KEMBAR78
Term 1 Theory Summary Concepts - Grade 12 by Sirantwi | PDF | Solid State Drive | Touchscreen
0% found this document useful (0 votes)
1K views39 pages

Term 1 Theory Summary Concepts - Grade 12 by Sirantwi

The document provides a comprehensive summary of key concepts in computer systems and information management for Grade 12 students. It covers types of computer systems, the roles of data, information, and knowledge, benefits of computer usage, and the concept of convergence in technology. Additionally, it includes troubleshooting common hardware issues, the information processing cycle, and considerations for purchasing various devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views39 pages

Term 1 Theory Summary Concepts - Grade 12 by Sirantwi

The document provides a comprehensive summary of key concepts in computer systems and information management for Grade 12 students. It covers types of computer systems, the roles of data, information, and knowledge, benefits of computer usage, and the concept of convergence in technology. Additionally, it includes troubleshooting common hardware issues, the information processing cycle, and considerations for purchasing various devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

TERM 1 THEORY SUMMARY CONCEPTS-GRADE 12


BY SIRANTWI
Youtube channel: CAT SIMPLIFIED WITH SIRANTWI

Click this to Subscribe

1. Systems Technologies: General Concepts


1.1. Types of computer systems for different users
o SOHO(Small Office/ Home Office)- Devices for home-based/small businesses,
entry level specifications.
o POWER-high specification devices for high-intensive tasks like video editing,
3D drawings, or gaming.eg Gamers,Engineers, IT professionals, etc.
o PERSONAL- Devices for individual use, usually with basic specifications suitable
for everyday tasks like browsing, media, and light productivity.
o MOBILE- Portable devices, such as smartphones, tablets, and laptops, designed
for free movement.
o ENTERPRISE - High-capacity, robust devices for large organizations, focusing
on security, and heavy workloads.

1.2. Information Management: Exploring the roles of data, information,


knowledge, and decision-making within information management processes.
o Data: raw, unprocessed facts or figures without meaning.
▪ Examples of data are numbers, symbols, Item, or observations—like
"100," "25.5 (just numbers)," or "blue."
o Information: processed data that are meaningful.
▪ Example 100oC—that is boiling point of water at sea level (meaning
added to data)
o Knowledge: The application of information to understand patterns,
relationships, or concepts.
▪ Example: knowing that water boils at 100°C is knowledge.
▪ Warm weather with moderate humidity" (understanding the conditions)
o Conclusions: Decisions made based on knowledge.
▪ After you understood the weather conditions then, Wear light clothing
and stay hydrated" (decision based on the knowledge)
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

1.3 Benefits of Computer Usage: Reasons for Using Computer /Computing Devices/ICT
1.3.1 Efficiency
• Speed: Computers process data and perform tasks faster than
humans.
• Automation: Automate repetitive tasks, saving time and effort.
• Multitasking: Perform multiple functions simultaneously, increasing
productivity.

1.3.2 Accuracy
• Error Reduction: Minimize errors in calculations, data processing, and
decision-making.
• Consistency: Ensure uniform results in repeated tasks.
• Precision: Handle complex computations with high levels of precision.
1.3.3 Reliability
• 24/7 Operation: Perform tasks continuously without fatigue.
• Durability: Maintain functionality over extended periods if properly
maintained.
• Data Integrity: Safeguard data through backups and reliable storage
systems.

1.3.4 Impact on Time and Distance


• Communication: Facilitate instant communication through emails,
video calls, and messaging apps.
• Remote Work/Telecommuting: Enable access to systems and data
from anywhere, reducing the need for travel.
• Global Connectivity/Communication: Connect users across the world,
reducing geographical barriers.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

1.4. Convergence –
The integration of multiple technologies or functions into a single device or
system.
o For example, smartphones combine the functionalities of a phone, camera,
GPS, music player, internet browser, and more.
o This technological trend blurs the lines between traditionally distinct devices,
allowing users to perform various tasks with one device.
Advantages of Convergent Devices
• Convenience:
Users can perform multiple tasks using a single device, reducing the need to carry
multiple gadgets.
• Cost-Effectiveness:
Purchasing one convergent device is often cheaper than buying multiple devices for
individual functionalities.
• Space-Saving:
Having one device eliminates the need for separate equipment, saving physical space.
• Portability:
Devices like smartphones and tablets are compact and easy to carry, making them
ideal for mobile lifestyles.
• Efficiency:
Tasks like syncing data or accessing information are streamlined, as everything is
centralized in one device.
• Eco-Friendliness/Green computing:
Fewer devices reduce electronic waste (E-waste-throwing of discarded electronic
gadgets into landfill), benefiting the environment.

Disadvantages of Convergent Devices


• Limited Specialization:
A convergent device may not perform certain tasks as effectively as dedicated
devices. For instance, a smartphone camera may not match the quality of a
professional DSLR.
• Dependency:
Relying on a single device for multiple tasks means that if it malfunctions, all
functionalities are affected.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

• Complexity:
A device with too many features can be overwhelming for some users, leading to
underutilization.
• Higher Energy Consumption:
Running multiple functions on one device can drain the battery quickly.
• Cost of Repairs:
Repairs for advanced convergent devices can be expensive, and damage to one
component might render the whole device unusable.

Task 1: Types of Computer Systems


Question: Match the following users with the most suitable computer system:

1. A graphic designer working on 3D A. SOHO


rendering projects.

2. A student attending online classes B. MOBILE


and doing assignments.

3. A company managing a network of C. PERSONAL


hundreds of employees and
sensitive data.

4. A small business owner managing D. POWER


inventory and finances from home.

5. A salesperson traveling frequently E. ENTERPRISE


and needing access to emails and
presentations on the go.

Task 2: Data, Information, and Knowledge


Differentiate between data, information, and knowledge with examples based on the
following scenario:
A weather station records temperatures of 32°C, 35°C, and 37°C over three days. These values
indicate a heatwave in the region, prompting people to take precautions like staying hydrated.
2.1 Identify the data in this scenario.
2.2. Explain how the data becomes information.
2.3 Describe the knowledge derived from the information.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

Task 3: Convergent Devices


3.1. List TWO advantages and TWO disadvantages of using convergent devices in daily life. 3.2
Give TWO examples of convergent devices
3.3. Why is a laptop regarded as convergent device?
3.4. Give TWO reasons why a company may need a computing device in a workplace.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

WEEK 2-Week 3
2. Systems Technologies: Hardware
• Troubleshooting: Developing skills to resolve common hardware issues, including addressing sticky mouse problems, scanning errors,
disk errors (e.g., defragmentation), screen resolution adjustments, unresponsive programs, printing issues, and assessing storage space.

2.1. Troubleshooting: Resolving Common Hardware Issues

Hardware Issue Problem/Symptom Solution


Sticky Mouse Problems Cursor movement is erratic or 1.Clean the mouse (remove dirt).
unresponsive.
2.Check the mouse pad for smoothness.

3.Replace batteries (if wireless).

4.Verify USB/connection port is secure.


Scanning Errors • Scans are incomplete, 1.Check for jammed paper or obstruction in the scanner.
• distorted, 2.Restart both the scanner and the computer.
• fail to start 3. check the resolution
• resulting image too large.
Disk Errors (e.g., • Slow computer performance, 1.Defragment the hard drive to optimize storage arrangement.
fragmentation) • file corruption,
• storage errors. Note: defragmentation is a process of rearranging scattered files on a
Files scattered on a disk (HDD) disk to speed up the computer.
to slow down the performance 2. Use the built-in disk check utility (e.g., CHKDSK in Windows).
of the computer
Checkdisk utility is used to fix logical errors.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

Screen Resolution Blurry, distorted, or incorrect display 1. Adjust resolution to match the monitor’s native
Adjustments size. settings.
2. Update graphics drivers.

Unresponsive Programs Applications freeze or fail to respond 1. Press Ctrl + Alt + Del to open Task Manager and
end the unresponsive task.

Printing Issues • Printer doesn’t respond, ▪ Ensure the printer is powered on and
• poor print quality, connected.
• paper jams. ▪ Check the printer queue for stuck jobs.
• No papers ▪ Clean the printer heads and check ink/toner
• No ink levels.
• Connectivity issues ▪ Clear any paper jams and reload paper
properly.

Assessing Storage Space • System alerts for low disk 1. Delete unnecessary files or transfer them to
space. external storage.
• inability to save files. 2. Use disk cleanup utilities to remove temporary
and junk files.
3. Uninstall unused applications.
4. Consider upgrading to a larger hard drive or
using cloud storage.
Projector /Monitor issues • No Display (Blank Screen) • Ensure cables (HDMI, VGA, DisplayPort, power) are securely
• Flickering Screen connected.
• No Signal Error • Test with a different power socket or adapter.
• Dim or Discoloured Display • Check and adjust display settings in the operating system.
• Select the correct input source (e.g., HDMI, VGA) on the
monitor.
• Test with a different video cable or connect to a different port.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

• Information Processing Cycle


o Input/processing/storage/output/communication
▪ Input- The process of entering data into a computer using devices like
keyboard (most common input device), mouse, etc

▪ Processing- manipulating and interpreting data, performing


calculations. CPU, RAM, ROM devices for processing
▪ Storage: The saving of data for future use permanently (hard drives,
SSDs, Flash drives).
▪ Output: The result of processed data displayed to users through devices
like monitors, printers, or speakers.

▪ Communication: The transfer of data or information between devices,


often through networks or the internet. Modem, Router, etc are
communication devices

• Integration of input modes to enhance productivity


o Having 2 or more inputs in one device to enhance productivity.
o POS-keyboard, touch screen/barcode scanner
Integration of Input Modes
• The integration of input modes refers to the use of multiple input devices or
methods, such as keyboards, mice, touchscreens, voice input, styluses, and
gestures, to interact with a computer or system.

Ways Input Modes Enhance Productivity/Efficiency


1. Flexibility and Accessibility:
o Users can choose the most convenient input mode based on the task or
environment, e.g., touchscreens for quick navigation or keyboards for typing.
o Provides alternatives for users with disabilities, enhancing inclusivity.
2. Task Optimization:
o Specific input modes can be better suited for certain tasks. For instance:
▪ Stylus input is ideal for design and drawing tasks.
▪ Voice commands improve hands-free operations.
▪ Gesture controls enable quick actions.
3. Speed and Accuracy:
o Combining input modes reduces the time needed to switch between devices or
methods.
o Dual-use of keyboard shortcuts with a mouse or touchpad increases precision
and speeds up workflows.
4. User Experience and Convenience:
o Integrated input systems create smoother interactions with technology,
allowing multitasking and enhancing user satisfaction.
o Examples: Using voice-to-text for emails while managing spreadsheets with
touch.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

5. Error Reduction:
o Specific input methods reduce errors in certain tasks. For example, voice
commands minimize the need for manual input in scenarios like navigating
maps while driving.

Examples of Integrated Input Systems


• Smartphones and Tablets: Combine touchscreen, voice assistants (e.g., Siri, Google
Assistant), and gestures.
• Laptops and Desktops: Use keyboards, mouse, and touchscreens for hybrid
functionality.
• Design Devices: Graphics tablets allow stylus input alongside gesture navigation.
• Smart Assistants: Integrate voice input with connected systems for task automation.

Challenges in Integration
• Learning Curve: Users may require training to efficiently use multiple input modes.
• Cost: Advanced systems with integrated inputs can be expensive.
• Compatibility Issues: Ensuring that different input methods work seamlessly across
platforms and devices.

• Making buying decisions-factors to consider


o Keyboard-ergonomic considerations
▪ Wrist rest Support
▪ Softer key presses
▪ split or angled keyboards
o mouse-ergonomic considerations
▪ Shape and Grip to reduce strains
▪ Position and Angle allowing natural wrist position

o Wireless inputs/outputs VS Cabled inputs


Wireless inputs Cabled inputs
o freedom of movement o no free movement
o connection interference o stable, uninterrupted connection
o Requires batteries or recharging o Takes power from the computer
o Expensive to buy o Cheaper to buy
o Easily stollen o Not easily stollen

o Digital Camera vs Web Cam-Factors to consider when buying


▪ Resolution (Megapixels)-higher resolution, clearer/better image
▪ Sensor size-higher sensor size capture lighter, providing better image
quality
▪ ISO ratings- higher ISO range lets you shoot in low-light environments
without too much noise.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

▪ Lens options
• Fixed Lens cameras (like point-and-shoot): simple and compact
but limit versatility.
• Interchangeable Lens cameras (like DSLRs and mirrorless):
allow you to use different lenses, offering more flexibility in focal
length

• Connectivity: Wi-Fi, Bluetooth, or NFC.


• cost

o Scanners -Device for capturing images into computer


▪ Resolution (DPI-dots per inch)
• A higher DPI, better resulting image
▪ Speed (PPM-Pages per minute)
▪ Connectivity
▪ Colour depth (measured in bits)
▪ OCR
▪ Size
▪ Cost

o Monitor -Device displaying results


▪ Resolution (pixels)-number of pixels horizontally and vertically-1024 x
820
• A higher the number, better resulting image
▪ Screen size-measured in inches diagonally
▪ Connectivity-USB/HDMI/VGA/ wireless
▪ Colour depth (measured in bits)
▪ Refresh rate (measured in hertz(Hz)
▪ Size
▪ Cost
o Response Time:Refers to how quickly a pixel changes colour, measured in
milliseconds (ms).
o Lower response times (e.g., 1-5 ms) are better for gaming and fast-motion
visuals, reducing ghosting and blur.

o Printers -Device converting soft copy to hard copy


▪ Printer Type:
• Inkjet: Best for high-quality photo printing and suitable for
home and small office use.
• Laser: Ideal for fast, high-volume black-and-white printing
• All-in-One (AIO)/Multipurpose: Combines printing, scanning,
copying, and sometimes faxing, staple
▪ Speed (PPM-Pages Per Minute)
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

▪ Resolution (DPI)-higher DPI, better print quality


▪ Cost/budget-cost per page and cost to buy
▪ Duty Cycle- The number of pages a printer can handle per month before
it undergoes maintenance.
▪ Paper size -different paper sizes it can print-A4/A3/A5, etc
▪ Connectivity-USB/Wireless/
▪ Touch screen features

1. Multi-Touch Screen (Input/Output Device)


• A touchscreen that can detect and respond to multiple touch points simultaneously.
• Uses: Found in smartphones, tablets, ATMs, and interactive kiosks.
• Advantages of Multi touch screen:
o Supports intuitive gestures like pinch-to-zoom and swipe.
o Enhances user interaction and productivity.
• Disadvantages of Multi touch screen:
o Can be sensitive to scratches and dirt.
o May require periodic calibration for accuracy.

2. HDMI (Output Interface)


• High-Definition Multimedia Interface, a digital standard for transmitting video and
audio from a device to a display.
• Uses: Commonly used to connect devices like laptops, gaming consoles, and Blu-ray
players to monitors, TVs, or projectors.
• Advantages of HDMI:
o Supports high definition/better resolution
o Supports both video and audio transmission.
o Reduces the need for multiple cables.
• Disadvantages of HDMI:
o Cable length limitations may affect signal quality.
o Not suitable for analog devices.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

3. 3D Printers (Output Device)


• Devices that create three-dimensional objects by placing successive layers on top of
each other.
• Uses: Applied in industries such as manufacturing, healthcare (prosthetics), and
education.

• Advantages of 3D Printer:
o Allows rapid prototyping and customization.
o Reduces waste compared to traditional manufacturing.
• Disadvantages:
o High initial cost and maintenance.
o Limited material options for some printers.

VOICE AND SPEECH RECOGNITION


Key Differences
• Voice Recognition: Focuses on identifying the speaker’s unique voice.
• Speech Recognition: Focuses on understanding and transcribing what is said.

Voice Recognition
• Technology that identifies and confirms a speaker based on unique voice patterns.
• Uses of Voice recognition:
o Security systems (voice biometrics for authentication).
o Personalized services (e.g., recognizing individual users in smart devices).
o Forensic analysis.
Advantages of Voice Recognition:
1. Convenience: Enables hands-free and secure authentication.
2. Personalization: Differentiates between multiple users in shared environments.
3. Security: Hard to replicate voice patterns accurately.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

Limitations of Voice Recognition:


1. Accuracy Issues: Background noise or changes in voice due to illness can affect
recognition.
2. Privacy Concerns: Risk of misuse of stored voice data.
3. Dependency on Hardware: Requires high-quality microphones and processing
systems.
Speech Recognition
• Technology that converts spoken language into text or interprets spoken commands.
• Uses of Speech Recognition:
o Dictation (transcription of spoken words into text).
o Voice-activated assistants (e.g., Siri, Alexa, Google Assistant).
o Accessibility tools for individuals with disabilities.
Advantages of Speech recognition:
1. Efficiency: Faster than typing for certain tasks like creating documents.
2. Accessibility: Assists users with physical impairments or limited mobility.
3. Integration: Compatible with smart home systems and IoT devices.

Limitations of Speech Recognition:


1. Accuracy Variations: Accents, dialects, and noisy environments can lead to
misinterpretation.
2. Language Barriers: Limited support for less common languages and regional accents.
3. Learning Curve: Users may need to adapt to the system's commands for optimal
performance.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

Storage Concepts

Key Factors:

• Capacity: The amount of data a storage device or medium can hold, typically
measured in gigabytes (GB) or terabytes (TB).
o Example: SSDs offer capacities ranging from 128 GB to 4 TB or more.
• Volatility: Determines whether data is retained when power is lost.
o Volatile: RAM (temporary storage). loses content when power is lost
o Non-Volatile: SSDs, SD cards, and hard drives (retain data without power).
• Durability: The physical robustness of a storage device to withstand wear and tear or
environmental conditions.
o SSDs: More durable due to lack of moving parts compared to HDDs.
• Backup: The ability to copy and protect data in case of failure or loss.
o Example: External SSDs, HDDs, Flash drives or SD cards for secondary backups.
▪ Backup vs archive
• Making copies of data for data protection, recovery in case of
loss, corruption or system failure.
o Backup is short term
• Archive-long term storage of data for historical or legal
requirements

• Fit for Purpose: Refers to the suitability of a storage type for specific tasks based on
speed, capacity, and portability.
o Example: SSDs for performance-critical tasks, SD cards for portable storage.

▪ Differences between SSD VS HDDs


SSD HDD
Faster read/write speed Slower read/write speed
More durable/robust Venerable to damage/ less
durable
More expensive per GB Less expensive per GB
Uses less power/energy efficient Consumes more power
operates silently/less noise Produce noise and more heat
No moving part Has moving part

Card Reader and Media (e.g., SD Cards):


• Capacity: Moderate to High (up to 1 TB or more for SD cards).
• Volatility: Non-volatile.
• Durability: Varies; higher-end SD cards can be waterproof, shockproof, etc.
• Backup: Commonly used for backing up photos or portable storage needs.
• Fit for Purpose: Portable and lightweight, ideal for cameras, mobile devices, and data
transfer.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

▪ Cloud storage vs cloud computing vs Grid computing


• Cloud storage-storing/saving of files online
• Cloud computing-combines cloud storage and the use of
software online
• Grid computing/Distributed Computing-Sharing of multiple
resources/hardware to solve a single problem over network

Processing Concepts

Making Informed Decisions: System Requirements


When purchasing a computer, it is essential to match the system unit's components
(like CPU, GPU and RAM) to the software you intend to run.
o Interpret system requirements
▪ System requirements-: the hardware and software needed to make an
application work.

▪ Minimum system requirements-the lowest possible specifications for


the application to work at all.

▪ Recommended system requirements-the specifications that will make


the application work at its full potential.

1. Processor (CPU):
o The brain of the computer, responsible for executing instructions.
Factors to check for CPU:
o Clock speed (measured in GHz) and the number of cores.
▪ Example: A quad-core processor with 3.5 GHz is suitable for
multitasking and moderate tasks like gaming or video editing.
Cores: The number of processing units in a CPU.
o More cores = better multitasking.
o Example: Dual-core for basic tasks, Quad-core or higher for heavy workloads.
Clock Speed: The speed at which the CPU processes data, measured in GHz.
o Example: 2.5 GHz is suitable for basic tasks, while 3.5+ GHz is better for
demanding applications.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

o Suitability: Ensure the processor meets the software's minimum or


recommended requirements.

o Cache Memory: A small, high-speed memory in the CPU to store frequently


accessed data.

2. RAM (Random Access Memory):


o Temporary storage used by the system to run programs.
o Capacity: The amount of data the system can store temporarily. Typically
measured in GB.
▪ Example: 4 GB is sufficient for basic tasks like browsing and word
processing, while 8–16 GB is better for multitasking and heavier
applications like graphic design.
▪ Example: 8 GB RAM is ideal for gaming and office applications, while
16+ GB is needed for professional-level tasks like video editing.
o Suitability: Check the software's memory requirements to ensure smooth
performance.
3. GPU (Graphics Processing Unit): Crucial for graphic-intensive tasks like video editing,
gaming, or 3D rendering.

4. Motherboard: Acts as the backbone of the system, connects all the components of the
system.
• Must support the CPU socket type, RAM type, and GPU interface (e.g., PCIe).
• Consider future expandability (e.g., extra slots for RAM or GPUs).
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

4. Software
• Software refers to a collection of programs, data, and instructions that tell a
computer how to perform specific tasks.
• Application software-programs designed to performs specific task.
o word processors (e.g., Microsoft Word), spreadsheets (e.g., Microsoft
Excel), web browsers (e.g., Google Chrome), or video games.
• System software- controls and manage activities within the computer.
o Operating System (OS)-controls all activities-eg, windows, android, iOS,
macOS, or Linux
o Role/function of the operating system
▪ Starting the computer
▪ Providing a user interface/(GUI)
▪ Managing applications
▪ Manage hardware
▪ Controls single users and multiple users
▪ Controls multitasking
▪ The Task Manager in the Windows operating system
▪ Management of files
▪ File types and properties
• Metadata-additional information of a file
o Author
o File size
o File path
o Date modified, etc
▪ File management
▪ Schedule updates(scheduler)
▪ File compression-WINZIP, 7ZIP, etc
▪ Backups
▪ Coordinate tasks
▪ Control security-logins/passwords

o Utility software-software designed to help manage, maintain, and optimize the


performance of a computer system.
▪ Utility programs perform specific tasks that support the computer's
operations, enhance its efficiency, or provide additional functionality.
maintenance of the computer
▪ Examples are Disk cleanup, compression software, defragmenter,
uninstaller, antivirus, etc

Examples of utility programs include:

▪ Antivirus software (protects against malware and viruses)


▪ Disk cleanup tools (remove unnecessary files to free up storage)
▪ Backup software (safeguards data by creating copies)
▪ File compression tools (reduce file sizes for storage or transfer)
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

▪ Disk defragmenters (optimize storage by rearranging


fragmented/scattered files)
▪ File manager
▪ Uninstaller
▪ Data recovery

• Driver- software that allows OS to communicate with devices

Examples of drivers:
1. Printer Driver: Allows a computer to send print jobs to a printer, ensuring proper
formatting and communication between the device and the operating system.
o Example: HP LaserJet Printer Driver that helps the computer communicate
with an HP printer.
2. Graphics Driver (GPU Driver): Enables the operating system to interface with the
graphics card, allowing proper display of images, videos, and games on the monitor.
o Example: NVIDIA GeForce Driver for NVIDIA graphics cards.
3. Network Driver: Allows a computer to connect to and communicate with a network
through Ethernet or Wi-Fi adapters.
o Example: Intel Wi-Fi Driver that allows a computer to connect to wireless
networks.
4. Audio Driver: Enables the operating system to control and use the computer's sound
card, allowing audio playback and recording.
o Example: Realtek Audio Driver for managing sound devices on a computer.

o Differences between Web-based and installed applications

▪ Web based- software used via internet-eg office 365,


▪ Installed- kept on local device/computer

Web based/online software Installed software


Accessible from any device with an only accessible on the specific device
internet connection it’s installed on
Updates done automatically Updates done manually
Easily scalable Limited scalable
Needs internet connectivity It doesn’t depend on internet
connectivity
Does not use local storage space Use local storage space
o
o Interpret system requirements
▪ System requirements-: the hardware and software needed to make an
application work.

▪ Minimum system requirements-the lowest possible specifications for


the application to work at all.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

▪ Recommended system requirements-the specifications that will make


the application work at its full potential.

o Common software problems and upgrades


▪ Bugs-software errors
▪ Patch: small fixes released to fix bugs. They may address issues like
security holes or functionality bugs.
▪ Updates- broader changes that may include patches, and also
improvements in features, new functionalities, or updates to ensure
compatibility with newer hardware or software.
o Where can one obtain patches and updates
▪ Enable automatic updates.
▪ Download updates manually from the software provider's website or via
an application’s built-in update feature.
▪ On storage devices

o Service pack-patches over certain period of time.

o Versions- A version refers to a specific release of software, which may include


changes in functionality/new features, bug fixes, or other improvements.
Software versions are usually identified by version numbers (e.g., version 1.0,
2.1, or 3.5).

o Read- A read-only file is a file that can be viewed but not modified or deleted
by a user.

▪ Upgrade- An upgrade is the process of replacing an older version of software or


hardware with a newer, more advanced version.
• Upgrades typically provide enhanced features, improved
performance, and better security.
▪ Software Upgrade: This often involves purchasing a newer version of
the software or updating to a newer version through a system update.
Upgrades might include the addition of new tools, better compatibility,
or enhanced performance.
▪ Hardware Upgrade: Involves replacing or adding new hardware
components to improve the overall performance or capacity of a
computer system (e.g., upgrading RAM or a hard drive)

o Using trial version/beta version software-testing software


o Software licensing (EULA)
▪ Site -unlimited number of installations on computers
▪ Multiuser-limited to certain number of installations
▪ Single user-1 computer installation
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

▪ Subscription-Saas (Software as a Service) software like office 365,


google workspace
• where software is delivered over the internet as a service, rather
than as a one-time purchase. In this model, users subscribe to
the software on a recurring basis (e.g., monthly or annually) to
access and use it, often via a cloud platform

o Creative commons- nonprofit organization that provides free licenses and legal
tools to creators, enabling them to share their work more easily and openly.

Risk of using flawed software- (software with bugs)

• software that contains bugs, security vulnerabilities, or design issues is


called flawed software
• Malware infection
• Software might not work correctly/may have limited access
• The software might become unusable.
• Updates might not always be available.
• Security issues
• Compatibility issues
• Corrupted data/loss of data
• Invalid results
• Unusual behaviour of computer-controlled devices/malfunction

Social Issues Applicable to Software:


1. Environmental Issues:
• E-Waste: This is where older devices become obsolete and are discarded in a landfill.
o Example: Disposing of old computers and mobile devices without proper
recycling can lead to harmful chemicals leaking into the environment.
• Energy Consumption: Software running on devices and servers can contribute to high
energy consumption. Make use of energy efficient devices like SSD instead of HDD,
LED/LCD monitors to be used, etc
2. User-Centered Design in Software Applications:
User-centered design (UCD) emphasizes creating software that is intuitive, easy to use, and
meets the needs of users.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

The following software components must focus on UCD principles:


• Website Design:
o User Experience (UX): Websites must be designed with the user in mind to
ensure easy navigation, accessibility, and responsiveness. A user-centered
website considers factors like loading times, mobile compatibility, and clear
visual hierarchies.
o Example: A well-designed e-commerce website that is easy to navigate, with
clear product descriptions and intuitive checkout processes, enhances the
user's shopping experience.

• Database Form Design:


o Ease of Use: When designing database forms for user input, the focus should
be on simplicity, error prevention, and providing clear instructions. Forms
should have logical field placements and offer features like auto-fill, validation
text, and easy navigation.
o Example: An online registration form with clear labels, input field validation,
and a confirmation message reduces user frustration and ensures accurate data
collection.
• Presentation Design:
o Clarity and Accessibility: Presentations (e.g., slideshows) should be designed
with the audience in mind, ensuring readability, accessibility, and visual appeal.
This includes choosing appropriate fonts, colours, and visual elements that
support the message rather than distract from it.
o Example: A well-designed PowerPoint presentation with legible text, concise
bullet points, and relevant images effectively conveys information to the
audience without overwhelming them.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

Software That Enhances Accessibility, Efficiency, and Productivity

1. Accessibility Software
• A software that ensures that technology is inclusive and usable by individuals with
disabilities or specific needs.
• Examples of Accessibility software:
o Screen Readers: Read aloud on-screen text for visually impaired users (e.g.,
JAWS, NVDA).
o Speech Recognition Software: Allows users to control devices or input text
using voice commands (e.g., Dragon NaturallySpeaking).
o Magnification Tools: Magnify portions of the screen for users with low vision
(e.g., ZoomText).
o Closed Captioning: Provides subtitles for audio content, assisting those with
hearing impairments.
o On-Screen Keyboards: Allows users with mobility challenges to input text
without a physical keyboard.
• Advantages of Accessibility software
o Empowers users with disabilities to engage with technology effectively.
o Promotes inclusivity and equity in digital environments.

2. Efficiency Software
• Software that saves time by automating repetitive tasks.
• Examples of Efficiency software:
o Task Automation Tools:
▪ Microsoft Power Automate: Automates workflows between Microsoft
and other apps to save time.
o Scheduling Software: Tools like Microsoft Outlook or Google Calendar
streamline meeting and event organization.
o File Compression Tools: Reduce file sizes for faster sharing and storage
efficiency (e.g., WinRAR, 7-Zip).
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

o Clipboard Managers: Store and manage multiple copied items for quick reuse
(e.g., Ditto, ClipClip).
• Advantages of Efficiency software
o Reduces manual effort through automation.
o Saves time by streamlining repetitive tasks.

3. Productivity Software
• Software that enhances individual and team performance in work or educational
environments.
• Examples of Productive software:
o Office Suites: Microsoft Office, Google Workspace (Docs, Sheets, Slides) for
document creation, editing, and collaboration.
o Project Management Tools: Tools like Microsoft planner for task tracking and
team coordination.
o Time Management Apps: Tools like Microsoft To-Do, or Google Calendar to
prioritize tasks and track time usage.
o Note-Taking Software: Apps like Evernote, OneNote, or Notion for organizing
notes and ideas.
o Cloud Storage: Google Drive, Dropbox, or OneDrive to store and access files
from anywhere.
o E-Mail applications: like Outlook

• Advantages of Productivity software


o Encourages better organization and task prioritization.
o Enhances collaboration through shared tools and real-time updates.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

▪ Factors that influence performance of computer


▪ Processor/CPU speed
▪ RAM size
▪ Number of applications running
▪ Caching
▪ Disk space and speed
▪ Malware infections

Add-ons- additional features that enhance the functionality of software.


Example of add-ons
• PrintFriendly
• Ad blocker
• Pop-up blocker, etc.

Essential/ Basic Components of a Computer/ devices for Entry level users

• CPU
• RAM
• STORAGE/HDD/SSD
• GPU
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

SAMPLED THEORY QUESTIONS BASED ON TERM 1 CONTENT

SYSTEMS TECHNOLOGY: HARDWARE

Activity 01
1.1 Which one of the following is the best example of convergence? (1)
A. Gaming console
B. Camera
C. Programmable calculator
D. Tablet
1.2 Which one of the following files could be downloaded as a podcast? (1)
A. Instructions.pdf
B. Canyon.mp3
C. Game.exe
D. Party.bmp
1.3 Which one of the following is the least likely to improve the (1)
performance of a locally installed application?
A. Set the default storage location for files created with/by the
application, to an SSD drive.
B. Replace the Intel i5 processor with an Intel i7 processor.
C. Free up memory by closing other applications that are not being
used.
D. Replace the ADSL connection with a fibre connection.
1.4 Which one of the following specifies a category of computer user? (1)
A. GIGO
B. SOHO
C. SATA
D. FIFO
1.5 The process of adding geographical identification metadata to various (1)
media is known as…
A. identity theft.
B. file properties.
C. Geo-tagging.
D. QR coding.
1.6 Which of the following is not true for Ransomware? (1)
A. A type of malware.
B. A product key will protect the victim.
C. Demands some form of payment from the victim.
D. Attacker encrypts files on victim’s computer.
1.7 Which ONE of the following types of software allows you to try out a (1)
program before you buy it?
A. Malware
B. Adware
C. Freeware
D. Shareware
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

1.8 … technology can assist game rangers to monitor and detect poaching (1)
activities.
A. Systems
B. Blockchain
C. Assistive
D. Drone
1.9 The date and time when a photo was taken can be found in the … of (1)
the photo.
A. resolution
B. metadata
C. pixels
D. aspect ratio
1.10 … uses special high-speed memory to store data that is frequently (1)
used to improve computer performance.
A. Syncing
B. Backup
C. Compression
D. Caching
1.11 Which communication technology enables a person to tap his/her bank (1)
card on a device to pay?
A. LTE
B. Wi-Fi
C. NFC
D. Bluetooth
1.12 Which ONE of the following options is NOT a function of the operating (1)
system?
A. Manages computer hardware
B. Provides cloud storage
C. Provides the user interface
D. Manages the programs
[12]
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

Activity 2
Write down only the number of the description from Column A, and next to it the
correct matching capital letter from Column B, for example 2.11 T.
COLUMN A COLUMN B
2.1 The process of moving files to a secondary A. Blockchain
storage medium, to save disk space.
B. Caching
2.2 An example of software where the user must pay
a monthly or yearly fee for the use of the software. C. Add-On
2.3 A technology associated with digital currencies, in
D. 300 dpi
which records of transactions are linked together
and distributed among users. E. Synching
2.4 An example of the resolution of a flatbed scanner.
F. Bitcoin
2.5 The process of rearranging data on a storage
medium for efficient use. G. Office 365
2.6 An addition that enhances the functionality of an
H. 1200 x 800
existing software application.
2.7 The process of ensuring that the same set of I. Archiving
documents or files are consistent and up-to-date
J. Backup
across multiple devices.
2.8 The process of storing data temporarily to K. Extension
facilitate faster access. M.Cache Memory
2.9 A blend of advances in technology that are fast
becoming essential to modern life. N. 5IR
2.10 A string of characters attached to a filename, O. Memory Chip
usually preceded by a full stop and indicating the
format of the file. P. Biometrics
2.11 An integrated circuit that holds programs and Q. Motherboard
data temporarily.
2.12 This user generally requires a good-quality R. Asynchronous
graphics card S. Gamer
2.13 A technology that uses a person's unique
T. Mobility / 4G
physical characteristics to control access
2.14 A collection of instructions that enables a Connection
computer to perform specific tasks
U. Expansion
2.15 What mobile users require.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

2.16 A term used to describe a situation where V. Plug-In


multiple technologies are combined to deliver a
W. Defragment
new and exciting product.
X. Convergence

Y. Software

[11]

Activity 3
State whether each of the statements below is TRUE or FALSE.
If the statement is FALSE, then write down the word ‘False’ and, next to it, the
word(s) which should replace the underlined word(s) to make the statement
TRUE. (Note that no marks will be awarded if ‘False’ is given without a suggested
replacement.)
QUESTION ANSWER
The initial start-up instructions for a computer are True
stored in ROM.
NFC devices can connect to each other up to 10 False – Bluetooth
metres apart.
3.1 The contrast ratio of a monitor is the relationship between the darkest shade (1)
of black and the brightest shade of white, in an image produced by the
monitor.
3.2 A wiki, short for "weblog", originally referred to a digital log or online journal. (1)
3.3 A EULA is an agreement or contract between the user of software and the (1)
licensor.
3.4 A hard drive has a shorter life span than an SSD. (1)
3.5 SOHO users are people who work at home and in small offices. (1)
3.6 You will always have access to installed software as compared to web- (1)
based software.
3.7 A touch screen is an input and an output device (1)
3.8 The bigger the screen size, the better it is for your eyes. (1)
[8]
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

Activity 4
4.1 Study the advertisement for a computer below and answer the questions
that follow:
15.6" Touch Full HD Display
Intel Processor up to 5.0 GHz
16 GB DDR4 RAM
1 TB HDD
Nvidia GeForce 6 GB Video Card
Bluetooth | 802.11 b/g/n
DVD writer
Fingerprint Reader
4.1.1 The display (monitor) is specified as ‘Touch’ and ‘Full HD’.
a) What does the ‘Touch’ specification allow the user to do? (1)
b) What technical specification does ‘Full HD’ refer to? (1)
4.1.2 What is the size of the storage device of this computer, in (1)
gigabytes?
4.1.3 Name the connection technology associated with the 802.11 b/g/n (1)
specification.
4.1.4 What does the Fingerprint Reader allow the user to do? (1)
(No one-word answers will be accepted.)
4.1.5 Identify the item in the specifications above, that shows that the (1)
device has a built-in GPU.
4.2 Suggest TWO ways in which one can try to get a non-responding wireless (2)
keyboard
to start working again.
4.3 Give TWO general advantages of converting hardcopies into digital format. (2)
4.4 Give the general term for the computer technology that the person in the (1)
image below is demonstrating.

4.5 Explain why web-based applications typically have lower hardware (1)
requirements
(for the end user), than applications that are installed on your computer.
4.6 Microsoft offers users of Office the opportunity to join the Office Insider (1)
program,
which gives users early access to new versions of the software.
Briefly describe how Microsoft benefits from the Office Insider program.
4.7 Study the items of metadata of a file below and answer the questions that follow.
Camera maker: Samsung
Bit depth: 24
Name: 202008_111814.jpg
4.7.1 What does the ‘Bit depth’ item refer to, or mean? (1)
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

4.7.2 Explain why the user might wish to change the value of the ‘Name’ (1)
item or property.
4.7.3 Explain why the user might wish to change the value of the ‘Name’ (1)
item or property.
4.8 Give TWO ways in which you can try to improve the effectiveness of voice (2)
recognition software, besides changing settings in the software.
4.9 Give TWO features or utilities included with a computer’s operating (2)
system, that are
used to solve problems that occur with hard drives.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

4.10 Consider the following system report on a hardware item installed on a computer
and answer the questions that follow.
Speed: 1333 MHz
Slots used: 2 of 4
Form factor: DIMM
Hardware reserved: 48.9 MB
4.10.1 What hardware item is being referred to above? (1)
4.10.2 How does one know that this item can be upgraded on this computer? (1)
4.11 Many apps, such as backup and antivirus apps, include a built-in scheduler. What (1)
is the function of a scheduler?
4.12 Answer the questions that follow based on the picture below:

4.12.1 During which stage of the Information Processing Cycle are the above (1)
devices used.
4.12.2 To which port are these devices normally plugged in? (1)
4.12.3 Which device would a student most likely use? Motivate your answer. (2)
4.12.4 Which device is best suited for backing up videos and music? (3)
Motivate your answer by referring to a spec in the screenshot.
4.13 Answer the following questions with regards to a computer’s CPU:
4.13.1 Explain the role that a CPU plays in a computer system. (2)
4.13.2 Give TWO differences to a computer’s performance with a quad-core CPU (2)
compared to a single-core CPU.
4.14 Explain how you would go about fixing the resolution on the computer screen where (2)
images and text appear very big.
4.15 The minimum system requirements to run Game XYZ are:

Study the requirements above and state whether the game will run for each of the
following scenarios. Motivate your answer for each scenario.
4.15.1 On a computer with Windows 11 (64-bit) Home Edition. All other (2)
requirements are met.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

4.15.2 On a computer with 6000 MB RAM. All other requirements are met. (2)
4.15.3 On a Core i7 computer with 30 GB available space. All other requirements (2)
are met.
4.16 Explain which utility application you will use to remedy the situation in each of the
following. Motivate your answer.
4.16.1 A file was accidentally deleted and needs to be restored. (2)
4.16.2 The hard drive is overfilled with temporary files, cache, and unnecessary (2)
system files.
4.16.3 Partially sighted user needs assistance in navigating a website. (2)
4.17 Health trackers are often worn by athletes and people who are health conscious. (2)
Name TWO types of outputs a user would expect to find on his/her health tracker.
4.18 Give TWO reasons why the use of online applications/software has become (2)
popular.
4.19 State TWO possible problems associated with 3D printing. (2)
4.20 The SD card on your camera is full. (1)
Which device would you use to upload the photos to your computer without
connecting your camera to the computer?
4.21 Give TWO reasons why the use of online applications/software has become (2)
popular.
[57]

Activity 5
AlexiaSys® is a company that provides networking and other IT services to individuals and
businesses. Their mission is to help people get the most out of their IT investments. The company
has an on-site repair centre, and they offer courses for people wishing to obtain IT certifications.
Tours of the centre are allowed, under strict social distancing rules.
5.1 The school is planning an outing to the centre. (1)
Give ONE example of how GPS technology can be used to plan the outing.
5.2 The network administrator intends to implement a BYOD (‘Bring Your Own Device’)
policy for employees of the company by creating a hotspot.
5.2.1 Name the type of wireless connection that BYOD participants would make (1)
use of.
5.2.2 What is the main advantage that a BYOD policy would hold for the (1)
company?
5.2.3 Give ONE general item that the company might wish to include in their (1)
AUP for employees.
5.3 The company has designed an item made of plastic by using CAD.
5.3.1 What type of printer can be used to ‘print’ this tool? (1)
5.3.2 Give TWO general advantages of the kind of manufacturing referred to in (2)
question 5.3.1 over older, traditional manufacturing methods.
5.4 AlexiaSys® is considering letting some employees practise telecommuting (working
from home).
5.4.1 Give TWO benefits of telecommuting, from the viewpoint of the company. (2)
5.4.2 The company is compiling a list of questions that will help them decide (2)
which employees should be allowed to telecommute.
Suggest TWO technical (ICT-related) questions that might reasonably be
included in this list.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

5.5 Users who can currently afford only an entry-level computer, are often advised to
purchase an entry-level desktop rather than an entry-level laptop.
5.5.1 Give TWO reasons for this advice. (Disregard any price differences in the (2)
initial purchase price.)
5.5.2 What would be the most likely reason for a user not to follow this advice (1)
(i.e. he decides to purchase an entry-level laptop)?
5.5.3 What would be the advantage in purchasing a ‘hybrid laptop’ instead of an (1)
‘ordinary’ laptop?
5.6 The shop sells devices with ergonomic features designed to reduce the likelihood
of RSI.
5.6.1 Which types of devices are referred to above? (1)
5.6.2 Give ONE specific example of such an ergonomic feature. (1)
5.7 A technician at AlexiaSys® requested a user to install software on their computer (1)
that would allow their computer to be controlled remotely.
Explain the most likely reason for this request.
5.8 A monitor sold by AlexiaSys® includes the following specifications:
Size: 27"
_________: 16:9
Built-in microphone and speakers
5.8.1 Name the specification that the value 16:9 refers to. (1)
5.8.2 Which hardware item, not mentioned above, would allow the user to use (1)
the monitor for video conferencing, without the need for any additional
peripheral devices?
5.9 Give TWO tips that you could offer customers, to help prevent files on their (2)
computers from being corrupted. Exclude any issues relating to malware from your
answer.
5.10 A customer has the following requirements for a computer that she wants to buy: (3)
• The computer must boot up very quickly.
• The computer must be able to run multiple tasks at the same time, without
slowing down.
• The user wants to be able to implement a good backup policy without relying on
the internet.
Give THREE hardware recommendations that would satisfy all these requirements.
5.11 One of the shop assistants saw something about a handwriting recognition feature (1)
of the note-taking app on her tablet.
What is the benefit of the handwriting recognition feature described above?
5.12 AlexiaSys® is compiling a list of things to look out for to help people recognise (1)
pirated software.
Suggest ONE item for this list, that would help a person to recognise a pirated DVD.
5.13 Two new printers were added to the network in the shop: an inkjet printer and a
laser printer.
5.13.1 Explain the most likely reason why a test page sent to the inkjet printer (1)
contained strange printing and did not ‘make sense’.
5.13.2 What must be done to ensure that printouts are always sent automatically (1)
to the laser printer?
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

5.14

Image taken from https://www.aiperspectives.com/speech-recognition


5.14.1 Give TWO reasons for using speech recognition software. (2)
5.14.2 Which input device is typically used with speech recognition software? (1)
5.14.3 List TWO limitations in using speech recognition software. (2)
5.14.4 Give TWO advantages to a driver in being able to use a virtual voice (2)
assistant such as Siri (iOS) or Cortana (Windows).
5.15 Explain biometric security and indicate TWO physical characteristics that are used (4)
in biometrics.
5.16 Answer the following questions with regards to OCR technology:
5.16.1 Briefly explain what OCR technology is. (2)
5.16.2 Which input device is typically used with OCR? (1)
5.16.3 Explain the difference between a ‘hard copy’ and a ‘soft copy’ of a (2)
document.
5.16.4 List TWO examples how a teacher would use OCR in his/her teaching (2)
practice.
5.17 Answer the following questions with regards to the installation of software:

5.17.1 Briefly explain what a product key is and how it serves as a way to combat (3)
software piracy.
5.17.2 List TWO possible consequences to the user in installing software that is (2)
incompatible with the computer’s hardware.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

5.17.3 Briefly explain the difference between updating software and upgrading (2)
software.
5.18 Online learning must be seen as a substitute for in-person learning when classroom
tuition is disrupted.
5.18.1 Discuss eLearning and mLearning as part of the online learning (3)
environment.
5.18.2 List TWO possible risks to a school that follows a BYOD approach with (2)
online learning.
5.19 Name THREE ways in which virtual reality (VR) can be used to enhance online (3)
learning.
5.20 Give ONE reason why it is important to make regular backups. (1)
5.21 How is the size of monitors normally measured? (1)
5.22 How can a 3D printer be used to create a distinguishing feature for each car? (1)
5.23 Suggest TWO guidelines to be included in the policy for making backups at (2)
AlexiaSys®, other than making regular backups or setting automatic backups
5.24 Give TWO reasons why a computer may prompt a user to start up the operating (2)
system, e.g. Windows, in safe mode.
[69]
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

INFORMATION MANAGEMENT

INFORMATION MANAGEMENT ACTIVITIES


ACTIVITY 1: MULTIPLE CHOICE QUESTIONS

1.1. _____ is an aspect that you must be included in a Task Definition for a
research project, such as the PAT
A. Interview
B. Current Situation
C. Report
D. Web site
1.2 Which one of the following is a good example of level THREE
question?
A. Would it be better if?
B. How many
C. Why?
D. What if
1.3 You gathered data from various sources when you did your PAT. You
wish to use graphs to display your data analysis in the report.
Give ONE reason to use a pie chart.
A. When the total of the numbers is 100%
B. Used when there are many data points ISP
C. Used when the order of the categories is important
D. Displays trends
ACTIVITY 2 : MATCHING ITEMS
Choose a term/concept from COLUMN B that matches the description in COLUMN
A. Write only the letter (A–J) next to the question numbers (2.1 to 2.5) in the
ANSWER BOOK, e.g. 2.11 k
COLUMN A COLUMN B
2.1 An instrument used to gather A Plagiarism
information from people using a form.
2.2 A control with a better choice to select B Bibliography
the class from the list
2.3. Passing off someone else’s work as C Questionnaire
your own without their permission
2.4 Can be answered without research D Piracy
2.5 A single reference to a specific source E Combo Box
F Closed questions
G Interview
H Opened Questions
I Citation
J ListBox
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

ACTIVITY 3: TRUE/FALSE
Indicate whether the following statements are TRUE or FALSE. Write 'true' or 'false'
next to the question numbers (3.1 to 3.5) in the ANSWER BOOK. If the statement is
true, write 'TRUE'. If the statement is false, write 'FALSE' and change the underlined
word(s) to make the statement TRUE. (Do NOT simply use the word 'NOT' to
change the statement.)

NO mark will be awarded if FALSE is written without a correct answer.


EXAMPLES:

QUESTION ANSWER
The initial start-up instructions are True
stored in the ROM.
An NIC has slots for hardware False – Motherboard
components such as the CPU.

3.1. Accuracy is a characteristic of quality data. (1)


3.2. Cross-reference is of all the sources used in the document/ (1)
bibliography with sources.
3.3. Introduction is a brief summary/ outline of the report. (1)

SECTION B

SECTION B (INFORMATION MANAGEMENT)


The example below shows three questions that were part of a
questionnaire for learners taking Mathematics as a subject at primary
school.
QUESTIONNAIRE
Question 1: Did you pass Mathematics?
Question 2: How many learners in South Africa take Mathematics as a
subject? Question 3: What impact does Mathematics have on the
4. economy?

4.1 Identify any ONE closed question in the questionnaire. (1)


Why would the answer of question 2 be difficult to analyse in a
4.2 spreadsheet? (1)
4.3 Why is question 4 not a good survey question? (1)
The questionnaire does not have instructions to users. (1)
4.4 Why should instructions to users be included?
Give ONE advantage of using a drop-down form field in an electronic (1)
4.5 questionnaire.
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

Quality data is needed for useful information to be extracted from a (3)


database.
4.6 List THREE characteristics of quality data.

4.7 Why would it not be a good idea to use a wiki as a source. (2)

4.8 What is the difference between a citation and a footnote? (2)

4.9 Name TWO ways to verify that an internet source has:


• Accurate information (2)
• Current situation
4.10 Explain what a list of references is.
Why should a list of references be added to a report? (2)
4.11 Name TWO application software suited to process results captured from (2)
a survey if the survey consists of closed-ended questions.
Motivate your answer.
4.12 Distinguish between 'plagiarism' and 'piracy'. (2)
4.13 What does the © symbol indicate? (1)
4.14 What is the difference between a questionnaire and a survey? (2)
4.15 Give ONE element that should appear on the cover page of a report, (1)
besides the title of the report.
4.16 Give TWO reasons why the information of a book dealer is stored in (2)
databases rather than in spreadsheets.
4.17 Give TWO tips on how to check that information sourced from the (2)
Internet is in fact correct and reliable.
4.18 There is a lot of information available, and skills needed to be able to
work with this information is needed. (3)
4.18.1 State ONE advantage of having information that is already in
digital format.
4.18.2 What is the difference between Data and Information?
4.19 What makes a question a closed-ended question? (1)
4.20 Compare plagiarism and copyright infringement by explaining:
4.20.1 What each offence is. (2)
4.20.2 How to avoid being guilty of the offence
TERM 1 THEORY SUMMARY CONCEPTS

BY SIRANTWI

SECTION C – SCENARIO BASED


5 An invitation with a shortened URL was e-mailed to guests so that they (2)
could register to attend the event.
5.1.1 The URL www.bit.ly/AgwzA1 was e-mailed.
Give TWO reasons why the guests may not trust this shortened
URL.
5.2 Your school has decided to hold a team racing car competition. Teams
must create their own racing cars from scratch using specific guidelines
regarding the car weight. Teams consist of learners in the same grade. A
maximum of 10 drivers per team are allowed.

Study the entry form for registration below and answer the questions that
follow:

(3)

5.3 Explain TWO ways in which a teacher can find out whether learners are (2)
guilty of plagiarism in their PAT's.
5.4 The pie diagram below illustrates the steps in the decision-making
process. Each step is allocated a portion of the pie to signify its role in
the overall process.

5.4.1. Briefly explain what happens during step ‘6. Evaluate the (2)
Decision’.

You might also like