IT Theory Chapter 2
IT Theory Chapter 2
Learning outcomes
At the end of this chapter, you should be able to:
● provide an overview and link between data, information and knowledge
● explain data representation and data storage?
● discuss bits and bytes
● provide an overview and convert between number systems: decimal, binary,
hexadecimal
● provide an overview of digital character representation; ASCII/UTF-8, Unicode
● provide an overview of primitive data types and their storage
● provide an overview of data structures and collections of data storage
● explain computer file management processes
● explain the various software licence agreements
● discuss the social, ethical and legal issues pertaining to ICTs
● list the economic reasons for using computers
● explain the digital divide.
INTRODUCTION
Data, in principal, is stored in 1s and 0s. Computers make use of data structures
that describe a specific sequence for data to be organised. This allows the
computer to understand how the different bits of data are related and to interpret
the data correctly.
In the previous chapter, you learnt that data is unprocessed numbers, or facts.
DATA REPRESENTATION
https://www.youtube.com/
Data representation refers to the form in which data is stored, processed and
watch?v=LpuPe81bc2w transmitted. Digital devices store data using the binary number system.
https://qrs.ly/6dab1zo
BITS AND BYTES
You can combine several bits (0s and 1s). If you combine 8 bits together, it is
called a ‘‘byte’’. A byte can represent any number between 0 (represented in bits
as 00000000) and 255 (represented in bits as 11111111).
1B 8b b = bit
1 KB 1024 B B = byte
KB = Kilobyte
1 MB 1024 KB
MB = Megabyte
1 GB 1024 MB
GB = Gigabyte
1 TB 1024 GB TB = Terabyte
Have you ever heard someone saying that a movie is 700 megabytes (MB) big?
Basically, what they are saying is that, the movie consists of 700 million bytes
of data.
Activity 2.1
2.1.1 Differentiate between data, information and knowledge. Use an example to support
your answer.
2.1.2 Explain data representation, in your own words.
2.1.3 Explain data storage.
2.1.4 Illustrate the difference between bits and bytes.
2.1.5 Decide for each of the following whether it represents data, information or
knowledge. Give a reason for your choice in each case.
a. The marks for each learner in a recent mathematics test.
b. The tabulated results of research into bus transport options for a school tour.
The table includes records of the safety history of each bus company.
The school is able to choose the safest option that is the cheapest.
c. A comparison of the IT marks per learner for terms 1, 2 and 3 of a year.
d. A comparison table of a number of smartphone options in terms of features,
price and contract options per mobile service provider.
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.1 The link between data, information and knowledge 23
In the decimal system, each time the value of a number increases by 1, you
increase the size of the digit by 1. This works well until you reach the largest digit
possible that is 9. Once you are at 9, there are no larger digits left, so the next
time you increase the value of your number by 1, you need to add a new digit to
your number. The value of this digit increases from 0 to 1, and you restart the first
digit at 0:
…
07
08
09
10
When you reach the number 19 and increase the value by 1, the second digit
goes up again, and you start with 20. This means that the value of any digit in the
second position is 10, with 20 equal to 2 × 10. As you continue counting, the
value of your second digit eventually reaches 9 (for example in 90), and when you
need to increase it again, (for example when adding 1 to 99) you find that
impossible, so you reset both 9’s to 0 and add a third digit, that is 100.
The place value of the third digit is thus always a 100, or 10 × 10 or 102. If you
need to know the value of the number 742, you can calculate it as follows:
Take note
Any number raised to the 7 4 2
power of zero, for example, 7 × 102 = 700 4 × 101 = 40 2 × 100 = 2
100, equals 1. It does not
= 700 + 40 + 2 = 742
matter how big or small
the number is. So even As your number increases in value, the value of each digit is 10 times larger than
1 0000 = 1.
the values of the previous digit. The fourth digit is thus worth 1 000 (or 103), the
fifth digit is worth 10 000 (or 104), and so forth.
5 1 2 4 0 8 8 7
5 10 =
7
1 10 =
6
2 10 = 5
4 10 =
4
0 10 =3
8 10 =
2
8 10 = 1
7 10 =0
Once you understand that this is how counting works when you have ten unique numbers available, counting in any
other numbering system is easy to grasp.
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.2 Number systems 25
To see how we do this, let us look at what the value of each of the digits is on their own.
In the decimal numbering system, each digit can hold ten unique values and each new digit has a
place value that is ten times as large as the previous digit. In the binary system, each digit can only hold
two unique values, so each new digit has a place value that is twice as large as the previous digit!
Just as with the decimal numbering system, you can calculate the value of a binary number by calculating
the value of the individual digits and adding them together. Let’s work through the following examples to
ensure you understand how to do this.
Example 2.1
Binary number 0 0 1 0 1 1 0 1
Place value 128 64 32 16 8 4 2 1
Computed value 0 0 32 0 8 4 0 1
Value base 10 = 32 + 8 + 4 + 1 = 45
The binary number 001011012 is therefore 0 + 0 + 32 + 0 + 8 + 4 + 0 + 1 = 45.
Binary number 1 1 0 0 0 0 1 1
Place value 27 = 128 26 = 64 25 = 32 24 = 16 23 = 8 22 = 4 21 = 2 20 = 1
Computed values 1 × 128 1 × 64 0 × 32 0 × 16 0×8 0×4 1×2 1×1
Decimal value = 128 +64 + 2 + 1 = 195
Example 2.3
1 1 1 1 1 1 1 1
2 = 128
7
2 = 64
6
2 = 32
5
2 = 16
4
2 =8
3
2 =4
2
2 =2
1
2 =1
0
For example, to convert 37 into binary, start by writing down the factors of 2:
37 = ?
27 = 128 26 = 64 25 = 32 24 = 16 23 = 8 22 = 4 21 = 2 20 = 1
37 = 1 × 32 + 5 = ?
27 = 128 26 = 64 25 = 32 24 = 16 23 = 8 22 = 4 21 = 2 20 = 1
1
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.2 Number systems 27
37 = 1 × 32 + 1 × 4 + 1 × 1 = ?
2 = 128
7
2 = 64
6
2 = 32
5
2 = 16
4
2 =8
3
2 =4
2
21 = 2 20 = 1
1 1
The final remainder is 1, and the power of 2 smaller than or equal to 1 is also 1.
Since 1 ÷ 1 = 1 with no remainder, you can write the number 1 under the 1 in the table.
You should also add 0 under all the powers of 2 you did not use.
The 1s and 0s you have written in your table gives you your binary number:
37 =1 × 32 + 1 × 4 + 1 × 1 = 001001012
27 = 128 26 = 64 25 = 32 24 = 16 23 = 8 22 = 4 21 = 2 20 = 1
0 0 1 0 0 1 0 1
Work through the following examples to make sure you understand how to convert a number from decimal
to binary.
Example 2.4
71 = 1 × 64 +1 × 4 + 1 × 2 + 1 × 1 = 010001112
2 = 128
7
2 = 64
6
2 = 32
5
2 = 16
4
23 = 8 22 = 4 21 = 2 20 = 1
0 1 0 0 0 1 1 1
Example 2.5
Activity 2.2
2.2.1 Explain in your own words what the decimal numbering system is.
2.2.2 Explain in your own words what the binary numbering system is.
Work on your own to complete the following two activities, then review your work with a partner. Compare your answers
and if they differ, try to find out where the mistake occurred and correct it.
2.2.3 Convert the following binary numbers to decimal numbers:
a. 000010012 b. 100010112 c. 010011102 d. 100010002
e. 000100012 f. 111011112 g. 010101002 h. 100110012
i. 110000012 j. 000101002
2.2.4 Convert the following decimal numbers to binary numbers:
a. 9 b. 17 c. 93 d. 128
e. 127 f. 254 g. 144 h. 58
i. 210 j. 237
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.2 Number systems 29
The hexadecimal system uses the first six letters of the alphabet in its numbering system, with A equal to
10, B equal to 11, C equal to 12, D equal to 13, E equal to 14 and F equal to 15.
To count using hexadecimal, you follow the same rules as you do when counting in the decimal or the
binary numbering systems. You continue increasing the value until you reach the largest possible digit (F),
then reset this digit back to 0 and add a second digit.
Every time you pass the maximum of the first digit, you increase the value of the second digit until both
the first digits are equal to F, in which case you reset both digits and add a third digit.
The reason programmers need to understand the binary system is clear: computers represent all data using binary.
However, when programmers need to speak to computers, giving instructions in binary would be incredibly time
consuming. Imagine trying to write an essay, but for every letter you wanted to write, you needed to write down a
binary code that is 8 digits long! Even a short essay would be multiple pages long.
Instead of writing in binary, programmers have taught computers to understand the hexadecimal system. This works
incredibly well, since any byte of data (a binary number made up of 8 bits) can be represented using exactly 2
hexadecimal digits. In mathematical terms, 28 = 162. As a result, a large binary number like 11110001 can be
written as F1 in hexadecimal.
For example, if you wanted to tell a computer to show you a specific colour, you need to tell it how much red, green
and blue there is in the colour. To show a light pink colour in binary, you would tell the computer that the colour is
equal to 11110010 10011110 10110001. In hexadecimal, the colour is equal to F2 9E B1. If you wanted to show
the colour white, the binary would be 11111111 11111111 11111111 or FF FF FF in hexadecimal.
1 1 × 160 = 1 The value of the first digit is 1. Don’t get confused between
decimal numbers and
10 1 × 161 = 16 The value of the second digit is 16. hexadecimal numbers. Even
100 1 × 162 = 256 The value of the third digit is 256. though they look the same,
2216 in hexadecimal and 22
1000 1 × 163 = 4 096 The value of the fourth digit is 4 096.
in decimal do not have the
same value. Note the base
To find the decimal value of a hexadecimal number, we multiply each
indicator subscript 16
digit by their position/place value and add all the values together.
Take note
A = 10 in the hexadecimal numbering system. Refer to the hexadecimal table.
For example, to find the value of the hexadecimal number 3A16:
3 A
161 160
= 3 × 161 = A × 160
= 3 × 16 = 48 = 10 × 1 = 10
= 48 + 10 = 58
To make sure you understand how to convert from hexadecimal to decimal, work through the following
examples:
Example 2.7
6 5
161 160
= 6 × 16 = 5 × 160
= 6 × 16 = 96 =5×1=5
= 96 + 5 = 101
The hexadecimal number 6516 is thus equal to the decimal number 101.
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.2 Number systems 31
F 9
161 160
= F × 161 = 9 × 160
= 15 × 16 = 240 =9×1=9
= 240 + 9 = 249
The hexadecimal number F916 is thus equal to the decimal number 249.
Example 2.9
2 B C
162 161 160
= 2 × 162 = B × 161 = C × 160
= 2 × 256 = 512 = 11 × 16 = 176 = 12 × 1 = 12
= 512 + 176 + 12 = 700
The hexadecimal number 2BC16 is thus equal to the decimal number 700.
94 = ?
162 =256 161 = 16 160 = 1
94 = 5 × 16 + 14
162 =256 161 = 16 160 = 1
5
94 = 5 × 16 + 14 × 1
Since there is no remainder left, you know that the decimal number 94 can be
written as 5E16 in hexadecimal.
Example 2.10
37 = 2 × 16 + 5 × 1
16 =256
2
16 = 16
1
160 = 1
2 5
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.2 Number systems 33
222 = 13 × 16 + 14 × 1
162 =256 161 = 16 160 = 1
D E
Example 2.12
2 060 = 8 × 256 + 12 × 1
162 =256 161 = 16 160 = 1
8 0 C
Complete the following activities on your own, then work with a partner to verify your
answers. If your answers differ, try to find out where the mistake occurred and correct it.
2.3.5 Convert the following hexadecimal numbers to decimal numbers:
a. DB16 b. 29C16
c. 4816 d. F016
e. C9F16 f. 8A16
g. 5516 h. 7316
i. 10116 j. AC216
2.3.6 Convert the following decimal numbers to hexadecimal numbers:
a. 15 b. 16
c. 81 d. 49
e. 172 f. 252
g. 391 h. 77
i. 200 j. 3751
2.3.7 Convert the following hexadecimal numbers to binary numbers, and binary numbers
to hexadecimal numbers:
a. 1716 b. A2C16
c. 001100112 d. 100000102
Hint: First convert the numbers to decimal and then to the appropriate number.
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.2 Number systems 35
In 1963, the American Standards Association published a table that linked 127
different letters and symbols to numbers. The table is known as the American
New words
Standard Code for Information Interchange (or ASCII) table.
ASCII – American Standard
Code for Information
In the previous unit, you observed how computers could represent numbers
Interchange. The ASCII
using binary systems. But what about letters? Fortunately, no mathematics is
originally used seven bits to
required to convert numbers into letters.
encode each character; the
modern version uses 8 bits
that assign numeric values If a computer knows that the information stored in a byte is a letter rather than a
to letters, digits, number, it can simply search for the character assigned to that number in the
punctuation marks, and table and display the character, with ASCII, the first 32 characters in the table are
other characters programming characters that cannot be shown on the screen. These include
characters like a carriage return character (which shows where a new line should
start) and a horizontal tab character (which adds some horizontal space).
The ASCII value 65 is equal to the uppercase character ‘A’ whereas the ASCII
value 122 is the lowercase character ‘z’. ASCII has a limitation of 128 characters.
Universal Code Character Set (Unicode) was created to unify all the encoding
schemes so that confusion between computers could be limited as much as
possible.
Activity 2.4
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.3 Digital character and primitive data types 37
In this unit, you will learn about the requirements needed for a computer to store and organise data.
Two structures are commonly used to store data. These are databases and files.
Data is saved in memory while in use by an application. Information needed for later access is stored in a
database or file. These are saved on the more permanent storage devices.
