0% found this document useful (0 votes)
103 views20 pages

P2 Scope GR 11-June 2025 by Sirantwi

The document outlines key concepts in systems technologies for Grade 11, focusing on the uses of ICT, data processing, hardware components, and software functionalities. It discusses the importance of understanding data, information, and knowledge, as well as the various types of computing devices and their features. Additionally, it covers network technologies, health risks associated with technology use, and the significance of digital literacy and career paths in the ICT field.

Uploaded by

mashaprecious16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views20 pages

P2 Scope GR 11-June 2025 by Sirantwi

The document outlines key concepts in systems technologies for Grade 11, focusing on the uses of ICT, data processing, hardware components, and software functionalities. It discusses the importance of understanding data, information, and knowledge, as well as the various types of computing devices and their features. Additionally, it covers network technologies, health risks associated with technology use, and the significance of digital literacy and career paths in the ICT field.

Uploaded by

mashaprecious16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

PAPER 2 OUTLINE:-GRADE 11

BY SIRANTWI

Systems technologies-QUESTION 4 /9 AND 10


1. General concepts
• USES OF ICT

• Data, information, knowledge and conclusions


o Data: raw, unprocessed facts or figures without meaning.
▪ Examples of data are: numbers, symbols,Item, or
observations—like "100," "25.5," or "blue."
o Information: processed data that are meaningful.
▪ Example 100oC—that is boiling point of water at sea level

Using a scenario of weather data:

• Data: "30," "40%" (just numbers)


• Information: "30°C temperature, 40% humidity" (meaning added to data)
• Knowledge: "Warm weather with moderate humidity" (understanding the conditions)
• Conclusion: "Wear light clothing and stay hydrated" (decision based on the
knowledge)

• Reasons for using computers/computing devices/ICT.


o Saving time and labour
o Saving communication cost
o Effect on time
o Global communication

2.Hardware
• Convergence-definition/devices/advantages/disadvantages
o Multiple technologies combined into one device
▪ Example: Smartphones, laptop, tablets
• Information Processing Cycle
o Input/processing/storage/output/communication
▪ Input- The process of entering data into a computer using
devices like keyboard (most common input device), mouse, etc

▪ Processing- manipulating and interpreting data, performing


calculations. CPU, RAM, ROM devices for processing
▪ Storage: The saving of data for future use permanently (hard
drives, SSDs, Flash drives).
▪ Output: The result of processed data displayed to users through
devices like monitors, printers, or speakers.
▪ Communication: The transfer of data or information between
devices, often through networks or the internet. Modem, Router,
etc are communication devices

Types of computing devices & features


- Categorising devices-based on size and how powerful they are

o -phablets, tablets, smartphone, desktop, server, mainframe


• - Multi-touch screens- registering multiple point of contacts at the same time.
Mostly for zooming/pinching
Multi-touch Screens
▪ Definition: Touchscreens that detect more than one point of
contact at the same time.
▪ Use: Common in smartphones, tablets, and some laptops.
▪ Advantages: Supports gestures (e.g., pinch to zoom); intuitive
and user-friendly.
▪ Disadvantages: Can be less accurate than a mouse;
fingerprints on screen.

✅ Assistive Tech for Physically Challenged Users


• Definition: Tools and software that help people with disabilities use
computers.
• Examples: Screen readers, voice input, braille keyboards, eye-tracking
devices.
• Purpose: Promote accessibility and digital inclusion.

✅ 3D Printers
• Definition: a printer that create three-dimensional objects from digital
designs in layers.
• Use: Engineering, medicine (e.g., prosthetics), architecture, education.
• Benefits: Customisation, innovation, and rapid prototyping.

✅ HDMI & Wearable Tech


• HDMI (High-Definition Multimedia Interface):
o Used to transmit high-quality video and audio between devices (e.g.,
PC to monitor or TV).
• Wearable Technology:
o Devices worn on the body (e.g., smartwatches, fitness trackers).
o Tracks health, provides notifications, and connects to smartphones.

✅ Accessibility Options
• Definition: Operating system settings that assist users with disabilities.
• Examples: Magnifier, on-screen keyboard, high contrast mode, voice control.
• uses: Ensure everyone can use technology effectively.
✅ Hardware Theft Protection, Power Settings, UPS
• Hardware Theft Protection: Cable locks, alarms, physical security measures
CCTV cameras, biometric access, etc
• Power Settings: Control sleep mode, screen timeout to save energy.
• UPS (Uninterruptible Power Supply): Provides backup power during
outages to prevent data loss.

Health Risks, Ergonomics


• Health Risks: Eye strain, repetitive strain injury (RSI), back pain from poor
posture.
• Ergonomics: Designing the work environment for comfort – correct chair
height, screen angle, etc.

Value of CAT, Career Paths


• Value: Develops digital literacy, problem-solving, and ICT skills.
• Career Paths: IT support, data analyst, office administrator, digital marketing,
software testing, etc.

✅ Primary vs Secondary Storage


• Primary Storage:
o E.g., RAM – temporary, fast, volatile (data lost when power off).
• Secondary Storage:
o E.g., HDD, SSD – permanent, slower than RAM, stores files and
programs.

Online Storage, SSD, Memory Cards


• Online Storage: Cloud-based (e.g., Google Drive, OneDrive) – accessible
anywhere.
• SSD (Solid State Drive): Faster, no moving parts, more durable than HDD.
• Memory Cards: Portable storage used in phones, cameras – limited capacity
but convenient.

Processing: Basic System Unit Components


• Includes: CPU (processes data), motherboard, RAM, PSU (Power Supply
Unit), expansion cards.
• CPU: “Brain” of the computer – performs calculations and tasks.

✅ Start-up Process Concepts


• Booting: Starting up the computer.
• POST (Power-On Self Test): Checks hardware.
• BIOS/UEFI: Loads before the OS to initialise system settings.
• Loading OS: Operating system is loaded from storage to RAM.

• Making buying decisions-factors to consider


o Keyboard-ergonomic considerations
▪ Wrist rest Support
▪ Softer key presses
▪ split or angled keyboards
o mouse-ergonomic considerations
▪ Shape and Grip to reduce strains
▪ Position and Angle allowing natural wrist position

o Wireless inputs/outputs VS Cabled inputs


Wireless inputs Cabled inputs
o freedom of movement o no free movement
o connection interference o stable, uninterrupted connection
o Requires batteries or recharging o Takes power from the computer
o Expensive to buy o Cheaper to buy
o Easily stollen o Not easily stollen

o Digital Camera vs Web Cam-Factors to consider when buying


▪ Resolution (Megapixels)-higher resolution, clearer/better
image
▪ Sensor size-higher sensor size capture lighter, providing better
image quality
▪ ISO ratings- higher ISO range lets you shoot in low-light
environments without too much noise.
▪ Lens options
• Fixed Lens cameras (like point-and-shoot): simple and
compact but limit versatility.
• Interchangeable Lens cameras (like DSLRs and
mirrorless): allow you to use different lenses, offering
more flexibility in focal length

• Connectivity: Wi-Fi, Bluetooth, or NFC.


• cost

o Scanners -Device for capturing images into computer


▪ Resolution (DPI-dots per inch)
• A higher DPI, better resulting image
▪ Speed (PPM-Pages per minute)
▪ Connectivity
▪ Colour depth (measured in bits)
▪ OCR
▪ Size
▪ Cost
o Monitor -Device displaying results
▪ Resolution (pixels)-number of pixels horizontally and
vertically-1024 x 820
• A higher the number, better resulting image
▪ Screen size-measured in inches diagonally
▪ Connectivity-USB/HDMI/VGA/ wireless
▪ Colour depth (measured in bits)
▪ Refresh rate (measured in hertz(Hz)
▪ Size
▪ Cost
o Printers -Device converting soft copy to hard copy
▪ Printer Type:
• Inkjet: Best for high-quality photo printing and suitable for
home and small office use.
• Laser: Ideal for fast, high-volume black-and-white printing
• All-in-One (AIO)/Multipurpose: Combines printing,
scanning, copying, and sometimes faxing, staple
▪ Speed(PPM)
▪ Resolution (DPI)-higher DPI, better print quality
▪ Cost/budget-cost per page and cost to buy
▪ Duty Cycle- The number of pages a printer can handle per
month before it undergoes maintenance.
▪ Paper size -different paper sizes it can print-A4/A3/A5, etc
▪ Connectivity-USB/Wireless/
▪ Touch screen features

o Voice /speech recognition software


▪ Speech Recognition Software: software identifying spoken
words into text, allowing for commands or dictation.
• Example is Siri or dictation software.
▪ Voice Recognition Software: Identifies and verifies the
speaker's voice, mainly for biometric security and
personalization.
▪ Advantages/ disadvantages of Voice/Speech recognition
software

Advantages of Speech recognition software


• Hands-Free Operation: improving accessibility for users with disabilities
or during multitasking.
• Speed: Faster than typing, especially for dictation, saving time in tasks
like notetaking or command execution.
• Convenience and Efficiency: allow for quick commands and searches.
• Accuracy Improvement: Advances in AI have improved accuracy,
making it more reliable for professional use (e.g., transcription).

Disadvantages of speech recognition


• Performance may suffer with accents, background noise, or unclear
speech,/flu impacting reliability.
• Privacy Concerns: Voice data is often stored or processed externally, raising
privacy and security concerns.
• Learning Curve: Users may need to adjust speaking style or pronunciation for
the software to work optimally.
• High Processing Demand: Requires significant processing power, which can
drain battery life on mobile devices.
Essential devices for overall performance of computer
• CPU
• RAM
• STORAGE/HDD/SSD
• GPU

o Storage Devices
▪ Differences between SSD VS HDDs
SSD HDD
Faster read/write speed Slower read/write speed
More durable/robust Venerable to damage/ less
durable
More expensive per GB Less expensive per GB
Uses less power/energy Consumes more power
efficient
operates silently/less noise Produce noise and more
heat
No moving part Has moving part

▪ Backup vs archive
• Making copies of data for data protection, recovery in
case of loss, corruption or system failure.
o Backup is short term
• Archive-long term storage of data for historical or
legal requirements

▪ Cloud storage vs cloud computing vs Grid computing


• Cloud storage-storing/saving of files online
• Cloud computing-combines cloud storage and the use
of software online
o Risks associated with input devices
▪ CTS (Carpal Tunnel Syndrome)- Caused by repetitive wrist and
hand movements, often due to prolonged typing or mouse use
• Prevention- Ergonomic keyboards, proper posture,
wrist supports, and regular breaks can help reduce the
risk.
▪ RSI (Repetitive Strain Injury)- Occurs from repetitive
movement or siting for long
▪ Keylogger- A malware/physical device that records
keystrokes, stealing sensitive information (like passwords or
credit card numbers) without the user’s knowledge
• Keylogger Prevention-
o Regular software updates,
o using anti-malware
o avoiding unknown or suspicious devices

o
o Fix ordinary problems-Trouble shooting
▪ Sticky mouse
▪ Scanning problems and solutions
▪ Resolution-lower resolution having everything on the screen
being big
▪ Printing problems
• Paper jam
• No papers
• No ink
• Connectivity issues
• Ensuring Green computing-printing/saving paper when
printing
o Printing 2 pages per sheet
o Reducing font size
o Using Recycled papers etc.

▪ Disk(HDD) errors
• Fragmentation/defragmentation
o Fragmentation is files scattered on a disk (HDD)
▪ Fragmentation slows down the computer
o Defragmentation -rearranging scattered files on a
disk. Defragmentation speeds up the computer.
• Disk cleanup-deleting unnecessary files on a disk
o Free up space on a disk.
▪ Closing non-responding programs-Task Manager/ctrl Alt del
▪ Checking free space on storage devices
▪ Social implications: environmental issues
• Printing issues
• Monitor usage
• E-waste-discarded electronic devices thrown away to
landfill.
▪ UPS- device that
▪ Firewall-
▪ PSU-
3. Software
Application software-performs specific task
MS Word, spreadsheet,
System software- controls and manage activities within the computer
• OS-controls all activities-windows, android, ios
• Utility software- maintenance of the computer
▪ Disk cleanup, compression software, defragmenter,
uninstaller, antivirus, etc
• Driver- software that OS communicates with devices
o Print driver
o Web-based and installed applications
▪ Web based- software used via internet-office 365,
▪ Installed- kept on local device/computer
Web based/online software Installed software
Accessible from any device with an only accessible on the specific
internet connection device it’s installed on
Updates done automatically Updates done manually
Easily scalable Limited scalable
Needs internet connectivity It doesn’t depend on internet
connectivity
Does not use local storage space Use local storage space
o
o Common software problems and upgrades
▪ Bugs-software errors
▪ Updates/patch-to solve bugs
▪ Service pack-patches over certain period of time.
▪ Versions-new features in a software
▪ Read-only files-cannot be edited
▪ Upgrade- improvement to a software, hardware to
increase its performance, add new features

Risk of using flawed software- (software with bugs)


• Malware infection
• Software might not work correctly/may have limited access
• The software might become unusable.
• Updates might not always be available.
• Security issues
• Corrupted data/loss of data
• Invalid results
• Unusual behaviour of computer-controlled devices/malfunction

o Using trial version/beta version software-testing software


o Software licensing (EULA)
▪ Site -unlimited number of installations on computers
▪ Multi user-limited
▪ Single user-1 computer installation
▪ Subscription-Saas (Software as a Service) software like
office 365, google workspace
o Role/function of the operating system
▪ Starting the computer
▪ Providing a user interface/(GUI)
▪ Managing applications
▪ Manage hardware
▪ Controls single users and multiple users
▪ Controls multitasking
▪ The Task Manager in the Windows operating system
▪ Management of files
▪ File types and properties
• Metadata-additional information of a file
o Author
o File size
o File path
o Date modified, etc
▪ File management
▪ Schedule updates(scheduler)
▪ File compression-WINZIP, 7ZIP, etc
▪ Backups
▪ Coordinate tasks
▪ Control security-logins/passwords

o General troubleshooting using -utility software.


▪ File manager
▪ Disk cleanup
▪ Defragmenter
▪ Compression software
▪ Uninstaller
▪ Data recovery
▪ Backup software

Factors that influence performance of computer


▪ Processor/CPU speed
▪ RAM size
▪ Number of applications running
▪ Caching
▪ Disk space and speed
▪ Malware infections

Add-ons- additional features that enhance the functionality of software.


Example of add-ons
• PrintFriendly
• Ad blocker
• Pop-up blocker, etc.
Network technologies-Question 5(15)
LAN and WLAN, Components of a Network
• LAN (Local Area Network):
o A network in a small area (e.g., school, office).
o Fast and private; uses cables or Wi-Fi.
• WLAN (Wireless LAN):
o A LAN that uses wireless signals instead of cables.
o More flexible but can be less secure.
• Key Components:
o Router – device that connects networks together.
o Switch – connects multiple devices in a LAN.
o Network Interface Card (NIC) – connects a device
to the network.
o Access Point – provides Wi-Fi in WLANs.

Wired vs Wireless Connections


Wired Wireless
Uses cables Uses radio signals (Wi-Fi, Bluetooth)
(Ethernet)
Faster, more stable More flexible, portable
More secure Easier to set up and expand
Limited by cable Signal can weaken with
length distance/walls

Intranet: Definition and Uses


• Intranet: A private network within an organisation.
• Uses:
o Internal communication, document sharing, company
news, employee tools.
• Not accessible to the public – requires login credentials.
Extranet
• Definition:
o A private network that allows limited access to
outsiders (e.g., suppliers, partners).
• Use Case:
o A supplier accesses your company’s inventory
system.
• More secure than public internet, but accessible outside
the organisation.

Usability of Websites and Web Pages


• Usability refers to how easy a website is to use and
navigate.
• Good websites have:
o Clear layout
o Easy navigation (menus, links)
o Fast loading time
o Accessible design (for disabled users)
o Responsive design (works on all devices)

Evaluate Web Pages


• Check if a site is credible and relevant:
o Author: Who wrote it? Are they qualified?
o Date: Is the information current?
o Source: Is it trustworthy (e.g., .gov, .edu)?
o Objectivity: Is there bias or advertising?
o Accuracy: Can the info be verified elsewhere?

Internet of Things (IoT)


• Definition:
o A network of everyday objects connected to the
internet to collect/share data.
• Examples:
o Smart fridges, fitness trackers, home security
systems, smart thermostats.
• Benefits:
o Automation, remote control, real-time data.
• Concerns:
o Privacy, security, data overload.

o Type of network
o WAN/LAN/WLAN/GAN
▪ Roles/advantages/disadvantages
▪ Communication easier
▪ Sharing of files/hardware
o Disadvantages-security concerns/expensive to
setup
o Internet services
o VOIP
▪ Advantages and disadvantages
▪ Examples of VOIP-Whatsapp calling, Zoom,
Teams, Etc
o IM
o Internet connections and access
o Types of connections
▪ Wireless and Wired
• Wireless-4G/5G/Wifi/Hotspot/LTE/dedicated wifi
• Wired-ADSL/SDSL/Fibre optic
o ADSL-download speed is faster than upload
speed. 50Mbps---Download-max 50 mbps
upload—25mbps
o SDSL-Both download speed and upload speed
are the same.50mbps-
o Advantages/disadvantages of ADSL/SDSL
▪ Advantages-includes wifi, able to make
landline calls
▪ Disadvantages-----may not be in your
area/ poor connection area/coverage
▪ Broadband and bandwidth
• Broadband is a high-speed permanent internet
connection. ADSL/4G/SDSL/LTE
• Bandwidth- amount of data from one point to
another.
▪ Data transmission speeds-Mbs/ Gbps
▪ ISPs offer-
• Internet services-wired or wireless
o Telecommuting-working from home/away from workplace
o Throttling- ISP reduces your internet speed.

Social implications-question 6
o Basic Network Security and Privacy Issues
o Network Security: Protects networks from hacking,
malware, data theft.
o Privacy Issues: Personal data can be intercepted
or misused if not protected.
o Solutions: Firewalls, strong passwords, antivirus
software, encryption.
o
Health and Ergonomic Risks
o Health Risks:
o Eye strain, RSI (Repetitive Strain Injury), back pain.
o Ergonomics:
o Design of workstations to improve posture, comfort,
and reduce strain.
o Examples: Adjustable chairs, screen height, breaks.

Ethical Concerns with Networks


o Examples:
o Spreading fake news
o Cyberbullying
o Hacking and pirating software
o Key Idea: Using networked systems responsibly
and fairly.
Responsible Use of ICT
o Follow acceptable use policies (AUPs).
o Respect others’ privacy and data.
o Don’t use ICT for illegal or harmful activities.
o Think before you post – online actions have
real-world consequences.

Cyber Safety Awareness


o Be cautious online:
o Don’t share personal info
o Use secure passwords
o Avoid suspicious links/emails (phishing)
o Stay informed about common threats and scams.

Network Safety and Security


o Measures Include:
o Firewalls
o Antivirus software
o Regular updates
o Encryption
o User authentication
purpose: Protect data and devices from threats.

Ethical Use of Networks


o Use networks for legal and positive purposes.
o Avoid:
o Plagiarism
o Piracy
o Cyberbullying
o Always respect intellectual property and
copyright.
Privacy and Unauthorised Access
o Privacy: Right to control your personal information.
o Unauthorised Access: Accessing systems or data
without permission – illegal and unethical.
o Use strong passwords and encryption to protect
yourself.

BYOD (Bring Your Own Device)


o Definition: Using personal devices
(phones/laptops) for school or work.
Advantages of BYOD: Cost-saving, flexibility,
convenience.
Disadvantages: Security risks, data management
issues, unequal access.

Big Data
o Definition: large amounts of data generated by
devices and systems analysed to reveal trends.
o Used For: Analytics, predicting trends, improving
services.
o Concerns: Privacy, how data is collected and used.

Cryptocurrency vs Normal Currency


o Cryptocurrency o Normal Currency
(Fiat)
o Digital (e.g., Bitcoin) o Physical or digital
(e.g., Rands)
o Decentralised o Controlled by central
banks
o Anonymous o Traceable through
transactions banks
o High volatility o More stable
Blockchain
o Definition: A digital ledger that records transactions
across many computers.
o Used in: Cryptocurrencies (e.g., Bitcoin), supply
chain, voting systems.
o Advantages: Secure, transparent, difficult to
tamper with.

o Internet attacks
o DoS/DDOS attacks-computers bombarded with huge amount of data
to slow down the computer or network.
o Sniffer attack-program that reads packets of data being sent to
computer or network.
o Bot/Botnet/Zombies/Ransomware
▪ Ransomware is A type of malware designed to encrypt or block
access to your computer system and files demanding a sum of
money ('ransom')
o Bots are programs that perform automated tasks/repeated tasks over the
Internet.
o Group of bots are called botnet(bot network)
o Zombie refers to a device that has been compromised by malware
and is now under the control of a remote attacker
o Social Engineering-tricked/deceived into getting sensitive information.
▪ Phishing- using emails to get sensitive information
▪ Pharming-link/website/URL
▪ Click jacking-concealed/hidden link
▪ Smishing-SMS to deceive into getting sensitive information
▪ Baiting-using one’s curiosity
▪ Pretexting-fake identity to deceive someone into getting
sensitive information
▪ Spoofing- forgery email header to deceive someone into
getting sensitive information.
o Computer crimes/fraud
▪ Theft of hardware/software
• Protecting hardware
o Chain
o Cabinet
o Security doors
o Alarm systems
o Bolt/fix with bolt
o Biometric access, etc
• Protecting software
o Backup
o Security access/ password
o authentication
• Forms of stealing software
o Deleting /uninstalling without the person’s
knowledge
o piracy
▪ Identity theft
▪ Bandwidth theft

o Hoax
o Scam-deceive to get money
o Adware- advertising software
o Popups/keylogger
o Protecting against online threats
▪ Anti-malware/antivirus
▪ Updating software, etc
▪ VPN
▪ Https
▪ Security protocols, e.g. https
▪ Digital signature
▪ Digital certificate
▪ Encryption/SSL
▪ Firewall
▪ Anti-spyware/Antivirus
▪ Use Torr browsers
▪ Managed routers

Information management
Task Definition and Understanding
• First step in Information Management.
• Understand what the task is asking:
o What is the main topic?
o What questions need to be answered?
o What is the purpose of the task?
• Helps you stay focused and search for relevant information only.

Data and Information Gathering Techniques


• Primary sources:
o Original data you collect (e.g., surveys, interviews).
• Secondary sources:
o Existing information (e.g., books, websites, articles).
• Use reliable methods and a variety of sources for accuracy.

Quality Control of Information


• Ensure the data is:
o Accurate: Free from errors.
o Relevant: Suits the task requirements.
o Up to date: Not outdated.
o Unbiased: Fair and neutral.
• Cross-check facts using multiple trustworthy sources.
Evaluating Questions and Sources
• Ask yourself:
o Is the question clear and focused?
o Does the source directly answer the question?
o Is the source credible and appropriate for the task?
• Helps improve the depth and quality of your findings.

Evaluating Websites for Credibility and Relevance


Check the following:
Factor What to Look For
Authority Is the author qualified and named?
currency Is the content current and regularly updated?
Objectivity Is the information fair or biased?
Accuracy Are sources or references provided?
Relevance Does the content match your research question or topic?

• Electronic forms/ online survey-advantages/disadvantages


• Spreadsheet vs database
• Analysis of data
• Closed/ open ended questions
• Task definition-
• Report- plagiarism
o Report structure

Solution development-Testing knowledge about Ms Word, Spreadsheet, Database


and HTML
• Database
o Ensuring the accuracy of data capture
▪ Validation rule
▪ Input mask
▪ Field size
▪ Format, etc
• Html
• Word / Spreadsheet
• - MS Word: Content and features from Grade 11 (e.g., layout, formatting,
forms, templates)
- Excel: Grade 11 functions (SUMIF, COUNTIF, conditional formatting, charts)
- Access: Tables, queries, forms, reports, design and views
NEW TERMINOLOGIES Gr 11

