Professional Documents
Culture Documents
ASSESSMENT IN PAPER 2
as per the 2017 Examinations
Guideline Grade 12
NOTE: Concepts highlighted in yellow in the pages that follow are concepts that are new
and that did not appear in previous Examination Guidelines.
There are references to websites in the text.
YouTube videos for most of these concepts can be accessed at:
https://goo.gl/dv49cF
CLARIFICATION OF EXISTING CONTENT IN THE CAPS
“The terminology highlighted in this section has appeared in previous Examination Guidelines. The
level of depth of knowledge required for these terms is as indicated in terms of understanding
what these terms represent and a basic understanding of their application(s) in an ICT context.”
(Computer Applications Technology: Examination Guidelines – Grade 12 – 2017)
1. PHABLET
Description – What it is A phablet is a smaller version of a tablet which (over and above
tablet features) also incorporates features found on a smartphone
such as voice calls and SMSs.
Simple explanation of how it • A phablet offers users a device that is larger than a smartphone
works with regards to screen size, yet small enough to be able to handle
it in one hand.
• Phablets also allow users to make cellular calls.
1|Page
CONVERGENCE The impact of convergence of technologies in our daily life can be best
illustrated with mobile phones.
Relevance and impact
on personal lives Apart from the basic purpose of mobile telephony, the latest cell phones
http://evirtualguru.com/wp-content/uploads/2014/06/Convergence-Computing-Technology-2.png
Examples of the • Taking photos with a smartphone (combining the functionality of a camera
technology in practice and a mobile phone).
• Surfing the web on a television (surfing is usually associated with a
computer).
• DVD players are not only capable of playing DVDs, but can also play different
formats like music CDs, photo CDs, as well as encoded video formats as DIV
or VCD.
2|Page
EXAMPLES OF GENERIC/COMMON STORAGE DEVICES AND MEDIA (CAPS p20)
http://www.jctechguy.com/solid-state-drive-upgrade/
Simple explanation of • SSD uses microchips - it contains no moving parts like a HDD.
how it works • The essential SSD components includes a host interface meaning there is
an interface provided that allows the SSD to communicate with the driver.
• SSD uses 'flash-memory' which is similar to RAM but non-volatile. Data is
not lost when the power goes off.
• SSD use a grid of electrical cells to quickly send and receive data.
Advantages • SSD is faster and has better performance and reliability than an HDD.
• SSD is less likely to get damaged because of no moving parts.
Therefore, SSD is quiet compared to HDD.
• Read/write speed (data access) of SSD is extremely fast and much quicker
than HDD.
• SSD uses 'flash memory' to store data and is not affected by magnetic
interference.
• SSD has low power consumption.
• SSD is easier to carry around because of its physical size (2.5 inch) which is
smaller than the size of an HDD (3.5 inch).
• SSD does not become fragmented therefore there is no need to defrag.
Disadvantages • SSD can wear out after using for a long time as data can be written to or
erased from the same place in flash memory for a limited number of
times.
• SSDs are more expensive than HDDs.
Limitations SSDs wear out when data is repeatedly written onto the same place unlike
normal HDDs.
Relevance and impact on Used to store program files and operating system files.
personal lives
Examples of the • Can also be found in smartphones, tablets and PC’s
technology in practice • Can become the standard for ultra-thin laptop computers.
• Would be preferable for workloads that require higher performance, for
example, database applications.
3|Page
GENERIC COMMON OUTPUT DEVICES (CAPS p20)
3. 3D PRINTING/PRINTERS
Description – What it is 3D printers can create three-dimensional solid objects (e.g. motor vehicle
parts, human tissue replacement, jewellery, clothing, etc.) from a digital
model of the item by adding successive layers of material on top of one
another.
Simple explanation of To be able to produce a 3D reproduction, the 3D printer reads the design
how it works from a 3D printable file and then fuses layers of liquid, powder, paper or
sheet material on top of one another to build the model. These layers
correspond to the computer-generated cross sections of a Computer-
aided Design (CAD) model.
Advantages • 3D printing is much cheaper than conventional manufacturing methods.
• 3D printing technology enables home users to have access to machines
that can build 3D models.
• Parts needed for a project can be made 'on-demand'.
Disadvantages • 3D printers are expensive, even entry-level machines are much more
expensive than normal printers.
• It can take a long time to create models for 3D printers.
• Consumables used in 3D printing are also relatively expensive.
Limitations • Printers are limited to the size they can print with regards to the space
within the machine where the model is printed.
• Almost all 3D printers use some form of plastic for their models.
Relevance and impact Consumers can customize objects using basic web-based customization
on software and then order that item as a 3-D printed article, for example,
personal lives customized cases for mobile phones.
4|Page
IDENTIFY PORTS AND CONNECTORS (CAPS p20)
OMMON OUTPUT DEVICES (CAPS p20)
4. MICRO USB
Description – What it is A Micro USB is a smaller version of a USB port, usually found on portable
devices such as smartphones.
Additional information
Standard USB connectors have four pins: one for power, two for data and one for
(signal) ground.
Mini USB: feature a fifth ID pin. Used for devices that are stationary and not
connected/disconnect often.
Micro USB features five pins - fifth is an ID pin.
Simple explanation on • A Micro USB is a smaller version of the popular, standardised USB port
of how it works which gives the same functionality as a full-size USB port.
Relevance and in impact • Many modern devices, such as smartphones, use a Micro USB port not
personal lives only to connect the device to a computer, but also to connect the device
to a charger.
• Flash storage can also be connected to mobile devices via micro USB.
5|Page
INPUT (Basic concepts, features and uses) (CAPS p20)
5. MULTI-TOUCH SCREEN
Description – What it A multi-touch screen is a
is feature of a screen that allows it to
register more than one point
being touched
simultaneously.
Simple explanation of • A multi-touch screen allows more than one touch to be recognised as input
how it works at the same time – there are multiple points of contact at the same time.
• Users use two or more fingers such as pinching a picture to zoom out.
• Some touch screens also respond to finger motions such as sliding your
finger to drag an object.
6|Page
STORAGE MEDIA AND DEVICES (memory cards) (CAPS p22)
6. CARD READER
Description – What it is A card reader is a device that can be connected to a computer designed to
accept and read data from different types of storage media such as SIM and
SD cards and flash drives, etc.
Simple explanation of A memory card reader is a device, typically having a USB interface, for
how it works accessing the data on a memory card such as a Secure Digital (SD) or
MultiMediaCard (MMC). Most card readers also offer write capability.
Examples of the te • Integrated into most modern laptops, desktop computers and some
practice medium to high-end printers.
chnology in • Integrated into almost all mobile devices.
• Many portable devices like cameras use memory cards that require a
memory card reader for access to media.
7|Page
WEB PAGE, WEBSITE, and HYPERLINK) (CAPS p25)
7. URL SHORTENER
Description – What it URL shortener is a tool or service used to
is convert a long URL to a shorter version.
This shorter version of the URL will take a
user to the same web address, but is
easier to remember and/or type out.
Simple explanation of A user is able to log into the URL shortening site, paste a long URL in and
how it works the URL shortening site will then shorten it and allow a user to use the new
shortened URL to access the same website.
Advantages • A short URL is convenient for messaging communications such as Twitter
which may limit users to the amount of characters they can type in their
message.
• A short URL is much easier to share, especially when retweeting a tweet
on Twitter
Disadvantages Some websites prevent short, redirected URLs from being posted
Examples of the • TinyURL.com
technology in practice • Goo.gl
• bitly
• Diggbar
• Su.pr
8|Page
WHAT DETERMINES THE QUALITY OF MONITORS AND PRINTERS (CAPS p30)
Simple explanation of A single HDMI cable will carry both the video and audio signal from a device to
how it works your display. A HDMI cable is most frequently used to connect a laptop to a
data projector or a television.
Advantages • Higher quality: HDMI enables loss-less transmission and better quality
video at low brightness scenes at higher resolutions.
• Single cable: Offers a cable solution as there is only a single cable that
carries audio, video and controls information.
Disadvantages • Switching delays: Sometimes, blank screens can be caused due to
authentication delays. There can also be screen flashing errors.
• Costly: HDMI cables are more expensive (per meter) than their analogue
counterparts.
Limitations Physical cable with a bandwidth limit of 10 GB/sec (4K) is still required.
Relevance and impact Virtually every TV, AV receiver, DVR, Blu-ray Disc Player, and set-top box today
on personal lives comes standard with HDMI technology, so HDMI enables connection between
most computer and video devices on high speed.
Examples of the With the introduction of HDMI 2.0 the bandwidth is now up to 18
technology in practice Gigabits per second. This enables 4k video to any supported device.
9|Page
WIRELESS TECHNOLOGY (PRINTERS) (CAPS p30)
Wi-Fi HOTSPOTS, WiMAX, BLUETOOTH (CAPS p35)
Simple explanation of NFC is a technology built upon radio-frequency identification, or RFID, which
how it works allows a gadget to send radio waves to another gadget or to another RFID-
enabled tag and to trigger a certain action.
Advantages • NFC offers power efficiency which is important in mobile devices.
• NFC offers a certain amount of security, as a hacker would need to be
close to the target to access NFC-data exchange.
• NFC can be used to change settings automatically on devices such as
smartphones.
Disadvantages • Not all devices support NFC.
• Devices need to be very close to each other to use NFC.
Examples of the Refer to:
technology in practice https://www.youtube.com/watch?v=_64mAcOn444
https://www.youtube.com/watch?v=Wim4TqMzgVQ
https://www.youtube.com/watch?v=m6PFtsvpMxA
10 | P a g e
THE ROLE OF ICTs IN THE WORKPLACE (CAPS p30)
SOCIAL IMPLICATIONS (CAPS p32)
Simple explanation of Each user brings his/her own device to work/class and uses it to complete
how it works any work. The device may be connected to the network in order to access
work files or the Internet. Afterwards the device is removed and the user
takes it home with him/her.
Advantages • Fewer expenses for the company/institution involved as they do not have
to buy or maintain as many computers.
• Users find it more convenient to work on their own device.
• Work can easily be taken home, if necessary.
Disadvantages • Security risk for the company as confidential data may leave the premises
on an employee's computer/device.
• Security risk of malware and viruses entering a network from a personal
device.
Limitations BYOD is not suitable in institutions/places where very sensitive/
confidential information is handled.
Examples of the Some schools allow learners to bring their own tablets to school which
technology in practice contain their textbooks in electronic format as well as office packages on
which they can take notes, do homework, etc.
11 | P a g e
OVERVIEW OF PORTABLE AND MOBILE INTERNET ACCESS (BASIC CONCEPTS)
(CAPS p35)
Simple explanation • Devices that have the appropriate wireless capability can communicate with
of how it works other devices by using Wi-Fi (wireless fidelity), which identifies any network
based on the 802.11 standards.
• 802.11 is a series of network standards that specifies how two wireless
devices communicate over the air with each other or, put very simply, it is a
wireless connection to a physical network or network device.
• Standard 802.11a – transfer rate is up to 54 Mbps
• Standard 802.11b – transfer rate is up to 11 Mbps
• Standard 802.11g – transfer rate is 54 Mbps and higher
• Standard 802.11n – transfer rate is 108 Mbps and higher
12 | P a g e
OVERVIEW OF PORTABLE AND MOBILE INTERNET ACCESS (BASIC CONCEPTS)
(CAPS p35)
Simple explanation • Put simply, it is the next generation (after 3G) of cellular connectivity used for
of how it works data transfer, such as browsing the Internet.
• It is a very fast way for mobile devices to connect to the Internet.
Advantages • LTE offers a very fast connection/faster download and upload speeds.
• LTE enables users to watch videos, stream a radio station, play online games
and browse the Internet in real time.
Disadvantages • Users need an LTE capable device - not all devices are compatible with LTE
technology.
• LTE technology is expensive.
Limitations • LTE is currently only available in major cities in South
Africa/coverage is limited to certain areas.
• LTE is more demanding on mobile device batteries than 3G (WCDMA) and 2G
(GSM).
13 | P a g e
MANAGEMENT OF FILES (CAPS p35)
13. GEOTAGGING
Description – Geotagging is the process of adding geographical information to various media in
What it is the form of metadata. The data usually consists of coordinates like latitude and
longitude, but may even include bearing, altitude, distance and place names.
Geotagging is most commonly used for photographs and can help people get a lot
of specific information about where the picture was taken or the exact location of
a friend who logged on to a service.
Simple • When the file is created (such as a picture taken by a camera) the geographical
explanation of position of the device is determined by an on-board GPS device. This string of
how it works characters represents the position with values indicating the longitude and
latitude.
Advantages • People will always know where the picture was taken.
• Geotagging allows people to retrace their exact steps later on.
Disadvantages • Need GPS-capability for geotagging to function.
• Stalking can be an issue as criminals can use geotagging information on
pictures published on the Internet to track down people in the pictures.
Relevance and • Users can find the exact position where a picture was taken using a map or by
impact in adding the coordinates to a website such as Google Maps.
personal lives
Examples of the • Geotagging on modern cameras and smartphones.
technology in Refer to:
practice • https://www.youtube.com/watch?v=Q5TRU9A1t9k
14 | P a g e
SECURITY ISSUES (CAPS p42)
14. CLICK-JACKING
Description – What Click-jacking is when users are tricked into clicking on an item on a web page which
it is acts as a concealed link.
Simple explanation • Click-jacking is a scam in which a disguised link (which cannot be seen or
of how it works detected) is inserted above a legitimate link. Users think they are clicking on
the link/image/button below, but they are actually clicking on the invisible
link above it, which contains a malicious program.
Disadvantages • Click-jacking may redirect users to a site (often a fake website) where they
do not want to go or that asks them for personal information.
• Installation of malware can occur when a user is click-jacked.
Relevance and Computers can be infected with malware, without the user knowing it.
impact on personal
lives
15 | P a g e
HOW TECHNOLOGY CAN BENEFIT OR HARM SOCIETY (CAPS p45)
Simple explanation of People or businesses put out an idea they would like to start, for example
how it works anything ranging from an actual product, welfare initiative or even a movie.
The person or business would then do a presentation of their idea on a
crowd funding website and invite readers from around the world to buy in
on their idea. Each person that pledges an amount of money receives a gift
in return. This could be as simple as a thank you for a small amount, or an
example of the actual product once it goes into production. The money
raised will then be used as indicated in the presentation, such as putting a
device into production.
Advantages Businesses/ideas can be started without the need of actual capital. People
from around the world can have a part in new ideas.
Disadvantages • Online crowd funding limits exposure to only Internet users.
• A public display of an idea can run the risk of others copying it.
• If the target amount is not reached, potential investors get their
money back and the initiative does not get funded.
Examples of the • www.indiegogo.com
technology in practice • www.kickstarter.com.
16 | P a g e
ADDITIONAL CONTENT
The level and depth of knowledge required for these terms is in terms of understanding what these
terms represent and a basic understanding of their application(s) in an ICT context.
Simple explanation of Big data is a collection of data from traditional and digital sources inside
how it works and outside an organisation.
These extremely large data sets may be analysed to reveal patterns, trends,
especially relating to human behaviour and interactions.
Advantages • Reduces costs and time and leads to smart decision-making
• The volume of data gathered provides more insight,
• Companies have far more data to analyse before big decisions are
made.
• Because data is gathered all the time, big data is more relevant. Big
data is timely.
Disadvantages • Data/information can get lost.
• Analysis of data can be misleading.
• Updates can mismatch real figures.
Limitations • The wrong questions asked. (GIGO) Inconsistency in data
collection.
• Working with such big volumes of data, make analysis more complex.
• Big data analytics tools can be expensive.
• Data gathered continuously and being available to share it with
anyone, have security issues.
Relevance and impact on • Mobile Maps – GPS is available because of big data.
personal lives/ • Medical records – electronic records of patients for hospitals and
Application(s) in an ICT doctors are stored as big data
context • Online shopping – big online retail sites have long used the data
contained in this to identify your shopping habits
• Music – big data analyses listeners' behaviours and downloads to guide
the production of new music.
