You are on page 1of 30

CLARIFICATION OF EXISTING CONTENT IN CAPS

AND ADDITIONAL CONCEPTS

ASSESSMENT IN PAPER 2
as per the 2017 Examinations
Guideline Grade 12

With thanks to:


CAT Advisors: Estelle Llewellyn (KZN), Fotiene Avrakotos (Gauteng), Vani Pather (KZN), Shani Nunkumar (KZN),
Yvette Lourens (Northern Cape)
CAT Teachers: Anton van Kampen (Nico Malan High – Eastern Cape), Sharon Oelofsen (Ladysmith High, KZN),
Reginald Govender (Kingsway High, KZN), Northern Cape CAT teachers.
TABLE OF CONTENTS
1. Phablet .................................................................................................................................................... 1
2. Solid-State Drive (SSD) ............................................................................................................................ 3
3. 3D printing/printers ................................................................................................................................ 4
4. Micro USB................................................................................................................................................ 5
5. Multi-touch screen ................................................................................................................................. 6
6. Card Reader............................................................................................................................................. 7
7. URL shortener ......................................................................................................................................... 8
8. HDMI (High Definition multimedia interface) ......................................................................................... 9
9. Near Field Communication (NFC) ........................................................................................................ 10
10. BYOD: (Bring Your Own Device) ....................................................................................................... 11
11. 802.11 a/b/g/n ................................................................................................................................. 12
12. LTE .................................................................................................................................................... 13
13. Geo-tagging ...................................................................................................................................... 14
14. Click-jacking ...................................................................................................................................... 15
15. Crowd funding .................................................................................................................................. 16
16. Big data ............................................................................................................................................ 17
17. Bitcoin .............................................................................................................................................. 18
18. Digital migration............................................................................................................................... 19
19. Internet of Things (IoT) .................................................................................................................... 20
20. Mobile or M-Learning ...................................................................................................................... 21
21. Ransomware .................................................................................................................................... 22
22. Screen Lock Pattern ......................................................................................................................... 23
23. Shaping (Network Tuning) ............................................................................................................... 24
24. Throttling (Policing) .......................................................................................................................... 25
25.1 Virtual Reality (VR) ........................................................................................................................... 26
25.2 Augmented Reality (AR) ................................................................................................................... 27

NOTE: Concepts highlighted in yellow in the pages that follow are concepts that are new
and that did not appear in previous Examination Guidelines.
There are references to websites in the text.
YouTube videos for most of these concepts can be accessed at:
https://goo.gl/dv49cF
CLARIFICATION OF EXISTING CONTENT IN THE CAPS

“The terminology highlighted in this section has appeared in previous Examination Guidelines. The
level of depth of knowledge required for these terms is as indicated in terms of understanding
what these terms represent and a basic understanding of their application(s) in an ICT context.”
(Computer Applications Technology: Examination Guidelines – Grade 12 – 2017)

DIFFERENT TYPES OF COMPUTERS (CAPS p19) and CONVERGENCE (CAPS p39)

1. PHABLET
Description – What it is  A phablet is a smaller version of a tablet which (over and above
tablet features) also incorporates features found on a smartphone
such as voice calls and SMSs.

Simple explanation of how it • A phablet offers users a device that is larger than a smartphone
works with regards to screen size, yet small enough to be able to handle
it in one hand.
• Phablets also allow users to make cellular calls.

Technology convergence provides the convenience of having the


features of multiple technologies in one device, saving on both size and
cost to the customers.
Refer to : http://www.businessdictionary.com/definition/convergence.html
Advantages • Phablets have a larger screen than a smartphone.
• Phablets have cellular calling/communication ability.
Disadvantages • Some phablets are too large to fit into your pocket like a normal
smartphone.
• Phablets are more expensive than smaller smartphones.
Examples of the technology Refer to:
in practice • https://www.youtube.com/watch?v=c9HPy9i-Ju4

1|Page
CONVERGENCE The impact of convergence of technologies in our daily life can be best
illustrated with mobile phones.
Relevance and impact
on personal lives Apart from the basic purpose of mobile telephony, the latest cell phones

support multiple features such as:

http://evirtualguru.com/wp-content/uploads/2014/06/Convergence-Computing-Technology-2.png

Examples of the • Taking photos with a smartphone (combining the functionality of a camera
technology in practice and a mobile phone).
• Surfing the web on a television (surfing is usually associated with a
computer).
• DVD players are not only capable of playing DVDs, but can also play different
formats like music CDs, photo CDs, as well as encoded video formats as DIV
or VCD.

2|Page
EXAMPLES OF GENERIC/COMMON STORAGE DEVICES AND MEDIA (CAPS p20)

2. SOLID-STATE DRIVE (SSD)


Description – What it A solid state drive is a drive that has no moving parts making it quieter and
is more robust. Solid state drives operate much faster than traditional hard
drives as they store data electronically and not magnetically as with a
traditional hard drive.

http://www.jctechguy.com/solid-state-drive-upgrade/
Simple explanation of • SSD uses microchips - it contains no moving parts like a HDD.
how it works • The essential SSD components includes a host interface meaning there is
an interface provided that allows the SSD to communicate with the driver.
• SSD uses 'flash-memory' which is similar to RAM but non-volatile. Data is
not lost when the power goes off.
• SSD use a grid of electrical cells to quickly send and receive data.

Advantages • SSD is faster and has better performance and reliability than an HDD.
• SSD is less likely to get damaged because of no moving parts.
Therefore, SSD is quiet compared to HDD.
• Read/write speed (data access) of SSD is extremely fast and much quicker
than HDD.
• SSD uses 'flash memory' to store data and is not affected by magnetic
interference.
• SSD has low power consumption.
• SSD is easier to carry around because of its physical size (2.5 inch) which is
smaller than the size of an HDD (3.5 inch).
• SSD does not become fragmented therefore there is no need to defrag.

Disadvantages • SSD can wear out after using for a long time as data can be written to or
erased from the same place in flash memory for a limited number of
times.
• SSDs are more expensive than HDDs.
Limitations SSDs wear out when data is repeatedly written onto the same place unlike
normal HDDs.
Relevance and impact on Used to store program files and operating system files.
personal lives
Examples of the • Can also be found in smartphones, tablets and PC’s
technology in practice • Can become the standard for ultra-thin laptop computers.
• Would be preferable for workloads that require higher performance, for
example, database applications.

3|Page
GENERIC COMMON OUTPUT DEVICES (CAPS p20)

3. 3D PRINTING/PRINTERS
Description – What it is 3D printers can create three-dimensional solid objects (e.g. motor vehicle
parts, human tissue replacement, jewellery, clothing, etc.) from a digital
model of the item by adding successive layers of material on top of one
another.

An ORDbot Quantum 3D printer Full colour miniature face models produced on


a 3D Printer

Simple explanation of To be able to produce a 3D reproduction, the 3D printer reads the design
how it works from a 3D printable file and then fuses layers of liquid, powder, paper or
sheet material on top of one another to build the model. These layers
correspond to the computer-generated cross sections of a Computer-
aided Design (CAD) model.
Advantages • 3D printing is much cheaper than conventional manufacturing methods.
• 3D printing technology enables home users to have access to machines
that can build 3D models.
• Parts needed for a project can be made 'on-demand'.

Disadvantages • 3D printers are expensive, even entry-level machines are much more
expensive than normal printers.
• It can take a long time to create models for 3D printers.
• Consumables used in 3D printing are also relatively expensive.
Limitations • Printers are limited to the size they can print with regards to the space
within the machine where the model is printed.
• Almost all 3D printers use some form of plastic for their models.
Relevance and impact Consumers can customize objects using basic web-based customization
on software and then order that item as a 3-D printed article, for example,
personal lives customized cases for mobile phones.

Examples of the Refer to:


technology in practice https://www.youtube.com/watch?v=uQvN10kGKrk

4|Page
IDENTIFY PORTS AND CONNECTORS (CAPS p20)
OMMON OUTPUT DEVICES (CAPS p20)
4. MICRO USB
Description – What it is A Micro USB is a smaller version of a USB port, usually found on portable
devices such as smartphones.

Additional information
Standard USB connectors have four pins: one for power, two for data and one for
(signal) ground.
Mini USB: feature a fifth ID pin. Used for devices that are stationary and not
connected/disconnect often.
Micro USB features five pins - fifth is an ID pin.

Simple explanation on • A Micro USB is a smaller version of the popular, standardised USB port
of how it works which gives the same functionality as a full-size USB port.

Advantages • A Micro USB takes up less space.


• A Micro USB has full USB functionality.
• A Micro USB can be used to connect a device to a charger as well as a
computer, so one port serves two purposes.
• A Micro USB is a standard on most mobile devices.
More info on lighting port:
https://www.premiumusb.com/blog/whats-the-difference-between-usb-micro-usb-and-
lightning

Relevance and in impact • Many modern devices, such as smartphones, use a Micro USB port not
personal lives only to connect the device to a computer, but also to connect the device
to a charger.
• Flash storage can also be connected to mobile devices via micro USB.

Examples of the in • Smartphone connectivity


practice technology

5|Page
INPUT (Basic concepts, features and uses) (CAPS p20)

5. MULTI-TOUCH SCREEN
Description – What it A multi-touch screen is a
is feature of a screen that allows it to
register more than one point
being touched
simultaneously.

Simple explanation of • A multi-touch screen allows more than one touch to be recognised as input
how it works at the same time – there are multiple points of contact at the same time.
• Users use two or more fingers such as pinching a picture to zoom out.
• Some touch screens also respond to finger motions such as sliding your
finger to drag an object.

Advantages A multi-touch screen offers more functionality without using menus.

Disadvantages Users need to learn the multi-touch gestures/motions.


Limitations Smaller screens have a limit as to how many physical touches are possible
on a small screen.
Examples of the • Use two or more fingers to pinch and stretch to control the zooming on
technology in practice tablets.
• Five fingers are used in a pinching gesture/motion to close apps on an
iPad.

6|Page
STORAGE MEDIA AND DEVICES (memory cards) (CAPS p22)

6. CARD READER
Description – What it is A card reader is a device that can be connected to a computer designed to
accept and read data from different types of storage media such as SIM and
SD cards and flash drives, etc.

Simple explanation of A memory card reader is a device, typically having a USB interface, for
how it works accessing the data on a memory card such as a Secure Digital (SD) or
MultiMediaCard (MMC). Most card readers also offer write capability.

Advantages • Card readers transfer images to a computer faster than transferring


from a digital camera.
• It consumes little energy or power.
• Using a memory card reader, rather than the camera cable, ensures less
drain on the camera batteries.
Disadvantages/Limitati • Card readers are not a one
ons size fits all, some are single card
readers and some are multiple
card readers.
• Frequent use of a card reader
can damage the memory card if
mishandled.
• Can be cumbersome to carry an external card reader around to use on
a USB port.
Relevance and impact • A multiple memory card reader allows you to read from or write to
on many different cards.
personal lives • An internal card reader on a laptop enables additional storage.

Examples of the te • Integrated into most modern laptops, desktop computers and some
practice medium to high-end printers.
chnology in • Integrated into almost all mobile devices.
• Many portable devices like cameras use memory cards that require a
memory card reader for access to media.

7|Page
WEB PAGE, WEBSITE, and HYPERLINK) (CAPS p25)

7. URL SHORTENER
Description – What it URL shortener is a tool or service used to
is convert a long URL to a shorter version.
This shorter version of the URL will take a
user to the same web address, but is
easier to remember and/or type out.

Simple explanation of A user is able to log into the URL shortening site, paste a long URL in and
how it works the URL shortening site will then shorten it and allow a user to use the new
shortened URL to access the same website.
Advantages • A short URL is convenient for messaging communications such as Twitter
which may limit users to the amount of characters they can type in their
message.
• A short URL is much easier to share, especially when retweeting a tweet
on Twitter
Disadvantages Some websites prevent short, redirected URLs from being posted
Examples of the • TinyURL.com
technology in practice • Goo.gl
• bitly
• Diggbar
• Su.pr

8|Page
WHAT DETERMINES THE QUALITY OF MONITORS AND PRINTERS (CAPS p30)

8. HDMI (HIGH DEFINITION MULTIMEDIA INTERFACE)


Description – What it High definition Multimedia Interface is a standard/port for connecting high-
is definition video devices such as computer monitors, video projectors and
digital television, etc. HDMI carries high quality video and audio signals so
there is no need for separate audio cables as with VGA.

Simple explanation of A single HDMI cable will carry both the video and audio signal from a device to
how it works your display. A HDMI cable is most frequently used to connect a laptop to a
data projector or a television.
Advantages • Higher quality: HDMI enables loss-less transmission and better quality
video at low brightness scenes at higher resolutions.
• Single cable: Offers a cable solution as there is only a single cable that
carries audio, video and controls information.
Disadvantages • Switching delays: Sometimes, blank screens can be caused due to
authentication delays. There can also be screen flashing errors.
• Costly: HDMI cables are more expensive (per meter) than their analogue
counterparts.
Limitations Physical cable with a bandwidth limit of 10 GB/sec (4K) is still required.
Relevance and impact Virtually every TV, AV receiver, DVR, Blu-ray Disc Player, and set-top box today
on personal lives comes standard with HDMI technology, so HDMI enables connection between
most computer and video devices on high speed.
Examples of the With the introduction of HDMI 2.0 the bandwidth is now up to 18
technology in practice Gigabits per second. This enables 4k video to any supported device.

9|Page
WIRELESS TECHNOLOGY (PRINTERS) (CAPS p30)
Wi-Fi HOTSPOTS, WiMAX, BLUETOOTH (CAPS p35)

9. NEAR FIELD COMMUNICATION (NFC)


Description – What it is Near Field Communication (NFC) is a standard that allows devices such as
smartphones to connect wirelessly simply by touching them together or
bringing them into close proximity, for example, exchange files by just
touching two smartphones together.

Simple explanation of NFC is a technology built upon radio-frequency identification, or RFID, which
how it works allows a gadget to send radio waves to another gadget or to another RFID-
enabled tag and to trigger a certain action.
Advantages • NFC offers power efficiency which is important in mobile devices.
• NFC offers a certain amount of security, as a hacker would need to be
close to the target to access NFC-data exchange.
• NFC can be used to change settings automatically on devices such as
smartphones.
Disadvantages • Not all devices support NFC.
• Devices need to be very close to each other to use NFC.
Examples of the Refer to:
technology in practice https://www.youtube.com/watch?v=_64mAcOn444
https://www.youtube.com/watch?v=Wim4TqMzgVQ
https://www.youtube.com/watch?v=m6PFtsvpMxA

10 | P a g e
THE ROLE OF ICTs IN THE WORKPLACE (CAPS p30)
SOCIAL IMPLICATIONS (CAPS p32)

10. BYOD: (BRING YOUR OWN DEVICE)


Description – What it Bring Your Own Device refers to a concept where employees/students are
is allowed to bring and use their own portable devices such as smartphones,
laptops, tablets, etc. to work on and access the network instead of a device
owned/supplied by the company/institution.

Simple explanation of Each user brings his/her own device to work/class and uses it to complete
how it works any work. The device may be connected to the network in order to access
work files or the Internet. Afterwards the device is removed and the user
takes it home with him/her.
Advantages • Fewer expenses for the company/institution involved as they do not have
to buy or maintain as many computers.
• Users find it more convenient to work on their own device.
• Work can easily be taken home, if necessary.
Disadvantages • Security risk for the company as confidential data may leave the premises
on an employee's computer/device.
• Security risk of malware and viruses entering a network from a personal
device.
Limitations BYOD is not suitable in institutions/places where very sensitive/
confidential information is handled.
Examples of the Some schools allow learners to bring their own tablets to school which
technology in practice contain their textbooks in electronic format as well as office packages on
which they can take notes, do homework, etc.

11 | P a g e
OVERVIEW OF PORTABLE AND MOBILE INTERNET ACCESS (BASIC CONCEPTS)
(CAPS p35)

11. 802.11 a/b/g/n


Description – What 802.11 a/b/g/n refers to a set of specifications and protocols used in
it is communication on a wireless network.
The letters (a, b, g, n) simply indicate different versions of the Wi-Fi standard (each
with different speeds, etc.)

Simple explanation • Devices that have the appropriate wireless capability can communicate with
of how it works other devices by using Wi-Fi (wireless fidelity), which identifies any network
based on the 802.11 standards.
• 802.11 is a series of network standards that specifies how two wireless
devices communicate over the air with each other or, put very simply, it is a
wireless connection to a physical network or network device.
• Standard 802.11a – transfer rate is up to 54 Mbps
• Standard 802.11b – transfer rate is up to 11 Mbps
• Standard 802.11g – transfer rate is 54 Mbps and higher
• Standard 802.11n – transfer rate is 108 Mbps and higher

Advantages • No cables are needed.


• Network connection can be made in areas where cables cannot be used.

Disadvantages • Can be more expensive to install.


• Can be more difficult to maintain.
• Security risks are more pronounced.
Examples of the Wi-Fi communication in hotspots.
technology in
practice

12 | P a g e
OVERVIEW OF PORTABLE AND MOBILE INTERNET ACCESS (BASIC CONCEPTS)
(CAPS p35)

12. LTE (LONG TERM EVOLUTION)


Description – LTE (Long Term Evolution) is a standard used in wireless communication which
What it is provides for high-speed data transfers between cellular devices (such as
smartphones and tablets) and ISPs.
It is the next generation of cellular connectivity after 3G, sometimes also called 4G.

Simple explanation • Put simply, it is the next generation (after 3G) of cellular connectivity used for
of how it works data transfer, such as browsing the Internet.
• It is a very fast way for mobile devices to connect to the Internet.
Advantages • LTE offers a very fast connection/faster download and upload speeds.
• LTE enables users to watch videos, stream a radio station, play online games
and browse the Internet in real time.

Disadvantages • Users need an LTE capable device - not all devices are compatible with LTE
technology.
• LTE technology is expensive.
Limitations • LTE is currently only available in major cities in South
Africa/coverage is limited to certain areas.
• LTE is more demanding on mobile device batteries than 3G (WCDMA) and 2G
(GSM).

13 | P a g e
MANAGEMENT OF FILES (CAPS p35)

13. GEOTAGGING
Description – Geotagging is the process of adding geographical information to various media in
What it is the form of metadata. The data usually consists of coordinates like latitude and
longitude, but may even include bearing, altitude, distance and place names.

Geotagging is most commonly used for photographs and can help people get a lot
of specific information about where the picture was taken or the exact location of
a friend who logged on to a service.

Simple • When the file is created (such as a picture taken by a camera) the geographical
explanation of position of the device is determined by an on-board GPS device. This string of
how it works characters represents the position with values indicating the longitude and
latitude.
Advantages • People will always know where the picture was taken.
• Geotagging allows people to retrace their exact steps later on.
Disadvantages • Need GPS-capability for geotagging to function.
• Stalking can be an issue as criminals can use geotagging information on
pictures published on the Internet to track down people in the pictures.

Relevance and • Users can find the exact position where a picture was taken using a map or by
impact in adding the coordinates to a website such as Google Maps.
personal lives
Examples of the • Geotagging on modern cameras and smartphones.
technology in Refer to:
practice • https://www.youtube.com/watch?v=Q5TRU9A1t9k

14 | P a g e
SECURITY ISSUES (CAPS p42)

14. CLICK-JACKING
Description – What Click-jacking is when users are tricked into clicking on an item on a web page which
it is acts as a concealed link.

Simple explanation • Click-jacking is a scam in which a disguised link (which cannot be seen or
of how it works detected) is inserted above a legitimate link. Users think they are clicking on
the link/image/button below, but they are actually clicking on the invisible
link above it, which contains a malicious program.

Disadvantages • Click-jacking may redirect users to a site (often a fake website) where they
do not want to go or that asks them for personal information.
• Installation of malware can occur when a user is click-jacked.

Relevance and Computers can be infected with malware, without the user knowing it.
impact on personal
lives

15 | P a g e
HOW TECHNOLOGY CAN BENEFIT OR HARM SOCIETY (CAPS p45)

15. CROWD FUNDING


Description – What it is Crowd funding is a process where a single idea or business practice is
funded by multiple small donations from volunteer contributors, usually
before the business venture is started. The contributors will then receive
the product when it is finally put into production.

Simple explanation of People or businesses put out an idea they would like to start, for example
how it works anything ranging from an actual product, welfare initiative or even a movie.
The person or business would then do a presentation of their idea on a
crowd funding website and invite readers from around the world to buy in
on their idea. Each person that pledges an amount of money receives a gift
in return. This could be as simple as a thank you for a small amount, or an
example of the actual product once it goes into production. The money
raised will then be used as indicated in the presentation, such as putting a
device into production.

Advantages Businesses/ideas can be started without the need of actual capital. People
from around the world can have a part in new ideas.
Disadvantages • Online crowd funding limits exposure to only Internet users.
• A public display of an idea can run the risk of others copying it.
• If the target amount is not reached, potential investors get their
money back and the initiative does not get funded.
Examples of the • www.indiegogo.com
technology in practice • www.kickstarter.com.

16 | P a g e
ADDITIONAL CONTENT
The level and depth of knowledge required for these terms is in terms of understanding what these
terms represent and a basic understanding of their application(s) in an ICT context.

16. BIG DATA


Description – What it is Big data is very large structured and unstructured data sets that are analysed
using computers to reveal trends.

Simple explanation of Big data is a collection of data from traditional and digital sources inside
how it works and outside an organisation.
These extremely large data sets may be analysed to reveal patterns, trends,
especially relating to human behaviour and interactions.
Advantages • Reduces costs and time and leads to smart decision-making
• The volume of data gathered provides more insight,
• Companies have far more data to analyse before big decisions are
made.
• Because data is gathered all the time, big data is more relevant. Big
data is timely.
Disadvantages • Data/information can get lost.
• Analysis of data can be misleading.
• Updates can mismatch real figures.
Limitations • The wrong questions asked. (GIGO) Inconsistency in data
collection.
• Working with such big volumes of data, make analysis more complex.
• Big data analytics tools can be expensive.
• Data gathered continuously and being available to share it with
anyone, have security issues.

Relevance and impact on • Mobile Maps – GPS is available because of big data.
personal lives/ • Medical records – electronic records of patients for hospitals and
Application(s) in an ICT doctors are stored as big data
context • Online shopping – big online retail sites have long used the data
contained in this to identify your shopping habits
• Music – big data analyses listeners' behaviours and downloads to guide
the production of new music.
Examples of the • Can be used in health care, manufacturing, education, etc.
technology in practice/ • Amazon is an online shopping platform that uses big data to analyse
shopping times and behaviours of on-line shoppers.

17 | P a g e
17. BITCOIN
Description – What it is Bitcoins (BTC) are a form of virtual, digital currency. Bitcoins can be
exchanged for other currencies, products, and services. They have
caused concern in that they are often used for payment in criminal
activities such as ransomware demands. However, more and more
legitimate companies are accepting them as a means of payment.

Simple explanation of • Users communicate payments through digitally signed messages for the
how it works transfer of bitcoin ownership, from one owner to the next.
• A decentralised network of speciality computers verify and stamp
timestamps on all transactions through evidence of a processing
system.
• The operators of the computers known are paid with transactions fees
and new bitcoins.
Advantages • It is very possible to be able to send and get money anywhere in the
world at any given time.
• There is no need to cross borders, reschedule holidays, or deal with
the limitations that may occur when transferring money.
• Cryptocurrency is completely decentralized from banks and
governments – giving the advantage of no interference and minimal or
no 'banking' charges.
Disadvantages • Many people are still unaware of digital currencies and bitcoin.
• People need to be educated about bitcoin to be able to apply this
concept in their lives. Criminals could use this system for illegal
activities. People could get scammed or their accounts could get
hacked.
Limitations • Not widely accepted.
• Bitcoin wallets can be lost.
• Valuation of bitcoins fluctuates.
• No buyer protection.
Relevance and impact on Bitcoin/Cryptocurrency/Digital currency will change the way in which
personal we transact (purchase, sell and invest).
lives/Application(s) in an
ICT context
Examples of the • Fitcoin is an app that aims to get you in shape – by paying you Bitcoins
technology the harder you work.
in practice • Spare allows bitcoin holders to turn their bitcoin into cash quickly and
conveniently. To do so, they go around the ATM system. Users request
cash and they get a barcode that they can take to a local shop close to
where they are. The shopkeeper scans the code and gives the Spare
user cash in exchange.
• Xapo is a bitcoin wallet app that allows you to send and receive Bitcoins
in just two clicks.

