100% found this document useful (1 vote)
207 views

KS3 Ict Notes

The document discusses various networking devices and concepts including routers, network interface cards, modems, Ethernet, WiFi, data packets, IP addresses, protocols, URLs, HTTPs, HTML, search engines, and more. It also discusses databases, queries, reports, and spreadsheets.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
207 views

KS3 Ict Notes

The document discusses various networking devices and concepts including routers, network interface cards, modems, Ethernet, WiFi, data packets, IP addresses, protocols, URLs, HTTPs, HTML, search engines, and more. It also discusses databases, queries, reports, and spreadsheets.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 47

Kitengela International School (BIC)

Year 7-9 ICT Notes, Term 2, 2022


By: Mr. Adoli
Networks and effects of using them
Network devices – they includes devices such a hub or switch, a router, cabling, WiFi
technologies, Network cards and modem.
a)A router- a device that is used to forward data packets a long networks.
It can connect two dissimilar networks.
it provides a link between two or more networks.
Reasons why router are intelligent
i) They make decisions on whether a message should be passed between the
network.
ii)Make the format of the message suitable for the network.
Routers
b) Network interface cards

- It provides hardware interface between the computer and the network which

can be wired or wireless.

- Newer computers have NIC built onto the motherboard.

Network interface card


c) Modem – converts digital data signal from a computer to analog
(modulation), at the receiving end, the modem also converts back
the analog signal back to digital(demodulation)

Modem
d) Ethernet
- Wiring and signaling in LAN.

e) WiFi – wireless network technology that allows communication via radio waves
to connect devices to a LAN.

Mobile networks

They  enables wireless communication using mobile devices, such as mobile


phones, smart phones or tablets.

They provide the necessary infrastructure and are operated by mobile phone
providers.
Network data speed

Internet speed refers to the speed which data or content travels from the World
Wide Web to your home computer, tablet, or smartphone.

The speed of this data is measured in megabits per second (Mbps) or Gbps.

One megabit is equal to 1,024 kilobits.


Internet

The Internet is a vast network that connects computers all over the world.

Through the Internet, people can share information and communicate from
anywhere with an Internet connection.

The World Wide Web (WWW,) W3, or the Web—is an interconnected system
of public webpages accessible through the Internet.

The Web is not the same as the Internet: the Web is one of many applications
built on top of the Internet
Data packet

- A packet is a small segment of a larger message.

- Data sent over computer networks, such as the Internet, is divided into packets.

- These packets are then recombined by the computer or device that receives
them.

N/B A network is a group of two or more connected computers.

- The Internet is a network of networks — multiple networks around the world


that are all interconnected with each other.
Network Packet Header

• The header contains the sender’s address, receiver’s address, protocol, and packet
number.

a) Sender’s address - indicates where the packet is coming from.

b) Receiver's address - points to the receiving IP address.

c) The protocol - identify what type of packet is being transferred, whether it is an


email, a web page, a video, etc.

d) The packet number – each packet has two identifying numbers; the first indicating
how many packets a piece of information was split into, and the second indicates the
place of the individual packet as a part of the complete information.
Network servers

Network servers are dedicated computers connected to a network that

run software intended to process client requests and provide

appropriate responses.

The server can more specifically relate to the software itself, but a

network server tends to incorporate the physical system this software

runs upon.
1. URL Uniform resource locator

• - URL is an acronym for Uniform Resource Locator and is a reference


(an address) to a resource on the Internet.

• A URL has two main components:

a) Protocol identifier: For the URL http://example.com , the protocol


identifier is http.

b) Resource name: For the URL http://example.com , the resource


name is example.com .
2. HTTP
- Hypertext Transfer Protocol (HTTP) is an application-layer protocol for

transmitting hypermedia documents, such as HTML.

- It was designed for communication between web browsers and web


servers, but it can also be used for other purposes

• HTTPS -Hypertext Transfer Protocol Secure (HTTPS) is an extension of


the Hypertext Transfer Protocol (HTTP).

• It is used for secure communication over a computer network, and is


widely used on the Internet.
3. HTML is the standard markup language for Web pages.

With HTML you can create your own Website. 

HTML is easy to learn 

4. Search engines - A search engine is a software system that is


designed to carry out web searches.

They search the World Wide Web in a systematic way for particular
information specified in a textual web search query
A Web filter software is a piece of software designed to restrict what
websites a user can visit on his or her computer.
Web browsers- is application software for accessing the World Wide
Web or a local website.
Objectives
• Know how digital devices can receive information (satellite, cable,
broadcast)
• Understand why appropriate wireless communication protocols (Wi-
Fi, Bluetooth®, Near-field Communication (NFC)) should be
Satellites
A satellite is a self-contained communications system with the ability
to receive signals from Earth and to retransmit those signals back.
WIFI
WiFi network is an internet connection that's shared with
multiple devices in a home or business via a wireless router.

The router is connected directly to your internet modem and


acts as a hub to broadcast the internet signal to all your Wi-Fi
enabled devices.
Bluetooth
Bluetooth technology allows devices to communicate with each
other without cables or wires.

 Bluetooth relies on short-range radio frequency, and any device


that incorporates the technology can communicate as long as it
is within the required distance.
WIFI vs Bluetooth
CCTV

Closed-circuit television (CCTV),
also known as video surveillance
-It is the use of video cameras to
transmit a signal to a specific place,
on a limited set of monitors. 
Eavesdropping
Eavesdropping is the act of secretly or stealthily listening to the private
conversation or communications of others without their consent in order to
gather information.
Gps location data
- GPS provides latitude-longitude coordinates gathered by the
hardware on a device which communicates with a satellite such as a
car navigating system, a mobile phone or a fitness tracker.

- The latitude/longitude coordinates generated by the GPS are


considered the standard for location data.
Social media posts
- It is the content shared on social media through a user's profile.
- It can be as simple as a blurb of text, but can also include images,
videos, and links to other content.
- Other users of the social network can like, comment, and share the
post.
Access
Flat file vs relational databases

A flat file database stores data in a single table structure.

A relational database uses multiple table structures, cross-


referencing records between tables.

Tables in both organize records in rows, with each column containing


a single piece of data in the record.
Structure of relational database
a) Tables
• A relational database is a collection of related data tables.
• Columns (field) describe the specific pieces of information in the table and
each row stores the corresponding data (record).
b) Primary Keys
• A primary key is one column or compilation of several columns that has a
unique value, making each row unique in the table.
c) Foreign Keys
• A foreign key is the primary key from another table and is used to relate
rows of data between tables.
Access relationship
Here, the data in one table is related to the data in other tables.
Tables can be related in one of three different ways:
one-to-one
one-to-many
many-to-many.
Foreign
key
• A foreign key is a field (or fields) in one table that references the
primary key in another table.

• A foreign key is a column or group of columns in a relational


database table that provides a link between data in two tables.

• It acts as a cross-reference between tables because it references the


primary key of another table, thereby establishing a link between
them
Foreign key diagram
Field data types (text, number, date/time, logical/Boolean)
1. TEXT
Short Text (formerly Text) is a simple data type.
A field with this data type is limited to a maximum of 255 characters in length,
which is controlled by field size.  
Long Text (formerly Memo) is a complex data type because it’s stored in “pages”
A Long Text field can store up to 65,536 characters if the data is entered into
Access directly 
2. NUMBER

It is used to store numerical values.

3. DATE/TIME

• Date/Time is stored as a number.

• The “whole” part of the number measures the days that have passed since
December 30, 1899.

• The decimal portion indicates the fraction of a day, where midnight is 0 and
noon is 0.5.
4. Boolean /YES/NO/Logical
Yes/No fields can only contain one of two values: Yes or No, True or False,
On or Off. It can never be null. This can create issues, so it can be more like a
complex data type that needs special handling. Sometimes, you may choose to
use the Integer data type instead.
Queries
A query is an Access object used to view, analyze, or modify data.

The query design determines the fields and records you see and the
sort order.

1. Single criterion

2. Multiple criterion

3. Logical operators
Purpose of reports
Report is used to display and print your data in an organized manner.
The Navigation Pane is where you can find all of the saved reports in the
database
Spreadsheet – ms excel
1. Formatting options for data in a spreadsheet (currency,
percentage, decimal places, date/time)

2. Basic formulae - including add, subtract, multiply and divide in a


spreadsheet.

3. Basic functions in a spreadsheet (SUM, AVERAGE, MAX, MIN,


COUNT, LEN)
4. Using multiple worksheets, sorting and filtering.

5. Purpose of graphs and charts (pie chart, line graph, bar/column


chart, scatter graph)

6. Formatting of graphs/charts (title, axis labels, colour, legend)


WEB AUTHORING
- Structure of a web page.
a) Head
• <html>: This element wraps all the content of the page
• <head>: This element designates the header part of the
document.
You can include optional information about the Web page,
such as the title (the browser shows it in the title bar), optional
search keywords and an optional style sheet
a) Body - This element contains the content of your Web page, that is,
what we want to appear in the navigation area of the browser

- web design terminology, including hyperlinks, bookmarks and


anchors.

• Role of WYSIWYG (what you see is what you get)

• software and the use of HTML to create a web page


Presentation
Features of presentation software.
Text and image formatting.
Inserting buttons, hyperlinks to internal and external content.
 animation effects.
 transition effects.
embedding multimedia content.
including videos)
 The importance of the selection of appropriate images and content to meet
the needs of the audience.
Software skills: graphics and digital photo-editing
Difference between bitmap and vector graphics.

The main difference between bitmap and vector images is


how the image is constructed.

- Bitmaps are blocks of colors assembled in a grid format


while vectors are shapes and colors built on mathematical
formulas.
1. Bitmap (Raster) Images

The most common image files are Bitmap or raster images which are composed of little blocks of color
called pixels organized in rows and columns.

Each pixel is assigned a color code and a location, and when mapped together, they form a picture.

When you zoom in on a bitmap image, you can see the individual pixels, so there’s a loss of quality.

This is commonly referred to as resolution-dependent since the quality or sharpness of the image depends
on the resolution.
Common bitmap image file types include:

• .jpeg (or .jpg)

• .png

• .gif

• .bmp
• Vector Graphics
- Vector images are based on geometrical formulas (mathematical equations) based on
paths, instead of pixels, to represent images.

- Because of that, it’s possible to edit it resizing and changing colors without any loss of
resolution, making them ideal for icons, logos, and web-based imagery.

- This makes vector images resolution-independent since the image quality isn’t affected by
size or resolution settings.

- Made up entirely of shapes like rectangles, circles, curves and lines, vectors are drawn and
then filled or stroked with color to create a vector image.

- Individual components of the image (or paths) can also be modified, edited, and resized
without impacting the image.
• Commonly used for illustrations, line art, logos, and icons- vector images

are computer-generated and cannot be used (at least not practically) for

photographs or photo-realistic images, which are better suited for

bitmaps.

Common vector image filetypes include:

• .svg

• .eps

• .pdf
Graphics and photo-editing techniques
- Image adjustment and enhancement.
- Crop.
- Colour
- Adjustment
- Resizing
- Painting
- Erasing)
- Use of appropriate file type and compression options to save an image to
meet the needs of the audience.
Software skills: file handling
- Use of cloud-based services (hosted applications, hosted storage).
- Use of permission-based file sharing.
- Reason for using file compression tools

You might also like