Study Notes For Grade 12 Computer Applications Technology
Study Notes For Grade 12 Computer Applications Technology
1. SYSTEMS TECHNOLOGIES**
Hardware Concepts:
Types of Computers: Desktop, laptop, and tablets are various types of
computers, each serving different purposes. Desktops are stationary and
powerful, laptops are portable, and tablets are lightweight and easy to use on the
go.
Computer Components: The Central Processing Unit (CPU) acts as the brain of
the computer, processing instructions. Random Access Memory (RAM) is
temporary storage used for running programs. Storage devices, such as hard
drives and Solid-State Drives (SSDs), store data permanently.
Peripheral Devices: These are external devices connected to a computer, such
as printers for printing documents, scanners for digitizing paper documents, and
external drives for additional storage.
Input and Output Technologies:**
Biometric Input: Technologies that use unique physical characteristics, like
fingerprints or voice recognition, for identification.
Monitor Specifications: Refresh rate (measured in Hz) and resolution are key
specifications that affect display quality.
Optical Disk vs. Internet Distribution: Optical disks are useful for distributing
large files when internet speed is a limitation.
HDMI vs. VGA: HDMI provides better video and audio quality compared to VGA,
which only transmits video.
Solving Insufficient Disk Space: Free up space by deleting unnecessary files or
using external storage devices to store additional data.
Assistive Software Technologies: Examples include voice recognition software
and eye-tracking technology, which help users with disabilities interact with
computers
3D Printing Application for Car Parts: 3D printing allows precise creation of
custom parts, enhancing the manufacturing and repair processes.
SOFTWARE CONCEPTS:
Types of Software: System software includes operating systems like Windows
or macOS, which manage hardware and software resources. Application
software consists of productivity tools like word processors and spreadsheets.
Installing and Updating Software: Proper installation steps ensure software
functions correctly. Regular updates are important to fix bugs and improve
security.
File Management: Organizing files into folders and directories helps in
maintaining order and ease of access. Best practices include consistent naming
conventions and regular backups.
OPERATING SYSTEMS:
Functions of an OS: An operating system manages computer resources, such
as CPU, memory, and storage, and provides services to applications.
Types of Operating Systems: Different operating systems include Windows,
macOS, and Linux, each with unique features and user interfaces.
Basic Troubleshooting and Maintenance: Common issues, like software
crashes and slow performance, can often be resolved by restarting the computer
or updating software. Routine maintenance includes disk cleanup and antivirus
scans.
2. NETWORK TECHNOLOGIES**
Networking Basics:
Types of Networks: Local Area Network (LAN) covers a small area like a home or
office. Wide Area Network (WAN) spans large geographical areas. Metropolitan
Area Network (MAN) is larger than a LAN but smaller than a WAN, typically
covering a city.
Network Topologies: The arrangement of network devices can follow different
patterns like star (central hub), bus (single central cable), or ring (each device
connected to two others).
Network Protocols: Protocols like TCP/IP are rules for data transmission. HTTP
is used for web browsing, and FTP for transferring files.
Government Online Services: Examples include tax filing and public records
access, which streamline public service processes through digital platforms.
Wireless Technologies:**
Wi-Fi Standards: Wi-Fi standards, such as 802.11a/b/g/n/ac, define the speed
and range of wireless networks.
Setting Up Wireless Networks: Involves configuring the router and ensuring
network security through encryption and strong passwords.
Bluetooth and NFC: Bluetooth allows short-range wireless communication
between devices. NFC is used for contactless transactions and data exchange.
Firewall Function: A firewall protects a network by controlling incoming and
outgoing network traffic based on predetermined security rules.
NFC (Near Field Communication)
Uses: Common uses of NFC include contactless payments and digital ticketing,
allowing for quick and secure transactions.
Disadvantages: NFC has a short transfer range, limiting its use to close proximity
interactions.
3. INTERNET TECHNOLOGIES**
Web Concepts:
Internet and World Wide Web: The internet is a global network of networks,
while the World Wide Web is a system of interlinked documents accessed via the
internet.
Web Design Principles: HTML (Hypertext Markup Language) is used for creating
web pages, and CSS (Cascading Style Sheets) for styling them.
Web Browsers and Search Engines: Browsers like Chrome and Firefox allow
users to access the web, while search engines like Google help find information.
Web-Based Applications**
Disadvantages: Dependence on internet connectivity can be a drawback, as can
potential security risks associated with online data.
Limitations: Web-based applications often have limited offline functionality and
can be slower than installed software.
Email Communication:
Setting Up Email Accounts: Involves creating an email address and configuring
settings on an email client or webmail service.
Email Etiquette: Guidelines for professional communication include clear
subject lines, polite language, and proper formatting.
Managing Emails: Organizing emails into folders and using filters to manage
incoming messages efficiently.
4. SOCIAL IMPLICATIONS**
Digital Citizenship:**
Digital Footprints: The traces left by users online, which can be managed by
being mindful of the information shared.
Safe Use of Technology: Practices like using strong passwords and recognizing
scams to protect personal information.
Cyberbullying: Identifying and responding to online harassment and bullying.
Ethics in Computing:**
Copyright and Intellectual Property: Laws protecting creators' rights over their
works.
Software Piracy: The illegal copying and distribution of software, and its ethical
implications.
Privacy and Data Protection: Measures to safeguard personal information and
comply with privacy laws.
5. INFORMATION MANAGEMENT**
Database Management:
Unique Identifier (Primary Key): A unique key in a database table that ensures
each record is distinct.
Field Data Type and Motivation: Choosing the appropriate data type for fields,
such as using text for descriptive fields.
Word Processing:**
Feature for Photo Descriptions: Adding captions to photos to improve
accessibility.
Resolving Table Width Issue: Adjusting page orientation or reducing font size to
fit tables within the document layout.
Recognition for Contributors: Including credits and acknowledgments in
documents to recognize contributors.