CAT Theory Book Grade10
CAT Theory Book Grade10
Restrictions
You may not make copies of this book in part or in full – in printed or
electronic or audio or video form – for a profit seeking purpose.
Term 1
Introduction
Revision activity
Term 2
Introduction
Revision activity
Introduction
Revision activity
At the end of the chapter
Introduction
Revision activity
Chapter 5 Hardware
Introduction
Revision activity
Introduction
Revision activity
Introduction
Revision activity
Introduction
Revision activity
Introduction
Revision activity
Term 3
Revision activity
Introduction
Revision activity
Introduction
Revision activity
Introduction
Revision activity
Term 4
Introduction
Revision activity
Glossary
CHAPTER OVERVIEW
Understand ICT systems and how they are used in everyday life.
Distinguish between data and information.
Give examples of data and information used.
Identify the main concepts of a computer.
Understand the difference between hardware and software.
Describe the information-processing cycle with reference to how it uses hardware
devices in each stage.
Describe the different types of computers and their uses.
Explain the economic reasons for using computers.
Understand the different social implications regarding the use of ICT.
INTRODUCTION
We use many different types of computers, or computer-controlled
devices every day. This can range from smartphones and calculators,
to the scanners used in supermarkets.
The history of computing goes back over 2 500 years to the abacus,
which is a simple calculator made from beads and wires, and is still
used in some parts of the world today.
In the following units, you will learn more about the different concepts
used in computing, the different types of ICT systems used, as well as
what the difference is between data and information. You will also look
at the various components of a computer and the different types of
computers available. Lastly, you will learn about the economic value of
computers.
UNIT
TRANSMITTING DATA
When all the items are scanned into the check-out computer, the
customer can see information about the price of each item, which is
shown on a small display.
After all the items have been scanned, the total amount is shown. The
customer then pays and is given a printed till receipt showing all the
items that were bought and how much each item costs.
Figure 1.2: Cash register and receipt
COMMUNICATION
In some instances, a product’s data can also be sent to the shop’s
main computer for stocktaking purposes, as well as to the
manufacturer for their stock purposes.
Activity 1.1
1. Explain the term ICT. Do not just expand on the acronym.
2. What does POS stand for?
3. The following table shows a few activities that take place before
check-out. Match these activities with one of the following
processes associated with a POS, as seen from the customer’s
point of view:
Receives
Sends
Stores
Retrieves
Manipulates
What do you think of first when you hear the word data? What comes
to mind is raw material, which refers to something that has not yet
been processed. Data needs to be processed before it can become
useful. Data can be in the form of text, words, numbers or symbols
which, if not put into some type of context, is pretty useless to us.
Let’s look at the following example of how data can be converted into
useful information.
Animation
Tables 1.1 and 1.2 show the difference between data and information.
In Table 1.1, we cannot see how the learners are performing. However,
after the computer manipulated the test scores, we are given
meaningful information, as can be seen in Table 1.2. Remember, the
information we get out of a computer is only as good as the data that
is entered into it.
Using the example of the learners’ test results, if the teacher entered
the incorrect marks into the computer (i.e. bad data), the information
that she would get as a result, will also be incorrect.
It is quite possible for data to be interpreted incorrectly. This is often
the result of incorrect or incomplete data, or a lack of context.
Activity 1.2
1. Sizwe is in Grade 10 and received his school report. When he looks
at his report, this is what he sees:
1.1 What is wrong with this report?
1.2 Which principle is referred to above?
1.3 Explain the difference between data and information.
1.4 Use the data from the previous page and create a report showing the
correct information for Sizwe. Use the table below to guide you:
Computers are electronic devices that manipulate data and turn it into useful
information. To see how this works, think about sending a WhatsApp message from
a cell phone to a friend.
The diagram below shows the different stages in sending a WhatsApp message.
c. Printing a file
d. Playing videos using your phone
e. Photos that you keep on your phone
UNIT
The following figure tries to explain how a computer works. You can
see that the functions of a computer are similar to the stages of the
information-processing cycle.
Figure 1.4: General model of a computer
Looking at the figure, you will see that all basic computers consist of
four functions:
1. Input
2. Storage
3. Processing
4. Output
https://www.youtube.com/watch?
v=mCq8-xTH7jA
Activity 1.3
1. What is a computer?
2. Match each concept in Column A with the correct definition in
Column B. Write only the number and the letter.
3. Answer the questions based on the diagram below.
MULTI-PURPOSE DEVICES
Table 1.3: Different types of general-purpose computers
DEDICATED (EMBEDDED) DEVICES
Embedded devices are devices designed for a single purpose;
whether that purpose is to wake you up in the morning, control the
temperature of the air conditioning or help navigate. As such, these
devices are usually excellent at their specific tasks, but they are also
unable to do anything else. Embedded devices are designed to
perform specific dedicated computing tasks. Examples of these
devices are:
ATM machines
DVD players
Anti-lock braking systems
Digital watches
MP3 players
Drones
Airbag control systems
TYPES OF COMPUTERS
https://www.youtube.com/watch?
v=7qOF5ffTDI8&list=PLOaNAKtW5HL
RZAyE8XkucMuGZpKKCLI88&index=
3
UNIT
Activity 1.4
Read the following scenario and answer the questions that follow.
SAVING PAPER
REVISION ACTIVITY
1. Study the picture of a computer below and answer the questions
that follow:
INTRODUCTION
As a modern-day learner, you have probably used, seen, or read about
computers. We use computers in our everyday lives, for example, in
banks, schools, shops, hospitals, and maybe the people in your home
use computers on a daily basis. Being able to use a computer is an
important skill to learn; not only for school or university purposes, but
also for the workplace.
Something to know
Something to know
When holding the mouse, rest your hand over it and place your index
finger on the left button of the mouse. You can rest your thumb and
pinkie (little finger) on the sides of the mouse. An example of how to do
this is shown in Figure 2.2.
Figure 2.1: Mouse
Figure 2.2: How to hold a mouse
Something to know
However, most left-handed people either use the mouse in their right
hand, or they place the mouse on the left-hand side of the keyboard
and use their middle finger for the left button.
To explain how the mouse works, we will be using the left button of the
mouse. The following table shows the basic things you need to know
about a mouse.
Something to know
Something to know
Something to know
With the desktop, you can use shortcuts to find folders, files, or
programs quickly. You can identify a shortcut by checking if there is a
curving arrow on the bottom left-hand side of the icon, as seen in
Figure 2.6.
Let’s look in more detail at the desktop and icons that you can find on
a computer:
Figure 2.7: Desktop components
THE TASKBAR
The taskbar can be found at the bottom of the screen, as seen in
Figure 2.7. It shows a button for each open folder, file, or application.
When you click on any of the buttons on the taskbar, it will open the
file, folder, or application, and therefore, becomes an active window.
The taskbar also has the Start button on the left-hand side and the
notification tray on the right-hand side. You can perform certain
functions, such as change the time, volume, or connect to the Wi-Fi
by selecting the icons in the notification tray.
Activity 2.1
1. The following steps are performed when starting up, using and
shutting down a computer. The steps are in the incorrect order,
however. Arrange the steps in the correct order.
a. Enter the password
b. Switch on the monitor
c. Session begins
d. Switch on the power button
e. Click on Log out
f. Enter the username
g. Computer session ends
h. Switch off the monitor and power
i. Shut down computer
2. State whether the following are True or False. If false, give the
correct answer.
a. A password should always be secret.
b. The keyboard is the most important hardware device used to control the
computer.
c. The hour-glass icon shows that you must wait while the computer is doing a
task.
3. Match the terms in Column A with the correct description in
Column B:
4. Logging off and then switching off the computer when you are done
using it, is actually quite important. Answer the following questions
regarding this statement:
a. Give two reasons why switching off the computer after use is important.
b. Does logging off switch off the computer? Motivate your answer.
c. Briefly explain why it takes time for a computer to start up and shut down.
File manager: A file manager is an application that helps manage the file system
on a computer.
My Documents: When you open this folder by double clicking on the icon, you can
find your documents, music, pictures and other files. These files are stored in the
My Documents folder on the computer’s hard disk.
Recycle Bin: When you delete items, such as folders or files from the computer,
they are stored temporarily in the Recycle Bin. If you deleted a file by mistake, it
can be restored to its original folder from the Recycle Bin. The files or folders in the
Recycle Bin can also be permanently deleted by deleting them.
Something to know
In older versions of Windows, This PC
is known as Computer.
ACCESSING APPLICATIONS
You can access the different applications on the computer by using the
Start menu. Click on the Start button and then scroll through the
alphabetical list. If you want to save time, you can limit the scrolling by
selecting any letter from the alphabetical list. From there, you can
choose the letter that the application begins with.
If you are still having difficulty finding the application that you are
looking for, type in the name of the application in the search box on the
taskbar.
2. Word will open in a separate window and the Word icon will appear
on the taskbar.
Figure 2.10: Word window
The title bar is found at the top of the window and the name of the
open file can be seen on the title bar. Since the document is not
named yet, the title bar will be Document1-Word.
To close a window, click on the Close button (which is the x in the top-
right corner of the window), as shown below.
Something to know
OPENING A FILE
In the previous example, you saved a document with the file name
‘Test’. Now let’s learn how to open the saved file.
PRINTING A DOCUMENT
You will learn how to print documents when you study word
processing. Refer to Chapter 1: Introduction to Word Processing in the
Practical Book for more information.
Activity 2.2
Do the following at your computer:
1. Switch on the computer.
2. Find Word using the search box in the taskbar.
3. Use the mouse to open the Word application.
4. Type two to three sentences about why CAT, as a subject, is
important.
5. Save the file and then close it.
6. Open the file that you just saved in (5).
7. Print Preview the document.
8. Close the application.
UNIT
As computing takes over our lives more and more, typing is one of the
most important and necessary skills that you will ever learn.
Touch typing is all about making sure that each finger has its own
place on the keyboard. Because of that, you do not have to look down
on the keyboard while typing, which makes your typing speed much
faster.
Having the correct posture also helps you to type correctly and more
efficiently.
A tip for having a good posture when using the computer, is to position
yourself so that your belly button is in line with the letter “H” on the
keyboard. You can see an example of this in Figure 2.16.
ERGONOMICS
Ergonomics is the study of the way in which humans work with the
goal of increasing productivity, comfort and safety.
PREVENTION
Prevention is always better than cure. Many people suffer from
posture-related injuries. Health problems related to poor posture and
ergonomics can be prevented in different ways.
REVISION ACTIVITY
1. When you are working on a computer that is used by more than
one person, you will often be asked to enter a user name and
password soon after the computer has been switched on. Give
two reasons why you should never share your password with
anybody else. (2)
2. Match the mouse action in Column B with the desired outcome in
Column A. Write down only the number from Column A and the
matching letter from Column B.
(4)
3. Answer the following questions about a GUI.
3.1 What does the acronym GUI stand for? (1)
3.2 What is the main screen of the Windows 10 GUI called? (1)
3.3 What is the function of an icon? (2)
4. What does the arrow in the bottom left corner of the icon below
indicate? (1)
5. Study the image of a Windows 10 desktop below
6.1 What application can be accessed by double-clicking the above icon? (1)
6.2 Explain to someone who is NOT familiar with Windows 10 how you would
use the application. (3)
7. Explain the difference between saving and closing a file. (2)
8. Give four tips to avoid eye strain when using a computer monitor.(4)
9. Use the image below to guide learners about having good posture
when using a computer.
INTRODUCTION
Having an effective computer filing system can make a huge difference
in your everyday life. Firstly, it helps to save time, but most importantly,
it helps you to be more organised.
UNIT
Figure 3.1 shows the This PC folder with the sub-folder Music. This
folder contains sub-folders that are organised according to the name
of the artist or group. This is to give you an idea of how file
management looks on a computer. In Windows, folders are used to
organise files.
Figure 3.1: Folders used for file management
The capital letters and colon indicate what type of disk it is. For
example, from Figure 3.2, you can see the following:
The C: Which is also known as the C-drive, usually refers to the hard disk drive
(HDD).
The D: Which is also known as the D-drive, usually refers to a CD or DVD drive.
Other letters are also used to indicate storage media, for example, in this case F:,
which refers to a removable disk (USB). Storage media, such as DVDs, USBs and
hard drives, do not save data to the disks on the computer.
FOLDERS
A Windows operating system organises its drives, folders and files in a
hierarchical folder structure. Files are stored on a computer inside
folders. Folders are used to organise a computer’s files so that it can
be found easier. A folder will contain sub-folders and then files.
In the following example, we will explain a folder by comparing it to a
tree. The structure is the shape of a pyramid, where each row of items
is linked to the items beneath it. Because of this pyramidal structure,
this hierarchical structure is also known as an “inverted tree”.
The different drives, such as the different hard drives, CD/DVD drive,
USB drives, as well as network drives, are found in the row below the
root. Folders linked to the specific drives are then shown in the next
row.
Any sub-folders and files found in the folder above are shown in the
next row. This pattern continues until the final row only contains files.
The highest level of the tree structure of a drive is, therefore, called the
root directory and is stored on the hard-disk drive of a computer. The
documents then form a sub-folder of the root directory C-drive, which
is written as C:\.
FILE PATH
A file path shows the location of where a file, web page, or other item
is located on the computer. The file path shows you to which storage
device the file is saved (i.e. the drive letter), in which folder and sub-
folders the file is saved, the name of the file and finally, the type of file
(given by the file extension).
For example, Jane has a music folder where she keeps her songs. Figure 3.4
shows an example of this file path.
As Figure 3.4 shows, each file’s unique file path starts with the storage device
drive letter. After the drive letter, you will see the name of the file’s folders and sub-
folders. A back slash (\) is used to separate the drive letter, and the different folders
and files. Finally, the file path ends with the name and extension of the file.
Windows file names have two parts; the first part is the file name and then a period
followed by an extension. A file extension or file name extension is found at the end
of a file name and shows what type of file it is in Microsoft Windows. The extension
is a three- or four-letter abbreviation that identifies the type of file. For example, in
the file name, Moonlight.mp3, the extension is mp3.
Something to know
Later in this chapter, you will learn more about the different file
extensions.
FILE MANAGEMENT
https://www.youtube.com/watch?
v=k-EID5_2D9U
Activity 3.1
1. Define the following terms:
a. File path
b. Disk drive
c. Folders
2. Answer the following questions based on the file path below:
C:\Documents\School\Maths.docx
a. What is shown in the file path above?
b. To what does “C:\” refer?
c. A file name consists of two elements. What are they in this diagram?
3. Using the figure below, provide the file path to get to the file:
Communication.pdf.
Figure 3.7: Determining the file path for the file, Communication.pdf
Before you can start organising your computer, you first need to see
how the computer is currently organised.
After you have examined the different files and folders on the
computer, you can start organising them.
As you have learned, files are stored on a computer inside directories
(called folders in Microsoft Windows). These folders are used to help
organise a computer’s files so that files can be found more easily. Each
folder can contain any number of files or sub-folders. For example, a
music listener might create a Music folder with all her music files in it.
A more organised music listener might have a Music folder as the first
folder, and then sub-folders for each artist. It might even have a sub-
folder for each style of music and then have folders inside of that for
each artist. This would make it much easier to find songs by a specific
artist.
Figure 3.10: Folders can contain both files and folders
https://www.youtube.com/watch?
v=HDmwiJxzIrw
A similar strategy can be used on all storage devices to make it easier
to find important files and folders.
https://www.youtube.com/watch?
v=uSnpAnhV2Jo
FILE PROPERTIES
The File properties window shows you a range of information about a
file, such as its file type, size, author, title and when it was changed
last. The Properties window will also give you information on how you
can manipulate the file.
Something to know
When naming files, it is important that you name the files clearly and in
an orderly way. The following are pointers to help you rename files and
folders in an organised way:
Avoid using a structure that is too difficult to follow.
Since files are organised alphabetically, you need to think about the way in which
you name files.
Make sure that you can identify similar files based on the file names.
Use the dash symbol to separate different items in a file name (for example, the
name and date).
Something to know
Applying the keyboarding skills you
have learned will help you rename files
and folders much quicker.
COPYING FILES
When you copy a file, a duplicate of the file is created and stored on
the computer’s clipboard. This duplicate file can then be copied onto
any storage medium connected to the computer, using the Paste
command.
There are three ways that you can copy and paste files.
Something to know
https://www.youtube.com/watch?
v=F7mAoa0fOts&t=18s
MOVING FILES
When moving files, the file or files that you move are copied to a new
destination, but then deleted from its original destination. When doing
this, you have not created a copy file, but you have moved a file from
one folder to another folder.
Something to know
To move files, you need to cut and paste them, and NOT copy and
paste them.
2. In the example above, the user typed in the word “device”. You
can see the search results above the search box.
DELETING FILES
The Delete command enables you to remove files from the storage
device. This command can be used to either remove files that you do
not need anymore, or to make more space on the storage device.
In Microsoft Windows, deleted files are moved to the Recycle Bin. The
Recycle Bin is a temporary folder where deleted files are stored until
you remove them from the bin. Any files you delete will first be moved
to the Recycle Bin before they are permanently deleted.
The following tables show how you can delete files from the computer
and how these files can be deleted from the Recycle Bin.
Take note
Do not delete any computer software
files, as this could cause the computer
to malfunction.
Something to know
Something to know
Activity 3.2
1. Which solution in Column B can be used to solve the problem in
Column A? Note that more than one action can apply to a
problem.
2. Identify the drive letter, folder, sub-folder, file name and extension in
the file paths below. Make a copy of the table below in your
workbook and fill in your answers under the correct heading in the
table:
a. c:\Games\Solitaire\Solitaire.exe
b. e:\Music\Pop\Jenni – Roses.mp3
c. c:\Program Files (x86)\Calculator.exe
UNIT
Each file has a file extension identifying the type of file and how the
computer should interpret it. A .txt file is a simple text document that
contains words with no formatting. A .doc file allows for formatted text
with different fonts and images.
TEXT FILES
There are two types of text files:
1. .txt (text)
2. .rtf (rich-text format)
Text files are files used to store plain text. Plain text refers to text that
has no special formatting, such as fonts, font sizes, images and so on.
In Microsoft Windows, text files are identified with the .txt file extension.
Notepad is a popular application in Microsoft Windows that is used for
opening and creating text files. Figure 3.14 shows an example of a .txt
file:
Figure 3.14: An example of a .txt file
Rich-text format (RTF) files can save more information than text files.
This includes different font types, such as BOLD, italic, as well as font
colour. RTF files cannot be opened in Microsoft Notepad, but can be
opened in Microsoft WordPad. Both these applications are installed
with Microsoft Windows for free.
DOCUMENT FILES
Although document files (.doc, .docx and .odt) are used to store
documents. It differs from text files and rich-text files because it can
store more complex information such as custom formatting options
and styles. Word processors – for example, Microsoft Word, Google
Docs and LibreOffice – can be used to create and edit document files.
Figure 3.15: Document files can store text with advanced formatting
Jabulani is a Grade 12 learner who works almost every day on his computer on
various school assignments. He recently learned that, although two different files
may look the same when not formatted, for example a .txt file and a .doc file, the
data actually differs. This means that he cannot just change the file type of one file
to another and expect the document to open.
Figure 3.16: Save As allows you to select the file type you want to use
WEB PAGES
A web page is a computer file that relates to websites and web
servers. Web pages include information, such as the colours of text,
backgrounds and images. It also includes links to images and other
types of multimedia.
PRESENTATION FILES
A presentation file stores information using slides that can be shown
consecutively. Presentation files are used by teachers, businesses and
learners where the speaker discusses the topic using the content of
the slides. Slides are short, they can contain pictures and animations,
and are generally attractive. The three main file extensions for
presentations are:
1. .ppt
2. .pptx
3. .odp
Figure 3.17: A slide in a presentation
SPREADSHEET FILES
A spreadsheet file is a file that stores information in a large table.
Companies use spreadsheets when they need to analyse large
amounts of data, or do calculations. It is also used to show data, such
as checklists and class lists. The three main file extensions for
spreadsheets are:
1. .xls
2. .xlsx
3. .ods
Something to know
The spreadsheet file gets its .xls (and .xlsx) extension from the most
popular spreadsheet software – i.e. Microsoft Excel. Figure 3.18 is an
example of someone’s academic schedule.
DATABASE FILES
Databases are similar to spreadsheets, except that the sheets, called
tables, are all connected to each other. For example, your school might
have a database for each grade with the full names of the learners,
names of their parents, their contact details, addresses and the
amount of school fees paid. Even though these items are listed in
different tables, they are still linked together. Because of this, at the end
of the month when the school needs to send out fee statements, the
database software can create a statement where your name and
surname, parents’ contact details and fees owed are all displayed on
the same page.
IMAGE FILES
There are five main formats used to store graphics:
1. .bmp (bitmap image)
2. .gif (Graphics Interchange Format)
3. .jpg or .jpeg (Joint Photographic Experts Group)
4. .png (portable network graphics)
5. .tiff (tagged image file format)
These image formats are used for cameras, scanning and printing.
Most of these file formats need not be compressed and are, therefore,
ideal for printing and web graphics. Photos taken by a camera, or
pictures created using software, for example, Microsoft Paint or Adobe
Photoshop, are often saved in one of these formats.
ANIMATION FILES
Animation files are files that interpret moving images. The two most
common animation file formats are:
1. .gif
2. .swf (Small Web Format Flash)
A container is a set of files that stores information about the digital file.
For example, a container in a video file would be a combination of both
audio and video in a single file so that the file can play both audio and
video at the same time. Some common types of containers would be
AVI, FLV, WMV and MP4.
SOUND FILES
Sound (audio) files are similar to video files, as they are compressed
before they are stored on a computer. They are used to store audio
files, such as music. Because of the popularity of using computers to
store music and videos, the .mpeg and .mp3 file types have become
very popular in recent years. Common audio file formats consist of the
following:
.aac (Advanced Audio Coding)
.flac (Free Lossless Audio Codec)
.mp3 (Moving Picture Experts Group Layer 3 audio)
.wma (Microsoft Windows Media Audio).
Activity 3.3
1. Complete this activity by following these steps:
a. Create a sub-folder in My Documents. Name the new sub-folder: CAT
Grade10.
b. Open the Word-processing application. Copy and paste any picture from the
computer into the document.
c. Save the file with the file name: Practice in My Documents.
d. Move the Practice.docx to the folder: CAT Grade10
e. Create a PDF of the Practice.docx file. Save the file in the same location.
f. Rename the PDF file to Practice_new.
g. Delete the file Practice.docx in the CAT Grade10 folder.
2. Answer the following questions about the diagram below.
REVISION ACTIVITY
1. Each time Sipho saves a file, he saves it to the desktop of the
computer. His desktop is very cluttered and he has trouble finding
the files that he needs. Advise Sipho on a more effective way to
organise his files. (4)
2. Which of the following is NOT a file extension used for graphics
files?
A. .bmp
B. .gif
C. .toff
D. .jpeg (1)
3. Fred has created a folder called “Grade 10 PAT” on a school
computer to save all his PAT files. He checks on the file properties
and finds that the location of the folder is c:\users\
fred\documents\Grade 10\Grade 10 PAT. Use the diagram to
answer the questions below:
a. Write down the folder names of folders A, B and C. (3)
b. How many users have folders on this computer? (1)
2. Match the file extension in Column A with the associated file type
in column B. Write down only the letter of the file type (Column B)
next to the number of the file extension (Column A), e.g. 1C.
(Note: It is possible that the application from Column B may be
used more than once.)
(4)
3. Which shortcut key can you use to carry out the following
actions?
a. Rename a file (1)
b. Copy a folder (1)
c. Paste a document onto the desktop (1)
TOTAL: [16]
AT THE END OF THE CHAPTER
Use the checklist to make sure that you worked through the following
and that you understand it.
CHAPTER OVERVIEW
Create shortcuts.
Use the Snipping Tool and Print Screen to take screenshots.
Compress and decompress files and folders.
Add new peripherals, such as a printer and mouse.
Change the default printer.
Explain what queue management is.
Print files.
INTRODUCTION
When you open an application using the menu system, it can
sometimes be time consuming. An easy way to save time is to create a
shortcut for an application or program that you use often. In this
section, you will learn how to create shortcuts, take screenshots, as
well as how to compress and decompress files.
UNIT
In this section, you will learn about basic computer management tasks
that you need to do when working on a computer.
CREATING SHORTCUTS
This section will look at how to create a shortcut on the desktop for
your favourite program, application, or website, for easy access. There
are different ways to create shortcuts and in this section, we will look at
some of these ways.
If you select Create Shortcut (indicated with the red rectangle), the
shortcut will be created in the same location. In this example, the
shortcut will be created in the Music folder.
Something to know
Something to know
TAKING SCREENSHOTS
A screenshot is an image of how the computer screen looks the
moment you capture the screen. For example, it is a snapshot of
whatever is displayed on the computer screen at that time.
Activity 4.1
1. Create a new folder on the computer. Name it Practice.
2. In the folder, create a shortcut to the following:
a. Favourite document in My Documents folder
b. Two of your favourite programs
3. Open the Practice folder. Take a screenshot with Print Screen
(PrtSc) of what is displayed on the screen.
4. Paste the screenshot in Paint.
5. Save the image as Practicescreen.jpeg.
6. Move this image to the Practice folder.
UNIT
Something to know
Something to know
https://www.youtube.com/watch?
v=nXAYWwiDvc8
Activity 4.2
1. When sending a file as an email attachment, the email program
cannot attach the file to the email. The following message is
shown, but you do not want to send it using Google Drive.
a. Briefly explain how you can use an email to send a file as an attachment,
even though it is such a large file.
b. What is the file extension of the answer in (a)?
c. After sending the file to the recipient, how does the recipient have access to
the file?
UNIT
BASIC PRINTING
If you need to print a document or image, you can do so in the
following way.
The computer will immediately send the pages to the printer, which
should start printing the pages automatically.
Something to know
Something to know
Activity 4.3
Mimi has her own business and wants to buy a new printer, which she needs to
connect to her desktop. She is going to use her printer to print quotations and invoices
for her clients. She also needs to connect the printer to the desktop in the office.
1. Should Mimi buy a laser or an ink tank printer? Motivate your answer. Consider
the cost of the printer, as well as the printing cost.
2. Mimi’s focus is on the quality of the print-outs rather than cost. Which printer
should she buy?
3. After she has bought her printer, briefly explain to Mimi how she should connect
this printer to the desktop.
4. Explain why nothing is printing after Mimi has connected the printer to the
desktop.
REVISION ACTIVITY
1. The following icon appears on the desktop of a computer:
Looking back to where computers started, you will realise that it was
not at all as complex or technologically advanced, such as the ones
we have today. In the early 1600s to 1800s, people started thinking of
building a device that could solve complex problems and calculations
easier and faster than what they could do manually. They wanted a
device that could add and subtract. As a result, the first digital
calculator that could add and subtract was built by the 18-year-old
Blaise Pascal in 1642.
As the years went by, newer and better calculators and computers
were built. One of the first complex machines that forms an important
part of the computer history, was the ENIAC, built for the US army
between 1943 and 1946. It was a very big computer that could do
thousands of calculations.
After that, computers started changing the world more and more as it
became smaller, faster and smarter.
UNIT
HARDWARE BASICS
https://www.youtube.com/watch?
v=vG_qmtdBPTU
There are many different kinds of hardware that can be installed inside,
or connected to the outside of a computer. To make it easier for you to
understand, we will divide it into the following categories:
Input devices
Output devices
Storage devices
The connector (plug) which is found at the end of a cable fits into a
specific port (socket) of the computer. These ports are usually found at
the back of the computer.
Figure 5.1: Port (1) and connector (2)
Activity 5.1
1. Define the concept hardware.
2. Match the port in Column A with the correct device in Column B.
Input devices are hardware devices that allow you to enter data into
the computer, or interact with the computer.
Remember, when entering data, you are actually giving the computer
an instruction to do something. In this section, you will learn about the
different types of commonly used input devices.
KEYBOARD
A keyboard is used for entering information into a computer, such as
letters, words, numbers and symbols. Pressing any key on the
keyboard is an input that the computer uses as data. There are
different types of keyboards, as shown in the table below.
Table 5.2: Different types of keyboards
Something to know
Something to know
POINTING DEVICES
Pointing devices are used to control the movement of the cursor on
the screen. The major pointing device is the mouse for the desktop
computer and the touchpad for the laptop.
MOUSE
The mouse is the second most important input device of a computer.
Using the mouse, you can move the mouse pointer or cursor on the
computer screen, allowing you to interact with the computer.
Douglas Engelbart invented the first computer mouse in 1963. The mouse had two
wheels positioned at a 90-degree angle to each other to keep track of the
movement. The ball mouse was only invented in 1972 and the optical mouse,
around 1980.
Figure 5.2: Engelbart’s mouse
Activity 5.2
1. Fill in the following crossword puzzle using the clues that are
provided.
Across
1. A type of wireless technology mice used
2. Physical component of a computer like a mouse
Down
1. Which type of keyboard is used to minimise muscle strain
2. Used to move the pointer on a screen
3. For entering information, such as letters, words, numbers and
symbols into the computer
4. Controls movement of the cursor
5. The standard keyboard
6. This allows computers to connect with different types of hardware,
such as a keyboard, mouse or monitor
UNIT
MONITORS
A monitor, also known as a visual display unit (VDU), is the main output
device of a computer, as it represents data in a visual form.
Something to know
PRINTERS
Printers allow a computer to convert electronic data (soft copy) into a
hard copy (i.e. printed out on a piece of paper). Printers are generally
used to print large amounts of text and documents, and can also be
used to print graphics, such as photos.
For the purpose of this book, we will only look at the following four
printers:
1. Inkjet printer: This is a very popular printer that can combine black,
white and colour printing, all at the same time. These printers
operate by using cartridges that contain the ink. When the print job
starts, the ink heats up and flows through a set of tiny holes. The
heating process results in a small droplet of ink forming, which is
then released as a single dot, forming a part of the image or text.
This happens continuously until the whole image or text has been
completed. This is why inkjet print-outs are sometimes still a bit
wet. This type of printer can be seen in Figure 5.4 and are
commonly used in homes.
2. Ink tank printer: An ink tank printer uses the same technology as
an inkjet printer to print documents. The difference is that an inkjet
printer’s ink cartridges are replaced with ink tanks, which hold a
much larger volume of ink (up to 70 ml). The ink tanks can be filled
by the user when they are empty. Each colour is stored in a
separate tank and only the colour that is used up, has to be refilled.
Ink tank printers can print 1 000 pages or more. Ink tank printers
are suitable for printing documents where a large number of copies
are required.
Figure 5.4: Inkjet printer
https://www.youtube.com/watch?
v=x4Igj5zkB9U
Print resolution is measured in dots per inch (DPI). This is similar to the
way pixels work on a computer. The printer settings can be adjusted to
increase or decrease the DPI. The higher the DPI, the more dots there
are, resulting in a high-quality print-out.
Activity 5.3
Lesedi’s dad got an inkjet printer for the house; however, it is not working and no
printing is taking place. It seems that there is no communication between the printer
and the computer.
Answer the following questions regarding the scenario:
1. Which connector do printers usually have?
2. Briefly explain why a printer is an output device.
3. List two advantages and two disadvantages of the printer that
Lesedi’s dad bought.
4. Explain one possible reason why the printer and computer are not
communicating.
UNIT
Something to know
Storage devices are used to store data. There are a variety of storage
devices with differences in storage capacity, speed, portability, as well
as functions. In this section, you will learn about the different types of
storage devices and how they are used – i.e. how much data needs to
be stored, how quickly the data needs to be transferred and how
portable the storage needs to be.
Something to know
CONNECTING PERIPHERALS
A peripheral is an external device that is connected to a computer. A
PC on its own cannot function efficiently. It needs peripherals, such as
a mouse or keyboard for the PC to operate properly.
Take note
Install any drivers if prompted.
WI-FI
To connect a new peripheral using Wi-Fi, you can do the following:
1. Click on Start > Devices and Printers > Add a printer.
2. The Add a printer window will open.
3. Choose the Add a network, wireless or Bluetooth printer and follow
the instructions.
Activity 5.4
1. What is the smallest unit of storage capacity?
2. Which one of the following options describes the type of devices
used to keep an electronic record of work done on a computer?
A. Input
B. Output
C. Processing
D. Storage
3. Fill in the missing word: There are 1 024 kilobytes in a __________.
4. Generally speaking, a hard drive has an average life span of three to
five years, depending on the brand, size and type of environment.
a. Do you agree with the statement? Motivate your answer.
b. List two ways that indicate a hard disk is starting to fail.
c. Briefly explain why an internal hard disk is more prone to damage compared
to a portable hard disk.
UNIT
Activity 5.5
1. Explain the aim of green computing.
2. Describe three ways in which green computing can be achieved.
Use ONLY examples related to hardware and software.
REVISION ACTIVITY
1. Match the ports in Column A to the connectors in Column B.
(4)
2. Write down the missing numbers:
a. 1 Mb = ______ Kb (1)
b. 1 Tb = ______ Mb (1)
3. In some laptops, internal hard disk drives are being replaced by
SSDs.
a. What do the letters SSD stand for? (1)
b. Mention one advantage of using an SSD. (1)
c. Mention one disadvantage of using an SSD. (1)
4. Mr Chotia has a small work-from-home business. He has a
computer that he uses to do basic accounting and keeps a record
of appointments with clients. He also needs to print out quotations
and receipts.
a. Mr Chotia has purchased a desktop computer. Other than a printer, list three
hardware devices that are essential for Mr Chotia to be able to use the
computer. (3)
b. Which of the devices mentioned in (a) above can be used as both an input
and as an output device? (1)
c. Mr Chotia has been advised to purchase a laser printer. Comment on this
advice. (2)
d. Mr Chotia loads a file with a customer receipt into a word processor. He then
prints out the receipt. Which of the above (file or print-out) would be referred
to as a hard copy? (1)
e. Mention two ways in which Mr Chotia could connect the printer to the
computer. Which method would you recommend? (4)
f. Mr Chotia is an environmentally aware member of the community. Mention two
ways in which he can save paper in his business. (2)
TOTAL: [22]
INTRODUCTION
Hardware devices can also come in the form of pointing devices,
scanning and reading devices, microphones and many more. In this
chapter, you will learn more about the different types of hardware
devices, their features and uses.
UNIT
POINTING DEVICES
Pointing devices are used to control the movement of the cursor on
the screen. Two examples of a pointing device are the mouse for the
desktop computer and the touch pad for the laptop.
Table 6.1: Different types of pointing devices
DIGITAL CAMERA
A digital camera is designed to capture and store images on a
memory card. Digital cameras are available in different price ranges
and require no film.
SCANNING DEVICES
Scanning devices are commonly used in offices, schools and even
homes to scan documents, such as photographs and pages of text,
and then convert it into a digital format. It reads typewritten, computer-
printed or handwritten characters from ordinary documents and
translates them into a form that the computer can understand.
Table 6.2: Types of integrated scanning devices
READING DEVICES
There are several fields where reading or scanning technology is
applied. In this section, we will explain these in some more detail.
Although this technology has been available for many years, mostly to
track cattle, it has become a common technology for tracking
consumer products worldwide. These tiny tags can be added to any
product and can be scanned by an RFID reader. For example,
manufacturers use these tags to help track the location of each
product they produce until each is sold.
RFID tags come in various shapes and sizes, and may be covered in a
variety of materials, such as:
Rice-sized tags inserted underneath the skin of animals to identify
them
Screw shaped tags to identify trees or wooden items
Credit-card shaped for use in access applications
Anti-theft hard plastic tags attached to merchandise in stores
Heavy-duty millimetre-rectangular transponders used to track
shipping containers, heavy machinery, trucks and railroad cars
https://www.youtube.com/watch?
time_continue=10&v=9SW1dnqctGA
Something to know
Example 6.1
Nowadays, you can use your phone to pay the bill, or even split the bill with a friend.
This is done by scanning the QR code on the bill with Zapper. First, you have to sign
up to the application and when the bill comes, use the application to pay the bill.
OPTICAL CHARACTER RECOGNITION (OCR) SCANNERS
OCR scanners, also called optical character readers, can recognise
almost any kind of typed, handwritten, or printed text inside images,
for example in scanned documents or photos, and convert it into
machine-readable text data.
VOICE RECOGNITION
Voice recognition, or speech recognition, is a type of computer
program that is able to interpret spoken instructions and respond to
them. In most cases, a microphone is necessary to be able to use the
software. This microphone can be a separate device (desktop
computer), or built-in (laptop and smartphone).
Something to know
AUDIO OUTPUT
Audio output devices convert data on a computer into sound. This
allows you to listen to music, chat to friends, or watch a movie or
episode of a series on a computer.
Something to know
MULTI-FUNCTIONAL DEVICES
Multi-functional devices are able to perform various functions of several
devices, but only takes the space of one, such as a four-in-one printer,
where you can print, copy, fax and scan using just the one hardware
device.
Activity 6.2
Match the terms in Column A with the descriptions in Column B.
UNIT
Something to know
UNIT
When a computer receives data from an input device, for example the
mouse or keyboard, the data must be processed before it can go to an
output device, such as the printer or monitor. A processing device is
responsible for converting that data into useful information.
MOTHERBOARD
The motherboard can be compared to the skeleton of the human
body; it connects all the parts of a computer together. You can also
think of it as a mother that holds all her children (pieces) together.
The motherboard is a large printed circuit board connecting all the
different components in a computer, such as the CPU and RAM.
Something to know
EXPLORING A MOTHERBOARD
https://www.youtube.com/watch?
v=Zjrayb7E9tI
Something to know
Many people call their computers the
CPU – this is incorrect as the CPU is
only a chip found inside a computer.
The CPU was first developed during the 1970s at Intel, with the first processor, the
4004 processor, released.
The type of processor determines the speed and its capabilities. In the past,
computer processors used numbers to identify and name the processor. For
example, the Intel 80486 (386) processor is faster than the 80386 (286)
processor. However, after the Intel Pentium processor was developed, processors
started getting names, such as Pentium, Celeron and Duron.
MEMORY
You learned about hard drives earlier on. Other than the hard drive,
there is the random access memory (RAM) and read-only memory
(ROM).
Table 6.9: RAM and ROM
Activity 6.4
This will be a group activity. The teacher will arrange you in groups. Each group will be
asked to research a specific processing device, such as:
Motherboard
CPU
RAM and ROM
Each group should give a description of the device. Their role (use) in a computer and
importance thereof. In order to do so, you need to do the following:
1. Each group must create a PowerPoint presentation with a maximum of eight slides
(containing a cover, content and reference slide) on research of the assigned
topic.
2. Each group will present the research done on the topic.
3. Your teacher will give you an assessment task to complete, based on the
information found by all the groups.
Something to know
UNIT
You must always take care of your PC system and storage devices, as
some of the components and the information loss can be quite costly.
To take care of your PC, keep food and drinks away from it and keep
back-ups on a storage device, such as an external hard drive. Also
install an antivirus program and keep your PC clean. These are just
some examples of taking care of your PC.
Something to know
For storage devices, examples would be that CDs and DVDs can get
scratched, making them unreadable. Flash disks are small and can
easily land on the floor. When stepped on, they can become damaged.
They can also be damaged by water and high temperatures, or other
environmental factors. Even normal wear can cause them to become
unusable.
REVISION ACTIVITY
For questions 1 and 2, write down the number of the question and the letter that
matches the correct answer, e.g. 9 C.
1. Which of the following devices is MOST likely to have a touch pad?
A. Desktop computer
B. Foldable keyboard
C. Laptop computer
D. Touch-screen monitor (1)
2. Which of the following is NOT a pointing device?
A. Trackball
B. Stylus
C. Digital camera
D. Joystick (1)
3. Petrus works in the office of a large company. One of his
responsibilities is to scan many documents and store them in
digital format on the company server. Some of the documents can
be up to 20 pages long. Should the company use a stand-alone
flatbed scanner, or a scanner included with a multi-functional
printer? Give a reason for your choice. (3)
4. Many people have a small RFID chip implanted in their pets. The
chip stores a unique identity number. If the pet goes astray and is
found by someone else, it can be taken to a veterinary practice
where the vet can use an RFID scanner to check who owns the
pet.
a. What do the letters RFID stand for? (1)
b. Mention one other use for RFID chips. (1)
5. Study the image below showing the components inside a desktop
computer’s tower.
a. What is the function of the motherboard? (2)
b. Without referring to the human brain, explain what the function of the CPU(2)
is.
c. Computers have two types of memory, RAM and ROM. Compare RAM with
ROM by listing two differences between them. Write your answer in a table
format. (5)
6. List two devices that use memory cards as additional storage. (2)
7. CDs, DVDs and Blu-Ray discs can all be used as storage media.
a. Which of these storage media has the lowest capacity? (1)
b. Which of these storage media would be most suitable to distribute a 3D
movie? (1)
8. In a number of places in this textbook, you will find images like the
one below that take you to a website or resource when scanned.
a. This image looks like a barcode in two dimensions. What is it called? (1)
b. What software do you need to scan the image? (1)
c. Use a smartphone to scan the image. Write down the URL of the website that
it opens. If you do not have a smartphone, ask a friend or your teacher to
help you. (1)
9. Chris Hani Secondary School has installed a fingerprint scanner.
Staff have to use the scanner when they arrive at school and again
when they leave. The scanner software is used to keeps records
on staff attendance.
a. The fingerprint scanner is a biometric input device. Explain briefly what is
meant by biometric input. (2)
b. Name one other type of biometric scanner. (1)
10. Faizal has bought a portable speaker from an online shopping site.
INTRODUCTION
In Chapter 1, you learned that software is a set of programs or
instructions that tells the computer and its hardware how to perform
specific tasks. Without software, most computers would be useless,
for example without Microsoft Word software it will be difficult to type
out assignments and use specialised fonts and WordArt.
WHAT IS SOFTWARE?
https://www.youtube.com/watch?
v=grrYbJqnSzY
APPLICATION SOFTWARE
Whether it is creating a report for work, typing out an assignment for
school, messaging a friend, or just trying to find out where you can buy
the latest PlayStation, there is probably an application (app) that can
help you find what you are looking for. Unfortunately, there is no
application that explains what it is, or what it does. So, in this section
we will look at this term and how it has developed – and you do not
even need an application to read it!
Something to know
ACCESSORIES
Microsoft Windows includes a few programs, such as the Calculator,
Paint and Snipping Tool. You can start any accessory from the Start
menu. An accessory is any device or program that is not necessarily
required, but it can be added to a computer to perform an additional
function.
Something to know
WINDOWS CALCULATOR
To use the Windows Calculator accessory you can do the following
activities:
Something to know
Did you know that you can change the
type of calculator from standard to
scientific, or to a programming
calculator by clicking on the icon
on the left-hand side of the calculator.
So, next time you have some
homework that requires a calculator,
maybe this program could be of some
use.
SNIPPING TOOL
This tool captures all, or part of the computer screen as an image. You
can save this image, attach it to an email, or even paste it into another
application, such as Microsoft Word or Microsoft Paint.
https://www.youtube.com/watch?
v=J6SO9zf_QL0
PAINT
Microsoft Paint is an accessory that provides virtual pens and brushes
to create art or even text.
SYSTEM SOFTWARE
System software is the specific type of software that manages the
computer. Much like a traffic officer at a busy intersection, the system
software manages the flow of data and information in the computer.
This is done in the following ways:
Translating the instructions from the software to a language that the hardware can
understand
Sending these instructions to the correct hardware
Receiving information from the hardware (such as, the button press on a keyboard)
and sending it to the software
Allowing different applications to speak to each other
Making sure all the hardware and software on the computer are in a good condition
The operating system (OS) is the most important type of system
software as it manages all the other programs in the computer.
Activity 7.1
1. What is a platform?
2. Match the following software in Column A with the correct example in Column B:
UNIT
Take note
Any device that has an operating system allows you to change how
the device works. This means that you can add a new security update,
a new application, or even install a new operating system (depending
on compatibility) whenever you want to. So, no need to throw your
computer away each time you need to add a new application or
update! As long as you understand how an operating system works,
you can change some of the ways in which it operates; the same
applies for your phone.
UNDERSTANDING THE
OPERATING SYSTEM
https://www.youtube.com/watch?
v=pTdSs8kQqSA&list=PL4316FC411
AD077AA&index=8&t=0s
Each operating system has a different look; so, if you decide to change
operating systems at some point, it might initially feel weird and
unfamiliar. However, modern operating systems are designed to be
easy to use and the basic operating principles are the same.
These operating system elements are grouped in tables and are briefly
discussed below.
Table 7.3: Input controls
Table 7.4: Navigational components
Table 7.5: Informational components
MICROSOFT WINDOWS
Microsoft Windows is one of the most popular operating system.
Microsoft is calling Windows 10 “the last version of Windows”. This is
not because it is killing off Windows, but because it decided to rather
keep improving and updating Windows 10.
Figure 7.7: Windows user interface
MAC OS X
This is a range of computer systems created by Apple. All Macintosh
computers, better known as Macs, come preloaded with this operating
system. All their recent versions are known as OS X with, the latest
version that was released in 2018, called Mojave.
Figure 7.8: Mac “El Capitan” user interface
Something to know
The iPhone and iPad both have the iOS 9 user interface.
LINUX
Linux is a group of open-source operating systems. This means that it
can be modified and distributed across the world by anyone. The
advantages of Linux are that it is free and there are many different
versions from which you can choose, for example, Linux Mint, Ubuntu,
CentOS 7, etc.
Something to know
Most mobile operating systems are tied to specific hardware, with little
flexibility. It also does not have as many features as the operating
systems of PCs and laptops, and the different devices cannot all run
on the same software.
Activity 7.2
Are the following three statements true or false? If false, provide the correct answer.
1. The operating system is a type of hardware.
2. Modern operating systems use a graphical user interface (GUI).
3. A menu bar gives you quick access to frequently used commands.
4. Which one of the following systems is an open-source operating system?
a. Linux
b. Windows
c. Mac OS
5. Look at the diagram below and answer the questions that follow.
UNIT
CREATE A PASSWORD
Computer passwords are used to help identify the correct user and
also prevent unauthorised use. A password consists of a string of
secret characters, numbers, or words that are used to verify the
identity of a user during the authentication process. It is used
together with a username, and is designed to be known only to the
user and allow that user to gain access to a device, application or
website.
To access your computer, you need to key in the correct login name
and password. You must ensure to log off when you are done with
your computer so that no one else has access to your information.
CAN’T REMEMBER MY
PASSWORD
https://www.techrepublic.com/article/h
ow-to-reset-your-windows-10-
password-when-you-forget-it/
Activity 7.3
Read the following scenario and answer the questions that follow:
The Mo-ho family used a desktop computer connected to a printer, keyboard and
wireless mouse at home for some time. Mrs Mo-ho has now started her own
catering business, which she runs from home and requires that she interact with
foreign clients.
1. List one essential output device, other than a printer, that she will
need to perform her duties.
2. List one essential input device, other than a keyboard and mouse,
that she will need to perform her duties.
3. Mrs Mo-ho stores sensitive sales information on her computer. She
uses a login ID, with her numeric birth date (2907) as the password
to access her computer. However, she is scared that someone
might crack her password and gain access to her computer.
a. State two ways in which she could strengthen her password.
b. List one example of an authentication device, which could be used as part of
her computer system to gain access to her computer, as well as give her an
extra layer of security.
REVISION ACTIVITY
1. Explain briefly what is meant by the term “software”. (2)
2. The image below shows a box that you will often use when
formatting paragraphs in the Microsoft Word processor.
Write down the letter of the label that matches each of the following components:
a. Dialogue box
b. Close button
c. Option button
d. Check box
e. Combo box (5)
3. What do the letters GUI stand for? (1)
4. What is the function of a GUI? (2)
5. Johan often uses Microsoft Paint, the Calculator application and the
Snipping Tool to assist him with homework tasks. Which of the
applications would he most likely use to do the following:
a. Resize a photograph taken with his smartphone camera
b. Take a screen capture of an image found on a website for a project
c. Convert a temperature in degrees Farenheit to degrees Celcius. (3)
6. Explain the difference between application software and system
software. (4)
7. Match the number of the application software type in Column A
with the letter of the example in Column B.
(4)
8. Mention two functions of an operating system. (2)
9. Give the name of an operating system that is used for smartphones.
(1)
10. Rate each of the following passwords as “weak”, “strong” or “very
strong”:
a. N@t1onal2o19
b. Long2Montagu#Electric)Lego
c. SamHolly (your dogs’ names) (3)
11. Mention two types of access control systems that are found on
smartphones other than a password or pin. (2)
TOTAL: [29]
INTRODUCTION
We have already looked at the basics of software and the different
types of software you can get. Remember, without the correct system
software, the application software and programs will not function
correctly on your computer.
OPEN-SOURCE SOFTWARE
OPEN-SOURCE OR
PROPRIETARY SOFTWARE
https://www.youtube.com/watch?
time_continue=5&v=2q91vTvc7YE
UNIT
You can update the Windows system with the latest software. Other
than a few drivers and Microsoft built-in programs, there is not much to
a Windows update, and this is where driver and software update tools
come into play. These utilities keep the Windows, PC, laptop or tablet
up to date on a regular basis.
We will now learn a bit more about drivers and utility programs.
Something to know
AUTOCONFIGURATION OF DEVICES
Autoconfiguration means to add devices to a computing device,
without the need of user-intervention or software-configuration
programs. In other words, you can connect the device to the
computer, and the device will automatically install the drivers and then
configure it in the system. The two types of autoconfiguration have
been explained below.
PLUG AND PLAY
Plug and play, also known as PnP, is a term used when an operating
system recognises a device and it installs the device driver
automatically. These devices allow the user to use the device
immediately after it has been connected to the computer. Hardware
examples would include keyboards, mice, monitors, etc.
HOT SWAPPABLE
This is the ability to plug a device into a computer while it is switched
on. It also allows you to use the device without having to switch off the
computer. An example of this type of device would be a mouse. A
mouse is a type of plug-and-play device, after plugging it in. It will
work immediately.
CLOUD STORAGE
https://computer.howstuffworks.com/cl
oud-computing/cloud-storage.htm
UTILITY PROGRAMS
Utility programs or utilities allow you to perform computer management
and maintenance tasks. These programs are much smaller in size
compared to other software programs and can come packaged with
the operating system, or installed at a later stage. Examples of utility
programs are back-up software, disk clean-up, compression programs
and so on.
Compression programs
Compression programs are used to compress or decompress files. In
Windows operating systems, examples of programs that decompress
and compress files would be 7Zip, WinZip and WinRAR.
Using Disk Clean-up at least once a month can help improve the
performance of your computer!
UNIT
SOFTWARE PIRACY
Piracy is the illegal copying, distribution or use of software. Illegal
copies are sold at a cheap price. When illegal copies are made and
distributed in the form of CDs or DVDs or another storage medium, it is
called software piracy. There are different types of software piracy:
Softlifting: When a software program with a legal licence is installed or copied with
the main purpose of providing it to multiple users, rather than to sell copies for
profit.
Client-server overuse: When more users, as stipulated in the licensing
agreement, are using a central copy of a program at the same time.
Hard-disk loading: This happens when illegal copies of software are loaded onto
the hard disks of new computers to make the purchase more attractive.
Counterfeiting: The illegal duplication, distribution and/or sale of copyright
material with the intent of imitating the copyright product.
Online piracy: When proprietary software is downloaded from the internet.
Something to know
Activity 8.1
1. Define the following types of software:
a. Freeware
b. Shareware
c. Open source
d. Proprietary software
2. Describe how one would go about using proprietary software,
without having to spend much money. Motivate your answer.
One of Mr Itek’s children knows his
friend has software for Microsoft
Word. He wants to copy the software,
then install it on their home computer.
REVISION ACTIVITY
1. The table below is comparing freeware, shareware and proprietary
software. Make a copy of the table in your workbook and fill in the
headings, as well as the missing information. (12)
INTRODUCTION
A computer network consists of two or more computers and other
hardware devices that are linked together through communication
channels to share electronic communications and resources, such as
printers with various users.
Something to know
In this chapter, you will learn about networks, the different concepts
used in networks, and the advantages and disadvantages of networks.
You will also learn how to use networks in an ethical and correct way.
UNIT
Routers: Routers do most of the hard work in a network as they make the
decisions about all the messages that pass through the network. This means that
they analyse each piece of data and protect information from security threats
through a firewall. Routers also choose the route for the data to travel and decide
which computer gets priority.
Wireless access points: These points allow devices to connect to a wireless
network without cables. It can also give useful data about the devices on the
network.
Activity 9.1
1. Write the correct answer to the questions below in your book:
a. In computer networks, computing devices are called__________?
A. Computers
B. Nodes
C. Modems
D. Switches
b. A PAN is a__________.
A. Network that operates in a large area, such as across a country
B. Network built for a single person connecting all the devices
C. Very small network that usually covers a single home
D. Network that operates in a small area, such as a house, school or office
c. A switch is a device that_______.
A. Shares information between specific computers without involving the
other computers in the network
B. Makes the decisions about all the messages that pass through the
network
C. Connects a computer or network to the internet
D. Allows computing devices to connect to a wireless network without
cables
d. Ethernet___________.
A. Is a set of rules that define the way in which two networking nodes can
communicate
B. Is a type of data link protocol that defines the types of cables and
connections used to wire computers, switches and routers together
C. Connects a computer or network to the internet
D. Can remove computers from the network and restrict access to users
e. The people who can modify and change the network settings are called
the___________.
A. Network technicians
B. Computer nerds
C. Network administrators
D. Gamers
UNIT
SHARING
One of the primary objectives of a network is to share information.
Although networks are designed to share information, they do much
more than that; they also share the resources linked to the computers
on the networks. This includes access to the internet, files, hardware,
people and money.
Something to know
According to the United Nations (UN)
agency that oversees international
communications, more than three
billion people all over the world are
using the internet. This number
increased from 738 million in 2000, to
3.2 billion in 2015. This is fantastic,
right? So now, people from South
Africa can send a file, text or image
from their computers to someone
anywhere in the world with just the
click of a button.
NETWORKING TO SUCCESS!
https://www.youtube.com/watch?
time_continue=30&v=gu4FYSFeWqg
ORGANISING INFORMATION
Computer networks not only provide access to information; they also
help people to organise information. This could be something small,
such as a Google Calendar event where people work together to
organise a single event. It can be something complex, such as Google
Maps that gives people driving directions in more than 240 countries
and covers over 64 million kilometres of road (that is about 83 trips to
the moon and back).
CONNECTING PEOPLE
Another important use of networks or telecommunication networks is
to connect people. This can be through emails, video calls on your
computer, social networks such as WhatsApp or other instant
messaging services (IMSs). Using computer networks makes this
possible and allows people from anywhere in the world to
communicate with one another.
Everything has its advantages and disadvantages; it is just the way life
goes. However, the table on the previous page is just a list of potential
advantages and disadvantages; the way in which you use the network
is the only way you get affected, positively and negatively. For example,
if you want to learn how to bake, speak a new language or even build
your own treehouse, there are always free resources to teach you a
new skill. But at the same time, the downside is that the internet also
has a dark side. So, what you get from a network depends on what
you are looking for and your ability to use it.
THE INTERNET: THE NETWORK
OF NETWORKS
https://www.youtube.com/watch?
time_continue=17&v=jKA5hz3dV-g
UNIT
There are legal, ethical and security aspects you should take note of
with regards to networks. These include viruses, licensing contracts,
adhering to the user policies and ownership of electronic material. In
this section, we will look at each of these aspects in some more detail.
VIRUSES
This is anyone’s worst nightmare. Without a proper antivirus program
installed, you will be prone to getting a virus. Viruses can be transferred
through flash disks, or through other computers in a network. Antivirus
programs help to protect your software, data and PC from possible
threats.
Read through the following case study and discuss the questions in
small groups.
USER POLICIES
Organisations, such as schools and businesses, normally have an
acceptable computer usage policy in place. This policy stipulates how
computer equipment should be used and prevents anyone from
accessing restricted information or data on the network. If a person
breaks the rules, it is regarded as a serious offence and the person
could get into a lot of trouble.
Something to know
Activity 9.2
Miss Furry wants to network the computers and other hardware devices in her office.
She shares a printer with three other people. She was told she would need a switch,
router and a modem.
1. Define a computer network.
2. Answer the following questions with reference to the scenario above:
a. Give two advantages of creating a network for Miss Furry.
b. List one type of hardware device that she can connect to the network.
c. Is this hardware (your answer for question b above) an input or output device?
Motivate your answer.
d. Briefly explain how Miss Furry can use the network to communicate to
others.
3. Explain what the internet is.
4. An organisation cannot just share software over a network.
a. Provided that this statement is true. What can an organisation do to share
software?
b. Briefly give a description of a network licence.
c. Explain what a site licence is.
REVISION ACTIVITY
1. What is a computer network? (4)
2. Your school is planning to network its 25 stand-alone computers.
a. List two advantages to the school of installing a network. (2)
b. List two disadvantages to the school of installing a network. (2)
c. Apart from a network server and cabling, what other hardware would the
school need when installing the network? (2)
3. The diagram below shows a simple network. Use the diagram to
answer the following questions:
a. What are A and B? (2)
b. What is device C? There are two possible answers. List both of them. (2)
c. Which device is receiving information? (1)
4. “The internet is an example of a computer network.” It this statement true or
false? (1)
5. Reinet is doing research for her PAT. She finds an interesting website on the
internet. When she prepares her final presentation, she copies large sections of
text from the website and pastes them into her presentation.
a. Is Reinet allowed to copy sections of text into her presentation and pretend
that she wrote it herself? Give a reason for your answer. (2)
b. Give one word for what Reinet has done. (1)
TOTAL: [19]
INTRODUCTION
In the previous chapter, you learned about the different concepts used
in networks. In this chapter, we will look at PANs and HANs, and how
they are created, their advantages and disadvantages, as well as the
different network devices required to create a network.
UNIT
10.1 PAN/HAN
There are different types of networks. For ease of reference, we have
arranged them in the following list, according to their size – i.e. from
the smallest to the largest network.
1. Personal area network (PAN) and home area network (HAN) as the
names state, are both used in small areas, such as home or small
office environments.
2. Local area network (LAN) or wireless local area network
(WLAN) are used in bigger offices and in schools.
3. Wide area network (WAN) connects more than one LAN in
different places, for example, cities or buildings, into one big
network.
Something to know
Figure 10.2: Comparison between a wired network (left) and wireless network
(right)
HAN
As the name suggests, a HAN is a very small network that usually
covers a single home. Any device that is connected to this network will
be able to share resources, for example the internet, smart appliances,
printers, smart meters and even some security systems.
Figure 10.3: Example of a home network, where a computer, Smart TV, and a
phone are all connected to one small network
PAN
A PAN is like a HAN, but even smaller! It refers to a network built for a
single person and contains all the devices connected to this network.
This can include all devices connected on most networks, for example
a computer, smartphone and printer. It can also include personal
devices, such as Bluetooth keyboards, Bluetooth earphones and
smartwatches. Unlike LANs and HANs, all devices on a PAN do not
have to be connected using an IP address. Some devices can be
connected over a Wi-Fi network, while others might connect using
Bluetooth, or even USB.
UNIT
In the past, home networks were not so popular. Most families did not
need, or could not afford more than one computer. Today, this is not
the case; people use their computers for school work, shopping,
downloading videos and music, watching movies, instant messaging
and so on.
INTERNET INFRASTRUCTURE
Any computer that is connected to the internet is part of a network.
This can be from the 100 computers connected in an office, to just the
one in your home. For example, at home you can connect to the
internet using a modem. The modem dials a local number that
connects to an internet service provider (ISP). The ISP is the term
used for a company that provides you with access to the internet; this
could be from your computer or even your smartphone.
The ISP makes the internet a reality. Suppose you have a brand-new
computer with a builtin modem and a router to connect to the network.
However, without an ISP subscription, you will not be able to connect
to the internet.
To create a PAN, you need a minimum of two computing devices, for example a PC
and a smartphone. You will also need a communication channel, which can be
wired or wireless to transfer information between the different devices. FireWire
and USB are examples of a wired PAN; while WPANs generally use Bluetooth, or
even infrared technology.
PANs can only transfer information between devices that are close to each other
instead of sending it over the internet (WAN). These networks can be used to
transfer files, such as music, photos, videos and calendar appointments.
The easiest way is to transfer the data through a PAN. You can use a USB cable to
connect the phone to the laptop. Then follow the prompts shown on the laptop,
access the files from the phone’s storage and copy them onto the laptop. The user
can now easily access information.
You can also use another way to transfer data. You can sync both the laptop and
phone using Bluetooth, and then sending data to the laptop, or vice versa.
NETWORK DEVICES
In most cases, a wired or wireless home network requires only the
computing devices, modem and router. Obviously, this depends on
your requirements; the more complex you want the network to be, the
more money you will be spending on the equipment required. In this
section, we will discuss the different network equipment required to
create a home network.
There are three important types of networking equipment that can look
very similar from the outside – i.e. the modem, router and switch.
These devices can have ports for different types of cables, such as
ethernet cables or digital subscriber line (DSL) cables. However, each
has their own different function, as shown in the following table:
Today, home routers cost roughly the same as home switches and
modems. Therefore, for most setups, it is easier to simply purchase a
router that can serve more than one function. However, for larger
businesses, specialised equipment, such as dedicated modems and
switches, may be better suited to the job.
CONNECTING TO THE INTERNET
To connect to the internet, there are software and hardware
requirements that must first be fulfilled. This section will look at those
requirements and soon you will be able to create your very own home
network with internet!
SOFTWARE REQUIREMENTS
The software you need to connect to the internet is an operating
system, a web browser. A web browser, such as Firefox or Google
Chrome, is used to display pages that you visit on the internet. Web
browsers often come with their own operating systems.
HARDWARE REQUIREMENTS
Connecting to the internet is quite simple. You will need the following
hardware equipment to connect to the internet:
A computing device, such as a computer or a smartphone
A communication channel, such as a telephone line and ethernet cable
A modem or router to connect to the internet
1. Insert the SIM card into the SIM slot of the Wi-Fi router.
2. Connect the router to the power supply. With some routers you might have to
screw the two external antennae to the router.
3. Take note of the information that is on the label at the back of the router.
4. Plug the LAN cable into a port of the router and the other end of the cable into the
LAN port of your computer.
5. Switch on the router by pressing the Power button.
6. Switch on your computer.
7. The power light will be on and will turn a specific colour. This means you are
ready to install the software.
8. Follow the prompts on your computer.
9. The Wi-Fi light will be a specific colour to show that the Wi-Fi is enabled.
10. The strength bar on the router will show how strong the signal is.
After you have set up your Wi-Fi network and configured your router, you are ready to
connect to the Wi-Fi. This procedure may differ, depending on the router and
computing device.
To connect to the Wi-Fi network, you can do the following:
1. Click on your computer’s network settings and search for nearby Wi-Fi networks.
2. Choose your network and enter the password you just created.
3. If the connection is successful, open your web browser and type in
www.google.com. If the page loads, your Wi-Fi connection is working properly.
Something to know
Creating a WAN
Activity 10.1
The Jackson family is made up of four people. The two children, Tristan and Jess,
stay upstairs, and the parents have a small work-from-home office. The children
always have to go downstairs to print documents, or even just use the internet. A
friend recommended they set up a network.
REVISION ACTIVITY
1. Explain the difference between a HAN and a PAN. (4)
2. List one advantage and one disadvantage of a HAN. (2)
3. List one advantage and one disadvantage of a PAN. (2)
4. Three common network devices are modems, switches and routers. Match the
description of the device to its name. Write down only the name of the device:
a. Used to connect computers or networks to the internet (1)
b. Use to organise and route data on and between networks (1)
c. Used to connect many computers on the same network (1)
5. Write down the letter that matches the correct or best answer. Which of the
following devices is most likely to have a built-in network adaptor?
A. Microwave
B. Refrigerator
C. Telephone
D. Sewing machine (1)
6. What communication medium is most likely to be used in a PAN? (1)
7. Sifiso has a desktop computer with the Windows 10 operating system installed on
it. He has installed on it the Google Chrome browser on his computer. He wishes
to connect his computer to the internet. He already has a 24-month contract with
Telkom.
a. Does Sifiso have the correct software to connect to the internet? (1)
b. What additional hardware device, other than his computer, will Sifiso need to
connect to the internet? (1)
TOTAL: [15]
Explain what the internet and world wide web (WWW) are.
Understand the concepts used in the Web.
Differentiate between a website and web page.
Understand what a web address is and the different elements that it consists of.
Identify the different types of websites.
Use the web browser.
Open, close and switch between tabs.
Use a search engine to browse the internet.
Understand what uploading and downloading are.
INTRODUCTION
The internet has become increasingly important in everyday life for people all
over the world. It is the biggest network made up of billions of computers
and other computing devices, such as smartphones, tablets, laptops, etc.
The internet allows us to communicate with anyone across the world and
access almost any type of information we need.
The biggest trend now, thanks to the internet, is social media. So, before
you post anything new on Instagram, let’s learn more about the internet and
social media.
In this chapter, we will look at what the internet and world wide web (WWW)
are, the different types of websites, as well as browsers and how to do some
basic browsing.
UNIT
INTERNET ADDRESS
Have you ever wondered about the fact that if there are 250 billion emails
sent every day from our smartphones, PCs or laptops, how exactly do they
go to the correct place? The answer is that every device connected to the
internet receives a unique IP address. Whenever a message is sent over the
internet, it is sent to a device’s IP address. An IP address consists of four
sets of numbers, which are separated by dots, as shown below:
Figure 11.1: An example of a South African IP address
UNIT
The world wide web (WWW) is a part of the internet where documents and
other resources can be accessed. The WWW is often called “The Web”.
The internet and the WWW are often confused. The internet is, in fact, the
biggest network in the world; while the WWW is a collection of documents
and other resources that you can browse, or access, through the internet.
Most resources are websites that can consist of text, pictures, audio clips,
video clips, animations, etc. After connecting to the internet, you can browse
websites using a type of application called a web browser.
You will learn how to browse the internet, as well as how to navigate to the
different websites using uniform resource locators (URLs) and tabbed
browsing.
Something to know
HTML BASICS
Just to pique your interest, you can read a bit
more about HTML basics by clicking on this
QR code:
https://developer.mozilla.org/en-
US/docs/Learn/Getting_started_with_the_we
b/HTML_basics
BROWSER BASICS
For the purpose of this book, we will use the Google Chrome browser.
However, you can use whichever browser you want to. Browsers may have
a different look or feel, but they all work pretty much in the same way.
To open a web browser, click on the Start menu and enter the name of one
of the web browsers. You can then click on the icon to open the browser.
You will learn more about how to use the browser later in this chapter.
To browse to a website, you must know its unique web address, such as
www.instagram.com for the Instagram website. Once you know the
address, you can enter it into the address bar at the top of the browser.
Do the following activity in the class under the guidance of your teacher.
As soon as you press Enter, the web page should begin to load.
To help you understand the difference between web pages and websites
better, look at the example on the following page.
Figure 11.5: Wikipedia is an example of a website that has millions of web pages
Something to know
There are many websites on the WWW; from how to remove a carpet stain,
to the latest news on what is happening in the world. However, for the
purpose of this book, we will focus on the following types of websites and
their purpose.
Table 11.1: Types of websites
When you type a URL into the address bar of the web browser and press
Enter, the browser will take you to that specific page. For example, in the
figure below, we typed www.bbc.com in the address bar (highlighted in
green), which will then load the BBC web page.
In the following example, you will learn more about URLs. Each segment in a
URL is a part that makes up the web address.
The domain name is the most important part of an internet address. This
could be a word or a phrase that an internet site has identified as the name
of the website. People use it to find information on the internet, for example
businesses use it to get people to visit their websites.
Figure 11.7: The different parts of a URL
UNDERSTANDING URLS
https://www.youtube.com/watch?
time_continue=14&v=5Jr-_Za5yQM
The tables on the following page show the different codes you could come
across indicating an organisation type and the country of origin.
URL SHORTENERS
A URL shortener is an online application that converts a normal URL into a
much shorter format. The user has to copy the website address into the
URL shortener application and the tool will convert the address to a much
shorter one.
LINKS
When you see a word or phrase on a web page that is blue or underlined in
blue, it is usually a hyperlink or link in short. Links are used to navigate the
Web. When you click on a link, it will take you to a different web page. Also,
sometimes when clicking on a link, the mouse cursor will change to a hand
icon before you open the link.
Links play a very important role when using the Web. It allows you to access
different web pages, navigate between these pages and download files.
NAVIGATION BUTTONS
Navigation buttons are found on the web browser and allow you to do
many things. The arrow buttons, which are called the back and forward
buttons, let you go to the websites that you have recently visited. If you click
and hold on one of the buttons, you can view the recent browsing history.
The Refresh button will reload the current web page that you are on. If a
website stops working, you can just click on the Refresh button.
Take note
Activity 11.1
1. Briefly explain the difference between a website and a web page.
2. Complete the crossword puzzle below by answering the questions that
follow:
Down: Across:
1. A social network website 3. When you open a link, it open
2. A page made up of text, pictures, a new
audio clips, video clips and _____
animations 6. A website you can check loa
shedding schedules
Down: Across:
4. A website about a single person 7. A website that posts short an
5. An example of a news website informal stories
10. Brings several types of websites 8. A website that collaborators
together edit and modify
9. An example of an educationa
website
UNIT
In the world we live in today, more and more things are being done online.
You need basic computer skills to do research, be social and do many other
things on the internet. The ability to search for information on the internet is
an important skill to have and by improving this skill, you can find what you
are searching for without going through many irrelevant websites.
Since there are billions of websites on the Web, there is a lot of information
available. Search engines make access to this information much easier. We
will look at the basics of using a search engine and some basic techniques
on how to get more useful search results.
Of the three search engines, Google is the most powerful and easy-to-use
search engine.
6. If it is not exactly what you are looking for, return to the results and look
at other websites.
https://www.youtube.com/watch?
v=7RlB1CJovTs
The best results are usually shown on the top page, with the least popular or
visited results appearing on the second and third search pages. Since the
first search results are usually the best, if you do not find what you are
looking for on the first page or two of the results, you should try a different
search phrase, or try to use an advanced search technique.
SEARCH TECHNIQUES
The following table highlights a few of the most useful search techniques.
Table 11.4: Search techniques
UNIT
By now, you might have come across the terms downloading and
uploading. Downloading is when the computer or smart device receives a
file or data from the internet. Uploading, on the other hand, is when the
computer or smart device sends a file or data to somewhere on the internet.
Figure 11.15: Uploading and downloading with a PC
DOWNLOADING
To be able to download something from the internet, it is an important skill to
learn as you will use it throughout your lifetime to download software
programs, music, photos, documents, videos, etc.
To take you through a download process, you can look at the following
example of downloading a video-player software program.
3. When the download has completed, the file will be saved on the
computer, or it will open with the program that you selected.
4. If you have a problem finding the download, you can always do the
following: Click on the three vertical dots found on the top right-hand
side of the screen and choose Downloads from the drop-down menu.
You will be able to see all the files that you downloaded and from that,
you can choose the file you need.
Something to know
UPLOADING
You can use the upload function to send emails, post photos on a social
media site, upload files to Google Drive, etc.
If a site enables uploads, it will have an upload option to help perform the
upload or file transfer. Every site has a different uploading process. A
dialogue box opens after you click on the Upload button. For example,
Facebook has an icon that is an image. This is Facebook’s Upload button for
an image, starting the upload process. You can upload an image or file to a
website that allows it.
Figure 11.16: Upload button on Facebook
After clicking on this button, the dialogue box will appear, prompting you to
select a file. Navigate to the location to where the file is stored and click on
the Open button. A progress bar will track the upload process.
Let’s look at the following example of Ted Talks, an organisation that uploads
videos from expert speakers about a variety of topics, such as education
and business.
Activity 11.2
1. Which one of the following is NOT a good technique used to refine an Internet/web
search?
A. Using one word only
B. Specifying the domain
C. Using quotation marks
D. Using operators such as “and” and “not”
2. Define the following terms:
a. Search engine
b. Web application
3. Complete the table below by indicating in Column B whether the action in Column A is
downloading or uploading. Only write the number and the answer down.
REVISION ACTIVITY
1. Write down the letter that matches the correct answer: The letters “http” stand for:
A. Hypertype transport protocol
B. Hypertext transfer protocol
C. Hypertext transfer process
D. Hypertype transfer protocol (1)
2. Which of the following web browsers is installed with Windows 10?
A. Google Chrome
B. Mozilla Firefox
C. Edge
D. Safari (1)
3. Your friend thinks that the internet and the WWW are the same thing. Explain to her what
the difference is between them. (4)
4. Study the screenshot below that shows the home page of a website and use it to answer
the questions that follow:
a. The Google Chrome browser uses tabbed browsing. Mention two advantages of
using tabbed browsing. (2)
b. Which tab is currently active? Explain how you arrived at your answer. (2)
c. What is the function of the + button after the second tab? (1)
d. What is the meaning of the closed padlock in front of the URL in the address bar?(1)
e. Give the name of another browser other than Google Chrome. (1)
7. Francois wants to take some friends that are visiting from Europe to the top of Table
Mountain in Cape Town. He plans to use the cableway to travel to the top of the
mountain. Francois uses the Google search engine and types in “Cape Town” in the
search box. He gets about 650 000 000 results.
a. How could Francois change his search phrase to only get results for the Table
Mountain cableway? (2)
b. Name another search engine that Francois could use, other than Google. (1)
8. Explain the difference between downloading and uploading when using the internet. Give
an example of each. (4)
TOTAL: [30]
AT THE END OF THE CHAPTER
Use the checklist to make sure that you worked through the following and
that you understand it.
CHAPTER OVERVIEW
INTRODUCTION
In the past, communication between people was done either face to
face, using the telephone, or by writing letters. Now, we live in a world
where electronic communication or better known as e-communication
has taken over. Think about it, when last did you go to a family or
friend gathering and no one took their phones out to message a
person? This is how much electronic communication has taken over.
UNIT
When people are not communicating online, they make use of phone
calls, face-to-face conversations and written letters, depending on
each situation. The same applies to online communication; people
make use of instant messaging, social networking or email, depending
on the situation. You can choose the mode of communication that best
suits you.
Something to know
Something to know
MAILING LISTS
Jenny receives an email from Takealot.com every day before 05:00
with their latest sale items and items that they have on promotion. Do
you think that someone is sitting in front of a computer sending emails
at 03:00 to everyone that subscribed to this website? That is definitely
not the case; they use a mailing list.
INSTANT MESSAGING
The internet has changed the way in which we communicate, with
email being the most popular form of electronic communication.
However, sometimes even email is just not fast enough. Let’s look at
the following example to understand this better.
https://www.dw.com/en/the-worlds-
most-popular-instant-messaging-
apps/av-40684764
INSTANT MESSAGES
These applications are short messages that are sent and read in real time, allowing
you to communicate much quicker than normal emails.
There are also browser-based type instant messaging applications that do not
require downloading, for example Facebook and Gmail. These applications allow
you to chat to your contacts whenever you are logged in.
Chat and instant messaging are mainly used when both, or all of the
people are online so that everyone can read your message instantly,
hence instant messaging! An email, on the other hand, will not be seen
until the recipient actually checks the email, making instant messaging
much more efficient for quick messaging.
WEB BROWSERS
There are different types of web browsers available, such as Google
Chrome, Mozilla Firefox and Internet Explorer. Without these web
browsers, it will be impossible to view web pages and websites! In the
past, users had to download the software application to their PC so
that they can chat, listen to music and watch videos. Nowadays, all
these things can be done by just opening the web browser. All you
need to do is open a web browser to access a website so that you can
communicate via social networks, forums, emails and popular instant
messaging services.
https://www.netlingo.com/top50/popul
ar-text-terms.php
VIDEO MESSAGING
Video messaging is an easy way to make inexpensive phone calls
anywhere in the world and from your computer. It does not even
require a very fast internet connection. Many instant messaging and
chat services have voice chat and allow you to talk to friends who are
online. Video chat lets you see and hear friends, family or clients in real
time. Whether you are talking to a friend or someone at work, video
chat can add a personal touch to your chats!
Something to know
WEBLOG
Have you ever wanted to create your own website, but never figured
out how to? Well you can and best of all it is free and quite easy.
Today, it is possible to create a website by creating a blog (short for
weblog). So, what is a blog?
FAX TO EMAIL
A fax (short for facsimile) is an exact copy of a document (text or
images) that was scanned and transmitted as data by a
telecommunication link. This usually goes to a telephone number that
is associated with a printer, or other output device.
Activity 12.1
1. Explain the term “e-communication”.
2. Describe an e-communication device and list three examples.
3. What do you understand by the term “mailing list”?
4. What application do you use the most to text and send pictures? How do you use
text messaging?
5. Who normally uses blogs?
6. Vusi has no fax machine. However, his friend from Brazil must fax him a
document that he urgently needs. His friend only has access to a fax machine.
a. What can Vusi do to make sure that he gets the document?
b. How do you think Vusi should go about doing it?
UNIT
You also need software in the form of an email application that allows
you to send, receive, forward and reply to email messages. With
emails, you can also attach files, such as documents, photographs
and even videos (restricted to a certain data cap).
In this section, you will learn more about email, how email addresses
are written, and the features and tools that are included in having an
email account.
Something to know
In this section, we will look at the email interface, the terms and actions
used in email, as well as features commonly used with email.
EMAIL INTERFACE
Whichever email service provider you choose, you will still need to get
to know the email interface. This includes the Inbox, Message pane
and Compose pane. Although the interfaces will look different
depending on the email provider, in the end, they all function in the
same way.
INBOX
The Inbox is where you will see and manage any emails that you
receive. Emails are listed according to the date or time received, the
name of the sender and the subject of the email message.
MESSAGE PANE
After you select an email in the Inbox, it will open the Message pane
where you can read it and then choose how to respond, using a variety
of commands.
Figure 12.6: The Message pane
COMPOSE PANE
When you click on the Compose button from the Inbox, it will let you
create your own email message. From here, you will have to enter the
recipient’s email address and a subject. If you need to upload files,
such as photos or documents, you can do that by adding an
attachment.
A: Recipients are the people to whom you are sending the email. For
each recipient, you will have to type in the email address. In most
cases, you will add recipients to the “To: Field”, but you can also
add recipients to the “Cc”: or “Bcc”: fields.
B: Cc stands for carbon copy and is used when you need to send an
email to a person who is not the main recipient. It helps to keep
everyone updated, but at the same time, it lets the person know
that he or she does not need to respond to the email. Bcc stands
for blind carbon copy. It is almost the same as Cc, but the email
addresses in the Bcc fields are always hidden. This type of emailing
is perfect if you need to send the same email to a large group of
people, but keep their email addresses private.
C: The subject of the email is used to say what the email is about. The
subject should be short, but clearly state what the message is
about.
D: This is the body of the email. The body of the email is the actual
text of the email, similar to that of a normal letter. It starts with a
greeting, adds a paragraph or two and ends with a closing
statement with your name at the end of it.
E: An attachment is a file, for example an image or document, that can
be sent along with the email message by clicking on the
Attachment button. Gmail allows you to attach more than one file,
as long as it is not bigger than 25 Mb in total. However, by
integrating its cloud storage service, Google Drive with Gmail, it is
now possible to attach files as large as 10 Gb.
F: The Formatting button allows you to access the different formatting
options for example, changing the font colour, look and size of the
message, as well as include hyperlinks.
G: When you are happy with the message, you can click Send to send
it to the recipient(s).
Something to know
SENDING EMAILS
Now that you have created an email account and understand how the
email interface works, you can start sending email messages.
When you type an email, you will be using the Compose window. In
this window, you will add the email address of the recipient(s), subject
and the message itself. You will also be able to add one or more
attachments in this window.
https://youtu.be/2eH0JbEE-6k
Guided Activity 12.1
Do this activity in your class. Your teacher can help guide you in creating an email
account. Use the account you created for this activity.
To send an email, you can do the following:
1. Click on the Compose button found in the left-hand pane.
2. The Compose window will appear on the right-hand side of the page.
3. In the “To” field, add one or more recipients. This is done by either typing in the
email addresses manually, or by using the Address Book.
4. Type a subject for the email message.
5. Type a message in the body field. When done click Send.
ATTACHMENTS
An attachment is a file, image, or document that is sent with the email.
For example, if you are applying for a bursary, you can send your
results and other documents as an attachment, while the body of the
email serves as the covering letter. It is always a good idea to let the
recipient know that you have attached a file or files.
Something to know
A dialogue box will open with files that you can choose to attach.
2. Choose the file you want to attach and click Open.
12.9: The Open window
The attachments will then start to upload. Most attachments just take seconds to
upload. Large attachments can take longer.
3. When you are ready to send the email, just click Send.
You can click on the Send button before the attachment is finished uploading.
REPLYING TO EMAILS
Emails are not only sent; they are received as well. After reading an
email, there are certain actions you can take, for example, replying to
the message, forwarding the email to someone else, or opening an
attachment if there is one.
READING EMAILS
Any email that you receive will be in the Inbox and you can tell which
emails are unread, because they are marked in bold. From the Inbox,
you can see the name of the sender, the subject of the email, as well
as the first few words of the email. This means that, before you even
open an email, you can already gauge a few things about it.
After reading the email, you can choose to Reply, Reply to all, or Forward the email to
someone else. To perform any one of these actions, click on the three-dot icon found
on the right-hand side of the email window.
Table 12.3: The difference between Reply, Reply to all and Forward in an email
ATTACHMENTS
There are times when you will receive an email containing attachments.
To view the attachment, you will need to download it. In some cases,
for example if the attachment is a Word document or an image, you
can view it in the web browser.
In the Inbox, even before opening the email, you can tell if the email
has an attachment by looking for a paperclip icon to the right of the
subject.
Something to know
https://www.youtube.com/watch?
v=OFIFZ6-xuJc
https://www.youtube.com/watch?
v=3iqO0W_-uc0
HYPERLINKS IN EMAILS
Hyperlinks are added to emails so that the recipient can follow a link to
visit a particular website or web page. Many businesses send emails
with hyperlinks to promote or market their services or products. Note
that the concept of how to create a hyperlink might be different in the
various email applications.
3. After clicking on the hyperlink icon, a dialogue box will appear asking you to insert
the Text to Display and the Web address.
Figure 12.16: Dialogue box
4. Enter the web address link you want the recipient to open in the To which URL
should this link refer? field, such as “www.cnn.com”.
Then enter the text you want the hyperlink to appear as in the Text to display field,
such as News. Then click OK.
Something to know
ETIQUETTE IN EMAILS
As with any other form of communication, it is always important to
practise good netiquette in emails. Netiquette is short for network and
email etiquette. Netiquette means to use good manners when
communicating electronically, or when using the internet; whether it is
in the workplace, or on a personal level. It is also about respecting
other people’s privacy.
Did you know that your email application has a Spell Check tool that is
used to correct spelling mistakes when writing an email? In some
applications, if a word is spelt incorrectly, it will be underlined in red or
green wavy lines. By right clicking on the misspelt word, you can
choose the corrected word from the Context menu.
Figure 12.20: Spell checks
Something to know
In some email applications, you can enable the Spell Check function.
This will automatically correct any spelling or grammatical errors.
Activity 12.3
1. When sending a file as an attachment via an email, the email bounces back and
displays the following message:
a. Suggest a suitable email address for Mrs Motaung’s business. Motivate why
you suggested this email address.
b. Suggest how Mr Motuang could get his own email address at no cost.
REVISION ACTIVITY
1. Explain what is meant by “e-communication”. (3)
2. Write a short paragraph to explain the difference between email and instant
messaging. (4)
3. Study the following screenshot and use it to answer the questions that follow:
a. What is the username of the email address in the Bcc field? (1)
b. What is the domain name of the group to whom the email is being sent? (1)
c. The email address [email protected] is being sent to a mailing list.
Explain what is meant by a mailing list. (2)
d. Will the members of the design team know that the email has been sent to
their manager? Explain your answer. (3)
4. Innocent has two email accounts. The email addresses are
[email protected] and [email protected].
a. Which email address is a web-based email account? (1)
b. List one advantage and one disadvantage of having a web-based email
account. (2)
c. What is the domain name of Innocent’s ISP? (1)
5. Amahle is a long-distance runner who participates often in marathons.
a. Amahle would like to keep an online journal of her experiences. What e-
communication application should she use? (1)
b. Mention two things that she could write about each day. (2)
6. Study the screenshot of an email below and use it to the answer the questions
that follow:
INTRODUCTION
The email and internet are not always safe and secure. You might
receive emails from scammers and cybercriminals who are looking to
get information from you, such as your banking information and
passwords. You should, therefore, avoid storing any sensitive
information, such as credit card numbers and passwords on your
computer, or sending details to anyone asking for them. In this section,
we will look at email threats and what you can do to ensure safe email
and internet use.
UNIT
The following table shows the common email and internet threats, as
well as what you can do to protect yourself from potential threats.
Table 13.1: The most common threats
UNDERSTANDING SPAM AND
PHISHING
https://youtu.be/NI37JI7KnSc
COMPUTER CRIMES
Although ICTs are useful, various computer crimes can take place if
you are not careful enough. In this section, we will look at the following
different types of computer crimes:
Information theft
Data theft
Identity theft
Something to know
Computer crimes are also referred to
as “cyber crimes” or “e-crimes”.
INFORMATION THEFT
Information is one of the most valuable resources available to people
who are looking to exploit or cause others harm. These kinds of people
commit fraudulent acts and can access personal information through
hacking into someone’s computer files. We call them cybercriminals.
IDENTITY THEFT
Identity theft is when someone else pretends to be you. This is very
similar to information theft. Here, the criminal is illegally obtaining
information about you. This type of criminal can use information, such
as your full name, date of birth, passwords, email address and bank
card details to gain access to your bank account or smartphone.
DATA THEFT
Data theft can refer to two different crimes. We will now take a look at
each of these in some more detail.
The first is the theft of data caused due to a third-party gaining access
and using your internet connection without your knowledge. To protect
yourself against this form of data theft, you can do the following:
Protect your network by using a username and password.
Make sure to keep your username and password secret and do not share it with
people you do not trust.
If you suspect that someone has obtained access to your network, change your
username and password.
The second type of data theft is hotlinking. Hotlinking is when
someone takes a file or video from their website and links it to your
website. This is problematic, as each time a user clicks on the link to
download the file or view the video, your bandwidth will be used.
Activity 13.1
Mrs Abrahams loves shopping online. She surfs the internet and every week, she
purchases something new. One day she realised that there were purchases made that
she did not make herself.
1. Explain how ICTs have benefited Mrs Abrahams in this context.
2. List one disadvantage of ICTs used in this context.
3. Briefly explain what Mrs Abrahams could possibly be the victim of.
4. Suggest what she can do to remedy the situation. Motivate your answer.
Activity 13.2
1. Define the following email terms:
a. Hoax
b. Spam
2. Study this example of phishing:
a. Describe two features in the email that confirm the email to be a phishing
attempt.
b. Explain the main difference between phishing and pharming.
3. Study the following extract from a case and answer the questions that follow:
Mike was the head of a new division of End Corp., a small company with about 45
PCs. Mike was hired to reduce expenses for the company and so he would only
authorise the purchase of one copy of each software program that the company
uses. His rationale was, “we bought it, and we can do what we want to do with it”.
Adapted from: http://www.siia.net/index.php?
option=com_content&view=article&id=338&Itemid=351
Gmail placed the message in a Spam folder and inserted the following message at the
top of the email:
INTRODUCTION
We are bombarded with a large amount of information on a daily basis.
This information comes in many different forms. In order to gain
knowledge and understanding, you need to know how to manage this
information.
Information management (IM) is the process of gathering, selecting,
processing and then presenting the information to people. In this
chapter, we will look at data versus information, and how to
understand a problem or task, as well as the importance of
questionnaires. Lastly, we will look at different information sources and
data-gathering tools.
UNIT
Before you can start a research project, such as the PAT, you must
understand what the task is about. The purpose of the PAT is to test:
1. Your information management skills
2. Your application skills (to produce quality outputs using what you
learned during the year)
You can name the main folder using your name and surname, and
name the three sub-folders Phase 1, 2 and 3, as shown below:
It is important that you develop your own task definition written in your
own words. When developing your own task definition, you can
expand on the definition of the task by using mind maps or bulleted
lists.
After I have received all the data, I will use spreadsheets to process and analyse
the data so that it converts to meaningful information.
Using this information, I will then create a report. I will also use the questionnaire
answers to create a report using a word processor.
Lastly, I will translate the information into a slide presentation to show my <insert
target audience>.
A PAT project requires you to think and apply your own creativity.
When you are given a PAT project and before you can even start with
Phase 1, you need to think of the following:
1. Read the PAT task scenario.
2. Write down what your initial thoughts are about the scenario.
3. Jot down the information that is given and required.
4. Identify a focus area that is related to the scenario.
5. Write down the possible sub-topics.
PROBLEM SOLVING
Problem solving is the process of looking at a situation and finding
exactly what the problem is, what the causes of this problem are,
possible solutions, or how the problem can be removed.
After defining the problem or task, you need to think about how to take
the process further. You need to decide on how you will take on the
task. The best way to do this is by finding the information. To get the
information, you must ask yourself questions, such as:
What, when, where and why?
If, what if and how?
INFORMATION SOURCES
Once you have an understanding of the task and have developed the
task definition, you will need to gather data and information. In this
phase, you must consult several types of information sources to
understand the subject better.
http://learn.mindset.co.za/resources/c
omputer-applications-
technology/grade-10/information-
management/how-tos/01-information-
sources-and-data-gathering-tools
Saving your documents
Activity 14.1
This activity is broken down into three sections (Sections A, B and C).
SECTION A
1. Use the instructions in the PAT and create a folder structure. Use what you have
learned so far to create a folder structure.
2. Open Word.
3. Create a word-processing document.
4. Name this document: PAT Phase1.
5. Use the heading: Task definition.
6. Using the topic given below, create a task definition in the PATPhase1 document.
UNIT
SIFTING INFORMATION
Before you can start with sifting information, you need to use
information-gathering tools to find data. After you have obtained all the
data from the different information sources, then only can you look at
which type of data is relevant and which is not.
When you start with finding information for your PAT, you will probably
notice that there are many websites from which you can obtain
information.
Activity 14.2
1. Briefly explain the difference between information and knowledge.
2. Do you think questionnaires are important in the PAT?
3. Differentiate between a questionnaire and survey.
UNIT
MATHEMATICAL OPERATORS
Microsoft Excel uses the standard mathematics signs, such as the plus
sign (+), minus sign (–), an asterisk to multiply (*) and a forward slash
when dividing (/).
You can also use the formulae and functions in Excel to help you
process data. You will have seen most of these functions in action in
your practical lessons on Excel, however, a list of basic functions is
given below:
SUM calculates the total of a range of numxbers
AVERAGE gives the average of a range of values
MIN returns the minimum value in a list of values
MAX returns the maximum value in a list of values
COUNT counts the numxbers in a list of values
Although these functions let you interpret large sets of data, it is not
very good for visualising the data. For that, you can use charts and
graphs, which will be explained in the next section.
After you have gathered the information, you need to transfer the data
to an Excel spreadsheet. From there, you should use the COUNTIF
function to count the numxber of answers for each question.
The information that you get after using the COUNTIF function allows
you to use proper figures to answer the initial sub-heading questions.
UNIT
After you have analysed the data, you need to put it into a visual form
so that the target audience can understand the results better. This is
usually done in the form of graphs, tables and reports. In this section,
we will look at ways in which to visualise information.
GRAPHS AND TABLES
There are different types of charts and you can choose which of them
best shows the information. The line graph, bar graph and histogram,
pie chart and Cartesian graphs are the four most commonly used
graphs.
Table 14.4: Application for the most common graphs
It is not always wise to put the graph on the same sheet as the data. It
makes it cramped and might not be the easiest for a person to
understand. Rather put all the graphs on the next sheet. It will make it
easier for the PAT assessor to understand the information.
If you are unsure about what chart to choose, you can always go to
the Recommended Charts tab that suggests the different types of
charts based on the data.
REPORTS
A report is another way of presenting information. It is a document that
contains relevant information in an organised format. It helps us to
clearly state the problem, the solution that was implemented to fix the
problem, as well as how effective the problem-solving solution was.
Harvard
https://www.youtube.com/watch?
v=6RVrhlMUaS8
APA https://www.youtube.com/watch?
v=wlOIOoMhDKc
PLAGIARISM
When writing a report, plagiarism is something that is really frowned
upon. You learned about plagiarism earlier in this book.
When writing a report, make sure that you do not knowingly, or even
unknowingly, publish or use someone else’s work without
acknowledging that person. To prevent plagiarism, you need to plan
everything before drafting the report. Make sure you understand what
the topic is about and how you are going write the report.
Something to know
INTELLECTUAL PROPERTY
Intellectual property is a term used to create something new or original.
It can come in several forms. Examples could include any of the
following:
A new invention
Design
Brand
Book or journal article
Using someone else’s intellectual property without their permission is
considered to be a crime.
Activity 14.3
1. List two different types of information sources.
2. Illustrate the difference between wisdom and knowledge by using an example.
3. Study the information presented in the following graph:
a. Describe what the graph measures.
b. Name the appliance with the least total usage.
c. After the refrigerator and the geyser, name the appliance that is used most on
week days?
d. State why most appliances are used more during weekends than during the
week.
e. What advice will you give to households if they want to save electricity?
Motivate your answer.
f. List three different types of actions that you could perform on data to extract
information, in other words, help to interpret it, or make sense of it.
REVISION ACTIVITY
1. In the 2018 PAT, Grade 12 learners were required to investigate the topic of fake
news.
Source: http://ecdoe.co.za/documents/learners/self-study-guides/pat-cat-english
2. Use the information above and the following outline to write a task description for
the PAT.
Replace all the phrases between angle brackets <…> with suitable words that
will match the topic of fake news. (6)
3. Thandolwethu is doing research into healthy eating habits amongst the learners in
her class. She conducted a survey by asking each learner to pick their favourite
vegetable from a list that she gave them. The numxber of votes that each
vegetable received were tallied up. She then drew a graph to illustrate the votes
for each vegetable.
The following table shows the results that she obtained:
a. Use this scenario to explain the difference between data and information. (4)
b. Thandolwethu conducted a survey to obtain her results. Explain the difference
between a survey and a questionnaire. (4)
c. What sort of graph (chart) would best illustrate the above results? (1)
d. Use Microsoft Excel to draw a graph (chart) of Thandolwethu’s results. Make sure
the graph is easy to understand. You should not include the TOTAL on your graph. (4)
e. List two pieces of information that Thandolwethu obtained from her results. (2)
4. Chloe used a questionnaire as part of her PAT. Some of the questions had
“Strongly Agree”, “Agree”, “Disagree”, “Strongly Disagree” as options for her
respondents to select. She captured the responses from each person in a
spreadsheet. Which spreadsheet function should she use to determine the
following?
a. The numxber of respondents who answered each question (1)
b. The most popular response for each question based on the numxber of responses
c. The numxber of respondents who answered “Strongly Agree” for each question (1)
5. List the four main sections of a report and state briefly what should be included (1)
in each section. (4)
6. Ntombikayise has copied and pasted three paragraphs of text taken from an
online publication, into her report.
a. She did not acknowledge the original writer of the text in her report. What is this
known as? (1)
b. How could she use the information without making the mistake mentioned in (a)?
[TOTAL: 31](2)
B
barcode an optical, machine-readable, representation of data
boot the process where the computer loads the OS into its main
memory or RAM and checks that all the components of the
computer are in good order
C
CamCard an app used to scan, manage, synchronise and exchange
business cards
container a set of files that stores information about the digital file
cursor this is an indicator that shows the current position for user
interaction – for example, a cursor will show you the place where
text will be inserted in a document
D
data facts, figures, or information that is stored in, or used by a
computer
dots per inch (DPI) used when referring to a printed copy to measure
the number of individual dots placed in a line within the span of one
inch (2.5 cm)
E
embedded device a device that contains a special-purpose
computing system
F
file extension the suffix (letters) at the end of a file name that indicates
what type of file it is
flash disc a memory chip used for storage and transferring data, and
keeps its data even if there is a break in the power supply
G
gigahertz (GHz) measuring unit to measure computerprocessing
speed
H
hard disk drive (HDD) non-volatile memory hardware device that
permanently stores and retrieves data from a computer
hard drive (HD) non-volatile memory hardware device that
permanently stores and retrieves data from a computer
I
icon a picture that shows a file, folder or a program
K
keyboarding refers to a set of skills required to operate a keyboard
smoothly while typing; including being able to understand the
computer keyboard layout and its functions
L
local area network (LAN) a network used in a small area and in close
proximity to each other to share resources and information
log-on screen the screen that allows authorised users access to the
computer
M
Mac the Macintosh is a family of PCs designed, manufactured and
sold by Apple Inc.
malware malicious software that is designed to change your settings,
delete software, cause errors, watch browsing habits, or open
computer to attacks
N
navigation button a set of images or icons that serve as a control
point to link the user to sections on a website
O
online refers to when a user, computer or device is connected to the
internet
P
password a basic security mechanism that consists of a secret phrase
created using alphabetic (abc), numeric (123), alphanumeric (a14b)
and symbolic characters ($%*), or a combination thereof
R
Random Access Memory (RAM) a very fast storage device that can
only store a small amount of information at a time
S
search engine a software program used to search for keywords on
the internet to find documents or the information that was searched
shareware software that allows a user to try all, or part of the program
for free before buying it
SMTP server an SMTP server is the machine that takes care of the
whole email delivery process
T
taskbar the bar at the bottom of the screen that allows you to locate
and launch programs through the Start button, or view any program
that is currently open
U
ultra-portable very slim, lightweight and easy to carry around
V
virulent hostile or harmful
volatile memory computer storage that only maintains its data while
the device is powered
W
web refers to the world wide web (WWW), which is a graphical
interface for the internet
wireless local area network (WLAN) a type of local network that uses
radiowaves to transmit data wireless technology a technology that
uses radiowaves to send and receive data
Contents
Cover
Title Page
Copyright
Contents
Term 1
Chapter 1 Concepts of computing
Introduction
Unit 1.1 Information and communication technology
ICT systems used in everyday life
Activity 1.1
Unit 1.2 Data and information
The GIGO principle
The information-processing cycle
Activity 1.2
Unit 1.3 Computers and ICT
Activity 1.3
Unit 1.4 Types of computers
Multi-purpose devices
Dedicated (embedded) devices
Unit 1.5 Economic benefits of computers
Activity 1.4
Revision activity
At the end of the chapter
Term 2
Chapter 2 Using a computer
Introduction
Unit 2.1 Operating a computer
Switching the computer on
Using the mouse
Using the keyboard
Using the desktop
Activity 2.1
Getting to know Windows
File management
Activity 2.2
Unit 2.2 Posture and ergonomics
Social implications: Correct typing posture
Ergonomics
Prevention
Activity 2.3
Revision activity
At the end of the chapter
Chapter 3 File management
Introduction
Unit 3.1 Basic concepts of file management
Folders
File path
Activity 3.1
Organising files and folders
Using a file manager (This PC)
Activity 3.2
Unit 3.2 File types
Text files
Document files
Locked document files
Web pages
Archives and compressed files
Presentation files
Spreadsheet files
Database files
Image files
Animation files
Video files
Sound files
Portable document format (PDF)
Activity 3.3
Revision activity
At the end of the chapter
Chapter 4 File and print management
Introduction
Unit 4.1 File management skills
Creating shortcuts
Taking screenshots
Activity 4.1
Unit 4.2 File compression
Compressing and decompressing files and folders
Activity 4.2
Unit 4.3 Print management
Adding a new peripheral
Changing the default printer
Basic printing
Printer queue management
Activity 4.3
Revision activity
At the end of the chapter
Chapter 5 Hardware
Introduction
Unit 5.1 What is hardware?
Ports and connectors
Adapters and convertors
Activity 5.1
Unit 5.2 Input devices
Common input devices
Pointing devices
Activity 5.2
Unit 5.3 Output devices
Common output devices
Activity 5.3
Unit 5.4 Storage devices
Concepts used in storage capacity
Common storage devices
Capacity and robustness of storage devices
Connecting peripherals
Activity 5.4
Unit 5.5 Green computing
Going green when printing
Activity 5.5
Revision activity
At the end of the chapter
Chapter 6 Extended hardware concepts
Introduction
Unit 6.1 More about input devices
Pointing devices
Digital camera
Scanning and reading devices
Video input devices
Audio input devices
Biometric input devices
Activity 6.1
Unit 6.2 More about output devices
Audio output
Other output
Activity 6.2
Unit 6.3 Storage media and devices
Activity 6.3
Unit 6.4 Processing devices
Motherboard
Central Processing Unit (CPU)
Memory
Activity 6.4
Unit 6.5 Caring for your PC and storage devices
Revision activity
At the end of the chapter
Chapter 7 Computer software
Introduction
Unit 7.1 Basic software concepts
Application software
Accessories
System software
Activity 7.1
Unit 7.2 Operating system
The role of the operating system
The operating system and GUI
Different operating systems
Mobile operating systems
Activity 7.2
Unit 7.3 Being more secure
Create a password
Other authentication methods
Activity 7.3
Revision activity
At the end of the chapter
Chapter 8 Extended software concepts
Introduction
Unit 8.1 Types of software
Freeware, shareware and proprietary software
Unit 8.2 System software
Drivers
Unit 8.3 Licensing and licensing agreements
Software licensing and licence agreements
Software piracy
Activity 8.1
Revision activity
At the end of the chapter
Chapter 9 Introduction to networks and networking concepts
Introduction
Unit 9.1 Concepts used in networks
Activity 9.1
Unit 9.2 Uses of networks
Aims and objectives of networks
Advantages and disadvantages of networks
Unit 9.3 Social implications: Networks
Viruses
Licensing contracts
User policies
Ownership of electronic material
Activity 9.2
Revision activity
At the end of the chapter
Term 3
Chapter 10 Types of networks: PAN/HAN
Introduction
Unit 10.1 PAN/HAN
Wired and wireless networks
HANs and PANs
Unit 10.2 Creating a PAN/HAN
Requirements
Connecting to the internet
Activity 10.1
Revision activity
At the end of the chapter
Chapter 11 The internet and world wide web
Introduction
Unit 11.1 The internet
Internet address
Unit 11.2 The world wide web
Important concepts used with the world wide web
Using a web browser
What is the difference between a web page and a
website?
URLs, URL shortener and the address bar
Links
Navigation buttons
Tabbed browsing
Activity 11.1
Unit 11.3 Search engines
Searching for information
Basic browsing and searching techniques
Refining your search
Unit 11.4 Downloads and uploads
Downloading
Uploading
Activity 11.2
Revision activity
At the end of the chapter
Chapter 12 Internet communication
Introduction
Unit 12.1 Electronic communication devices
E-communication using a PC or mobile device
Activity 12.1
Unit 12.2 Email as a form of e-communication
Components of an email address
ISP versus webmail
How email works
Activity 12.2
Unit 12.3 Basic emailing
Email interface
Sending emails
Replying to emails
Hyperlinks in emails
Etiquette in emails
Activity 12.3
Revision activity
At the end of the chapter
Chapter 13 Social implications: Email and internet
Introduction
Unit 13.1 Social implications: Email and internet safety
Computer crimes
Activity 13.1
Safe internet and email use
Activity 13.2
Revision activity
At the end of the chapter
Term 4
Chapter 14 Information management
Introduction
Unit 14.1 Concepts used in information management
Unit 14.2 Practical Assessment Task (PAT) overview
Techniques used in information management
Activity 14.1
Unit 14.3 Sifting data
Information versus knowledge
Sifting information
Activity 14.2
Unit 14.4 Processing data
Knowledge versus insight/decision making
The importance of information manipulation
Data handling using a spreadsheet
Processing data using a spreadsheet
Unit 14.5 Presenting data
Graphs and tables
Reports
Slide show presentation
Finalising the PAT
Activity 14.3
Revision activity
At the end of the chapter
Glossary
Guide
Cover
Contents