100% found this document useful (1 vote)
2K views164 pages

Grade 11 IT Theory

Uploaded by

Nkanyiso Mvelase
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views164 pages

Grade 11 IT Theory

Uploaded by

Nkanyiso Mvelase
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 164

GRADE 11 IT

THEORY
APPROACH

• Big Picture / High Level / Overview teaching by teacher using PP with some elaboration
• Focus on definition, function, purpose/role and advantages/disadvantages or differences where
applicable
• Supplement with videos if applicable/time allows / or @home
• Follow up with written questions  learners use Textbooks / previous papers / other resources
to answer – reinforcement
• End with quiz / informal test /assignment (self/peer assessment)
• Moves towards self-directed learning
• Saves time  ± 3 weeks over T2 and T3 (5 weeks work taught in 2 weeks, including revision of
T1 work): Can do 4 lesson plans (2 days each) – see next slide
THEORY ESSENTIALS

What it is
(Definition)

Impact/
Advantages/ What it does
Disadvantages/ Concept (Role/ function)
Limitations

Where / How it is used


HOW TO USE THE PP
• The PP can be used as follows:
• Teaching of ALL Grade 11 IT theory (including revision of T1 Theory)
• Revision for Grade 11 and 12 theory
• The PP can be extended for Grade 12 by adding slides with Grade 12 content
• For teaching Grade 11 Theory, it can be done in 14 days as follows
• Day 1: Present Systems Technologies: (slides 5 – 30)
• Day 2: Follow up on questions/quizzes as that learners did for homework
• Day 3: Present Computer Management (slides 31 – 44 )
• Day 4: Follow up on questions/quizzes as that learners did for homework
• Day 5: Present Communication Technologies (slides 45 – 84 )
• Day 6: Follow up on questions/quizzes as that learners did for homework
• Day 7: Present Internet Technologies (slides 85 – 111)
• Day 8: Follow up on questions/quizzes as that learners did for homework
• Day 9: Present Data and Information Management (slides 112 – 143)
• Day 10: Follow up on questions/quizzes as that learners did for homework
• Day 11: Present Social Implications (slides 144 – 164)
• Day 12: Follow up on questions/quizzes as that learners did for homework
• Day 13: Present
• Day 14: Informal class test on Questions & Answers
• Questions & answers for each lesson will follow
SYSTEMS TECHNOLOGIES
HARDWARE
CONTENT
 Purpose of the motherboard
 Components of the motherboard
 Data transfer/flow between components
 Expansion hardware
 Modular design
 Memory
 CPU
 Caching
THE MOTHERBOARD
PURPOSE
• provides physical structure for other hardware.
• connects the hardware.
• provides power to the hardware.
• sends signals between the hardware
MOTHERBOARD CONNECTIONS

SOCKETS, SLOTS and CONNECTORS


• CPU socket:
• Called the ZIF socket, connects the CPU to the motherboard.
• DIMM slot:
• Used to connect the computer’s RAM to the motherboard.
• PCI/PCIe slot:
• Allows plugging additional hardware like a GPU, sound card, ethernet card or Wi-Fi
card into the computer.
• GPU/PCIe x16 slot:
• Used for the computer’s graphics card since it receives and sends the most data.
• SATA port:
• Used to connect internal storage devices e.g. hard drives
• Power connector:
• Main power connection that connects the motherboard to the power supply
Components of the motherboard

CPU
• Runs all programs and processes and all software
instructions. Every application makes use of the CPU to
collect, decode and execute instructions as required it.

• The machine cycle


• Gets data & instructions from RAM (memory)
• Decodes instructions
• Executes instructions
• Sends data back to memory
RAM – Read only memory
• RAM is short-term memory which can store and retrieve active programs and data
at very high speeds. Your computer can access and utilise the data in the RAM
immediately. Data in RAM is removed when there is no power.
• Is packed as DIMMs – Dual Inline Memory Module

• Electronic, Fast, Volatile, Comparatively expensive

• RAM is limited by
• number memory addresses that can be accessed (32 / 64 bit)
• number of memory slots
ROM – Read only memory
• Firmware – Software on the ROM
• Stores the motherboard’s operating software BIOS)
• BIOS (Booting up)
• Controls hardware at the lowest level
• Options for the user to configure
• Checks that rest of hardware is
• present and working (POST)
• Find OS and loads it
• CMOS
Video / Graphics cards
• GPU in stead of CPU – Dedicated to graphics processing
• – Tasked to create images and display it
• – Lessens burden on the CPU

• VRAM in stead of RAM – Dedicated to graphics processing
• – Tasked to create images and display it
• – Lessens burden on the CPU
• – Dedicated to graphics processing

• Laptops – built-in/integrated video adaptor AND video card


• – switches between the two as needed

• Connections – DVI – VGA – S-Video – HDMI
MODULAR DESIGN
Modular design

• Modular means built from several different components.

•Benefits:
• Can remove or replace these components with new components
• Easier to upgrade
• Easier to replace broken parts
• Allows for creation of computers with different components, different speeds
and different abilities.
PURPOSE AND ROLE OF EXPANSION CARDS
Expansion Cards

• Are circuit boards for components


• Purchased separately
• Use the PCI or PCI-express slots to connect to your computer
• Allow adding (or expanding) the features of your computer.

•Examples:
• Ethernet card – to connect to a wired network.
• Wi-Fi card – to connect to a wireless network.
• Sound card – improved sound quality or surround sound capabilities.
• Storage controller – to add additional or faster hard drives
FLOW / TRANSFER OF DATA BETWEEN COMPONENTS

Flow of Data
• System Clock (GHz) – Manages / coordinates all activities within the pc.
• Clock multiplication is used to work between faster and slower components

• Bus – path along which data travels


• Point to point connections - Direct and dedicated, not shared between multiple components
• Storage to RAM to CPU
• RAM to VRAM to GPU
• To peripherals
• Physical connection (USB, Firewire, Thunderbolt)
• IRQ / Hardware interrupt
• Plug and play: Device identifies it self
• IRQ and memory space is allocated
• Search for driver
• Automatically loaded
BUSSES

Bus
• A bus is a set of wires that connects one part to communicate with other
parts of the motherboard.
• It also serves as an interface between the CPU and external devices

•Two types of buses:


• Internal bus:
• Send data and instructions to parts within the motherboard.
• Links parts of the computer to the CPU and the main memory.
• External bus (expansion bus):
• Interface for peripheral devices e.g. HDD, Flash drives connect to CPU.
• Unique shape preventing plugging device in a wrong port
Common features of busses

