ICT - Theory
Page 3 backlinks
Chapter 1 - Components of a Computer
System
CPU:
Brain of Computer
Commands all functions in the computer
Intel and AMD Manufacture them
Memory Types:
RAM (Random Access Memory)
ROM (Read Only Memory)
RAM ROM
Random Access Memory Read Only Memory
Temporarily Stores Can only be read
Instructions
Volatile - If computer is Non-Volatile
offed, memory lost
Stores data for software Holds boot up
running currently in the instructions to start a
computer computer
Cache :
Fastest Memory
Holds Normal used Data
Stores data from RAM
External Hardware : Hardware Present Outside the CPU
Case
Internal Hardware : Hardware Present Inside the CPU
Case
Parts and their Function :
CPU : Carries out System Instructions
Motherboard : Connects main components of the computer system
Graphics Card : Device attached to Motherboard to help with graphics
Sound Card : Enables computer to input and output sounds
Internal Hard Disk : Stores info like files
Network Card : Connects computers together.
Types of Software: (Set of Instructions run in a computer
system)
Application : Apps created to do specific Tasks
System : Controls Hardware Devices (OS, Complier, Anti-virus)
AI : Develops software with human-like intelligence
Impacts of AI on our lives:
Increase free time
Increase our personal safety (by having robots do dangerous tasks)
Can Predict Weather
Can Improve Medical Care by assisting Doctors and surgeons
Biometrics: Authentication techniques requiring unique
characteristics of an individual.
Biometric Types:
Fingerprints
Voice Recognition
Eye Recognition
Impacts of Biometrics:
Better house security
Better airport security
Better mobile security
OS : Software that controls general operation of system
Types of User Interfaces:
GUI : Icons to run commands, uses graphics, has menus, Too much
memory, Requires OS
CLI : Only text, user uses commands, more power, difficult to learn
Dialogue-Based Interfaces
Gesture-Based Interfaces
Types of Computers:
Laptop - Portable, Comes with accessories, can connect to Wi-Fi, can use
electric power, Not as powerful as PC
Desktop - PC, has separate accessories, Unportable, Cheaper than Laptops,
Used in office, requires external power source, used in offices
Tablet: Similar to laptop but smaller, Touch screen technology, limited ram,
more expensive than laptops
Smartphones: Portable, Tiny, Less heat released, Touch screen, used for
browsing and calling
Phablet: Have same features and drawbacks of Tablets and Smartphones
Chapter 2 - Input and Output Devices
Input Devices are used to enter data and output devices
are used to display data
Input Devices:
Keyboards
Numeric Keypad
Ergonomic Keyboards - For health issues like Carpel Tunnel
Touchpad
Tracker ball
Mouse
Remote Controls use Infrared Signals.
Joysticks are like pointer devices for gaming
Scanner : Hard Copy => Soft Copy
Light Pens : Used to point with greater accuracy and to draw on CRT
Monitors.
Digital Camera : Has video Cards which can be transferred to computers
Webcam : Directly connect to PC without memory
Microphone : Input Device for Audio
Sensors : Analogue Data => Binary Data - by using an Analogue Digital
Converter (ADC) -
Sensor Examples:
Temperature
Humidity
Pressure
Light
Direct Data Entry:
Magnetic Strip Reader: Reads info on a magnetic strip from a credit/debit
card
Contactless Card Reader: Detects Card's Radio Wave to pay without a pin.
Chip and Pin reader : Makes payment from card with pin.
RFID Readers: Use Radio Waves and capture data from RFID Tags with
Antennas. Used to track items in stores and for livestock tracking
Optical Mark Reader (OMR) : Reads Pencil Marks in MCQ Exams and Tests
Optical Character Reader (OCR) : Scans Human Text and Converts it to a
digital form
Barcode Reader : Reads barcode tags
QR Code Reader : Reads QR Codes ( and Stores 4296 Characters OR 7089
Digits)
Output Devices : (Allow data to be output from the
computer):
CRT Monitors : Old and Cheap and Can use Light Pens
TFT Monitors: Thin Film Transistors, New, Flat, Thin, Portable, Found in
laptop computers
LCD : Liquid Crystal Diode, TV and Monitors, Poor Color Contrasts (Led to
Light Emitting Diodes being Introduced -LED-)
Projector: Used for presentations and Home Cinemas
Laser Printers: Quick, Quiet, Used for bulk, Very High quality, Produce
Ozone so separate room required
Inkjet Printers: Slow, Loud, Medium Quantities, High Quality
Dot-matrix Printers : Loud, Slow, Poor Quality, Used for receipts and Wage
slips, Has a pressing head so it is an impact printer
3D Printers : Print 3D Objects
Methods of 3D Printing:
Additive Manufacturing : Layer by Layer
Subtractive Manufacturing : Huge block and cut it to make product
Control Applications:
Actuators : Used to Control Devices. Takes Digital signals from computers
and used it to operate devices
Buzzer
Heater
Motors
Chapter 3 - Storage and Media Devices
Backing up : Copying files or data to a different medium
incase there is an issue with the original storage device
Storage Media is the hardware where the data is stored while the storage
device is used to read the data from the storage media.
When to back up data:
Incase Data is lost (In set intervals like every month)
Incase you are victim to hackers
If data needs to be transferred , it is easy to use a different medium
Types of Data Access :
Serial Access : Checking all data on the device until the specific data is
found (ex : Magnetic Hard Disk Drive)
Direct Access : Checking only specific data required (faster than serial
access)
Magnetic Storage Devices: (Serial Access Only)
Hard Disk Drive: Fast Data Transfer Rate, Has moving parts unlike SSD, can
cause latency issues
Portable Hard Drives : Connects to a computer using a USB Port, Stores
Backed up data
Magnetic Tapes : Large Organizations back up data daily on this, Huge
Storage Capacity, Long Term use. Slow Data Access Times but fast data
transfer rate
Optical Media :
CD-R / DVD-R : They must be burned to become a CD-ROM or DVD-ROM,
Can Only be recorded once
CD-RW / DVD-RW : Can be written many times however it is expensive
CD-ROM/DVD-ROM : Read Only storage media
Blu Ray : Uses blue rays instead of red and stores very large files like HD
Movies
CD's and DVD's use pits and lands to store data
Solid State Media :
SSD : Store data and are very fast with no latency issues
Pen Drives : Small portable devices used to transport data
Memory Cards:
SD : Small card with high capacity memory
XD Card : Removable memory for digital cameras
CFast Card : Developed to allow usage of solid-state technology in a
small portable device.
Data Capacity of Devices:
CD ROM 700 MB
DVD 4.7GB
Blu Ray 27-50GB
Chapter 4 : Networks and its Effects
Network : 2 or more computers connected together to
share data.
Data is transferred by being split into many packets which then arrive and
are combined together again. A packet can have:
IP of sender
IP of Receiver
Packet Size
Number of Packets used for the whole message
Network Devices:
Hub : Connects many computers. Is not smart meaning if there is a
command sent to 1 desktop. It is sent to all desktops. Creates a LAN
Switch : Connects many computers but is smart. Creates a LAN and uses
MAC Addresses
Bridges : Connect 2 LANs to make 1 LAN
Router : Connects Computers to the internet and sends packets through
networks using the most efficient route from its routing table
NIC (Network Interface Card) : Allows a device to connect to a network.
Contains the MAC Address.
Wi-Fi:
Wireless Networking Technology
Easy to connect devices
Limited Area of Network
Bad Signals
Can be hacked easily
Bluetooth:
A Wireless Technology used to make short range connections
Can be hacked easily
Very slow data transfer rate
Types of Networks:
LAN : One Building, Easy to manage Files
WLAN : Same as LAN but wireless and use ACCESS POINTS instead of
SWITCHES
WAN : 2 or More Lan together, Very large area
Intranet : Private network for organizations, can be accessed by authorized
people only
Authentication Methods :
Zero Login (Using Biometrics)
Magnetic Stripes
Smart Cards (Contactless Card)
Physical Tokens (A unique physical device)
Electronic Tokens (2FA and OTP)
Conferencing Methods:
Video
Video and Sound used
Carried out in real time
Webcam, Monitors, Speakers, Microphones
Setting up requires training
Audio
Requires Sound only
Organizer dials participants and sets up the meeting
Can be carried over internet using VOIP (Voice over internet
Protocol)
Web
Webinar
Requires Stable Internet Connection
Participants have to download a software
Participants can join, leave and unmute
ABOVE OPTIONS CAN BE TOGGLED
Chapter 5 - The Effects of using IT
Using Microprocessor devices can improve or worsen :
Lifestyle
Leisure Time
Social Interaction
Data Security
They can be Labour saving devices as well
Smart Motorways are used to control traffic.
How do autonomous vehicles work ?
They use sensors , cameras, actuators and microprocessors
Microprocessors use data from sensors and cameras to signal the actuators
to do tasks such as:
Change Gear
Apply break
Steering Wheel
Algorithms are very complex
There is also Autonomous trains which can improve punctuality and
Autonomous Airplanes
Potential Risks of using IT :
Back and Neck problems
RSI
Eyestrain
Headaches
Ozone Irritation
Chapter 8 - Safety and Security
Safety Issues :
Electrocution due to drinks or improper insulation
Fire Hazards due to overheating or over plugged wall sockets
Tripping Hazards due to wires
Personal Injury due to devices breaking the desk
Data security :
Hacking is gaining unauthorized access of data . Use firewalls and strong
passwords
Phishing is when a scammer sends an email with a legitimate looking link
impersonating a company to steal your login credentials. Be careful when
opening links. Smising involves SMS while Vishing involves Voice
Pharming is when code is installed on your computer so that when you visit
are legitimate site you are redirected to a bogus website. Use anti spyware
Key logger allows a hacker to access all the keys which you have pressed
on a keyboard. Use anti spyware and touchpad
Virus replicates itself with the purpose of tampering files
Spam is junk email sent in mass to many users
Cookies store small bits of data used to identify the computer and network
Firewalls monitor incoming and outgoing traffic and warn a user of potential
threats
Secure socket Layer (SSL) allows data to be sent securely . This is mostly used
in websites as the https protocol
Chapter 10 - Communication
Learn this from the book
FINISH THIS DURING SCHOOL DAYS AFTER DAILY TASKS