100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary IT Theory IEB full study guide

Rating
-
Sold
1
Pages
70
Uploaded on
05-11-2025
Written in
2024/2025

These notes cover everything you need for IT theory and coding in Java, based on the FunWorks Grade 10, 11, and 12 textbooks, and are fully aligned with the SAGS curriculum (2025). They’re neatly organised by grade and topic. I used these exact notes to prepare for my IEB IT theory exam (Paper 2), and every time I found something new in a past paper, I added it here. So you’re getting a complete, refined, and exam-focused study resource. My matric IT average: 97% I really hope they help you as much as they helped me!

Show more Read less

















Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Summarized whole book?
Yes
Uploaded on
November 5, 2025
Number of pages
70
Written in
2024/2025
Type
Summary

Subjects

Content preview

, Introduction:

These comprehensive study notes are based on the FunWorks Grade 10, 11 and 12 textbooks for
IT theory and coding in Java. They cover all the concepts prescribed in the SAGS curriculum
(2025).
The notes are organised by grade, with each section clearly broken down by concept. The codes
next to the section titles refer to the relevant FunWorks textbook chapters - making it easy to
cross-reference your learning and find specific topics quickly. Please note there is overlap
between the sections of each grade.
These are the exact notes I used to prepare for my final IEB IT theory exam. Each time I came
across something unfamiliar in a past paper, I added it here - so you’re getting a complete,
refined, and exam-focused resource.
My IT average in matric: 97%


I poured a lot of effort into making these notes as clear and helpful as possible, I really hope
they make your studying easier and help you feel confident going into your exams.




Copyright Notice
© 2025 L’chelle Bester. All rights reserved.
These notes are for personal study use only. Redistribution, resale, or sharing (in any format,
printed or digital) without the author’s permission is strictly prohibited.

, Contents Page:

Grade 10 Concepts
Data Representation & Storage ............................................................. 5
Overview of a Computer ................................................................... 9
Hardware ............................................................................................. 12
System Software ................................................................................ 16
Computer Networks ......................................................................... 20
Boolean Logic ..................................................................................... 24
Internet & WWW ................................................................................ 25
TLU8 – Social & Ethical Issues ......................................................... 29


Grade 11 Concepts
Data Representation ........................................................................ 31
Hardware ............................................................................................. 33
System Software ................................................................................ 37
Local Area Networks ........................................................................ 40
Wide Area Networks ......................................................................... 47
Internet ................................................................................................. 49
Errors, Threats and Security ............................................................ 52
Social Implications ............................................................................ 57
Objects & Classes .............................................................................. 59


Grade 12 Concepts
Hardware & Software ...................................................................... 62
Networking ......................................................................................... 64
Database Management .................................................................... 68
Social Implications ............................................................................ 69
OOP Theory ........................................................................................ 70

,Grade 10 Concepts

, TLU1 – Data Representation & Storage:

Decimal, Binary & Hexadecimal Number System (1.2):
Binary - (Base-2) The number system that uses 0’s and 1’s.
Each binary digit is known
Hexadecimal – (Base-16) Commonly known as ‘hex’. 4 bits make up 1 hex. as a bit (binary digit). A
byte is a group of 8 bits.
Decimal – (Base-10)
By convention and for clarity, we use subscripts to indicate bases (eg. 11010102 & . 10610).
Convert BINARY to DECIMAL:
Label: 𝟐𝟔 𝟐𝟓 𝟐𝟒 𝟐𝟑 𝟐𝟐 𝟐𝟏 𝟐𝟎
Number given: 1 1 0 1 0 1 0
Multiplied by 1 x 𝟐𝟔 1 x 𝟐𝟓 0 x 𝟐𝟒 1 x 𝟐𝟑 0 x 𝟐𝟐 1 x 𝟐𝟏 0 x 𝟐𝟎
label
Is equal to: 64 32 0 8 0 2 0


Decimal Number = 64 + 32 + 0 + 8 + 0 + 2 + 0
= 106
Convert DECIMAL to BINARY:
Continuously divide by two and Base 106 Remainder Comment
combine remainders. 2 53 0 106/2 = 53 (no remainder)
2 26 1 53/2 = 26 (remainder 1)
Write number from the bottom to
2 13 0 26/2 = 13 (no remainder)
the top, as the arrow indicates.
2 6 1 13/2 = 6 (remainder 1)
Stop when you reach 0 in the 2 3 0 6/2 = 3 (no remainder)
second column. 2 1 1 3/2 = 1 (remainder 1)
2 0 1 1/2 = 0 (remainder 1)
Adding 0’s to the left of a number
doesn’t change its value. Binary Number = 1101010
Convert DECIMAL to HEXADECIMAL:
Decimal 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
value
Hexadecimal 0 1 2 3 4 5 6 7 8 9 A B C D E F

Base 223 Remainder Comment
16 13 15 223/16 =13 (remainder 15) Hexadecimal = DF
16 0 13 13/16 = 0 (remainder 13)

Convert HEXADECIMAL to DECIMAL:
Label: 𝟏𝟔𝟏 𝟏𝟔𝟎
Number given D F
Multiplied by value 13 x 𝟐𝟏 15 x 𝟐𝟎
Is equal to 208 15
Decimal value - 208 + 15 = 223

,Convert HEXADECIMAL to BINARY/Converting BINARY to HEXADECIMAL:

Decimal Binary(4-bit) Hexadecimal DF = 110111112
0 0000 0
Binary should be converted to 8 bits(add zeros to left) before
1 0001 1
converting to hexadecimal. Eg. 1111011 = 01111011
2 0010 2
3 0011 3 𝟐𝟕 𝟐𝟔 𝟐𝟓 𝟐𝟒 𝟐𝟑 𝟐𝟐 𝟐𝟏 𝟐𝟎
4 0100 4
5 0101 5 0 1 1 1 1 0 1 1
6 0110 6 0 x 𝟐𝟑 1 x 𝟐𝟐 1 x 𝟐𝟏 1 x 𝟐𝟎 1 x 𝟐𝟑 0 x 𝟐𝟐 1 x 𝟐𝟏 1 x 𝟐𝟎
7 0111 7
0 4 2 1 8 0 2 1
8 1000 8
9 1001 9 7 11
10 1010 A 7 B
11 1011 B 011110112 = 7𝐵16
12 1100 C
13 1101 D
14 1110 E
15 1111 F

Number of combinations for number of bits (1.3):
Word size – the number of bits that a processor can work with at one time. It is too inefficient to work with
individual bits, so bits are grouped together into units called words. As processors become more powerful,
word size increases.
A word size of 4 bits. Because each bit position can contain either a ‘0’ or ‘1’, we have two options for each
bit. Possible combinations = 𝟐𝒏. n being represents the number of bits joined together. Therefore there 24
= 16 combinations.
Data Storage (1.4):
The size of memory capacity 8 bits = 1 byte
(such as RAM and HDD) is 1 KB (Kilobyte) = 210 = 1024 bytes
measured in multiple bytes. A 1 MB (Megabyte) = 220= 1024 x 1024 bytes
small b indicates bits. A big B 1 GB (Gigabyte) = 230 = 1024 x 1024 x 1024 bytes
indicates bytes. 1 TB (Terabyte) = 240 = 1024 x 1024 x 1024 x 1024 bytes
1 PB (Petabyte) = 250 = 1024 x 1024 x 1024 x 1024 x 1024 bytes
1 EB (Exabyte) = 260 = 1024 x 1024 x 1024 x 1024 x 1024 x 1024 bytes

Digital Representation of Numbers & Characters (1.5 – 1.6):
Numbers:

Integer in limited bits Smallest number Largest Number Integers are signed or unsigned.
n unsigned bits 0 2𝑛 − 1
n signed bits 2𝑛−1 2𝑛−1 − 1

Characters:
ASCII – American Standard Code for Information Interchange:
Had a limited of 256 characters (because 28 = 256). This is not extensive enough. Encodings were also not
consistent, they often used different numbers for characters. Computers using different encodings couldn’t
transfer data between them as this would lead to corrupt data.