•They all have the following:


• A Control bus – Used by the CPU to send signals to different parts of the system to keep
the actions of the different parts coordinated.
• An Address bus – Provides the physical address of the location in cache or main memory
that data is to be read from or written to.
• A Data bus – Provides the path to transfe data and instructions among the different
components of the computer.
CACHING
Role and purpose
•Refers to the use of a faster medium to prevent a slower medium from slowing down the performance
of a computer. Three important forms of caching:
• CPU cache:
• Difference in speed between CPU and RAM too large.
• RAM cannot provide information the CPU needs fast enough.
• CPU waste time waiting for data from the RAM.
• To prevent this: CPUs have a small, high-speed cache built into the CPU.
• Can now temporarily store a small amount of the data it needs to use next, increasing speed.
• Disk cache:
• Small amount of RAM built into a hard disk drive.
• Stores data being sent or received by the hard disk plates for a short period of time.
• RAM works faster than the storage, increasing speed.
• Web cache:
• Small area on a computer’s hard drive, images and pages from www are stored.
• Allows quick loading of images from pc. (rather than over slow internet connection)
• Faster loading next time opening webpage faster.
SOFTWARE

CONTENT
• Types of operating systems
• Compilers and interpreters
• Overview of processing techniques
• Virtual machines and virtualisation
TYPES OF OPERATING SYSTEMS

Operating systems manage


Stand-Alone • hardware
• software
Network • processes
• storage
• memory
Embedded • networks
STAND-ALONE NETWORK EMBEDDED

Description and To manage the hardware and To provide a service to or To provide a service to or
purpose software of a computer and to manage computers manage computers
provider a user interface for connected to the same connected to the same
computer users. network. network.

Cost OSS – Free Linux (OSS) – Free Pre-installed on device


Windows 10 – R 1 000 to R Windows Server – R 6 000 to
3 000 R 90 000

Size Small to large Most require significant Small


Windows 10 - ±16GB amount of space

Hardware HDD, CPU, RAM NIC Processor, RAM, ROM

Examples Windows 10 Home Edition Windows Server


Ubuntu Red Hat Server
COMPILERS AND INTERPRETERS

• Programming languages have been designed so that humans


can read and write code more easily
• Much easier than machine code
• Machine code is the executable instruction code provided by all
running system programs and applications
• Written in binary / hexadecimal
• References to memory addresses, logical operations and other
instructions for your CPU to complete

• A CPU can interpret or compile code


Interpreter

• The programming interpreter reads the first line of the code,


interprets it into machine code and sends it to the CPU to be
processed.
• It then interprets the next line and sends that to the CPU, and so
on.
• By interpreting the program line by line, the program can
immediately start running
• The program will often run a bit more slowly than a compiled
program
• Source code is interpreted as the program is run, the interpreter
(and interpreted language) must be installed on the same
computer
• Example – JavaScript
Compiler
• A compiler takes the entire source code and translates it
into machine code
• This translated code is saved as an executable file on the
computer that can be opened on any computer without
requiring the computer to have a compiler
• Examples – C++, Delphi, Java
OVERVIEW OF PROCESSING TECHNIQUES

multitasking multiprocessing

multithreading
Multitasking
• The ability of the OS to quickly switch between
many computing tasks to give the impression the
different applications are executing simultaneously
Multiprocessing
• Multiple processors to complete tasks.
• Today, many CPUs are made up of more than one processor (called a
core).
• Each core is then able to complete program instructions on its own.
Multithreading
• Instructions from the same program are divided into
multiple threads.
• Each thread can be run independently and executed
when the CPU has time available between tasks.
• Examples
• Browse the internet and decide to download a file
• Word spellchecks, auto save and types at once
VIRTUAL MACHINES AND VIRTUALISATION

Virtualisation

• The act of creating a virtual device


• Each virtual device acts as a node and is allocated its own
virtual hardware, CPU, RAM and storage space
• Virtual machines behave in the same way as a real computer

Virtual machine

• Host machine has to be capable of hosting a virtual machine


• Virtual machine must have its own operating system and its
own applications installed
• Different virtual machines also do not have access to the
host computer or any of the other virtual machines
Uses of virtual machines
• Install OS without interfering with host OS
• – want to see how Ubuntu works
• Image of virtual hard drive to backup PC
• Development – Virtual OS (Android / iOS)
• Install legacy software
COMPUTER
MANAGEMENT
COMPUTER MANAGEMENT

CONTENT
• Safety and security
• Threats
• Remedies
SAFETY AND SECURITY
Common errors made by people include

• Giving sensitive information to the wrong people


• Writing down your passwords
• Using the same password for all your accounts
• Choosing an insecure password
• Clicking on links provided in emails without first verifying
them.

• Human error
• The biggest threat to your computer and your data is always you
• GIGO
• Leaving computer / cell phone unlocked
THREATS
• Physical access
• One way in which data can be lost is through theft. This can be the theft
of a smartphone, notebook or computer, or simply the theft of an
external hard drive or flash disk.
• Do not leave your storage devices unattended in public spaces such as in
school computers.
• Make regular backups of your data.

• Hardware failure
• While most hardware can simply be replaced, losing a storage device
means you also lose all the data stored on the device, which could
represent the loss of many years of work.
• Ways data loss may occur
• mechanical damages of hard drive
• power failures
• spilling coffee, and other water damages
• Network vulnerability
Type Description
Virus A computer virus is malicious software that is loaded onto a user’s computer without their
knowledge, replicates itself and performs malicious actions.
Worm A computer worm is a type of malware that spreads copies of itself from one computer to another.
A worm can replicate itself without any action from the user and it does not need to attach itself to
another program to cause damage. Worms will scan a network for open ports and use those
openings to spread through the network.

Trojan A Trojan is a type of malware that is often disguised as useful software. Trojans can be used to gain
access to users’ systems. Users are tricked by social engineering executing the Trojan on their
system. Once activated, Trojans can enable cyber-criminals to gain backdoor access to your system.
One of the most dangerous types of Trojan horses is called a keylogger, which records keystrokes.

Rootkit Rootkit is malware that is designed to infect a computer and allow an attacker to install a set of tools
that grant him remote access to the computer. The rootkit is hidden within the operating system and
will be designed to hide from anti-malware applications. Rootkits act as a backdoor that gives the
attacker the ability to connect remotely to the infected machine whenever he chooses and remove
or install specific components.
Type Description
Spoofing With spoofing, the attacker disguises an email to pretend that the email is sent from a known, trusted
source. For example, the attacker might send emails that appear to come from you to your friends
and family with an urgent request for money while providing their own banking details.

