P2 Scope GR 11-June 2025 by Sirantwi
P2 Scope GR 11-June 2025 by Sirantwi
BY SIRANTWI
2.Hardware
• Convergence-definition/devices/advantages/disadvantages
o Multiple technologies combined into one device
▪ Example: Smartphones, laptop, tablets
• Information Processing Cycle
o Input/processing/storage/output/communication
▪ Input- The process of entering data into a computer using
devices like keyboard (most common input device), mouse, etc
✅ 3D Printers
• Definition: a printer that create three-dimensional objects from digital
designs in layers.
• Use: Engineering, medicine (e.g., prosthetics), architecture, education.
• Benefits: Customisation, innovation, and rapid prototyping.
✅ Accessibility Options
• Definition: Operating system settings that assist users with disabilities.
• Examples: Magnifier, on-screen keyboard, high contrast mode, voice control.
• uses: Ensure everyone can use technology effectively.
✅ Hardware Theft Protection, Power Settings, UPS
• Hardware Theft Protection: Cable locks, alarms, physical security measures
CCTV cameras, biometric access, etc
• Power Settings: Control sleep mode, screen timeout to save energy.
• UPS (Uninterruptible Power Supply): Provides backup power during
outages to prevent data loss.
o Storage Devices
▪ Differences between SSD VS HDDs
SSD HDD
Faster read/write speed Slower read/write speed
More durable/robust Venerable to damage/ less
durable
More expensive per GB Less expensive per GB
Uses less power/energy Consumes more power
efficient
operates silently/less noise Produce noise and more
heat
No moving part Has moving part
▪ Backup vs archive
• Making copies of data for data protection, recovery in
case of loss, corruption or system failure.
o Backup is short term
• Archive-long term storage of data for historical or
legal requirements
o
o Fix ordinary problems-Trouble shooting
▪ Sticky mouse
▪ Scanning problems and solutions
▪ Resolution-lower resolution having everything on the screen
being big
▪ Printing problems
• Paper jam
• No papers
• No ink
• Connectivity issues
• Ensuring Green computing-printing/saving paper when
printing
o Printing 2 pages per sheet
o Reducing font size
o Using Recycled papers etc.
▪ Disk(HDD) errors
• Fragmentation/defragmentation
o Fragmentation is files scattered on a disk (HDD)
▪ Fragmentation slows down the computer
o Defragmentation -rearranging scattered files on a
disk. Defragmentation speeds up the computer.
• Disk cleanup-deleting unnecessary files on a disk
o Free up space on a disk.
▪ Closing non-responding programs-Task Manager/ctrl Alt del
▪ Checking free space on storage devices
▪ Social implications: environmental issues
• Printing issues
• Monitor usage
• E-waste-discarded electronic devices thrown away to
landfill.
▪ UPS- device that
▪ Firewall-
▪ PSU-
3. Software
Application software-performs specific task
MS Word, spreadsheet,
System software- controls and manage activities within the computer
• OS-controls all activities-windows, android, ios
• Utility software- maintenance of the computer
▪ Disk cleanup, compression software, defragmenter,
uninstaller, antivirus, etc
• Driver- software that OS communicates with devices
o Print driver
o Web-based and installed applications
▪ Web based- software used via internet-office 365,
▪ Installed- kept on local device/computer
Web based/online software Installed software
Accessible from any device with an only accessible on the specific
internet connection device it’s installed on
Updates done automatically Updates done manually
Easily scalable Limited scalable
Needs internet connectivity It doesn’t depend on internet
connectivity
Does not use local storage space Use local storage space
o
o Common software problems and upgrades
▪ Bugs-software errors
▪ Updates/patch-to solve bugs
▪ Service pack-patches over certain period of time.
▪ Versions-new features in a software
▪ Read-only files-cannot be edited
▪ Upgrade- improvement to a software, hardware to
increase its performance, add new features
o Type of network
o WAN/LAN/WLAN/GAN
▪ Roles/advantages/disadvantages
▪ Communication easier
▪ Sharing of files/hardware
o Disadvantages-security concerns/expensive to
setup
o Internet services
o VOIP
▪ Advantages and disadvantages
▪ Examples of VOIP-Whatsapp calling, Zoom,
Teams, Etc
o IM
o Internet connections and access
o Types of connections
▪ Wireless and Wired
• Wireless-4G/5G/Wifi/Hotspot/LTE/dedicated wifi
• Wired-ADSL/SDSL/Fibre optic
o ADSL-download speed is faster than upload
speed. 50Mbps---Download-max 50 mbps
upload—25mbps
o SDSL-Both download speed and upload speed
are the same.50mbps-
o Advantages/disadvantages of ADSL/SDSL
▪ Advantages-includes wifi, able to make
landline calls
▪ Disadvantages-----may not be in your
area/ poor connection area/coverage
▪ Broadband and bandwidth
• Broadband is a high-speed permanent internet
connection. ADSL/4G/SDSL/LTE
• Bandwidth- amount of data from one point to
another.
▪ Data transmission speeds-Mbs/ Gbps
▪ ISPs offer-
• Internet services-wired or wireless
o Telecommuting-working from home/away from workplace
o Throttling- ISP reduces your internet speed.
Social implications-question 6
o Basic Network Security and Privacy Issues
o Network Security: Protects networks from hacking,
malware, data theft.
o Privacy Issues: Personal data can be intercepted
or misused if not protected.
o Solutions: Firewalls, strong passwords, antivirus
software, encryption.
o
Health and Ergonomic Risks
o Health Risks:
o Eye strain, RSI (Repetitive Strain Injury), back pain.
o Ergonomics:
o Design of workstations to improve posture, comfort,
and reduce strain.
o Examples: Adjustable chairs, screen height, breaks.
Big Data
o Definition: large amounts of data generated by
devices and systems analysed to reveal trends.
o Used For: Analytics, predicting trends, improving
services.
o Concerns: Privacy, how data is collected and used.
o Internet attacks
o DoS/DDOS attacks-computers bombarded with huge amount of data
to slow down the computer or network.
o Sniffer attack-program that reads packets of data being sent to
computer or network.
o Bot/Botnet/Zombies/Ransomware
▪ Ransomware is A type of malware designed to encrypt or block
access to your computer system and files demanding a sum of
money ('ransom')
o Bots are programs that perform automated tasks/repeated tasks over the
Internet.
o Group of bots are called botnet(bot network)
o Zombie refers to a device that has been compromised by malware
and is now under the control of a remote attacker
o Social Engineering-tricked/deceived into getting sensitive information.
▪ Phishing- using emails to get sensitive information
▪ Pharming-link/website/URL
▪ Click jacking-concealed/hidden link
▪ Smishing-SMS to deceive into getting sensitive information
▪ Baiting-using one’s curiosity
▪ Pretexting-fake identity to deceive someone into getting
sensitive information
▪ Spoofing- forgery email header to deceive someone into
getting sensitive information.
o Computer crimes/fraud
▪ Theft of hardware/software
• Protecting hardware
o Chain
o Cabinet
o Security doors
o Alarm systems
o Bolt/fix with bolt
o Biometric access, etc
• Protecting software
o Backup
o Security access/ password
o authentication
• Forms of stealing software
o Deleting /uninstalling without the person’s
knowledge
o piracy
▪ Identity theft
▪ Bandwidth theft
▪
o Hoax
o Scam-deceive to get money
o Adware- advertising software
o Popups/keylogger
o Protecting against online threats
▪ Anti-malware/antivirus
▪ Updating software, etc
▪ VPN
▪ Https
▪ Security protocols, e.g. https
▪ Digital signature
▪ Digital certificate
▪ Encryption/SSL
▪ Firewall
▪ Anti-spyware/Antivirus
▪ Use Torr browsers
▪ Managed routers
Information management
Task Definition and Understanding
• First step in Information Management.
• Understand what the task is asking:
o What is the main topic?
o What questions need to be answered?
o What is the purpose of the task?
• Helps you stay focused and search for relevant information only.
Multi-touch screen: Feature of a screen that allows it to register more than one point being
touched simultaneously. -zoom in
HDMI: High- port for connecting high-definition video devices. It carries high quality video
and audio signals. -high resoultion
3D printing/printers: 3D printers can create three-dimensional(3D) objects (e.g. motor
vehicle parts, human tissue replacement, jewellery, clothing, small buildings, small boats)
from a digital model of the item by adding successive layers of material on top of one
another.
Standards for wireless communication : provides for high-speed data transfer between
cellular devices (such as smartphones and tablets) and ISPs. Each generation, e.g. 5G or 6G,
increases the capacity and speed of previous mobile connections.
802.11 a/b/g/n: refers to a Wi-Fi connectivity standard.
NFC: Near field communication (NFC): standard that allows devices such as smartphones to
connect wirelessly simply by touching them together or bringing them into close proximity
to, for example, exchange files by just touching two smartphones together or for sending a
file from a smartphone to a printer wirelessly. Tap to pay
Video communications – platforms for communicating visually using internet such as Zoom,
Microsoft Teams and Google Meet.
URL shortener: This is a tool or service, such as TinyURL.com, which converts a long URL to a
shorter version. Easier to remember and/or type out.
Internet of Things (IoT): The trend whereby devices are increasingly being connected to one
another via the internet. This can range from surveillance systems to geysers, washing
machines, 'smart' vehicles and traffic lights, etc. Various sensors in the devices can produce
data for all sorts of purposes, including diagnostics and running systems more efficiently.
Wearable devices and technologies: devices worn as accessories or part of clothing. e.g.
smartwatches or fitness/health trackers, smart glasses, continuously generating data from
various environments and communicating with other devices/PC/networks.
Shaping (Network tuning): A technique whereby certain internet services, e.g. e-mail, are
given preference while others, such as social networking services, are given less priority, thus
performance is maintained for the more critical services. (unshaping-equal preferences)
Geo-tagging: A process where a geographical position of where a photograph was taken is
added to the metadata of a file(additional information of a file).
Click-jacking: Users are tricked into clicking on an item on a web page which acts as a hinden
link.
Screen lock pattern: A way of locking a device by setting up a pattern you must draw or
trace on the screen to unlock the device.
Authentication (Internet safety): Two-factor (two-step) authentication: includes the use of
CAPTCHA, OTP (one-time pin/password), ApproveIt messages, etc.
BYOD: Bring your own device (BYOD) refers to a concept where employees/students are
allowed to bring and use their own portable devices, such as smartphones, laptops, tablets,
to work on and access the network instead of a device owned/supplied by the company/
institution.
E-learning: The creation of a learning environment where individuals use their computers to
take part in teaching and learning to further their education
Mobile or M-Learning: A form of education and training delivered and conducted via the
internet using mobile devices, such as tablets and smartphones. It is designed to be flexible,
allowing learners/workers/students access to education anywhere, anytime.
Virtual reality (VR): This refers to using technology to create a simulation of a 3D
environment that can be interacted with by a person in a seemingly real or physical way.
This is achieved by using equipment, such as helmets with screens and gloves fitted with
sensors.
Augmented reality (AR): it takes the physical world and adds objects, such as graphics,
within the real world.
Both VR and AR are used in areas ranging from entertainment (e.g. the augmented reality
game Pokémon GO), training in aircraft simulators, and healthcare (e.g. an app used to
highlight veins when a drip is inserted or surgeons being able to perform remote surgery on
patients.
AI (artificial intelligence): Refers to the simulation of human intelligence in machines that
are programmed to think like humans and mimic their actions.
Machine learning is the study of computer algorithms that improve automatically through
experience and by the use of data. It is seen as a part of artificial intelligence.
4IR (the fourth industrial revolution): It is a blend of advances in artificial intelligence (AI),
robotics, the Internet of Things (IoT), 3D printing, genetic engineering, quantum computing
and other technologies.
It creates many products and services that are fast becoming essential to modern life and is
the collective force behind disrupting almost every business sector.
5IR (the fifth industrial revolution): 5IR runs and develops alongside 4IR and uses the
advantages 4IR brings to put the focus back on humans and human endeavour, defining the
ethics and impact of technology developed in the 4IR.