0% found this document useful (0 votes)
765 views

ICT Notes (Theory)

This document provides summaries of key chapters from ICT theory notes. It discusses the basic components of a computer system including operating systems and their types. It also summarizes input/output devices like printers and their advantages/disadvantages. Network devices, internet vs intranet, and system life cycles are summarized. The document concludes with summaries on email/social media safety and data security threats like phishing.

Uploaded by

shlok bhaiya
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
765 views

ICT Notes (Theory)

This document provides summaries of key chapters from ICT theory notes. It discusses the basic components of a computer system including operating systems and their types. It also summarizes input/output devices like printers and their advantages/disadvantages. Network devices, internet vs intranet, and system life cycles are summarized. The document concludes with summaries on email/social media safety and data security threats like phishing.

Uploaded by

shlok bhaiya
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

ICT Notes (Theory)

By: Varun Desai

Thank you to znotes.org for allowing me to use these notes. https://znotes.org/


These notes are only made for an individual reference and will not clear doubts.

Chapter 1: Types and Components of Computer


Systems
This is a basic computer model which shows how a computer can input, process, store and
output specific data:

An Operating System is a part of the computer model where it allows users to directly interact
with the computer there are 2 types of Operating Systems:
● Command Line Interface (CLI):
○ Type commands to directly tell what a computer to perform
○ Used by technicians
○ Can access everything on a computer system unlike GUI users who have only
access to what is presented on a screen.
■ Advantages:
● Knowing the correct commands can direct you anywhere on the
computer faster than GUI
● Uses much less RAM than any other interface
● Cheap monitors can be used
■ Disadvantages:
● Large number of commands must be memorized
● Commands must be typed without any error else the command
will fail
● Graphical User Interface (GUI):
○ Uses graphics to stand for the complicated commands
○ Screen divided into windows allow different things to run on each window
■ Advantages:
● Easy to use as not much IT knowledge is required
● Easy to explore
● Not having to learn complicated commands
● Good help facilities are provided by GUI
■ Disadvantages:
● Larger amount of hard disk space than other interfaces
● Requires more RAM
● GUI uses more power to display
● Experienced programmers may find GUI slow and CLI much more
comfortable

Chapter 2: Input and Output devices


(This chapter only revises the printers [I find them difficult])

Laser Printers:
● Produce very high-quality hard copy output
● Print rate per page is fast if many pages are being printed
● Rely on large buffer memories – the data for the whole document is stored before pages
can be printed out
Advantages:
1. Printing is fast for high volume tasks, may be slightly faster than an Inkjet printer if less
documents are provided
2. Can handle large printing jobs
3. Quality is consistent
4. Toner cartridges last for longer than a normal ink cartridge

Disadvantages:
1. Expensive to buy
2. Color lasers tend to be more expensive
3. Produce ozone and volatile organic compounds because of their method of printing
4. These have been linked to several health hazards in an office environment
Inkjet Printers:
● Used for good quality hard copies of documents – although not as good as a laser
printer, it is significantly better than a Dot-Matrix printer
● Do not have large buffer memory so printing takes time
● Printer may pause if too much data is provided to it
Advantages:
1. High quality output
2. Cheaper than laser printers
3. Very lightweight and take up little space
4. Does not create any chemicals which could potentially harm someone
Disadvantages:
1. Output is slow if several copies are needed
2. Ink cartridges run out quickly so is not generally used for large printouts
3. Printing can smudge if the user is not careful
4. Can be expensive if the printer is used often

Dot Matrix Printers:


● A type of impact printer
● A print head is used which is made up of a matrix of pins which is pressed against an
inked ribbon
Advantages:
1. Can be used in an environment which would be problematic for both laser and inkjet
printers
2. Carbon copies or multi-part outputs are produced
3. Very cheap to run and maintain
4. Easy to use if continuous stationery is required
Disadvantages:
1. Very noisy
2. Costs more than inkjet printers
3. Very slow
4. Prints are in poor quality
Chapter 4: Networks and the effects of using them

Common Network Devices:


Hubs Bridges Switches Modems

Multiple devices can It connects 2 More efficient than It stands for


connect to them networks together hubs in distributing Modulator
data Demodulator

Main task is to It can only connect Each device has an Converts computer’s
receive data and the networks that use access control media digital signals into
send it to other the same way for address (MAC analogue for
devices handling messages Address) which transmission through
identifies it uniquely telephone lines

Information will They do this by Data sent will have a Reverses the process
always be received changing the form of MAC address which above (demodulation)
whether its relevant the message to suite tells the source and for a computer to
or not the different type of receiving device process the data
network

MAC Address: A number unique to each device connected to the network.

Accessing the Internet:

Type of Access Description

Dial up internet access Slowest type (60kbps), Telephone line gets tied up while a dial up
modem is in operation

Cable internet access Local cable television operator gives user access through cable
networks

Internet access via Fastest download speed connections


DSL
Comparing Internet and Intranet:

Internet Intranet

Phase origin International Network Internal Restricted Area Network

Purpose Globally share data Privately share data

Audience Wide range of people Specific company or organization

Access Anywhere if you are connected Only within the company

Chapter 7: System life cycle


The following diagram is all the processes in a system life cycle:

Analysis:
1. Fact finding/collecting data from the current system
(Observation, Interviews, Questionnaires and looking at
existing paperwork)
2. Description of the current system
3. Identification of the errors in the current system
4. Agreeing with the objectives with the customer
5. Identifying and agreeing with the customer’s
requirements
6. Interpreting the customers requirements
7. Producing cost-benefit analyses
8. Producing a data flow diagram
Design:
Verification:
● Double data entry: Data is entered twice, sometimes by two different people. The
computer compares the two entries and pinpoints the similarities and differences
between the two entries
● Visual Check: Checking for errors by checking on a screen with the data in the original
document
Validation:
● Range check
● Length check
● Character/type check
● Format/Picture check
● Limit check
● Presence check
● Consistency check
● Digit Check

(Skip development & testing)...

Implementation:

Changeover method Direct Parallel Pilot Phased

Relative costs Low High Medium Medium

Input needed by user Medium High Low Medium

Input needed by Low Low Medium Medium


system teams

Impact of failure High Low Low Medium

Chapter 8: Safety and Security


Email Safety:
1. Open emails from known sources, do not click any links from unauthorized or untrusted
websites.
2. Ask their ISP to enable email filtering to classify spam mails as spam
Social Media Safety:
● Block and report users who seem suspicious
● Never use your real name, always use a nickname
● Use appropriate language
● Do not enter private chat rooms, they may be charming but do not give any personal
information
● Do not meet anyone off the internet for the first time, or at least speak to a trusted adult
first.
● Do not misuse images (do not blackmail them with those images)
● Respect the confidentiality of others

Security of data:
Phishing: Involves the fraudulent operation of emails.
Pharming: Involves installing malicious code onto the victims computer and running it.
Smishing: Phishing via SMS

How to prevent Phishing, Pharming and Smishing?


● User education
● Setting up anti-malware and anti-spyware software
● Enabling protocols such as SPF and DKIM
● Do not download random .exe files
● Users should be alert at all times and know where they are being redirected to
● If a user is asking for private information, report the user to the website’s reporting
system, inform authorities or tell a parent/guardian.
● The user must understand whether they are being redirected to the correct website or
not. Check the URL in the Address bar above in the web browser
Chapter 11: File Management

Extension Name Full Form

css Cascading Style Sheet

csv Comma Separated Values

gif Graphics Interchange Format

htm/html Hypertext mark-up language

jpg Joint Photographic Experts Group

pdf Portable Document Format

png Portable Network Graphic

rtf Rich Text Format

txt Text

mp4 Moving pictures group experts group layer 4

mp4 Moving pictures group experts group layer 3

rar Roshal Archive


Chapter 15: Data Manipulation

Relational Database Flat-file Database

Complex queries can be carried out Poor at complex queries

Better security Poor at limiting access

Cater for future requirements Harder to update, so inherently inefficient

Data is only stored once Potential duplication

Requires more planning Easy to design

Non-unique records

Harder to change data formats

You might also like