0% found this document useful (0 votes)
818 views

Study Notes For Grade 12 Computer Applications Technology

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
818 views

Study Notes For Grade 12 Computer Applications Technology

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Study Notes for Grade 12 Computer Applications Technology

1. SYSTEMS TECHNOLOGIES**

Hardware Concepts:
Types of Computers: Desktop, laptop, and tablets are various types of
computers, each serving different purposes. Desktops are stationary and
powerful, laptops are portable, and tablets are lightweight and easy to use on the
go.
Computer Components: The Central Processing Unit (CPU) acts as the brain of
the computer, processing instructions. Random Access Memory (RAM) is
temporary storage used for running programs. Storage devices, such as hard
drives and Solid-State Drives (SSDs), store data permanently.
Peripheral Devices: These are external devices connected to a computer, such
as printers for printing documents, scanners for digitizing paper documents, and
external drives for additional storage.
Input and Output Technologies:**
Biometric Input: Technologies that use unique physical characteristics, like
fingerprints or voice recognition, for identification.
Monitor Specifications: Refresh rate (measured in Hz) and resolution are key
specifications that affect display quality.
Optical Disk vs. Internet Distribution: Optical disks are useful for distributing
large files when internet speed is a limitation.
HDMI vs. VGA: HDMI provides better video and audio quality compared to VGA,
which only transmits video.
Solving Insufficient Disk Space: Free up space by deleting unnecessary files or
using external storage devices to store additional data.
Assistive Software Technologies: Examples include voice recognition software
and eye-tracking technology, which help users with disabilities interact with
computers
3D Printing Application for Car Parts: 3D printing allows precise creation of
custom parts, enhancing the manufacturing and repair processes.

Advanced Hardware Concepts:


Processing Speeds and Performance: The speed of a CPU affects how quickly
a computer can process tasks. Faster CPUs lead to better performance.
Types of Memory: Volatile memory (RAM) loses data when the power is off,
while non-volatile memory (hard drives, SSDs) retains data even when the
computer is powered down.
Network Hardware: Essential components for connecting computers within a
network include routers (direct data traffic), switches (connect devices within a
network), and network cables (physical connections).

SOFTWARE CONCEPTS:
Types of Software: System software includes operating systems like Windows
or macOS, which manage hardware and software resources. Application
software consists of productivity tools like word processors and spreadsheets.
Installing and Updating Software: Proper installation steps ensure software
functions correctly. Regular updates are important to fix bugs and improve
security.
File Management: Organizing files into folders and directories helps in
maintaining order and ease of access. Best practices include consistent naming
conventions and regular backups.

OPERATING SYSTEMS:
Functions of an OS: An operating system manages computer resources, such
as CPU, memory, and storage, and provides services to applications.
Types of Operating Systems: Different operating systems include Windows,
macOS, and Linux, each with unique features and user interfaces.
Basic Troubleshooting and Maintenance: Common issues, like software
crashes and slow performance, can often be resolved by restarting the computer
or updating software. Routine maintenance includes disk cleanup and antivirus
scans.

2. NETWORK TECHNOLOGIES**

Networking Basics:
Types of Networks: Local Area Network (LAN) covers a small area like a home or
office. Wide Area Network (WAN) spans large geographical areas. Metropolitan
Area Network (MAN) is larger than a LAN but smaller than a WAN, typically
covering a city.
Network Topologies: The arrangement of network devices can follow different
patterns like star (central hub), bus (single central cable), or ring (each device
connected to two others).
Network Protocols: Protocols like TCP/IP are rules for data transmission. HTTP
is used for web browsing, and FTP for transferring files.
Government Online Services: Examples include tax filing and public records
access, which streamline public service processes through digital platforms.

Wireless Technologies:**
Wi-Fi Standards: Wi-Fi standards, such as 802.11a/b/g/n/ac, define the speed
and range of wireless networks.
Setting Up Wireless Networks: Involves configuring the router and ensuring
network security through encryption and strong passwords.
Bluetooth and NFC: Bluetooth allows short-range wireless communication
between devices. NFC is used for contactless transactions and data exchange.
Firewall Function: A firewall protects a network by controlling incoming and
outgoing network traffic based on predetermined security rules.
NFC (Near Field Communication)
Uses: Common uses of NFC include contactless payments and digital ticketing,
allowing for quick and secure transactions.
Disadvantages: NFC has a short transfer range, limiting its use to close proximity
interactions.
3. INTERNET TECHNOLOGIES**

Web Concepts:
Internet and World Wide Web: The internet is a global network of networks,
while the World Wide Web is a system of interlinked documents accessed via the
internet.
Web Design Principles: HTML (Hypertext Markup Language) is used for creating
web pages, and CSS (Cascading Style Sheets) for styling them.
Web Browsers and Search Engines: Browsers like Chrome and Firefox allow
users to access the web, while search engines like Google help find information.
Web-Based Applications**
Disadvantages: Dependence on internet connectivity can be a drawback, as can
potential security risks associated with online data.
Limitations: Web-based applications often have limited offline functionality and
can be slower than installed software.

Email Communication:
Setting Up Email Accounts: Involves creating an email address and configuring
settings on an email client or webmail service.
Email Etiquette: Guidelines for professional communication include clear
subject lines, polite language, and proper formatting.
Managing Emails: Organizing emails into folders and using filters to manage
incoming messages efficiently.

4. SOCIAL IMPLICATIONS**

Digital Citizenship:**
Digital Footprints: The traces left by users online, which can be managed by
being mindful of the information shared.
Safe Use of Technology: Practices like using strong passwords and recognizing
scams to protect personal information.
Cyberbullying: Identifying and responding to online harassment and bullying.

Ethics in Computing:**
Copyright and Intellectual Property: Laws protecting creators' rights over their
works.
Software Piracy: The illegal copying and distribution of software, and its ethical
implications.
Privacy and Data Protection: Measures to safeguard personal information and
comply with privacy laws.

Impact of Technology on Society:**


Digital Divide: The gap between those who have access to technology and those
who do not.
Technology in Various Sectors: The influence of technology on education,
business, and healthcare.
Environmental Impacts: Issues such as electronic waste and the energy
consumption of technology.

Security and Ethics:**


Cybersecurity Threats: Types of threats like viruses, phishing, and hacking that
compromise security.
Security Measures: Implementing firewalls, antivirus software, and other
measures to protect against threats.
Ethical Data Handling: Responsibilities in managing and protecting data
ethically.
Click-jacking: A security exploit where users are tricked into clicking on a hidden
link.
Adware Issues: Software that displays unwanted ads, potentially slowing down
the system.
Firewall Function: Protects a network by controlling incoming and outgoing t
raffic based on security rules.
Phishing: A cyber attack where users are tricked into revealing sensitive
information by being redirected to fake websites.
Internet Speed:
Numbers and Measurement Units: Understanding internet speed metrics,
such as Mbps (megabits per second), for download and upload speeds.

5. INFORMATION MANAGEMENT**

Spreadsheet and Database Management:**


Circular Reference: Occurs when a formula references its own cell, potentially
causing errors.
Access Input Format Code: An input mask ensures data is entered in a specific
format, improving data integrity.
Database Field for Telephone Number: Storing telephone numbers as text to
preserve formatting.
Metadata: Provides additional information about a file, such as author and date
created.

Software and Systems Technology:**


GIGO (Garbage In, Garbage Out): Highlights the importance of input data
quality on output results.
Multiprocessing: Using multiple processors to perform tasks simultaneously,
improving performance.
Trial Software Recommendations: Testing software features before purchase
to ensure compatibility and suitability.
Convergence: The integration of multiple technologies into one device, such as
smartphones combining a phone, camera, and computer.
Backward Compatibility: New software that can use files or hardware from
older versions, ensuring continuity.
Risks of Flawed Software: Includes security vulnerabilities and system
instability.
Assistive Software Technologies: Tools like voice recognition and eye-tracking
technology that help users with disabilities interact with computers.
Printing and Data Management:
Print Job Queue (Spooling): Managing print jobs by temporarily storing them in a
queue until the printer is ready.
Solving Insufficient Disk Space: Freeing up space by deleting unnecessary files
or using external storage.

General Computer Knowledge:**


Initial Start-up Instructions in ROM: Instructions stored in Read-Only Memory
(ROM) are essential for booting up the computer.
NIC vs. CPU Slots: Network Interface Cards (NIC) connect computers to a
network, whereas the motherboard has slots for the CPU.
Orphan and Widow Lines in Word Processing: Formatting terms where an
orphan is the first line of a paragraph left at the bottom of a page, and a widow is
the last line of a paragraph left at the top of a page.
Checking for Objectivity and Bias: Ensuring information is unbiased and
objective.
Absolute Cell Referencing: Keeping cell references constant in formulas when
copied to other cells.

Database Management:
Unique Identifier (Primary Key): A unique key in a database table that ensures
each record is distinct.
Field Data Type and Motivation: Choosing the appropriate data type for fields,
such as using text for descriptive fields.

Word Processing:**
Feature for Photo Descriptions: Adding captions to photos to improve
accessibility.
Resolving Table Width Issue: Adjusting page orientation or reducing font size to
fit tables within the document layout.
Recognition for Contributors: Including credits and acknowledgments in
documents to recognize contributors.

You might also like