Grade 11 IT Theory
Grade 11 IT Theory
THEORY
APPROACH
• Big Picture / High Level / Overview teaching by teacher using PP with some elaboration
• Focus on definition, function, purpose/role and advantages/disadvantages or differences where
applicable
• Supplement with videos if applicable/time allows / or @home
• Follow up with written questions learners use Textbooks / previous papers / other resources
to answer – reinforcement
• End with quiz / informal test /assignment (self/peer assessment)
• Moves towards self-directed learning
• Saves time ± 3 weeks over T2 and T3 (5 weeks work taught in 2 weeks, including revision of
T1 work): Can do 4 lesson plans (2 days each) – see next slide
THEORY ESSENTIALS
What it is
(Definition)
Impact/
Advantages/ What it does
Disadvantages/ Concept (Role/ function)
Limitations
CPU
• Runs all programs and processes and all software
instructions. Every application makes use of the CPU to
collect, decode and execute instructions as required it.
• RAM is limited by
• number memory addresses that can be accessed (32 / 64 bit)
• number of memory slots
ROM – Read only memory
• Firmware – Software on the ROM
• Stores the motherboard’s operating software BIOS)
• BIOS (Booting up)
• Controls hardware at the lowest level
• Options for the user to configure
• Checks that rest of hardware is
• present and working (POST)
• Find OS and loads it
• CMOS
Video / Graphics cards
• GPU in stead of CPU – Dedicated to graphics processing
• – Tasked to create images and display it
• – Lessens burden on the CPU
•
• VRAM in stead of RAM – Dedicated to graphics processing
• – Tasked to create images and display it
• – Lessens burden on the CPU
• – Dedicated to graphics processing
•Benefits:
• Can remove or replace these components with new components
• Easier to upgrade
• Easier to replace broken parts
• Allows for creation of computers with different components, different speeds
and different abilities.
PURPOSE AND ROLE OF EXPANSION CARDS
Expansion Cards
•Examples:
• Ethernet card – to connect to a wired network.
• Wi-Fi card – to connect to a wireless network.
• Sound card – improved sound quality or surround sound capabilities.
• Storage controller – to add additional or faster hard drives
FLOW / TRANSFER OF DATA BETWEEN COMPONENTS
Flow of Data
• System Clock (GHz) – Manages / coordinates all activities within the pc.
• Clock multiplication is used to work between faster and slower components
Bus
• A bus is a set of wires that connects one part to communicate with other
parts of the motherboard.
• It also serves as an interface between the CPU and external devices
CONTENT
• Types of operating systems
• Compilers and interpreters
• Overview of processing techniques
• Virtual machines and virtualisation
TYPES OF OPERATING SYSTEMS
Description and To manage the hardware and To provide a service to or To provide a service to or
purpose software of a computer and to manage computers manage computers
provider a user interface for connected to the same connected to the same
computer users. network. network.
multitasking multiprocessing
multithreading
Multitasking
• The ability of the OS to quickly switch between
many computing tasks to give the impression the
different applications are executing simultaneously
Multiprocessing
• Multiple processors to complete tasks.
• Today, many CPUs are made up of more than one processor (called a
core).
• Each core is then able to complete program instructions on its own.
Multithreading
• Instructions from the same program are divided into
multiple threads.
• Each thread can be run independently and executed
when the CPU has time available between tasks.
• Examples
• Browse the internet and decide to download a file
• Word spellchecks, auto save and types at once
VIRTUAL MACHINES AND VIRTUALISATION
Virtualisation
Virtual machine
CONTENT
• Safety and security
• Threats
• Remedies
SAFETY AND SECURITY
Common errors made by people include
• Human error
• The biggest threat to your computer and your data is always you
• GIGO
• Leaving computer / cell phone unlocked
THREATS
• Physical access
• One way in which data can be lost is through theft. This can be the theft
of a smartphone, notebook or computer, or simply the theft of an
external hard drive or flash disk.
• Do not leave your storage devices unattended in public spaces such as in
school computers.
• Make regular backups of your data.
• Hardware failure
• While most hardware can simply be replaced, losing a storage device
means you also lose all the data stored on the device, which could
represent the loss of many years of work.
• Ways data loss may occur
• mechanical damages of hard drive
• power failures
• spilling coffee, and other water damages
• Network vulnerability
Type Description
Virus A computer virus is malicious software that is loaded onto a user’s computer without their
knowledge, replicates itself and performs malicious actions.
Worm A computer worm is a type of malware that spreads copies of itself from one computer to another.
A worm can replicate itself without any action from the user and it does not need to attach itself to
another program to cause damage. Worms will scan a network for open ports and use those
openings to spread through the network.
Trojan A Trojan is a type of malware that is often disguised as useful software. Trojans can be used to gain
access to users’ systems. Users are tricked by social engineering executing the Trojan on their
system. Once activated, Trojans can enable cyber-criminals to gain backdoor access to your system.
One of the most dangerous types of Trojan horses is called a keylogger, which records keystrokes.
Rootkit Rootkit is malware that is designed to infect a computer and allow an attacker to install a set of tools
that grant him remote access to the computer. The rootkit is hidden within the operating system and
will be designed to hide from anti-malware applications. Rootkits act as a backdoor that gives the
attacker the ability to connect remotely to the infected machine whenever he chooses and remove
or install specific components.
Type Description
Spoofing With spoofing, the attacker disguises an email to pretend that the email is sent from a known, trusted
source. For example, the attacker might send emails that appear to come from you to your friends
and family with an urgent request for money while providing their own banking details.
Phishing Phishing attacks try to obtain sensitive information (such as usernames, passwords and banking
details) by sending emails to users that look like official emails. This is often used with email spoofing
to convince victims that they email is from a legitimate source.
Pharming Pharming attacks create an official-looking website that requests sensitive information. A very
common pharming attack allows users to “change” their passwords. Instead of changing their
passwords, the user’s username and password is recorded and their account is taken over.
Pharming involves malicious code being is installed on a computer or server, which misdirects users
to a fraudulent website even when the type the correct address, that requests sensitive information
such as passwords and banking details which are then stolen by the cyber-criminal.
Malware Malicious software that is specifically designed to disrupt, damage, or gain unauthorised access to a
computer system.
REMEDIES
• Creating a backup
• Creating a backup is the process of making copies of your computer’s data to use
in the event that the original data or are lost or destroyed.
Strong passwords
• Always use at least 8 characters in your password, at least two of which
are numeric.
• Use a mixture of both uppercase and lowercase letters
• Include a mixture of letters and numbers
• Include of at least one special character for example, ! @ # ? % *
• Do not use personal information in your password that someone else is
likely to be able to figure out.
• Never use a password that is the same as your account number.
• Do not use passwords that are easy to spot while you’re typing them in.
• Passwords like 12345, qwerty (i.e., all keys right next to each other), or
nnnnnn should be avoided.
• Access rights
• This means the administrator has created accounts for all users, with the right to
access certain files and folders.
• For instance, you may have a personal folder in which you have the right to open,
read, write, create and delete files. This will restrict unauthorised access to certain
files and folders.
• Firewalls
• A firewall is hardware, software or a combination of both, that monitors incoming and outgoing traffic
on a network.
• The firewall decides whether to stop the traffic based on a set of predefined security rules.
• Its purpose is to create a barrier between an internal network and incoming traffic from external sources
to block potentially malicious traffic.
• Anti-Virus
• Antivirus software is system software designed to prevent, detect and remove
malware infections on computing devices.
• Antivirus software can protect against a wide variety of threats including
keyloggers, Trojan horses, worms, rootkits, spyware and ransomware.
CONTENT
• Overview of physical aspects of a network
• Overview of network innovation
OVERVIEW OF PHYSICAL ASPECTS OF A NETWORK
What is a network?
