IT Study Notes
IT Study Notes
Flashcards
Sections 2,3,4,5
Section 3:
Social and Economic impact of information and communication technology
Computer security and cybersecurity
Social and Economic Impact (Threats, attacks, vulnerabilities, and countermeasures)
Internet security
Section 5:
Spreadsheet (Video on Spreadsheet)
Topics given:
Computer Security - The protection of computer systems and information from harm, theft and
unauthorized use.
Paper 1 Topics;
Transmission Mode:
Simplex: Communication is one-way only. Data travels in a single direction from the sender to
the receiver, without any ability for the receiver to send information back to the sender. An
example is a TV broadcast.
Half Duplex: Communication is two-way, but only one direction at a time. Both parties can send
and receive data, but not simultaneously. When one party sends, the other must wait until the
transmission is complete before responding. An example is a walkie-talkie.
Duplex (Full Duplex): Communication is two-way and simultaneous. Both parties can send and
receive data at the same time, allowing for continuous, bidirectional data flow. An example is a
telephone call.
Transmission Signal
A transmission signal is the energy used to convey data in a communication system. It carries
information through cables, fibers, or the air in various forms, such as analog or digital signals.
- ROM (Read-Only Memory): It's non-volatile memory that stores instructions required to start
up a computer system. The data in ROM is pre-programmed during manufacturing and remains
intact even when the power is turned off.
- DRAM (Dynamic Random Access Memory): It's a type of RAM that stores each bit of data in
a separate capacitor within an integrated circuit. It needs to be refreshed periodically to maintain
data integrity, hence the term "dynamic."
- PROM (Programmable Read-Only Memory): It's a type of ROM that can be programmed once
by the user after manufacturing. Once programmed, the data stored in PROM remains
unchanged.
Everything on Section 4:
Word Processing
Advantages of word processing
Type - Writer definition
Difference between word processor and type writer
6 Steps to open microsoft word
4 features of microsoft word
Describe 2 features
Short cut
Formatting (Bold, Italics)
How to edit a document
Word Processing
↬ Word processing is the preparation of documents such as e-reports, memos, books and other
communication on a computer processor
Typewriter
Definition:
A typewriter is a mechanical or electromechanical machine for typing characters. It uses a
keyboard to produce printed text on paper.
Shortcut
Example: Ctrl + C (Copy), Ctrl + V (Paste), Ctrl + B (Bold), Ctrl + I (Italics)
Paper 2 Topics;
✦ What is Internet?
The network formed by the cooperative interconnection of millions of computers linked together
Computer practices;
↬ Backups: Save copies of important files.
↬ Strong Passwords: Use unique and complex passwords.
↬ Software Updates: Keep everything updated.
↬ Antivirus: Install antivirus software.
↬ Safe Browsing: Avoid suspicious websites.
↬ Firewall: Enable firewall protection.
↬ Secure Transactions: Use secure websites for transactions.
Software Piracy
Software piracy is the unauthorized copying, distribution, or use of software. Two
disadvantages include loss of revenue for developers and potential security risks due to
unverified sources.
✦ Malware: Malicious software designed to damage or disrupt computer systems or gain
unauthorized access to data.
✦ Virus: A type of malware that attaches itself to legitimate programs or files and spreads from
one computer to another.
✦ Worms: Self-replicating malware that spreads across networks and systems without user
intervention.
✦ Trojan Horse: Malware disguised as legitimate software or files, which tricks users into
installing it, allowing unauthorized access to the system or causing damage.
2. MAN (Metropolitan Area Network): A network that covers a larger geographic area,
typically a city or metropolitan region, connecting multiple LANs.
3. WAN (Wide Area Network): A network that spans a large geographical area, connecting
LANs and MANs over long distances, often using leased lines or internet connections.
❖ Extranet: Network allowing controlled access to authorized external users, such as suppliers
or customers, to certain parts of an organization's intranet.
—-----------------------------------------------------------------------------------
Internet:
↬ Advantages: Global connectivity, vast information resources, communication.
↬ Disadvantages: Security risks, misinformation, distraction.
Intranet:
↬ Advantages: Internal communication, information sharing, collaboration.
↬ Disadvantages: Limited access, maintenance costs, potential for information overload.
Extranet:
↬ Advantages: Enhanced collaboration with external partners, streamlined communication,
improved efficiency.
↬ Disadvantages: Security concerns, need for careful access control, potential for data breaches.
—------------------------------------------------------------------------------------
5 Features of Extranet:
Differences:
1. Functionality:
- Modem: Converts signals from ISP into usable internet.
- Router: Directs traffic between devices and internet.
2. Connection:
- Modem: Connects directly to ISP.
- Router: Connects to modem, creates local network.
Similarities:
1. Internet Connectivity:
- Both enable internet access.
2. Physical Appearance:
- Both small boxes, ports for connections.
Disadvantages:
1. Requires careful setup and understanding of software.
2. Complex merges can be prone to errors.
3. May lead to spam-like communications if not used thoughtfully.
Functions of Spreadsheet:
⇾ Data organization: Helps organize data into rows and columns for easy viewing and
manipulation.
⇾ Formulas: Enables the use of built-in functions and custom formulas to perform complex
calculations.
⇾ Data analysis: Provides tools for analyzing data through charts, graphs, and pivot tables.
⇾ Data visualization: Allows for the creation of visually appealing charts and graphs to
represent data trends.
Features of Spreadsheet: