Module 1.2.docx
Module 1.2.docx
Picture data has become increasingly important in the way we use computers
We use scanners, taking a photo (we need a digital copy or a printed copy of the
picture)
Lenses; Larger lenses capture more light improves quality and detail
Optical zoom: to get closer to the object, while digital zoom, to edit, blurry
ISO rating: how sensitive the camera sensor is to light (taking a picture without a
flash)
1.4 Scanners
1
Scanned copies can be emailed directly instead of faxed
1.7 Disadvantages and limitations of scanners
Security
Dedicated device
Thieves use card skimmers and cameras to steel data from cards
1.12 The ATM work:
Card reader
Modem or network
Touch screen
Money counter
Money deposit slot
1.13 Advantages of ATMs
People can install a skimmer over the ATMs card reader and capture your cards
details and so steal your money
2
1.15 INPUT INTO POS SYSTEMS
(RFID) tags
Screen can become dirty, oily and smudged if used with dirty fingers
1.21 DATA COLLECTION DEVICES
Advantages
Data is capture more accurately than by using human input
Data is captured faster than by using human input
1.22 Disadvantages
3
Mobile devices create virtual keyboards-images on screen
Wireless technology generally uses radio waves to connect input devices to your
computing device. (keyboards and mice with Bluetooth)
2 OUTPUT
-allow user-interaction and give feedback to the user
-help the user with more permanent copy of the results of processing
Display option that allow the user to make choices or to interact with program
Advantages
Sound output is for interaction with computer, mostly for entertainment, through
speakers or headphones
2.2.3 TOUCH OUTPUT
Interact with computers and devices more naturally. (Simply touch the screen)
Advantages
4
Allows input such as drawings and gestures
Disadvantages
Other output
Output not design for humans. Transmission of data between devises, or electrical
signals to control machines or equipment.
Aspect ratio – ratio between the width and the height of the screen
Other features – viewing angle (how far you can move to the side of the screen
2.2.5 PRINTERS
Laser printers and Inkjet printers (3Dprinters and dot-matrix
Looking at speed, Resolutionoptions (Max number that can be printed in one
month), Number of colours, Paper options(sizes) connections(USB,card)
5
Advantages
Can manipulate the computer functions on the board
Plug-and-play
2.2.7 Input and output for physically challenged users
Visually /blind
Large-key keyboard
Hearing Impaired/Deaf
Vibration devices
6
QUESTIONS AND ANSWERS
7
8. Portability and the ability to work on battery power for a limited period of time.
9. Give three common settings one can use on a laptop computer in order to preserve battery life.
9. Specifying that the portable computer must switch to a lower, power-saving state when it has
not been used for a period of time, e.g. 20 minutes.
Setting the brightness of the screen to reduce the power consumption.
Choosing a balance between power consumption and performance.
10. Name the popular range of tablet computers manufactured by Apple.
10. iPad
11. From which two words is the word ‘phablet’ derived?
11. phone + tablet
12. What do we mean when we say smartphones are examples of convergence?
12. They combine the features and technologies of many separate gadgets into one device.
13. Give two examples of operating systems used on smartphones besides the Windows range.
13. Google Android, iOS
14. What is the difference between a client computer and a server computer on a network?
14. Servers are computers that provide services or resources to other computers called clients that
are also linked in a network. A network typically consists of one or more servers and many client
computers. A client computer does not have to be as powerful as a server.
15. Why do some organisations disable the USB ports on their computers?
15. To prevent portable storage devices being inserted, so that data cannot be copied on them and
taken away.
16. What is a micro-USB? Also name a device on which this is found.
16. A smaller version of the USB port, e.g. on a smartphone
17. Name a commonly used piece of equipment to prevent computers, especially laptops, from
being stolen from the workplace.
17. Cable locks
18. What additional level of security can be used to ensure that data will not be able to be used,
even if it is stolen?
18. Password protection, encryption
19. Why should backups be stored off-site?
19. So that they will be safe in the case of fire or theft, etc.
20. Give two reasons why you should consider purchasing a UPS.
20. To protect your hardware and data against power dips and surges as well as power outages.