• Bandwidth
The amount of data that can be sent over a
network in a specific time
• Access
Connection devices
• NIC
• Modem
• Switch
• Router / bridge
OVERVIEW OF NETWORK INNOVATION
VOIP VPN
Location-
based
computing
VOIP
Components required
• Positioning system e.g. GPS (Global Positioning System)
• Communication network for data transfer
• Service and application provider e.g. Maps or Uber
• Data and content provider
• Mobile devices
• User
Examples
• Weather applications
• Food ordering applications
• Car sharing services like Uber
INTERNET VS. INTRANET VS. EXTRANET
Internet
Intranet
• Locked private network used to share information on a private
network
Extranet
CONTENT
• Mobile/wireless e-communications
• Use of mobile technologies
• Use of wireless technologies
• Data security
MOBILE/WIRELESS E-COMMUNICATIONS
Instant
SMS Videocasting
Messaging
Video
Podcasting VOIP
Conferencing
E-MAIL
• Electronic mail
• One of the most popular ways to Emails allows us to
communicate on the internet • Contact people all over the world for free
• Use good netiquette when sending emails • Share files with one or more people at a
time
• Some of the common service providers • Communicate with more than one person
• Gmail at a time
• Yahoo Mail
• Keep documented evidence of our
communication with someone
• Outlook.com • Send messages any time of day without
• iCloud disturbing people
• Advertise to multiple people
BLOGGING
• A creator shares posts, informal stories or articles on their website
• It is a discussion or information website published on the world wide web
• A blog is created for a specific topic
• New stories are automatically posted to the top
Microblog
• Combination of blogging and instant messaging
• Posts shared to audience
• Characters limited – usually 280 characters
• Can contain text, images, videos, audio and hyperlinks
• Example - Twitter
SMS
Advantages Disadvantages
• Second oldest form of e-communications (since 1992)
Quick and easy to send More expensive than
• Limited to 140 characters instant messaging
• SMS are mainly used Can be sent without Often used for marketing
internet access or spam
• The sender does not know the receiver
More affordable than a
• The sender does not have internet access phone call
• The sender does not have a phone with IM capabilities
• Information from banks and corporations
INSTANT MESSAGING
Advantages Disadvantages
Messages are free to send Messages are not
permanently saved and
• A service that allows people to send short messages using their backed-up
mobile phones (or computers) Possible to see when Too informal for some
messages are received and settings (such as business
• Free to send over internet read communication)
Advantages Disadvantages
Easy to connect with an Requires basic recording
audience equipment
Can be downloaded to
your device and listened
to without an internet
connection
VOICE OVER INTERNET PROTOCOL (VOIP)
Mobile Mobile
browsers devices
MOBILE PHONES
FEATURE PHONES
• Able to send multimedia messages, play music, take photos, read emails
and browse the internet
• Differ from a smart phone in two ways
o Weak processor, low quality screen and poor camera
o Apps were designed specifically for the phone – no app store
SMART PHONES
• Smart phones are like computers that can run any application designed
for the operating system
• Advanced features
• High-resolution touch screen
• Wi-Fi connectivity
• Web browsing
• Software applications
• Mobile operating system
• App store
• Allows for installing and updating applications
MOBILE BROWSERS
• Mobile web browsers change the websites to make it more accessible on the mobile device
• Mobile web pages differ from normal ones
• Mobile devices are smaller – so less information can be displayed per screen
• Mobile devices can rotate, so pages need to automatically adapt to the width of the screen
• Mobile devices are slower – so mobile pages can be les interactive
• Mobile data is expensive - so images and videos are compressed
• Mobile devices use touch input – interactive elements needs to be larger
MOBILE DEVICES
Tablets
Smart phones
• Smart watches
• An extension of your phone and body
• Fitness monitors
• Track heart rate, steps, sleep patterns and more
• Glasses and Headsets
• easily access data, overlay virtual with reality
MOBILE DEVICES
Wearable technology
• Mobile Communication
• Voice, email, text, instant message, pictures,
video
• 3,5 inches to 5.5 inches diagonal.
• Media Viewer
• music, movies, videos
• Mobile Applications
• maps, travel information
• Other Apps
• Productivity, games, specialised apps, etc
MOBILE DEVICES
Phablets
• All in one
• 5.5 inches to 7 inches diagonal size
• Not super compact
• Not tablet sized
MOBILE DEVICES
eReaders
• Specialised device
• Book reading
• Some music, some apps
• Black and white screen
• Performs well in direct light.
• Exceptionally long battery life
• Network access (WiFi and Cellular)
MOBILE DEVICES
Smart Camera
• Traditional digital cameras
• Video recoders
• Powerful operating systems (Android, etc)
• Image processing on the camera
• Touch screen
• Capture on camera, save on phone
• Wireless network connectivity.
• Face recognition
MOBILE DEVICES
GPS
• In car navigation and non-car
• Requires a view of the sky (needs to receive GPS signal)
• Periodic updates required
USE OF WIRELESS TECHNOLOGIES
Wireless
Protocols
technologies
WIRELESS TECHNOLOGIES
Access Point
Blockchain
• refers to a growing list of records, called blocks, that are linked using cryptography
WIRELESS NETWORKS
STMP
• Simple Mail Transfer Protocol
• Used to send emails
IMAP
• MAP allows you to access, organise, read and sort your email messages without
having to download them first
VOIP
• Voice over Internet Protocol
• Used to make voice calls over the internet
HTTP
• Hyper Text Transfer Protocol
HTTPS
• Hyper Text Transfer Protocol Secure
FTP
• File Transfer Protocol
DATA SECURITY
Passwords Encryption
Multi-layer
verification
PASSWORDS
A strong password
• A authentication method in which a computer is granted access only after successfully giving two or
more pieces of information
Authentication mechanisms
CONTENT
• Evolution of the internet
• Big data concepts
• Multimedia as part of internet technologies
• Compression technology
EVOLUTION OF THE INTERNET
IP address
• Each computer has an unique internet address
• IPv4 address ex. 172.16.1.97
• Each number range from 0 to 255 and can be
represented by 1 byte
• Purchase a domain – linked to IP address
• www.google.com – 172.217.170.67
Web 1.0
Web 2.0
• Sites like Google, MySpace and later YouTube, Twitter and Facebook
started appearing, the internet changed
• Websites became interactive and dynamic, the internet changed
• Search, send messages, post updates and watch videos
• Users play a role in content development
Web 3.0
Big data
Volume
• larger than traditional datasets
• grater demand placed on the processing and storage
life cycle
• Often, the data will exceed the capabilities of a single
computer
Variety
Value
Customer profiling
• Insight in customer
• Create comprehensive database
- demographics
- consumption patterns
• Targeted promotions / marketing
Downloading
• The easiest way to share media on the internet
• Media owner upload file to website and share link to file with
website visitors
• To play a file
• open the website in your web browser
• download the file to a location on your hard drive
• open the file on your hard drive using any installed media player
• Watch a many times as you like – even without internet
• Disadvantage – you can share file with anyone
Streaming
• Multimedia companies share media through streaming
• To stream media
• open the website in your web browser
• open the file in your web browser
• the file should start playing automatically.
• Never save file on hard drive
• Downloads file for a few seconds / buffering / cache
• Need to steam each time you want to watch video
• Each time you stream a video – streaming company makes
money
• Two types of streaming websites
- live streaming websites – live broadcasts / sports
- video on demand websites – Netflix / Showmax
Bandwidth usages
• Downloading vs Streaming
• Watch one – no difference
• Better quality – more bandwidth
• If four people watch an average of two hours of high quality videos per
day, they will use 240 Gb in a month
Resolution
Pixel
Mpeg4 Audio and video MPEG-4 or Moving Pictures Expert Group version 4
.mp4
CONTENT
• Types of websites and supporting technologies
• Internet-related careers
SOME TYPES OF WEBSITES YOU CAN EXPLORE
Advocacy Personal
Blog Portal
Multi-factor authentication
Advantages of OTP
Disadvantages of OTP
Advantages
Disadvantages
• If your email address isn’t sored on the site – the token might
be sent to the wrong email address
INTERNET-RELATED CAREERS
Web designer
• Designing the layout
• Identifying the features
• Designing the look and feel
• Coding the website
Web author
• Write and edit text
• Create videos text that are on websites
Vlogger
• You need an interesting story or concept
• People who can relate subscribes
• Make money with advertising
Agricultural technologist
• Agricultural technologists work to feed the planet by maximizing
the food we get from our plants and animals
• specialise in soil analysis, livestock care or crop yields
• To best do their jobs, these workers need data, and lots of it
DATA AND INFORMATION
MANAGEMENT
DATABASE MANAGEMENT
CONTENT
• Database software
• Database types
• Database-related careers
DATABASE SOFTWARE
• Database
• A collection of interrelated data
Advantages of DBMS
• Data sharing
• Data Independence
• Better data integrity
• Controlled Redundancy
• Data consistency
• Data security
• Faster Application Development
• Concurrency control
• Recovery and Backup
POPULAR DBMS
Microsoft SQL
• Server – A relational database management system developed by Microsoft
Oracle
• A proprietary multi-model database management system produced and
marketed by Oracle Corporation
Microsoft Access
• A database management system from Microsoft that combines the relational
database engine with a graphical user interface and software-development
tools
BlackFish
• A high-performance, small-footprint, SQL-92 compliant transactional database,
which runs on both the .NET framework and on the Java platform
PostgreSQL
• A free and open-source relational database management system emphasising
extensibility and technical standards compliance
MySQL
• An open source relational Database Management System
DATABASE TYPES
Desktop or server
• When planning a database – consider the following factors
• Size
• Accessibility
Distributed database
• Runs on a server
• May be sored on multiple computers / cloud
• Resources shared amongst users
• Supports multi-user access
DATABASE CAREERS
Database administrator
• A database administrator is the primary person involved in managing
the data of a company or program
Database programmer
• A database programmer is any employee whose primary job is to
create database and database queries
Database analyst
• A database analyst is responsible for working with companies to
identify opportunities to set up and improve their data systems.
CONTENT
• Characteristics of quality data
INTRODUCTION
Data
Information
Knowledge
Accurate
Correctness
Current
Complete
Relevant
Consistent
Range check
Check digit
Have one
source of truth
ACCESSING AND MANIPULATING DATA
What is valuable
Ask yourself
• Will I ever use the data in this field?
• What fields do I need specifically for my application?
• What fields would I need for my application in the
future?
HOW TO GET TO INFORMATION
Have one source of truth
• the same data should not be recorded in more than one place
• unused tables and fields that can be confusing (such as “song_id_old”, or
“song_id_2”) should be removed
• tables that are automatically created by combining other tables should be
labelled clearly
• numbered tables (like “users_1” and “users_2”) should either be combined
into one table (“users”) or renamed more clearly (“users_south_africa” and
“users_rest_of_africa”)
• If multiple people enter the values, you may end up with non-standard data,
like:
- “11th Grade”
- “11”
- “Grade 11”
- “11th”
Use effective names
• Choose descriptive names
• Choose simple names
• Avoid abbreviations
• Do not use numbers in the name
• Do not use spaces in the name
• Do not use strange characters in the name (other
than underscores)
• Use a consistent naming pattern
MANIPULATING AND GROUPING DATA
Data
• Data, and especially complex data, should be broken into
smaller logical pieces and grouped according to the
chosen categories.
• Makes data more manageable
• Store name, middle name and surname separately, rather
than one long string
KEY TERMINOLOGY
Field
• A field is part of a record and contains a single piece of data for
the subject of the record.
Primary Key
• A field that uniquely identifies each record in the table.
Foreign Key
• A foreign key is a primary key in one table that appears as a field
in another table.
Data-types of fields
Record
• A record is composed of fields and contains all the data about one
particular person, company, or item in a database
Table
• A database table is composed of records and fields that hold data. Each
table in a database holds data about a different, but related, subject.
Relationship
CONTENT
• Creating a simple database
• Setting up relationships
CREATE A TABLE
ERD
• Entity relationship diagram
• These diagrams show the tables in your diagram, the fields
in each table, and the relationships between the fields of
different tables
HOW TO DRAW AN ERD
DRAWING THE RELATIONSHIPS
one-to-one
one-to-many
many-to-many
CONTENT
• Effects of digitalisation
• Protecting your online identity
• The effects of computer and human error
• The effects of cybercrime
• Social implications of big data
• Influences of globalisation and fourth industrial revolution (4IR)
EFFECTS OF DIGITALISATION
Information
Social implications Ethics
System
Effect on
workplace and
Future careers
employment
practices
SOCIAL IMPLICATIONS
• There are ethical and social issues with information systems that impact society
• Our current society is dependant on information systems
• The workplace
• Our private life’s
• The government
• People with no access to information systems
WHAT IS AN INFORMATION SYSTEM (IS)
Impact in society
• Sharing of information
• Education
• Environment
• Political
ETHICS
• Ethics is referring to the right and wrong of an individual acting on free will using choice
to determine their behaviour.
• Not all ethical choices are the right ones and some behaviour creates social issues. This
issues are related to privacy and security.
FUTURE CAREER
Digital forensic investigator
• Digital forensics is the analysis of computer and electronic equipment to find evidence to be used in a
legal trial or internal investigation.
Privacy consultant
• Is exactly that, a consultant who deals with the online privacy of a corporation.
• They assess and define system specifications in relation to compliance with data protection and
privacy regulations.
• They follow proper data management systems and build positive relationships with a variety of
stakeholders.
Virtual offices
• Can rent like a shared working space
• Gain access to business address, conference rooms, printing room, a phone
number and a receptionist
EFFECT ON WORKPLACE AND EMPLOYMENT PRACTICES
Decentralisation of labour
• People no longer work together in an office
• Work from home and avid rush hour traffic
• Internet speed allows for video conferencing
• Requires more self discipline from staff
Office Automation
• Collective hardware, software and processes that allow automation
• Examples – Google assistant, Siri, Alexa
EFFECT ON WORKPLACE AND EMPLOYMENT PRACTICES
Robotics
• Robots can be used to preform dangerous or repetitive
tasks
• Robotics and AI leads to automation
PROTECTING YOUR ONLINE IDENTITY
• Privacy is a persons ability to control how information about then is shared with other people or institutions
• In South Africa privacy of all individuals is protected by the constitution
• The Protection of Personal Information Act (POPI Act) ensures that a citizens personal information may only
be used in very specific circumstances
Human errors
• Weak password security and sharing of passwords
• Careless handling of data or accidently deleting files
• Inadequate software security and neglecting updates
• Low security awareness
• Ineffective data access management.
THE EFFECTS OF COMPUTER AND HUMAN ERROR
Inaccurate and invalid – data input
• Information that is input by the user is erroneous. Human errors
and poor auditing and control procedures of the data lead to
inaccurate data capture.
• Causes for data to be inaccurate:
- Missing data
- Wrong data
- Inappropriate data
- Nonconforming data
- Duplicate data
- Poor data entry
Unverified data
• When data entered into a computer is not verified, these data
types can often be stored incorrectly, causing serious errors
• Types of Data Verification are double entry and proofreading
data
Software bugs
• Errors, flaws or faults in a computer program that causes
it to produce incorrect or unexpected results, or to
behave in unintended ways
Identity theft
• The collection of the victim’s personal
information by hackers to enable someone to
masquerade as the victim
• possible effect on the victim
- Financial information
- Medical insurance information
- Driver’s license information
• victim could end up with a criminal record, a
poor credit rating and not being able to pay for
medical treatment
Business data theft
• Businesses are exposed to
- email threats
- malicious software
- spam bots
• Intellectual property and trade secrets are compromised
• Effects on business
- Lose client information, trade secrets and data
- Time spent on cleaning out information systems and
securing
- Functioning ineffective while IS reconstructed
- May have to close down
• Cokes formula, KFC’s recipe
Virus attack to business
• Malware
- Software written to destroy a computer system, to obtain
business data theft or personal information
- Types
▪ Viruses
▪ Trojan viruses
▪ Spyware
▪ Ransomware
• Ransomware
- Software that encrypts the business data
• Good updated antivirus software and backup strategies
would be required
SOCIAL IMPLICATIONS OF BIG DATA
• Online banking
- help detect illegal activity
- misuse of credit cards / money laundering
• Booking reservations
- help understand the industry
- led to more direct bookings / reservations
• E-learning
- Customised learning programs
- reframing coursework to students learning needs
• Video conferencing
• Social websites
- people share videos, photos, personal data and comments
- social websites collect big data on relationships, interests,
spending habits and networks of users
Advantages of big data