Tech Mind Maps for Students
Tech Mind Maps for Students
APPLICATIONS
TECHNOLOGY
MIND MAPS
The information in these mind maps is supposed to supplement the textbooks, not
replace it.
Although the author has made every effort to ensure that the information is correct,
the CAPS document must still be consulted as the primary guideline.
1
Input
•give input to the
computer. Without it,
the computer does
not know what to do
Processing
• the internal process
Communication where the computer
•many times you share processes data so that
the output you saved what you requested
with other people can happen (e.g.
through e-mail etc. sorting, searching for
something on the
Information
computer)
Processing
Cycle
Output
Storage • what the computer
• to store the output gives back to you
permanently, you after the processing.
store it on a hard Normally 'soft' output
drive or a flash disk on the screen or 'hard'
output on printout
ICT refers to technologies that provide access to information through telecommunications (such as the
Internet, wireless networks, mobile phones and other communication media)
2
HARDWARE For blind people - braille keyboards, microphone
(peripheral) Accessibility
For visually impaired/motor skills - keyboard with big
buttons
Keyboard (wired
Most common input device on computers, fast way to
& wireless/ Physical keyboard
input large amounts of text
bluetooth)
Advantage: can have a larger screen on device because
keyboard does not take up permanent space.
Touch screen's pop-up keyboard
Disadvantage: sometimes appears on top of content
that you need to select.
applicable to keyboard)
Joystick, Steering wheel, Often serves as input and has some haptic output
Gaming devices
Controller (Xbox/Playstation) feedback (e.g. feel vibrations)
3
HARDWARE
(Peripheral)
Represents numbers/words that can be looked up in a
database. Used in POS system (point of sale) - for
Barcodes (uses light rays/ optics)
improved accuracy and speed (ensure that you can
describe the flow)
Magnetic card readers (bank card) For security - much safer than password (cannot lose /
- OTM / paypoint forget it)
4
HARDWARE Circuit board that connects all components and parts of the
computer with each other
(components) Motherboard
Contains a couple of slots for additional cards like sound and
graphics cards
Capacity measured in GB
(usually between 4GB and 32GB in computer)
Has its own Video RAM and GPU (Graphics processing unit) thus
Graphics card better performance since the load is taken off the system
CPU & RAM
6
HARDWARE
Speed: ppm - pages per minute
General Printing queue - temp storage area where the print jobs wait in line
Spooling - the process of sending print jobs to the queue & the printer
paper
Fault can lie in the printer queue - print tasks that were stopped or
paused
Advantage: saves cost & space because all the devices are in one.
Multifunction (print,
Disadvantage: if 1 breaks and is sent in for repairs, all the other functions
scan, copy, fax, email) are not available
Inkjet (mostly home Ink is relatively cheap but cost per page is expensive
use)
Slow printing speed
New type: inktank printer - now works out much cheaper than
traditional inkjet printers
Prints duplicates
Dotmatrix
(e.g. pharmacists) Low resolution quality - low cost
7
Memory cards for
extra storage space Micro SD, Mini SD, SD,
in e.g. smartphone CF, MMC
or digital cameras HARDWARE
(needs card reader Capacity ranges
for copying to between 4GB - 128GB
computer)
Advantages: cheap
storage media (ideal
Capacity: the
for archiving), read-
only maximum
Disadvantages: amount that
Damages easily, slow something
CD, DVD, Blu-Ray
Optical media read/write speed,
Smallest -> Largest capacity
cannot store a lot of can contain
data (small capacity)
Micro-USB's are
USB Hub for Copying contents off a
used for e.g.
additional USB ports protected disc is
smartphones
referred to as "ripping"
Ideal for portable a disc
Flash disks storage - larger
(electronical - flash capacity than
memory) CD/DVD, fast
read/write speed, does
Storage devices
Characteristic:
Stable/non-volatile: keeps
contents without power
HARDWARE Ultrabook
No optical (DVD) drive
Laptop/Notebook
Thin & light = expensive!
Types of Multi-purpose Devices
Tablet-PC / Laptop and tablet in one (touch screen that can
Hybrid / 2-in-1 be taken off / turned around)
Phablet
Bring Your Own Device refers to a concept where
employees/students can bring and use their own
make calls
portable devices such as smartphones, laptops,
Work station (very Used by e.g. scientists / architects / video editors (not
Not portable
strong computer) the same as network workstation)
tasks)
Can keep your eyes on the road more than you could
with a printed map
Only 1 purpose
Resolution measured in
The higher, the better,
Megapixels (MP)
but takes more space
Note: Mega = million
9
HARDWARE Ergonomics
The design of devices / items
to fit to humans natural form
E.g. Chair with good backrest / table with right
height / vertical mouse / curved keyboard
Definition: Environmentally
Switch off when not in use or sleep/hibernate
friendly use of computers
Green computing
Print 2 per page, back to front, check print
Save paper preview, distribute electronically
10
HARDWARE & SOFTWARE
Using technology to create a simulation of a
Definition 3D-environment that can be interacted with a
person in a seemingly real or physical way.
11
SOFTWARE Graphic user interface
(graphical way for people
Menus, Icons, drop down lists
to interact with the
computer)
Control basic security (logins)
Operating system also E.g. Windows 10 (paid)
referred to as 'platform' E.g. Linux (OSS)
E.g. Android (smartphone) File management (folders, file extensions etc.)
Adds pieces of files that are spread over the whole HDD
together again to improve SPEED.
Not necessary for an SSD.
Utilities
Defragmenter
Can slow down computer speed (performance) while
when it does not come scanning
with the operating
system, it is a Schedule tasks to happen automatically at specific times
third-party utility Scheduler of the day or tasks the user may forget (e.g. updates /
defragmenting)
Put potentially harmful / Quarantine: Safe area on hard drive where virus cannot
malicious software in harm anything - allows you to choose or remove
quarantine something
Games
Sound (.mp3, .flac, .wav)
Remember metadata?
Free, may share and use freely Information about a file
Freeware
e.g. Adobe Reader
– e.g. author, last
printed, type of camera,
Can be used free for a while
Shareware (trial software music genre etc. Differs
(test period), then pay or lose
also falls under this) (some or all) functionality depending on file type
13
SOFTWARE Try to prevent bugs
Releases a test version namely 'Beta'
version
14
NETWORKS
Can share resources like printers and Internet access
Advantages
Share of software and / or updates
Features
Requires good security (so unauthorised users can not access confidential
information)
an AUP is signed
Includes what may and may not be done on the network, forms of online
communication allowed, amount of data that may be used, use of flash sticks,
procedures for problems like identity theft, viruses etc., tips to prevent
copyright infringement and plagiarism.
(no cables)
LAN - Local area network -
WLAN - Wireless LAN
more computers in 1 room Additional disadvantages:
Security risk is extra high for hackers
Can use up internet data if others
WAN - Wide area network -
*Decryption: Reversal of gain access
E.g. Gauteng
above process by person Signals can be disrupted
Can be slower than cabled network
authorized to receive data. due to obstructions like walls
GAN - Global area network -
e.g. Internet world wide
15
NETWORKS File server Controls which sites may be
visited
each other)
16
INTERNET Can it use it anywhere you go BROADBAND =
Cellular (any connection 3G (older, between 1 - 8Mbps) High speed data transfer
using a SIM card) 4G / LTE (newer, between 10 - 50Mbps)
Technologies 5G (newest, between 50 - 500Mbps)
Capped / uncapped Amount of data that you can upload and download in a specific period
data (ADSL & Fibre = monthly packages)
Companies can prioritise which services can get full speed according to
their own needs
17
INTERNET Cheaper than regular calls (only uses
data)
INTRANET is shared content that is Can make calls wherever Internet access
only accessible to members of a single is available
VoIP = Voice over Internet
organisation. Protocol e.g. Skype
(can send video & audio) Available on different devices like
EXTRANET is a private network that computers & smartphones
uses Internet technology and the Instant messaging (WhatsApp,
Facebook Messenger, Video usage can use a lot of data
public telecommunication system to
Hangouts, Skype chat) (especially with a high resolution
securely share part of a business's webcam)
information or operations with
suppliers, vendors, partners, Fax to email Disrupting if poor internet connection
causes call to pause / disconnect
customers, or other businesses. An
extranet can be viewed as part of a
Grid computing: Using multiple Use of programs through a web browser
company's intranet that is extended to - runs and is installed on Internet servers
computers' processing
users outside the company. power to solve 1 problem instead of on own local computer
(as if it were 1) e.g. SETI
Saas - Software as a Service - where you
pay a monthly/annual fee and receive
FTP = File transfer protocol - the software as a service on the web
share of large files over a long
distance through the Internet
No installation/updates required
18
To: to whom the e-mail is addressed
INTERNET
CC: other people who are being copied to take note - everyone can see each other's email
addresses
BCC: people who are copied but cannot see each other's addresses (Netiquette - BCC people
when emailing a group)
RE: an email reply automatically gets this prefix in front of the subject
Flags/Tasks: you can add emails (or your own items) to a task list in the email software, specifying
due date and even set reminders
Internet Services
Registrations for new sites / services are usually done with an email address or Social network
Registration account. A CAPTCHA is then also asked to verify that it is a human attempting the registration,
and not a computer (which would probably be a DDoS attack).
Definition: Online service or technology that allows people with similar interests to communicate
with each other regardless of time or distance
E.g. Facebook, Twitter, Instagram. Often use a URL-shortener service to shorten URL's before
posting to social media (no problems with character limitations and just looks neater)
Benefits: Allow groups to create virtual communities or pages for businesses/famous people, etc.
Huge audiences to share your life with
Can inform family members/friends about your life
Social Businesses can place cheap and targeted ads and
networks interact with their customers
Audio file downloaded from the Internet that can be played on computers or devices such as
Podcast
smartphones e.g. with radio programs/training etc. (Vodcast - when it includes video)
Interactive meeting or seminar. The content is usually education-based. The audience is usually
Webinar
smaller and takes part in the conversation through surveys, Q & A etc.
19
INTERNET Encripted connection is
indicated with https - don't do
www.[websitename].
transactions on public
Web address = URL [organisation].[location]
computers
E.g. www.hsrandburg.co.za
Research seller's reputation
Portal - access point to looking at gradings and
many at www reviews before first purchase
20
INTERNET Definition
Very large structured (clean data) and unstructured (e.g. free text
tweets/reviews) data sets that are analysed using computers to reveal trends.
Purpose Reveals patterns and trends relating to human behaviour and interactions
To optimize and improve lives. E.g. shopping habits, health risks and indicators
Big data Uses
of serious illnessess.
Privacy concerns
New Trends The trend whereby all sorts of objects and devices are increasingly being
Definition connected to one another via the Internet, communicating independent of
human interaction.
Sensors in devices produce data (see big data) that can be used for diagnostics
Purpose
and running systems more efficiently.
Internet
New Trends
of
Devices can communicate without human intervention to automate and
Things Uses improve processes and reporting, e.g. heartrate monitor in smartwatch triggers
alarm when your sleep cycle is at its lightest
Send money anywhere in the world at any time - no limits. Decentralised from
Purpose
banks and governments so no interference and minimal 'bank' charges.
Bitcoin Bitcoins can be exchanged for other currencies, products, and services. They
have caused concern in that they are often used for payment in criminal
Uses
activities such as ransomware demands. However, more and more legitimate
companies are accepting them as a means of payment.
Not very widely accepted yet. Bitcoin wallets can be lost. Currency is extremely
Limitations
volatile.
A form of education and training delivered and conducted via the Internet
using mobile devices, such as tablets and smartphones. It is designed to be
Mobile or M-learning
flexible, allowing learners/workers/students access to education anywhere,
anytime.
21
Use headings, short paragraphs,
INTERNET columns
theme
Layout
Text and graphics should fit on a
How different elements standard screen
are placed
22
NETWORKS / INTERNET
Hoax: something distributed with the intention to deceive - usually false, sometimes
Safe usage
Scam: a misleading, dishonest offer/action e.g. a false online shop that steals your
money and doesn't send you the product
Phishing: a scam where an Internet user is tricked (e.g. by deceptive email message)
Be aware of: into revealing confidential info (usually on a fake website looking like the organisation's)
which the scammer can use for identity theft or fraud etc.
Spoofing: faking an email header to look like it came from someone else. Often used in
phishing & spam to get people to trust the origin.
Identify security gaps in an ICT system (also get ethical hackers - they get hired to test
Hacker (white hat)
security systems)
Criminal
Cracker (black hat) Identify security gaps and use it for criminal purposes
Many connected "bots" that include worms, trojans, spam, etc. Spread with other
people's infected computers (single: bot/zombie) over the Internet without them being
aware of their computers being used
Botnet
Commonly used for a DDoS attack where masses of useless data or requests are sent to
a network or computer. This can reduce the speed drastically or crash the entire network.
The illegal use of someone else's personal information (such as ID number) especially in
Identity Theft
order to obtain money or credit
23
NETWORKS / INTERNET
Sniffer attack: small program that can read data packets over a
network
24
INFORMATION MANAGEMENT
Is the author / organisation reliable
Is this objective?
Printed media e.g. books
More up to date
Gather data
25
INFORMATION Made for / focuses on
calculations / functions /
MANAGEMENT numerical data
Types: pie (to compare parts of a
whole),
Spreadsheet Large variety of graphs column (compare things between
(note Access also has graphs) different groups),
bar (when labels are long)
line (track changes over time)
Research / Data presentation / analysis
26