0% found this document useful (0 votes)
104 views7 pages

Grade 10 CAT Theory Paper 2

The document provides an overview of Information and Communication Technology (ICT), covering data transfer, file types, the information processing cycle, and problem-solving steps. It discusses hardware specifications, software licensing, network security, and the implications of telecommuting and two-factor authentication. Additionally, it addresses the importance of protecting privacy online and the use of software tools like word processors and spreadsheets for effective data management.

Uploaded by

saaam0325
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views7 pages

Grade 10 CAT Theory Paper 2

The document provides an overview of Information and Communication Technology (ICT), covering data transfer, file types, the information processing cycle, and problem-solving steps. It discusses hardware specifications, software licensing, network security, and the implications of telecommuting and two-factor authentication. Additionally, it addresses the importance of protecting privacy online and the use of software tools like word processors and spreadsheets for effective data management.

Uploaded by

saaam0325
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

GENERAL

●​ Data Transfer: Data and information can be easily transferred or copied from one
computer to another through a network. When an item is scanned at a point-of-sale
(POS) system, the barcode reader converts the stripes into numerical data, which is
automatically transferred to the check-out computer. In some instances, a product's data
can be sent to the shop's main computer for stocktaking, and also to the manufacturer
for their stock purposes.
●​ File Extensions: The document mentions various file types such as text files, document
files, locked document files, web pages, archives and compressed files, presentation
1
files, spreadsheet files, database files, image files, animation files, video files, sound
files, and Portable Document Format (PDF).
●​ Information Processing Cycle: The information processing cycle involves how
hardware devices are used at each stage. It is a process of gathering, selecting,
processing, and then presenting information. The three main steps of information
management are inputs, processing, and outputs. Data is an example of input, and by
processing this raw data, it becomes useful information. An ICT system needs to
receive, store, retrieve, manipulate, and transmit data to function correctly.
●​ Problem Solving: Understanding the problem-solving steps is part of information
management.
●​ The Usage of ICT: Information and Communication Technology (ICT) refers to the
overall set-up of hardware, software, data, and the people that use it, and commonly
includes communication technology like the internet. ICT is a field related to computers
and communication networks, and can include audiovisuals like film and digital
productions. Digital technologies use data (text, numbers, images, sounds, videos)
which computers use to show information. ICT systems are used in everyday life, for
example, in supermarkets with Point-of-Sale (POS) systems.

HARDWARE
●​ Desktop/laptop/tablet specifications: Modern hard drives can have up to 12 Tb of
storage space. External hard drives are non-volatile and can be attached via USB or
wirelessly, good for transferring files. SD cards (especially MicroSD) can have up to 512
Gb capacity and are used in portable devices like smartphones and cameras. Solid-state
drives (SSDs) are internal hard drives without moving parts, similar to a CPU with many
small transistors.
●​ Processing: The Central Processing Unit (CPU) is the part of a computer responsible
for processing general instructions. It has cores that receive instructions and perform
calculations or actions based on those instructions.
●​ Different types of input/output devices: Input devices include pointing devices, digital
cameras, scanning and reading devices, video input devices, audio input devices, and
biometric input devices. Common input devices are the mouse and keyboard. Output
devices include audio output and other general output devices.
●​ Biometric devices (Scanners, RFID): Fingerprint scanners are a type of biometric input
device used for authentication, for example, to keep records of staff attendance. Other
types of biometric scanners include facial recognition and iris scanners. Biometric refers
to technical terms for body measurements and calculations.
●​ Printer Specifications: The document covers print management, adding new
peripherals, changing the default printer, basic printing, and printer queue management.
Homes and offices use networks to share hardware like printers and scanners, allowing
multiple users to use a single device.
●​ UPS device (Uninterruptible Power Supply): A UPS device provides emergency
power to a load when the input power source or mains power fails. It is typically used to
protect hardware such as computers, data centers, telecommunication equipment, or
other electrical equipment where an unexpected power disruption could cause injuries,
fatalities, serious business disruption, or data loss. A UPS differs from an auxiliary power
supply or emergency power system or standby generator in that it provides
near-instantaneous protection from input power interruptions, by supplying energy stored
in batteries, supercapacitors, or flywheels. The on-battery run-time of most
uninterruptible power sources is relatively short (only a few minutes) but sufficient to
allow time to start a standby power source or properly shut down the protected
equipment.
●​ 3D printers: 3D printers are devices that create three-dimensional objects from digital
designs. They work by adding successive layers of material until the object is created.
These layers are typically very thin cross-sections of the object being built. 3D printing is
used in various fields, including manufacturing, medicine (for prosthetics and organs),
art, and even in daily life for creating prototypes or custom parts.

SOFTWARE
●​ Software license: Licensing and licensing agreements are discussed in the context of
software. An organization cannot just share software over a network; they need to
acquire network licenses or site licenses.
●​ Voice recognition software: This type of software, also known as speech-to-text or
speech recognition, enables the recognition and translation of spoken language into text.
It allows users to control devices, dictate documents, and perform various tasks using
only their voice, offering a hands-free interaction with technology. Examples include
virtual assistants like Siri, Google Assistant, and Amazon Alexa, as well as dictation
software used for medical or legal transcription.
●​ Backups: Cloud storage is a service model where data is maintained, managed, and
backed up remotely, accessible over a network by any internet-connected device. It is
easy to store and share files, as well as back up data.
●​ QR codes: The document mentions opening a QR code to learn how to snip a computer
screen. Another QR code is provided to find out how to reset a Windows 10 password.
●​ OCR (Optical Character Recognition): OCR is a technology that converts different
types of documents, such as scanned paper documents, PDF files, or images captured
by a digital camera, into editable and searchable data. It works by identifying and
extracting text from images, making the content usable for word processing, indexing,
and data analysis. This is particularly useful for digitizing old books, archiving
documents, or processing forms.

NETWORK & INTERNET


NETWORK
●​ Protection from unauthorized users: The document discusses being more secure by
creating passwords and using other authentication methods like fingerprint scanning,
facial recognition, or iris scanning. Screen lock patterns (PIN, password, fingerprint scan,
retina scan) are also mentioned for mobile device security.
●​ Network connection devices: The document mentions hardware devices that can be
connected to a network. Communication devices allow a computer to connect to a
network and communicate with other computers.
●​ Advantages and disadvantages of a Network:
○​ Advantages: Makes communication easier, enables information transfer,
provides access to hardware devices, and facilitates software
installation/upgrades from a central location. It also allows for central storage of
information and data.
○​ Disadvantages: Can expose users to online crimes (identity theft, credit-card
theft, scams), allows viruses to be easily transferred, and raises security and
privacy concerns due to interconnected computers.
●​ Network security: Businesses serious about security use fingerprint scanning, facial
recognition, or iris scanners to protect information.
●​ Problem solving: Problem solving in the context of networks is mentioned.
●​ Data transfer: Data and information can be easily transferred or copied from one
computer to another through the network.

INTERNET
●​ Internet connections: The document refers to connecting to the internet within the
context of PAN/HAN. An ICT system commonly includes communication technology
such as the internet.
●​ Advantages and disadvantages of HTTPS:
○​ Advantages: HTTPS (Hypertext Transfer Protocol Secure) provides secure
communication over a computer network, widely used on the Internet. It encrypts
the data exchanged between your web browser and a website, protecting it from
eavesdropping, tampering, and forgery. This is crucial for online transactions,
banking, and protecting personal information. It also authenticates the website,
ensuring you are connecting to the legitimate site and not a fraudulent one.
Furthermore, search engines like Google favor HTTPS sites, which can lead to
better search rankings.
○​ Disadvantages: Setting up and maintaining HTTPS can be more complex and
resource-intensive for website administrators due to the need for SSL/TLS
certificates and the associated overhead of encryption. In rare cases, it can
slightly increase page load times, though this is often negligible with modern
internet speeds and server capabilities.
●​ Importance of internet access: The document discusses the internet and world wide
web, including important concepts.
●​ Online storage: The "cloud" is referred to as the internet, where files, folders, or
anything stored on the cloud is on internet servers rather than a computer's hard drive.
It's used for storing, sharing files, and backing up data.

INFORMATION MANAGEMENT
●​ Problem solving steps: The information management process includes understanding
a problem or task. The Practical Assessment Task (PAT) phases involve identifying
problems and finding solutions.
●​ Information sources & gathering tools: This includes gathering quality information,
creating questions to identify problems, and getting relevant data from different sources
like printed media or the internet. Questionnaires and surveys are mentioned as tools for
obtaining data.

SOCIAL IMPLICATIONS
GENERAL
●​ Telecommuting: Telecommuting, also known as remote work or working from home, is
7
a work arrangement where employees perform their job duties from a location other
than a traditional office. This typically involves using information and communication
technologies, such as computers, the internet, and video conferencing, to connect with
colleagues and complete tasks. It offers benefits like increased flexibility, reduced
commuting time and costs, and access to a broader talent pool for employers. However,
it can also lead to challenges such as potential feelings of isolation for employees,
difficulties in maintaining work-life balance, and ensuring robust cybersecurity measures.
●​ Advantages and Disadvantages of factor authentication:
○​ Two-Factor Authentication (2FA): This is a security process in which a user
provides two different authentication factors to verify themselves. It adds an extra
layer of security beyond just a username and password.
○​ Advantages: Significantly enhances security by making it much harder for
unauthorized users to access accounts, even if they manage to steal a password.
If one factor is compromised, the second factor still protects the account. This is
particularly effective against phishing, brute-force attacks, and credential stuffing.
○​ Disadvantages: Can add a slight inconvenience to the login process due to the
extra step. Users need access to their second factor (e.g., phone, email,
authenticator app) to log in. If the second factor is lost or inaccessible, it can be
difficult to regain account access, requiring recovery procedures that can
sometimes be lengthy.
●​ Examples of factor authentication: Fingerprint scanning, facial recognition, iris
scanning, PINs, passwords, and screen lock patterns are given as examples of
authentication measures.

SOFTWARE
●​ Intellectual property: Intellectual property is a term for creating something new or
original, such as an invention, design, brand, or book/journal article. Using someone
else's intellectual property without permission is a crime. Copyright is the legal right of a
creator to make copies of something and decide how it can be copied.

HARDWARE
●​ Prevention of theft: Preventing the theft of hardware involves both physical security
measures and digital deterrents. Physical measures include securing devices with locks,
cables (e.g., Kensington locks for laptops), or by keeping them in secure locations. For
larger equipment, robust physical security systems like alarms and surveillance can be
implemented. Digital prevention methods include using strong passwords, encryption for
data on devices, remote wipe capabilities for lost or stolen devices (allowing data to be
erased remotely), and tracking software that can help locate devices. Inventory
management and asset tagging are also important for businesses to keep track of their
hardware.
●​ Ergonomics (Health): Posture and ergonomics, including correct typing posture, are
discussed.
●​ BYOD (Bring Your Own Device): BYOD is a policy where employees are allowed or
encouraged to use their personally owned devices (such as smartphones, tablets, or
laptops) for work-related purposes.
○​ Advantages: Can lead to increased employee satisfaction and productivity as
individuals are more comfortable and proficient with their own devices. It can also
reduce IT hardware costs for organizations.
○​ Disadvantages: Presents significant security risks (e.g., data breaches, malware
infections) and management challenges for IT departments, as they need to
ensure corporate data is secure on personal devices that are not fully controlled
by the organization. Issues like compatibility, technical support, and privacy
concerns for employees also need to be addressed.

INTERNET
●​ Protecting privacy: The document mentions that using a pattern to lock a device can be
handy for privacy. Networks can raise security and privacy concerns as people might try
to access private information.
●​ Positive and negative effects of social media: Not explicitly covered, but "Social
implications: Email and internet safety" and "Computer crimes" are mentioned.
SOLUTION DEVELOPMENT
WORD
●​ Heading Styles: The PAT guidelines give strict instructions on font sizes for main
headings and body text.
●​ Page/Section breaks:
○​ Page breaks: A page break is a marker that indicates the end of a page and the
beginning of a new one. It forces the text that follows the break to start on a new
page, regardless of how much space is left on the current page. This is used for
formatting documents to ensure certain content starts on a new page.
○​ Section breaks: A section break divides a document into sections, allowing
different formatting options (such as page numbering, headers and footers, or
column layouts) to be applied to different parts of the same document. For
instance, you could have different page numbers in the introduction section
compared to the main body of a report.
●​ Shortcuts (copy, paste, cut, etc.): Keyboard shortcuts are combinations of keys that,
when pressed together, perform specific actions within a software application, making
tasks faster and more efficient.
○​ Ctrl+C (or Cmd+C on Mac): Copies the selected text or object to the clipboard.
○​ Ctrl+X (or Cmd+X on Mac): Cuts the selected text or object, removing it from its
original location and placing it on the clipboard.
○​ Ctrl+V (or Cmd+V on Mac): Pastes the content from the clipboard to the current
cursor position.
○​ Ctrl+Z (or Cmd+Z on Mac): Undoes the last action.
○​ Ctrl+S (or Cmd+S on Mac): Saves the current document.
○​ Ctrl+P (or Cmd+P on Mac): Opens the print dialog.

EXCEL
●​ Error indicators: In Excel, error indicators are visual cues that appear in cells when a
formula or data input results in an error. These typically show up as a green triangle in
the top-left corner of a cell, or as specific error values (e.g., #DIV/0!, #VALUE!, #NAME?,
#N/A, #####).
○​ #DIV/0!: Occurs when a number is divided by zero.
○​ #VALUE!: Indicates that a formula contains an invalid argument or operand.
○​ #NAME?: Appears when Excel doesn't recognize text in a formula, often due to a
misspelled function name or range name.
○​ #N/A: Means "no value available," typically used when a formula (like
VLOOKUP) cannot find what it's looking for.
○​ #####: This is not an error itself, but indicates that the column is not wide enough
to display the full content of the cell. These indicators help users identify and
troubleshoot issues in their spreadsheets.
●​ Functions and formulas: Spreadsheet functions can be used to determine the number
of respondents, the most popular response, or the number of specific answers (e.g.,
"Strongly Agree") from questionnaire data. Spreadsheets are used to process and
analyze data.
●​ Features: The document mentions data handling and processing with a spreadsheet,
and sifting information using a spreadsheet application.

You might also like