0% found this document useful (0 votes)
66 views

Grade 10 Study Notes Term 2 (1)

The document provides comprehensive study notes for Grade 10 on hardware and software concepts, including input and output devices, storage media, processing units, software types, licensing agreements, and network fundamentals. It also covers ergonomics, green computing, e-waste management, and social implications of technology use. Key topics include device management, network security, and ethical considerations in computing.

Uploaded by

oratilwembele2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

Grade 10 Study Notes Term 2 (1)

The document provides comprehensive study notes for Grade 10 on hardware and software concepts, including input and output devices, storage media, processing units, software types, licensing agreements, and network fundamentals. It also covers ergonomics, green computing, e-waste management, and social implications of technology use. Key topics include device management, network security, and ethical considerations in computing.

Uploaded by

oratilwembele2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Grade 10 Study Notes – Term 2

Hardware – Extended Hardware Concepts

Input Devices (Basic Concepts, Features, and Uses)


Input devices allow users to enter data and commands into a computer.

Pointing Devices
• Mouse: A hand-held device used to control a cursor on the screen.
• Trackpad (Touchpad): A flat surface that detects finger movement, commonly found on laptops.
• Stylus/Pen Input: Used with touchscreen devices for precision input.
Scanning and Reading Devices
• Barcode Scanner: Reads barcodes to retrieve product or data information.
• Optical Character Recognition (OCR): Converts printed or handwritten text into digital format.
• QR Code Scanner: Reads QR codes to quickly access information.
Video Input
• Webcam: Captures video for video calls, streaming, and security.
• Digital Camera: Used for high-quality photo and video capture.
• Frame Grabber: Converts video signals into digital images.
Audio Input (Microphone)
• Built-in Microphone: Found in laptops and smartphones for voice communication.
• External Microphone: Used for high-quality audio recording and voice recognition.
• Directional and Omnidirectional Microphones: Capture sound from specific directions.
Biometric Input
• Fingerprint Scanner: Identifies users based on fingerprint patterns.
• Facial Recognition: Uses cameras and AI to recognize users.
• Iris Scanner: Analyses the unique pattern of the iris for security authentication.

Output Devices (Basic Concepts, Features, and Uses)


Audio Output
• Speakers: Convert digital signals into sound.
• Headphones & Earbuds: Personal audio output devices.
• Sound Cards: Enhance audio quality for music production and gaming.
Other Output Devices
• Monitor (Display Screens): Show images and videos (LCD, LED, OLED).
• Printers: Convert digital documents into hard copies (Inkjet, Laser, 3D printers).
• Projectors: Display large-scale visuals for presentations or entertainment.

Storage Media and Devices (Basic Concepts, Features, and Uses)


Memory Cards
• Types: SD, MicroSD, CF, etc.
• Size Variations: Storage capacities range from a few MB to several TB.

1 Created by Marissa Pretorius


• Transfer Speeds: Measured in MB/s, affecting how quickly data moves.
Card Reader
• Built-in: Found in some laptops and desktops for direct card reading.
• External Multi-Card Reader: Connects via USB to read different card formats.

Processing (Overview and Basic Concepts)


• CPU (Central Processing Unit): The "brain" of the computer, processes instructions.
• GPU (Graphics Processing Unit): Handles graphics rendering for gaming, design, and AI.
• RAM (Random Access Memory): Temporary memory that stores active data for quick access.
• Clock Speed: Measured in GHz, determines how fast a processor executes tasks.
• Cores and Threads: More cores/threads allow better multitasking.

Software Extended Concepts

Software can be categorized into different types based on functionality:


1. System Software: Manages hardware and provides a platform for other software.
o Examples: Operating Systems (Windows, macOS, Linux), drivers, firmware.
2. Application Software: Designed for end-users to perform tasks.
o Examples: Web browsers, word processors, media players.
3. Development Software: Used to create, test, and debug applications.
o Examples: Compilers, text editors, Integrated Development Environments (IDEs).
4. Middleware: Acts as a bridge between different applications and systems.
o Example: Database middleware for connecting applications to databases.

Licensing and Licensing Agreements


Software licensing governs the use, distribution, and modification of software.
• Proprietary License: The software is owned by a company, and users must pay for it.
o Example: Microsoft Windows, Adobe Photoshop.
• Open-Source License: Users can modify and distribute the software freely.
o Example: Linux, Apache Web Server.
• Freeware: Free to use but with restrictions (cannot be modified).
o Example: Skype, Adobe Reader.
• Shareware: Free for a limited time or with restricted features.
o Example: WinRAR, trial versions of games.
• End User License Agreement (EULA): A contract between the user and the software provider
defining terms of use.

System Software
System software manages and controls hardware, ensuring the system operates efficiently.
Drivers

2 Created by Marissa Pretorius


• Small programs that enable hardware to communicate with the operating system.
• Examples: Printer drivers, graphics card drivers, sound drivers.
Auto Configuration
• Allows operating systems to detect and configure hardware automatically.
• Example: Plug-and-play (PnP) technology, where a USB device is recognized without manual setup.

Utility Programs
Utility programs are specialized tools that help maintain, optimize, and protect a computer system.
• Antivirus Software: Protects against malware and viruses (e.g., Norton, McAfee).
• Disk Cleanup Tools: Frees up space by removing unnecessary files.
• Backup Software: Creates copies of data for recovery (e.g., Acronis, Windows Backup).
• File Compression Tools: Reduces file sizes (e.g., WinRAR, 7-Zip).
• Defragmentation Tools: Optimizes disk storage for better performance.

Device Management

Device management involves configuring, maintaining, and optimizing


hardware devices connected to a computer or system.

Creating Shortcuts
Shortcuts provide quick access to applications, files, or settings.
• Windows: Right-click a file → "Create Shortcut" → Move to
desired location.
• macOS: Use "Alias" (Right-click → "Make Alias") to create a shortcut.
• Mobile Devices: Long press an app icon and drag it to the home screen.

Adding New Peripherals


Peripherals include external devices like printers, keyboards, and external drives.
• Wired Devices: Plug into USB, HDMI, or other ports → System automatically detects or prompts
driver installation.
• Wireless Devices: Use Bluetooth or Wi-Fi settings to connect.
• Drivers: Ensure correct drivers are installed for full functionality.

Pairing Devices
Pairing allows wireless communication between devices.
• Bluetooth:
o Enable Bluetooth on both devices.
o Search for devices in settings.
o Select and confirm pairing.
• Wi-Fi Direct: Connect devices without a router (e.g., file sharing).
• NFC (Near Field Communication): Used for contactless pairing (e.g., mobile payments).

Changing the Default Printer


Set a preferred printer for faster printing:
• Windows:
o Go to Control Panel → Devices and Printers → Right-click desired printer → Set as Default.
• macOS:

3 Created by Marissa Pretorius


o Go to System Preferences → Printers & Scanners → Select printer → Set as Default.
• Mobile Devices:
o Change the default printer in the print settings of the respective app.

Basic Printing and Printer Queue Management


Printing involves sending a document to a printer, while queue management helps resolve issues.
• To Print a Document:
o Open the file → File → Print → Select printer and preferences → Print.
• Managing the Printer Queue:
o Windows: Open Control Panel → Devices and Printers → Double-click printer → Manage
print queue (Pause/Cancel jobs).
o macOS: Open Printers & Scanners → Select printer → View print queue.
o Restart Printer Service: If jobs are stuck, restart the printer or print spooler service.

Compressing/Decompressing Files and Folders


Compression reduces file size for storage or transfer, and decompression restores them.
• Windows:
o Compress: Right-click file → "Send to" → "Compressed (zipped) folder".
o Decompress: Right-click ZIP file → "Extract All".
• macOS:
o Compress: Right-click file → "Compress [filename]".
o Decompress: Double-click ZIP file.
• Third-Party Tools: WinRAR, 7-Zip, WinZip (support additional formats like RAR, TAR).

Networks

What is a Network?
A network is a collection of interconnected computers and devices that communicate with each other to
share resources, data, and services. Networks can be wired (using cables) or wireless (using radio signals
like Wi-Fi).

Aims and Objectives of Networks


Networks are designed to achieve several key goals:
1. Facilitating Communication – Enables users to send messages, emails, and conduct video calls.
2. Resource Sharing – Allows multiple users to share hardware (printers, storage) and software.
3. Data and Information Sharing – Enables quick access to shared files and databases.
4. Efficiency and Collaboration – Supports teamwork by enabling real-time collaboration on
documents.
5. Centralized Management – Helps in managing users, permissions, and security policies.

Facilitating Communication and Sharing


1. Communication
• Emails and Messaging: Used for instant communication over the network.
• Video Conferencing: Platforms like Zoom, Microsoft Teams, and Google Meet enable real-time
interaction.
• Social media and Cloud Services: Platforms like Facebook, Google Drive, and Dropbox allow
sharing of multimedia content.

4 Created by Marissa Pretorius


2. Sharing Hardware
• Printers: A single networked printer can serve multiple users.
• Scanners: Shared across a network for multiple devices to access.
• Storage Devices: Network-attached storage (NAS) allows users to save and retrieve files from a
central location.
3. Sharing Software
• Cloud-based Applications: Google Docs, Office 365, and other SaaS (Software as a Service)
platforms provide shared access to software over the internet.
4. Sharing Data and Information
• File Sharing: Users can transfer documents, videos, and images across a network.
• Databases: Centralized databases allow multiple users to access and update information
simultaneously.

Basic Security and Privacy Issues in Networks


As networks connect multiple devices, they are vulnerable to security threats.
Common Security Issues
1. Hacking & Unauthorized Access – Attackers can exploit vulnerabilities to gain access to sensitive
data.
2. Viruses & Malware – Malicious software can spread across a network, compromising data.
3. Phishing & Social Engineering – Cybercriminals trick users into revealing personal information.
4. Data Interception – Unencrypted data can be intercepted and read by attackers.
Privacy Issues
1. Tracking and Surveillance – Websites and companies collect user data for advertising and
analytics.
2. Data Breaches – Personal and financial data can be exposed if security measures are weak.
Basic Security Measures
1. Using Firewalls – Protects networks from unauthorized access.
2. Implementing Strong Passwords – Prevents unauthorized access to devices and accounts.
3. Encryption – Ensures data is protected when transmitted across a network.
4. Regular Software Updates – Helps patch security vulnerabilities.
5. Using Antivirus Software – Detects and removes threats.

Examples of Networks
1. Internet
• A global network connecting millions of computers worldwide.
• Used for browsing, communication, online banking, and remote work.
2. LAN (Local Area Network)
• Covers a small geographical area, such as a home, school, or office.
• Example: A Wi-Fi network in an office building.
3. HAN (Home Area Network)
• A LAN used in homes to connect devices like computers, smartphones, and smart TVs.
• Example: A household where all smart devices (laptops, printers, game consoles) share an internet
connection.

5 Created by Marissa Pretorius


Examples of networks

LAN – Local Area Network HAN – Home Area Network

PAN – Personal Area Network WAN – Wide Area Network

VPN – Virtual Private Network

6 Created by Marissa Pretorius


Ergonomics

Ergonomics is the study of designing and arranging workspaces, tools, and equipment to fit the user's
needs, improving comfort, efficiency, and safety. It's focused on minimizing strain and discomfort,
preventing injuries, and enhancing productivity. In short, it's about making things work better for the
people who use them.

Setting Example of Ergonomics


Adjustable chairs with lumbar support to promote good posture and reduce back
Office Environment
strain.
Computer
Ergonomic keyboards and mouse designs that reduce wrist strain.
Workstations
Proper desk height and placement to ensure that workers maintain a comfortable
Workplace Layout
arm and leg position.
Tools with padded, non-slip handles designed to minimize hand strain during
Work Tools
repetitive tasks.
Adjustable height desks that allow users to alternate between sitting and
Standing Desks
standing positions.
Monitors Screens positioned at eye level to reduce neck and eye strain.
Adjustable lighting to prevent glare and eye strain from harsh overhead lights or
Lighting
screen brightness.
Ergonomic pillows and mattresses designed to support proper spinal alignment
Home Setup
during sleep.

7 Created by Marissa Pretorius


Green Computing

Green computing refers to the practice of designing, using,


and disposing of computers and related systems in an
environmentally responsible way. The goal is to reduce the
environmental impact of technology by using energy-efficient
methods and promoting sustainability throughout the
lifecycle of IT products.

Key Elements of Green Computing

Element Description
Optimizing power usage of computers, data centers, and hardware to reduce
Energy Efficiency
energy consumption.
E-Waste Reducing and recycling electronic waste (e.g., old computers, batteries) to
Management minimize environmental impact.
Sustainable Designing energy-efficient hardware and using environmentally friendly materials
Hardware in production.
Using virtualized resources and cloud storage to reduce the need for physical
Cloud Computing
infrastructure and hardware.
Implementing energy-saving modes, such as sleep or hibernation, to reduce power
Power Management
usage when devices are idle.
Recycling & Reuse Encouraging the reuse of electronic components and recycling obsolete devices.
Designing and operating data centers with energy-efficient cooling, power
Green Data Centres
systems, and resource management.
Minimizing paper use by transitioning to digital documents and reducing paper
Paperless Solutions
waste.
Software Creating software that is resource-efficient, minimizing the computational power
Optimization required for tasks.
Carbon Footprint Reducing greenhouse gas emissions from IT activities through energy-efficient
Reduction operations and renewable energy sources.

E-waste
E-waste (electronic waste) refers to discarded electronic devices and components that are no longer in
use, such as:
• Old computers and laptops
• Smartphones and tablets
• Televisions and monitors
• Printers, fax machines, and scanners
• Batteries and chargers
• Home appliances like refrigerators, microwaves, and
washing machines
• Electrical components like circuit boards, connectors,
and cables

8 Created by Marissa Pretorius


E-waste can contain hazardous materials like lead, mercury, and cadmium, which can harm the environment
and human health if not disposed of properly. However, it also contains valuable materials, such as gold,
silver, copper, and rare earth metals, which can be recycled and reused through proper disposal methods.
The proper management of e-waste is essential for reducing its environmental impact and conserving
resources. Recycling and repurposing electronic components help minimize pollution and promote
sustainability.

Social Implications – Social Issues

Social Issues in Computing


Technology plays a significant role in society, but its use raises ethical concerns. Below are some key
topics related to ethical computing and intellectual property.

Ethical Use of Content


Using digital resources responsibly means respecting
ownership rights and following legal guidelines for:
1. Hardware
o Proper disposal of electronic waste (e-
waste) to prevent environmental harm.
o Avoiding theft or misuse of computer
equipment.
o Using shared hardware (e.g., printers,
storage devices) fairly in a workplace or
school setting.
2. Software
o Using legally purchased or licensed software instead of pirated versions.
o Avoiding unauthorized modifications or distribution of software.
o Respecting user agreements (EULA) and terms of service.
3. Computer Management
o Protecting sensitive data and user privacy.
o Ensuring fair usage of shared resources in workplaces, schools, and public spaces.
o Avoiding intentional damage or disruption of computer systems (e.g., through hacking or
malware).
4. Networks
o Using networks responsibly to avoid cyberbullying, harassment, or illegal activities.
o Not accessing unauthorized files or accounts.
o Ensuring secure practices to protect personal and organizational data.

Software Piracy, Licensing, Copyright, and Intellectual Property


1. Software Piracy
Software piracy is the illegal copying, distribution, or use of software without proper authorization.
Common forms include:
• Cracking – Removing or bypassing software licensing restrictions.
• Counterfeiting – Distributing fake copies of software.
• Soft lifting – Using a single-user license on multiple devices.

9 Created by Marissa Pretorius


• Torrent Downloads – Downloading paid software illegally from file-sharing platforms.
2. Licensing
Software licensing determines how a user can legally use software. Common types include:
• Proprietary License – The software is owned by a company and requires a paid license (e.g.,
Microsoft Windows, Adobe Photoshop).
• Open-Source License – The software is freely available for modification and distribution (e.g.,
Linux, Apache).
• Freeware – Software available for free but with restrictions (e.g., Skype, Adobe Acrobat Reader).
• Shareware – Free to try, but requires payment for full access (e.g., WinRAR).
3. Copyright & Intellectual Property (IP)
• Copyright Law protects creators by granting them rights over their work, including software,
music, videos, and books.
• Intellectual Property (IP) includes patents, trademarks, and copyrights for digital content and
software.
• Fair Use allows limited use of copyrighted content for education, research, and commentary.

Consequences of Unethical Computing Practices


• Legal Penalties – Fines, lawsuits, or even jail time for copyright infringement.
• Financial Losses – Companies lose billions due to software piracy.
• Security Risks – Pirated software often contains malware and lacks official updates.
• Reputation Damage – Using pirated or stolen software can harm an individual’s or company’s
credibility.

10 Created by Marissa Pretorius

You might also like