Module 1.1
The computer:
‘powerful’ in computer terms describes a combination of factors such as:
The speed and performance of the CPU(s)
The amount and type of storage it has
The size of the memory, more memory allows more programs and data to be
processed at a time.
The type of graphic card installation.
Portable computers:
Laptops and notebooks:
Use smaller parts for lower power consumption
Run on battery power
Power setting used to manage the phone
Tablets:
Ideal for quick, small-scale computing
Operating system designed for mobile devices
Longer battery life than e.g.- laptops
Built in WIFI and cellular connectivity
Phablets:
Smartphones with the screen size bigger than 5”
Performs functions of tablet and can make phone calls.
Smartphones:
Combine features and technologies of many separate devices- convergence
Touch screen for typed input
Mobile operating system
Built in Wifi and cellular connectivity
Server: powerful computer that provides services and resources to clients.
Client: computer that uses services and resources from servers but is not as powerful as a
server.
Protecting your information:
, Make sure data stored on laptop is backed up
Password protect the laptop and have copies of the backup stored off site
Anti-theft strategies:
Loss of hardware often involves loss of information as well
portable devices are vulnerable and easy to steal
use cable ties to lock down equipment, use motion sensors that can be detected
when a computer is being moved and use lockable cabinets.
Module 1.2
Image capture
Digital cameras:
smartphones, compact cameras, top-end DSLR
images already in digital format
quality depends on sensor size, zoom type, resolution and ISO rating.
Scanners:
input device that converts images into a digital format
quality determined by resolution and color depth
higher dpi and color depth give higher quality but bigger file sizes
OCR software converts scanned images into editable text
Quality of scanned image depends on quality of original
Biometric input
Capturing unique biological features of a person.
Advantages:
Security, it is a lot more secure than a typical password as it is unique to your
features.
It is a lot difficult to hack as it is on a person feature, it cannot be copied or given out.
Input at ATM- automatic teller machine
Dedicated device that gets input from user and other devices
Interact via touch screens, keypads, buttons
Skimmers are used to capture your card details and pin by pretending to be you and
stealing your money.
Input into a POS system: point of sale
Barcodes and RFID tags are very reliable when integrated into a POS system.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller alexisblake. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R89,00. You're not tied to anything after your purchase.