Year 10 ICT Integrated E Note
Year 10 ICT Integrated E Note
WEEKS TOPICS
5 Mid-Term Examination
7 Mid-Term Break
8 Document production 1
9 Document Production II
11 DOCUMENT PRODUCTION IV
12 Revision
13 Examination
DESCRIPTION
TERM: FIRST TERM
WEEK: 1
TOPIC: Types and Components of a computer system
LESSON OBJECTIVES: At the end of the study, students will be able to;
● Identify the main components of a general-purpose computer: central processing
unit, main/internal memory (including ROM and RAM), input devices, output
devices and secondary/backing storage
● Identify operating systems, including those which contain a graphical user
interface, a command line interface
CONTENT
Internal Components
● Central Processing Unit (CPU): the computer's "brain" that performs calculations,
processes instructions, and controls other components
● Processor: a chip inside the CPU that carries out instructions from a program
● Motherboard: the main circuit board that connects all internal components
Internal Memory
● Random Access Memory (RAM): temporary storage for running programs and
data; it is volatile, meaning data is lost when the computer is turned off
● Read-Only Memory (ROM): permanent storage for essential data, like the
computer's BIOS; it is non-volatile, meaning data is retained even when the
computer is turned off
Hardware Components
● Graphics card: processes images and videos for display on a monitor
● Sound card: processes audio for output through speakers or headphones
● Network Interface Card (NIC): enables connection to a network, such as the
internet
● Camera: captures images or video for input into the computer
● Internal/external storage devices: stores data permanently, such as hard drives
or USB flash drives
● Input devices: allow users to enter data, like keyboards and mice
● Output devices: display or produce results, like monitors and printers
Software
● Software refers to programs that control the operation of a computer or the
processing of electronic data
Application Software
● Application software provides the services that users require to solve a task
● E.g.:
○ Word processing: creating and editing text documents
○ Spreadsheet: organising and analysing data in a grid format
○ Database management systems: storing, retrieving and managing data in
databases
○ Control/measurement: uses sensors to measure and control a system
○ Applets and apps: specialised software for specific tasks
○ Video editing: creating and modifying video files
○ Graphics editing: creating and modifying images
○ Audio editing: creating and modifying sound files
○ Computer Aided Design (CAD): designing and modelling objects in 2D or
3D
System Software
● System software provides the services that the computer requires to operate e.g.
○ Compilers: translating high-level programming languages into machine
code
○ Linkers: combining object files into a single executable program
○ Device drivers: controlling hardware components and peripherals
○ Operating systems: managing the computer's resources and providing a
user interface
○ Utilities: tools for maintaining and optimising the computer's performance
CPU Functions
● Fetches instructions from memory
● Decodes the instructions to determine the required operation
● Executes the operation
● Stores the result back in memory or sends it to an output device
CPU Components
● The CPU is made up of 3 main components:
○ Arithmetic Logic Unit (ALU)
○ Control Unit (CU)
○ Registers
Memory
Memory is used to store data and instructions temporarily for the computer to process
ROM RAM
Evaluation:
CONTENT
Input Devices
Characteristics of Input Devices
● Input devices: allow users to enter data or instructions into a computer system
e.g.:
○ Keyboard
○ Mouse
○ Scanner
○ Microphone
○ Touch screen
Convenient, no
Control devices from
direct physical Limited range, may
Remote Control a distance, e.g., TVs
contact is require line-of-sight
and media players
needed
Enhances
Expensive, limited
Joystick/Driving Simulation and gameplay
use outside of
Wheel driving games experience,
gaming, bulky
realistic control
Accurate
Capture images and Quality depends on
Scanners and reproduction,
convert them into resolution, which
Cameras easy to share
digital format can be expensive
and store
Exam Tip
● Note that a mouse isn't built into a laptop - instead, it would be another pointing
device e.g. trackpad
● All the devices listed here are input devices. Some people think microphones and
webcams are output devices
Direct Data Entry
Reading information
Data can be easily
Magnetic stored on magnetic Fast, simple to use,
erased, and limited
Stripe Reader stripes, e.g., credit reliable
storage capacity
cards, ID cards
Chip and PIN Processing debit and Secure, quick Requires PIN input,
Reader credit card transactions transaction, reduced potential for
in stores fraud risk skimming
Requires a
Scanning QR codes for
Can store more smartphone or
QR Scanner information retrieval or
data, versatile uses specific scanner,
linking to websites
quality dependent
Output Devices
Characteristics of Output Devices
● Output devices: display or produce the results of data processing from a
computer system e.g.:
○ Monitor
○ Printer
○ Speakers
○ Projector
Output
Use Advantages Disadvantages
Device
Displaying
Real-time display, Power consumption,
Monitor computer-generated visual
adjustable settings potential glare
information on a screen
Projecting
Multimedi Requires darkened
computer-generated images Large display, good
a room, expensive
and videos onto a larger for presentations
Projector bulbs
surface
Creating large-format
High accuracy, can
graphics, such as Slow, expensive,
Plotter print on various
architectural plans and large size
materials
engineering designs
Evaluation
Differences between Input & Output Devices
What is direct data entry?
DESCRIPTION
TERM: FIRST TERM
WEEK: 3
TOPIC: Storage devices and media
LESSON OBJECTIVES: At the end of the study, students will be able to;
CONTENT
Storage
Characteristics of Backing Storage
● Backing storage: long-term storage used to store data, files, and programs when
not in use e.g.:
○ hard disk drives (HDD)
○ solid-state drives (SSD)
○ USB flash drives
○ optical discs (CDs, DVDs)
● Backing storage is typically slower than internal memory but has a larger
capacity
● It is non-volatile, meaning it retains data when the computer is powered off
Storage Media
Storage
Examples Use Advantages Disadvantages
Media
Memory
cards (SD,
Fast data storage
Solid-St xD, Fast access More expensive,
for portable devices
ate time, no limited write cycles
and modern
Media CFast), USB moving parts
computers
Drives, Solid
State Drives
Evaluation
Differences between Backing Storage & Internal Memory
TERM: FIRST TERM
WEEK: 4 $ 5
TOPIC: Types and Components of a computer system
LESSON OBJECTIVES: At the end of the study, students will be able to;
CONTENT
● The general format for a MAC address is that each pair of hexadecimal digits are
separated by a “-”
● An example of a MAC address:
○ Microsoft has an OUI of 00-15-5D,
○ a new laptop straight out of a Microsoft production line could have a MAC
address of “00-15-5D-45-1B-3F”
Maximum range
30 meters 100 meters (depending on obstructions)
(meters)
Maximum transfer
speed
3 Mbytes /
75 Mbytes / Sec
Sec
(Depending on the
standard being used)
Cloud Computing
● Cloud computing is a method where data is stored on remote servers and
accessed through the internet
● Local storage refers to a storage device that is connected to the computer
● The three types of cloud storage are:
○ Public Cloud - The customer and the cloud storage provider are different
companies
○ Private Cloud - The customer and the cloud storage provider are a single
organisation
○ Hybrid Cloud - Combines both public and private cloud options and allows
for sensitive data to remain private whilst providing public cloud services
for less sensitive information
● Cloud data is duplicated and stored on other servers to ensure data availability
during system failures, upgrades and maintenance periods
Internet
● The Internet is a very large global network that consists of many other
interconnected networks
● The world wide web is the vast collection of web pages that can be accessed
using a web browser
● The world wide web allows you to access information by using the internet
Exam Tip
● You must be very clear about the difference between the World Wide Web and
the Internet
The Internet has many uses and plays a critical role in our lives. This can include;
Characteristics of an Intranet
● Private
○ An intranet is a private network that is accessible to employees within a
company or organisation
● Security
○ An intranet is usually behind a firewall to ensure security and that only
authorised users can access it
● Sharing and Communication
○ An Intranet allows for document sharing and the use of collaboration tools
between users. It can also allow the use of email and video calling to
enable efficient communication within the organisation
● Customisation
○ An intranet can be customised to meet the specific requirements of the
business such as navigation and subject content as well as the service
being able to be scaled up as the business grows
● Users will require a username and password to access the Intranet
Extranet
● An extranet is a private Intranet that also allows access by selected parties that
reside outside of the organisation. These parties, for example, maybe customers,
key stakeholders or clients
● External users will have an authorisation level once they have successfully
logged in which will determine which resources they may access
WAN
● Wireless LANs (WLANs) are Local Area Networks that allow devices to connect
wirelessly rather than using physical cables
● Wireless Access Points (WAPs) are connected to an existing wired network
which provides a means to connect wirelessly
● Wireless Access Points use spread spectrum technology that has a range of
around 30 to 50 metres compared to Infrared which has a range of around 3
metres
● WLANs are often used when it is not practical to use cable or devices that will
access the network do not have Ethernet ports
● WLANs support a vast range of devices such as smartphones and laptops and
are very popular in public areas such as shopping malls
● Advantages of a WLAN include:
○ Mobility - WLAN allows users to connect anywhere that is in the range of a
Wireless Access Point (WAP) without the need for additional hardware or
wiring.
○ Flexibility - WLANS can be used in a variety of environments both indoors
and out making them highly flexible
○ Scalability - As the requirements change, additional Wireless Access
Points can be added relatively easily resulting in additional users being
able to use the network or increased network coverage
○ Wireless devices have access to peripherals such as printers
● Disadvantages of a WLAN include:
○ Coverage - WLANS are limited in their coverage and can be further
affected by walls and other structures
○ Bandwidth - Bandwidth speeds can become an issue in high traffic areas
○ Interference - WLANs can sustain interference from other devices which
can affect performance and connectivity
○ Security - WLANs can be vulnerable to security threats due to wireless
signals being intercepted
Security Issues
When moving electronic data from one place to another, there are different types of
security concerns to consider:
Data interception can occur when an unauthorised user intercepts data being
transferred.
Packet sniffing
Using HTTP instead of HTTPS protocols when dealing with sensitive information
Depending on whether the data being sent is sensitive will depend on the level of
security needed to ensure it stays safe
All types of information will need to be transferred from one place to another at some
point but typical examples may include:
When dealing with personal or sensitive data it is essential that not only is it protected
from hackers but also that it is protected from accidental disclosures such as:
Passwords
● Passwords are a common form of security and are often accompanied by a
username or email address
● This type of security is often seen when accessing online banking, virtual
learning environments, email accounts and many more
● There are many ways to enhance the security of your password such as the
following:
○ Ensure that the password is changed regularly in case it has been
obtained illegally or accidentally
○ Ensure that the password uses a combination of uppercase, lowercase,
numbers and symbols to make the password more difficult to guess
○ iloveict is a weak password
○ 1lov3ICT# is a strong password
● Passwords should not contain personal information related to you such as your
date of birth, your name or the name of your pet
● Anti spyware software can be run regularly to ensure that your information
including your password is not being passed to an unauthorised third party user
Authentication
● There are also other forms of authentication aside from passwords that utilise
what is known as “zero login”
● This aims at removing or reducing the need for the user to manually input their
details and instead rely on the system to verify the users credentials
automatically
● One such type is known as biometrics where the user's fingerprints or facial
features are scanned to provide unique biometric information to authenticate the
user's details.
● Newer methods of zero login types of authentication include the use of networks,
location, device data and human behavioural patterns to recognise users
automatically.
● Although these methods offer many advantages there are some concerns that
need to be taken into consideration. They include:
○ What personal data is being collected?
○ Is the collected data being kept securely?
○ Will it log in and out at the correct times?
Smart Cards
● Smart Cards are cards that contain a chip and can be used as contactless
● The card does not need to be inserted or swiped through a machine and can be
detected from a short distance away
● Personal identification information can be stored on the card such as name,
address, date of birth and/or banking information
● The information on the card is encrypted which means it can only be read by
authorised devices
● Often the card will require a personal identification number (PIN) which is needed
to access the information, providing an additional layer of security
● Advantages of smart cards include:
○ Durable
○ Use for a wide range of applications (Payments, Access Control, Storing
personal data
○ Enhanced security (Compared to standard cards)
● Disadvantages of smart cards include:
○ Risk of loss
○ Initial Infrastructure requirements
○ More expensive compared to traditional cards
Physical Tokens
● A Physical Token enables authentication with the use of a small physical device
● To access a system that uses a physical token, a user will enter their username
and password into the system, and then enter the security code generated by the
token
● The physical token can be directly connected to the device that the user is trying
to access or the physical token will generate one time password (OTP) which is
then entered into the system manually
● To obtain a one time password (OTP) the user will enter their personal
identification number (PIN) and any other authentication requirements into the
physical token device. If all requirements are satisfied then an internal clock will
be used to generate the one time password (OTP) which is displayed on its
screen
● To enhance security, the one time password (OTP) changes frequently and each
code will only be valid for a short period of time (usually within 1 minute)
● Advantages of physical tokens include:
○ Offline authentication
○ Portable
● Disadvantages of physical tokens include:
○ Cost
○ Loss or theft of the physical token
○ Physical dependance
Anti-malware
● Anti-Malware (also known as Anti Virus software) is designed to protect devices
against viruses and malicious software
● Anti-malware has 3 mains purposes, detect, prevent and remove malicious
software
● Anti-Malware is installed onto a computer system and will operate in the
background
● Common features of Anti-Malware software include the following:
○ Comparing the scanned files against a large database of known threats
○ Real-time scanning
○ Regular updates to gather an up to date list of known threats
○ Quarantine of infected files
■ Quarantining files allows threats to be automatically deleted
■ Allows the user to determine if the file is a legitimate threat and not
a false positive
○ Scanning external storage media such as USB flash drives to prevent
viruses from being loaded onto the computer system
■ The scanning of downloaded software to ensure that it is free from
any threats
○ Heuristic checking
■ This is the identification of potential threats within a file from
behavioural patterns and characteristics rather than just relying on
a database of known viruses
Evaluation:
Evaluation
Explain ways to eradicate security issues
Explain the types of network with their advantages and disadvantages
Differentiate between an intranet and extranet
DESCRIPTION
TERM: FIRST TERM
WEEK: 8-9
TOPIC: Document Production
LESSON OBJECTIVES: At the end of the study, students will be able to;
● Create and edit a document
● Creating a Table
● Formatting a Table
● Create and Edit headers & footers
CONTENT
Tables
Creating a Table
● Tables are created by specifying the desired number of rows and columns
● This can typically be done through a menu option or a shortcut in most word
processing software
Formatting a Table
● Tables can be formatted to improve readability and visual appeal. Here are a few
options:
○ Set horizontal cell alignment: Choose whether the text is aligned to the
left, right, centre, or justified within a cell using the normal alignment
options
○ Set vertical cell alignment: Set text to align at the top, middle, or bottom of
a cell
○ Show or hide gridlines: Display or hide the lines that make up the table
○ Wrap text within a cell: Make text automatically move to the next line when
it reaches the edge of a cell
○ Shading/colouring cells: Apply a colour to the background of a cell
○ Adjust row height and column width: Change the size of the cells in your
table to better fit your content
Headers & Footers
Headers and Footers are areas at the top (header) and bottom (footer) of a page in a
document where you can add text or graphics
CONTENT
Setting Tabulation
● Tabulation options include left, right,
centred, and decimal tabs
● Special paragraph formats include
indented paragraphs and hanging
paragraphs
Text Enhancement
● Text can be enhanced using bold, underline, and italic
● Superscript and subscript options are available for specialised text, and changes
in case can be made
Evaluation
Bookmarks
What is a Bookmark?
● A Bookmark is a tool used in digital documents to mark a specific place for easy
navigation in the future
Adding Bookmarks
● Adding bookmarks can be done by selecting the text you want to bookmark, and
then choosing the 'Add Bookmark' option from the menu
Deleting Bookmarks
● Bookmarks can be deleted through the 'Bookmark' menu
● Just select the bookmark you wish to delete and choose the 'Delete' option
Using Hyperlinks with Bookmarks
● Hyperlinks can be linked to bookmarks, making it easy to navigate to a specific
spot in a document from anywhere within the document