Grade 10 IT All Theory
Grade 10 IT All Theory
Grade 10 IT All Theory
THEORY
System Technology:
BASIC CONCEPTS OF COMPUTING
Information and Communication
Technology
ICT, or information and communications technology (or
technologies), is the infrastructure and components that
enable modern computing.
Although there is no single, universal definition of ICT, the
term is generally accepted to mean all devices, networking
components, applications and systems that combined allow
people and organizations (i.e., businesses, nonprofit
agencies, governments and criminal enterprises) to interact
in the digital world.
Information Technology
The study or use of systems (especially computers
and telecommunications) for storing, retrieving,
and sending information.
What is a computer?
A computer is an electronic device that manipulates
information, or data. It has the ability to store,
retrieve, and process data. You may already know
that you can use a computer to type documents,
send email, play games, and browse the Web.
Main components of a computer system
HARDWARE - PHYSICAL FEATURES, WHICH ARE SOFTWARE - IS A SET OF INSTRUCTIONS, DATA OR
EVERY PART THAT YOU CAN EITHER SEE OR TOUCH, FOR PROGRAMS USED TO OPERATE COMPUTERS AND EXECUTE
EXAMPLE: MONITOR, CASE, KEYBOARD, MOUSE, AND SPECIFIC TASKS.
PRINTER.
Increase your productivity. ... Carpal tunnel and eye strain. ...
Connects you to the Internet. ... Too much sitting. ...
Can store vast amounts of information and reduce Short attention span and too much multitasking. ...
waste. ...
Helps sort, organize, and search through information. ... Can limit learning and create a dependency. ...
• "In the computer it's all 0's and 1's" ... bits • e.g. 0 1 0 1 1 0 1 0
• Anything with two separate states can store 1 bit • One byte can store one
character, e.g. 'A' or 'x' or '$'
• In a chip: electric charge = 0/1
• In a hard drive: spots of North/South magnetism
= 0/1
• A bit is too small to be much use
• Group 8 bits together to make 1 byte
Overview of number systems
Number system is a way to represent numbers. We are used to using the base-10 number
system, which is also called decimal. Other common number systems include base-16
(hexadecimal), base-8 (octal), and base-2 (binary).
Conversions
DECIMAL TO BINARY BINARY TO DECIMAL
Conversions
DECIMAL TO HEXADECIMAL HEXADECIMAL TO DECIMAL
Digital Character Representation
Character Representation.
Everything represented by a
computer is represented by binary
sequences. A common non-integer
to be represented is a character. ...
A standard code ASCII (American
Standard for Computer Information
Interchange) defines
what character is represented by
each sequence.
Social Implications
Licence agreements
An End-User License Agreement (EULA) is a type of licensing contract between you and the
purchaser of your software. ... The SLA is a legal agreement between the customer and the
service provider that sets out details of the service itself, rather than the
relationship between the parties.
When you install proprietary software, you have to agree to terms and conditions in the license
agreement. This is an actual agreement and can contain information, such as: The software
cannot be modified or changed. Copies of the software cannot be made and distributed.
Social issues
PIRACY COPYRIGHT COPYLEFT
Spam – Spam refers to irrelevant, unsolicited emails sent over the internet, typically to
many users. Spam emails are often used for advertising, phishing and spreading
malware.
oPhishing – Phishing attacks try to obtain sensitive information (such as usernames,
passwords and banking details) by sending emails to users that look like official emails.
oEmail spoofing – With email spoofing, the attacker forges the address from which the
email is sent to pretend that the email is sent from a different person.
oPharming – Pharming attacks create an official-looking website that requests sensitive
information.
Safe email and Internet use
Email safety tips Internet safety rules
Change your password regularly Keep Personal Information
and keep it in a safe place. Professional and Limited.
Don't share your password with Keep Your Privacy Settings
anyone. On.
Don't open attachments from Practice Safe Browsing.
anyone you don't know.
Make Sure Your Internet
Log out or sign off from your Connection is Secure.
account when you've finished
looking at/sending your email. Be Careful What You
Download.
Don't reply to spam or forward
chain emails. Choose Strong Passwords.