Theory Revision - CAT Term 2 - Grade 11

Education with Mr Hambury
27 Jun 202222:17

Summary

TLDRThis educational video script offers a comprehensive review for grade 11 students, covering key computer science topics from term two. It delves into storage memory, processing, and the distinction between primary and secondary memory. The script explains computer components like RAM, hard drives, and the booting process, while also exploring network concepts, including LANs, WLANs, and the significance of network security and ethical usage. Additionally, it touches on the importance of effective website design, data processing, and the role of questions in problem-solving. The script serves as a valuable study aid, preparing students for exams and practical applications.

Takeaways

  • 💾 Remember the difference between primary memory (RAM) and secondary memory (hard drive) when discussing PC specifications.
  • 🖥️ Understand the components of a desktop PC, including the ATX case, PSU, motherboard, CPU model, memory, optical drive, operating system, and peripherals like the keyboard and monitor.
  • 🌐 Know the advantages and disadvantages of online storage and be able to explain the concept, including examples.
  • ☁️ Distinguish between online storage, which is about file storage, and cloud computing, which involves running programs based on the cloud.
  • 📚 Be aware of backup strategies and the difference between a backup, which is a copy, and an archive, which involves moving files for later use.
  • 💻 Learn about the booting process of a computer, starting from the ROM instructions to loading the operating system.
  • 🌐 Grasp the concepts of LAN (Local Area Network) and WLAN (Wireless LAN), and understand the differences and use cases.
  • 🔑 Know the basics of network security, including the importance of strong passwords and the ethical use of networks.
  • 🌐 Recognize the signs of being connected to a network, such as seeing additional drives or access to shared printers.
  • 🛠️ Be familiar with network components like the network interface controller (NIC), switches, and the impact of data transmission speeds on network performance.

Q & A

  • What is the primary memory in a computer?

    -The primary memory in a computer is RAM (Random Access Memory), which is used for temporary data storage while the computer is running.

  • What is the difference between primary and secondary memory?

    -Primary memory, or RAM, is used for temporary data storage during operation, while secondary memory, such as hard drives, is used for long-term data storage.

  • What are the advantages and disadvantages of online storage?

    -Advantages of online storage include accessibility from anywhere with an internet connection and off-site backups for security. Disadvantages include potential data privacy issues and reliance on internet connectivity.

  • How does cloud computing differ from online storage?

    -Online storage involves storing files on remote servers, while cloud computing refers to using applications and services that are hosted on the internet rather than running on a local device.

  • What is the role of a backup in data management?

    -A backup is a copy of data made to prevent data loss in case of corruption, deletion, or other issues. It ensures that important files can be restored if the original is compromised.

  • What is the purpose of the booting process in a computer?

    -The booting process is the initialization of a computer's hardware and software systems when it starts up, allowing the operating system to load and the computer to become operational.

  • What is the difference between a LAN and a WLAN?

    -A LAN (Local Area Network) is a wired network confined to a specific area, while a WLAN (Wireless Local Area Network) is a wireless network that allows devices to connect without physical cables.

  • Why might a wired connection be preferred over a wireless one?

    -A wired connection is often preferred because it generally provides faster and more stable internet speeds compared to wireless connections, which can be affected by interference and distance.

  • What is an intranet and how does it differ from the internet?

    -An intranet is a private network within an organization that mimics the functionality of the internet but is not publicly accessible. It is typically used for internal communication and resource sharing.

  • What is the significance of network security policies?

    -Network security policies define the rules and practices for the secure use of a network. They help protect sensitive data and ensure that only authorized users have access to network resources.

  • Why is it important to have a strong password for network access?

    -A strong password helps prevent unauthorized access to a network and its resources. It should include a mix of uppercase and lowercase letters, numbers, and special characters, and should not be easily guessable.

Outlines

00:00

💾 Computer Memory and Storage

The paragraph introduces the concepts of primary and secondary memory, explaining RAM as primary memory and hard drives as secondary memory. It emphasizes the importance of understanding these terms when looking at PC specifications. The discussion also covers the difference between memory and storage, with examples from an ATX case and PSU setup, including motherboard, CPU model, optical drives, and other components. The paragraph further explores online storage, its advantages and disadvantages, and the distinction between online storage and cloud computing. It also touches on backup strategies and the difference between backups and archives, leading into a discussion on troubleshooting and processing roles within a computer system.

