Professional Documents
Culture Documents
Cram Notes
Key
Grade 10 – Blue
Grade 11 – Green
Grade 12 – Red
INPUTBOX MATHEMATICAL FUNCTIONS & PROCEDURES
Allows user to enter data StringResult := InputBox StrToInt
DELPHI BASICS CONCEPTS AND TOOLS (‘Windows caption’, ‘Prompt’, Default value’); Converts string value to integer
iN := StrToInt(sNumber);
Procedure TForm1.Button1Click(Sender: TObject);
DELPHI FILES Var IntToStr
Eight files when you save and run the program, main files;
sName : string; Converts integer value to string
begin sNumber := IntToStr(iN);
Project file (.dpr / .dproj)
sName := InputBox (‘Name’, ‘Enter your name’, ‘’);
Form file (.dfm)
lblName.Caption := sName; StrToFloat
Unit file (.pas)
end; Converts string value to real
rN := StrToFloat(sNumber);
BASIC RULES
Assignment operator := FloatToStr
left side gets, right side gives CALCULATIONS USING VARIABLES
Converts real value to string
A := B sNumber := FloatToStr(rN);
VARIABLES
Text must be place between single quotes ‘ ‘ String
FloatToStrF
sText := ‘Hello World’ Values that are text (Numbers and letters)
Converts real value to string with formatting (1 number
Abbreviation: s (sName)
after the decimal for example)
Strings are joined by a + sign sN := FloatToStrF(rN, ffFixed, 15, 1);
sText := 'Hello' + 'World' Integer
Whole numbers (Numbers with no digits after the decimal
Trunc
Input, Processing, Output (IPO) point
Truncates (cuts) the decimal point
Abbreviation: i (iNumber)
Trunc(4.5);
Real Val
Whole and fractions (Numbers with digits after the decimal Converts string value to integer or real. Also checks for
point) errors.
Abbreviation: r (rAmount) Val(sOriginal, iNum, iError);
ERRORS Val(sOriginal, rNum, iError);
Syntax Errors: Common mistakes: no semi-colon at the end Char
of a line; : = instead of := (no space between : and =) spelling Any single characters (Text, Symbol or Number) Round
errors Abbreviation: c (cInitial) Rounds real number to the nearest integer
Round(4.8);
Logical Errors: Errors created by the programmer in Boolean
specifying the wrong steps in the program. These errors True or False Roundto
cause the program to produce incorrect output. Abbreviation: b (bValid) Rounds to a set power of 10
iH := Roundto(2745,3);
Run-Time Errors: Errors that cause the program to abort or Take note;
crash prior to its normal expected termination. These - Variables is a place keeper used to store values in Inc
include the program not finding a data file it expected or - Variables are declared after the abbreviation “var” Increases value of variable
dividing by zero. - Global Variables are declared above implementation at the (You can also do this as:
top of the programming code. These variables are valid iNumber := iNumber + 1;)
throughout the program. Inc(iNumber)
NAMING CONVENTIONS
- Local Variables are declared inside the event handler (the
Components must be renamed with an abbreviation
procedure you create yourself by double clicking on a button Dec
indicating the type of component, followed by a descriptive
in design mode). You must type in the var as well as the Decreases value of variable
name.
variables themselves. These variables are only valid within (You can also do this as:
Form (frm) this specific event handler or procedure. iNumber := iNumber - 1;)
Shape (shp) - Variables with the same data types can be listed after each Dec(iNumber);
Button (btn) other separated by a comma:
Panel (pnl) Frac
Label (lbl) var Provides decimal part of real number
Edit (edt) sName, sSurname : String; rK := Frac(3.54);
RichEdit (red) iAge, iNumb1, iNumb2 : Integer;
Image (img) rAmount : Real; Sqr
Groupbox (gbx) Gives square of number typed in
Bitmap button (bmb) MATHEMATICAL OPERATORS rK := Sqr(16);
Memo (mem) Addition +
Radiogroup (rgp) Integer / Real Sqrt
Radiobutton (rad) iX := iA + iB; Gives square root of a number
Timer (tmr) rK := Sqrt(16);
Checkbox (cbx) Subtraction -
MaskEdit (med) Integer / Real Power
SpinEdit (sed) rX := rA – RB Raises first number to the power of the second number
Progress Bar (prb) (134)
Page Control (pgc) Multiplication x Power(13,4)
StatusBar (stb) Integer / Real
ListBox (lst) iX := iA * iB; Pi
Provides the value of pi (π)
Examples Division ÷ rW := rK * Pi;
Editbox receiving name – edtName Integer / Real
Label displaying a final mark – lblFinal iX := iD / iS; Random
Provides a random number within a range of 0 and limit-1.
DIV Randomize;
RICHEDIT COMPONENT
Integer Division iX := Random(100);
The RichEdit component can be used for both input as well
iX := iA DIV iB; (iX = any number between 0 and 99)
as output.
MOD Remember to add the Math unit to the uses section of your
Add text to RicheEdit, #9 refers to a Tab (ASCII)
Remainder after division / Integer program when using the RoundTo and Power functions.
RichEdit1.Lines.Add (‘Text’ + #9 + ‘Text’);
iX := iA MOD iB;
Clear RichEdit
RichEdit.Clear
SHOWMESSAGE COMPONENT
Small popup window with text
ShowMessage (‘This is a showMessage!’);
REPEAT LOOP
- Conditional Loop
MAKING DECISIONS - Post-test Loop – condition will be tested after the loop! HUMAN COMPUTER INTERACTION
- Will loop at least once!
IF & CASE STATEMENTS - Repeats depending on a certain condition(s).
- No begin.. end needed
DETERMINING THE FOCUS
Basic Structure of an if Statements edtName.Setfocus;
- The condition(s) indicate when to stop; not when to go on
if <conditions(s)> then
as with the WHILE.
begin DEFENSIVE PROGRAMMING MESSAGE DIALOG BOX
- ITC
<statements> Provide the user with certain options or warnings and let the
- Variables to be tested must be initialised before
end; user then accept the message or decision.
Execution.
- Variable must be changed at the end of loop to avoid an
Basic Structure of an if..then..Else statement: Message types:
infinite loop (loop will never stop repeating
if <condition(s)> then - mtWarning
- Variable is tested at the end of the loop. If the statement
begin - mtError
Is FALSE then the loop will be repeated again.
<statements> - mtInformation
end - mtConfirmation
Basic structure of the Repeat loop:
else {If the top condition is not met then…} - mtCustom
repeat
begin
<statement(s)>
<statements> Button types:
<change condition to stop loop>
end; - mbYes
until <Conditions to stop>;
- mbNo
Basic Structure of a Nested If statement: - mbCancel
If <condition(s)> then - mbHelp
begin - mbAbort
<statements> SIMPLE STRING HANDLING - mbRetry
end - mbIgnore
else STRING HANDLING - mbAll
if <condition(s)> then
begin sSourceText := ‘The man walks’ There are also groupings such as
<statements> - mbYesNoCancel
end Text variables are usually declared as Strings. A Number of - mbOKCancel
else {If the top conditions are not met then…} component properties are also string (text) values. For - mbAbortRetryIgnore
begin example Button1.Caption or Edit1.Text
<statements>
end; Examples
For example sSourceText can be declared as String under var
MessageDlg (‘Invalid Input!’, mtWarning, [mbOK], 0);
Additional logical operators can also be added: AND, OR, Take note that each character in a String variable can be
NOT (use brackets around conditions) if MessageDlg (‘This is an error’, mtError, [mbOK, mbAbort],
referred to by using an index. The character sSourceText[2]
0) = mrOK then
would for instance be ‘h’.
Example lblOutput.Caption := ‘User pressed OK’
else
if (inumber >= 5) and (inumb2 >= 5) then lblOutput.Caption := User pressed Abort;
lbloutput.caption := ‘Both numbers are greater than five’
else if MessageDlg (‘Do you want to exit’, mtConfirmation,
Lbloutput.caption := ‘None of the numbers are greater than [mbYes, mbNo], 0) = mrYes then Application.Terminate;
five’; Even the spaces therefore has index values (see characters 4 {Close form with Form1.Close}
and 8 above).
Basic Structure of the case statement:
- Determine the position of a piece of a text within a string
case <selection statement> of IntegerVariable := Pos(StrToBeFound, SourceText);
<value1> := <statement(s)>; For example: iX := Pos (‘m’, sSourceText);
<value2> := <statement(s)>; {The value of iX is now: 5}
<value3> := <statement(s)>;
else - Display a certain character within a string using square
<statement(s)> brackets at the end of a variable.
end; StringVariable := SourceText[CharacterPosition];
For example: sNewText := sSourceText[2];
{The value of sNewText is now: ‘h’}
TAKE NOTE:
- Value Parameters
- Button Procedure > Input and Call
- Add Procedure > Process and Output
3.4 Add a record from a ComboBox: DELETE RECORD MEETING SEARCH CRITERIA
procedure TForm1.Button1Click(Sender: TObject);
DATABASES – ADO TABLES procedure TForm1.Button1Click(Sender: TObject); begin
begin ADOTable1.First;
ADOTable1.Append; while not ADOTable1.Eof do
SET UP ADO TABLE ADOTable1['Team'] := begin
1.1 Create database file in MS Access ComboBox1.Items[ComboBox1.ItemIndex]; if ADOTable1['Name'] = Edit1.Text then
1.2 In Delphi: choose ADOTable under the ADO menu ADOTable1.Post; begin
on the component palette end; ADOTable1.Delete;
1.3 Change settings in the Object Inspector: set the
Exit;
Connection String settings by clicking on the ellipse OR (if the contents of the ComboBox should not end
1.4 Click on Build… be transferred as it is to the database) else
1.5 Choose: Microsoft Jet 4.0 OLE DB Provider
ADOTable1.Next;
1.6 Click Next >> procedure TForm1.Button1Click(Sender: TObject); end;
1.7 Select database file (mdb file) begin end;
1.8 Erase user name (‘Admin’) ADOTable1.Append;
1.9 Make sure 'Blank Password' is selected Case ComboBox1.ItemIndex of
1.10 Click OK (on 'Data Link Properties' window)
DELETE RECORD CURRENTLY IN FOCUS
0 : ADOTable1['Grade'] := '10'; Click on record then click on Button1:
1.11 Click OK (on 'ConnectionString' window) 1 : ADOTable1['Grade'] := '11';
1.12 Click on ADOTable component: choose Table 2 : ADOTable1['Grade'] := '12'; procedure TForm1.Button3Click(Sender: TObject);
name for ADOTable end; begin
1.13 Set ADOTable Active to TRUE ADOTable1.Post; ADOTable1.Delete;
1.14 Add DataSource (link to table) end; end;
1.15 Add DBGrid and DBNavigator (found under ‘Data
Controls’; link to table) 3.5 Add a record from a DBLookupComboBox
FILTER RESULTS
3.5.1 Set up DBLookupComboBox by choosing the
9.1 Filter according to exact search criteria (e.g. Name =
Datasource to be used in ListSource
SET UP ADO CONNECTION 'John'):
3.5.2 Choose the field to be listed in ListField
(To be used with Tables or Queries)
3.5.3 Choose a field as keyfield in KeyField
2.1. Create database file in MS Access procedure TForm1.Button3Click(Sender: TObject);
3.5.4 When choosing a value the focus is placed on that
2.2. In Delphi: choose ADOConnection under the ADO begin
particular record in the table used and any field can
menu on the component palette ADOTable1.Filter := 'Name = ' + '''' +
be used from that record, for example:
2.3. Change settings in the Object Inspector: set the Edit1.Text + '''';
Connection String settings by clicking on the ellipse ADOTable1.Filtered := True;
procedure TForm1.Button1Click(Sender: TObject);
2.4. Click on Build… end;
begin
2.5. Choose: Microsoft Jet 4.0 OLE DB Provider
ADOTable1.Append;
2.6. Click Next >> 9.2 Filter according to similar search criteria (e.g. Name
ADOTable1['Name'] := ADOTable2['Name'];
2.7. Select database file (mdb file) LIKE 'Jo%'):
ADOTable1.Post;
2.8. Erase user name (‘Admin’)
end;
2.9. Make sure 'Blank Password' is selected procedure TForm1.Button3Click(Sender: TObject);
2.10. Click OK (on 'Data Link Properties' window) begin
2.11. Click OK (on 'ConnectionString' window) SEARCH FOR A RECORD IN A TABLE ADOTable1.Filter := 'Name LIKE ' + ''''+ Edit1.Text +'%''';
2.12. Click on the ADOConnection and go to the Object procedure TForm1.Button1Click(Sender: TObject); ADOTable1.Filtered := True;
Inspector begin end;
2.13. Set Login Prompt to false ADOTable1.First;
while not ADOTable1.Eof do 9.3 Filter according to number value:
2.14. Set Connected to true
2.15. On ADOTable or ADOQuery choose this begin
if ADOTable1['Name'] = Edit1.Text then procedure TForm1.Button3Click(Sender: TObject);
ADOconnection in the Connection property in the
begin begin
Object Inspector
ShowMessage('This record is present'); ADOTable1.Filter := 'Amount > ' + Edit1.Text;
Exit; ADOTable1.Filtered := True;
ADD RECORD TO TABLE USING CODING end end;
3.1 A new record can be added using set data: else
procedure TForm1.Button1Click(Sender: TObject); ADOTable1.Next; DELETE ALL RECORDS
begin end; procedure TForm1.Button3Click(Sender: TObject);
ADOTable1.Append; end; begin
ADOTable1['Name'] := 'John'; ADOTable1.First;
ADOTable1['Surname'] := 'Doe'; SEARCH AND REPLACE FIELDS WITH SET DATA while not ADOTable1.Eof do
ADOTable1.Post; procedure TForm1.Button2Click(Sender: TObject); begin
end; begin if ADOTable1['Name'] <> '' then
ADOTable1.First; ADOTable1.Delete
3.2 A new record can be added from an EditBox: while not ADOTable1.Eof do else
procedure TForm1.Button1Click(Sender: TObject); begin ADOTable1.Next;
begin if ADOTable1['Name'] = Edit1.Text then end;
ADOTable1.Append; begin end;
ADOTable1['Name'] := Edit1.Text; ADOTable1.Edit;
ADOTable1['Surname'] := Edit2.Text; ADOTable1['Name'] := Edit2.Text; COUNT RECORDS
ADOTable1.Post; end; procedure TForm1.Button3Click(Sender:TObject);
Edit1.Clear; ADOTable1.Next; var
Edit2.Clear; end; iCount : Integer;
end; end; begin
3.3 Add a record from from SpinEdit: iCount := 0;
DO A CALCULATION IN A FIELD USING DATA FROM ADOTable1.First;
procedure TForm1.Button1Click(Sender: TObject); EXISTING FIELDS while not ADOTable1.Eof do
begin procedure TForm1.Button1Click(Sender: TObject); begin
ADOTable1.Append; begin if ADOTable1['Name'] <> '' then
ADOTable1['Grade'] := SpinEdit1.Value; ADOTable1.First; iCount := iCount + 1;
ADOTable1.Post; while not ADOTable1.Eof do ADOTable1.Next;
end; begin end;
3.4 Add a record from RadioGroup: ADOTable1.Edit; Label1.Caption := IntToStr(iCount);
ADOTable1['Total'] := end;
procedure TForm1.Button1Click(Sender: TObject); ADOTable1['Unit'] *
begin ADOTable1['Amount'];
ADOTable1.Append; ADOTable1.Next;
ADOTable1['Class'] := end;
RadioGroup1.Items[RadioGroup1.ItemIndex]; end;
ADOTable1.Post;
end;
SHOW ALL FIELDS AND ALL RECORDS WITHIN A SET COUNT NUMBERS OF RECORDS
RANGE (UNIT IS AN INTEGER FIELD) SELECT Count(*)
FROM tblResults
WHERE Num2 > 50;
SELECT * FROM tblTableName WHERE Unit BETWEEN 1 AND 6
PLUG-IN SWITCH
A switch is a hardware device used to connect computers on
Software which adds functionality to a bigger program, often
MODULE 2.4 – COMPUTER MANAGEMENT a network so that communication can occur.
used when browsing the Web.
DATA TERMINATING DEVICE (‘MODEM’) MODULE 3.4 – WEB PAGE TECHNOLOGY DATA HIERARCHY
The function of a ‘modem’ is to convert signals from your Refers to the two levels of data storage – the lower bits and
computer to those transmitted over the telephone line and HTML (HYPERTEXT MARKUP LANGUAGE) bytes level and the higher levels of files, databases and data
vice versa so that communication can occur. A set of formatting codes, placed in a text file to change the warehouses.
way a browser displays text.
FILE TRANSFER PROTOCOL (FTP) DATA WAREHOUSE
File Transfer Protocol (ftp) is the protocol used for the fast, TAGS A data warehouse is a vast collection of data fathered from a
easy transfer of files between remote computers that have Formatting codes placed between ‘<’ and ‘>’ in a text file. variety of databases and other data sources. It is specifically
an Internet connection. designed to determine trends and patters within the data
TEXT FILE and it is designed for reporting and querying.
FTP SERVER A file that contains ASCII text only and no formatting.
A computer allowing people to use FTP to upload or DLL FILES
download files. TYPOGRAPHY DLL or Dynamic Link Libraries are files that contain code or
Typography involves the placing and formatting of text. The routines that can be called and used by programs.
HOME PAGE choice and use of fonts is an important aspect of
A home page is the first page of a website and contains typography. FILE
information about the website’s purpose and content. It also A file is a collection of data or information that is stored on a
provides links to other web pages, websites and documents. computer under a single name. They are represented as
icons on the computer.
HYPERLINK SECTION 4 – DATA AND INFORMATION
A hyperlink is a built-in connection to another related web MANAGEMENT FILE EXTENSION
page, and is indicated as text underlined in blue, or by a This set of characters (usually 3-5) is added to the end of a
graphic with blue outline. file name and it identifies the type of file e.g. docx is the file
extension of a Microsoft Word file.
HYPERTEXT TRANSFER PROTOCOL (HTTP)
HyperText Transfer Protocol (http) is the protocol that MODULE 4.1 – DATA AS THE COMPUTER SEES IT FILE FORMAT
defines how pages are transferred on the web. How data is structured or organised within a file. Each
ASCII program has its own file structure for its files. Some
INTERNET ASCII (American Standard Code for Information Interchange) programs can interpret or read files that have a different file
The internet, also called the Net, is a worldwide computer is a coding system which is limited to 256 different structure to the one they use.
network, consisting of computers and networks that are characters.
linked using telephone lines, undersea cables, satellite or FILE MANAGER
microwave for the purpose of sharing resources and BINARY A utility program like Windows Explorer that comes as part
communication. The base 2 number system that consists of just two digits, of the operating system. It allows the user to manage their
namely a 0 and a 1. files and folders.
INTERNET PROTOCOL (IP)
IP (Internet Protocol) is the protocol used for BIT FILE NAME
communication over a network or the internet A binary digit i.e. a 0 or a 1 Name given to a file followed by a full stop and the file
extension e.g. MyFile. docx
FILE –NAMING CONVENTIONS DIGITAL DIVIDE IDENTITY THEFT
Rules and restrictions that the operating system places on The gap between people that have access to computers and Identity theft is when someone steals your personal details
how a file can be named. Organisations or individuals might technology and people that do not. such as your ID number, credit card details or driver’s license
also choose to name their files according to a fixed format to commit fraud or another crime.
that they choose. EULA (END USER LICENSE AGREEMENT)
A license agreement (which is a legally binding contract) in INTERNET HOAX
FOLDER which you agree to use software only according to the An internet hoax is an e-mail message or article intended to
A folder is a storage place or container in which you can software company’s terms. Most software won’t finish deceive or defraud others.
store files or more folders on disk. installing until you have indicated that you are aware of the
terms and conditions of this license agreement, and that you NETIQUETTE
FONT FILES accept them. These terms and conditions differ from license Netiquette (Internet + Etiquette), is the name given to the
Files containing fonts that can be used by programs on the to license, but they mostly involve things such as the use of good manners and showing respect for other user
computer where the fonts are installed. They typically have number of computers you may install the software on, and when using the Internet.
a file extension of TTF or OTF. whether you may distribute the software or not.
PHARMING
GRAPHICS FILES GNU / GPL Pharming is an identity theft scam, where the user’s
Files that contain images or graphics. Common graphics Is a license specifically for software that allows people to computer is infiltrated so that they are automatically
formats include JPEG, BMP, GIF, WMF, TIF, PNG. distribute the software for free or even charge for it so long redirected to another (fake) website, even if they type in the
as the source code is made available. GNU is Copyleft and is correct URL for that website.
HYPERTEXT MARKUP LANGUAGE (HTML) FILES the license most freeware is distributed under.