https://mybroadband.co.za/news/banking/209472-how-south-africans-use-their-bitcoin.html

18 | P a g e
18. DIGITAL MIGRATION
Description Digital migration is a process in which broadcasting services using
– What it is traditional analogue technology are replaced with digital technology.

http://www.gov.za/speeches/digital-migration-analogue-switching-18-oct-2016-1047
Simple explanation of how it Analogue broadcasting signal is in the form of a continuous wave
works whereas digital is in the form of discrete bits (0's and 1's) of
information. In digital the signal is encoded and can be compressed to
allow for more channels to be broadcast.
Eight new standard definition TV programmes can be provided in the
same frequency as one analogue TV channel.
Advantages • Makes viewing experience a whole lot
better o Clearer pictures o Sharper sound o
More channels to choose from o Electronic
programming guide o Radio services and
music channels
• More viewing options – interactive video
and data services and audio description and
subtitles for those with hearing
impairments.
Disadvantages • Loss of free channels.
• Users will have to pay a monthly subscription.
• Users will have to buy a set-top-box. A set-top box is a device that
enables a television set to become a user interface to the Internet
and also enables a television set to receive and decode digital
television (DTV) broadcasts.
• As satellite dishes are needed to receive digital television, digital
migration could be expensive for the poor if the government turns
off analogue.
Limitations • Need a UHF antenna, TV must have an inbuilt digital tuner, TV must
have audio and video inputs which could be expensive for the
masses (poorer population).
Relevance and impact on • Digital migration may lead to vendors seeing a gap in the market
personal lives/ Application(s) and try to overcharge people unnecessarily.
in an ICT context

Examples of the technology in • More TV channels.


practice • Radio services and music channels on TV.

19 | P a g e
19. INTERNET OF THINGS (IOT)
Description – What it is Internet of Things (IoT) refers
to the trend whereby all sorts
of objects and devices are
increasingly being connected
to one another
via the
Internet. This can range from
surveillance systems
to geysers, washing
machines, 'smart' motor cars
and traffic lights, etc. Various
sensors in the devices can
produce data for all
sorts of purposes
including diagnostics and
running systems more efficiently.
Simple explanation of It is the Internet working of physical devices.
how it works
Advantages • IoT allows objects to be sensed and/or controlled remotely across an
existing network infrastructure
• IoT creates opportunities for more direct integration of the physical
world into computer-based systems.
• IoT improves efficiency, accuracy and economic benefit
Disadvantages • Internet connection is required.
• Limited address space of IPv4.
• IoT must be a globally adopted if its development is to be successful.

Limitations Devices will have to use IPv6 to accommodate the large address space.
Relevance and impact on • Users can control bulbs and locks over the Internet (from their
personal lives/ smartphone)
Application(s) in an ICT • Users can receive special offers on their favourite products
context • Users can locate items that they need
• Users can control heat/water/electricity and energy management can be
controlled from their device(s).
Examples of the • Heart monitoring implants.
technology in practice • Biochip transponders on farm animals.
• Electric clams in coastal water.
• Cars with built-in sensors.
• DNA analysis devices for environmental/food/pathogen monitoring
• Smart thermostat (heating and cooling)
• Smart home devices: washer, dryer, air purifiers, ovens, refrigerators,
freezers.

20 | P a g e
20. MOBILE OR M-LEARNING
Description – Mobile learning or MLearning is a form of
What it is education and training delivered and
conducted via the Internet using mobile
devices, such as tablets and smartphones. It is
designed to be flexible, allowing
learners/workers/students access to education
anywhere, anytime.

Simple Learners use mobile device for learning and research wherever they are.
explanation of Learners are able to download applicable apps for mobile learning.
how it works
Advantages • Accessible from anywhere (internet access required).
• Enables mobility/flexibility on the part of learners.
• Interaction with portable technologies.
• Collaborative learning - Real time sharing leads to instant feedback and tips
• Higher learning engagement.
• Improved completion rates and higher retention – Learning only happens when
instructional content is completed and key points are retained. Mobile learning is
designed to create engagement, which leads to course completion. Mobile
learning is also tailored to fit the device usage habits and learning patterns of
today’s learners, the result is higher rates of retention.

Disadvantages • Cost – Users need to frequently upgrade/update their mobile device


• There are monthly data charges with mobile service providers.
Downloading of large files may be expensive.
• The storage capacity of mobile devices are limited.
• Devices are small and can be easily stolen.
• Some users may lack technological skills or find the keyboard too small to use.
• Learning can only take place with Internet connectivity.

Limitations • Learners are not the same. Every learner has their own way of understanding the
content they have to learn.
• Many smartphones come with a good screen size and/or e-book readers.
• Internet access required.
• Expensive devices required.

Relevance and • M-Learning focuses on mobility of the learner, interacting with portable
impact on technologies.
personal lives/ • Learning takes place across multiple contexts, through social and content
Application(s) interactions, using personal electronic devices
in an ICT • Users are able to expand their knowledge base and are able to study from
context anywhere.
• Cost-effective.
Examples of • Handheld computers
the technology • MP3-players
in practice • Mobile phones and tablets and notebook computers.

21 | P a g e
21. RANSOMWARE
Description – Ransomware is a
What it is type of malware
designed to encrypt or block
access to your computer
system and files until you
pay a sum of money
(‘ransom’).
Simple explanation o f Ransomware is typically
how it works packaged with installation
files and camouflaged as
official software updates.

After infecting your


computer, the malware
finds files with JPG, XLS,
PNG, DOC and PPT file
extensions. These files are
usually important images
and documents, so the
chance is that the hacker
will encrypt a file that you
need.

After encryption, the


malware tells you that your
data is being held for
ransom and gives you a site
to access.

How to protect your Do not download from a site that tells you software on your computer is outdated.
computer Websites are not able to detect outdated software unless you give the website
permission to read your hard drive. If you think your software needs an update, go to
the official product developer’s site and download it directly from there.

Always keep the latest antivirus definitions installed on your computer to defend
against all types of malware. The main issue with ransomware is that once you get
infected, there is nothing you can do to reverse the damage.
Always keep regular backups in a safe place.

Disadvantages • Ransomware can hinder the economic viability of small businesses.


• More money is spent or needed on security software.
• Time consuming and costly when attempting to decrypt data.
Relevance and impactt Digital currency such as Bitcoin is typically used to pay the hacker. Reports show that
on personal lives/ many people pay the ransom, because the files are just too important to give up, and
Application(s) in an there is currently no guaranteed method to decrypt files.
Ransomware is cybercrime and is a gateway for cyber terrorism between counties.
ICT context

How to fight • Back up your data and files


ransomware • Educate yourself and employees to recognise potential threats
• Limit access to those that need it
• Keep signature-based protections up-to-date
• Implement multi-layered security, including advanced threat prevention
technologies

22 | P a g e
22. SCREEN LOCK PATTERN
Description – What it A screen lock pattern is a way of locking a device by setting up a pattern
is you must draw or trace on the screen to unlock the device.

Simple explanation of The screen lock pattern allows the user to draw a simple pattern with a
how it works finger to unlock the phone.
Advantages • Provides a certain type of security on a phone/mobile device.
• Patterns can be very difficult to copy as they can be randomly
created.
Disadvantages • Not as secure as a password.
• People can see what the pattern looks like and copy it.
Examples of the Some people can find it easier to remember patterns than
technology in passwords.
practice/Application(s
) in an ICT context
Limitations The number of patterns available are limited.

23 | P a g e
23. SHAPING (NETWORK TUNING)
Description Shaping or Network Tuning is a technique whereby certain network
– What it is (Internet) services, e.g. e-mail, are given preference while others such
as social networking services are given less priority so performance is
maintained for the more critical services.

Simple explanation of how it Why should one introduce limits to a network, when one would
works prefer to maximize its capability? To answer that question, one
should remember that the different kinds of traffic in a network also
have different priorities.

For example, a user may not complain if an e-mail message arrived


some seconds later. However, if the same e-mail user is in a video
conference abroad and is forced to wait one or two seconds
between each word, the video conference user will become upset
quickly.

The prioritisation of network traffic that delays less urgent packets


so the urgent ones are delivered more quickly.
Examples of the technology Shaping is used on most consumer Internet accounts. User will
in practice/Application(s) in experience reduction of speed on the Internet during peak periods.
an ICT context Certain Internet services may slow down to give other services
priority.
Often torrent downloads are shaped because it is not seen as a
priority service.

The profiles for traffic shaping can be easily changed, to adapt the
network to different uses. The network manager can run specific
tools to enable the automatic change of network profiles, for
instance according to the specific needs of certain hours of the day.

Example:
Suppose a person in the office, is on a tight schedule to deliver a
report for an important project. Then, mysteriously the network,
which is necessary for the report, becomes so slow that a web page
takes minutes to download. However, a lazy user, at the next table,
is frantically downloading not so urgent MP3 files, under high
transfer rates, using peer-to-peer connections. There is a chance that
the lazy neighbour is using all network bandwidth available for the
Internet in the office’s network.

Some companies would simply block the use of music downloading,


but this company could shape the network so that the person
completing the project will be given preference to use the internet
with no delays. The internet will run smoothly and the bandwidth
will be restricted to the person downloading music because on the
priority list downloading music is somewhere down that policy setup.