05:01

🌐 Local Area Networks and Network Components

This section delves into local area networks (LAN) and wireless LAN (WLAN), explaining their definitions and uses. It contrasts wired and wireless connections, highlighting the faster and more stable nature of wired networks. The paragraph discusses intranets, differentiating them from the internet and explaining their use within organizations. It also covers the roles of workstations and servers, and the importance of network components like network interface controllers, switches, and data transmission speeds. The discussion includes the impact of the slowest device on network speed and the significance of wireless standards. The paragraph concludes with an overview of wired media, network operating systems, and signs of being connected to a network.

10:01

🔐 Network Security and Usability

The focus of this paragraph is on network security, including the use of passwords and the concept of strong passwords with a mix of uppercase, lowercase, numbers, and symbols. It warns against using easily guessable passwords and the risks of hacks. The paragraph also addresses ethical use of networks, acceptable use policies (AUPs), and netiquette rules. It discusses the browsing experience, website usability, and factors affecting browsing such as privacy concerns, spyware, adware, and the importance of antivirus software. The paragraph also touches on the process of finding information, data processing techniques, and the importance of effective reporting, including copyright and intellectual property considerations.

15:01

🔍 Information Management and Questionnaires

This section discusses the information management cycle, the role of questions in research, and data processing techniques. It emphasizes the importance of effective reporting, including the structure of reports with introductions, main bodies, and conclusions. The paragraph also covers electronic presentations and their role in providing quick overviews of reports. It discusses the task definition process, types of questions, and levels of questioning specific to the PET curriculum. The paragraph concludes with a discussion on questionnaires and surveys, differentiating between the two and explaining the importance of effective survey question design, layout, and the quality of information gathered.

20:02

📚 Summary of Term Two Theory

The final paragraph summarizes the theory covered in term two, inviting students to ask questions in the comments and mentioning upcoming practical demonstrations of the modules. It serves as a conclusion to the video script, wrapping up the discussion on computer memory, networks, information management, and the importance of understanding these concepts for grade 11 and 12 studies.

Mindmap

Keywords

💡Storage Memory

Storage memory refers to the physical devices that store data on a computer. In the video, the distinction between primary memory (RAM) and secondary memory (hard drive) is highlighted. Primary memory is volatile and used for active data processing, while secondary memory is non-volatile and used for long-term storage. The script mentions that understanding these concepts is crucial for interpreting computer specifications and advertisements.

💡Processing

Processing in the context of the video pertains to the operations performed by a computer's CPU (Central Processing Unit) to execute instructions and manipulate data. The CPU's role is emphasized as it fetches instructions and data from RAM to perform tasks. This is integral to understanding computer performance and the booting process, which is initiated by the CPU following instructions stored in ROM (Read-Only Memory).

💡Local Area Network (LAN)

A Local Area Network (LAN) is a computer network that spans a confined area, such as a school or building. The video script discusses LANs and their wireless counterparts (WLANs), highlighting the differences in connectivity and use cases. LANs are crucial for understanding network topologies and the advantages of wired connections over wireless ones, such as faster and more stable data transmission speeds.

💡Cloud Computing

Cloud computing is the delivery of computing services, including servers, storage, databases, networking, software, analytics, and intelligence, over the Internet (the cloud) to offer faster innovation, flexible resources, and economies of scale. The video script differentiates cloud computing from online storage, emphasizing that cloud computing involves running programs and services from remote servers, whereas online storage is about storing files remotely.

💡Backup

A backup in the video is defined as a copy of files or data made to prevent data loss in case of system failure or other issues. The script mentions various backup strategies, including the use of CDs, DVDs, flash drives, and online storage. Backups are essential for data security and are a key aspect of computer maintenance and network management.

💡Archiving

Archiving, as discussed in the video, is the process of moving files to a separate storage location for long-term retention. Unlike backups, which are for immediate recovery, archives are for future access and are not typically needed for daily operations. The script explains that understanding the difference between backups and archives is important for managing data effectively.

💡Troubleshooting

Troubleshooting, as mentioned in the video, involves diagnosing and resolving issues that arise with computer systems or networks. The script touches on common troubleshooting areas such as managing backups and dealing with problems related to CDs and disk scanning. Effective troubleshooting is a critical skill for IT professionals and computer users alike.

💡Network Interface Controller

A Network Interface Controller (NIC) is a device that connects a computer to a network. The video script explains that the NIC allows a PC to communicate over a network, with the physical network cable plugging into the NIC. This component is fundamental to understanding how devices connect to LANs and WLANs.

💡Data Transmission Speeds

Data transmission speeds refer to the rate at which data can be sent over a network. The video script discusses how these speeds are determined by the capabilities of the network card, cable, and switch, with the network's speed being limited by the slowest of these devices. Understanding data transmission speeds is vital for optimizing network performance.

💡Wireless Standards

Wireless standards, such as 'G', 'N', and 'AC', refer to different generations of Wi-Fi technology, each with varying capabilities and speeds. The video script highlights the importance of recognizing these standards to understand the capabilities and limitations of wireless networks. These standards are crucial for comparing and choosing appropriate wireless technologies.

💡Network Security

Network security in the video involves the practices and policies adopted to prevent and monitor unauthorized access, use, modification, or denial of a computer network and its resources. The script mentions the use of usernames and passwords, strong password creation, and ethical use of networks as part of network security. Ensuring network security is essential for protecting sensitive data and maintaining the integrity of network operations.

Highlights

Introduction to term two revision covering theory modules

Explanation of primary and secondary memory with examples

Difference between memory and storage emphasized

Description of a desktop PC's components

Advantages and disadvantages of online storage discussed

Cloud computing contrasted with online storage

Importance of backing up files and backup strategies outlined

Difference between backup and archive explained

Troubleshooting topics in processing and storage introduced

Role of motherboard and CPU in processing explained

Booting process of a computer described

Local Area Networks (LAN) and Wireless LAN (WLAN) defined

Advantages of wireless LANs over wired connections

Intranet versus Internet and their uses

Workstation and server roles in a network

Components of a network and their functions

Data transmission speeds and network limitations

Wireless standards and their significance

Network operating system and its capabilities

Signs of being connected to a network

Advantages and disadvantages of wireless vs. cabled networks

Network security policies and ethical use

Importance of strong passwords for network security

Browsing experience and usability of websites

Factors affecting browsing including privacy and adware

Information processing from data to knowledge

Problem-solving cycle in information management

Role of questions in the information management cycle

Data processing techniques and effective reporting

Information management cycle and task definition

Types of questions and levels of questioning

Conducting surveys and questionnaires for data collection

Effective layout and quality of information in surveys

Transcripts

play00:00

[Music]

