Theory Notes
CHAP TER 1.1
Modular DEFINITION : Modular design means that a computer
consists of separate components and peripherals instead
design of one unit
ADVANTAGE: Easier to Upgrade
Easy to repair
FUNCTIONS: Are separate blocks of code that can be
revised without duplication of code
Motherboard DEFINITION: The motherboard is the main
circuit board found inside of the computer
case, which allows the peripherals and the
other components to connect to it
FUNCTION: It provides slots and
connectors for various components
and peripherals
Some components and peripherals
connected to the computer, receive
power from the motherboard
USB Ports PLUG AND PLAY: Plug and play is a tech that allows the
operating system to identify a device that is plugged into the
computer and automatically install the driver for the device
HOW IT WORKS: Microsoft windows 10 has some general
driver software preinstalled, that allows the monitor, mouse,
keyboard, and other USB devices to function
Hot-Swappable: Means a device can be connected and
disconnected while the computer Is on. Such as Flash
Drives, Printers, Mice and keyboards.
A Graphics card would not be hot swappable since you have
to shut down the computer
USB Hub
USED WHEN THE COMPUTER DOES NOT HAVE
ENOUGH USB PORTS FOR THE NUMBER OF USB
DEVICES NEEDED
Random Access Memory
RAM
CAPACITY: GB= Gigabytes
RAM is electronic memory that temporarily holds data and instructions to be
processed by the CPU
FUNCTION: Data instructions and software must be loaded into RAM for the
CPU to process
CHARCTERISTICS: Electronic therefore fast
Volatile means that when its off RAM is cleared
RAM is more expensive per GB
INFLUENCE ON PERFORMANCE: Adding more RAM to the computer is the
cheapest way to improve the computers performance
REASONS FOR LESS RAM THAN STORAGE: The available number of slots on
the motherboard. RAM is more expensive per GB than storage
ROM Read only memory
ROM is permanent memory, found in small quantities on
the motherboard
FUNCTION: Contains firmware such as BIOS that allows a
computer to start up each time it is turned on
ADVANTAGES: It can keep the instructions even when
the power is off
It cannot be changed as it is READ ONLY
BIOS Basic Input Output System
BIOS is the firmware stored on ROM containing instructions for the
booting process
Booting Process
POST: Power On Self Test
All hardware is checked that it is working order. Provides computer
configuration options for a user to change. These changes are stored in
CMOS
CMOS Complementary Metal Oxide Semiconductor Memory
ABOUT: Starts the configuration options for the BIOS. The
CMOS battery constantly provides power to CMOS
memory to retain the data when power I off
SETTINGS THAT CAN BE CHANGED: Booting Order
System date and time
Firmware is permanent software such as the BIOS, that is
Firmware programmed onto the ROM
FUNCTION: It holds hardware settings such as the BIOS that get
the computer started up
FLASHING: The process of completely removing the existing
firmware and replacing it with an updated version
ADVANTAGES OF STORING FIRMWARE ON ROM: Permanent
memory. ROM has a faster access time and will therefore load
the firmware faster
DEVICES THAT USE FIRMWARE: Flash Drives, External hard
drives, Graphics card, GPS Devices
Control Processing Unit
CPU
Speed Unit: GHZ-Gigahertz
MOTHERBOARD CONNECTION: Zero Insertion Force Socket
MANUFACTURES: AMD and Intel
QUAD CORE: A CPU with 4 core
FUNCTION: It is responsible for all the processing that takes
place in the computer which is known as the machine cycle
Machine FETCH: The CPU requests instructions from
RAM
cycle
DECODE: Instructions are declared to
determine what operations are required
EXECUTE: Decoded instructions are executed
STORE TO RAM: The result of the execution is
sored back in RAM
IRL
HOW IT WORKS: When a
hardware device needs
attention from the CPU it sends
EXAMPLE: A printer sends an It is Low on ink. Ink needs
Interrupt request line an interrupt signal to the CPU.
IRQ when: replacing. Paper Jam
CPU briefly stops processing it
when busy and handles request
from the devices
Cache
Cache is a computing
FUNCTION: All types of
technique using a higher
cache aim to prevent a
speed memory to store
faster medium having its
recently accessed data
performance slowed
and instructions so that
down by waiting for data
access there is faster
CPU cache CPU cache: CPU cache is a high-speed memory on or close to the CPU
that stores recently used data and instructions
FUNCTION: Stores recently used data and instructions to speed up the
performance of the CPU by preventing it from waiting for the slower RAM
LOCATION: On or close to the CPU
ABOUT: Cache memory cannot be upgraded
REASONS FOR CACHE TO IMPROVE CPU PERFORMANCE: It is close to
the CPU. It stores recently accessed data and instructions. It is faster than
RAM
Disk Cache Also known as: Hard Drive cache
Meaning: Disk cache is a certain amount of RAM built into storage to
use as cache which stores recently used data and files read from
storage
Location: Hard Drive
SSD
RAM
Web Cache Meaning: Web cache is when recently visited webpages and
images are stored on the hard drive, which is used to open a
webpage faster the next time the site is visited
LOCATION: Storage:
Hard Drive
SSD
HOW IT WORKS: When a webpage is visited it is a stored on local
storage. Once a page is visited a second time, it will be backed
from storage, which is faster than downloading from the internet
Cache memory
Found on or close to the CPU
Smaller Capacity
Faster
Store recently used instructions
GPU
Graphics Processing Unit
FUNCTION; It is a processor that processes graphics data to generate a display
LAPTOPS WITH INTEGRATED GPU
ADVANTAGES: It uses less power and improves battery life
Takes up less space
DISADVANTAGES: It does not have its own VRAM therefore uses the system RAM which reduces computers
performance
Dedicated
GPU
It generates images faster than
integrated GPU. The GPU takes the
graphics processing away from the CPU
FOUND: On a graphics Card
Graphics Motherboard slot: PCI- Express
Card
CONTAINS: GPU. VRAM. Fan and heatsink
FUNCTION: Houses the dedicated GPU and other
components which allows it to provide specialised
graphics processing
CAREERS: Graphics designers and Video Editors
VRAM
Video Random Access Memory
VRAM is a type of memory on a graphics
card that temporarily stores image data
that is processed by the GPU
FUNCTION: Stores image data to be
processed by GPU. VRAM has some
function as RAM but for images
Expansion Expansion cards are printed circuit boards
plugged into slots on the motherboard to new
Cards functionalities to the computer
FUNCTION: Allows user to add extra or
improved functionality to the computer by
plugging an expansion card into the PCI-
Express Slot
EXAMPLE: Graphics Card. Sound card. NIC
card
Bus Busses are sets of wires etched on the
motherboard to transport data between
components connected to the motherboard
UNIT OF SPEED: MHz= Megahertz
GHz= Gigahertz
ABOUT: They are shared between components and
therefore slower than point to point connectors
Point to Point connectors are sets of wires etched on the
Point-to- motherboard dedicated to transport data between two
point components and not shared with other components
Connectors FUNCTION: To speed up data transmission between
components with high data traffic. They are not shared with
other components to speed up the operations of the CPU
ADVANTAGES: Since there is a large amount of data being
transferred between CPU and the RAM the connectors
speed up performance
FOUND: Between the CPU and RAM
Theory Notes
CHAP TER 1.2
System System software are programs designed to run a
computers hardware and application software
Software
Types:
Operating system
Utility Software
Device drivers
Device Drivers
A device driver is a system software that allows
the operating system to communicate with, and
control hardware devices connected to the
computer
Operating The operating system is system software that provides an
interface for the user and manages the hardware and
systems software of the device it is installed on
FUNCTION: Memory management
Process Management
Device management
Network FUNCTION: System software installed on server to manage
and control other computing devices connected to network
operating
COST: Most expensive if not using FOSS
system
SIZE: Takes up the most space on storage
EXAMPLES: Linux Server
Ubuntu Server
Microsoft
Desktop/Laptop FUNCTION: System software that provides the GUI and
manage the hardware and software of a computer
COST: Less expensive than NOS and often included in the
cost of buying the computer when it comes preinstalled
SIZE: Takes up less space than NOS
EXAMPLES: Propriety software
FOSS
Mobile FUNCTION: System software that provides the GUI and
manage the hardware and software of a mobile device
COST : Not purchased separately and preinstalled on the
device
SIZE: Takes up less space then on a desktop/Laptop
EXAMPLES: Propriety software
FOSS
Embedded FUNCTION: System software to manage a
single, appliance or electronic tool
COST: Least Expensive and preinstalled
on the software
SIZE: Takes up the least amount of
storage space
EXAMPLES: Raspberry Pi OS. WebOS.
AndroidTV
Managing
Disk drives The operating system has index which is a database
and files that stress not just files and folder names, but other
details such as size and date modified as well as the
text inside the files
FUNCTION: This allows the user to search for a file
using other properties, such as words that appear
inside the document and not just by the file name,
using a file management program like File Explorer.
Memory
management
The operating system allocates
memory to programs that are open
When a program is closed it makes
the memory it occupied available for
other programs
Process and A process is a set of instructions that are
task sent to the CPU for execution
management
TYPES: Program: A set of instructions
designed to perform a specific task for the
end user
Thread: Part of a larger program that the
operating system allows to separate from
the program, to be processed on its own.
Multitasking
Multitasking is when the operating system rapidly switches from one process to
another giving each process a small amount of CPU processing time. This gives the
impression that the computer is processing more than one task at a time
EXAMPLE: The user has many programs open at the same time
Multithreading Multithreading is when the operating system
allows a program to split itself into separate
tasks, called threads
ABOUT: Each thread is still processed individually
with its own CPU time since the CPU time since
the CPU can only process one task at time
EXAMPLES: Windows operating systems allows
Microsoft word to split into different threads such
as formatting, Auto save and Auto correct
Multiprocessing
Multiprocessing is when the computer has more
than one CPU core and the operating system
splits tasks and processes, in parallel, between
the different cores
ABOUT: A minimum of TWO processors are
needed for multiprocessing
Languages that are closely related to human language,
High-Level which makes it easier to understand. Language are
programming independent of the hardware of the computer
languages EXAMPLES: Delphi. C++. Java. Python. Scratch
ADVANTAGES: Instructions are written in a language
closely related to humans it makes it easier to
understand
It is easier to debug
Low-level
programming Languages used to operate and manipulate the
language computer’s hardware. Binary or hexadecimal
instructions that are sent and interpreted by the
CPU
EXAMPLES: Machine language. Assembly
language.
Compilers Translates the entire program into machine code before the
program runs
FEEDBACK: Provides a list of errors and does not run the
program until all errors are fixed.
RESULT: Once the program successfully runs, an executable file
is created.
RUN: The file can be run any other windows computer regardless
of whether the programming language installed or not
SPEED: Runs faster than interpreters.
EXAMPLES: Delphi. C++
Interpreters Translates the code into machine code line by line, as the
program is running
FEEDBACK: Error message are provided for each line, one at a
time which point the program will crash
RESULT: No executable file is created
RUN: Programming language needs to be installed on the
computer to run the program.
SPEED: Runs slower than compilers since every line needs to
be interpreted
EXAMPLES: Java. Python. Scratch
Virtual Virtual memory is an area allocated on the main storage that is
memory used by the operating system when the system RAM is full
HOW IT WORKS: Used when RAM is full
• When the data is needed again the page file is swapped back to RAM
ABOUT: Data and instructions cannot be processed directly
from virtual memory and needs to be placed I system RAM first
ADVANTAGES: It allows the user to open file and program that
require more RAM
DISADVANTAGES: The overuse of virtual memory may cause
thrashing
Thrashing When the operating systems spends too much
time swapping between the virtual memory
and RAM the computer slows down
significantly
HOW TO PREVENT: Limit the use of virtual
memory by closing programs that are open
and not needed at that time
Buy and install more RAM, if there is a need to
have so many programs open at the same time
Virtualisation is creating a virtual resource such as storage device, server or
Virtualisation desktop that only exists in software
SOFTWARE EXAMPLES: VM Ware
Virtual Box. Microsoft Hyper-V
HOW IT WORKS: Virtualisation software is installed on a computer with the host
operating system. The host computer’s hardware resources such as RAM, CPU
and storage can be allocated
USES: When application software needs to be installed that is not compatible with
host operating system
To safety test the if application software downloaded and installed contains
malware
ADVANTAGES: Online virtual machines can be hired.
Cloud
computing
VIRTUAL SERVER: Many users access
virtualisation the resources of one powerful
techniques machine through the internet
The resources of many computers are
combined through the internet, to be
seen as one powerful machine
Theory Notes
CHAP TER 1.3
Social Social engineering is a manipulation technique used by
cybercriminals to trick people into providing
Engineering confidential information
Identity Theft
Having your identity stolen by someone else who
uses your personal information to apply for a loan
or credit
Catfishing
Creating a fake profile on social media with the
intent to lure someone else into a relationship often
for financial gain
Spoofing
An email or website that appears to be from a legit
organisation but is a replica to take your personal
information
Phishing
Is done through an email containing a link to a
website appearing to be legitimate to trick a user
into entering private information
Pharming
Is a technique used to direct your website browser
to another IP address when you enter a domain
name when you type [Link] it takes you
to some IP address
Malware
Is a malicious system with the intent to cause
harm to computers stealing data
How computer gets affected
Downloading things for the internet. Running an
infected file. Clicking links from strangers
EXAMPLES
Computer virus. Trojan
Is a malware that disrupts the functioning of a computer
Computer attaches itself to files
Virus Computer worm
Is a malware that takes advantage of software to replicate itself
on a computer
How to identify a computer worm
Decrease in storage
Decrease in performance
Antivirus Notification
Trojan
Is a malware disguising itself as a harmless
program that is downloaded by the user causes
harms by changing settings and taking control of
computer
rootkit
A rootkit is malware that hides itself and gives a
hacker full administrator (root) control over your
device. It stays hidden, can steal data, install other
malware, spy on you, or control your system
without you knowing. Rootkits are hard to detect
and often require special tools or a full system
reinstall to remove.
Ransomware
Ransomware is malware that locks or encrypts your
files and demands a ransom to unlock them, often
spreading through emails, fake apps, or infected
software, and can cause permanent data loss if not
properly backed up.
A firewall blocks suspicious traffic from entering your device or
Firewall network.
Protection How to use it properly
Keep your Windows or macOS firewall ON at all times
Don’t install random firewall apps — use trusted ones only
If you have a WiFi router, enable the router firewall too
Block unknown devices from connecting to your WiFi
Disable “UPnP” on the router (hackers use it)
Strong Passwords
• Weak passwords are one of the biggest causes of hacks.
• Strong password rules
• 12+ characters
• A mix of letters, numbers, symbols
• Avoid names, birthdays, or simple patterns
• Different passwords for:
• Email
• Social media
• Banking
Secure Websites
• Always check if a website is safe before entering your details.
• Check for:
• HTTPS (padlock symbol in the URL bar)
• Correct spelling of the site (hackers create fake lookalikes)
• No pop-ups asking for personal info
• Avoid sites offering:
• Free paid apps
• Free coins/cheats
Safe Email Habits
• Most hacks start with email.
• Never:
• Don’t open attachments from unknown senders
• Don’t click weird links
• Don’t respond to “URGENT: your account will close” emails
• Don’t enter passwords on links sent to you
• Do:
• Check the sender’s actual email address
• Turn on 2FA (two-factor authentication)
• Report suspicious messages as spam
protect online identity
01 02 03 04
Use STRONG Turn on Protect Your Protect
passwords Two-Factor Personal Yourself From
Authentication Information Email Scams
(2FA)
Patch and service pack
• A patch is a small update that fixes a specific
bug or security issue, while a service pack is a
larger update that bundles many patches and
improvements together.
An antivirus is a program designed to detect, prevent, and remove malware
Antivirus (viruses, worms, trojans, spyware, ransomware, etc.) from your computer
or device.
What it does
Scans files and programs for malicious code
Blocks or removes threats before they harm your system
Monitors your system in real-time to prevent infection
Updates regularly to recognize new threats
NFC (Near Field What it is: Short-range wireless
communication (a few centimeters).
Communication)
Use: Data exchange between devices by
touching or bringing them close.
Contactless payments (Apple Pay,
Samsung Pay)
Examples: NFC cards for access control
Sharing files or links between phones
Key point: Works only over very short
distances, so relatively secure.
RFID (Radio What it is: Uses radio waves to identify objects or
people via an RFID tag.
Frequency
Identification) Use: Tracking and identification without physical
contact.
Inventory management in stores
Examples: Keycards for buildings
Animal tracking
Key point: Can work over longer distances than
NFC, but signals can be intercepted if not
encrypted.
Biometric Systems
What it is: Uses unique biological traits to identify or authenticate a
person.
• Use: Security and access control.
• Examples:
• Fingerprint scanners
• Face recognition
• Iris/retina scanners
• Voice recognition
• Key point: Very secure because biometrics are unique, but can have
privacy concerns.
Human error
• Human error is a mistake made by a person that
can cause problems, and it can be prevented with
training, strong policies, automation, user-friendly
systems, and regular backups.
GIGO
GIGO (Garbage In, Garbage Out) means
that if you input bad or incorrect data into
a computer or system, the output will also
be wrong or useless.
To prevent GIGO, ensure data is accurate,
validated, reliable, carefully entered, and
regularly reviewed.
Validation
Definition: The process of checking data
to ensure it is correct, complete, and
reasonable before it is processed by a
system.
Purpose: Prevents errors, ensures
quality, and reduces the risk of incorrect
outputs (GIGO).
Hardware Definition: When a physical component of a
computer or device stops working properly or
Failure breaks down.
Common hardware components that fail: Hard
drives, RAM, motherboard, CPU, power supply,
GPU, network cards.
Prevent hardware failure by backing up data,
using surge protection, maintaining and
monitoring devices, replacing old parts, avoiding
physical damage, and keeping software updated.
UPS Definition: A device that provides backup
(Uninterruptible power to computers or electronics during
power outages or fluctuations.
Power Supply)
Purpose: Prevents data loss, hardware
damage, and downtime caused by sudden
power cuts.
Charges its internal battery
while power is on
How it works: Switches to battery power
instantly during an outage
RAID (Redundant Array of Independent/Inexpensive Disks)
Definition: A system
Purpose: Protects data
that combines multiple
from hardware failure
hard drives to improve
and can increase
performance,
speed.
redundancy, or both.
backup
• Definition: A backup is a copy of data stored
separately to protect against loss, corruption, or
hardware failure.
• Types: Full, Incremental, Differential, Mirror,
Cloud, and Local backups.
• Tips: Backup regularly, store in multiple
locations, automate, test, encrypt, keep versions,
and organize backups properly.
Software Bugs
• Definition: A software bug is an error, flaw, or
fault in a program that causes it to behave
unexpectedly or incorrectly.
• Causes of Software Bugs
• Coding errors – Mistakes in the program’s code
• Logic errors – Program doesn’t perform as
intended
Compatible Software
• Definition: Software that can run correctly on a
specific device or operating system without
errors.
• Key Points:
• Must match the device’s OS (Windows, macOS, Linux)
• Must meet hardware requirements (RAM, CPU,
storage)
• Example: Photoshop designed to run on Windows
11 is compatible software for that OS.
Device Driver
• Definition: A special program that allows the operating
system to communicate with hardware devices.
• Purpose:
• Ensures devices like printers, graphics cards, or
keyboards work properly.
• Example: Printer drivers, GPU drivers, sound card drivers.
• Note: Outdated or missing drivers can cause hardware to
malfunction.
Upgrading Hardware
• Definition: Replacing or adding physical
components of a computer or device to improve
performance, capacity, or capabilities.
Data Encryption
• Definition: Data encryption is the process of
converting information into a coded format so that
only authorized users can read it.
• Purpose: Protects sensitive data from
unauthorized access, theft, or tampering.
DRM (Digital Rights Management)
• Definition: DRM is a technology used to control
how digital content is used, copied, or distributed.
• Purpose: Protects copyrighted material like music,
movies, ebooks, and software from unauthorized
use or piracy.
MFA (Multi-Factor Authentication)
• Definition: A security method that requires two or
more forms of verification before granting access.
• Factors include:
• Something you know – password, PIN
• Something you have – phone, security token
• Something you are – fingerprint, face recognition
• Purpose: Makes accounts much harder to hack
than passwords alone
OTP (One-Time Password)
• Definition: A temporary, single-use code used to
authenticate a user.
• How it works:
• Sent via SMS, email, or generated by an app
• Valid for a short period (e.g., 30–60 seconds)
• Purpose: Adds an extra layer of security for login
or transactions.
Security Token
• Security Token
• Definition: A physical or digital device that
generates or stores authentication codes.
• Types:
• Hardware token – small device generating OTPs
(e.g., RSA token)
• Software token – app-based code generator (e.g.,
Google Authenticator)
• Purpose: Confirms identity as part of MFA.
Theory
Notes
CHAP TER 2.1
Networks
A network is a group of computing devices connected through communication media to
allow devices to communicate and share resources
ADVANTAGES: Sharing Resources. Improved communication. Centralised Data.
Transfer of funds
DISADVANTAGES: Malware spreads quickly. Expensive to setup. Risk of data theft.
Needed to NODES: Workstations like laptops and desktop.
Computing devices like smartphones, tablets and printers
setup for a
LAN NIC: Communication media
WIRED: UTP cables. Fibre optic cables.
WIRELESS: Wi-Fi. WiMAX. Cellular. Bluetooth
SWITCH: Router if internet access is important
Server
Servers are computers, with high
specifications, that provide network resources
to the devices in a network
ABOUT: Servers will have higher specification
for: Higher Capacity. Faster CPU and more
cores. More storage capacity.
NOS
Network operating system
FUNCTION: System software installed on the
server to manage and control other
computing devices connected to the network
EXAMPLES: Linux Server. Ubuntu Server.
Microsoft Windows Server
NIC network interface controller
FUNCTION: The NIC is a hardware device that allows the computing device to
connect to the network, so that it can communicate with the other components
WIRED: A wired NIC provides a port for the network cable to plug into.
WIRELESS: Mobile devices such as laptops and tablets often have a wireless
NIC
LAPTOPS CAN HAVE 2 NICs: One, a wired NIC to connect via cable to a wired
network
The other a wireless NIC to connect via Wi-Fi to the network
Switch
FUNCTION: The switch is a hardware device that
connects computing devices to a central point
and directs the data in the network to the
correct destination
DISADVANTAGES: A loss in productivity may be
cause by a faulty switch, since none of the nodes
connected to that switch will be able to
communicate on the network
Router FUNCTION: A hardware device that sends and
receives data from one network to another to
the correct destination, via the best route.
USES: A router can connect two LANs
together to create a WAN
It can connect a network to the internet
Terminology
BANDWIDTH: Is the minimum amount of data that can be transmitted
in a network from one point to the other in a certain time
BROADBAND: High bandwidth means that data will transfer faster
than a low bandwidth
RANGE: The range is the distance that a signal can be transmitted to
send and receive data
BACKBONE: A backbone connects different segments of a network
that are far apart
Communication Attenuation: Is an interruption in data transmission
Media. caused by the weakening of strength of a signal over
a distance
WEAKNESSES
EAVESDROPPING: Is an interruption of data being
transmitted between devices on a network for
dishonest purposes
EMI: Electromagnetic interface Is the disruption of
signal due to the electromagnetic fields from the
electrical equipment within the vicinity of the
communication media
PAN Personal area network
A connection of devices for a short period of
time within the vicinity of one person
EXAMPLE: Connecting a phone to the car radio
to play music or make phone calls
COMPOSITION: One main device with up to 7
peripheral devices, when using bluetootg
HAN Home area network
A small network connecting devices at home
EXAMPLES: A network at home where devices and
computers are connected often sharing an internet
connection
COMPOSITION: A wireless router with devices
connected to it like computers and printers
LAN Local area network
A network on a single site in a small area
EXAMPLES: A network at school or an office
COMPOSITION: Switch servers, computers and
printers
WLAN Wireless local area network
When a LAN allows mobile devices to connect
wirelessly to the network
EXAMPLES: A network at a school or an office on a
single site that allows mobile devices like laptops
and smartphone to connect to wirelessly
COMPOSITION: Switch, server, access points,
laptops and smartphones
WAN Wide area network
A network that connects devices over a larger
geographical area, such as a province
EXAMPLES: The internet and networks of large
companies like mobile networks and banking
networks
COMPOSITION: Two or more LANs connected
through a router
PAN ADVANTAGES: Data can be synchronised
between personal devices
Data can be transferred between device
Devices can connect to other devices
nearby
EXAMPLES: Synchronise a smart watch
with a smartphone
Apple Airdrop to transfer files such as
pictures
WLAN ADVANTAGES: It is easy to add new devices to a WLAN since each device does
not need a network point to connect to
The setup cost is less than a LAN
DISADVANTAGES: There could be a disruption in signal due to EMI or structures
such as walls and ceilings, depending on the quality of the access points
The risk of hackers gaining access to the network is high
HOW TO ADDRESS POOR SIGNAL: Add more access points to the network
Add boosters to increase the signal strength in areas with poor signal
Star Topology A star topology is often used in a LAN where all the
devices are linked independently to the switch as the
central point
ADVANTAGES: Easy to troubleshoot
It is easy to setup and to add and remove devices
DISADVANTAGES: A loss in productivity may be caused
by a faulty switch, since none of the nodes connected to
that switch will be able to communicate on the network
INTERNET: internet is a worldwide network of devices,
Internet vs allowing users to communicate and access resources
through various types of communication media
Intranet vs
INTRANET: intranet is a private network that offers access
Extranet to employees of a company
EXTRANET: An extranet Is like an intranet but allows clients,
partners and supplier access to a limited selection of
company resources by logging in with a usernames and
password
EXAMPLES: Schools and varsities have extranets to make a
students result available to them through a username and
password
VPN Virtual Private Network
A VPN is a network that allows a remote worker to securely login to the company
network via the internet, using their username and password
BUSINESS USES: When users work from home or travel for work they are able
to login to the network to get access to network resources
EXAMPLES OF RESOURCES: Employees can send documents to the office
printers
HOW TO LOGIN: The remote computer needs to be connected to the internet
FUNCTION: A VPN creates an encrypted connection over the internet to give the
user the same security as they would have if they have logged in locally to the
network
Location based computing is the processes where the physical
Location location of a mobile device is used
COMPONENTS NEEDED: Positioning system for devices or user
using GPS
based Mobile device
APPLICATION EXAMPLES: Uber and Bolt, Google maps, weather
computing and snapchat
ADVANTAGES TO COMPANY: Allows for profiling of customers
Can track online orders
ADVANTAGES TO THE USERS: Can tell when someone you know
is nearby
Can get food delivered to you
SOCIAL IMPLICATIONS: Lack of privacy. Data collected about
traveling habits
Theory
Notes
CHAP TER 2.2
Network USERNAME: Username identify the user on a
network
Access
PASSWORDS: Passwords authenticate the
username
ACCESS RIGHTS: Are setup by the network admin
to give the users right to data on the network
PERMISSIONS: Are then used to determine what
the user may do with the data
NAC Network Access control
NAC is settings in the network system software
that the network admin uses to set access rights
and permissions for users
EXAMPLES: Learners are allowed to access their
own files on the server
User permissions and access rights are setup using
NAC
Permission READ
READ: Allows viewing, listing and opening and copying of
files, folders and subfolders
types for files
and folders WRITE
WRITE: Allows the user to add new files, and make
changes to files folders and subfolders
READ AND READ AND EXECUTE: Allows viewing and listing of files
EXECUTE and folders
MODIFY: Allows the user to make changes to files, folders
MODIFY and subfolders
FULL CONTROL: Permits reading, writing, changing and
CONTROL deleting of files and folders
User rights ADMINISTRATOR: Install software
Manage and configure hardware
Reset user passwords
STANDARD USER: They are able to make changes to
files, folders and subfolders according to the
permissions set on the user accounts by the network
AUP Acceptable Use Policy
An AUP is a document specifying the rules and regulations of
what acceptable behaviour is for users of a company network
INCLUDED: The company’s network and resources may not be
used for illegal activities
Employees may not disrupt the security of the network
HOW AUP SHOULD BE IMPLEMENTED: All users must be
made to agree and sign the AUP
Actions must be taken as stipulated in the AUP when rules and
regulations are not followed
IMPROVED COMMUNICATION: Can communicate with anyone anywhere in
ICT and the the world in real time
effect on Access to vast amounts of information
humans IMPROVED ACCURACY: Human errors are reduced
Garbage in Garbage out will still affect the accuracy of the system
AUTOMATION OF REPETITIVE TASKS: Repetitive tasks don’t have to be
done manually
Tasks will perform faster than humans can do them
COLLECTING AND MINNING OF HUGE AMOUNTS OF DATA: It allows
companies to target advertise to the right potential or existing customers
SECURELY STORE AND BACKUP DATA: Prevents data loss in the case of
theft, fire or mechanical failure
Factors INFRASTRUCTURE: ICT is dependent on a stable power
supply and stable fast and affordable internet connection
limiting ICT
HUMANS: Skilled programmers are needed to develop
software.
Software could contain bugs
COST: The cost of the hardware and software can be high
INFORMATION OVERLOAD: All information needs to be
verified which will cost time and money
Computers Elections: Electronic voting improves accuracy of
counting votes cast and improves the speed at
providing which the results can be determined
solutions
CENSUS: A census is used to gather information
about a specific population
WEATHER: Location based computing together
with data collection and mining assists in
weather predictions
Theory Notes
CHAP TER 3.1
Theory
Notes
CHAP TER 3.2
Collecting
data
MANUAL: Data can be entered manually
into a system by data captures or users.
This often leads to errors being made
ELECTRONICALLY: Data can be
collected by importing from an existing
system
Data warehouse
Companies store their huge
collection of data in a central
database
Data Mining
This the process where companies use the raw data
stored in the data warehouse and turn it into useful
information by using software and complex
algorithms to discover patterns in the data
DBMS Database Management System
DBMS software is application software that allows the user to interact
with a database
FUNCTION: Create and edit the database structure
Maintain data such as Edit, Insert, Delete, Import
QUERY: A query can be done through a programming language like SQL,
to retrieve information from database tables based on certain criteria
Desktop A desktop database is intended to be
database used on a personal computer in a single
location, usually used for a single user
EXAMPLES: Microsoft Access
LibreOffice Base (FOSS)
A server database is stored on a server and can be accessed by multiple users
Server/ using client software on their devices via a network
centralised DBMS: Microsoft SQL server
database Oracle Database
Blackfish SQL
ADVANATAGES: Since it is stored in a central location it is easy to do maintenance
The database is more secure
DISADVANTAGES: Access could be slow if there are too many users accessing the
database at the same time
If the network loses connection, then data is unavailable
A distributed database is used when the database or sections of it are
Distributed spread over multiple servers in different physical locations
database USE: When a company has branches spread over a large geographical
area
Where too many users need to access the data on a single server
SYNCHRONISATION: Is when data is changed in one copy of the
database, all other copies are updated with these changes
ADVANTAGES: Congestion to a single server is reduced
There is less downtime since other sites can continue if one server
fails
DISADVANTAGE: To setup a distributed database can be expensive
Synchronisation of data is more complex
Blockchain
Blockchain is a distributed database with a growing records called blocks, linked
together using cryptograph
CRYTOGRAPH: Makes use of algorithms to encrypt and decrypt information so that
only those the information is intended for open and process it
FUNCTION: Blockchain allows for secure and transparent transactions since the
blocks cannot be altered because the chain is broken as soon as they are changed
HOW IT WORKS: Transactions are stored in blocks with a set storage capacity
USES: Cryptocurrency like bitcoin
ADVANTAGES: High security, since the blocks cannot be altered without breaking
the chain
DISADVANTAGES: High cost to a company wanting to implement blockchain
DBA
Database Administrator
RESPONSIBILITIES: Maintenance of
the database such as backup and
restoration plans
Managing the database by monitoring
the performance and making
improvements
Database
programmers
Programmers that write code to query, sort and
process data usually making use of SQL
They are also responsible for programming
software or websites that allow a user to
interact with the database for a specific purpose
Database
analyst
Monitor the performance of the
database and suggest changes to
improve it
Maintenance of the database in
terms of which data should be
created, updated or deleted
Database
Planning and managing new projects
project
manager
Settings deadlines, tracking the
progress and guiding the team to
ensure deadlines are met
Documents the project processes for
future purposes
Theory notes
computer
CHAP TER 4.1
EXAMPLES: 5G. 4G. LTE
USES: Users that need on
Cellular Data internet connection while
travelling
Often used in mobile devices
such as smartphones and tablets
A hotspot is an area where internet access is available through
wireless communication media such as Wi-Fi
USES: Can be used in an office to connect computing devices to a
company’s network
Clients of restaurants or passengers at an airport can connect to a
public hotspot to get access to the internet
Hotspot DANGERS: The network might not be protected by any security
measures such as firewalls or anti-virus
Devices may be exposed to malware since many users connect to
the hotspot
TYPES: Mobile hotspot
Public Hotspot
Mobile Hotspot
A mobile hotspot makes cellular internet connection of one device
available to others, connecting them through Wi-Fi
FUNCTION: This process turns a mobile device into a wireless access
point that allows other mobile devices to use its cellular data
connection to access the internet
PUBLIC HOTSPOT: A Public hotspot is created in a public area like an
airport or a mall to allow visitors to connect to the internet via Wi-Fi
FTTH Fibre to the Home
FTTH is a fibre cable connection to a premises to a provide the
residence/ company with a high bandwidth internet connection
HOW DOES IT WORK: The property owner needs to choose a fibre line
provider and an ISP. Once the fibre line is installed, a technician will
connect the fibre line to a router fibre.
ISP: An Internet Service Provider is a company that provides
individuals or other companies with internet access at a monthly cost
SHAPED: On a shaped line ISP will priorities some online activity over
others when the internet is busy.
THROTTLED: Throttling reduces bandwidth equally to all activities on
the network
Electronic mail is used to send, receive, reply to and forward electronic
E-Mail messages over the internet
WRITING STYLE: Formal, using proper netiquette
FUNCTION: E-mail is used to send, receive, forward and reply to electronic
messages containing
E-mails can be sent to one or many individuals at the same time.
AUDIENCE: Anyone who has an e-mail address can make use of this service
A company can advertise to potential customers
SOFTWARE: Apps like Gmail, mail, Microsoft Outlook
Access through a web browser like Google Chrome, Safari
SMS Short message system
Sending or receiving a short message using airtime instead of the
internet
WRITING STYLE: Both use an informal writing style, SMS language
FUNCTION: Used when the receiver or sender does not have internet
access or a smartphone.
Can be used to send multimedia attachments using MMS but this
requires a cellular data connection
AUDIENCE: Anyone with a cell phone number
SOFTWARE: Any mobile phone or smartphone will have the software
preinstalled with the operating software
IM Instant messaging
Sending or receiving messages using an app on a smartphone via the
internet
WRITING STYLE: Both use an informal writing style, often making use of
emoticons and SMS Language
FUNCTION: To communicate with friends, family or groups of people to
organise events
Multimedia such as pictures, videos and audio can be shared with individuals
and groups
AUDIENCE: Both sender and receiver need the same app installed on their
smartphone and data to send and receive messages.
SOFTWARE: Signal, Telegram, Snapchat, Whatsapp, Messenger.
A webpage on a which a user shares their online diary in the
BLOG form of written ideas and pictures
WRITING STYLE: Entries of one person from a personal
perspective in an informal style with the latest post at the top
FUNCTION: Users share information about their own knowledge
or experiences
AUDIENCE: Anyone interested in the blogger’s topic who has an
internet connection
SOFTWARE: Any web browser like Google Chrome or an app
like WIX, Blogger, word Press
ACCURACY: Post could be fake news and would need to be
verified
Posts are biased and does not always give factual information
A type of blog where the number of characters is limited in the
Microblogging posts
WRITING STYLE: Informal writing style, often making use of
emoticons and SMS language
FUNCTION: It is used to share ideas to followers online. An
organisation could keep their clients informed
AUDIENCE: Anyone with an internet connection and an account
on the platform where the messages are posted
SOFTWARE: X (Twitter), Tumblr, Plurk
ACCURACY: Post could be fake news and would need to be
verified
Posts are biased and does not always give factual information
Videos that users create and share via on online platform
WRITING STYLE: Informal videos mostly not done by professionals
. They are like blogs but use videos to communicate information
FUNCTION: Vlogs are used in e-learning for entertaining and
Vlog (Video advertisement
Blog) AUDIENCE: Anyone interested in the topic, with an internet
connection, can access both. An account is often not needed
SOFTWARE: Any web browser or an app like YouTube, Instagram
or TikTok
VODCAST: A vodcast is like a vlog but mostly more informative
and factual
Podcast Audio files posted online that can be downloaded to a device to listen to later
WRITING STYLE: Formal styles like news and shows from radio stations.
Informal styles like book reading. Files downloaded will be in on MP3 format
FUNCTION: It allows users to listen to a recording of what was broadcast on the
radio again
AUDIENCE: Anyone interested in the topic, with an internet connection, can
access both. An account is often not needed
SOTWARE: Any web browser or an app like Apple podcast or Audio Books
VODCAST: A vodcast is like a vlog but mostly more informative and factual
A video conference is a meeting held online, that anyone is able to join
in real-time, from anywhere in the world as long as they have a device
and an internet connection
WRITING STYLE: Mostly formal
FUNCTION: Business meetings and e-learning can be done through
Video video conferencing
conference AUDIENCE: A wide audience. Anyone with an internet connection
could join if they registered or were invited to the meeting
SOFTWARE: Skype. Microsoft Teams. Zoom
REAL-TIME: Data that is transferred as it happens on the internet
E-Learning E-Learning allows students ta take a course over the internet without meeting
face to face with the lecturer
ABOUT: Work is sent and received electronically in the from of documents, videos
and podcasts
ADVANTAGES: Students can access the course material at anytime, from
anywhere in the world as long as they have an internet connection and a mobile
device.
Many of the quizzes give immediate feedback
DISADVANTAGES: Technical difficulties such as hardware problems, loss of
power or internet connection can interrupt learning
If feedback is limited, a learner might not be able to understand what their
mistakes are and how to correct them
Online Cloud storage is an internet service, to which users can subscribe,
where they can store their files on a server connected to the internet
storage
EXAMPLES: Dropbox, iCloud, OneDrive, Google Drive
ADVANTAGES: People can work together on the same file, from
different locations at the same time
Small amount of cloud storage is free
DISADVANTAGES: Requires and internet connection
The free space provided is limited and you will have to pay for more
storage
Protocols A protocol is a standard set of rules for encoding
and decoding data to transfer over a network
FUNCTION: It allows for communication between
devices over a network
ENCODING: The function od encoding of data is to
change the format of the data
EXAMPLES: Converting text to binary so that it
can be transmitted over a network
Internet protocol
IP
An IP address is a unique number that
is assigned to a computing device
when it is connected to a network such
as the internet or a local network
Simple Mail Transfer Protocol
SMTP
A protocol used to send and
receive e-mails over the internet
from an SMTP server
Post office protocol 3
A protocol used to download
POP3 incoming e-mails over the internet
from a POP3 server.
This protocol downloads the e-mails
–from the server to the local device
and deletes the e-mail on the server
Internet Message Access Protocol
IMAP
A copy of the email is left on the server to
allow users to read, send and organise
their e-mails from multiple devices,
wherever they are as long as they have an
internet connection
Hyper text Transfer Protocol
HTTP
A protocol used to determine
how web page data is
transferred over the internet
Hyper text Transfer Protocol
Secure
HTTPS
A Protocol that allows for secure
data transfer over the internet by
encrypting the data
VoIP
Voice over internet Protocol
A protocol that allows the transfer of voice data over a network
such as the internet
SOFTWARE: Skype. Microsoft teams. Zoom. Instagram
REQUIREMENTS: Computing device
Stable internet connection
Webcam if user needs to see each other
ADVANTAGES: Video calls are also possible
Video conferencing is made possible
DISADVANTAGES: Both users need stable internet connection
Battery life of a mobile device could be depleted quickly while
on call