The Registry is a hierarchical database that stores low-level settings for the operating system and for
applications. The Registry is used to store much of the information and settings for software programs,
hardware devices, user preferences, operating system configurations, and much more.
FILES
On a computing device it is common for data to be grouped into files and folders,
with each file being a single collection of data. A document stored on your
computer is an example of a file. For example, in the ‘My documents’ folder on
your computer, a number of files (of many different types) are saved. The operating
system can save data on all of the available storage devices connected to the
computer. These storage devices are called drives. On each drive, files are
grouped in separate containers called folders.
It is important to place files in folders and label (name) them accordingly. When a
file is created, it is saved on a storage device. It remains on the device until the
user decides to remove it. Files will remain on the storage device after the
computer is turned off, or the storage device is removed from the computer.
In the next section, you will learn more about how files work and how they can be
organised on a computer.
ORGANISING FILES
Files are stored on a computing device in folders or directories. These folders are
used to help organise the computer’s files so that they can be easy to search and
locate. Each folder can contain either files or different subfolders each
containing files.
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.4 File management 39
Figure 2.6 shows a more organised way of storing files. A user might have a
music folder as the first folder, and then sub-folders for each artist.
FILE SPECIFICATIONS
The location that a file is saved in is recorded in the file path for that file. This file
path tells you on which storage device the file is saved (the drive letter), in which
folder and subfolders the file is saved, the name of the file, and finally, the type of
file (given by the file extension).
C:\Music\Beethoven\Moonlight.mps
Each file has a unique file path that starts with the storage device’s drive letter
(C: or D: drive). After the drive letter is the name of the file’s folders and subfolders.
A backslash (‘\’) is used to separate the drive letter and the different folders and
files. Finally, the file path ends with the name and extension of the file (for example,
.mp3, .PDF, .JPEG). The extension in these examples consist of a full stop
followed by a combination of letters and numbers (you will learn more about this
later in this chapter).
You can find the file path of a folder by clicking on the Address bar in File Explorer.
To do this:
● open the Computer window from the Start menu
● browse to the folder you want the file path for
● click on the address bar to see the folder’s address.
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.4 File management 41
The following section will describe the easiest ways in which files can be renamed,
deleted, copied or moved between folders.
● Type the word ‘explorer’ and you should see a File Explorer option appear in
the start menu.
● Click on the File Explorer option and your computer’s File Explorer should
now open.
● Click on the This PC option in the left panel. This will take you to the very
lowest folder in your computer’s folder hierarchy. From here, you can explore
your computer’s organisational system by browsing through the folder
structure.
In the screenshot above, there are two storage devices: Computer (C:) and DVD
RW Drive (D:). By double-clicking on any of these devices, you can open it and
examine the files and folders stored on this device.
Once you are comfortable with exploring your computer, you are now ready to
begin organising the files on it.
DISK DRIVES
FOLDERS
(BRANCHES)
SUB-FOLDERS
FILES
(LEAVES)
In the diagram above the root of the tree is not at the bottom but at the top, and
hanging from the root there will be the drives, folders, sub-folders, and files. The
folders linked to the specific drives are the root folders.
Any sub-folders and files found in the folder appear in the next row. This pattern
continues until the final row only contains files. All files in a hierarchical tree are
known as leaves because they are found at the bottom of the tree, without any
rows below them.
The highest level of the tree structure of a drive is the root directory. The root
directory of the main drive is usually named the C:drive, written as C:\.
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.4 File management 43
MOVING FILES
When you move files, the selected files are copied to the new destination and then deleted from their
original destination. This means that you have not created a duplicate file, but instead moved a file from one
folder to a different folder. To move files, you need to cut and paste them rather than copy and paste them.
RENAMING FILES
This command allows you to change the name of files.
● Left-click on the file you would like to rename
● Using the mouse, click on the name of the selected file
● Enter a new name for your file and press the ENTER key.
When naming files it is important that you choose clear, descriptive names for files. You can use the
following tips to make your files easier to find:
● never use a complicated structure
● ensure that you can distinguish between similar files based on the file names
● use the dash symbol to separate different elements in a file name (for example, the name, and date)
● files are usually organised alphabetically, so carefully consider with which letter or number to start a
file name.
A File Naming Convention (FNC) helps keep the computer clutter-free and allows
you to:
● know the contents of a file before you open it
● navigate through long lists of files for the one that you are looking for
● store different versions of the same document by naming them according
to date.
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.4 File management 45
2.5.1 Choose a concept from COLUMN B that matches a description in COLUMN A. Write only the letter next to the
question number (e.g. 1– A). There can be more than one answer to a question.
COLUMN A COLUMN B
1. The structures used to store data. A. Directories
2. The data in _____ is stored in table B. Files and databases
structures, with each database containing C. Extension
multiple tables.
D. Folders
3. The location that a file is saved in is E. File path
recorded in the _____ for that file
F. Databases
4. _____ are data structures that are stored G. CTRL-X
on a computer’s storage devices and that
contain rows of information. H. CTRL-C
I. Recycle Bin
5. To copy a file, you should use the ______
shortcut key (hotkey) on the keyboard. J. Files
Files do not only store data, they also contain information on how the data should be interpreted by a
computing device. Every file contains a file extension that determines the type of file it is and how the
operating system should interpret it.
A .text file, for example, is a basic text document that only contains words without any formatting, while
the .doc type allows for more complex documents that include different fonts and images.
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.5 Common file types and extensions 47
CONVERTING TO RICH
TEXT FORMAT
Figure 2.12: Text files are used to store plain text without
https://www.youtube.com/
formatting watch?v=1er5baxb8bE
https://qrs.ly/uxab1zq
Spreadsheet ● Microsoft Excel ● .xls A spreadsheet file stores information in a large table.
● Google sheets ● .xlsx Spreadsheets are commonly used in businesses to
● LibreOffice Calc ● .ods do calculations and analyse large sets of data. They
are used to store information that is best presented
in a table, such as timetables and checklists.
Take note
A single spreadsheet file
can contain many sheets.
Each of these sheets is a
separate page that contains
its own information. These
sheets can be linked to one
another, as well as to other
spreadsheets.
Figure 2.13: Excel spreadsheets store information on different tables called sheets
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.5 Common file types and extensions 49
Figure 2.16: Source code files are often stored in plain text
Object Code ● Delphi ● .dcu Object code is the machine language, (also known as
● C/C++ ● .obj machine code) that a central processing unit can
understand. A compiler produces object code when it
translates the programming source code.
Executable ● Delphi ● .exe Executable files launches an application or
application program.
Shared library ● Microsoft ● .dll Shared library files contain several useful
Windows ● .lib instructions that your programs can use. Rather than
● MacOS including these instructions in a single executable,
● Linux they are saved as separate files so that the
instructions can be used by more than one program.
This reuse of programs saves time and money in the
development process.
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.5 Common file types and extensions 51
Activity 2.6
2.6.1 List five types of image files. Give the name and extension for each file.
2.6.2 Give an example of an animation file extension. How does an animation differ from an image?
2.6.3 What is a source code file? Give two examples of a source code file type.
2.6.4 How are shared library files used?
2.6.5 What is the difference between text files and document files?
2.6.6 How can CSV files be used to store tabular information?
2.6.7 Nosipho has been organising her computer. Unfortunately, after moving some of her files to new folders, she can
no longer find them! See if you can help Nosipho by answering the following questions.
a. Match the files Nosipho is looking for with the file paths.
b. Give the file extension and file type for each of the file paths above.
c. Based on the file paths above, do you think Nosipho has finished organising her computer? Give reasons for
your answer.
d. Nosipho used a CSV file to store tabular data. What is the difference between a CSV file and an XLS file?
e. Can you think of any reasons why Nosipho’s games and music would be on her D:\ drive?
f. Why is it not a good idea to change the file extension?
2.6.8 Give two advantages of DLL files.
2.6.9 Explain the difference between source code and machine code.
2.6.10 Describe a situation where you would find it necessary to convert from one file type to another. For example
from a Word document to a text file or from a spreadsheet to a CSV file.
The introduction of computers in our daily lives has created various issues in our society. These include,
legal, ethical, economical and the digital divide issues. In this unit, we will look at each of these social
issues. This will include:
● license agreements, copyright, piracy and copyleft
● social, ethical and legal issues on ICT
● economic reasons for using computers
● the digital divide.
The license agreement is better as the EULA (end user license agreement) and has three types of
agreements:
● Single-user license means that the software is for a single-user/device
● Multi-user license means that the software is for multi-users/multi devices or computers
● Site license means that use of the software is unlimited, however, it is usually installed on a common
group of users/devices belonging to an entity, for example, a company, school, etc.
PIRACY
Piracy is the illegal copying, distribution or use of software. These illegal copies are sold at a low price,
which is normally a fraction of the price of the original legal copies.
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.6 Social implications 53
For example, if you create a new music album, you can sign a contract with a
music label that allows them to copy and sell the album, as long as they pay you
for every album they sell. The primary goal of copyright is to give people a reason
to create and invent new things, since it allows creators to make money from their
creations.
COPYLEFT
Many creators are no longer licensing their creations using copyright. Instead,
they are using licenses such as Creative Commons and Copy left to protect their
works. These licenses allow other people to copy and use the creation, as long
as they follow certain rules. This can include one or more of the following rules:
● Attribution: Whenever the creation is used, you must give credit to the
original creator.
● Non-commercial: The creation can be used for any purpose not aimed at
making money (that is, non-commercial use).
● Share-alike or copy left: The creation can be used for any purpose, but the
new work must be shared with the exact same license as the original work.
This ensures that the creation stays free for anyone to use.
● Non-derivative: The creation can be copied and used as it is but cannot be
changed in any way.
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.6 Social implications 55
These are just some of the many privacy questions that using the internet raises.
One of the greatest features of the Google Maps navigation tool is called Street View. It
allows you to see 360° photos of most towns or cities, so that you can see exactly what
the place you are travelling to will look like. However, for five years, this feature was not
A STREET VIEW OF THE available in Germany (one of the world’s most technological countries). Why?
BERLIN WALL
https://www.theguardian.
com/cities/gallery/2014/
oct/29/berlin-wall-google-
street-view
https://qrs.ly/taab201
Figure 2.19: A street view of Menlyn Shopping Centre in Pretoria
Germany is more concerned with privacy than many other countries in the world. When
the Germans heard that Google would be driving through their cities, taking photos of all
Did you know their houses, many people were outraged. While not technically against the law (the
Google’s software photos are taken from the streets, which are public property), the people felt that Google
automatically detects and was invading their privacy. This issue became so serious that, when asked about it, the
blurs people’s faces and German Foreign Minister said, ‘I will do all I can to prevent it’.
number plates on Google To solve the problem, Google gave German households the option to have their houses
Street View. This is ‘blurred-out’ on Street View, before it was released to the public. Almost 250 000
fortunate for the people households decided to do this, which forced Google to blur the houses every time they
who have been caught in updated their pictures. In 2011, Google decided to remove the Street View feature from
compromising positions by Germany due to the costs of repeatedly blurring the houses. The Street View function
the Street View cameras! was only re-introduced in 2016.
This can be incredibly empowering for people across the world. It allows people
to express their opinions and find communities in which they feel safe. It can even
be used to organise a rebellion and eventually overthrow a corrupt government
and dictator, as occurred in Egypt in 2011.
https://en.wikipedia.org/wiki/
Unfortunately, these same freedoms allow people to speak without fear of On_the_Internet,_nobody_
consequences. This can result in people saying all the hateful, racist, homophobic, knows_you%27re_a_dog
and sexist things they normally keep to themselves. It can also result in https://qrs.ly/wqab1zv
cyberbullying and it has been directly linked to the suicide of teenagers who
experienced severe cyberbullying.
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.6 Social implications 57
DIGITAL DIVIDE
Digital divide refers to the growing gap between those people with access to
and knowledge of using digital technology (“haves”) and those people without
access or knowledge to digital technology (“have-nots”). The digital divide is
believed to reinforce social inequalities and to cause a persisting information or
knowledge gap.
2.7.1 As a young, up-and-coming musician, Bibi has just released his first album. While
the album is regularly played on the radio and Bibi often hears taxi drivers playing
his music, he has sold very few copies of the album to date. While working in
Johannesburg, Bibi sees a street vendor selling a copy of his album for R30.
Based on this information, answer the following questions.
a. Why do you think Bibi’s music is played everywhere without any albums being
sold?
b. Do you think the street vendor has the legal right to sell Bibi’s album? Give
reasons for your answer.
c. What are the possible legal consequences for the street vendor if he is
committing copyright infringement?
2.7.2 One of the big trends in online computing is called the Internet of Things (or IoT).
This refers to the increasing number of appliances and gadgets that are now
connecting to the internet, including alarms, fridges, lights, air conditioning,
televisions, security cameras, baby monitors, and even doorbells. However, one of
the main concerns regarding the Internet of Things is that the data sent and
received by these appliances may not be private.
Based on this information, answer the following questions.
a. What is the right to privacy?
b. In your own words, how have computers and the internet affected privacy? Give
an example to support your answer.
c. What do you think the advantages are of having security cameras or baby
monitors that are connected to the internet?
d. Why do you think people are concerned about privacy about the IoT?
2.7.3 In a group, discuss how you feel about the following topics, paying careful attention
to the questions posed in the chapter.
a. Copyright and piracy
b. Privacy
c. Freedom of expression
If group members disagree with your opinion, try to find out why they disagree and
why they see things differently.
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.6 Social implications 59
Answer the following questions by choosing the correct answer for each one.
1. Computers have offered people many significant advantages. Which of the following is not an advantage?
a. saving time b. automating non-repetitive tasks c. connecting people
2. Automation refers to …
a. the use of automatic equipment to complete a job.
b. the use of computers to complete a job.
c. increasing economic competition.
3. One of the advantages of computers is that they increase the accuracy for …
a. people b. machines c. both people and machines.
4. How has the internet increased economic competition?
a. Shops can now charge more for their products.
b. Buyers must now compete with other buyers for the same product.
c. Consumers can now compare a shop’s prices to other prices.
5. Thanks to computers, businesses have become more reliable. This statement is …
a. True
b. False, because computers are unreliable and often crash.
c. False, because most businesses do not use computers.
6. Thanks to the internet, it is possible for anyone to teach themselves new skills. This includes …
a. creating a website. b. becoming a plumber.
c. studying medicine. d. all the above.
7. What is a single switch in a computer known as?
a. Bit b. Byte c. Megabyte d. None of the above
8. Which one of the following is the correct data type that can store a single character? This includes letters,
numbers, and symbols.
a. Float b. Char c. String d. Integer
9. Which one of the following is the correct answer when converting the decimal number 921 to hexadecimal?
a. 450 b. 126 c. 399 d. 349
10. In the file name: C:\Documents\School\MathsAssignment.docx. What does .docx tell you?
a. File name b. Folder c. Extension d. Drive letter
11. Which ONE of the following options describes the type of devices used to keep an electronic record of work
done on a computer?
a. Input b. Output c. Processing d. Storage
12. Ricky grew up in a poor area and his family did not own a personal computer. His parents also did not believe
that children or teenagers should have personal phones. As a result, Ricky’s only interaction with computers and
the internet was at school. After completing school, Ricky received a bursary to study engineering at University.
He moved in to a room at residence and lived on his own. Based on this information, answer the
following questions.
a. What is the digital divide?
b. How do you think Ricky’s lack of computer experience and knowledge will affect his studies? Give reasons
for your answer.
c. Ricky wants to purchase a computer for his studies. In your opinion, what device do you think he should
purchase: a smartphone, a tablet, a desktop, or a notebook? Give at least three reasons for your answer.
d. How do you think access to the internet will help Ricky in his studies?
e. Do you think Ricky has a disadvantage at university compared to students who have more experience with
computers and the internet? Motivate your answer.
f. In small groups, discuss the impact or the potential impact of computers on your life and that of your family.
You can include improvements that computers have made, improvements that you hope computers will
make, problems that you have experienced, or you can simply describe the factors above in relation
to yourself.
13. Choose the answer and write TRUE or FALSE next to the question number. Correct the statement if it is FALSE.
Change the word(s) in bold print to make the statement TRUE if necessary. (You may not simply use the word
‘NOT’ to change the statement.)
a. Computers use billions of tiny ON and OFF switches called transistors.
b. A float refers to several characters, letters, or numbers.
c. Files are data structures that are stored on a computer’s storage devices.
d. A presentation file is a file that stores information in a large table.
e. A single switch (called a byte) can represent the value 1 (when it is switched ON) and 0 (when it is
switched OFF).
14. Answer the following questions.
a. What is a float?
b. List TWO reasons why computers store data.
c. What are folders used for?
d. List ONE difference between a bit and a byte.
e. What window should you use to find out what a file’s unique path is?
f. What is a source code file?
g. Give TWO extensions for a source code file.
h. Differentiate between files and folders.
i. Briefly explain how data is stored in a database.
j. Describe what compressed documents are.
k. Give TWO examples of a text file.
l. Draw a diagram to indicate the following folders and sub-folders in a structure (use these names to create
folders and subfolders): You have files for school, sports, entertainment (series, music), and personal files.
15. In the figure below, identify the five the different parts of a file path.
D:\Movies\Superheroes\Blackpanther.mp4
16. You created a document in Word for your father and saved it as
‘benefits.dox’. When he wanted to open it, Windows displayed
the following message.
a. Explain the importance of file extensions by referring to the
scenario described here.
b. What file extension did you use to save the file?
c. What file extensions should be used to save document files?
d. Why does Windows sometimes ask you how to open the file?
TERM 1 I CHAPTER 2 DATA REPRESENTATION STORAGE AND SOCIAL IMPLICATIONS I UNIT 2.6 Social implications 61
17. Your brother usually downloads movies and music from the internet without paying for them; this can be
considered as unethical.
a. Explain the concept, Ethics.
b. What crime is your brother committing?
c. Briefly explain your answer in (b).
d. If your brother copies work from a non-commercial CC licence. What does it mean?
e. Give your brother ONE tip on how to practice ethics when using the internet.
18. In 2017, the People’s Republic of China banned all websites containing images of Winnie-the-Pooh after
Chinese internet users compared the Chinese president to Pooh Bear. As a result, Chinese internet users would
receive an error message whenever they tried to visit webpages showing Winnie-the-Pooh. Based on this
information, answer the following questions:
a. What is freedom of expression?
b. In general, how has the internet given people more freedom of expression?
c. Do you think freedom of expression is important for people?
d. What are some of the disadvantages of freedom of expression on the internet?
e. Do you think governments (like China) should limit freedom of expression on the internet? Give reasons for
your answer.
19. Convert the given numbers:
a. 1001111002 to decimal.
b. 5E816 to binary
c. Convert the decimal number 100 to hexadecimal.
HARDWARE 3
CHAPTER OVERVIEW
Unit 3.1 Types of hardware
Unit 3.2 Output devices
Unit 3.3 Storage devices
Unit 3.4 Motherboard
Unit 3.5 Computer or smartphone
Learning outcomes
At the end of this chapter, you will be able to:
● describe the different types of hardware, their usage and where they are used
● describe the difference between memory and storage
● compare the hardware components of a computer and a smartphone.
INTRODUCTION
In 1969, the Apollo 11 spacecraft blasted off from Earth to the moon. Four days
later, the spacecraft landed on the moon. Neil Armstrong became the first man to
set foot on the moon and history was written. In order, to guide the spacecraft from
the Earth to the moon, the National Aeronautics and Space Administration (or
NASA) made use of five state-of-the-art computers (for 1969). Each of these
computers were as large as a refrigerator and had only 1 MB of memory. Can you
even imagine that?
This incredible improvement in the power of computers was first measured and
predicted in 1965 by a computer scientist called Gordon Moore. According to Figure 3.1: Today, this phone
Moore’s Law, it states that the number of transistors that can fit onto a circuit could put thousands of
board with a fixed size, doubles every two years. As a result, computers become spacecrafts on the moon
exponentially faster each year.
This chapter will look at the hardware and the improvements in hardware that
made these improvements possible.
Computer hardware refers to the physical parts of a computer and related devices. The internal hardware
parts of a computer are often referred to as components and the external hardware devices are usually
called peripherals.
In this unit, you will learn more about the types of hardware found in a computer. These are:
● Input
● Output
● Memory
● Storage
● Processing
● Communication.
INPUT DEVICES
An input device allows the user to interact directly with a computer. The devices give data and instructions
to the computer, such as:
● keyboards
● pointing devices (mouse)
● touchscreens
● touchpads
● tablet/pen input devices
● game controllers
● cameras
● microphones
● video capture devices
● scanners
● optical readers
● biometric devices
● data collection devices
Disadvantages:
● Takes practice and skill to control
Touchpads (or touch sensitive pads) the position of the cursor using
are small, square pads. By moving the touchpad.
your fingers across the touchpad, ● Moist, sweaty or calloused
you can move the mouse pointer on fingers can disrupt the signals
the screen. picked up by the sensors.
Disadvantages:
Tablets are accurate and, when ● Weaker capabilities than a
combined with the interactive pens, laptop or desktop.
allow artists to create art as if they ● The screen size is small.
were using a pen and paper. ● Fewer ports.
A Wacom tablet is a graphics tablet ● No fixed keyboard.
that is generally used in the graphic
design industry or by digital artists.
Wacom tablets allow a person to
draw by hand, capturing an image or
graphic in digital form. The drawn
image or graphic is then displayed
on the monitor of a connected
computer.
New words
eraser pointer – a pointing device that looks like a joystick or pencil eraser head and sits between the G, H and B
keys. When the eraser pointer is pushed in one direction, the cursor moves in the same direction
resistive touch screen – pressure sensitive touch screens that can be operated with any input device
capacitive touch screens – offer higher clarity for the visually impaired but cannot be operated using other input
devices
infrared touch screens – can be operated by either human touch or stylus and have high clarity
surface acoustic wave (SAW) technology – provides better image clarity, resolution, and higher transmission of
light. The technology has the longest life span and quick response time. It recognises the location and amount of
pressure applied
Cameras Cameras allow you to capture images. They are used for making video
calls, participating in video conferences and recording videos from
your computer.
Microphones Microphones allow you to record sounds and interact with a computer
using your voice.
Video capture Video capture devices allow you to record a live video stream using
devices your computer.
Scanners Scanners allow you to scan pictures of pages (such as, photos or
contracts) directly onto your computer. Scanners are often packaged
with optical character recognition (OCR) software that converts the text
on a picture to text that can be used in a word processing application.
Optical readers Optical readers are devices that can read data from a physical object
(such as, a QR code, barcode or a magnetic strip) into a computer.
Biometric devices These devices read data presented to a computer and compare it with
the saved data. Biometric devices include fingerprint, iris and retina
scanners, but these are not commonly used with desktop computers.
Data collection Data collection devices obtain data directly from a location where an
devices event or transaction takes place.