24 | P a g e
24. Throttling (Policing)
Description Throttling or Policing occurs when your ISP slows down your Internet
– What it is connection. This most often occurs when you have been deemed by your
ISP to have downloaded excessive amounts of data. Each ISP has an
Acceptable Usage Policy (AUP) which specifies how this is determined
and implemented.

http://www.tidytutorials.com/2011/03/bandwidth-throttling-andconnection.html

Simple explanation of When you exceed your CAP for the month, your ISP will drop your
how it works Internet speed so that you won’t be able to continue your normal
downloading pattern.
Advantages • Equal internet usage for all.
• Save the life span of your server.
• Control the costs of the internet CAP.
• A controlled Internet access environment can be set up in an
organisation.
Disadvantages • Inconvenient for user due to the slow speed of the Internet - time
consuming.
• If not applied correctly, certain users will be restricted instead of not
being restricted.
• It could be misleading if you pay for uncapped data and then get
throttled.
Limitations • Restricted access.
• Internet speed will be slow
Relevance and impact on • Because of the slow internet speed it will be problematic when there
personal lives/ is more than one user on the network.
Application(s) in an ICT • Cannot do major downloads in a short period of time.
context
Examples of the • Company servers
technology in practice • Networks

25 | P a g e
25. 1 VIRTUAL REALITY (VR)
Desc Virtual Reality (VR) refers to
ripti using technology to create a
on – simulation of a
Wha 3Denvironment that can be
t it is interacted with a person in a
seemingly real or physical way.
This is achieved by using
equipment, such as
helmets with screens and gloves
fitted with sensors.
Simple explanation of Allows users to be immersed into a virtual world, it can include 4 to 5 senses.
how it works Tricks your brain into believing you are in a 3D world. The first way VR does this
is with the stereoscopic display. This works by displaying two slightly different
angles of the scene to each eye, simulating depth.

Advantages • Explores places such as travel destinations.


• Virtual reality makes education more easily and comfortable
• Used to train employees (example pilots being trained) without causing
damage or risking lives.
• Conferencing (digital meetings).
• Convenience (cut costs on travelling).
• Helps students to learn faster and remember longer because of the visibility
of the content.
Disadvantages • VR can be expensive because of the special equipment and software
that is necessary for editing. VR glasses and 360° video camera is also
necessary if creating your own VR environment.
https://www.youtube.com/channel/UCzuqhhs6NWbgTzMuM09WKDQ Availability
of such hardware.
• Physical effects: motion sickness, balance is affected by changes in the
inner ear
Limitations • Incomplete technology (still new).
• Can cause motion sickness.
• Technical limitations: movement, weak hardware and low resolution.
• Psychological: moral and ethical concerns

Relevance and • Used to train employees (example Pilots being trained)


impact on personal • Conferencing (digital meetings)
lives/Application(s) in
an ICT context
Examples of the • Games - Nintendo, iGlasses
technology in • Drones
practice • Media – marketing campaigns creating interactive forms of media
• Education & training – used by trainers to provide learners with a virtual
environment where they can develop their skills without the real-world
consequences of failing
• Medical personnel are able to train through VR to deal with a wider variety
of injuries

26 | P a g e
25.2 AUGMENTED REALITY (AR)
Description – What Augmented reality
it is uses similar types of
technology but does
not create a totally
virtual
environment
like VR. Instead it
takes the
physical world
and adds
(augments) objects such as graphics within the real world. Both VR and
augmented reality are used in areas ranging from entertainment (e.g. the
augmented reality game Pokémon GO), training in aircraft simulators and
medicine with surgeons being able to perform remote surgery on patients.
Simple explanation Augmented Reality turns the environment around you into a digital interface by
of how it works placing virtual objects in the real world, in real-time. Augmented Reality can be
seen through a wide variety of experiences. Handheld devices such as
smartphones and the iPad are other ways to use augmented reality. They
contain software, sensors, a compass and small digital projectors which display
images onto real world objects.

Advantages • Augmented reality (AR) is mostly used by marketers to promote new


products online.
• Enhances personal experiences
• Entertainment and education applications include cultural apps with
sightseeing and museum guidance, gaming apps with traditional games using
AR interfaces, and some smartphone apps that make use of AR for an
entertainment and/or educational purpose.
• AR can be applied so that the surgical team can see the imaging data in real
time while the procedure is in progress.
Disadvantages • Due to the fact that the content is not real, it may obscure or narrow a user's
interests or tastes.
• The marketing and advertising of AR devices can have a negative effect on
society because of cybercrime and malware infection.
Limitations • There is such a thing as too much information
• There are also privacy concerns. Image-recognition software coupled with
AR will, quite soon, allow us to point our phones at people, even
strangers, and instantly see information from their Facebook, Twitter,
Amazon, LinkedIn or other online profiles.
Relevance and impact • The marketing and advertisement fields will explode with AR devices.
on personal lives/ • The mobile applications that are being developed will offer facial recognition
Application(s) in an software that will mainstream quickly.
ICT • Navigation devices will be built into cars and mobile devices. Some car
context manufacturers are working to implement AR windshields to help drivers
navigate without taking their eyes off the road.

27 | P a g e
Examples of the • Medical • Engineering • Manufacturing,
technology in • Entertainment design maintenance and
practice • Military training • Consumer design repair
www.augmented- • Audio • Robotics and • Hazard detection
realitygames.com/imac telerobotics
t.php

Concepts/Technologies that will no longer be assessed from 2017:

• CRT monitors
• Fax
• Fax modems
• FireWire
• MICR
• MySpace
• OMR
• PDA
• Second Life
• Stand-alone vs. integrated software in terms of Office Suites
• Widgets

28 | P a g e

You might also like