0% found this document useful (0 votes)
24 views8 pages

Gr10 CAT Scope With Notes

Computer Applications and Technology Grade 10 and 11

Uploaded by

bartmancecilia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views8 pages

Gr10 CAT Scope With Notes

Computer Applications and Technology Grade 10 and 11

Uploaded by

bartmancecilia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Scope with Notes Theory (P2) - 13/06/2025 (1st/2nd session)

Breakdown: System technologies


General
File extensions

Information processing cycle

• Problem solving (keyboard/mouse)


The usage of ICT Hardware
Hardware: Hardware devices are the tangible parts of the computer, i.e. the parts we can see
and touch.
Software: Software is a set of instructions, data or programs used by computer to perform
specific tasks and for a user to interact with a device.
ICT incorporates all the sections and parts of a computer system, including the hardware,
software to allow us to exchange data and information as well as the user and the processes it
uses to run the system. ICT systems allow us to combine the different sections of the computer
to collect, process, store and communicate data and information. We use them daily on our

1|Page
phones, and when we are in the shops and use the POS (Point of Sale) systems for example.
Main features we look for in a POS system are a barcode scanner, keyboard, card machine,
screen, mini printer for receipts and cash till. (Image source: https://jitub.medium.com/cost and-
features-to-develop-a-restaurant-pos 18f9505ea3b) In the newer technology, we see how we
can have multiple technologies combined in one device – this is known as convergence.
Examples are smartphones as they have a phone, computer, GPS, camera etc all in one device.

Desktop/laptop/tablet specifications:

Storage (local/Online)SSD vs HDD

Processing: CPU
CPU (Central Processing Unit): The "brain" of the computer,
processes instructions.

Different types of input/output devices


Input devices are devices we use to insert data or information on a computer device. The most popular
input device is the keyboard. (Image source: (INPUT OUTPUT PORTS, n.d.)) We do have two types of
input: data which is unprocessed text, numbers, images and audio, and then we have instructions which
are programs and commands.
Output is where we can see or hear the results of our processing we have completed. There are
different output devices: • Screen • Projector • Printer • Speakers • Headphones

Biometric devices (scanners, RFID)

2|Page
Printer specifications

UPS device
A UPS (Uninterruptible Power Supply) device is a type of equipment that provides a backup power
source to connected devices in case of a power outage or disruption.

3D printers
A 3D printer is a type of machine that creates three-dimensional objects by layering materials such as
plastics, metals, and ceramics.

Software license
A software license is a legal agreement between the software developer or publisher and the user,
outlining the terms and conditions of software use.

Voice recognition software


Voice recognition software is a game-changer for productivity and accessibility. It allows you to control
devices, dictate text, and interact with technology using natural language. Example Speech-to-Text by
Google.

3|Page
Backups
Backups are essential for protecting your data from loss or corruption. Example Cloud Backup: Stores
data in the cloud, often with automatic backup and versioning.

Metadata
Metadata is "data about data" that provides context and description to digital content, making it easier to
manage, search, and understand e.g. File Properties.

QR codes
QR codes – we use to read the code via a smartphone camera to go to websites or more information on
the code.

OCR
Optical Character Recognition (OCR): Converts printed or handwritten text into digital format.

Network and Internet


Network:
Protection from unauthorised users
 Antivirus Software: Antivirus software can be installed on all network devices to scan them for
malicious programs. •
 Encryption: If data is intercepted or seen by an unauthorized user, they are unable to read it by
encrypting the data. •
 Firewalls: Firewalls are a software program, hardware device or combination of both that blocks
unsolicited traffic from entering a network. •
 Multi-Factor Authentication: Users must provide two separate methods of identification to log into
an account (for instance, typing in a password and then typing in a numeric code that was sent to
another device).

Network connection devices


Modem Hardware device that allows network devices to connect to the internet. Switch Allows multiple
devices on a network to communicate with each other. Router A device that connects network to other
networks wirelessly or through cables. Wireless Access Point (WAP) these points allow devices to
connect to a wireless network without cables. It can also give useful data about the devices on the
network.

Advantages & disadvantages of a network (LAN/WAN)

4|Page
Network security (security threads, preventions etc)
Antivirus Software: Antivirus software can be installed on all network devices to scan them for
malicious programs.
Encryption: If data is intercepted or seen by an unauthorized user, they are unable to read it by
encrypting the data.
Firewalls: Firewalls are a software program, hardware device or combination of both that blocks
unsolicited traffic from entering a network.
Multi-Factor Authentication: Users must provide two separate meth ods of identification to log into an
account (for instance, typing in a password and then typing in a numeric code that was sent to another
device).

Problem solving (unable to connect to network


Restart Devices: Restart your router, modem, and device to ensure a fresh connection.
Check Cables: Verify all cables are securely connected to the correct ports.
Network Settings: Ensure your device's network settings are set to obtain an IP address automatically.
Wi-Fi Signal: Check the Wi-Fi signal strength and move closer to the router if necessary.

Data transfer speed

5|Page
Data processing speed refers to the rate at which a computer or system can process and analyse data.

Internet connections
Internet connections enable devices to access and communicate with the global network of
interconnected computers. Types of internet connections Wired Connections, Wireless Connections, Wi-
Fi or wireless, Mobile Connections.

Advantages and disadvantages of https


Advantages of HTTPS
Encryption, Authentication, Data Integrity, Trust and Credibility and SEO Benefits.
Disadvantages of HTTPS
Performance Overhead, Certificate Management, Compatibility Issues, Mixed Content Issues,
Cost.
Importance of internet access
Access to Information, Global Connectivity, Economic Opportunities, Education and Skills Development,
Healthcare and Telemedicin.

Online storage
Online storage, also known as cloud storage, allows users to store and access data over the
internet. Types of online storage includes Cloud Storage Services: Services like Google Drive,
Dropbox, and Microsoft OneDrive offer cloud storage. File Hosting Services: Services like Box
and pCloud offer file hosting and sharing capabilities. Object Storage: Services like Amazon S3
offer object storage for large amounts of unstructured data.

Information Management/Inligtingsbestuur:
• Problem solving steps/Data handling process.
• Information sources and gathering tools (Questionnaires/Vraelyste)

Social implication/Sociale implikasies: General:


Telecommuting
Telecommuting, also known as remote work or working from home, allows employees to perform their
job tasks from outside the traditional office environment.

Advantages & disadvantages of factor authentication


Advantages of 2FA
Improved Security, Protection against Phishing, Reduced Risk of Data Breaches: Compliance with
Regulations, Increased Confidence.
Disadvantages of 2FA
Increased Complexity, User Resistance, Technical Issues, Cost, User Experience
Examples of factor authentication
SMS-Based 2FA, Authenticator App-Based 2FA, Biometric 2FA, Hardware Token-Based 2FA.

Intellectual property Hardware:


Intellectual property (IP) related to hardware refers to the protection of innovative designs, inventions,
and creations embodied in physical devices or systems.
Prevention of theft

6|Page
Locks and Alarms: Install locks and alarms on doors, windows, and valuables. Surveillance
Cameras: Use CCTV cameras to monitor premises and deter potential thieves. Secure
Storage: Store valuable items in secure, locked containers or safes. Strong Passwords: Use
unique, complex passwords for online accounts. Two-Factor Authentication: Enable 2FA to add
an extra layer of security. Encryption: Use encryption to protect sensitive data.

Ergonomics (Health)
Ergonomics is the study of designing and arranging workspaces, tools, and equipment to fit the user's
needs, improving comfort, efficiency, and safety. It is focused on minimizing strain and discomfort,
preventing injuries, and enhancing productivity. In short, it is about making things work better for the
people who use them. Keyboards with wrist rests. Proper posture – no slouching, sit up straight. 
Height of chair and table must be right for elbows and wrists level with each other. Proper ventilation. 
Proper lighting. Mouse and keyboard close to each other, Monitor positioned correctly and distanced far
away enough to not put strain on neck or shoulders. Take a break often. Look away from the monitor
and rest your eyes. Use ergonomically designed devices.

BYOD
Bring Your Own Device (BYOD) is a policy that allows learners to use their personal devices (e.g.,
smartphones, laptops, tablets) for school work purposes.

Internet:
Protecting privacy

Positive and negative effects of social media


Positive Effects
 Global Connectivity: Social media connects people worldwide, facilitating communication and
collaboration.
 Information Sharing: Social media enables rapid sharing of information, news, and ideas.
 Networking Opportunities: Social media provides opportunities for professional networking and
career development.
 Community Building: Social media enables people to connect with others who share similar interests
and passions.
 Self-Expression: Social media provides a platform for self-expression and creativity.

Negative Effects
 Mental Health Concerns: Excessive social media use can contribute to mental health issues, such
as anxiety and depression.
 Cyberbullying: Social media can be a breeding ground for bullying and harassment.
 Misinformation: Social media can spread misinformation and fake news, contributing to confusion
and mistrust.
 Addiction: Social media can be addictive, leading to decreased productivity and increased screen
time.
 Privacy Concerns: Social media can compromise personal privacy, with data collection and sharing
practices that can be invasive.
 Social Comparison: Social media can compromise personal privacy, with data collection and sharing
practices that can be invasive.

Solution Development/Oplossingsontwikkeling:
Word:
Heading styles

7|Page
Heading styles are used to organize and structure content, making it easier to read and understand e.g
using H1 (Main Heading), H2 (Subheading) etc.

Page/section breaks
Page Break: A break that separates content into different pages.
Section Break: A break that separates content into different sections within a page or document.

Short cut keys Excel:


1. Ctrl + Home: Go to cell A1
2. Ctrl + End: Go to last cell with data
3. Ctrl + Arrow Keys: Move to next/previous cell
4. Ctrl + Page Up/Down: Switch between worksheets

Error indicators
1. #N/A (Not Available): Indicates that a value is not available or cannot be found.
2. #VALUE! (Value Error): Indicates that a value is not in the correct format or type.
3. #REF! (Reference Error): Indicates that a reference is invalid or cannot be resolved.
4. #NAME? (Name Error): Indicates that a formula or function name is not recognized.
5. #NUM! (Number Error): Indicates that a number is invalid or out of range.
6. #DIV/0! (Division by Zero Error): Indicates that a formula is attempting to divide by zero.

• Functions and formulas


• Features

8|Page

You might also like