Examples of the • Can be used in health care, manufacturing, education, etc.
technology in practice/ • Amazon is an online shopping platform that uses big data to analyse
shopping times and behaviours of on-line shoppers.
17 | P a g e
17. BITCOIN
Description – What it is Bitcoins (BTC) are a form of virtual, digital currency. Bitcoins can be
exchanged for other currencies, products, and services. They have
caused concern in that they are often used for payment in criminal
activities such as ransomware demands. However, more and more
legitimate companies are accepting them as a means of payment.
Simple explanation of • Users communicate payments through digitally signed messages for the
how it works transfer of bitcoin ownership, from one owner to the next.
• A decentralised network of speciality computers verify and stamp
timestamps on all transactions through evidence of a processing
system.
• The operators of the computers known are paid with transactions fees
and new bitcoins.
Advantages • It is very possible to be able to send and get money anywhere in the
world at any given time.
• There is no need to cross borders, reschedule holidays, or deal with
the limitations that may occur when transferring money.
• Cryptocurrency is completely decentralized from banks and
governments – giving the advantage of no interference and minimal or
no 'banking' charges.
Disadvantages • Many people are still unaware of digital currencies and bitcoin.
• People need to be educated about bitcoin to be able to apply this
concept in their lives. Criminals could use this system for illegal
activities. People could get scammed or their accounts could get
hacked.
Limitations • Not widely accepted.
• Bitcoin wallets can be lost.
• Valuation of bitcoins fluctuates.
• No buyer protection.
Relevance and impact on Bitcoin/Cryptocurrency/Digital currency will change the way in which
personal we transact (purchase, sell and invest).
lives/Application(s) in an
ICT context
Examples of the • Fitcoin is an app that aims to get you in shape – by paying you Bitcoins
technology the harder you work.
in practice • Spare allows bitcoin holders to turn their bitcoin into cash quickly and
conveniently. To do so, they go around the ATM system. Users request
cash and they get a barcode that they can take to a local shop close to
where they are. The shopkeeper scans the code and gives the Spare
user cash in exchange.
• Xapo is a bitcoin wallet app that allows you to send and receive Bitcoins
in just two clicks.
https://mybroadband.co.za/news/banking/209472-how-south-africans-use-their-bitcoin.html
18 | P a g e
18. DIGITAL MIGRATION
Description Digital migration is a process in which broadcasting services using
– What it is traditional analogue technology are replaced with digital technology.
http://www.gov.za/speeches/digital-migration-analogue-switching-18-oct-2016-1047
Simple explanation of how it Analogue broadcasting signal is in the form of a continuous wave
works whereas digital is in the form of discrete bits (0's and 1's) of
information. In digital the signal is encoded and can be compressed to
allow for more channels to be broadcast.
Eight new standard definition TV programmes can be provided in the
same frequency as one analogue TV channel.
Advantages • Makes viewing experience a whole lot
better o Clearer pictures o Sharper sound o
More channels to choose from o Electronic
programming guide o Radio services and
music channels
• More viewing options – interactive video
and data services and audio description and
subtitles for those with hearing
impairments.
Disadvantages • Loss of free channels.
• Users will have to pay a monthly subscription.
• Users will have to buy a set-top-box. A set-top box is a device that
enables a television set to become a user interface to the Internet
and also enables a television set to receive and decode digital
television (DTV) broadcasts.
• As satellite dishes are needed to receive digital television, digital
migration could be expensive for the poor if the government turns
off analogue.
Limitations • Need a UHF antenna, TV must have an inbuilt digital tuner, TV must
have audio and video inputs which could be expensive for the
masses (poorer population).
Relevance and impact on • Digital migration may lead to vendors seeing a gap in the market
personal lives/ Application(s) and try to overcharge people unnecessarily.
in an ICT context
19 | P a g e
19. INTERNET OF THINGS (IOT)
Description – What it is Internet of Things (IoT) refers
to the trend whereby all sorts
of objects and devices are
increasingly being connected
to one another
via the
Internet. This can range from
surveillance systems
to geysers, washing
machines, 'smart' motor cars
and traffic lights, etc. Various
sensors in the devices can
produce data for all
sorts of purposes
including diagnostics and
running systems more efficiently.
Simple explanation of It is the Internet working of physical devices.
how it works
Advantages • IoT allows objects to be sensed and/or controlled remotely across an
existing network infrastructure
• IoT creates opportunities for more direct integration of the physical
world into computer-based systems.
• IoT improves efficiency, accuracy and economic benefit
Disadvantages • Internet connection is required.
• Limited address space of IPv4.
• IoT must be a globally adopted if its development is to be successful.
Limitations Devices will have to use IPv6 to accommodate the large address space.
Relevance and impact on • Users can control bulbs and locks over the Internet (from their
personal lives/ smartphone)
Application(s) in an ICT • Users can receive special offers on their favourite products
context • Users can locate items that they need
• Users can control heat/water/electricity and energy management can be
controlled from their device(s).
Examples of the • Heart monitoring implants.
technology in practice • Biochip transponders on farm animals.
• Electric clams in coastal water.
• Cars with built-in sensors.
• DNA analysis devices for environmental/food/pathogen monitoring
• Smart thermostat (heating and cooling)
• Smart home devices: washer, dryer, air purifiers, ovens, refrigerators,
freezers.
20 | P a g e
20. MOBILE OR M-LEARNING
Description – Mobile learning or MLearning is a form of
What it is education and training delivered and
conducted via the Internet using mobile
devices, such as tablets and smartphones. It is
designed to be flexible, allowing
learners/workers/students access to education
anywhere, anytime.
Simple Learners use mobile device for learning and research wherever they are.
explanation of Learners are able to download applicable apps for mobile learning.
how it works
Advantages • Accessible from anywhere (internet access required).
• Enables mobility/flexibility on the part of learners.
• Interaction with portable technologies.
• Collaborative learning - Real time sharing leads to instant feedback and tips
• Higher learning engagement.
• Improved completion rates and higher retention – Learning only happens when
instructional content is completed and key points are retained. Mobile learning is
designed to create engagement, which leads to course completion. Mobile
learning is also tailored to fit the device usage habits and learning patterns of
today’s learners, the result is higher rates of retention.
Limitations • Learners are not the same. Every learner has their own way of understanding the
content they have to learn.
• Many smartphones come with a good screen size and/or e-book readers.
• Internet access required.
• Expensive devices required.
Relevance and • M-Learning focuses on mobility of the learner, interacting with portable
impact on technologies.
personal lives/ • Learning takes place across multiple contexts, through social and content
Application(s) interactions, using personal electronic devices
in an ICT • Users are able to expand their knowledge base and are able to study from
context anywhere.
• Cost-effective.
Examples of • Handheld computers
the technology • MP3-players
in practice • Mobile phones and tablets and notebook computers.
21 | P a g e
21. RANSOMWARE
Description – Ransomware is a
What it is type of malware
designed to encrypt or block
access to your computer
system and files until you
pay a sum of money
(‘ransom’).
Simple explanation o f Ransomware is typically
how it works packaged with installation
files and camouflaged as
official software updates.
How to protect your Do not download from a site that tells you software on your computer is outdated.
computer Websites are not able to detect outdated software unless you give the website
permission to read your hard drive. If you think your software needs an update, go to
the official product developer’s site and download it directly from there.
Always keep the latest antivirus definitions installed on your computer to defend
against all types of malware. The main issue with ransomware is that once you get
infected, there is nothing you can do to reverse the damage.
Always keep regular backups in a safe place.
22 | P a g e
22. SCREEN LOCK PATTERN
Description – What it A screen lock pattern is a way of locking a device by setting up a pattern
is you must draw or trace on the screen to unlock the device.
Simple explanation of The screen lock pattern allows the user to draw a simple pattern with a
how it works finger to unlock the phone.
Advantages • Provides a certain type of security on a phone/mobile device.
• Patterns can be very difficult to copy as they can be randomly
created.
Disadvantages • Not as secure as a password.
• People can see what the pattern looks like and copy it.
Examples of the Some people can find it easier to remember patterns than
technology in passwords.
practice/Application(s
) in an ICT context
Limitations The number of patterns available are limited.
23 | P a g e
23. SHAPING (NETWORK TUNING)
Description Shaping or Network Tuning is a technique whereby certain network
– What it is (Internet) services, e.g. e-mail, are given preference while others such
as social networking services are given less priority so performance is
maintained for the more critical services.
Simple explanation of how it Why should one introduce limits to a network, when one would
works prefer to maximize its capability? To answer that question, one
should remember that the different kinds of traffic in a network also
have different priorities.
The profiles for traffic shaping can be easily changed, to adapt the
network to different uses. The network manager can run specific
tools to enable the automatic change of network profiles, for
instance according to the specific needs of certain hours of the day.
Example:
Suppose a person in the office, is on a tight schedule to deliver a
report for an important project. Then, mysteriously the network,
which is necessary for the report, becomes so slow that a web page
takes minutes to download. However, a lazy user, at the next table,
is frantically downloading not so urgent MP3 files, under high
transfer rates, using peer-to-peer connections. There is a chance that
the lazy neighbour is using all network bandwidth available for the
Internet in the office’s network.
24 | P a g e
24. Throttling (Policing)
Description Throttling or Policing occurs when your ISP slows down your Internet
– What it is connection. This most often occurs when you have been deemed by your
ISP to have downloaded excessive amounts of data. Each ISP has an
Acceptable Usage Policy (AUP) which specifies how this is determined
and implemented.
http://www.tidytutorials.com/2011/03/bandwidth-throttling-andconnection.html
Simple explanation of When you exceed your CAP for the month, your ISP will drop your
how it works Internet speed so that you won’t be able to continue your normal
downloading pattern.
Advantages • Equal internet usage for all.
• Save the life span of your server.
• Control the costs of the internet CAP.
• A controlled Internet access environment can be set up in an
organisation.
Disadvantages • Inconvenient for user due to the slow speed of the Internet - time
consuming.
• If not applied correctly, certain users will be restricted instead of not
being restricted.
• It could be misleading if you pay for uncapped data and then get
throttled.
Limitations • Restricted access.
• Internet speed will be slow
Relevance and impact on • Because of the slow internet speed it will be problematic when there
personal lives/ is more than one user on the network.
Application(s) in an ICT • Cannot do major downloads in a short period of time.
context
Examples of the • Company servers
technology in practice • Networks
25 | P a g e
25. 1 VIRTUAL REALITY (VR)
Desc Virtual Reality (VR) refers to
ripti using technology to create a
on – simulation of a
Wha 3Denvironment that can be
t it is interacted with a person in a
seemingly real or physical way.
This is achieved by using
equipment, such as
helmets with screens and gloves
fitted with sensors.
Simple explanation of Allows users to be immersed into a virtual world, it can include 4 to 5 senses.
how it works Tricks your brain into believing you are in a 3D world. The first way VR does this
is with the stereoscopic display. This works by displaying two slightly different
angles of the scene to each eye, simulating depth.
26 | P a g e
25.2 AUGMENTED REALITY (AR)
Description – What Augmented reality
it is uses similar types of
technology but does
not create a totally
virtual
environment
like VR. Instead it
takes the
physical world
and adds
(augments) objects such as graphics within the real world. Both VR and
augmented reality are used in areas ranging from entertainment (e.g. the
augmented reality game Pokémon GO), training in aircraft simulators and
medicine with surgeons being able to perform remote surgery on patients.
Simple explanation Augmented Reality turns the environment around you into a digital interface by
of how it works placing virtual objects in the real world, in real-time. Augmented Reality can be
seen through a wide variety of experiences. Handheld devices such as
smartphones and the iPad are other ways to use augmented reality. They
contain software, sensors, a compass and small digital projectors which display
images onto real world objects.
27 | P a g e
Examples of the • Medical • Engineering • Manufacturing,
technology in • Entertainment design maintenance and
practice • Military training • Consumer design repair
www.augmented- • Audio • Robotics and • Hazard detection
realitygames.com/imac telerobotics
t.php
• CRT monitors
• Fax
• Fax modems
• FireWire
• MICR
• MySpace
• OMR
• PDA
• Second Life
• Stand-alone vs. integrated software in terms of Office Suites
• Widgets
28 | P a g e