play00:03

hi grade 11s and welcome to our term two

play00:06

revision where i'm looking at the theory

play00:07

modules that we covered this term so i'm

play00:10

just briefly gonna go go through

play00:11

everything um so this would just be a

play00:13

nice overview

play00:15

for you okay so let's get started and

play00:18

let's have a look at what we needed we

play00:19

started with module 1.3 we were talking

play00:22

about storage memory and processing

play00:26

so please remember

play00:28

right please remember this when we talk

play00:30

about the specs of the pc now

play00:32

i'll be asking things like what's the

play00:34

primary memory and the secondary memory

play00:37

please remember your primary memory

play00:38

we're talking about ram

play00:40

and that's what they show in here it's 1

play00:41

to 16 gigs

play00:43

well it's obviously bigger than that now

play00:45

or you can have more than that and then

play00:48

your storage your secondary memory yeah

play00:49

we talk about you know more gigs we talk

play00:52

about terabytes as well so primary

play00:54

memory ram secondary memory our hard

play00:57

drive okay

play00:59

let's move on there we've got our memory

play01:00

and storage again at this stage we know

play01:03

the difference between

play01:04

memory and storage so please

play01:07

go through that

play01:09

this is going to become an integral part

play01:11

where we start throwing adverts in spec

play01:13

lists of pcs so that you can understand

play01:15

and let us know that you understand what

play01:18

you are reading

play01:19

so there for example is the memory look

play01:21

at the top an atx case and psu that's

play01:24

your power supply unit what this is

play01:26

telling me is that there's a physical

play01:28

case a physical tower with a power

play01:30

supply unit so is it a laptop or a

play01:32

desktop it's a desktop

play01:34

then i've got my motherboard i've got

play01:35

the model of the cpu i've got my

play01:38

secondary memory my primary memory my

play01:41

optical

play01:42

drive

play01:44

okay

play01:44

my operating system

play01:46

and the version of it

play01:49

i've got a physical keyboard and mouse

play01:50

and a 18.5 inch member we measure that

play01:53

diagonally in inches

play01:55

lcd liquid crystal display screen

play01:58

okay so there they show us

play02:01

just an example also of an external

play02:04

drive and then we have online storage

play02:06

again storing files online so we can

play02:08

access it anywhere we need to provided

play02:10

we have an internet connection

play02:13

so they go through some of the

play02:14

advantages

play02:16

and disadvantages again as i always say

play02:18

you should know just at least two of

play02:20

them you should be able to explain the

play02:22

concept of online storage

play02:24

and be able to give us two

play02:26

examples or two advantages and two

play02:29

disadvantages and that should that

play02:31

should sort of cover you

play02:32

okay so please do make some time and go

play02:36

through these things

play02:38

then the difference between your online

play02:40

storage and cloud computing now online

play02:42

storage differs from cloud computing as

play02:44

they're telling us because it involves

play02:46

storing files so online storage i'm

play02:48

storing files onto the cloud online

play02:51

that's what i'm doing

play02:52

okay

play02:53

um

play02:54

whereas cloud computing i'm actually

play02:56

using

play02:58

you know programs that based on the

play03:00

cloud so

play03:02

if i've got a version of office

play03:04

that i need to connect to the internet

play03:06

in order to actually use that that would

play03:08

be an example of my cloud compute i'm

play03:10

actually running things from the cloud

play03:12

then with backing up but now we know

play03:14

what backups are we are making a copy of

play03:16

our files why because files can get

play03:18

damaged corrupted deleted

play03:20

so

play03:21

just bear that in mind as well there are

play03:24

a couple of popular backup strategies i

play03:25

can use cds dvds blu-rays flash drives

play03:29

portable hard drives and

play03:31

obviously my online

play03:33

storage as well now they go through the

play03:34

process of how to write cds and dvds i'm

play03:37

not going to worry too much about that

play03:38

because they don't really ask you

play03:40

for that this is something that they do

play03:42

ask the difference between a backup and

play03:44

archive now backup is when i'm making

play03:46

another copy archiving i'm actually

play03:48

moving those files somewhere else to use

play03:51

at a later stage okay

play03:54

then we start you know you'll see this

play03:56

we start talking about troubleshooting

play03:59

what do we do with problems arise so

play04:01

managing backups problems with cds disk

play04:04

scanning

play04:05

please start to know these things

play04:06

because it does play a big role in grade

play04:08

11 and grade 12.

play04:11

okay so you can go through that then

play04:13

processing we know what processing is

play04:16

and the role it plays

play04:18

um we know how what our motherboard is

play04:20

largest circuit board everything else is

play04:23

plugged into our cpu that does the

play04:25

process in our ram with the cpu goes to

play04:28

fetch the instructions and data that it

play04:30

needs to work on and our rom that holds

play04:32

instructions when it comes to the basic

play04:34

hardware of the computer you know when

play04:36

the computer switches on it's got all

play04:37

those instructions

play04:39

in there

play04:40

now this is important to know because

play04:42

they'll ask you to describe the booting

play04:44

process so when a computer starts itself

play04:47

up you click on the start button and

play04:49

your rom instructions then begin to load

play04:52

it checks what the cpu and then the boot

play04:55

processing begins you know uh when you

play04:57

switch pc on

play04:58

and i know some of them do that beep

play05:00

like dude that's when rom has checked

play05:03

through everything motherboard hardware

play05:05

ram everything is okay

play05:06

dude

play05:07

let's go

play05:08

and then the booting process goes and

play05:10

this is why it moves in from a black

play05:12

screen a black and white screen to the

play05:14

windows logo because it looks for the

play05:16

hard drive

play05:17

where's the operating system installed

play05:19

and then it loads the operating system

play05:22

okay so there you can see checks all of

play05:25

that and then loads the operating system

play05:27

then the next one was dealing with your

play05:29

local area networks now in grade in the

play05:31

grade 10 revision video you saw we

play05:33

started

play05:34

on just what a network is now we're

play05:36

going to some more detail we already

play05:38

know what a network is so i don't even

play05:40

have to go into that definition

play05:42

um we know what that is we know what a

play05:44

local area network is it's a network

play05:46

confined to a

play05:48

specific geographical area one

play05:50

geographical area like your school or

play05:52

your building or things like that then

play05:55

you have your wlan which is a lan but

play05:57

wireless

play05:58

okay and they will ask you for the

play06:00

difference between the two and why you

play06:02

would use a wireless lan or what the

play06:05

advantages of using the wireless lan

play06:07

would be as opposed to a normal

play06:09

cable glance please remember a cable

play06:11

connection is always going to be faster

play06:12

and more stable than your wireless so

play06:14

just just bear those things in mind

play06:17

also your intra i'm

play06:25

please it's not internet this is an

play06:27

intranet

play06:29

sorry i must say it like that

play06:31

this is an organization accompanies

play06:33

private network it has an internet like

play06:35

environment in other words i can open up

play06:38

a website i can go to the company's

play06:40

website click in there put in my

play06:41

username and password and i'll navigate

play06:44

as i would

play06:45

you know when i browse the internet but

play06:48

it is only within my company's

play06:50

organization so if i go home i can't

play06:52

access it

play06:53

because i need to be connected to the

play06:55

company's network and many times you

play06:56

have got to go through

play06:57

a vpn to be able to access these things

play07:00

so and just know the difference between

play07:03

those also the difference between your

play07:05

workstation and your server your client

play07:07

computer and your server client computer

play07:09

workstation is going to be the same

play07:11

thing your server provides services to

play07:13

the network your clients connect to the

play07:15

server um to benefit from those

play07:19

then some of the basic components of the

play07:21

network i know i had a video showing you

play07:23

in in the class maybe i'll just do an

play07:25

updated one

play07:27

your network interface controller that's

play07:28

your network card

play07:30

that device is there

play07:33

to allow the pc to connect to the

play07:36

network so you've got your physical

play07:38

network cable that gets plugged in

play07:41

a physical network cable gets plugged

play07:43

into the actual

play07:45

network card and that is how it's able

play07:47

then to communicate please know the

play07:49

difference between that and a switch the

play07:51

switch is a hardware device that as it's

play07:53

saying connects computers in a network

play07:56

right so that they can communicate

play07:58

now you might have two or three computer

play08:00

labs

play08:02

or you your entire school might have a

play08:04

network

play08:05

and the switch allows one area to

play08:07

connect to another one so that

play08:08

communication can

play08:10

uh occur also your data transmission

play08:13

speeds in other words how fast data can

play08:15

move over that cable

play08:17

these are questions that come up often

play08:20

i know this came up in the previous in

play08:22

june's exams

play08:24

so

play08:24

please

play08:25

when you see 10 100 1000 what that means

play08:28

it's the minimum speed and the maximum

play08:30

speed that that cable can handle so if

play08:33

it says 10 100 means it can handle up to

play08:35

100 megabits per second of data

play08:38

transmission

play08:40

on that line okay

play08:41

also bear in mind

play08:44

and they will ask you this

play08:46

if all my devices my network card

play08:49

because remember when i set up a network

play08:50

i need a network card i've got a cable

play08:52

i've got a switch i've got a server with

play08:54

a network card all this if they all run

play08:56

at the same speed beautiful

play08:58

but let's say i've got cables that can

play09:00

handle 100 megabits per second but my

play09:02

network cards and my switches can only

play09:04

handle 10 megabits per second then the

play09:07

entire network

play09:08

will work on 10 megabits per second your

play09:11

network speed will be controlled

play09:14

by the slowest device on that network so

play09:18

if you want your network to run at you

play09:19

know a thousand megabits per second all

play09:22

your devices must be capable of handling

play09:25

that thousand megabits per second okay

play09:28

also your wireless standards um you know

play09:31

what does that stand for what is the g

play09:33

mean what does the n mean there they

play09:34

tell us those are things that you must

play09:38

know

play09:39

okay and then they just mention your

play09:40

wired media to your different types of

play09:42

cables these guys know how to explain

play09:44

these cables to us

play09:46

that's another tip

play09:48

oh this means the communication

play09:51

the network operating system in other

play09:52

words your operating system that has

play09:54

network capability there are some

play09:56

operating systems that don't allow you

play09:58

to connect to a network so

play10:00

um

play10:01

most of your you know your windows

play10:04

software does allow you to do that

play10:06

uh but you would need to check on that

play10:07

so again software that controls all the

play10:09

communication security in a network uh

play10:12

most have this built in as i mentioned

play10:15

um

play10:16

yeah that's that's about right so how

play10:19

would you know that you are connected to

play10:20

a network sometimes you'd see on your

play10:22

explorer that you maybe have extra

play10:24

drives

play10:25

um you might see something else other

play10:28

than you know when you click on my

play10:30

network places you might actually see

play10:32

that there are other computers there and

play10:34

you might see you know when you want to

play10:35

go and print to something oh there's you

play10:37

know a whole list of printers with

play10:39

different names you know

play10:40

to places that

play10:42

like your your library or things and

play10:44

you're like okay but i'm sitting in the

play10:45

computer lab so these are all

play10:48

just some signs that

play10:50

you are actually connected to a network

play10:54

then you want to go into the advantages

play10:56

again i'm not going to go through this i

play10:57

have done videos on this so please go

play11:00

and check that out know the advantages

play11:02

between

play11:03

your wireless and your cabled networks

play11:06

the disadvantages as well why you would

play11:08

choose one over the other because

play11:09

they'll give you a scenario and ask you

play11:12

to justify why the one is actually

play11:14

better than the other

play11:19

then your network security

play11:22

your policies please just understand

play11:24

what that is

play11:26

and how it works

play11:28

uh then they just mentioned within the

play11:30

network environment you use usernames

play11:33

and passwords obviously to keep your

play11:34

information safe

play11:36

uh

play11:37

yes this is very important

play11:39

please guys

play11:41

they will ask you about passwords and

play11:43

you might have to give an example of a

play11:45

password that would be a strong password

play11:48

a strong password should have a capital

play11:50

it should have a number it should have

play11:53

a symbol in it if you look at this

play11:57

passage look i'm gonna i'm gonna say it

play11:58

straight to you i'll never remember this

play12:00

password but it's got all the elements

play12:02

necessary for a strong password like it

play12:04

doesn't make sense

play12:06

that's the first thing it doesn't even

play12:07

make sense but it's got a capital it's

play12:09

got a number it's got a percentage right

play12:12

it's got small letters as well so that

play12:13

combination is what actually creates i'm

play12:16

a good password should be about eight

play12:18

characters

play12:19

not the name of your girlfriend or dog

play12:21

or boyfriend or anything no man this is

play12:24

why you get hacked

play12:25

so a few rules to follow at least eight

play12:27

characters as i mentioned uppercase

play12:30

lowercase numbers special characters you

play12:32

know all that type of thing don't use

play12:34

things like asdf 1234 your birthday oh

play12:38

no please yeah you are going to get act

play12:43

then the ethical use of

play12:45

networks um

play12:46

the proper way to use it a way that

play12:49

doesn't infringe on anyone else a way

play12:50

that doesn't hurt anyone else

play12:53

and this is where we have things called

play12:54

acceptable use policies your aups even

play12:57

notice when you go to mcdonald's or kfc

play12:59

and you want to connect to their wi-fi

play13:01

that they give you a certain amount of

play13:03

data for a certain period of time that's

play13:05

the acceptable use policy when you go to

play13:08

baywest and you connect or shopping

play13:10

center you connect they give you they

play13:12

don't give you unlimited data they give

play13:13

you a certain amount of data a certain

play13:15

amount of speed

play13:16

and a certain amount of time so that you

play13:18

can use it do what you need to and then

play13:20

get off

play13:21

okay

play13:22

so

play13:24

it will say you know what the user can

play13:26

do what they permitted to do and not to

play13:29

basic netiquette rules

play13:31

and it basically serves as the contract

play13:33

between the

play13:35

provider and you as the consumer

play13:39

okay so again you can go and read

play13:40

through that

play13:41

you know what should be in there

play13:43

again you don't have to know every

play13:45

single detail but you should know at

play13:47

least two or three of those

play13:49

uh then the next one was the browsing

play13:51

experience the the usability of websites

play13:54

now in grade 11 we would have started

play13:56

with html so this plays into that

play14:00

so i'm not going to spend too much time

play14:02

on that i'm just going to breeze through

play14:03

this

play14:04

you know your website should have proper

play14:07

navigation

play14:08

shouldn't be any broken links or things

play14:10

like that

play14:12

you want to use proper fonts and the

play14:14

same fonts all the way through so that

play14:16

there's consistency i mean look at this

play14:18

site it's got good fonts you know

play14:20

keeping it to a reasonable size you've

play14:22

got your menu on the side for navigation

play14:25

so all of that looks good you can see

play14:26

when they go to the next page still the

play14:28

same headings still the same menu items

play14:30

on the side the text is still more or

play14:32

less the same size

play14:34

and type so it it you know we you just

play14:37

trying to keep that consistency going

play14:39

there also your layout should be well

play14:42

designed as you saw with the others your

play14:45

typography please don't use multiple

play14:47

fonts on one website you want to make

play14:50

sure that it's easy to read not huge

play14:53

fonts

play14:54

or something too small that you're going

play14:55

to need a magnifying glass please kind

play14:58

of you know just

play15:01

think

play15:02

just think before you do this think of

play15:04

your favorite website

play15:06

even think of you know facebook and

play15:08

things like that

play15:10

you see how everything has been

play15:11

structured so it's easy to read and easy

play15:13

to go through everything

play15:15

that's how your web page should be

play15:17

okay some other factors affecting

play15:19

browsing obviously privacy you don't

play15:21

just click on everything all right

play15:24

there's things like spyway

play15:26

which is

play15:28

big big business because people want to

play15:30

know what you are looking at and what

play15:32

your friends are looking at so they can

play15:34

target you with certain adverts hoping

play15:36

that you would then buy those products

play15:38

so just know what spyware is as well

play15:42

your profile your online profile is

play15:44

based on which programs you use how

play15:46

often you use them the websites you go

play15:48

to those cookies by the way when you go

play15:50

to a website and they say accept all

play15:52

cookies and you click on them yeah

play15:55

you know it's getting your your browsing

play15:57

data okay

play15:59

just say

play16:01

just say

play16:02

adware oh this this is you know

play16:04

irritating like like really irritating

play16:07

so adway is software that just downloads

play16:09

and it bombards you with ads you just

play16:12

connect to the internet it's ad ad and

play16:14

ahead and

play16:16

so be careful of the free program sorry

play16:18

that are out there

play16:20

um and uh yeah this type of software can

play16:23

use up a lot of data so you want to have

play16:25

an antivirus software to make sure that

play16:27

you are okay

play16:28

and the last one was finding information

play16:31

again tying into those of you who are

play16:33

doing the pet in grade 11 we go from

play16:36

data to information to knowledge

play16:39

data that needs to be processed

play16:41

um

play16:42

data needs not that needs to be

play16:45

data needs to be processed to turn it

play16:48

into information that makes sense

play16:51

so we know this we have we've covered

play16:52

this in grade 10 already

play16:54

knowledge now turns inside or into

play16:56

insight when we extend this information

play16:59

by picking up patterns and gaining

play17:01

insight for example

play17:02

a shopping center allows you

play17:05

to connect to the wi-fi you know why so

play17:07

they can pick up the trend of where

play17:09

people are going to first which shops

play17:11

are more popular what's the sort of

play17:13

route people take within the shops and

play17:15

haven't you seen in

play17:17

shopping centers that they sometimes

play17:18

chop and change where the location of

play17:20

certain shops are or where the food

play17:23

court is and things like that

play17:26

they're using you

play17:28

but

play17:29

that's what they do so that they can

play17:31

work out what the best layout is

play17:34

for you

play17:35

why so that you can spend money okay

play17:38

that's the ultimate goal of a shopping

play17:40

center they want to make money

play17:41

so here's our problem solving cycle we

play17:43

determine a strategy

play17:45

sorry we have a task definition then we

play17:47

determine the strategy we implement it

play17:49

and then we reflect

play17:52

so they talk a bit about questions the

play17:53

role of questions um i think a great

play17:55

time we spoke about the open and closed

play17:58

question as well

play17:59

we know we can

play18:01

you know these days we have an unlimited

play18:03

supply of

play18:05

resource material when i was growing up

play18:07

i remember in primary school having to

play18:09

do

play18:12

an assignment on world war ii and i had

play18:15

to go

play18:16

get this to the library i know some of

play18:18

you don't go there

play18:19

but i had to go to the library to go and

play18:21

find books then you know actually open

play18:24

them and read them in order to extract

play18:26

the information make photocopies and

play18:28

things like that and then reword it uh

play18:31

and if i was quoting you would quote

play18:32

with appropriate sources you know

play18:34

appropriate references

play18:36

um and that's how i'd create my

play18:37

assignment not this copy and paste from

play18:40

google but we've got so much

play18:42

more resources these days

play18:44

then some of the data processing

play18:46

techniques you know we use word we use

play18:48

excel we use graphs you know all these

play18:50

different things it's just showing you

play18:53

what we can actually do

play18:56

effective reporting they mention as well

play18:59

where they talk about the report the

play19:01

introduction you should have a main body

play19:02

and a conclusion you want to look at

play19:04

things like copyright intellectual

play19:06

property correct referencing and

play19:08

bibliography this is now when you're

play19:10

putting everything together to present

play19:12

this report

play19:14

or assignment these are things we should

play19:16

be looking at an electronic presentation

play19:19

provides a useful quick overview and

play19:21

summary of the report they're mentioning

play19:23

this because in grade 11

play19:25

for those who in the department of

play19:26

education pet you will be doing this

play19:28

okay so

play19:30

please bear that in mind

play19:32

they mentioned the information

play19:33

management cycle again you can go

play19:35

through this and really ask too many

play19:37

questions on that

play19:39

um again this is this is path related

play19:41

the task definition what a task

play19:42

definition is they give us a few

play19:44

examples

play19:46

um

play19:48

yeah

play19:49

really that's basically it we by now we

play19:52

know what the task definition is the

play19:54

types of questions the levels of

play19:56

questions as well again this is

play19:58

very specific to the path that

play20:01

all of you are doing

play20:03

okay so i'm just going to breeze through

play20:05

that

play20:07

these are just

play20:08

when you busy with your questionnaire

play20:10

when you're trying to ask questions

play20:12

remember that that table that you would

play20:13

be creating where you are asking

play20:15

questions to guide your research those

play20:18

three tables that you're supposed to

play20:19

have

play20:20

okay this is what would then help you

play20:22

you could conduct a survey as well

play20:24

because remember with your pet what's

play20:25

going to happen is you're going to

play20:26

conduct a questionnaire survey and

play20:28

convert that into a spreadsheet which

play20:30

you are going to then draw

play20:33

information

play20:34

from

play20:35

so there are different ways to do

play20:36

surveys very important because they have

play20:39

asked in the in the question papers

play20:40

already the difference between a

play20:42

questionnaire and a survey

play20:44

and why you would choose one over the

play20:46

other

play20:46

okay then you have your types of surveys

play20:50

they just mentioned a few and give us

play20:52

some details

play20:54

that's obviously an electronic survey

play20:56

um setting effective survey questions so

play20:59

these could be

play21:00

you know mentioned as tips when

play21:03

conducting your survey or when putting

play21:05

survey questions together what should

play21:07

you be looking at

play21:08

okay uh yeah that's all fine the

play21:12

effective layout how is your survey been

play21:14

laid out again guys you can just go

play21:16

through this

play21:17

i'm checking the quality of the

play21:18

information

play21:22

you know

play21:23

you know they don't ask too many

play21:24

questions on this but again

play21:27

just go through it um you should have

play21:29

covered this as well

play21:31

and again this is based this is based on

play21:36

what we've been doing okay it's based

play21:39

off the bet

play21:40

and yeah

play21:41

i think that is about it sorry that i'm

play21:44

throwing that up now

play21:45

um let me just

play21:49

okay so

play21:51

that basically brings us to the end of

play21:53

everything that was covered in term two

play21:57

so guys if you have any other questions

play21:59

let me know in the comments i will be

play22:01

doing a prac on this as well

play22:03

so that you can see the practice modules

play22:05

that we've covered for the term but this

play22:07

is your theory for term two

play22:16

you

Rate This

5.0 / 5 (0 votes)

Ähnliche Tags
Computer ScienceMemory ManagementStorage SolutionsNetworking BasicsGrade 11Educational ContentTech TheoryData ProcessingIT FundamentalsOnline StorageCloud Computing
Benötigen Sie eine Zusammenfassung auf Englisch?