Hypertext Markup Language files are used to define the PHISING
structure and layout of web page. INTELLECTUAL PROPERTY Phishing refers to attempts from people to con the user into
The idea behind any original creation is the property of its giving out personal, confidential details such as PIN numbers
PATH creator, and not only the physical objects which express that and passwords, by posing as a legitimate organisation,
The ‘sequence’ of folders that lead to the location of a idea. If, for example, you were to write a poem or a book, or usually via e-mail.
specific file. The backslash character is used to separate the take a photo, and someone were to make a copy of it
‘list’ of folders in the path e.g. D:\Documents\Invoices\ without asking your permission or compensating you, that SECURE URL
person would have stolen your intellectual property, even if A secure URL begins with https:// or has a small closed lock
PDF FILES he didn’t steal your physical exemplar of the work. displayed somewhere on the page, often next to the URL.
Portable Document Format files are used to distribute
document files, as they do not require the program in which PIRACY SPAM
the document was created to be installed to read. You just The act of stealing intellectual property. i.e. using or making Spam is the electronic equivalent of ‘junk mail’. It is an e-
need a free utility program called Adobe Reader to read it. a copy of the kind of work protected by copyright law. mail being sent to you in the form of advertising of products
that you did not request.
PLAIN TEXT FILES
A text file that contains lines of plain text. The file extension SPYWARE
.txt is associated with text files. Text files can be opened by MODULE 5.2– GREEN, HEALTH AND GLOBAL E- Spyware is software that tries to monitor and track the way
any word processing application or simple text editing COMMUNICATION ISSUES you use your computer. It is installed on user’s computers
utilities such as WordPad and Notepad. without their knowledge.
CARPAL TUNNEL SYNDROME
PROGRAM FILES This is caused by inflammation of the tendons in the wrist, TROJAN
These are actual programs, not data files, that run (execute) causing pressure on the nerves in the wrist, resulting in pain A Trojan is a destructive program disguised as an useful
when opened. They normally have a .COM or .EXE file and sometimes weakness in parts of the hand. application.
extension.
E-WASTE VIRUS SIGNATURE (DEFINITION)
PROGRAMMING LANGUAGES The broken, old, outdated and discarded hardware that we A virus signature or definition is the pattern that uniquely
Programs such as Delphi, Java and C# that allow one to don’t want and don’t need. identifies a virus.
construct and specify a set of programming instructions or
source code. ERGONOMICS GRADE 11 THEORY
Studies of the human body to try to design products so they
RICH TEXT FILES better fit the way that we actually function. SECTION 1 – SYSTEM TECHNOLOGIES
Rich Text format files support ‘rich text’, which includes text
formatting, such as bold and italics, fonts and font sizes, GREEN COMPUTING
page setup and tab settings and even images. Green computing refers to initiatives to design, use and
disposal of technology in an environmentally or eco-friendly MODULE 1.1 – HARDWARE
WILDCARDS way.
Characters that represent one or more characters. For
example Windows allows us to use an asterisk (*) to RSI (REPETITIVE STRAIN INJURY) BIOS
represent any number of characters or a question mark (?) Basic Input Output System – the essential start-up
A class of injuries (to tendons, ect) caused by repetitive
to represent one single character when searching for files or instructions of a computer, in ROM chips on the
actions.
folders. motherboard, and representing the lowest level of
programming firmware.
BUS
MODULE 5.3 – SAFE INTERNET AND E-MAIL USE A set of electrical paths etched on a motherboard, used to
SECTION 5 – SOCIAL IMPLICATIONS transfer data between different parts, e.g. between an
ADWARE expansion card and RAM.
Adware is software that downloads and bombards your
computer with adverts that pop-up whenever you are CACHING
connected to the Internet. It is more of a nuisance than a A method used to compensate for the loss of efficient, or
MODULE 5.1 – SOCIAL, ETHICAL AND LEGAL ISSUES threat. ‘bottleneck’, that becomes inevitable when a faster medium
SURROUNDING ICTs tries to communicate with a slower medium.
ANTI-VIRUS SOFTWARE
COPYLEFT Anti-virus software is a computer program that scans CMOS
A type of Copyright law which allows people to use and computer files for viruses and eliminates them. Complementary Metal Oxide Semiconductor – the type of
distribute work whilst still allowing the creator some control memory that stores the BIOS settings that can be updated or
over where and how it can be used. COMPUTER VIRUS changed. This memory is kept ‘alive’ by a small battery on
A computer virus is a program that is written to disrupt the the motherboard.
COPYRIGHT normal functioning of a person’s computer without their
A law designed to protect intellectual property by creating knowledge or consent. CPU
legal limits on who can copy, sell and use types of work such Central Processing Unit – a chip that can contain more than
as photos, documents, books or poems. Copyright is COMPUTER WORM on ‘core’ (complete processor) and which connects to the
normally indicated by the word Copyright or the © symbol A computer worm is malware that is able to distribute itself motherboard using the ZIF socket. Responsible for all the
followed by the name of the copyright owner and the year over a network, normally via e-mail, without a person having processing.
that the copyright was first applied. run an infected program.
CPU CACHE
CREATIVE COMMONS E-MAIL SPOOFING Special type of high-speed memory built into the CPU, used
A copyright license that allows you to use parts of, copy and E-mail spoofing is the changing of an e-mail header so that to maximise CPU productivity.
distribute work for non-profit purposes. Creative commons the origin of the e-mail appears to be from a different
is a Copyleft-style license. source.