,Unicode:
All modern software providers have adapted Unicode as the standard. You can access these by pressing
<Alt>+nnnn. Which is the number combination in hexadecimals.
UTF-8
Unicode Transformation format. Can use 32 bits, so there are 1112064 possible characters.
Storing screen data:
The computer uses a process of refreshing to constantly display the correct data. It redraws the screen at a
certain rate. The rate is measured in hertz (Hz) which is the number of updates per second.
Earlier computers stored their images in RAM which had a maximum capacity of 640KB, using about 30% of
RAM.
The resolution has now changed from a simpler character cell to a matrix of pixels. Pixels are tiny dots on the
screen. Each pixel has its own colour definition. Colour can be defined in RGB. Each colour can be one of
256(red) x 256 (blue) x 256 (green) values producing 16777216 possible colours. Each pixel require 3 bytes
of memory.
Screen resolution x 3 bytes x hertz = xyz bytes/second

, TLU2 – Overview of a computer:

Hardware and Software (2.1-2.4):
Hardware – is the collection of physical components of the computer system.
Software – the collection of non-physical parts; the OS, application programs, data.
Computer – multi-purpose electronic that utilizes hardware and software to ensure that the computer can
successfully receive input data, process data, store the data and output information.
The general processing cycle:
Secondary Storage




RAM (primary
INPUT OUTPUT
memory)




CPU


The CPU (central processing unit) commonly called the processor performs the tasks received by RAM
(random access memory). All data needs to be stored in RAM before it can be processed. RAM can receive
data from input devices or secondary storage. The data in RAM can be copied to secondary storage or sent
to an output device. The CPU cannot execute instructions in secondary storage.


ICT – Information Communication Technology:

Secondary Storage



RAM (primary
INPUT OUTPUT
memory)



CPU



COMMUNICATION



Advantages Disadvantages
Fast Access to data. Electrical failures cause much loss of productivity.
Time-critical transactions can take place at high Unauthorised access to data is possible.
speed.

, Online shopping/banking. Injuries related to poor working conditions.

Mail services Scams and online fraud.
Less use of paper Toxic waste is generated by dumping of old
equipment.
Less traveling, hence less pollution because of Greater energy hence more electrical requirements.
remote working.
Your computer is up to date, and you can keep Hardware quickly becomes outdated; software
abreast of rapidly changing technology. The internet constantly needs to be upgraded with versions
facilitates efficient upgrading of software. changing. As the software develops so your
hardware becomes obsolete.


Data – raw unorganized facts that need to be processed to be made useful.
Information – processed data in an organized, structured, and presented in a given context to make it useful.
Data Process Information
Processing power – a combination of speed, number of cores (processors), and number of instructions
processed per second. (Go to page 22-23 to learn table for different devices).

Operating Systems (2.5):
Every computer need to have an OS. An Operating System is a collection of many programs that manages
the hardware and allows the user to run software application.
Most OS have a kernel which is the smallest part of the OS that is always stored in memory. The core of the
OS, users do not have access to it. The kernel is loaded when the computer is turned on.
Desktop OS:
Acts as the interface between application programs and the computer hardware. Mac OS, Windows, with
come using versions of Linux (eg. Ubuntu).
Mobile OS:
They differ from desktop OS as they are designed to use the limited resources of the mobile device more
efficiently. Android, Kitkat, Lollipop, Nougat, Oreo. The apple family use iOS.
Embedded OS:
An embedded OS is a specialised OS for use in the computers built into larger systems and is typically more
compact than a desktop OS. Designed for real-time operations where data is processed immediately
without delays. Linux, and iOS.

Application Software (2.6):
Carries out tasks for computer uses.
Computer can function without it. RAM
Stand-alone or desktop applications:
A stand-alone or desktop application runs
on a computer without any need to interact
with any other software. The application Secondary storage
uses the hardware and OS of the computer
to perform its functions.

, Network Applications:
Is designed to run on multiple computers that are connected via a network. The network is classified as a
client-server network, where the server provides a service to the client computers (client is the local
computer). The server (very powerful computer) is a remote computer and can be on the local network or
linked via the Internet.

Data transfer and synchronising between devices (2.7):
▪ Is a process where the data on your desktop and mobile device are consistent. Same version of data.
▪ Mobile OS provide communication software to perform these functions. This communication is usually
via a USB port, using a cable, docking unit or cradle; wireless connections using the Internet.
▪ You can use your computer to backup data from your mobile device, transfer data between the two and
synchronise.
▪ The data transfer can be a two-way process. The synchronization management application can determine
if the data on each device is different and can provide options for which way to overwrite or not.
R350,00
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
lchellebester

Get to know the seller

Seller avatar
lchellebester
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
3 months
Number of followers
0
Documents
1
Last sold
4 weeks ago

0,0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions