APPLICATIONS
TECHNOLOGY
FULL NOTES
GRADE 12
1
, Table of Contents
TIPS FOR USE ....................................................................................................................................................... 6
THE INFORMATION PROCESSING CYCLE ................................................................................................................ 7
MODULAR DESIGN ............................................................................................................................................... 7
SYSTEM UNITS ..................................................................................................................................................... 8
SECONDARY STORAGE ....................................................................................................................................... 12
PRIMARY STORAGE VS SECONDARY STORAGE .................................................................................................... 16
INPUT DEVICES .................................................................................................................................................. 16
OUTPUT DEVICES ............................................................................................................................................... 21
WHAT MAKES IT ALL WORK? .............................................................................................................................. 24
UPGRADE VS. REPLACE....................................................................................................................................... 24
TROUBLESHOOTING HARDWARE PROBLEMS ...................................................................................................... 25
HARDWARE THEFT AND PROTECTION ................................................................................................................. 28
DIFFERENT COMPUTER TYPES ............................................................................................................................ 28
CATEGORIES OF USERS ....................................................................................................................................... 31
INPUT AND OUTPUT FOR PHYSICALLY CHALLENGED USERS ................................................................................. 32
INPUT AND OUTPUT HEALTH ISSUES .................................................................................................................. 32
GREEN COMPUTING ........................................................................................................................................... 33
UNINTERRUPTIBLE POWER SUPPLY .................................................................................................................... 33
NEWER TECHNOLOGIES ...................................................................................................................................... 33
APPLICATION SOFTWARE VS SYSTEM SOFTWARE ............................................................................................... 35
THE OPERATING SYSTEM .................................................................................................................................... 35
THE INTERFACE .................................................................................................................................................. 35
2
,THE DESKTOP ..................................................................................................................................................... 35
OTHER WINDOWS COMPONENTS....................................................................................................................... 36
INTEGRATED SOFTWARE .................................................................................................................................... 37
LICENSING AGREEMENTS ................................................................................................................................... 37
PROPRIETARY SOFTWARE .................................................................................................................................. 37
FREE SOFTWARE ................................................................................................................................................ 37
TYPES OF APPLICATION SOFTWARE .................................................................................................................... 38
TYPES OF SYSTEM SOFTWARE ............................................................................................................................ 39
WINDOWS SECURITY SCREEN ............................................................................................................................. 39
TASK MANAGER ................................................................................................................................................. 40
SAFE MODE ....................................................................................................................................................... 42
SOFTWARE INSTALLATION ................................................................................................................................. 42
STEPS WHEN INSTALLING SOFTWARE ................................................................................................................. 43
UPDATING YOUR SOFTWARE ............................................................................................................................. 44
UNINSTALLING SOFTWARE ................................................................................................................................. 44
COMPATIBILITY ISSUES ...................................................................................................................................... 45
SOFTWARE BUGS ............................................................................................................................................... 45
FIXING SOFTWARE PROBLEMS............................................................................................................................ 46
TROUBLESHOOTING USING UTILITY SOFTWARE .................................................................................................. 46
BACKUP AND RECOVERY .................................................................................................................................... 48
SOFTWARE FOR PHYSICALLY CHALLENGED USERS ............................................................................................... 48
ARTIFICIAL INTELLIGENCE (AI)............................................................................................................................. 48
FILE MANAGEMENT ........................................................................................................................................... 49
3
, FILE NAMES ....................................................................................................................................................... 50
FILE SEARCH....................................................................................................................................................... 51
FILE CONVERSION .............................................................................................................................................. 51
SMALL NETWORKS ............................................................................................................................................. 52
LARGER NETWORKS ........................................................................................................................................... 53
SETTING UP A NETWORK .................................................................................................................................... 53
HARDWARE ....................................................................................................................................................... 54
CONNECTION METHODS .................................................................................................................................... 55
NETWORK TOPOLOGIES ..................................................................................................................................... 56
BASIC NETWORK SECURITY ................................................................................................................................ 58
ETHICAL USE OF NETWORKS ............................................................................................................................... 58
THE INTERNET .................................................................................................................................................... 59
INTERNET SERVICE PROVIDERS (ISP) ................................................................................................................... 59
CONNECTING TO THE INTERNET ......................................................................................................................... 60
1. FIXED INTERNET ACCESS.............................................................................................................................. 60
2. MOBILE INTERNET ACCESS – CELLULAR TECHNOLOGY .................................................................................. 60
INTERNET SERVICES ........................................................................................................................................... 62
THE WORLD WIDE WEB (WWW) ......................................................................................................................... 66
BROWSING AND SEARCHING .............................................................................................................................. 67
INTERNET BROWSER FEATURES .......................................................................................................................... 68
SURFACE, DEEP AND DARK WEB ......................................................................................................................... 69
CRYPTOCURRENCIES .......................................................................................................................................... 70
COMPUTER CRIME ............................................................................................................................................. 70
4