7th week - Storage Devices and Media - Part 2
Note: To see next slides just pull the scroll down
7th week - Storage Devices and Media - Part 2
Note: To see next slides just pull the scroll down
6th week - Storage Devices and Media - Part 1
5th week - Input and Output Devices - Part 2
Note: To see next slides just pull the scroll down
4th week - Input and Output Devices - Part 1
3rd week - Types and Components of Computer Systems - Part 3
2nd week - Types and Components of Computer Systems - Part 2
Note: To see next slides just pull the scroll down
1st week - Types and Components of Computer Systems - Part 1
Note: To see next slides just pull the scroll down
Hi friends,
We would like to share IGCSE - ICT 0417 (Information and Communication Technology) lesson notes with you as PDF format. It was prepared according to the IGCSE curriculum directly.
I hope it will be very useful for your teaching and learning.
Please follow IGCSE - ICT lesson notes from "IGCSE-ICT" label.
"Ports" are connection points that we can connect devices to that extend the functionality of our computer in hardware.
The "user" interacts with the computer and he/she can do more than that. He/She can operate, maintain, and even program the computer.
The "operating system" allows hardware to communicate with the system.
The "hardware layer" is made up of the "physical components" of a computer in computer architecture. These are objects you can physically hold in your hand. Laptops, phones, monitors, keyboards, etc.
"Character encoding" is used to assign our binary values to characters so that we as humans can read them.
The oldest character encoding standard used this "ASCII". It represents the English alphabet, digits, and punctuation marks.
Computer Architecture:
A computer can be cut into four main layers; hardware, operating system, software, and users.
OWASP (Open Web Application Security Project) is a nonprpofit foundation that works to improve the security of software.
"Phishing" is the practice of attempting to obtain sensitive information, like credit card details, or access credentials or make the user download a piece of malware, by making a communication appear to come from a legit institution.
Ransomware, is a type of malicious software that restricts the access of users to their systems and files unless a ransom is paid.
Malware, meaning malicious software, which by definition is any software written with the intent to cause damage to the host system.
There are two methods to reduce Cyber Security risk which can be applied.
1- Bring your own device (BYOD)
2- Company Owned Personally Enabled (COPE)
Activation, Installation, and Redemption
"Activation" helps verify that your copy of Office is genuine and hasn't been used on more devices than allowed.
"Installation" sets up software on your device.
"Redemption" redeems a code to activate your software.
Confidentiality, Integrity and Availability (CIA). Those three are seen as the core elements of information security.
Security controls are designed and implemented to address those three elements.
ISO sets the requirements for an information security management system.
CISO has the overall responsibility for information security in the company, oversees that policies and procedures are in place, coordinates information security activities.
- ISO: "International Standards Organization" or "International Organization for Standardization"
- CISO: "Chief Information Security Officer"