Module 1.1
The computer:
‘powerful’ in computer terms describes a combination of factors such as:
The speed and performance of the CPU(s)
The amount and type of storage it has
The size of the memory, more memory allows more programs and data to be
processed at a time.
The type of graphic card installation.
Portable computers:
Laptops and notebooks:
Use smaller parts for lower power consumption
Run on battery power
Power setting used to manage the phone
Tablets:
Ideal for quick, small-scale computing
Operating system designed for mobile devices
Longer battery life than e.g.- laptops
Built in WIFI and cellular connectivity
Phablets:
Smartphones with the screen size bigger than 5”
Performs functions of tablet and can make phone calls.
Smartphones:
Combine features and technologies of many separate devices- convergence
Touch screen for typed input
Mobile operating system
Built in Wifi and cellular connectivity
Server: powerful computer that provides services and resources to clients.
Client: computer that uses services and resources from servers but is not as powerful as a
server.
Protecting your information:
, Make sure data stored on laptop is backed up
Password protect the laptop and have copies of the backup stored off site
Anti-theft strategies:
Loss of hardware often involves loss of information as well
portable devices are vulnerable and easy to steal
use cable ties to lock down equipment, use motion sensors that can be detected
when a computer is being moved and use lockable cabinets.
Module 1.2
Image capture
Digital cameras:
smartphones, compact cameras, top-end DSLR
images already in digital format
quality depends on sensor size, zoom type, resolution and ISO rating.
Scanners:
input device that converts images into a digital format
quality determined by resolution and color depth
higher dpi and color depth give higher quality but bigger file sizes
OCR software converts scanned images into editable text
Quality of scanned image depends on quality of original
Biometric input
Capturing unique biological features of a person.
Advantages:
Security, it is a lot more secure than a typical password as it is unique to your
features.
It is a lot difficult to hack as it is on a person feature, it cannot be copied or given out.
Input at ATM- automatic teller machine
Dedicated device that gets input from user and other devices
Interact via touch screens, keypads, buttons
Skimmers are used to capture your card details and pin by pretending to be you and
stealing your money.
Input into a POS system: point of sale
Barcodes and RFID tags are very reliable when integrated into a POS system.
The computer:
‘powerful’ in computer terms describes a combination of factors such as:
The speed and performance of the CPU(s)
The amount and type of storage it has
The size of the memory, more memory allows more programs and data to be
processed at a time.
The type of graphic card installation.
Portable computers:
Laptops and notebooks:
Use smaller parts for lower power consumption
Run on battery power
Power setting used to manage the phone
Tablets:
Ideal for quick, small-scale computing
Operating system designed for mobile devices
Longer battery life than e.g.- laptops
Built in WIFI and cellular connectivity
Phablets:
Smartphones with the screen size bigger than 5”
Performs functions of tablet and can make phone calls.
Smartphones:
Combine features and technologies of many separate devices- convergence
Touch screen for typed input
Mobile operating system
Built in Wifi and cellular connectivity
Server: powerful computer that provides services and resources to clients.
Client: computer that uses services and resources from servers but is not as powerful as a
server.
Protecting your information:
, Make sure data stored on laptop is backed up
Password protect the laptop and have copies of the backup stored off site
Anti-theft strategies:
Loss of hardware often involves loss of information as well
portable devices are vulnerable and easy to steal
use cable ties to lock down equipment, use motion sensors that can be detected
when a computer is being moved and use lockable cabinets.
Module 1.2
Image capture
Digital cameras:
smartphones, compact cameras, top-end DSLR
images already in digital format
quality depends on sensor size, zoom type, resolution and ISO rating.
Scanners:
input device that converts images into a digital format
quality determined by resolution and color depth
higher dpi and color depth give higher quality but bigger file sizes
OCR software converts scanned images into editable text
Quality of scanned image depends on quality of original
Biometric input
Capturing unique biological features of a person.
Advantages:
Security, it is a lot more secure than a typical password as it is unique to your
features.
It is a lot difficult to hack as it is on a person feature, it cannot be copied or given out.
Input at ATM- automatic teller machine
Dedicated device that gets input from user and other devices
Interact via touch screens, keypads, buttons
Skimmers are used to capture your card details and pin by pretending to be you and
stealing your money.
Input into a POS system: point of sale
Barcodes and RFID tags are very reliable when integrated into a POS system.