Multi-touch screen: Feature of a screen that allows it to register more than one point being
touched simultaneously. -zoom in
HDMI: High- port for connecting high-definition video devices. It carries high quality video
and audio signals. -high resoultion
3D printing/printers: 3D printers can create three-dimensional(3D) objects (e.g. motor
vehicle parts, human tissue replacement, jewellery, clothing, small buildings, small boats)
from a digital model of the item by adding successive layers of material on top of one
another.
Standards for wireless communication : provides for high-speed data transfer between
cellular devices (such as smartphones and tablets) and ISPs. Each generation, e.g. 5G or 6G,
increases the capacity and speed of previous mobile connections.
802.11 a/b/g/n: refers to a Wi-Fi connectivity standard.
NFC: Near field communication (NFC): standard that allows devices such as smartphones to
connect wirelessly simply by touching them together or bringing them into close proximity
to, for example, exchange files by just touching two smartphones together or for sending a
file from a smartphone to a printer wirelessly. Tap to pay
Video communications – platforms for communicating visually using internet such as Zoom,
Microsoft Teams and Google Meet.
URL shortener: This is a tool or service, such as TinyURL.com, which converts a long URL to a
shorter version. Easier to remember and/or type out.
Internet of Things (IoT): The trend whereby devices are increasingly being connected to one
another via the internet. This can range from surveillance systems to geysers, washing
machines, 'smart' vehicles and traffic lights, etc. Various sensors in the devices can produce
data for all sorts of purposes, including diagnostics and running systems more efficiently.
Wearable devices and technologies: devices worn as accessories or part of clothing. e.g.
smartwatches or fitness/health trackers, smart glasses, continuously generating data from
various environments and communicating with other devices/PC/networks.
Shaping (Network tuning): A technique whereby certain internet services, e.g. e-mail, are
given preference while others, such as social networking services, are given less priority, thus
performance is maintained for the more critical services. (unshaping-equal preferences)
Geo-tagging: A process where a geographical position of where a photograph was taken is
added to the metadata of a file(additional information of a file).
Click-jacking: Users are tricked into clicking on an item on a web page which acts as a hinden
link.
Screen lock pattern: A way of locking a device by setting up a pattern you must draw or
trace on the screen to unlock the device.
Authentication (Internet safety): Two-factor (two-step) authentication: includes the use of
CAPTCHA, OTP (one-time pin/password), ApproveIt messages, etc.
BYOD: Bring your own device (BYOD) refers to a concept where employees/students are
allowed to bring and use their own portable devices, such as smartphones, laptops, tablets,
to work on and access the network instead of a device owned/supplied by the company/
institution.
E-learning: The creation of a learning environment where individuals use their computers to
take part in teaching and learning to further their education
Mobile or M-Learning: A form of education and training delivered and conducted via the
internet using mobile devices, such as tablets and smartphones. It is designed to be flexible,
allowing learners/workers/students access to education anywhere, anytime.
Virtual reality (VR): This refers to using technology to create a simulation of a 3D
environment that can be interacted with by a person in a seemingly real or physical way.
This is achieved by using equipment, such as helmets with screens and gloves fitted with
sensors.
Augmented reality (AR): it takes the physical world and adds objects, such as graphics,
within the real world.
Both VR and AR are used in areas ranging from entertainment (e.g. the augmented reality
game Pokémon GO), training in aircraft simulators, and healthcare (e.g. an app used to
highlight veins when a drip is inserted or surgeons being able to perform remote surgery on
patients.
AI (artificial intelligence): Refers to the simulation of human intelligence in machines that
are programmed to think like humans and mimic their actions.
Machine learning is the study of computer algorithms that improve automatically through
experience and by the use of data. It is seen as a part of artificial intelligence.
4IR (the fourth industrial revolution): It is a blend of advances in artificial intelligence (AI),
robotics, the Internet of Things (IoT), 3D printing, genetic engineering, quantum computing
and other technologies.
It creates many products and services that are fast becoming essential to modern life and is
the collective force behind disrupting almost every business sector.
5IR (the fifth industrial revolution): 5IR runs and develops alongside 4IR and uses the
advantages 4IR brings to put the focus back on humans and human endeavour, defining the
ethics and impact of technology developed in the 4IR.

You might also like