IT FINAL CONTENT
IT FINAL CONTENT
Grade 10:
System Technologies – Hardware and Software (10.1.x)
Motherboard Components
1. CPU – Central Processing Unit:
• Performs calculations
• Executes instructions.
2. Storage
• Hard drives and SSDs used for long term data storage.
3. Input/Output Devices
• These are connected to the motherboard and include peripherals(keyboards, monitors,
printers, network adapters, etc.).
• Allows data to be input into / output from the computer.
Primary Storage
BIOS (Basic Input/Output System):
A firmware that initializes hardware components during startup and loads the operating system.
RAM (Random Access Memory):
• Temporary and high-speed memory
• Stores data that the CPU is currently working with
• Volatile
o Data is lost when the computer is turned off.
ROM (Read-Only Memory):
Stores essential firmware and software that doesn't change, such as the BIOS.
Input/Output Devices
10.4.2 - Data:
Overview of number systems (Decimal, binary, hexadecimal).
Digital character representation (ASCII/UTF-8, Unicode).
10.4.8 - Algorithm:
Planning and implementing selection and simple looping.
Pseudocode and flowcharts.
Implementing selection and loop structures.
Solving general computing problems.
Efficiency considerations in code and loops.
Latency
• Time taken for a component to respond
CPU Design
• Has 2 main sections which both contain small storage locations called registers
o Control Unit (CU)
▪ Controls the execution of each instruction
o Arithmetic Logic Unit (ALU)
▪ Calculations and logical comparisons take place in ALU
•
• Registers
o Stores the current instruction and its data
o Made from static RAM (SRAM)
▪ Fast
• Does not contain capacitors
▪ Expensive
• Single vs Parallel Processing
o Single
▪ 1 instruction at a time
o Parallel
▪ Simultaneously breaking up and running program instructions on multiple
microprocessors
▪ Reduces processing time
• RAM vs Processor
RAM Processor
Measured in: • Size type • Clock speed
• Access speed • Cores
• Cache
Acts as: Storage for information Brain of the system
Function: Handles opened programs Opens programs (Faster
(Good for multitasking) execution of programs)
Cost: Less expensive More expensive
• Cache Memory
o Made from SRAM chips
o Stores blocks of program instructions and data that have been pre-fetched from RAM in
hopes that they will be needed next by the CPU
o ALTERNATIVE DEFINITION: Stores data so that future requests for that data can be
served faster
RAM
• Stores programs that are currently in use and the data associated with them
o Double Data Rate (DDR) SDRAM
▪ Data is transferred twice per clock tick
▪ Commonly used
▪ DRAM (Dynamic RAM)
• Each chip contains a capacitor
▪ SDRAM (Synchronous DRAM)
• Refreshing of RAM chips is synchronised with the CPU
o CPU does not have to wait
System Clock
• A microchip that regulates the timing and speed of all computer functions
o Within chip, a crystal vibrates at a specific frequency when electricity is applied
• Overclocking
o Making computer components run at a faster speeds by manipulating the frequencies
at which the components are set to run
o Can be done in 2 ways:
▪ per component
• Increasing the clock multiplication factor
▪ the whole system
• Increasing the system clock
o Can be cooled by:
▪ Fans
▪ Heat sink
▪ Liquid cooling
External Bus
• Primarily connects external devices to a computer
• Composed of electrical circuits that connect and transmit data between the computer and the
external device
• Much slower than internal buses
• Can be serial or parallel
• The size of the bus and the rate at which the connected device can send data to the computer
will strongly affect the processing speed of the computer
Machine Cycle
• Fetch
o Processor retrieves instruction from memory
• Decode
o Processor translates instruction into a series of computer commands
• Execute
o Processor performs the computer commands
• Store
o Processor writes the results back to memory
Multiprocessing
Using 2 or more processors for computer operations
Multiprogramming
Interleaved execution of 2 or more jobs by the same computer
Multitasking
The process of a computer performing multiple tasks simultaneously
Multithreading
To run multiple threads of the same program at the same time
UEFI vs. BIOS
UEFI BIOS
UEFI is a newer firmware interface The traditional firmware interface
Supports 32-bit and 64-bit architectures Supports 16-bit architectures
Faster boot times
Supports larger hard drives
Better security features
Interrupts
Signals sent to the CPU by hardware devices to request attention from the CPU
Virtual memory
Allows computer to use more memory than it physically has by temporarily transferring data from RAM
to disk storage.
Language translators
o Compilers
▪ Convert entire high-level language to machine language at once
o Interpreters
▪ Convert high-level language to machine language line by line
o Assemblers
▪ Convert low-level languages to machine code
WAN Concepts
Gateways
Wi-Fi Router
Transmission methods
Connection technologies
• Cellular
• Fiber
• ADSL
Protocols
• Email
• Internet
• IP
• Web Protocols
• Download Protocols
11.2.3 - Data Transmission and Multimedia:
11.4.2 - Data:
Representing data in a fixed number of bits.
Reason for representing data in binary.
Representing integers and real numbers.
Combining hexadecimal digits to reduce binary digits.
11.4.8 - Algorithm:
Planning and implementing solutions in a programming environment.
Array manipulation, string manipulation.
Identifying patterns and reusable methods.
Efficiency considerations.
• Modular Design
o Using interchangeable parts for easier upgrades and repairs
o Makes systems more reliable and scalable
• Co-processors
o Specialised hardware for specific tasks
o Improves speed, power efficiency and reliability
• Caching
o Storing frequently used data for quicker access
o Speeds up performance and reliability
• RAM
o Temporary memory for active data
o Speeds up data access and multitasking
• Other Components
o The following also impact computer performance and reliability:
▪ CPU
▪ Storage
▪ Motherboard
▪ Power supply
Centralised Processing
All computing resources (processing power, memory, storage, applications) are managed by a single,
centralized computer or server.
Advantages:
• Easier to manage
• Easier to implement security measures and enforce policies across entire system
Disadvantages
• Less fault-tolerant
• Performance bottlenecks
o Central unit becomes overloaded
Distributed Processing
Dividing computer tasks and data management across multiple interconnected computers/nodes.
Advantages:
• More fault-tolerant
• Better scalability
• Faster processing times
Disadvantages
• More complex to manage and maintain
Thin clients
• Used in centralised processing
• Each computer on the network has minimal resources
• Processing takes place on a centralised server
o Needs a fast network
Fat clients
• Used in distributed processing
• Each computer uses its own resources (ie. Processor, RAM) to process
• Does not need a fast network
Smart clients
• Offer flexibility, performance and offline capabilities
• Designed to run full-featured operating systems
Cloud Computing
• Allows access to software, storage and computing power remotely over the internet
• Allows users to access and use resources on-demand
• Service models:
o Infrastructure as a Service (IaaS)
▪ Virtualised computing resources
o Platform as a Service (PaaS)
▪ Offers a complete environment for testing, developing and deploying
applications
o Software as a Service (SaaS)
▪ Software applications accessed through web browsers
Concepts:
▪ Peer-to-peer file sharing
o Direct sharing of files between devices on a network without the need for a centralised
server
▪ Remote access
o Ability to connect and control a computer or network from another location
o Host and remote servers need:
▪ Software downloaded on both PC’s
▪ Internet/LAN connection
▪ Secure desktop sharing network
▪ VPN (Virtual Private Network)
o Gives remote access to a LAN in order to remotely access files
o Gives access to a LAN without being wired to a LAN
▪ IoT devices accessible on the Internet
o Internet-connected devices that can be controlled and monitored remotely
Deep Web
• Refers to all parts of the internet that are not indexed by search engines. Majority of the internet
is in the deep web. Examples of content of on the deep web: government databases, academic
research, etc.
• The deep web is used to protect sensitive information but can also be used for illegal activities.
Location-Based Services
Utilizes information about a user’s geographical location to provide real-time location information.
Cloud Computing
Effects
Reduced dependence on local hardware and infrastructure:
o Cost savings
o Greater flexibility in managing computing resources
o Reduced need for staff that specialise in hardware maintenance and management
Cloud Licensing
Subscription-based cloud licensing mode:
o Flexible and cost-effective
o Users pay a regular fee to access software, applications and other resources
o Access to latest updates and features
Social Engineering
Use of deception to manipulate people into giving out confidential information
Malware
Any software written with negative intentions
Phishing
Poses as a legitimate business to trick people into giving out confidential information
Pharming
Setting up a fake website to trick people
Click-jacking
Site appears to do one thing but your clicks do another
Spoofing
Change of email-header to appear as from another sender
Spyware
Software that monitors the way you use your computer and sends to a third party
Keylogger
Tracks your keystrokes to obtain your username and password
Computer virus
Used to disrupt functions of a computer
Computer worm
Distributes itself over a network
Trojan
A destructive program disguised as a useful program
Ransomware
Making data unavailable until hacker is paid
Adware
Software that bombards your computer with ads when connected to the internet
Bots
Computer that can be controlled remotely over the internet
12.4.7 - Persistence:
Concepts of data warehousing and data mining.
NoSQL databases and comparisons with SQL.
JSON files (not examinable in practical exams).
12.4.8 - Algorithm:
Solutions to simple problems requiring collections of data.
Search, sort, insert, delete with arrays of objects.
Efficiency considerations.
12.4.9 - Database:
Understanding the purposes and features of a database and DBMS.
Data integrity, security, and multiuser access control.
Backup recovery and management.