DIMM ROM MULTITASKING
Dual Inline Memory Module – thin rectangular electronic Read Only Memory – permanent, non-volatile memory The operating system splits the CPU time between multiple
boards, which contain banks of RAM chips; inserted into associated with Firmware, typically found in the ROM chip, programs, and so the computer seems to be doing more
DIMM slots on the motherboard, and the means whereby which holds the start-up instructions (BIOS) of the computer. than one task at a time.
the memory of a computer is upgraded.
SATA CONNECTORS MULTITHREADING
DISK CACHE Connectors on the motherboard for attaching cables for The ability of an operating system to allow programs to split
A certain amount of high-speed memory built into every storage devices, such as hard drives and optical drives. themselves into multiple tasks (or threads) that can be run
hard drive. Used to cache data from the (slower) disk, and at the same time.
thereby speed up subsequent calls for the same ‘chunk’ of STORAGE
code or data. Storage provides a place where a computer can keep data OPERATING SYSTEM
instructions permanently. System software, which controls all the activities that take
EEPROM place in a computer.
Electronically Erasable Programmable Read Only Memory – SYSTEM CLOCK
a type of ROM that can be erased electronically, after which A small quartz crystal that pulses at a regular frequency OPERATING SYSTEMS FOR COMPUTERS
a new ‘image’ of upgraded contents can be written back. measured in GHz; used to coordinate activates on a Windows, OS X, Linux
motherboard.
EXPANSION SLOTS OPERATING SYSTEMS FOR MOBILE DEVICES
Slots on the motherboard for attaching additional circuit THUNDERBOLT iOS, Android, Windows RT, Windows Phone 8, Blackberry OS
boards in order to ‘expand’ the capabilities of the computer A new superfast connection technology, which can support 10
– mostly dedicated video and sound cards for high-end multiple simultaneous connections.
gaming and design work. PROCESS
USB Any sequence of instructions that can be executed by a CPU.
EXTERNAL CONNECTORS Universal Serial Bus – the most widely used connection
Situated both ad the bac and the front of the casing, e.g USB option for attaching devices to a computer, via a USB port. PROCESS MANAGEMENT
ports, VGA port for monitor, RJ45 port for Ethernet network The task of making sure that each process gets enough CPU
cabling, speaker and microphone jacks, ect. VIDEO CARD / GRAPHICS CARD time and access to hardware resources so that it can work
Hardware component that generates the images – both without interfering with or being interfered with by other
FIREWIRE graphic and text – displayed on the monitor. Either processes.
A type of port that can transfer data faster that USB. It integrated on the motherboard or supplied as a separate
usually used where high speed data transfer is desirable, card plugged into a PCIe expansion slot. PROGRAM
such as videos from a video camera, and data to or from an A set of instructions mean to accomplish a single task.
external hard drive. WEB CACHING
The process of storing recently accessed web pages locally THREAD
FIRMWARE on the relatively much faster hard drive so that they are A part of a larger program that runs independently by
Software that is permanently installed, or ‘hard-coded’ on a quicker to retrieve the next time they are needed. Retrievals simultaneously with other parts of the same program.
ROM chip, and used to control the basic operation of a from local storage are much faster than Internet downloads.
device, e.g a printer.
VIRTUAL MEMORY
ZIF SOCKET An area of storage or disk space that the operating system
FLASHING THE ROM Zero Insertion Force – a type of socket on the motherboard keeps for its own use.
The process whereby the existing contents of firmware is for connecting a CPU.
wiped and replaced with an updated version – always to be
VIRTUALISATION
performed with great care.
Creating an entity (memory, storage, machine ect) that only
exists in software.
GPU MODULE 1.2 – SOFTWARE
Graphics Processing Unit – dedicated graphics processor on
a graphics card, used to provide extra processing power. API
Application Programming Interface – an interface between MODULE 1.3 – COMPUTER MANAGEMENT – SAFE-
HARDWARE INTERRUPT (IQR) the operating system and the programming language / end
A dedicated communication channel, or means, whereby a
GUARDING OUR DATA
user.
device can request the immediate attention of the CPU, in
order to process a given function, e.g a mouse click or a BIOMETRIC SECURITY
ASSEMBLER Security based on measurement and identification of unique
keystroke.
A program that translates assembler code to machine code. physical characteristics of a person, e.g fingerprints.
MACHINE CYCLE COMPILERS
Steps taken by the CPU in carrying out instructions: DATA VALIDATION
Software that translates programming instructions written in Checking for the correctness of data from a computer
Fetching instructions and data from the a high-level language into standalone ‘executable files’ (with
memory (RAM) perspective, i.e with reference to a defined set of criteria, or
an .exe extension) that can be run independently of the allowable values, which the computer program will either
Decoding the instructions programming language or compiler. accept or reject.
Executing the instructions
Transferring data back to the memory HIGH-LEVEL PROGRAMMING LANGUAGES DATA VERIFICATION
Programming languages that are easier for humans to write Checking for the accuracy of data from a human perspective.
MODULAR DESIGN and understand, that rely on extensive pre-written libraries
A computer design philosophy, which incorporates a variety to execute complex instructions with just a few lines of code.
of separate ‘modular’ components, thereby facilitating DEFENSIVE PROGRAMMING
upgrades and maintenance. A technique whereby the programmer makes pro-active
INTERPRETERS provision for possible errors made by the user, in the
Software that translates programming instructions into interest of correct data entry.
MOTHERBOARD machine code one line at a time. Does not generate
A large electronic circuit board with slots and connectors for executable files. Programs written for interpreters can only
attaching different components and peripherals. DISK IMAGING
run if the interpreter (or a special ‘runtime’ module of the
Creating a backup ‘image’ of the entire hard drive, including
interpreter) is installed on the computer.
all data and programs, to be used for re-installation in the
PLUG-AND-PLAY (PNP)
case of complete hard drive failure.
A technology that automates the configuration process of a LOW-LEVEL PROGRAMMING LANGUAGES
device before it can be used. Assembler type languages that typically use fewer ENCRYPTION
commands, but correspondingly more simple instructions, to
The ‘scrambling’ of text or data according to a specified set
POINT-TO-POINT CONNECTIONS produce very fast and efficient code.
of rules to ensure the privacy of data during communication,
Dedicated connection between two components (e.g
or for security purposes.
between RAM and CPU that is not shared with other MACHINE CODE
components. Instructions in binary format (0’s and 1’s) that the CPU can FIREWALL
directly execute.
Hardware or software that monitors the traffic between a
POST
computer and the internet, to safeguard against breaches in
Power On Selft Test – start-up test performed by the Bios to MULTIPROCESSING security.
ensure that all essential hardware (RAM, keyboard ect) is The type of processing that takes place when the operating
present and in working order. system divides the programs/threads/processes between
multiple CPUs (Physical chips or cores).
RAM
Random Access Memory – temporary, volatile storage area
for all running programs and data being processed.
GIGO 4G(LTE)
‘Garbage In, Garbage Out’ the quality of the output for any The latest generation of cellular communications
computer system is directly related to the quality of the technology.
input. MODULE 2.2 – E-COMMUNICATIONS
ACCESS POINT
INCREMENTAL BACKUP Also called a base station, consists of a server/transceiver ANDROID OS
Backup schedule whereby backups are made only on new and an antenna, which transmits and receives radio waves Operating system created by Google and used on most non-
files and files that have changed since the last backup, so that the devices that are wireless enabled are able to Apple mobile devices.
resulting in greater backup efficient (saving in disk space and communicate with one another and the network.
backup time), and allowing selective data recovery from an BLOGS/WEBLOGS
earlier date. BANDWIDTH Websites updated regularly with news and events in
The total amount of data that can be transferred from one chronological order. A blog reads like a journal with the most
MALWARE point to another in a given period of time. recent entry at the top.
Malware (malicious software) is a general term used to
describe malicious software that is specifically designed to HOME AREA NETWORK (HAN) BLUETOOTH
install itself without the user’s knowledge to negatively A small network within a home environment. A wireless technology that allows devices such as mice,
affect or ‘harm’ a computer system. printers and cell phones to communicate over a relatively
short distance, typically less than 10m.
HOTSPOT
ONLINE BACKUP An area, usually in a public space such as an airport,
The backing up of data on a server on the Internet (‘the restaurant or hotel lobby, where people may receive and be E-MAIL
cloud’), with the advantages of data synchronisation, sharing granted WiFi access from an access point to connect The composing, sending and receiving of messages
and portability. wirelessly to the Internet via a wired network. electronically over a network, including the Internet.
WEB 3.0
The future of the WWW, in which exact directions are still
MODULE 2.3 – THE INTERNET AND THE WWW uncertain, but which will certainly contain elements of MODULE 3.2 - IT AND THE WORKPLACE
artificial intelligence and a greater emphasis on personalised
AUDIO AND VIDEO ON DEMAND (AVOD) content; in other words less ‘reaction’ and more customised ARTIFICIAL INTELLIGENCE
‘prediction’ in favour of users. Web 3.0 will also be
Video on Demand (VOD) and Audio and Video on Demand Simulation of human decision-making processes by a
accompanied by enhancements in web-enabled devices,
(AVOD) are systems which allow users to watch video computer system that is programmed to react based on
elimination of incompatibility issues, extensions in mobile
content and listen to audio content on demand. input gained from sensors.
capacity and increases in bandwidth and speed.
DOWNLOADING DECENTRALISATION OF LABOUR
Transferring and saving an audio or video file from the
WEBINARS Concept whereby ICT has made it possible for people to
Online seminars, which users in remote locations can
Internet onto a computer, smartphone or tablet. You can work from remote locations, instead of being tied to a
participate in, using online conference technologies. These
then play the file at a later stage, or more than once, specific central location.
occur in real-time and allow ‘delegates’ access to interactive
without being connected to the Internet.
conferences and workshops.
GRAPHIC DESIGNER
FIXED LOCATION INTERNET ACCESS Someone who designs the ‘look’ of a product or solution,
High speed data transmission to homes and businesses using
WWW (WORLD WIDE WEB) such as the physical packaging, or the visual/spatial aspects
A service on the Internet. The WWW consists of a vast global
cabled technologies such as ADSL. This is often referred to as of a program or website.
collection of interlinked, Interactive multimedia documents.
a fixed broadband access.
MOBILE OFFICE
INTERNET A concept whereby the tools of your business, e.g your
A worldwide computer network, consisting of devices, tablet and smartphone, are carried around with you,
computers and networks connected to one another. MODULE 2.4 – INTERNET SERVICES TECHNOLOGIES allowing you to perform common office functions while ‘on
the move’.
INTERNET PROTOCOL TELEVISION (IPTV) DNS (DOMAIN NAME SYSTEM)
The delivery of television services over the Internet instead An Internet service that translates domain names to IP NETWORK ADMINISTRATOR
of through traditional satellite systems such as South Africa’s addresses. Domain names consisting of words are easier to Someone who manages a network from the software
DSTV. remember than IP addresses. The Internet is based on IP perspective, typically working on a server and using the
addresses. When you use a domain name, a DNS service management tools provided by a network operating system,
must translate the name into the corresponding IP address. e.g Windows Server 2012
JPEG
The most common file format used for digital photos or
graphics, also widely used for graphics on websites. (JPEG DYNAMIC WEBSITE OFFICE AUTOMATION
files are also known as JPG files.) A website consisting of web pages designed to be generated Process whereby certain routine office processes are carried
‘on the go’ and which may differ each time, based on who out without human intervention.
LIVE BROADCASTS the user is and what their recorded preferences and options
are.
The broadcasting (Streaming) of different types of media in OUTSOURCING
real-time without any significant delay, allowing users to Contracting specialist businesses to run aspects of your own
witness events as they are happening. EXTRANET business that are essential for proper functioning, but that
An organisation’s intranet (or part thereof) which is available
do not fall within your own area of expertise.
LOSSLESS COMPRESSION to other users outside the organisations.
Compressing data without losing any portion of the data. It PC TECHNICIAN
allows the exact original data to be reconstructed. INTRANET Someone who assembles, upgrades and repairs computer
An organisation’s private network which is an Internet-like
hardware.
LOSSY COMPRESSION environment consisting of documents and resources relating
to the organisation’s business.
Compressing data by sacrificing some insignificant or PROGRAMMER
virtually indetectable portion of the data. Someone who writes code to create or maintain software,
RIA (RICH INTERNET APPLICATIONS) often as part of a team with other programmers and IT
MOBILE INTERNET ACCESS A web application that is designed to deliver the functions
specialists.
and features of a traditional desktop application. Web
The ability to connect to the Internet using wireless
browsers are required for access. Unlike traditional
networks such as the cellular phone network. This is often ROBOTICS
applications, the installation of software is not needed.
referred to as mobile broadband Internet Access. Performance of physical tasks, commonly repetitive or
dangerous ones, by computer-controlled machines rather
MP3 (MPEG-1 AUDIO LAYER-3) RSS (REALLY SIMPLE SYNDICATION) than by human beings.
A web or news feed that automatically provides users with
The most common digital music file format, combing
updated content or notifications of new content. This
efficient compression with excellent sound quality. The SECURITY CONSULTANT
content can then be accessed from a central application
current standard for storing digital music. Someone who critically evaluates the security aspects of a
without having to check each and every website.
business, then designs or recommends appropriate
MPEG (MOVING PICTURE EXPERTS GROUP) solutions.
A reference to the digital compression standards and file
SEO (SEARCH ENGINE OPTIMISATION)
A strategy or technology used to obtain a high-raning
formats developed by the group. SYSTEMS ANALYST
placement in the search reults page of a search engine such
Someone who performs the ‘Interface’ function between
as Google.
MPEG-2 client and programmer, analysing the requirements of the
A standard used for the compression of video files and their client as a list of specifications for the programmer, who will
associated audio tracks, and widely used to broadcast digital
STATIC WEBSITE ultimately create the software solution.
A website consisting of multiple pages – each a single file
television.
that displays exactly the same information every time to the
user just as when it was created.
TELECOMMUTING
MPEG-4 Working in decentralised locations, e.g from home, but using
The latest and still developing standard used for the modern communication occasionally to ‘check in’ at the
compression of audio and visual digital data through the use physical office.
of lossy compression.
SECTION 3 – SOCIAL IMPLICATIONS VIRTUAL OFFICE
STREAMING A fixed physical address, containing minimal office setup
The immediate and real-time delivery of media content to a such as a reception desk and meeting room, which is used as
receiving device, starting from the time at which the media a shared space by people who otherwise work from a mobile
file is opened. The file is not saved to your device. MODULE 3.1 – ICT AND SOCIETY office.
WEB AUTHOR DISTRIBUTED DATABASE E-READER
Someone who uses a variety of tools to plan, structure, A system where parts of a database (the data and the DBMS) Single-purpose device designed to allow you to read e-books
create and maintain a website. are spread (distributed) across servers in separate locations. (and have a portable library of e-books).
PURGE
Actually, remove deleted records from a database to
compact and streamline the file.
ROLLBACK
When the DBMS gets the instruction to reverse a transaction
(or series of transactions) and restores the data to its
previous state.
DATA MINING
The use of complex algorithms to group and arrange
‘big data’ so that interesting and previously unknown
patterns emerge – and new information is
discovered.
DATA WAREHOUSE
A huge collection of data, often accumulated from a
range of sources such as separate databases within a
company.
LOCATION-BASED DATA
Data that is linked to a specific location – usually
using co-ordinates captured by a GPS device.
RFID
Radio Frequency Identification – a data capture
technology designed to store more data and work
more interactively than conventional barcode
systems.