0% found this document useful (0 votes)
39 views8 pages

IT Gr12 Theory Eng Contents

Uploaded by

msamodien786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views8 pages

IT Gr12 Theory Eng Contents

Uploaded by

msamodien786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

IT is gr8!

@ Grade 12
Theory

Chris Noomé Keith Gibson


Pam Macmillan Ulza Wassermann

i
Published by Study Opportunities
PO Box 52654, Dorandia, 0188
Tel: (012) 565-6469
Fax: (012) 546-5313
E-mail: study.opp@mweb.co.za
www.studyopportunities.co.za

January 2015

ISBN: 978-1-920535-14-8

© Study Opportunities

Copyright strictly reserved. No part of this publication may be reproduced


or transmitted in any form or by any means, electronic or mechanical,
including photocopying, recording or by any information storage or
retrieval system, without permission in writing from the publisher.

DTP, layout and design by Ronelle Oosthuizen


Cover design by Suzanne Jacobs

ii
contents
Section 1: Systems Technologies.......................................................................................1
Module 1.1: Hardware..................................................................................................... 2
Module 1.2: Cloud computing........................................................................................ 15
Module 1.3: Computer management............................................................................. 24

Section 2: Communication and Internet Technologies.........................................31


Module 2.1: Network configuration............................................................................... 32
Module 2.2: Security concepts....................................................................................... 43
Module 2.3: The evolving Web....................................................................................... 50
Module 2.4: Internet Services Technologies...................................................................62

Section 3: Social Implications............................................................................................71


Module 3.1: Keeping up with technology....................................................................... 72
Module 3.2: Computer crimes and criminals.................................................................78
Module 3.3: Critical computing...................................................................................... 88
Module 3.4: The impact of social networking on society...............................................92

Section 4: Data and Information Management.....................................................99


Module 4.1: Database design and concepts.................................................................100
Module 4.2: Database management............................................................................ 113
Module 4.3: Data collection, warehousing, mining......................................................119

Section 5: Case Studies......................................................................................................131


Module 5.1: Case Studies Term 1................................................................................. 132
Module 5.2: Case Studies Term 2................................................................................. 146
Module 5.3: Case Studies Term 3................................................................................. 153
Module 5.4: Case Study Term 4.................................................................................... 158

iii
table of contents
Section 1: Systems Technologies.................................................................... 1
Module 1.1: Hardware..................................................................................... 2
Introduction....................................................................................................................................2
Mobile technologies.......................................................................................................................2
Examples of mobile technologies, Advantages of mobility, Constraints on mobile technologies,
Factors influencing the performance of a computer......................................................................6
CPU, Memory, Cache, Storage, Network, Graphics processing ability, Bus performance
Hardware recommendations..........................................................................................................9
System unit recommendations, Peripherals or devices that connect to the computer

Module 1.2: Cloud computing........................................................................ 15


What is cloud computing?............................................................................................................15
Examples of cloud computing......................................................................................................15
Online storage – file syncing, Online storage – backup, Media repositories, Cloud applications
Software as a Service....................................................................................................................18
How cloud computing affects hardware needs............................................................................20
Cloud computing and virtualisation.............................................................................................20
Risks and benefits of cloud computing.........................................................................................20

Module 1.3: Computer management............................................................. 24


Introduction..................................................................................................................................24
Security.........................................................................................................................................25
Installing and updating anti-virus software, Using a firewall, Keeping all your software up to date,
Being aware of current trends in computer crime, Applying common sense, Following a good
password policy
Saving time...................................................................................................................................26
Defragmenting the hard drive, Managing files and folders, Remembering hardware requirements
Reliability......................................................................................................................................27
Following a good backup program, Being prepared for a re-build, Upgrading software and
hardware

Section 2: Communication and Internet Technologies......................31


Module 2.1: Network configuration............................................................... 32
Setting up a network ...................................................................................................................32
Essential equipment, Connecting to the Internet
Sharing of files and folders...........................................................................................................34
Permissions, User rights, BitTorrent, Online services
Remote access..............................................................................................................................39
Remote controlling a computer, Virtual private network (VPN)

iviv
Module 2.2: Security concepts....................................................................... 43
Introduction..................................................................................................................................43
Encryption ...................................................................................................................................43
Local encryption, Automatic encryption
SSL (Secure Sockets Layer)............................................................................................................45
Public key encryption, Certificates and security

Module 2.3: The evolving Web...................................................................... 50


The Internet is everywhere..........................................................................................................50
The role of searching....................................................................................................................50
Improved searching......................................................................................................................51
Profiled or customised searches, Context-aware searches, Mediated searches,
Semantic searches (and the semantic web)
Current usage trends....................................................................................................................55
The cloud, The ‘appification’ of the Web, The ‘Internet of Things’

Module 2.4: Internet Services Technologies................................................... 62


Introduction .................................................................................................................................62
Data storage for web applications................................................................................................62
Storing data locally, Storing data online
Running instructions....................................................................................................................64
JavaScript, Server-side instructions, scripting or programming, SQL-stored procedures,
The really interactive web – AJAX
Formatting output .......................................................................................................................66

Section 3: Social Implications.........................................................................71


Module 3.1: Keeping up with technology....................................................... 72
How to stay informed...................................................................................................................72
How to be ‘green’.........................................................................................................................73
IT waste / e-waste, Power
How to keep your software up to date.........................................................................................75

Module 3.2: Computer crimes and criminals.................................................. 78


Introduction..................................................................................................................................78
Computer criminals......................................................................................................................78
Hacker, Cracker, Virus author, Cybergang, Spammer
Types of cybercrime.....................................................................................................................80
Theft, Abuse and extortion
Effects of cybercrime....................................................................................................................84
A sad reality..................................................................................................................................85

Module 3.3: Critical computing...................................................................... 88


Computers and decision-making..................................................................................................88
Decision Support Systems (DSS), Expert systems / Knowledge-based systems
Distributed computing.................................................................................................................89

v
Module 3.4: The impact of social networking on society................................ 92
Introduction ................................................................................................................................92
Social networking and information overload...............................................................................92
Social networking and personal information...............................................................................93
Search engines and personal information, Group communications and personal Information,
Social networking and social engineering
Social networking and culture......................................................................................................95
Social networking, politics and the environment.........................................................................95
Wikis ............................................................................................................................................95
Connectivity and privacy..............................................................................................................96

Section 4: Data and Information Management.................................. 99


Module 4.1: Database design and concepts................................................. 100
Relational database overview....................................................................................................100
Basic database design................................................................................................................102
Step 1: Selecting the data, Step 2: Structuring data
Concepts that improve design....................................................................................................107
Data integrity, Data redundancy, Data independence, Data security

Module 4.2: Database management............................................................ 113


Managing and protecting data...................................................................................................113
Validation, Verification, Integrity, Access control, Logging changes (audit trail), Parallel data sets
(mirroring), Warehousing
Data as a hacking tool................................................................................................................115
Database management – Who does what?...............................................................................116
Database administrator (DBA), Programmers

Module 4.3: Data collection, warehousing, mining...................................... 119


Data collection............................................................................................................................119
RFID, ‘Invisible’ data capture, Location-based data, Online data collection
Data warehousing......................................................................................................................125
Data mining – the art of discovering knowledge........................................................................126
What is data mining?, What role do people play in data mining?

Section 5: Case Studies................................................................................... 131


Module 5.1: Case Studies Term 1................................................................. 132
Module 5.2: Case Studies Term 2................................................................. 146
Module 5.3: Case Studies Term 3................................................................. 153
Module 5.4: Case Study Term 4.................................................................... 158

vi
Work Plan
Grade 12 is different from the last two years – mainly because of the Matric exam at the
end of the year. In this exam you will be expected to know ALL the theory work that you
covered in Grades 10–12.
Modules 5.1 to 5.3 in this book have been created to help you revise Gr10/11 work.
We recommend that, before you tackle a Grade 12 module, you first revise the related
Gr10/11 work as set out below.

Term 1
Modules to be completed Gr10/11: REVISE FIRST!

Module 5.1: Case Studies Term 1:


Module 1.1: Hardware
Basic concepts of computing, Hardware, Pages 132 – 136

Module 5.1: Case Studies Term 1:


Module 2.1: Network configuration
Introduction to networks, Pages 136 – 139

Module 5.1: Case Studies Term 1:


Module 2.2: Security concepts
E-communications, Pages 139 – 141

Module 5.1: Case Studies Term 1:


Module 3.1: Keeping up with technology
ICT issues, Pages 141 – 142

Module 5.1: Case Studies Term 1:


Module 4.1: Database design and concepts
Data and databases, Pages 142 – 145

Module 4.2: Database management

Term 2
Modules to be completed Gr10/11: REVISE FIRST!

Module 5.2: Case Studies Term 2:


Module 1.2: Cloud computing
Software, Pages 146 – 148

Module 5.2: Case Studies Term 2:


Module 1.3: Computer management
Computer management and safety, Pages 149 – 151

Module 5.2: Module 5.2: Case Studies Term 2:


Module 3.2: Computer crimes and criminals
IT in society and the workplace, Pages 151 – 152

vii
Term 3
Modules to be completed Gr10/11: REVISE FIRST!

Module 5.3: Case Studies Term 3:


Module 2.3: The evolving Web
Internet and WWW, Pages 153 – 156

Module 5.3: Case Studies Term 3:


Module 2.4: Internet Services Technologies
Internet Services, Pages 156 – 157

Module 3.3: Critical computing

Module 3.4: The impact of social networking on society

Module 4.3: Data collection, warehousing, mining

Term 4
Complete Case Study

Module 5.4: Case Study Term 4

Tips for Gr10/11 revision:


• Revise your summaries or notes of previous years.
• Revise the glossary items and complete the activities in the relevant
Case Studies modules.

viii

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy