Thursday, January 28, 2021

IGCSE - ICT - WEEK 7

7th week - Storage Devices and Media - Part 2

 Note: To see next slides just pull the scroll down

Monday, January 25, 2021

IGCSE - ICT - WEEK 6

6th week - Storage Devices and Media - Part 1

Note: To see next slides just pull the scroll down

IGCSE - ICT - WEEK 5

 5th week - Input and Output Devices - Part 2

Note: To see next slides just pull the scroll down

IGCSE - ICT - WEEK 4

4th week - Input and Output Devices - Part 1

Note: To see next slides just pull the scroll down

IGCSE - ICT - WEEK 3

3rd week - Types and Components of Computer Systems - Part 3

Note: To see next slides just pull the scroll down

IGCSE - ICT - WEEK 2

2nd week - Types and Components of Computer Systems - Part 2

Note: To see next slides just pull the scroll down

IGCSE - ICT - WEEK 1

1st week - Types and Components of Computer Systems - Part 1

Note: To see next slides just pull the scroll down

IGCSE - ICT 0417 LESSON NOTES

Hi friends, 

We would like to share IGCSE - ICT 0417 (Information and Communication Technology) lesson notes with you as PDF format. It was prepared according to the IGCSE curriculum directly.

I hope it will be very useful for your teaching and learning. 

Please follow IGCSE - ICT lesson notes from "IGCSE-ICT" label.

27- Did you know?

"Programs" are basic instructions that tell the computer what to do.

 http://byu.danrolsenjr.org/Cpp/HelloWorld.html

26- Did you know?

"Ports" are connection points that we can connect devices to that extend the functionality of our computer in hardware.

Source of the picture: https://www.elprocus.com/what-is-a-computer-port-types-and-their-characteristics/

Sunday, January 24, 2021

25- Did you know?

The "user" interacts with the computer and he/she can do more than that. He/She can operate, maintain, and even program the computer.

24- Did you know?

The "software layer" is how we as humans interact with our computers.

23- Did you know?

The "operating system" allows hardware to communicate with the system.

Source of picture: https://www.google.com/amp/s/www.howtogeek.com/361572/what-is-an-operating-system/amp/

22- Did you know?

The "hardware layer" is made up of the "physical components" of a computer in computer architecture. These are objects you can physically hold in your hand. Laptops, phones, monitors, keyboards, etc.

Source of picture: https://thatone-website2015.weebly.com/

21- Did you know?

"Character encoding" is used to assign our binary values to characters so that we as humans can read them. 

The oldest character encoding standard used this "ASCII". It represents the English alphabet, digits, and punctuation marks. 

20- Did you know?

Let's remember the punctuations how they were called and written. [Part 3]

19- Did you know?

Let's remember the punctuations how they were called and written. [Part 2]

18- Did you know?

Let's remember the punctuations how they were called and written. [Part 1]

17- Did you know?

Computer Architecture:

A computer can be cut into four main layers; hardware, operating system, software, and users.

16- Did you know?

Algorithm

An algorithm is just a series of steps that solves specific problems

Saturday, January 23, 2021

15- Did you know?

OWASP (Open Web Application Security Project) is a nonprpofit foundation that works to improve the security of software

14- Did you know?

"Phishing" is the practice of attempting to obtain sensitive information, like credit card details, or access credentials or make the user download a piece of malware, by making a communication appear to come from a legit institution.

13- Did you know?

Ransomware, is a type of malicious software that restricts the access of users to their systems and files unless a ransom is paid.

12- Did you know?

Malware, meaning malicious software, which by definition is any software written with the intent to cause damage to the host system. 

11- Did you know?

There are two methods to reduce Cyber Security risk which can be applied.

1- Bring your own device (BYOD

2- Company Owned Personally Enabled (COPE

10- Did you know?

Activation, Installation, and Redemption

"Activation" helps verify that your copy of Office is genuine and hasn't been used on more devices than allowed.

"Installation" sets up software on your device.

"Redemption" redeems a code to activate your software.

9- Did you know?

Confidentiality, Integrity and Availability (CIA). Those three are seen as the core elements of information security. 

Security controls are designed and implemented to address those three elements.

8- Did you know?

ISO sets the requirements for an information security management system.

CISO has the overall responsibility for information security in the company, oversees that policies and procedures are in place, coordinates information security activities.

7- Did you know?

- ISO: "International Standards Organization" or "International Organization for Standardization"

- CISO: "Chief Information Security Officer"