100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Samenvatting

Summary Full In-Depth CAT Notes Grade 11 and 12

Beoordeling
5,0
(1)
Verkocht
6
Pagina's
78
Geüpload op
06-10-2024
Geschreven in
2024/2025

Full In-Depth (Computer Applications Technology) CAT Notes for All Sections. It includes tips for use to effectively use these notes and contains all information needed for the Grade 11 and Grade 12 IEB syllabus. It gives an outline on all topics listed in the IEB SAGS (Subject Assesment Guidelines) Document and therefore is perfect for any school on the IEB syllabus and is the best notes for covering all topics and information needed for the Final Grade 12 IEB Exam. It contains: - Hardware - Software - Network and Internet Technologies - Computer Systems - Social Implications - All Abbreviations (at the end of the document).

Meer zien Lees minder
Instelling
Vak











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Vak
Schooljaar
200

Documentinformatie

Geüpload op
6 oktober 2024
Aantal pagina's
78
Geschreven in
2024/2025
Type
Samenvatting

Onderwerpen

Voorbeeld van de inhoud

COMPUTERS
APPLICATIONS
TECHNOLOGY

FULL NOTES
GRADE 12




1

, Table of Contents


TIPS FOR USE ....................................................................................................................................................... 6

THE INFORMATION PROCESSING CYCLE ................................................................................................................ 7

MODULAR DESIGN ............................................................................................................................................... 7

SYSTEM UNITS ..................................................................................................................................................... 8

SECONDARY STORAGE ....................................................................................................................................... 12

PRIMARY STORAGE VS SECONDARY STORAGE .................................................................................................... 16

INPUT DEVICES .................................................................................................................................................. 16

OUTPUT DEVICES ............................................................................................................................................... 21

WHAT MAKES IT ALL WORK? .............................................................................................................................. 24

UPGRADE VS. REPLACE....................................................................................................................................... 24

TROUBLESHOOTING HARDWARE PROBLEMS ...................................................................................................... 25

HARDWARE THEFT AND PROTECTION ................................................................................................................. 28

DIFFERENT COMPUTER TYPES ............................................................................................................................ 28

CATEGORIES OF USERS ....................................................................................................................................... 31

INPUT AND OUTPUT FOR PHYSICALLY CHALLENGED USERS ................................................................................. 32

INPUT AND OUTPUT HEALTH ISSUES .................................................................................................................. 32

GREEN COMPUTING ........................................................................................................................................... 33

UNINTERRUPTIBLE POWER SUPPLY .................................................................................................................... 33

NEWER TECHNOLOGIES ...................................................................................................................................... 33

APPLICATION SOFTWARE VS SYSTEM SOFTWARE ............................................................................................... 35

THE OPERATING SYSTEM .................................................................................................................................... 35

THE INTERFACE .................................................................................................................................................. 35


2

,THE DESKTOP ..................................................................................................................................................... 35

OTHER WINDOWS COMPONENTS....................................................................................................................... 36

INTEGRATED SOFTWARE .................................................................................................................................... 37

LICENSING AGREEMENTS ................................................................................................................................... 37

PROPRIETARY SOFTWARE .................................................................................................................................. 37

FREE SOFTWARE ................................................................................................................................................ 37

TYPES OF APPLICATION SOFTWARE .................................................................................................................... 38

TYPES OF SYSTEM SOFTWARE ............................................................................................................................ 39

WINDOWS SECURITY SCREEN ............................................................................................................................. 39

TASK MANAGER ................................................................................................................................................. 40

SAFE MODE ....................................................................................................................................................... 42

SOFTWARE INSTALLATION ................................................................................................................................. 42

STEPS WHEN INSTALLING SOFTWARE ................................................................................................................. 43

UPDATING YOUR SOFTWARE ............................................................................................................................. 44

UNINSTALLING SOFTWARE ................................................................................................................................. 44

COMPATIBILITY ISSUES ...................................................................................................................................... 45

SOFTWARE BUGS ............................................................................................................................................... 45

FIXING SOFTWARE PROBLEMS............................................................................................................................ 46

TROUBLESHOOTING USING UTILITY SOFTWARE .................................................................................................. 46

BACKUP AND RECOVERY .................................................................................................................................... 48

SOFTWARE FOR PHYSICALLY CHALLENGED USERS ............................................................................................... 48

ARTIFICIAL INTELLIGENCE (AI)............................................................................................................................. 48

FILE MANAGEMENT ........................................................................................................................................... 49




3

, FILE NAMES ....................................................................................................................................................... 50

FILE SEARCH....................................................................................................................................................... 51

FILE CONVERSION .............................................................................................................................................. 51

SMALL NETWORKS ............................................................................................................................................. 52

LARGER NETWORKS ........................................................................................................................................... 53

SETTING UP A NETWORK .................................................................................................................................... 53

HARDWARE ....................................................................................................................................................... 54

CONNECTION METHODS .................................................................................................................................... 55

NETWORK TOPOLOGIES ..................................................................................................................................... 56

BASIC NETWORK SECURITY ................................................................................................................................ 58

ETHICAL USE OF NETWORKS ............................................................................................................................... 58

THE INTERNET .................................................................................................................................................... 59

INTERNET SERVICE PROVIDERS (ISP) ................................................................................................................... 59

CONNECTING TO THE INTERNET ......................................................................................................................... 60

1. FIXED INTERNET ACCESS.............................................................................................................................. 60

2. MOBILE INTERNET ACCESS – CELLULAR TECHNOLOGY .................................................................................. 60

INTERNET SERVICES ........................................................................................................................................... 62

THE WORLD WIDE WEB (WWW) ......................................................................................................................... 66

BROWSING AND SEARCHING .............................................................................................................................. 67

INTERNET BROWSER FEATURES .......................................................................................................................... 68

SURFACE, DEEP AND DARK WEB ......................................................................................................................... 69

CRYPTOCURRENCIES .......................................................................................................................................... 70

COMPUTER CRIME ............................................................................................................................................. 70




4

Beoordelingen van geverifieerde kopers

Alle reviews worden weergegeven
2 maanden geleden

5,0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
shivaanharipersad N/A
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
39
Lid sinds
1 jaar
Aantal volgers
4
Documenten
15
Laatst verkocht
2 maanden geleden

4,9

14 beoordelingen

5
13
4
1
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen