CAT Theory Notes 2023
CAT Theory Notes 2023
98, 1978)
COPYRIGHT
This document is copyrighted under the (CC BY-NC-SA 4.0) licence. This
means:
• You may share, copy, and redistribute the material in any medium
or format.
• You may adapt, remix, transform, and build upon the material
freely.
Under the following terms the above-mentioned is permitted:
• You must give appropriate credit, provide a link to the license, and
indicate if any changes were made.
• You may NEVER use this document, or any material in this
document, for commercial purposes.
• If you remix, transform, or build upon the material in this
document, you must distribute your contributions under the same
license as the original document. [(CC BY-NC-SA 4.0)]
These requirements are subject to the Copyright Act Number 98 of 1978
in the Constitution of South Africa.
Computers in our
everyday lives
Page 1
Efficiency
• Time: Computers work faster and longer than humans.
• Labour: Computers don’t get tired.
• Resources: Computers can work more efficiently with resources. (Electricity, less
paper, etc.)
Accuracy
• If computers have access to accurate programs and data, it will be extremely
accurate.
• It's essential that the computer can produce accurate data constantly.
Reliability
• Computers are able to do complex tasks with extreme accuracy and without
getting tired.
Communication
The ability for computers to communicate, allow us to:
1. Virtually eliminate time and distance.
2. Share information in many different ways globally.
3. Save on communication *** costs.
Types of computer systems
4. Interact socially on an international scale.
Non-portable computers
They are large in size and are generally more powerful than mobile or portable
computers. They’re not meant to be moved around.
Example:
Desktop computers - most common type of non-portable computers.
Servers - a powerful computer used to provide resources and services to all the
computers that are linked in a network.
Portable computers
It is a smaller computer that was designed to be moved around. They have the same
traditional operating systems and hardware, but the hardware is designed to be
smaller. They also rely on a battery for power.
Example:
Laptop/Notebook - has a screen larger than 12" or 13". They can have the same
specs for a higher price.
Tablet - has a touch- or pen-sensitive screen.
Hybrid computer - they have reversible or detachable screens with a normal
keyboard. The screens are touch sensitive.
Smartphones - it's a cell phone with an operating system that has the ability to
run apps. It uses a touch screen interface.
Phablet - a smartphone with a screen size larger than 5".
Page 2
Personal users
These are users who use their computers for personal use. They typically use their
computers for:
• Limited office tasks.
• Internet banking.
• Email and web browsing.
• Social networking.
• Entertainment like gaming or playing music.
Power users
These are users who require a lot of power for their tasks. These users include:
• Gamers.
• Architects.
• Engineers.
Mobile users
Mobile users can fall under any of the above mentioned categories. These are
users who require their technology to be with them all the time. They normally
use their computers for:
• Browsing the Internet on the go.
• Playing games.
• Using GPS to navigate.
• Taking photos or videos.
This is the trend where separate technologies and functions are combined into one
single device. In other words, it's the merging or combining of multiple technologies
into a single, multi-purpose device.
Page 3
Hardware devices
Page 4
INPUT --> PROCESSING --> OUTPUT --> STORAGE OR COMMUNICATION
Keyboard
It's the most common input device.
Mouse
A pointing device Is essential to be able to use a graphical user interface (GUI) and the
mouse is the most commonly used pointing device.
Advantages: It's an easy-to-learn device and provides an effective way to interact with
the graphical elements on a screen.
Disadvantages: An entry level mask is generally not very precise or accurate when
used for creating or editing graphics.
Troubleshooting:
• If the mouse is sticking, meaning that it moves erratically or jumps on the screen,
make sure that you are using a clean, smooth, non-reflective surface.
• If the mouse is not responding, the batteries may need to be replaced if it's a
wireless mouse. You may also want to use a different port. If it's a wired mouse,
use a different port, unplug and plug it back in or reboot the computer.
Page 5
Touch screen.
It's the most common input device for mobile devices.
Touchpad
It's the most common input device on laptops.
Scanner
It's used to create a digital copy of a physical copy, like an image or page with text on
it.
Page 6
Digital Camera
It's used for capturing images.
Uses: It's used for capturing images and video. As barcode or QR code scanners.
Advantages: Photos are already in a digital format and hence don't need to be
scanned. They are generally easy to use. If the device has the GPS function, it will add
the location where the photo was taken in the metadata. This is known as geo-
tagging.
Disadvantages: You can easily lose the photos if the storage device or the computer is
broken. The quality of the photos rely on the quality of the camera.
For a digital camera: The number of horizontal and vertical pixels in an image. The
higher the resolution, the more storage space the image takes up.
• Image quality:
• Colour depth: The number of bits used to represent a single colour. (The higher
the bits, the better.)
• Sensor size: The bigger the sensor of a camera, the better the photo.
• ISO rating: The camera's sensitivity to light. (The higher the ISO rating, the
better.)
Webcam
It's used to have video/image input into your computing device.
Uses: They are mainly used for internet video communication, 'live feeds' of events,
and remote control of security cameras.
Advantages: They're cheap, small, and often built into (integrated) portable
computers.
Disadvantages: The resolution of most webcams are very low and hence don't take
good images.
Troubleshooting:
• An unresponsive webcam is normally not plugged in, not switched on, or not
selected as the camera that should be used.
Microphone
It's used to record audio.
Uses: They're used to record sound and to communicate. (E.g. VoIP or Conferencing.)
Advantages: They allow you to record verbal like a meeting, give voice commands, or
use software to edit, analyse or manipulate sound.
Disadvantages: Built-in (Integrated) microphones don't provide good quality audio
and they are difficult to use in noisy environments.
Troubleshooting:
• If it's not responsive, it might be plugged into the wrong jack or when the
microphone is muted.
Page 7
Monitor or Display
It provide a fast and easy way for the computer to communicate with the user.
Uses: They're used to provide interactive feedback to the user and to display extra
visual alerts for visually impaired people.
Advantages: They provide instantaneous feedback to the user and they allow for
interaction to take place between the user and the computing device.
Disadvantages: The quality of the display is related to the size of the monitor and its
resolution, it's not very portable and the output is difficult to share with others.
Troubleshooting:
• If the colours are weird (E.g. too dim, muddy, etc.), change the display settings
(contrast, brightness, etc.)
• If the image is blocky or stretchy the resolution settings are probably wrong.
• The image is tinted blue, purple, yellow or green - faulty/damaged connection.
Uses: They can be used to play sound, provide audible feedback to the user, and
listen to voice message and people through Skype, for example.
Advantages: Headphones allows you to listen to sound whilst not bothering anyone
else around you. Speakers allows a group of people to listen to the same sound.
Disadvantages: The sound quality relies heavily on the quality of the peripheral used,
you may also need additional audio equipment if you want to play audio for a large
amount of people, and it can also distract people who are not involved with what you
are doing.
Troubleshooting:
They may not produce sound if:
• They're not plugged into the right jack.
• Speaker might not have power/is flat.
• The sound on the computer may be soft or off.
• The computer may be using the wrong sound device.
Page 8
Printers
They're used to turn softcopies into hardcopies.
Troubleshooting:
If the printer is not working, check the following:
• It is plugged in and has power.
• It's properly connected to the computer.
• It's not low on ink or toner.
• You have the correct printer selected.
Page 9
3D Printers
It's used to create physical three-dimensional objects from designs on a computer.
Uses: They can create entire buildings and structures, make complete and assembled
mechanical parts, like gears. They can also make working human body parts.
Advantages: You can make prototypes of new designs to test them. You can print
parts as you need them and do not require you to keep a large stock.
Disadvantages: They are expensive and the materials used to create objects are also
expensive. 3D printers are slow and can be noisy.
Troubleshooting:
• There may be a problem with the 3D model, so you should check your design.
• There may be a problem with the eating element.
• There may also be something wrong with the material you are using.
Data Projectors
It's used in classrooms and boardrooms to present something to a large audience.
Uses: It's used to display large images of the display/monitor into a screen, wall or
other surface so that you can share the image with a large audience or group of
people.
Advantages: You can display an image to a large group of people.
Disadvantages: The resolution of the image that is projected onto the surface is not
as good as the one that will be displayed on a monitor. They have a lower contrast
ratio which will lead to muddier images with lower colour quality. The brightness of a
projector is much lower than that of a display.
Troubleshooting:
The problems that you might experience with a projector can be fixed in the same
manner as problems with a monitor. If not any of those, the lightbulb may be broken.
Page 10
Hard drive
It's the most commonly used internal storage device.
Uses: They store data and software permanently. It also acts as 'virtual memory' - it
allows the computer to have access to more RAM than there is installed by using free
disk space. 'Virtual memory' make a computer very slow if it's used too much.
Advantages over RAM: It has a larger capacity, it's cheaper per GB than RAM, and it
permanently stores all of the data on it, even if the power is switched off.
Disadvantages: They are easily damaged if they are dropped or bumped. They are
mechanical (they have moving parts) and are slower than electronic alternatives.
Troubleshooting:
• The storage space me be nearly full.
• If the system seems slow and unresponsive, the hard drive may be fragmented.
Make use of the defragmentation utility. (Electronic storage devices, like SSDs,
can't become fragmented.)
• If files are corrupt you may not have turned the computer off correctly.
Uses: It's like a normal hard drive, so the uses remain the same. It can also be used to
store backups of files.
Advantages: They have a large capacity, are portable, easy to use, have a high speed,
are very reliable and allows for extra storage to be added to your computer.
Disadvantages: They are not as small as flash drives. They have the same limitations
as normal hard drives
2.5" vs. 3.5":
• 2.5" drives are more expensive, have less storage space, and doesn't need
external power. (It uses power from the computing device where it is plugged
in.)
• 3.5" drives are less expensive, have more storage space, but requires external
power to work. (You need to plug it into a wall socket."
Flash drive
They are small, cheap portable storage devices.
Uses: They are used to carry data and software around with you, make backups, and
distribute data and software.
Advantages: They are portable, allow for fast data access, are cheap, have large
capacities, and are an industry standard.
Disadvantages: They are easy to lose and are easily stolen. They're more expensive
per GB than a hard drive and have lower capacities than hard drives.
Uses: They are used in the same way a hard drive is used.
Advantages: They are completely electronic and do not have ANY moving parts. They
are faster, quieter, and more energy efficient than hard drives.
Disadvantages: They are very expensive compared to hard drives.
Page 11
Optical media
CDs, DVDs, and Blue-ray.
Uses: They are used for distributing software, storing movies and music, and backing
up files.
Advantages: They are affordable, portable, and an industry-standard.
Disadvantages: They're slow, easily damaged, have relatively small capacities (CD -
700MB; DVD - 4.7 to 8.5 GB; 25+GB for Blue-ray.) Laptops and desktop computers are
not being designed with optical drives anymore.
Troubleshooting:
• Optical drives normally give problems when they are dirty.
• A scratched disk is difficult to repair and should normally just be replaced.
• Writeable and re-writeable discs can easily be damaged by heat or cold and this
damage cannot be reversed.
Page 12
Cellular modem
Most people make use of cellular data when they need to be mobile. An external
cellular modem looks like a flash drive and connects to a USB port, but it has a cell
phone SIM card that is used to access the Internet.
There are also cellular routers which has a space for a SIM card that allows the users to
connect to it wirelessly.
Advantages: They are easy to install and use and they make use of 3G/4G networking.
Disadvantages: They can be expensive to use and are easily lost or stolen.
Advantages: If you have an ADSL router, you can make telephone calls and make use
of the Internet using the same connection. Both an ADSL router and a fibre router
have built in switches. The Wi-Fi capability of a router allows you to connect
computers and other computing devices to the router wirelessly.
Disadvantages:
• With an 8 years all connection, you need to make use of a landline to be able to
use the Internet. Similarly with fibre, you also need a physical connection, which
makes use of tiny glass fibres. Hence, you can only use five or ADSL connections if
the company has laid the cables for it in your area.
• ADSL cable theft is unfortunately a very prevalent thing in South Africa as they
are made out of copper. Fortunately, fibre cables are not targeted in the same
manner as they are made out of glass and not any precious metal.
Virtual reality.
It is with the computer creates a whole new world for you to experience virtually.
Unfortunately, virtual reality is very expensive and some people still feel nauseous or
get sick when they make use of virtual reality sets because there is a slight delay
between your actual movement and the movement in the software.
Augmented reality.
It is the merging of the real world along with virtual objects to form one reality.
Page 13
Hardware
recommendations
Page 14
The system unit
The three most important hardware specifications are CPU, RAM, and storage.
CPU or Processor
It's responsible for all of the running of programs and processing of data.
Memory(RAM)
The RAM is the temporary storage area for running programs and data that is being
processed.
Notes: • RAM can be identified by other terms like: DIMMS, DDR3 or DDR4
RAM.
• If you want to use more than 4GB of RAM, make sure that you
have a 64-bit operating system.
Recommendations: • The more RAM a user has, the better. This is true for all users.
• Power users will need a lot of RAM.
Video card
It's a separate circuit board that plugs into the special slot on the motherboard, and it
has its own video memory and graphics processing unit (GPU) that improves video
processing.
Page 15
DVD Drive
It's an optical drive that can play, read and write optical media.
Notes: • DVD drives are less important than when the past because flash
drives and other drives like external drives. And the Internet on
our youth instead of optical media.
• Newer computers do not include DVD drives as they are not as
important anymore.
• In advertisements, DVD drives are normally shown or listed as
multi-drives. This means that they can read and write (or burn) to
both DVDs and CDs.
Port
It's used to connect to external devices to the computer.
Page 16
Devices that connect to the computer
Mouse and keyboard
These are the most common input devices.
Recommendations: • Most personal users using a flash drive is the quickest and
simplest way to transfer data.
• All users can have external hard drives as storage for music and
videos and to back up their internal hard drive.
• SOHO and power users have a need for large external storage
devices for storing their data.
Printer
Printers are used to produce hardcopy outputs.
Notes: • Purchase the printer that you feel will bring you the most use.
Also take note of whether or not it's wireless, whether it uses
toner or ink, and other previous discussed specifications.
Recommendations: • A SOHO user or even a personal user might consider multi-
functional printer that combines a fax facility, e-mail function
scanning and copying and printing all in one device.
• While not being designed to be mobile, mobile users may want a
mobile printer that works with batteries. However, these types of
printers offer up the quality of print for mobility.
Scanner
Image scanners capture images, whilst barcode scanners read barcodes.
Page 17
Devices for disabled users.
Visually impaired / Blind.
• Braille keyboard and Braille display or terminal.
• Magnification devices
• Large key keyboards
• Braille printers
Page 18
Accessibility.
• Remote surgery.
○ By making use of IT, it's possible for a specialist surgeon in South Africa to
carry out an operation on a patient in the Congo. The use of ICT increases
the patient's access to expert medical care and the surgeon 's access to
people who need their expertise.
• Distance education.
○ IT can allow a teacher to present a class remotely using real-time or
recorded video, online materials and exercises. This increases the access to
quality teachers and their resources.
Page 19
Software
Page 20
Web-based applications versus installed applications.
Advantages of web-based applications:
• You can use the software from any computing device in the world so long as you
have an Internet connection.
• The software is always up to date.
• You don't have to download or install the software, which means you save on
storage space.
• The hardware requirements of the computing device are generally lower for
using web-based applications.
• You don't have compatibility issues as the application is stored on the Internet.
• Many of the online apps also provide some free online storage space.
Subscription-based software.
With subscription software the user pays a monthly or yearly subscription fee for the
use of software.
Compatibility.
Compatibility refers to the ability of your software to work with the hardware and
software installed on your computer.
System requirements.
Before you buy software, make sure that you've checked the hardware and software
specifications or requirements needed for the new software to run properly on your
computing device.
Page 21
Office suites.
The most common component of an office suite is a word processor, spreadsheet,
presentation and database.
This serves as an alternative to buying individual applications.
Reference software.
Previously you bought encyclopaedias, dictionaries, atlases, and other reference work
on CDs or DVDs. Most of these have been discontinued and been replaced with the
same type of reference material that is now found on the web.
Web browser.
Web browsers allow you to navigate websites and view and also interact with the
content on them. Most web browsers have the ability to view content such as PDF
documents and multimedia such as animation, sound, and video.
In addition to all of this, you also have the ability to add extra functionality to the web
browser via add-ons or extensions.
E-mail software.
E-mail software allows you to receive mail, read it, reply to it, and create your own
messages.
Page 22
Software that enhances accessibility, efficiency, and productivity.
Voice recognition software.
Voice recognition software allows the computer to understand you when you talk to
it. It can fall into two basic categories: software that allows you to give the computer
commands and to dictate text, and secondly, the so-called virtual assistant.
Voice recognition software takes your speech and breaks it up into patterns for each
word you speak. It then searches for the patterns in a database and finds the words
which the patterns represent. All voice commands start with a specific command
phrase. If what you said starts with the key phrase, the software tries to match what
you said to one of the voice commands which then prompts a specific action. If
there's no key phrase found, then the software adds the words as a text in a
document.
Advantages:
• It's great for disabled users because it allows them to control their computer.
• It allows you to save time by dictating text instead of typing it.
• It is great for situations where you can't afford the distraction of looking at a
screen while typing.
Disadvantages:
• You may have to invest a lot of time and effort to train the computer to
recognize your voice correctly for the best results.
• Issues such as background noise or a poor quality microphone can have a
serious impact on the effectiveness of voice recognition software.
Note-taking software.
Note-taking software allows you to:
• Make handwritten notes.
• Keep handwritten notes, text, images, and other multimedia content in one
document.
• Use handwriting recognition software to convert handwritten notes to editable
text.
A MOOC (Massive Open Online Course) is a free course offered over the web and
aimed at large-scale participation.
Advantages:
• You can work at your own pace anywhere and anytime.
• You can be assessed immediately and given your feedback on your progress.
• You're motivated to learn by the immediate feedback and by competing against
yourself and others.
• Working with online content promotes green computing.
• You can work with others.
Page 23
Basic troubleshooting.
○ Freezing - Non-responsive tasks or applications.
○ When tasks for applications become nonresponsive, use the Task Manager
to close the frozen or hanging application.
• Software crash.
○ If the software crashes or causes the computer to reboot, reboot your
system and try again. Run the 'problem' software without loading any
other programs. Uninstall any programs that you have recently installed
and checked the online forums and help systems of the software company
to see if any other people have the same problem.
• Read-only files.
○ The file may appear as read only when you load it. This may be because it
was loaded from a read only medium, such as a DVD, and it's read only
attribute is set.
○ You can copy the file to another location and remove the read only
attribute.
○ Alternatively, you can simply open the file and save it under a different file
name or in a different folder.
○ You should be careful in the networking environment because a read-only
file may indicate that somebody else is currently working on that file.
User-centred design.
Another example of flawed software is when the user interface is poorly designed
and difficult to use. A user-centred design refers to designing the user interface so
that it's pleasing to the eye, easy to use, and also helps reduce input errors on the
user's part.
Page 24
System software and
computer management
Page 25
System software that controls all activities that take place in a computer. When a
computer switched on, the operating system must be loaded first to control all
activities.
Page 26
Utilities are programs that perform system maintenance and administrative tasks.
File management.
Naming files:
Term Explanation
File names. The file name consists of two parts, namely the file name followed
by a period and a three to five letter file extension.
File extensions It identifies the file type of format and it's automatically added by
and file types. the program when you save the file.
Path. It's the succession of folders that leads to the location of a specific
file.
Scheduling.
Schedulers program that is used to run certain programs at specific times.
Advantages of using schedulers:
• They automatically check for updates.
• They can be set to automatically perform certain routine housekeeping tasks.
• We can set schedulers to run at off peak times (When we're not using our
computers).
Printer Management.
When we print a document or any other type of file, it becomes a 'print job'. These
print jobs or tasks are temporarily sent to disk until the printer is available to print
them. This process of sending the print tasks to the disk is known as 'spooling'.
Page 27
Backup
The reasons why we need to back up our files:
• Files can be accidentally overwritten or deleted.
• Hardware failures such as disk drive crashes can occur.
• Devices can be stolen.
• Natural disasters can destroy hardware.
• Files can become corrupted by power fluctuations.
• Files can be deleted, encrypted, or corrupted by viruses.
Backup software:
Most operating systems provide backup utilities. These utilities have the advantages of
allowing you to:
• Schedule when to back up the files.
• Choose to do a full backup of all the files or just those that have been changed
since the last backup.
• Encrypt backups to prevent unauthorized access.
• Compress the files to save space on the backup media.
Backup tips:
• Use software that automatically manages your backup processes so that backing
up is not a task that you have to do manually.
• Only back up data, and not programs.
• Back up your files onto external portable media.
• Don't leave your backup drive permanently connected to your computer.
• Keep the backups off-site in case of theft or disaster.
• Consider using cloud storage services.
• Check the backups are actually working by restoring some of the files from the
backups from time to time.
Access control.
In order for malware to work, it has to be installed onto your computer. Access control
means that the operating system specifically ask you for your permission before any
software can be installed.
Firewall.
Firewall acts as a barrier between your computer and the Internet. It checks which
programs are trying to access your computer via the Internet or trying to access the
Internet from your computer. It can consist of hardware, software, or a combination of
the two.
A firewall physically prevents software from accessing the Internet without your
explicit consent.
Page 28
Memory (RAM)
If the memory is full, parts of the data or programs that the computers are currently
busy with are temporarily stored in an area on the hard disk. (This is known as virtual
memory.) These have to be loaded back into memory again when they are needed. This
slows down the computer as accessing the disk is very slow compared to accessing the
memory.
Processor (CPU)
• The speed.
○ The higher the speed of the CPU the better it will perform.
• The number of cores.
○ More than one physical processor can be included in a single chip. Each core
is a complete processor that can work independently of any other core on the
CPU chip. More cores make the computer perform better.
• Cache size.
○ Cache memory is a type of special, high-speed memory used for recently or
frequently accessed data. The larger the cache memory on the CPU, the faster
the CPU will perform as the cache memory can then contain more data.
SSDs can also get fragmented, but because they are electronic rather than magnetic,
fragmentation has virtually no effect on their speed.
Influence of malware.
Malware can slow down your computer by using resources such as free memory and
hard drive space. In addition, spyware can slow down your Internet connection if it
frequently connects to the Internet. Your computer can also become a 'zombie' without
your knowledge, which also slows down your computer.
• Disk scanning.
○ This utility comes included with all operating systems and can be used to
check a drive for errors and 'bad sectors' and then tries to fix them.
• Disk defragmentation.
○ It's a software utility that reorganizes parts of files and speeds up your
computer.
• Disc filling up.
○ The Disk Cleanup utility makes more storage space available by removing
temporary files downloaded from the Internet and temporary files created by
Windows. It can also be used to uninstall programs that you don't use or use
seldomly.
Page 29
Internet connections and
services
Page 1
The Internet: is a worldwide computer network consisting of computers, devices and
networks that are linked using some sort of communication medium (Telephone
lines, fibre cables, undersea cables, satellite, etc.)
WAN (Wide Area Network): It's a computer network that covers a large geographical
area.
Page 2
Wireless Connections - Cellular Technologies
Connecting to the Internet wirelessly can be done by using an existing cellular network.
This method offers Internet connectivity without having to install ADSL or fibre which then
in turn allows you to have mobile Internet access.
You can also use your smartphone or tablet as a personal Wi-Fi hotspot.
Advantage:
• You can have mobile Internet access.
Disadvantage:
• When the signal of a cellular device is low you will have slow or no Internet access.
• You never escape communication which can result in information overload.
• You might need to limit the amount of data you use.
Page 3
Real-time messaging
It's the online exchange of messages in real time, which includes instant messaging
and chats.
Advantages:
• It's cost effective.
• You can chat to more than one person in real time.
Disadvantages:
• You have no way of confirming that a person is who they say they are.
• It opens the opportunity for cyber bullying and stalking.
Advantages:
• They are cheaper than normal calls.
• It's generally free.
• You can also transfer files or make video calls.
Disadvantages:
• You must have Internet access.
• Both users must use the same software.
• A slow Internet connection may cause the call quality to be poor.
Video conferencing.
It allows two or more people to hold an online conference.
Advantages:
• You can physically see someone.
• It's cheaper than conventional calls and travelling.
Disadvantages:
• The video and audio quality may be poor if you have a slow Internet connection.
• It can use a lot of data, especially if you use video.
Cloud computing.
It's the sharing and use of resources and applications offered as a service over the
Internet.
E.g. Google Drive, Gmail, Amazon and Google.
Advantages:
• The software is always up-to-date.
• You don't have to download or install the program.
• You can access your data from anywhere so long as you have an Internet
connection.
• The application does not take space on your local storage..
Disadvantages:
• For you to be able to use it effectively, you must have a false and reliable Internet
connection.
• You may have to pay a monthly fee.
• Cloud computing might be slower than your computer.
Page 4
Online storage
It's the storage of files on a computer server on the Internet, that is accessed by the user via
a folder.
Advantages:
• It automatically backs up files.
• You save space on your local hard drive.
• It's an effective and cost efficient way to store and transfer files.
Disadvantages:
• The allocated amount of storage may be small if you are using the free version.
• If you have shared a folder with someone, they can accidentally delete it.
File sharing.
Here are ways in which files can be shared:
• E-mail: You can attach documents to the e-mail message.
○ Advantages:
It's inexpensive.
It's a relatively fast method.
○ Disadvantages:
It's not suitable for large files.
It may block potentially dangerous file extensions.
It's very inefficient when sharing files with a lot of people.
• FTP (File Transfer Protocol): It's the protocol used for fast and easy file transfer between
remote computers over the Internet.
○ Cloud storage have taken over this function for users.
Grid computing.
It's a system whereby the resources of many different computers are combined and used
for one purpose.
Purpose: It's normally used for scientific or technical applications that require a large
amount of processing power.
Advantages:
• It's a cost effective solution.
• It saves resources by using the processing power of idle computers.
Disadvantages:
• A fast network connection between the computers are crucial.
• Malware can spread very easily.
Advantages:
• This improved communication between the government and the citizens.
• Immediate feedback is provided from the government.
Disadvantages:
• The digital divide.
• The initial cost to develop this is expensive.
Page 5
The dangers of computer
crime
Page 6
Social engineering: It refers to the use of deception to manipulate someone into
giving out confidential information or into giving criminals access to their computer or
premises.
Malware (Malicious software): It refers to any software that is written with negative
intention.
• Phishing: It refers to attempts to trick the user into giving out personal and
confidential details.
• Pharming: It's a scamming practice where the user is automatically redirected to
another fake website.
• Click-jacking: It's an attack in which a site appears to do one thing, but your
clicks are actually redirected to do something else.
• Spoofing: It's the forgery of an e-mail header so that the e-mail appears to be
from a different origin.
• Spyware: It refers to any technique or software that tries to monitor and track the
way you use your computer.
○ Keylogger: It's a type of spyware that records your keystrokes as you type in
an attempt to discover your usernames and passwords.
• Virus: It's malware that is written to disrupt the normal functioning of a person's
computer.
• Worm: It's malware that is able to distribute itself over a network.
• Trojan: It's a destructive program disguised as a useful application.
• Ransomware: It's malware that encrypts data until you pay the hacker.
• Adware: It's software that downloads onto your computer and bombards your
computer with adverts.
• Bots or Zombies: It's a computer that has been compromised and can be
controlled remotely when it is connected to the Internet.
Harassment.
This is when you are continuously bothered by messages or data that you do not want to
receive.
A few examples:
• Cyberstalking.
• Spam.
• Cyber bullying?
• Uploading unauthorized pictures on the web.
A few examples:
• Attacks on businesses that cause problems with conducting business online.
• The tack on websites which deface the website.
• Cyber terrorism that attacks parts of countries IT infrastructure.
• Denial of service (DoS) attacks - When thousands of compromised computers
(Bots/Zombies) flood a server with requests for information.
Page 7
Computers and theft.
• Bandwidth:
○ This is the act of stealing somebody else's bandwidth.
○ It's done by obtaining usernames and passwords for accounts and connections
that are not theirs.
• Identity theft:
○ Identity thieves collect data that can be used to pretend that they are someone
else.
○ The data that they collect is anything that can be used to confirm their fake
identity in the cyberspace.
• Data/Intellectual property:
○ Data can be stolen in many ways:
Social engineering techniques.
Physically copying data onto an external drive.
Intercepting the communication channels.
• Money:
○ In general, money is normally stolen using a social engineering technique or
something like a keylogger.
○ However, some criminals do use card skimmers.
A card skimmer is a device that reads magnetic data from your bank card
and is accompanied by a video camera at an ATM that captures your card
details and PIN as you enter it.
The criminals then use this information to withdraw money from your
account.
○ Another way of money being stolen is with Internet scams.
"Get rich quick" schemes.
• Copyrighted material:
○ This is when intellectual property (like movies or games) are copied or pirated
without being paid for.
Page 8
Software to help protect your computer.
• Antivirus software:
○ Software that scans files for different types of malware and eliminates it.
○ They use signatures and definitions of malware to detect the signs or traces
of that specific malware-type, on your computer.
• Firewall:
○ It acts as a barrier between your computer and the Internet.
Precautions.
A small list of some precautions you should take:
• Be careful when installing free software from the Internet.
• Make sure to check websites for their security.
○ The URL starts with an S.
○ There is a small lock pad that is locked.
• Have strong passwords.
• Don't give up personal information.
• Don't click on popups.
• Don't perform financial transactions on public computers.
Page 9
E-communication
Page 10
Electronic communication or digital communication refers to all forms of
communication via electronic means.
• E-mail: It's the composing, sending and receiving of messages electronically over
a network.
○ Calendar:
It's used to set reminders about events, birthdays, or other
appointments.
○ Tasks:
This allows the user to add tasks to a to do list to remind them of stuff.
○ Contact list:
Also commonly referred to as an address book or contact list. It's
feature where you store the e-mail addresses of people you want to e-
mail.
○ Archiving:
It allows you to tidy up your inbox by moving messages from your inbox
to the archive folder.
• Social networking sites: This is where individuals and organisations can post their
likes, dislikes, interests, comments, etc, for their friends.
○ People use social networking sites for the following reasons:
Staying in touch with family members or friends.
For advertising and marketing.
To connect with other people who have similar interests as you do.
To spread awareness and news.
• Blogs/Vlogs: A blog is a website that is updated regularly with news and events in
chronological order. Vlogs are a form of blog which uses video as the medium.
• Podcasts: It's an audio file that is made available to download for free or to
purchase over the Internet.
○ A vodcast includes video clips or photos along with audio.
• Wikis: It's a website that allows for the collaborative editing and creating of
content of web pages.
Page 11
Web browser: It's a software application that allows one to navigate, view and interact
with content on the web.
• Bookmarks or favourites:
○ This option allows a user to store shortcuts to the web page they frequently
visit.
• History:
○ This option allows you to find the web pages you have previously visited.
• Pop-up blocker:
○ A pop-up is a small web browser window that appears on the top of the
website you are viewing. They are usually created by advertisers.
○ Pop-up blockers are found on most web browsers. You can choose to
minimize or completely block pop-ups.
○ Some websites like banking websites make use of popups, so blocking all of
them is not a good idea.
• Blocking websites:
○ This feature allows you to block a certain website or a specific type of
website.
○ You're able to use different types of filters to block a large genre of websites.
• Cashing:
○ When you've recently visited a website, you will store a version of that
website locally on your disk.
○ When you revisit the website, it will read this version that you have saved and
check if it has any changes.
If it doesn't have any changes, it will load from your disk.
If it does have changes, it will load from the Internet.
○ This is done to speed up the process of accessing a website.
Page 12
The most important trends in e-communications are the following:
• Mobile connectivity.
○ Access to the Internet on the go.
• Digitization of media.
○ Physical products like newspapers or magazines are being replaced with
digital versions of those.
Page 13
The impact of
technology
Page 14
Here are a few ways in which technology has an impact on the global community:
• Telecommuting is possible.
○ Workers can now communicate with other workers and their employers via
electronic means.
○ Because of this, businesses are able to save a lot more money since they do
not have to have 300 employees in one building since more than half of
them can work from home.
Page 15
General characteristics of social networking services include the following:
• They are free.
• They require the user to register.
• The encourage people to get as many other people to join.
• They can make money by gathering information about users and selling that to
third parties, or by using targeted advertising.
Twitter.
It's a microblogging service. 'Micro' is used to describe this service because you aren't
allowed to type more than 280 characters per tweet. Twitter is considered to be a very
powerful news service.
Facebook.
It's a free social networking service that allows people to connect and keep in contact
with friends and family.
Social media has made it extremely difficult for governments and other organisations to
censor and control the flow of information to the extent that they used to be able to. In
turn, this allows for a more democratic world.
Virtual communities.
It's a group of people gather online to share ideas and interests.
Google+.
This is Google's attempt to offer social networking services. Google+ was shut down in
2018 after a security flaw was discovered that led to a huge data leak.
Pinterest.
It's a site that acts like a virtual public pinboard. It doesn't have much constructive social
value, but it is very valuable since it is a great place for people to look for creative ideas or
entertainment.
Page 16