100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary Opsomming van alle IT teorie graad 10 tot 12 R255,00
Add to cart

Summary

Summary Opsomming van alle IT teorie graad 10 tot 12

4 reviews
 30 purchases

Hierdie dokument bevat al die nodige inligting vanaf graad 10 tot 12 NSS vir Inligtingstegnologie. Hierdie opsommings is deur 2 leerders wat keer op keer op die merietelys vir die graad en die vak, IT, beland. Dit is baie volledige en 'n totale vervanging van ander opsommings en die handboek self. ...

[Show more]
Last document update: 3 year ago

Preview 10 out of 43  pages

  • Yes
  • July 27, 2021
  • September 3, 2021
  • 43
  • 2020/2021
  • Summary
book image

Book Title:

Author(s):

  • Edition:
  • ISBN:
  • Edition:
All documents for this subject (1)

4  reviews

review-writer-avatar

By: liezl69 • 5 months ago

review-writer-avatar

By: info5586 • 8 months ago

review-writer-avatar

By: ninette21 • 1 year ago

review-writer-avatar

By: Marnu • 3 year ago

avatar-seller
danielleswanepoel
1

, Daar is baie tyd en moeite in die notas gesit.
Respekteer asseblief die kopiereg wat aan die skrywers van
die notas behoort en moet dit dus nie sonder
toestemming versprei nie.
Hierdie opsommings is op klasnotas en die IT is gr8 graad 10 tot 12
handboeke gebaseer.




2

,INHOUDSOPGAWE
SOFTWARE........................................................................................................................................................................6
OPERATING SYSTEM..........................................................................................................................................................7
DRIVER:..............................................................................................................................................................................8
UTILITY (Nuttige dinge in O/S)...........................................................................................................................................8
BINARY OMSKAKELING......................................................................................................................................................8
Module 1.2 – Rekenaargebruik in die cloud......................................................................................................................9
1. CLOUD COMPUTING..................................................................................................................................................9
Module 1.3 – Rekenaarbestuur.......................................................................................................................................10
1. SEKURITEIT...............................................................................................................................................................10
Kubermisdaad..............................................................................................................................................................12
DATAVERLIES...............................................................................................................................................................15
GOEIE WAGWOORDE:.................................................................................................................................................16
2. TYDBESPARING........................................................................................................................................................16
2. DEEL VAN LEERS EN LEERGIDSE...............................................................................................................................19
TORRENTS.................................................................................................................................................................... 20
3. REMOTE CONNECTIONS..........................................................................................................................................21
VPN: Virtual Private Network......................................................................................................................................21
MANIER OM NETWERKE OP TE STEL...........................................................................................................................21
TOPOLOGIE (Lay of the land).......................................................................................................................................22
FAT and THIN CLIENTS.................................................................................................................................................22
Module 2.2 - Sekuriteitskonsepte....................................................................................................................................23
1. ENCRYPTION............................................................................................................................................................23
2. SECURE SOCKET LAYER (SSL)....................................................................................................................................23
DIGITAL SIGNIATURE...................................................................................................................................................23
DIGITAL CERTIFICATE...................................................................................................................................................23
Module 2.3 – die veranderende web..............................................................................................................................24
1. SEARCHES................................................................................................................................................................ 24
2. MOBILE APPS...........................................................................................................................................................24
DIE INTERNET.................................................................................................................................................................. 24
WAT JY BENODIG OM AAN INTERNET TE KOPPEL:......................................................................................................24
MODEM:...................................................................................................................................................................... 25
HTML:.......................................................................................................................................................................... 25
IP-adres (Internet Protocol).........................................................................................................................................26
ELEKTRONIESE KOMMUNIKASIE..................................................................................................................................26
VERSKILLENDE TIPE SITES............................................................................................................................................26
3