Phishing Phishing attacks try to obtain sensitive information (such as usernames, passwords and banking
details) by sending emails to users that look like official emails. This is often used with email spoofing
to convince victims that they email is from a legitimate source.

Pharming Pharming attacks create an official-looking website that requests sensitive information. A very
common pharming attack allows users to “change” their passwords. Instead of changing their
passwords, the user’s username and password is recorded and their account is taken over.
Pharming involves malicious code being is installed on a computer or server, which misdirects users
to a fraudulent website even when the type the correct address, that requests sensitive information
such as passwords and banking details which are then stolen by the cyber-criminal.

Malware Malicious software that is specifically designed to disrupt, damage, or gain unauthorised access to a
computer system.
REMEDIES
• Creating a backup
• Creating a backup is the process of making copies of your computer’s data to use
in the event that the original data or are lost or destroyed.

FULL BACKUP DIFFERENTIAL BACKUP INCREMENTAL BACKUP


• A full backup is when a copy is made of every • Differential backups start with a full backup • Incremental backups also start with a full
single file and folder in the system. and after that copies those files that have backup. After that, a copy of the files that
• A full backup takes longer and uses more been changed since the full backup took have changed since the last backup is made,
storage space than other types of backups place. So if a full backup was done on Day 1, whether it was a full or incremental copy. If a
but restoring data from the backup is faster. Day 2s differential will copy all of the files full backup was done on Day 1, Day 2s
that have changed since Day 1s backup. Day incremental will back up all the les that have
3s backup will also copy all of the files that changed since Day 1. Day 3s incremental
have changed since Day 1. backup will only copy those les that have
• Because a full backup was taken and the changed since Day 2s incremental backup.
differentials copied everything that changed • A disadvantage is that when you want to
after that, only the full backup and the latest carry out a complete restore, the most recent
differential need to be restored. full backup and all of the subsequent
• The size of the differential copy increases incremental copies must be restored. This can
each time a backup is taken until the next full make the restore process a lengthier one
version is made. than when using a full backup plus the most
recent differential copies only.
• Backup locations
• Local backup
• Offsite backup
• Online/cloud backup
• Uninterruptible power supply
• An uninterruptible power supply (UPS) is a device that allows a computer to keep running for a
short time when power is lost due to a power failure.
• UPS devices also provide protection from power surges.
• A UPS contains a battery that takes over when the device detects a power failure.
• Passwords
• The following guidelines will help you to set a strong password

Strong passwords
• Always use at least 8 characters in your password, at least two of which
are numeric.
• Use a mixture of both uppercase and lowercase letters
• Include a mixture of letters and numbers
• Include of at least one special character for example, ! @ # ? % *
• Do not use personal information in your password that someone else is
likely to be able to figure out.
• Never use a password that is the same as your account number.
• Do not use passwords that are easy to spot while you’re typing them in.
• Passwords like 12345, qwerty (i.e., all keys right next to each other), or
nnnnnn should be avoided.
• Access rights
• This means the administrator has created accounts for all users, with the right to
access certain files and folders.
• For instance, you may have a personal folder in which you have the right to open,
read, write, create and delete files. This will restrict unauthorised access to certain
files and folders.
• Firewalls
• A firewall is hardware, software or a combination of both, that monitors incoming and outgoing traffic
on a network.
• The firewall decides whether to stop the traffic based on a set of predefined security rules.
• Its purpose is to create a barrier between an internal network and incoming traffic from external sources
to block potentially malicious traffic.
• Anti-Virus
• Antivirus software is system software designed to prevent, detect and remove
malware infections on computing devices.
• Antivirus software can protect against a wide variety of threats including
keyloggers, Trojan horses, worms, rootkits, spyware and ransomware.

All antivirus programs perform some important tasks

• Scan specific files for malware or known malicious patterns


• Allow you to schedule scans to automatically run for you
• Allow you to initiate a scan of a particular le or your entire
computer, or an external storage device at any time.
• Remove any malicious code that it detects. Depending on the
settings, you will be notified of an infection and asked if you want
to clean the file, or the program will automatically do this.
• Validation
• To prevent theft of data and personal details, computer systems must be
programmed to validate whether the user that is logging into the computer is an
authentic user or not.
COMMUNICATION
TECHNOLOGIES
NETWORKS

CONTENT
• Overview of physical aspects of a network
• Overview of network innovation
OVERVIEW OF PHYSICAL ASPECTS OF A NETWORK

What is a network?

• A computer network refers to a group of two or more


computing devices that are connected by a
communication medium allowing the computers to
communicate electronically.

Wireless communication media


• Wi-Fi
• WiMAX
• 4G/LTE
• 5G
Types of networks
• Wired Networks
- UTP
- Fiber optic cables
• Wireless networks
- Radio waves(Wi-Fi)
- Infrared
Topology
• Physical layout of the network
Physical limitations

• Bandwidth
The amount of data that can be sent over a
network in a specific time
• Access

Connection devices

• NIC
• Modem
• Switch
• Router / bridge
OVERVIEW OF NETWORK INNOVATION

VOIP VPN

Location-
based
computing
VOIP

Voice over internet protocol

• Phone or video calls made over the


internet
- VOIP to VOIP
- VOIP to phone calls
• Usually free
• Parties need the same software
• Works better with fast internet access
VPN

Virtual private network

• A computer connected to a VPN can access all


the private network resources shared on the
network (including printers and file servers),
without physically being in the same area
• VPNs allow people to access the internet
anonymously and securely, no matter your
geographical location in relation to the server
LOCATION-BASED COMPUTING
What is location-based computing?

• different technologies that make use of geographical position to customise a


user’s experience

Components required
• Positioning system e.g. GPS (Global Positioning System)
• Communication network for data transfer
• Service and application provider e.g. Maps or Uber
• Data and content provider
• Mobile devices
• User

Examples
• Weather applications
• Food ordering applications
• Car sharing services like Uber
INTERNET VS. INTRANET VS. EXTRANET
Internet

• Internet is a global network that allows computers from around the


world to communicate and share information (such videos or
webpages)

Intranet
• Locked private network used to share information on a private
network

Extranet

• Extranet is a network that combines an intranet with the internet


• Companies build extranets so that their employees can get the
benefit of the intranet when they are not in the same physical space
as the local network
ELECTRONIC COMMUNICATIONS

CONTENT
• Mobile/wireless e-communications
• Use of mobile technologies
• Use of wireless technologies
• Data security
MOBILE/WIRELESS E-COMMUNICATIONS

Email Blogging Microblog

Instant
SMS Videocasting
Messaging

Video
Podcasting VOIP
Conferencing
E-MAIL
• Electronic mail
• One of the most popular ways to Emails allows us to
communicate on the internet • Contact people all over the world for free
• Use good netiquette when sending emails • Share files with one or more people at a
time
• Some of the common service providers • Communicate with more than one person
• Gmail at a time
• Yahoo Mail
• Keep documented evidence of our
communication with someone
• Outlook.com • Send messages any time of day without
• iCloud disturbing people
• Advertise to multiple people
BLOGGING
• A creator shares posts, informal stories or articles on their website
• It is a discussion or information website published on the world wide web
• A blog is created for a specific topic
• New stories are automatically posted to the top

Microblog
• Combination of blogging and instant messaging
• Posts shared to audience
• Characters limited – usually 280 characters
• Can contain text, images, videos, audio and hyperlinks
• Example - Twitter
SMS
Advantages Disadvantages
• Second oldest form of e-communications (since 1992)
Quick and easy to send More expensive than
• Limited to 140 characters instant messaging

• Cost per SMS Available on all mobile Limited number of


phones characters per message
• Ideal for sending small amounts of information
Asynchronous Cannot send photos,
• SMS has mainly been replaced by IM and social media communication videos or emojis

• SMS are mainly used Can be sent without Often used for marketing
internet access or spam
• The sender does not know the receiver
More affordable than a
• The sender does not have internet access phone call
• The sender does not have a phone with IM capabilities
• Information from banks and corporations
INSTANT MESSAGING
Advantages Disadvantages
Messages are free to send Messages are not
permanently saved and
• A service that allows people to send short messages using their backed-up
mobile phones (or computers) Possible to see when Too informal for some
messages are received and settings (such as business
• Free to send over internet read communication)

• Can contain text, images, videos, audio and emoji’s


• Most popular Asynchronous Message recipients are
communication under pressure to respond
• WhatsApp to all messages.
• Facebook Messenger
Messages are shorter and Can be a distraction
• WeChat more conversational
• IM and voice calls are the most popular way of e-communication
Can create group
conversations
Can share multimedia like
emoji’s, pictures, videos
and voice recordings
VIDEO CASTING

• A form of communication where videos are broadcasted over the internet


• Videos can first be created and then uploaded, or they can be live streamed
• Vlogging is a popular way of videocasting

Advantages Disadvantages
Easy to connect with an Requires basic recording
audience equipment

Do not have to create your Requires basic video


own website editing knowledge

Does not need to be Can be very time


professional consuming
PODCASTING
Advantages Disadvantages
• A audio recording released on the internet Good to listen to while Can be time consuming
travelling and difficult to make,
• Free web service allowing users to download a podcast and listen to especially scripted
it on their devices podcasts

• RSS feed alerts users about new podcasts


Good way to get a daily Needs a good reader,
update good information
and good writing to be
interesting

Can be professional or Audience for podcasts is


relaxed smaller

Can be very informative

Can be downloaded to
your device and listened
to without an internet
connection
VOICE OVER INTERNET PROTOCOL (VOIP)

• A service that makes telephone calls over the internet rather


than over telephone lines
• Allows for voice and multimedia
• Cheaper that normal phone calls
• Less technical difficulties
• VOIP is combined with video conferencing
VIDEO CONFERENCING
Advantages Disadvantages
• A set of technologies that allows a person to make a video call Calls are free to make Requires a fast internet
connection
to one or more people at the same time Can contain sound and Uses a significant amount
visuals of data, so can be
• Allows for video/screen broadcasting expensive
Allows non-verbal Can experience delays (or
• Popular examples communication lag) on slow internet
connections
• Skype
• FaceTime Can easily transfer visual Requires both sender and
• Google Meet information receiver to be available at
the same time
• Video conferences are often used in business and educational
Conversation is
environments synchronous, which means
a direct
conversation can take
place

Video broadcast can be


disabled to decrease the
amount of data used
USE OF MOBILE TECHNOLOGIES

Mobile Feature Smart


phones phones phones

Mobile Mobile
browsers devices
MOBILE PHONES

• Created to make calls and send SMSs


• Occasionally these phones had other features (times, calculator)

FEATURE PHONES
• Able to send multimedia messages, play music, take photos, read emails
and browse the internet
• Differ from a smart phone in two ways
o Weak processor, low quality screen and poor camera
o Apps were designed specifically for the phone – no app store
SMART PHONES

• Smart phones are like computers that can run any application designed
for the operating system
• Advanced features
• High-resolution touch screen
• Wi-Fi connectivity
• Web browsing
• Software applications
• Mobile operating system

• App store
• Allows for installing and updating applications
MOBILE BROWSERS

• To access the internet – you need a web browser


• Like Chrome or Safari

• Mobile web browsers change the websites to make it more accessible on the mobile device
• Mobile web pages differ from normal ones
• Mobile devices are smaller – so less information can be displayed per screen
• Mobile devices can rotate, so pages need to automatically adapt to the width of the screen
• Mobile devices are slower – so mobile pages can be les interactive
• Mobile data is expensive - so images and videos are compressed
• Mobile devices use touch input – interactive elements needs to be larger
MOBILE DEVICES

Tablets

• Single-screen touch computers:


• iOs, Android, Windows, etc.
• Larger than 7 inches diagonal.
• Designed for touch input.
• virtual keyboards, drawing interfaces.
• Application Support
• Productivity applications like games
• specialised applications
• Media
• Take pictures, watch movies
• Audio and Video media
MOBILE DEVICES

Smart phones
• Smart watches
• An extension of your phone and body
• Fitness monitors
• Track heart rate, steps, sleep patterns and more
• Glasses and Headsets
• easily access data, overlay virtual with reality
MOBILE DEVICES

Wearable technology

• Mobile Communication
• Voice, email, text, instant message, pictures,
video
• 3,5 inches to 5.5 inches diagonal.
• Media Viewer
• music, movies, videos
• Mobile Applications
• maps, travel information
• Other Apps
• Productivity, games, specialised apps, etc
MOBILE DEVICES

Phablets
• All in one
• 5.5 inches to 7 inches diagonal size
• Not super compact
• Not tablet sized
MOBILE DEVICES

eReaders
• Specialised device
• Book reading
• Some music, some apps
• Black and white screen
• Performs well in direct light.
• Exceptionally long battery life
• Network access (WiFi and Cellular)
MOBILE DEVICES

Smart Camera
• Traditional digital cameras
• Video recoders
• Powerful operating systems (Android, etc)
• Image processing on the camera
• Touch screen
• Capture on camera, save on phone
• Wireless network connectivity.
• Face recognition
MOBILE DEVICES

GPS
• In car navigation and non-car
• Requires a view of the sky (needs to receive GPS signal)
• Periodic updates required
USE OF WIRELESS TECHNOLOGIES

Wireless
Protocols
technologies
WIRELESS TECHNOLOGIES
Access Point

• a networking hardware device that allows other Wi-Fi devices to connect


to a wired network

Difference in range and bandwidth


• range refers to the measurement of how far data or a signal can be transmitted and received, while
bandwidth refers to how much data you can send through the network

Connection speed (shaping and throttling)


• refers to the speed that data is transferred between a device and the internet.
• Throttling occurs when your ISP intentionally slows down your internet speed, while shaping is the
lowering of available bandwidth by your ISP once you have exceeded your monthly limit

Blockchain
• refers to a growing list of records, called blocks, that are linked using cryptography
WIRELESS NETWORKS

GPS 4G/5G Bluetooth

captures the signals from three


or more satellites to triangulate 100 – 1000 MB/s 1 – 24 MB/s
data and pinpoint your location

4G (“fourth generation”) gives Bluetooth connects devices over


improved speed and stability short distances using radio
over 3G and its application may waves. It finds most of its
therefore also include options application in cell phone to
such as HD TV and internet device (such as earphones)
gaming. connectivity, remote controls
and limited data transfer.
PROTOCOLS
POP3
• Post Office Protocol version 3
• used to retrieve emails from your mail server

STMP
• Simple Mail Transfer Protocol
• Used to send emails

IMAP
• MAP allows you to access, organise, read and sort your email messages without
having to download them first

VOIP
• Voice over Internet Protocol
• Used to make voice calls over the internet

HTTP
• Hyper Text Transfer Protocol

HTTPS
• Hyper Text Transfer Protocol Secure

FTP
• File Transfer Protocol
DATA SECURITY

Passwords Encryption

Multi-layer
verification
PASSWORDS

• The first form of security on most computers


• You should create a strong password and don’t share it with anyone

A strong password

• At least 8 characters long


• Include uppercase, lowercase and a number
• Never use personal information
• Create different passwords for different websites
• Don’t share your password
ENCRYPTION
• Data sent between computers are changed from something useful to
encrypted data that is difficult to decrypt by unauthorised people
• The only way to decrypt the data, is with the encryption key
MULTI-LAYER VERIFICATION

• A authentication method in which a computer is granted access only after successfully giving two or
more pieces of information

Authentication mechanisms

• Knowledge – something only the user knows


• Possessions – accepting verification on another device
• Inherence – voice / face / fingerprint verification
INTERNET TECHNOLOGIES
INTERNET AND WWW

CONTENT
• Evolution of the internet
• Big data concepts
• Multimedia as part of internet technologies
• Compression technology
EVOLUTION OF THE INTERNET

IP address
• Each computer has an unique internet address
• IPv4 address ex. 172.16.1.97
• Each number range from 0 to 255 and can be
represented by 1 byte
• Purchase a domain – linked to IP address
• www.google.com – 172.217.170.67
Web 1.0

• Websites to provide information


• Web developer and content developer specifically placed the content
• Static webpages
• Read information and look at pictures

Web 2.0

• Sites like Google, MySpace and later YouTube, Twitter and Facebook
started appearing, the internet changed
• Websites became interactive and dynamic, the internet changed
• Search, send messages, post updates and watch videos
• Users play a role in content development

Web 3.0

• Internet services are creating increasingly smarter web applications


to help find and recommend relevant information to visitors
Internet of Things (IoT)

• The Internet of Things is the network of physical devices


that are embedded with electronics, software, sensors,
actuators and connectivity
• It enables these devices to connect and exchange data.
• Integration of the physical world into the computer-based
system
• IoT results in
- efficiency improvements
- economic benefits
- reduced human effort
• Examples
- Connected security system
- Household appliances
- Connected cars
BIG DATA CONCEPTS

Big data

• Large data sets


• Category of computing strategies and
technologies that are used to handle large
datasets.
• Non-traditional strategies and technologies
needed to
- gather
- organize
- process
- gather insights
CHARACTERISTICS OF BIG DATA

Volume
• larger than traditional datasets
• grater demand placed on the processing and storage
life cycle
• Often, the data will exceed the capabilities of a single
computer

Variety

• Comes from many different sources


• Need to handle potentially useful data by consolidating
all information into one single system
• Format and types of media can vary significantly
Velocity

• Big data practitioners prefer a real-time steaming system


• Data is constantly being added, processed and analysed
• Requires robust system with highly available components
to safeguard against failures along the data pipeline

Value

• ultimate challenge of big data is reaching decision making


process
• systems and processes in place may make data and
extracting difficult
DIFFERENT USES FOR BIG DATA

Customer profiling

• Insight in customer
• Create comprehensive database
- demographics
- consumption patterns
• Targeted promotions / marketing

Advanced patient care

• Movement towards real-time monitoring


• Body sensors / wireless sensors
• Personalised treatment
• Lower costs of hospital care – computer monitors and analyse
Agricultural sector

• Sensors on fields and crops provide data on


- soil conditions
- weather
- fertiliser requirements
- water availability
- pest infestations
• Farm equipment
- GPS units
- Drones patrols
- RFID-based traceability
- Individual plants van be monitored
MULTIMEDIA AS PART OF INTERNET TECHNOLOGIES

Downloading
• The easiest way to share media on the internet
• Media owner upload file to website and share link to file with
website visitors
• To play a file
• open the website in your web browser
• download the file to a location on your hard drive
• open the file on your hard drive using any installed media player
• Watch a many times as you like – even without internet
• Disadvantage – you can share file with anyone
Streaming
• Multimedia companies share media through streaming
• To stream media
• open the website in your web browser
• open the file in your web browser
• the file should start playing automatically.
• Never save file on hard drive
• Downloads file for a few seconds / buffering / cache
• Need to steam each time you want to watch video
• Each time you stream a video – streaming company makes
money
• Two types of streaming websites
- live streaming websites – live broadcasts / sports
- video on demand websites – Netflix / Showmax
Bandwidth usages
• Downloading vs Streaming
• Watch one – no difference
• Better quality – more bandwidth

Activity Data used per hour


High quality videos 1 Gb/h
Medium quality videos 0,5 Gb/h
Low quality videos 0,25 Gb/h
Surfing the web / Facebook 0,1 Gb/h
Playing multiplayer games 0,1 Gb/h
COMPRESSION TECHNOLOGY
Data usage

• If four people watch an average of two hours of high quality videos per
day, they will use 240 Gb in a month

High quality vs low quality

• High quality videos have a higher resolution


• High quality videos may have a higher frame rate

Resolution

• The number of pixels shown on the screen at any time

Pixel

• Every pixel is a single dot of a specific colour (recorded as a mixture of


RGB).
• It is the most basic unit of colour and resolution
Video compression
• Allows video streaming sites to dramatically
decrease the size of videos without significantly
decreasing the quality of the videos

• 1 second of raw video uses the same amount of


data as a 10-minute compressed video (like an
WebM or MP4 video) with the same resolution
and frame rate
Format File content Compression
MP3 Audio MPEG Audio Layer 3
.mp3

Mpeg4 Audio and video MPEG-4 or Moving Pictures Expert Group version 4
.mp4

Mpeg2 Video A combination of lossy video compression and lossy audio


data compression methods.
Used in Digital Video Broadcast
and DVDs

JPEG Image Joint Photographic Experts Group


.jpg
INTERNET SERVICE TECHNOLOGIES

CONTENT
• Types of websites and supporting technologies
• Internet-related careers
SOME TYPES OF WEBSITES YOU CAN EXPLORE

Advocacy Personal

Blog Portal

Business Search engine

Content aggregator Shopping


Educational Social network
Information Web application
News Wiki
TYPES OF WEBSITES AND SUPPORTING TECHNOLOGIES
Static websites
• Information is coded directly into the website using HTML
• Content of the website will never change, unless someone changes
the HTML

Advantages of static websites


• Easy to host and develop
• Affordable to host and develop
• Can display multimedia

Disadvantages of static websites


• Changes affecting multiple pages need to be made on each page
• Need to be a web developer to add content
• Information updates less frequently
• Need to code a separate web page file for each page of your website
• Website is not interactive
• Changes are time consuming to make.
Dynamic websites
• Information displayed on the website is stored in a database
• dynamically loaded onto pages based on the user’s request
• Process
- Information requested sent to DB
- Information placed on a standard template
- Displayed to user
- New information requested – displayed on same template

Advantages of dynamic websites


• Changes to the template can be made once and immediately affect all pages.
• Can be updated without programming knowledge.
• Scripts can be used to update the website to only show the most relevant
information.
• Can interact with the user.
• Since the content is dynamic, users are more likely to revisit the site to read
the new content.
• Can display multimedia.

Disadvantages of dynamic websites


• Requires more knowledge to develop the initial website.
• Takes longer and is more expensive to develop.
• A single template mistake can affect all pages using that template.
Location-based services sites

• Use location of user’s to determine which website or


information to show
• Facebook and Google make use of location-based
services to determine which advertisements to display
• Search results show services like Google Maps

Advantages of location-bases service sites

• Use real-time data from users to provide information


• Enable marketers to do target marketing
• Using networking to companies can support and
promote each other
• Targeted rewards and discounts
Supporting technologies
• HTTP (Hypertext Transfer Protocol)
- the protocol that controls how web pages are sent from a web server
to a user’s web browser
- including documents, text, files, images and videos
• HTTPS (Hypertext Transfer Protocol Secure)
- data is encrypted before it transferred
SECURITY SERVICES

Multi-factor authentication

• Individuals are authenticated for online services through more


than one required security and validation procedure.
• Physical, logical and biometric validation techniques

Advantages of multi-factor authentication

• Protection in layers improves security.


• Achieves necessary compliance requirements.
• Increases productivity and brings a better usability experience.

Disadvantages of multi-layer authentication

• Inability to login due to theft of smartphone or physical device


which is required and may not be available.
• Cost of setting up this system is high.
One-time pin (OTP)

• A password that is valid for only one login session or transaction


• OTP is an example of a security token that is valid for limited
period

Advantages of OTP

• Safe from re-use attacks – OTP can only be used once


• Keep your email safe – OTPs are sent to mobile phones and you
don’t need to login to your emails
• Convenient to use as most people have mobile phones with SMS
functionality

Disadvantages of OTP

• Inability to login due to


- theft
- device not accessible
• Cost of setting up system is high
Security token valid for limited period

• The security token is generated after successful authentication


of the user
• It remains valid for a specific time set
• After the token expires it cannot be used to preform operations

Advantages

• Use a new token generated when you forget your password.


Generally emailed.

Disadvantages

• If your email address isn’t sored on the site – the token might
be sent to the wrong email address
INTERNET-RELATED CAREERS
Web designer
• Designing the layout
• Identifying the features
• Designing the look and feel
• Coding the website

Web author
• Write and edit text
• Create videos text that are on websites

Graphics and multimedia designer


• Create all the graphical elements on the website
• Includes buttons, icons and pictures
• First impression a person gets when they visit a website
Social media influencer
• If you have a large and loyal following on social media
• You can promote products and partnerships

Vlogger
• You need an interesting story or concept
• People who can relate subscribes
• Make money with advertising

Agricultural technologist
• Agricultural technologists work to feed the planet by maximizing
the food we get from our plants and animals
• specialise in soil analysis, livestock care or crop yields
• To best do their jobs, these workers need data, and lots of it
DATA AND INFORMATION
MANAGEMENT
DATABASE MANAGEMENT

CONTENT
• Database software
• Database types
• Database-related careers
DATABASE SOFTWARE

• Database
• A collection of interrelated data

• Database Management System


• Is a collection of programs that enables us to create and
maintain a Database.
• It is general-purpose software system that facilitates the
DBMS software enables you to
process of defining, constructing and manipulating
database for various applications. • create databases
• create database tables
• A database system consists of the combination of a • add new data to databases
DBMS and a database. • delete information from databases
• retrieve data from databases
• Database Management Software (DBMS) • make data available to users
• software used to create and manage databases. • make data available to applications
• create, manage and monitor users using
the database.
DATABASE SOFTWARE

Advantages of DBMS
• Data sharing
• Data Independence
• Better data integrity
• Controlled Redundancy
• Data consistency
• Data security
• Faster Application Development
• Concurrency control
• Recovery and Backup
POPULAR DBMS
Microsoft SQL
• Server – A relational database management system developed by Microsoft

Oracle
• A proprietary multi-model database management system produced and
marketed by Oracle Corporation

Microsoft Access
• A database management system from Microsoft that combines the relational
database engine with a graphical user interface and software-development
tools

BlackFish
• A high-performance, small-footprint, SQL-92 compliant transactional database,
which runs on both the .NET framework and on the Java platform

PostgreSQL
• A free and open-source relational database management system emphasising
extensibility and technical standards compliance

MySQL
• An open source relational Database Management System
DATABASE TYPES
Desktop or server
• When planning a database – consider the following factors
• Size
• Accessibility

Desktop / single user database


• Small database used by single user or single computer
• Standalone application
• Runs on local computer
• All the resources available
• Example – Microsoft Access

Distributed database
• Runs on a server
• May be sored on multiple computers / cloud
• Resources shared amongst users
• Supports multi-user access
DATABASE CAREERS
Database administrator
• A database administrator is the primary person involved in managing
the data of a company or program

Database programmer
• A database programmer is any employee whose primary job is to
create database and database queries

Database analyst
• A database analyst is responsible for working with companies to
identify opportunities to set up and improve their data systems.

Database project manager


• A database project manager is the person who must make sure that
any database projects are completed on time, at the right cost and at
the right quality level.
DATABASE DESIGN
 Part 1

CONTENT
• Characteristics of quality data
INTRODUCTION

Database design includes


• deciding which data to record
• deciding how to group the data
• deciding which fields to use in your tables
• deciding what type of valuable information should be
stored in these fields
• deciding how to maintain data.
CHARACTERISTICS OF QUALITY DATA

Data

• Raw unprocessed facts

Information

• Data that is organised

Knowledge

• Information read / heard / seen and understood


CHARACTERISTICS OF QUALITY DATA

Accurate

• Error free and precise

Correctness

• Inaccurate data is the downfall of a database – you might as


well not have any data
• GIGO

Current

• Need to keep your data up to date


• Run a risk that data will no longer be relevant or accurate
CHARACTERISTICS OF QUALITY DATA

Complete

• Incomplete data almost as bad as inaccurate data


• Gaps in the data make is difficult to use, outdated and
misleading

Relevant

• Good quality data is relevant to the people using it

Consistent

• One part of your data should not contradict or differ from


another part in your database
VALIDATE YOUR DATA
Format check

• Ensure that the data is in the correct format


• E.g. email address contains an @ sign

Data type check

• Ensures that the data is of the correct data type


• e.g. string, integer, double or date/time

Range check

• Ensures that the data falls within a specific range


• E.g. grade is between 1 and 12

Check digit

• Redundancy check used for error detection on identification numbers


• This is useful for data like card numbers or ID numbers.
DATABASE DESIGN TIPS

Validate your Standardise


Accessing data
data your data

Manipulating Be careful with


Use effective
and grouping calculated
names
data fields

Have one
source of truth
ACCESSING AND MANIPULATING DATA

Manual data collection


• Done by hand
• Time consuming

Electronic data collection


• Automatically obtained from an electronic source
• Requires significant programming to set up
QUALITIES OF VALUABLE INFORMATION

What is valuable

• Easy to go overboard and record everything


• Takes up space on DB

Ask yourself
• Will I ever use the data in this field?
• What fields do I need specifically for my application?
• What fields would I need for my application in the
future?
HOW TO GET TO INFORMATION
Have one source of truth

• the same data should not be recorded in more than one place
• unused tables and fields that can be confusing (such as “song_id_old”, or
“song_id_2”) should be removed
• tables that are automatically created by combining other tables should be
labelled clearly
• numbered tables (like “users_1” and “users_2”) should either be combined
into one table (“users”) or renamed more clearly (“users_south_africa” and
“users_rest_of_africa”)

Standardise your data

• If multiple people enter the values, you may end up with non-standard data,
like:
- “11th Grade”
- “11”
- “Grade 11”
- “11th”
Use effective names
• Choose descriptive names
• Choose simple names
• Avoid abbreviations
• Do not use numbers in the name
• Do not use spaces in the name
• Do not use strange characters in the name (other
than underscores)
• Use a consistent naming pattern
MANIPULATING AND GROUPING DATA

Data
• Data, and especially complex data, should be broken into
smaller logical pieces and grouped according to the
chosen categories.
• Makes data more manageable
• Store name, middle name and surname separately, rather
than one long string
KEY TERMINOLOGY
Field
• A field is part of a record and contains a single piece of data for
the subject of the record.

Primary Key
• A field that uniquely identifies each record in the table.

Composite/Combined Primary Key


• Is a set of more than one key that, together, uniquely identifies
each record.

Foreign Key
• A foreign key is a primary key in one table that appears as a field
in another table.
Data-types of fields

• The fields within a database often require a specific type of data to be


input. Data-type that each field stores has to be declared/set. Common
datatypes are: text, number, data, time Yes/No, etc.

Record

• A record is composed of fields and contains all the data about one
particular person, company, or item in a database

Table

• A database table is composed of records and fields that hold data. Each
table in a database holds data about a different, but related, subject.

Relationship

• Is a situation that exists between two relational database tables when


one table has a foreign key that references the primary key of the other
table. Relationships allow relational databases to split and store data in
different tables, while linking disparate data items.
DATABASE DESIGN
 Part 2

CONTENT
• Creating a simple database
• Setting up relationships
CREATE A TABLE

Ask yourself the following questions


• What table are you creating?
• Which fields will you include in your table?
• What data type will each of these fields be?
• Which column will be the primary key for your table?
SETTING UP RELATIONSHIPS

ERD
• Entity relationship diagram
• These diagrams show the tables in your diagram, the fields
in each table, and the relationships between the fields of
different tables
HOW TO DRAW AN ERD
DRAWING THE RELATIONSHIPS

one-to-one

• With a one-to-one relationship, one record on a table is related


to one record on another table

one-to-many

• With a one-to-many relationship, one record on a table is


related to many records on another table

many-to-many

• With a many-to-many relationship, many records on one table


are related to many records on another table
SOCIAL IMPLICATIONS
SOCIAL IMPLICATIONS

CONTENT
• Effects of digitalisation
• Protecting your online identity
• The effects of computer and human error
• The effects of cybercrime
• Social implications of big data
• Influences of globalisation and fourth industrial revolution (4IR)
EFFECTS OF DIGITALISATION

Information
Social implications Ethics
System

Effect on
workplace and
Future careers
employment
practices
SOCIAL IMPLICATIONS

• There are ethical and social issues with information systems that impact society
• Our current society is dependant on information systems

Information systems influence

• The workplace
• Our private life’s
• The government
• People with no access to information systems
WHAT IS AN INFORMATION SYSTEM (IS)

• An IS, is any organised system for the collection, organisation, storage


and communication of information

Impact in society
• Sharing of information
• Education
• Environment
• Political
ETHICS

• Ethics is referring to the right and wrong of an individual acting on free will using choice
to determine their behaviour.
• Not all ethical choices are the right ones and some behaviour creates social issues. This
issues are related to privacy and security.
FUTURE CAREER
Digital forensic investigator
• Digital forensics is the analysis of computer and electronic equipment to find evidence to be used in a
legal trial or internal investigation.

3D architects and 3D printing operators (prostatic limbs)


• 3D architects are designers who use 3D software to create models of buildings and other structures.
• The process of 3D printing involves utilising computer-aided design (CAD) information to print
products in layers.
• A 3D printing operator oversees the printing process. Examples include prostatic limbs, plastic models
and cameras.

Privacy consultant
• Is exactly that, a consultant who deals with the online privacy of a corporation.
• They assess and define system specifications in relation to compliance with data protection and
privacy regulations.
• They follow proper data management systems and build positive relationships with a variety of
stakeholders.

Medical nano-bot technician


• Nanorobotics is a technology field that creates machines or robots with components that are at or
near the scale of a nanometre.
• Nanotechnology in medicine involves applications of nanoparticles currently under development
research that involves the use of manufactured nano-robots to make repairs at the cellular level, this
can cure cancer cells in the future.
EFFECT ON WORKPLACE AND EMPLOYMENT PRACTICES
Mobile offices
• Mobile offices are temporary offices that are designed to be transported or
moved easily.
• You need a laptop and internet
• Improve productivity of remote workers who need to travel a lot

Shared working spaces


• Open-plan or closed offices
• Include features you would find in a workplace such as a receptionist and
• boardroom
• Can rent one or more days per week

Virtual offices
• Can rent like a shared working space
• Gain access to business address, conference rooms, printing room, a phone
number and a receptionist
EFFECT ON WORKPLACE AND EMPLOYMENT PRACTICES

Decentralisation of labour
• People no longer work together in an office
• Work from home and avid rush hour traffic
• Internet speed allows for video conferencing
• Requires more self discipline from staff

Office Automation
• Collective hardware, software and processes that allow automation
• Examples – Google assistant, Siri, Alexa
EFFECT ON WORKPLACE AND EMPLOYMENT PRACTICES

Artificial intelligence (AI)


• Programmers try to create or simulate human intelligence
in machines
• Popular use of AI is chatbots that use natural language
• Other examples – Self-driving cars, stock taking, voice
directions, administrative tasks

Robotics
• Robots can be used to preform dangerous or repetitive
tasks
• Robotics and AI leads to automation
PROTECTING YOUR ONLINE IDENTITY
• Privacy is a persons ability to control how information about then is shared with other people or institutions
• In South Africa privacy of all individuals is protected by the constitution
• The Protection of Personal Information Act (POPI Act) ensures that a citizens personal information may only
be used in very specific circumstances

Ways to protect your online identity


• Exclude personal information from your social media profiles, like
your phone number, address, family information or school.
• Look at your social media privacy settings
• Protect your online passwords and strengthen them
• Use multiple passwords
• Check your phone’s privacy settings
• Be aware of ‘phishing’ emails
• Check for any suspicious transactions that you didn’t authorise.
SOCIAL ISSUES IN A NUTSHELL

Human errors
• Weak password security and sharing of passwords
• Careless handling of data or accidently deleting files
• Inadequate software security and neglecting updates
• Low security awareness
• Ineffective data access management.
THE EFFECTS OF COMPUTER AND HUMAN ERROR
Inaccurate and invalid – data input
• Information that is input by the user is erroneous. Human errors
and poor auditing and control procedures of the data lead to
inaccurate data capture.
• Causes for data to be inaccurate:
- Missing data
- Wrong data
- Inappropriate data
- Nonconforming data
- Duplicate data
- Poor data entry

Unverified data
• When data entered into a computer is not verified, these data
types can often be stored incorrectly, causing serious errors
• Types of Data Verification are double entry and proofreading
data
Software bugs
• Errors, flaws or faults in a computer program that causes
it to produce incorrect or unexpected results, or to
behave in unintended ways

Incorrect hardware/software configurations


• Computer software has certain expectations about the
system it will operate on
• Include minimum hardware requirements and specific
hardware components
• Installing software on an incorrect hardware configuration
can cause instability and crashes
THE EFFECTS OF CYBERCRIME

Identity theft
• The collection of the victim’s personal
information by hackers to enable someone to
masquerade as the victim
• possible effect on the victim
- Financial information
- Medical insurance information
- Driver’s license information
• victim could end up with a criminal record, a
poor credit rating and not being able to pay for
medical treatment
Business data theft
• Businesses are exposed to
- email threats
- malicious software
- spam bots
• Intellectual property and trade secrets are compromised
• Effects on business
- Lose client information, trade secrets and data
- Time spent on cleaning out information systems and
securing
- Functioning ineffective while IS reconstructed
- May have to close down
• Cokes formula, KFC’s recipe
Virus attack to business
• Malware
- Software written to destroy a computer system, to obtain
business data theft or personal information
- Types
▪ Viruses
▪ Trojan viruses
▪ Spyware
▪ Ransomware
• Ransomware
- Software that encrypts the business data
• Good updated antivirus software and backup strategies
would be required
SOCIAL IMPLICATIONS OF BIG DATA

Big data is used online

• Online banking
- help detect illegal activity
- misuse of credit cards / money laundering
• Booking reservations
- help understand the industry
- led to more direct bookings / reservations
• E-learning
- Customised learning programs
- reframing coursework to students learning needs
• Video conferencing
• Social websites
- people share videos, photos, personal data and comments
- social websites collect big data on relationships, interests,
spending habits and networks of users
Advantages of big data

• gain more complete answers because you have more


information
• More confidence in available data—means a completely
different approach to tackling problems

Disadvantages of big data

• discriminate against consumers when they are being


analysed and assessed in greater detail
• consumer habits for targeted marketing
• Concerns about privacy
- every time you click on a website
- post on social media
- use a mobile app
- comment via email
- phone call centres
• Exposes more of our data to potential security breaches
INFLUENCES OF GLOBALISATION

Globalisation has resulted in


• Efficient market where there is an
equilibrium between buyers and sellers
• Increased competition between companies
• Security as countries’ economies are
intertwined and dependant on each other.
• Wealth equality throughout the world as
poorer nations have more job
opportunities

You might also like