MODULE 1.1 COMPUTERS IN OUR EVERYDAY LIVES
MODULE 1.2 HARDWARE DEVICES
MODULE 1.3 HARDWARE RECOMMENDATIONS
MODULE 1.4 SOFTWARE
MODULE 1.5 SYSTEM SOFTWARE AND COMPUTER MANAGEMENT
MODULE 2.1 INTERNET CONNECTIONS AND SERVICES
MODULE 2.2 THE DANGERS OF COMPUTER CRIME
MODULE 2.3 E-COMMUNICATIONS
MODULE 2.4 THE IMPACT OF TECHNOLOGY
Done by: Madeleine Greeff
Sources:
Computers, part of your life
Gr12 Textbook
Teacher DVD PP-slides
Date: 13 July 2021
Email:
,Important Definitions:
The information below is about new technology that must be studied in addition to the information in the study guide:
• 3D printing/printers → 3D printers can create three-dimensional solid objects (e.g., motor vehicle parts, human tissue replacement, jewelry, clothing, etc.) from a digital model of the
item by adding successive layers of material on top of one another.
• BYOD → Bring your own device refers to a concept where employees/students are allowed to bring and use their own portable devices, such as smartphones, laptops, tablets, etc. to
work on and access the network instead of a device supplied/owned by the company/ institution.
• Clickjacking → Users are tricked into clicking on an item on a web page that acts as a concealed link.
• Geotagging → A process where a geographical position (latitude and longitude) of where a photograph was taken, is added to the metadata of a file.
• LTE → A standard used in wireless communication which provides high-speed data transfers between cellular devices (such as smartphones and tablets) and internet service providers
(ISPs). It is the next generation of cellular connectivity after 3G.
• Micro USB → A smaller version of a USB port usually found on portable devices such as smartphones.
• Multi-touchscreen → A feature of a screen that allows it to register more than one point being touched simultaneously.
• Phablet → A smaller version of a tablet which, besides tablet features, also incorporates features of a smartphone, such as voice calls and SMSs.
• E-readers → Portable devices specifically created to read e-books, e.g., a Kindle.
• QR code → A selection of black and white squares that are combined in one square grid that represents text such as a URL. The QR code can be scanned and translated using a
smartphone and the appropriate application
• Thread → A thread or threaded discussion is a feature in many email clients, online forums, newsgroups, etc., which automatically groups messages according to a topic or sender.
• URL shortener → URL shortening is a service used to convert a long URL to a shorter version. This shorter version of the URL will take a user to the same web address, but it is easier to
remember and type.
• 802.11 a/b/g/n → Refers to a set of specifications and protocols used in communication on a wireless network. The letters (a, b, g, n) simply indicate different versions of the Wi-Fi
standard (each with different speeds, etc.)
• NFC → Near-field communication is a standard that allows devices, such as smartphones, to connect wirelessly simply by bringing them into close proximity, for example, transferring
files by simply bringing two smartphones close to each other
,• Wireless video display → Wireless video streaming (up to HD quality) to an output device such as a high-definition TV. An example is Intel’s WiDi system.
• Crowdfunding → A process whereby a single idea or business practice is funded by multiple small donations from volunteer contributors, usually before the business venture is started.
The contributors will receive the product when it is finally put into production. Examples include www.indiegogo.com and www.kickstarter.com.
• Denial-of-service attack → DoS attacks use thousands of compromised computers to flood a server with requests for information. The attack is successful if the server becomes so
overwhelmed that normal users cannot access the system.
• Metadata → Metadata is data about a file. It provides information about a certain item’s content. For example, an image may include metadata that describes how large the picture is,
the color depth, the image resolution, when the image was created, and other data. A text document’s metadata may contain information about how long the document is, who the
author is, when the document was created, and a short summary of the document.
• Solid-state drive → A drive that has no moving parts making it quieter and more robust. They operate much faster than traditional hard drives as they store data electronically and not
magnetically as with a traditional hard drive.
• Card reader → A device connected to a computer that is designed to accept and read data from different types of storage media, such as SIM and SD cards and flash drives
• HDMI → High-definition multimedia interface is a standard/port for connecting high-definition video devices, such as computer monitors, video projectors and digital television. HDMI
carries high quality video and audio signals, and there is no need for separate audio cables as with VGA.
• Big data → Very large structured and unstructured data sets that are analyzed using computers to reveal trends and associations. These present challenges, such as storage, curation,
querying and visualization.
• Bitcoin → This is a form of virtual, digital currency. Bitcoins can be exchanged for other currencies, products and services. They have caused concern as they are often used for payments
of criminal activities such as ransomware demands. However, more and more legitimate companies are accepting them as a means of payment.
• Digital migration → A process in which broadcasting services using traditional analogue technology are replaced with digital technology.
• Internet of Thing (IoT) → This refers to the trend whereby all sorts of objects and devices are increasingly being connected to one another via the Internet. This can range from
surveillance systems to geysers, washing machines, ‘smart’ motorcars and traffic lights. Various sensors in the devices can produce data for all sorts of purposes, including diagnostics and
running of systems more efficiently.
• Mobile or M-learning → A form of education and training delivered and conducted via the Internet using mobile devices, such as tablets and smartphones. It is designed to be flexible,
allowing learners/workers/students access to education anywhere, anytime.
• Ransomware → A type of malware designed to encrypt or block access to your computer system and files until you pay a sum of money.
• Screen lock pattern → A way of locking a device by setting up a pattern you must draw or trace on the screen to unlock the device
,• Shaping (Network tuning) → A technique whereby certain network (Internet) services, e.g. e-mail, are given preference while others, such as social networking services, are given less
priority, thus performance is maintained for the more critical services.
• Throttling (Policing) → This occurs when your ISP slows down your Internet connection. This often occurs when you have been deemed by your ISP to have downloaded excessive
amounts of data. Each ISP has an acceptable use policy (AUP) which specifies how this is determined and implemented.
• Virtual reality (VR) → This refers to using technology to create a simulation of a 3D environment that can be interacted with by a person in a seemingly real or physical way. This is
achieved by using equipment, such as helmets with screens and gloves fitted with sensors.
• Augmented reality → uses similar types of technology but does not create a totally virtual environment like VR. Instead it takes the physical world and adds (augments) objects such as
graphics within the real world. Both VR and augmented reality are used in areas ranging from entertainment, training in aircraft simulators and medicine with surgeons being able to
perform remote surgery on patients.
• Insert a hard space (non-breaking space) in Word processing → To do this, hold down the Ctrl and Shift keys as you press the spacebar. Word will then not break the line at that point.
• Insert a picture watermark on one page only – Word processing • The INT function in spreadsheets → The INT function rounds down numbers to the
o Insert picture watermark as normal. next lowest integer. =INT(Number) Example: =INT(24,7) returns 24 and =INT(22,3)
returns 22
o Open header and click on watermark. • 3D border effects in HTML → Create a table where the outside border has a 3D effect
with blue as the light color and navy as the dark color. The coding will be as follows:
o Open insert – watermark – custom watermark – Add to gallery <table bordercolorlight="blue" bordercolordark="navy">
o Remove watermark.
NB! Study
o Insert again – right click in gallery – document position – choose current page • How to do subtotals in Excel
• Insert buttons in forms of Access
• Change a vertical position of a picture – Word processing → Right click – Layout options – Position tab
• Change spacing between cells of a table – Word processing → Right click – Table Properties – Options – remove tick next to ‘Allow spacing between cells’
• Insert 2nd level text in a SmartArt – Word processing → Open text panel by clicking on arrow on left frame. Create a new bullet and use tab key to increase to level 2.
• Replacing a word with a symbol – Word processing → Add symbol any place in document and copy the symbol. Delete the symbol. Open Find and Replace. Type word in Find box and
click in Replace box – click on More Click on Special – Clipboard Contents (^c will display in Replace box) Replace All.
• Inserting a hard space (non-breaking space) in MS Word → To insert a non-breaking space in MS Word, hold down the Ctrl and Shift keys as you press the space bar. Word prevents an
automatic line break at the position of the hard space. With the show/hide icon on, a hard space is indicated with the degree symbol, e.g., 26°September°2020.
, GR 12 Module 1.1 – COMPUTERS IN TYPES OF COMPUTER SYSTEMS
OUR EVERYDAY LIVES
• NON-PORTABLE – Desktop Computer and a Server
WHY DO WE USE COMPUTERS • PORTABLE – Laptop/Notebook, Tablet, Hybrid Computer, Smartphone and Phablet
Efficiency – computers save the following:
✓ Time WHEN COMPARING COMPUTERS YOU SHOULD LOOK AT
✓ Labour • How powerful they are – e.g. speed of CPU and how much RAM
✓ Resources • What they are used for – servers / basic office applications
Accuracy – ensured by quality programs and quality data • Their size (mobility) – range from huge mainframe computers to hand-held devices
✓ mass production on assembly lines
✓ performing same tasks over and over with 100% • Software they use – we refer to operating systems as ‘platforms’ and to computers as
accuracy ‘Linux machines’ or ‘Windows machines’
Reliability – Computers can be relied on to do tasks
✓ accurately NON-PORTABLE COMPUTERS
✓ without tiring Generally consist of a system unit, monitor, mouse and keyboard.
✓ without getting bored, etc.
They are ...
• Large in size
COMMUNICATION • Not meant to be moved around
• Generally more powerful than mobile or portable computers
Efficiency, accuracy and reliability of computers combined with
All-in-one units are easier to transport and take up less space — but are more difficult to
ability to communicate, enable us to ... fix or upgrade
• virtually eliminate time and distance as business constraints
Entry-level computer PORTABLE COMPUTERS
• communicate and share information in many different ways All-in-one design includes screen, keyboard and pointing
• Cheapest to purchase in range device
globally
• Lower hardware specifications Incorporated in casing designed
• save on communication costs — to fold (to take up less space)
• Come with ‘Home editions’ of
— to be easy to carry
software
• interact socially on a world-wide scale — to protect delicate parts
, PERSONAL USERS SOHO Users – Small Office Home Office MOBILE USERS
• limited office tasks Depends on type of business the user runs Want and need to have their technology with them
wherever they are.
General entry-level computer for administrative functions:
• internet banking They use a smartphone or tablet for ...
• accounting or billing
• email and browsing the web • databases with clients, suppliers, stock, etc. • browsing the internet and using email
• social networking • electronic document archiving • playing games
• planning and scheduling, etc. • reading books
• to skype with family and friends
POWER USERS – Top-of-the-range hardware and software • navigating with GPS
• viewing and sharing photos
• taking quick notes
• Hardcore gamers
• for entertainment — gaming, music, • taking photos/video and recording sound
viewing movies, etc. • Architects
• Scientists
• Video editing professionals
• Engineers
CONVERGENCE
The trend where ...
separate technologies and functions that previously required different
devices are combined into a single device
The smartphone and the tablet are good examples of convergence