, KRITERIA OM WEBSITES TE EVALUEER........................................................................................................................26
WEBPAGE.................................................................................................................................................................... 27
COPYRIGHT en intellektuele eiendom.............................................................................................................................28
TIPES LICENCING..........................................................................................................................................................28
PROGRAMMING:.............................................................................................................................................................28
HIGH LEVEL.................................................................................................................................................................. 28
LOW LEVEL................................................................................................................................................................... 28
REKENAARS..................................................................................................................................................................... 29
Tipe programme..........................................................................................................................................................29
VOORDELE VAN PC’S IN PRAKTYKE..............................................................................................................................29
DIGITALE DEVIDE.........................................................................................................................................................29
ERGONOMICS..............................................................................................................................................................29
PROJEKBEPLANNING.......................................................................................................................................................29
Internetdienstegnologie..................................................................................................................................................30
1. Javascript................................................................................................................................................................. 30
2. XML - HTML.............................................................................................................................................................30
3. Stored procedures...................................................................................................................................................30
4. ServerSide Scripts....................................................................................................................................................30
3.3 Kritiese rekenaarverwerking......................................................................................................................................30
Distributed computing (met cloud).............................................................................................................................31
Fuzzy Logic................................................................................................................................................................... 31
Databasis en -konsepte...................................................................................................................................................32
- SQL-injection (val onder security).............................................................................................................................32
DATABASISSE................................................................................................................................................................... 32
Delete anomaly...........................................................................................................................................................32
Update anomaly.........................................................................................................................................................32
Data integriteit................................................................................................................................................................ 32
1. fisiese integriteit.....................................................................................................................................................32
2. logiese integriteit....................................................................................................................................................32
Transaksies in DB.............................................................................................................................................................32
Sosiale implikasies...........................................................................................................................................................33
Hou by by tegnologie...................................................................................................................................................33
Impak van sosiale netwerke op die samelewing..........................................................................................................34
Sosiale manupilasie.....................................................................................................................................................34
Sosiale netwerke en kultuur........................................................................................................................................34
Politiek en natuurbewaring.........................................................................................................................................34

4

, Wiki............................................................................................................................................................................. 34
Log............................................................................................................................................................................... 34
HARDWARE......................................................................................................................................................................... 35
MOTHERBOARD...............................................................................................................................................................36
Modulêre ontwerp:.........................................................................................................................................................36
Sockets........................................................................................................................................................................ 36
Port.............................................................................................................................................................................. 36
Expand slots.................................................................................................................................................................36
KOMPONENTE................................................................................................................................................................. 37
1. SVE / CPU.................................................................................................................................................................37
2. ROM......................................................................................................................................................................... 37
BOOT........................................................................................................................................................................... 37
RAM............................................................................................................................................................................. 38
GRAFIKAKAARTE..........................................................................................................................................................38
BUS.............................................................................................................................................................................. 38
STELSELKLOK................................................................................................................................................................38
MULTITASKING (NB)....................................................................................................................................................39
MULTITHREADING.......................................................................................................................................................39
MULTIPROCESSING......................................................................................................................................................39
Virtual Memory...........................................................................................................................................................40
Virtual Masjien (VM)...................................................................................................................................................40
Virtual reality...............................................................................................................................................................40
Augmented reality.......................................................................................................................................................40
TEGNOLOGIE/ TOESTELLE................................................................................................................................................41
MOBIELE TEGNOLOGIE................................................................................................................................................41
Voordele van MOBILITEIT............................................................................................................................................41
Nadele (Inperkende faktore) van mobiele toestelle....................................................................................................41
REKENAARS..................................................................................................................................................................... 42
APPARATUUR AANBEVELINGS.........................................................................................................................................42
RAID 1 – Mirroring.......................................................................................................................................................43
RAID 2 – Striping..........................................................................................................................................................43




5

,SOFTWARE




6

,OPERATING SYSTEM
 kommunikeer tussen jou en masjien (binary en engels) d.m.v. knoppies/mikrogolwe
 beheer aktiwiteite binne masjien

Desktop O/S:

Windows* 4-10 GB R1000 – R2000 Run op enige PC behalwe Apple
O/S X (Operating System 10) 4-10 GB R300 – R700 Run net op Apple
Linux (baie weergawes) Enige size Verniet Run op enigiets

Linux: OSS (Open Source Software)
Mobile O/S:

Android (Linux)* Amper 1 GB Verniet Run op enigiets
IOS (Apple) Amper 1 GB
Windows Mobile Min 700 MB
(Blacberry het bestaan) Min 700 MB


GIU: Graphical User Interface

TUI: Text User Interface (Oorspronklik MS DOS)



Wat doen ‘n OPERATATING SYSTEM?

 Voorsien ‘n interface
 Bestuur prosesse/take  watter take wanner + deur wat verrig word
 Bestuur RAM besluit hoeveel memory elke program kry .: Alles
 Bestuur storage  besluit waar alles gesave word
 Bestuur input/output

Voorbeeld van beide input- en output device: Touchscreen



PROCESS:

 ‘n Stel instruksies wat uitgevoer word (deel van programme)

PROGRAM:

 1 of meer processes (wat saamwerk)

THREAD: As 1 breek, breek ander nie
Multithreading
 PROCESSES in dieselfde program wat apart van mekaar, op dieselfde tyd werk
 Bv. Word run spellcheker en kyk terselfdetyd wat jy skryf




7

, Masjien
DRIVER:
 Program (software) wat vertaal tussen jou O/S en Device
 Keyboard (10110)  Driver  Windows (Engels)
Driver
 Kan self drivers insit vir bv. Spesiale muis met baie knoppies


UTILITY (Nuttige dinge in O/S) O/S
 Antivirus
 Backup-utility  sodat jy nie self op ‘n 2de plek hoef te copy nie
 Compression utility (WinZip en winRAR)  nutsprgram wat file kompakteer
Interface



User
BINARY OMSKAKELING
5910  1110112

1 1 1 0 1 1
32 16 8 4 2 1
32 + 16 + 8 + 0 + 2 + 1 = 59



1110112  5910

59/2=29 res 1

29/2=14 res 1

14/2=7 res 0

7/2=3 res 1 111011

3/2=1 res 1

1/2=0 res 1




8

,Module 1.2 – Rekenaargebruik in die cloud
1. CLOUD COMPUTING
 Gewoonlik is dit ‘n service online waarvoor jy betaal om hulpbronne online te gebruik



Internet word altyd as ‘n CLOUD geteken



Tipe CLOUDS:

 Cloud storage
 Backup  compress
 Online media repository  Youtube/Spotify
 Cloud apps  Apps wat nie op jou rekenaar run nie
 SAAS: Software As A Server  Huur program per maand (Adobe)
 PAAS: Platform Software As A Server  Huur platform vir app
 IAAS: Infrastructure Software As A Server  Huur masjien met platform op. Hardware is infrastructure



____
____ STACK
PLATFORM
____
PHP
APP

XML
HTML




2. VIRTUALISATION (sien bl 40)
EMULATOR:

 VM  Virtual Machine
 Om ‘n O/S binne ‘n O/S te kan run


Emmulator op PC
PS Game PS Game
Game dink hy is op Playstation omdat Emmulator hom laat dink hy is. Dan kan jy
PS Games sonder ‘n PS speel


Linux
Twee masjiene wat dink hulle is aparte masjiene (Advanced)
VM VM
Win 10 Win 98


9

, Module 1.3 – Rekenaarbestuur


1. SEKURITEIT
ANTIVIRUS

REKENAARBEVEILIGING

MALWARE: MALICIOUS SOFTWARE  Enige software wat sleg is

VIRUS

 ‘n Stukkie sagteware wat himself copy
 Belemmer die werking van PC
 Stop dit met AntiVirus wat jy moet install
 Antivirus gebruik virus definition (Virus mugshot) – update: kry nuwes online
 Kyk na unusual behavior (bv. Program wat skielik baie RAM soek)
o Nice om viruses te kry waarvan jy nie weet nie, maar dit stop ook soms iets unusual wat JY doen

TROJAN

 ‘n Stukkie sagteware wat iets binne in hom het. ‘n Trojan self is nie gevaarlik nie, dis net ‘n package vir iets soos
viruses
 Kan nie himself aktiveer nie; jy as user moet dit aktiveer deur bv. ‘n button te click  jy word geflous om dit te
click omdat button as iets belangriks gekamofleer is

WORM

ROOTKIT

 ‘n Versameling programme wat ontwerpis om jou PC te infiltreer

RANSOMWARE

 hou sisteem "hostage" (ransom) en moet geld betaal om terug te kry . baie meer algemeen deesdae.
 moeilike situasie - wil jy jou data verloor of baie geld betaal? mag nie eintlik betaal nie
 backup goed!

SPYWARE

 Enige software wat kyk wat jy doen
 Bv. Keylogger  onthou alles wat jy tik en kry dan bv. Passwords daaruit

MALICIOUS MENSLIKE PROBLEME  SOSIALE MANIPULASIE

SPAM

 Ongevraagde, komersiele (prober iets verkoop) emails
SPOOFING

 As iemand jou laat dink hy is erens waar jy nie is nie / jou laat dink hy is iemand wat hy nie is nie
 Ek maak asof ek die skoolhoof is en stuur vir Mnr. Van der Hoven ‘n boodskap

PHISHING

 Die idee dat iemand jou oor electronic media flous om geld of inligting by jou te kry
 Spoofing word dikwels in Phishing gebruik

10

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying this summary from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller danielleswanepoel. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy this summary for R255,00. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

64257 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy summaries for 15 years now

Start selling
R255,00  30x  sold
  • (4)
Add to cart
Added