100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Full In-Depth CAT Notes Grade 11 and 12

Rating
5.0
(1)
Sold
6
Pages
78
Uploaded on
06-10-2024
Written in
2024/2025

Full In-Depth (Computer Applications Technology) CAT Notes for All Sections. It includes tips for use to effectively use these notes and contains all information needed for the Grade 11 and Grade 12 IEB syllabus. It gives an outline on all topics listed in the IEB SAGS (Subject Assesment Guidelines) Document and therefore is perfect for any school on the IEB syllabus and is the best notes for covering all topics and information needed for the Final Grade 12 IEB Exam. It contains: - Hardware - Software - Network and Internet Technologies - Computer Systems - Social Implications - All Abbreviations (at the end of the document).

Show more Read less
Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Course
Schooljaar
200

Document information

Uploaded on
October 6, 2024
Number of pages
78
Written in
2024/2025
Type
Summary

Subjects

Content preview

COMPUTERS
APPLICATIONS
TECHNOLOGY

FULL NOTES
GRADE 12




1

, Table of Contents


TIPS FOR USE ....................................................................................................................................................... 6

THE INFORMATION PROCESSING CYCLE ................................................................................................................ 7

MODULAR DESIGN ............................................................................................................................................... 7

SYSTEM UNITS ..................................................................................................................................................... 8

SECONDARY STORAGE ....................................................................................................................................... 12

PRIMARY STORAGE VS SECONDARY STORAGE .................................................................................................... 16

INPUT DEVICES .................................................................................................................................................. 16

OUTPUT DEVICES ............................................................................................................................................... 21

WHAT MAKES IT ALL WORK? .............................................................................................................................. 24

UPGRADE VS. REPLACE....................................................................................................................................... 24

TROUBLESHOOTING HARDWARE PROBLEMS ...................................................................................................... 25

HARDWARE THEFT AND PROTECTION ................................................................................................................. 28

DIFFERENT COMPUTER TYPES ............................................................................................................................ 28

CATEGORIES OF USERS ....................................................................................................................................... 31

INPUT AND OUTPUT FOR PHYSICALLY CHALLENGED USERS ................................................................................. 32

INPUT AND OUTPUT HEALTH ISSUES .................................................................................................................. 32

GREEN COMPUTING ........................................................................................................................................... 33

UNINTERRUPTIBLE POWER SUPPLY .................................................................................................................... 33

NEWER TECHNOLOGIES ...................................................................................................................................... 33

APPLICATION SOFTWARE VS SYSTEM SOFTWARE ............................................................................................... 35

THE OPERATING SYSTEM .................................................................................................................................... 35

THE INTERFACE .................................................................................................................................................. 35


2

,THE DESKTOP ..................................................................................................................................................... 35

OTHER WINDOWS COMPONENTS....................................................................................................................... 36

INTEGRATED SOFTWARE .................................................................................................................................... 37

LICENSING AGREEMENTS ................................................................................................................................... 37

PROPRIETARY SOFTWARE .................................................................................................................................. 37

FREE SOFTWARE ................................................................................................................................................ 37

TYPES OF APPLICATION SOFTWARE .................................................................................................................... 38

TYPES OF SYSTEM SOFTWARE ............................................................................................................................ 39

WINDOWS SECURITY SCREEN ............................................................................................................................. 39

TASK MANAGER ................................................................................................................................................. 40

SAFE MODE ....................................................................................................................................................... 42

SOFTWARE INSTALLATION ................................................................................................................................. 42

STEPS WHEN INSTALLING SOFTWARE ................................................................................................................. 43

UPDATING YOUR SOFTWARE ............................................................................................................................. 44

UNINSTALLING SOFTWARE ................................................................................................................................. 44

COMPATIBILITY ISSUES ...................................................................................................................................... 45

SOFTWARE BUGS ............................................................................................................................................... 45

FIXING SOFTWARE PROBLEMS............................................................................................................................ 46

TROUBLESHOOTING USING UTILITY SOFTWARE .................................................................................................. 46

BACKUP AND RECOVERY .................................................................................................................................... 48

SOFTWARE FOR PHYSICALLY CHALLENGED USERS ............................................................................................... 48

ARTIFICIAL INTELLIGENCE (AI)............................................................................................................................. 48

FILE MANAGEMENT ........................................................................................................................................... 49




3

, FILE NAMES ....................................................................................................................................................... 50

FILE SEARCH....................................................................................................................................................... 51

FILE CONVERSION .............................................................................................................................................. 51

SMALL NETWORKS ............................................................................................................................................. 52

LARGER NETWORKS ........................................................................................................................................... 53

SETTING UP A NETWORK .................................................................................................................................... 53

HARDWARE ....................................................................................................................................................... 54

CONNECTION METHODS .................................................................................................................................... 55

NETWORK TOPOLOGIES ..................................................................................................................................... 56

BASIC NETWORK SECURITY ................................................................................................................................ 58

ETHICAL USE OF NETWORKS ............................................................................................................................... 58

THE INTERNET .................................................................................................................................................... 59

INTERNET SERVICE PROVIDERS (ISP) ................................................................................................................... 59

CONNECTING TO THE INTERNET ......................................................................................................................... 60

1. FIXED INTERNET ACCESS.............................................................................................................................. 60

2. MOBILE INTERNET ACCESS – CELLULAR TECHNOLOGY .................................................................................. 60

INTERNET SERVICES ........................................................................................................................................... 62

THE WORLD WIDE WEB (WWW) ......................................................................................................................... 66

BROWSING AND SEARCHING .............................................................................................................................. 67

INTERNET BROWSER FEATURES .......................................................................................................................... 68

SURFACE, DEEP AND DARK WEB ......................................................................................................................... 69

CRYPTOCURRENCIES .......................................................................................................................................... 70

COMPUTER CRIME ............................................................................................................................................. 70




4

Reviews from verified buyers

Showing all reviews
1 month ago

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
shivaanharipersad N/A
Follow You need to be logged in order to follow users or courses
Sold
39
Member since
1 year
Number of followers
4
Documents
15
Last sold
1 month ago

4.9

14 reviews

5
13
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions