0% found this document useful (0 votes)
5 views

IT Study Notes

Uploaded by

Xoey
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

IT Study Notes

Uploaded by

Xoey
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Topics given

Flashcards
Sections 2,3,4,5

Everything from January would include:


Section 2:
Computer Networks & Web Technologies
Types of networks
The Internet
Transmission media
Technology concepts
Switch vs. Router vs. Modem

Section 3:
Social and Economic impact of information and communication technology
Computer security and cybersecurity
Social and Economic Impact (Threats, attacks, vulnerabilities, and countermeasures)
Internet security

Section 4: Word Processing & Web page design


Introduction to Microsoft Word
Editing a document
Document Editing
Mail Merge

Section 5:
Spreadsheet (Video on Spreadsheet)

Topics given:
Computer Security - The protection of computer systems and information from harm, theft and
unauthorized use.

✦ Unethical Computer practices :


Hacking: Unauthorized access to computers or networks.
Phishing: Fraudulent attempts to obtain sensitive information.
Malware Distribution: Spreading harmful software (viruses, ransomware).
Plagiarism: Using someone else's work without proper attribution.
Cyberbullying: Harassing or threatening individuals online.
Identity Theft: Using someone else's personal information for fraud.
✦ Explain how you can protect your computer from risks (5 Ways)
1. Install Antivirus Software: Protects against malware and viruses.
2. Use Strong Passwords: Secures accounts and prevents unauthorized access.
3. Enable Firewalls: Blocks unauthorized access to your network.
4. Keep Software Updated: Patches vulnerabilities and improves security.
5. Avoid Suspicious Links: Prevents phishing and malware infections.

✦ What is Internet Security?


Measures and practices to protect data, networks, and devices from cyber threats, ensuring safe
online transactions and communications.

✦ What are Computer Threats?


Dangers to your computer or network, like viruses, malware, phishing, and hacking, that can
harm your data or disrupt your system.

✦ What is a Cyber threat?


A potential danger that can exploit a vulnerability to breach security and cause harm to computer
systems, networks, or data.

Paper 1 Topics;

Transmission Mode:

Simplex: Communication is one-way only. Data travels in a single direction from the sender to
the receiver, without any ability for the receiver to send information back to the sender. An
example is a TV broadcast.

Half Duplex: Communication is two-way, but only one direction at a time. Both parties can send
and receive data, but not simultaneously. When one party sends, the other must wait until the
transmission is complete before responding. An example is a walkie-talkie.

Duplex (Full Duplex): Communication is two-way and simultaneous. Both parties can send and
receive data at the same time, allowing for continuous, bidirectional data flow. An example is a
telephone call.

Transmission Signal
A transmission signal is the energy used to convey data in a communication system. It carries
information through cables, fibers, or the air in various forms, such as analog or digital signals.

RAM, ROM, DRAM, PROM


- RAM (Random Access Memory): It's volatile memory used for temporary storage. The CPU
accesses data stored in RAM randomly, allowing for fast read and write operations. It loses its
contents when the power is turned off.

- ROM (Read-Only Memory): It's non-volatile memory that stores instructions required to start
up a computer system. The data in ROM is pre-programmed during manufacturing and remains
intact even when the power is turned off.

- DRAM (Dynamic Random Access Memory): It's a type of RAM that stores each bit of data in
a separate capacitor within an integrated circuit. It needs to be refreshed periodically to maintain
data integrity, hence the term "dynamic."

- PROM (Programmable Read-Only Memory): It's a type of ROM that can be programmed once
by the user after manufacturing. Once programmed, the data stored in PROM remains
unchanged.

Everything on Section 4:

Word Processing
Advantages of word processing
Type - Writer definition
Difference between word processor and type writer
6 Steps to open microsoft word
4 features of microsoft word
Describe 2 features
Short cut
Formatting (Bold, Italics)
How to edit a document

Word Processing
↬ Word processing is the preparation of documents such as e-reports, memos, books and other
communication on a computer processor

Advantages of Word Processing:


1. Efficiency: Faster typing, editing, and formatting compared to handwritten documents.
2. Editing Tools: Easy to correct errors, cut, copy, paste, and rearrange text.
3. Formatting Options: Wide range of fonts, styles, and layout options.
4. Storage and Retrieval: Documents can be saved, retrieved, and shared easily.

Typewriter
Definition:
A typewriter is a mechanical or electromechanical machine for typing characters. It uses a
keyboard to produce printed text on paper.

Difference between Word Processor and Typewriter


1. Editing: Word processors allow easy editing, whereas typewriters require retyping to correct
errors.
2. Formatting: Word processors offer extensive formatting options; typewriters have limited
formatting.
3. Storage: Word processors can save documents digitally; typewriters produce only physical
copies.
4. Functions: Word processors can include images, tables, and hyperlinks; typewriters cannot.

6 Steps to Open MS Word


1. Start Menu: Click the Start button on your computer.
2. Search Bar: Type "Microsoft Word" in the search bar.
3. Select App: Click on the Microsoft Word app from the search results.
4. Open: Click "Open" or press Enter.
5. New Document: Once Word opens, click on "Blank Document."
6. Ready to Use: You can now start typing your document.

Features (4) of Microsoft Word


1. Text Formatting: Change font size, style, and color.
2. Spell Check: Automatically checks and suggests corrections for spelling errors.
3. Templates: Pre-designed templates for different types of documents.
4. Insert Tools: Add images, tables, charts, and hyperlinks.

Describe 2 Features of Microsoft Word


1. Spell Check: Automatically identifies and suggests corrections for spelling and grammatical
errors.
2. Insert Tools: Allows you to add images, tables, charts, hyperlinks, and other elements to
enhance your document.

Shortcut
Example: Ctrl + C (Copy), Ctrl + V (Paste), Ctrl + B (Bold), Ctrl + I (Italics)

Formatting (Bold, Italics)


Bold: Highlight the text and press Ctrl + B or click the bold icon.
Italics: Highlight the text and press Ctrl + I or click the italics icon.

How to Edit a Document


1. Open Document: Start by opening the document you want to edit.
2. Select Text: Click and drag to highlight the text you want to change.
3. Edit Text: Type new text, or use delete/backspace to remove text.
4. Format Text: Use the formatting toolbar to apply bold, italics, underline, etc.
5. Save Changes: Save your document by clicking on the Save icon or pressing Ctrl + S.

When editing, what does it change;


✦ Editing in word processing may include:
↬ Adding text
↬ Deleting text
↬ Copying text
↬ Moving text
↬ Posting text

Paper 2 Topics;

✦ What is Internet?
The network formed by the cooperative interconnection of millions of computers linked together

Computer practices;
↬ Backups: Save copies of important files.
↬ Strong Passwords: Use unique and complex passwords.
↬ Software Updates: Keep everything updated.
↬ Antivirus: Install antivirus software.
↬ Safe Browsing: Avoid suspicious websites.
↬ Firewall: Enable firewall protection.
↬ Secure Transactions: Use secure websites for transactions.

✦ What is Cyber Security?


The practice of protecting computers, networks, and data from unauthorized access, attacks,
damage, or theft.

Software Piracy
Software piracy is the unauthorized copying, distribution, or use of software. Two
disadvantages include loss of revenue for developers and potential security risks due to
unverified sources.
✦ Malware: Malicious software designed to damage or disrupt computer systems or gain
unauthorized access to data.
✦ Virus: A type of malware that attaches itself to legitimate programs or files and spreads from
one computer to another.
✦ Worms: Self-replicating malware that spreads across networks and systems without user
intervention.
✦ Trojan Horse: Malware disguised as legitimate software or files, which tricks users into
installing it, allowing unauthorized access to the system or causing damage.

* For Router, Modem, Switch ( See Flashcards 47-49 )

LAN , MAN, WAN


1. LAN (Local Area Network): A network that connects devices within a limited area, such as a
single building or campus.

2. MAN (Metropolitan Area Network): A network that covers a larger geographic area,
typically a city or metropolitan region, connecting multiple LANs.

3. WAN (Wide Area Network): A network that spans a large geographical area, connecting
LANs and MANs over long distances, often using leased lines or internet connections.

1. LAN (Local Area Network):


- Small-scale network within a single building or campus.
- Connects devices like computers and printers.
- Commonly used in homes, offices, and schools.

2. MAN (Metropolitan Area Network):


- Covers a city or metropolitan area.
- Connects multiple LANs over a larger geographic region.
- Used by organizations and institutions with dispersed locations.

3. WAN (Wide Area Network):


- Spans large geographic areas (e.g., multiple cities, countries).
- Connects LANs and MANs over long distances.
- Utilizes leased lines, satellite links, or internet connections.
- The internet is the largest WAN, connecting networks globally.
❖ Internet: The network formed by the cooperative interconnection of millions of computers
linked together

❖ Intranet: An intranet is a private network that is accessible only to an organization's internal


users, typically employees.

❖ Extranet: Network allowing controlled access to authorized external users, such as suppliers
or customers, to certain parts of an organization's intranet.
—-----------------------------------------------------------------------------------
Internet:
↬ Advantages: Global connectivity, vast information resources, communication.
↬ Disadvantages: Security risks, misinformation, distraction.

Intranet:
↬ Advantages: Internal communication, information sharing, collaboration.
↬ Disadvantages: Limited access, maintenance costs, potential for information overload.

Extranet:
↬ Advantages: Enhanced collaboration with external partners, streamlined communication,
improved efficiency.
↬ Disadvantages: Security concerns, need for careful access control, potential for data breaches.
—------------------------------------------------------------------------------------

Point of Difference Internet Intranet Extranet

Accesibility Public Private Private

Coverage All over the world Restricted area up to Restricted area up to


an organization an organization

Owner No one Single Organization Single/Multiple Org.

5 Features of Extranet:

✦ It is derived from intranet


✦ Less economical
✦Policies of the org are imposed
✦ Users are employees which are connected
✦ Private Network
Difference and Similarities between Router and Modem

Differences:
1. Functionality:
- Modem: Converts signals from ISP into usable internet.
- Router: Directs traffic between devices and internet.

2. Connection:
- Modem: Connects directly to ISP.
- Router: Connects to modem, creates local network.

Similarities:
1. Internet Connectivity:
- Both enable internet access.

2. Physical Appearance:
- Both small boxes, ports for connections.

✦ What is a web server?


A program which processes the network request of the users and serves them with files that
create web pages, this exchange takes place using HTML.

Steps to create a word doc:

1. Open Microsoft Word


2. Create a New Document
3. Enter Text
4. Save the Document
5. Format Text
6. Add Images or Graphics
7. Check Spelling and Grammar
8. Print or Share

Advantages and Disadvantages of Mail Merge


Advantages:
1. Saves time by automating repetitive tasks.
2. Personalizes mass communications, enhancing recipient engagement.
3. Reduces errors compared to manual data entry.

Disadvantages:
1. Requires careful setup and understanding of software.
2. Complex merges can be prone to errors.
3. May lead to spam-like communications if not used thoughtfully.

Functions of Spreadsheet:
⇾ Data organization: Helps organize data into rows and columns for easy viewing and
manipulation.

⇾ Formulas: Enables the use of built-in functions and custom formulas to perform complex
calculations.

⇾ Data analysis: Provides tools for analyzing data through charts, graphs, and pivot tables.

⇾ Data visualization: Allows for the creation of visually appealing charts and graphs to
represent data trends.

Features of Spreadsheet:

You might also like