open-source: Free to use and modify (e.g., Linux).
13. Source Code vs. Object Code (Grade 10)
• Source Code: Human-readable code written by programmers.
• Object Code: Machine-readable code generated from source code by a compiler.
14. AR (Augmented Reality), VR (Virtual Reality), and MR (Mixed Reality)
• AR: Overlays digital information on the real world (e.g., Pokémon GO).
• VR: Creates a fully immersive virtual environment (e.g., VR gaming).
• MR: Combines elements of both AR and VR (e.g., Microsoft HoloLens).
• Advantages:
○ Enhances user experience.
○ Useful in education, gaming, and simulations.
• Disadvantages:
○ High cost of equipment.
○ Requires significant processing power.
Software technologies: Computer management
1. Social Engineering
Social engineering involves manipulating people to gain unauthorized access to systems or sensitive information.
• Types:
○ Identity Theft: Stealing personal information to impersonate someone.
○ Catfishing: Creating fake profiles to deceive others online.
○ Spoofing: Faking an identity to gain trust or access.
○ Phishing: Sending fake emails or messages to trick individuals into revealing personal information.
○ Pharming: Redirecting users from legitimate websites to fraudulent ones.
• Examples: Fake bank emails asking for account details (phishing).
• Advantages/Disadvantages:
○ Advantage (for attackers): Highly effective with low technical skills needed.
○ Disadvantage: Victims suffer financial losses and privacy breaches.
2. Malware
Malware is malicious software designed to harm or exploit systems.
• Types:
○ Computer Virus: Attaches itself to files and spreads to other systems.
○ Computer Worm: Self-replicates and spreads without user intervention.
○ Trojan: Disguises as legitimate software but performs malicious actions.
○ Rootkit: Hides the existence of malware within a system.
○ Ransomware: Encrypts files and demands payment for decryption.
• Examples: WannaCry ransomware, which affected global systems.
• Advantages/Disadvantages:
○ Advantage (for attackers): Can cause widespread damage and extort money.
○ Disadvantage: Can lead to data loss, system downtime, and financial loss for victims.
3. Protection
Security measures are crucial for protecting systems and data from threats.
• Methods:
○ Firewall: Monitors and controls incoming and outgoing network traffic.
○ Passwords: Protects accounts and systems from unauthorized access.
○ Secure Websites: Use HTTPS for encrypted communication.
○ Email Security: Filters phishing emails and attachments.
○ Online Identity Protection: Safeguards personal information online.
○ Updates: Regular software updates patch security vulnerabilities.
○ Anti-virus Software: Detects and removes malware.
• Examples: Norton Antivirus, Windows Firewall.
• Advantages/Disadvantages:
○ Advantage: Reduces the risk of cyberattacks and data breaches.
○ Disadvantage: May not be foolproof; requires regular updates and user vigilance.
4. Unauthorised Access
Unauthorized access is when someone gains entry to a system without permission.
• Prevention Methods:
○ NFC (Near Field Communication): Secure contactless communication.
○ RFID (Radio Frequency Identification): Used in secure access cards.
○ Biometric Security: Uses fingerprints, facial recognition, or retina scans.
• Examples: Using biometric security to unlock smartphones.
• Advantages/Disadvantages:
○ Advantage: Enhances security by making unauthorized access more difficult.
○ Disadvantage: Can be costly to implement; privacy concerns with biometric data.
5. Human Error
Human error is one of the leading causes of security breaches and system failures.
• Examples: Weak passwords, accidental deletion of files, falling for phishing scams.
• Prevention:
○ Training: Regular cybersecurity awareness training.
○ Policies: Clear guidelines on password management and data handling.
• Advantages/Disadvantages:
○ Advantage: Reducing human error can significantly improve security.
○ Disadvantage: Human error can never be fully eliminated.
6. Hardware Failure
Hardware failure can result in data loss and system downtime.
• Prevention Methods:
○ UPS (Uninterruptible Power Supply): Provides backup power during outages.
○ RAID (Redundant Array of Independent Disks): Distributes data across multiple drives to prevent loss.
○ Backup: Regularly save copies of important data.
• Examples: Using RAID to protect data on servers.
• Advantages/Disadvantages:
○ Advantage: Reduces the risk of data loss due to hardware failure.
○ Disadvantage: Can be expensive to implement and maintain.
7. Software Bugs
Software bugs are errors in programs that can cause malfunctions or vulnerabilities.
• Examples: A bug that causes a program to crash unexpectedly.
• Prevention:
○ Regular Updates: Fixes bugs through patches.
○ Testing: Thorough testing before software release.
• Advantages/Disadvantages:
○ Advantage: Fixing bugs improves software reliability and security.
○ Disadvantage: Bugs can lead to system crashes or security vulnerabilities if not addressed.
8. Hardware and Software Configuration
Proper configuration ensures optimal system performance and security.
• Examples: Configuring firewalls, setting up user permissions.
• Advantages/Disadvantages:
○ Advantage: Enhances system efficiency and security.
○ Disadvantage: Misconfiguration can lead to vulnerabilities or poor performance.
9. Data Encryption
Encryption converts data into a secure format that can only be read by someone with the decryption key.
• Examples: SSL/TLS encryption for secure web browsing.
• Advantages/Disadvantages:
○ Advantage: Protects sensitive data from unauthorized access.
○ Disadvantage: Can slow down system performance and require key management.
10. Security Services
Security services enhance protection through additional layers of security.
• Types:
○ MFA (Multi-Factor Authentication): Requires multiple forms of verification.
○ OTP (One-Time Password): A temporary code for secure access.
○ Security Tokens: Physical devices that generate secure access codes.
• Examples: Google Authenticator for MFA.
• Advantages/Disadvantages:
○ Advantage: Provides stronger security than just passwords.
○ Disadvantage: Can be inconvenient or require additional devices.
11. Effects of Cybercrimes
Cybercrimes can have significant consequences, including financial loss, data breaches, and reputational damage.
• Examples: Companies losing millions due to ransomware attacks.
• Prevention: Implementing strong cybersecurity measures and policies.
• Advantages/Disadvantages:
○ Advantage: Protecting against cybercrimes can save money and protect sensitive data.
○ Disadvantage: Cybersecurity measures can be costly and complex.
12. Computer Criminals
Various types of individuals engage in cybercrimes, each with different motivations and methods.
• Types:
○ Threat Actor: An individual or group posing a security threat.
○ Ethical Hacker: Uses hacking skills to improve security legally.
○ Virus Author: Creates viruses to disrupt or harm systems.
○ Script Kiddie: An amateur hacker using pre-written scripts.
○ Cybergang: Organized groups committing cybercrimes.
○ Cyber Terrorist: Uses cyber attacks for political or ideological reasons.
• Examples: Hackers targeting government systems for espionage.
• Advantages/Disadvantages:
○ Advantage (Ethical Hacking): Improves security by identifying vulnerabilities.
○ Disadvantage (Cybercriminals): Cause significant harm to individuals and organizations.
13. Unethical Users
Unethical users engage in activities that, while not always illegal, are unethical or harmful.
• Types:
○ Cyberbully: Uses digital platforms to harass others.
○ Piggybacking: Illegally using someone else's Wi-Fi.
○ Click Farms: Generating fake clicks to manipulate online metrics.
○ Cyberslacking: Using work time to browse non-work-related content.
• Examples: Employees wasting hours on social media during work.
• Advantages/Disadvantages:
○ Advantage (For users): Easy to engage in unethical activities without immediate repercussions.
○ Disadvantage: Can lead to job loss, legal action, or other penalties.
14. Malware
Malware is a broad term for malicious software that can harm or exploit systems.
• Types:
○ Spyware: Collects data from a user's system without their knowledge.
○ Keyloggers: Record keystrokes to steal sensitive information.
○ DDoS (Distributed Denial of Service): Overloads a system with traffic to cause a shutdown.
○ Botnets: Networks of infected devices controlled by a hacker.
• Examples: Spyware installed on a computer to monitor activities.
• Advantages/Disadvantages:
○ Advantage (For attackers): Effective for stealing data or disrupting services.
○ Disadvantage: Victims suffer privacy breaches and system downtime.
15. Potential Dangers
Certain online threats can compromise security and privacy.
• Types:
○ Spam: Unsolicited messages that can clutter inboxes or contain malicious links.
○ Adware: Displays unwanted ads and can track user behavior.
○ Fake News: Misinformation spread to deceive or manipulate public opinion.
○ Hoaxes: False information spread to cause panic or confusion.
• Examples: Fake news stories spreading on social media.
• Advantages/Disadvantages:
○ Advantage (For spreaders): Easy to manipulate large audiences.
○ Disadvantage: Can lead to misinformation, panic, and financial loss.
16. Improve Performance
Various maintenance tasks can help improve system performance.
• Methods:
○ Disk Defragmentation: Reorganizes fragmented data on the hard drive.
○ Disk Cleanup: Removes unnecessary files to free up space.
○ Update: Keeps software up to date with the latest features and security patches.
○ Disable Features: Turns off unnecessary features to save resources.
• Examples: Running Disk Cleanup on a Windows PC to free up space.
• Advantages/Disadvantages:
○ Advantage: Improves system speed and efficiency.
○ Disadvantage: Can be time-consuming and requires regular maintenance.
17. Compression, Archive vs Backup
Compression reduces file size, while archiving and backups serve different purposes.
• Compression: Reduces the size of files to save space.
• Archive: Stores infrequently used files in a compressed format.
• Backup: Regularly saves copies of important data for recovery in case of loss.
• Examples: Using WinRAR for file compression.
• Advantages/Disadvantages:
○ Advantage: Saves storage space and makes file transfers faster.
○ Disadvantage: Compressed files may take longer to access or restore.
18. File Manager, File Extensions
File managers help organize files, and extensions indicate the file type.
• File Manager: Software that allows users to manage files and folders.
• File Extensions: Suffixes that indicate the file type (e.g., .docx for Word documents).
• Examples: Windows File Explorer, .pdf for PDF files.
• Advantages/Disadvantages:
○ Advantage: Simplifies file organization and access.
○ Disadvantage: Incorrect handling can lead to data loss or mismanagement.
19. License Agreements
License agreements define the terms of use for software.
• Types:
○ Single-User: Allows installation on one device.
○ Multi-User/Site License: Permits use on multiple devices within an organization.
• Examples: Microsoft Office licenses.
• Advantages/Disadvantages:
○ Advantage: Protects intellectual property and ensures legal use.
○ Disadvantage: Can limit the flexibility of software use.
20. Piracy
Piracy is the illegal copying or distribution of software, music, movies, etc.
• Examples: Downloading software from unauthorized websites.
• Advantages/Disadvantages:
○ Advantage (For users): Access to software without paying.
○ Disadvantage: Legal penalties, risk of malware, and loss of revenue for creators.
21. Economic Reasons for Using Computers
Computers enhance productivity, reduce costs, and open up new business opportunities.
• Examples: Automated systems in manufacturing, e-commerce platforms.
• Advantages/Disadvantages:
○ Advantage: Increases efficiency and competitiveness.
○ Disadvantage: Can lead to job displacement and require significant upfront investment.
22. Digital Divide and Digital Citizenship
The digital divide refers to the gap between those with access to technology and those without. Digital citizenship involves responsible and ethical use of technology.
# Mindmap of IT Concepts
## IT & ICT
- Digital Divide
- Digital Citizen
## Computing Devices
- Smartphone Sensors
- Mobile Device Terminology
- Device Comparisons
## Hardware Components
- Modular Design
- Motherboard
- Storage
- USB Ports
- RAM
- ROM
- BIOS Chip
- CMOS
- Firmware
- CPU
- Cache Memory
- GPU
- Graphics Cards
- VRAM
- Expansion Cards
- Motherboard Slots
## Data Transfer
- Buses
- Point-to-Point Connectors
## Performance Factors
- Storage
- RAM
- CPU
- Cache Memory
- GPU
- VRAM
- NIC
## User Requirements
- Typical Computer System
## Economic Context
- Gig Economy
System Software
Types
Cost: Free, Paid
Size: Lightweight, Full-featured
Hardware Needed: Minimum vs Recommended
Platform: Windows, macOS, Linux, Unix
Managing Disk Drives
Formatting
Partitioning
File Management
File Systems: NTFS, FAT32, ext4
File Operations: Create, Read, Write, Delete
Functions
Allocation
Deallocation
Paging and Segmentation
Types of Processing
Multi-tasking
Multi-threading
Multi-processing
Compilers vs Interpreters
Definition
Advantages and Disadvantages
Concept
Paging
Swapping
Types
Full Virtualization
Para-virtualization
Hardware-assisted Virtualization
System Software vs Application Software
Definitions
Examples
Types
Open Source
Proprietary
Freemium
Single-user vs Site License
Types of Licenses
EULA (End User License Agreement)
Intellectual Property
Open Source Licenses
Source Code vs Object Code
Definitions
Usage
AR (Augmented Reality)
VR (Virtual Reality)
MR (Mixed Reality)
Cybersecurity
Identity Theft
Catfishing
Spoofing
Phishing
Pharming
Types
Computer Virus
Worm
Trojan
Rootkit
Ransomware
Spyware
Keyloggers
DDoS
Botnets
Methods
Firewall
Passwords
Anti-virus
Updates
Secure Websites
Email Security
Dangers & Prevention
NFC
RFID
Biometric Security
Impact on Security
Failures
UPS
RAID
Backup
Bugs & Configuration
Encryption
MFA
OTP
Security Tokens
Types of Criminals
Threat Actor
Ethical Hacker
Virus Author
Script Kiddie
Cybergang
Cyber Terrorist
Examples
Cyberbully
Piggybacking
Click Farms
Cyberslacking
Spam
Adware
Fake News
Hoaxes
Methods
Disk Defragmentation
Disk Cleanup
Updates
Compression vs Backup
File Manager
File Extensions
License Agreements
Piracy
Reasons for Computer Use
Digital Divide