Term Two Review Session for Grade 12

May 30, 2024

Term Two Review Session for Grade 12

Overview

  • Topics Covered:
    1. Internet and Wide Area Networks (WAN)
    2. Internet Connections
    3. Internet Services
    4. Dangers of Computer Crime
    5. Protection against Computer Crime

Internet and Wide Area Networks (WAN)

  • Definition of Internet: Must know and be able to define.
  • Wide Area Network (WAN):
    • Network spanning multiple geographical areas.
    • Example required.

Internet Connections

  • ISP (Internet Service Provider):
    • Definition and example needed.
    • Services rendered by ISPs.
  • Criteria for Internet Connections:
    • Scenario-based decisions (e.g., home office, computer lab setup).
    • Wired vs. wireless connections.
    • Factors: data limits, mobility, data needs, upload vs. download speed, bandwidth, shaped vs. unshaped connections, throttling.
  • Wired Connections: ADSL vs. Fiber.
    • Advantages and disadvantages (know at least two).
  • Wireless Connections:
    • Hotspots and routers.
    • Internet access using smartphones and tablets.
  • Internet Technologies: 3G, 4G, 5G
    • Next-gen technologies and their improvements.

Internet Services

  • Real-time Messaging: Known and widely used.
  • VoIP (Voice over Internet Protocol):
    • Examples: Skype, WhatsApp calls, Zoom.
    • Advantages and disadvantages.
  • Video Conferencing:
    • Setup considerations (camera, internet, lighting, hardware, microphone).
    • Advantages, disadvantages, and practical application.
  • Cloud Computing:
    • Working with software online (e.g., Gmail, Google Drive).
    • Advantages and disadvantages.
  • Online Storage:
    • Use from Grade 10 and 11 as a foundation.
    • Examples: Google Drives.
    • Limitations: Suitable for large files, internet connection required.
  • File Sharing and Email:
    • Email attachment limits and necessity for compression software.
    • FTP (File Transfer Protocol).
  • Grid Computing: Definition and example.

Dangers of Computer Crime

  • Social Engineering
  • Malware: Definitions and techniques.
    • Phishing vs. Pharming.
    • Clickjacking: Redirects to unintended sites.
    • Spoofing: Forgery of email headers.
    • Spyware: Background software monitoring activities.
    • Keyloggers: Recording keystrokes.
    • Computer virus and general malware.
    • Computer worms: Network propagation.
    • Trojans and Ransomware.
    • Adware, Bots.
  • Categories of Computer Crime:
    • Cyber stalking, spam, cyber bullying, internet attacks (cyber terrorism), bandwidth theft, identity theft, processing time theft (non-school related computer use), data and intellectual property theft, and money and copyrighted material theft.

Protection against Computer Crime

  • Antivirus Software: Must be updated regularly.
  • Precautionary Measures:
    • Check for secure icons and HTTPS protocol.
    • Good password policies.
    • Stay informed about tips and reports.
    • Avoid giving out personal information online.
    • Avoid clicking unknown links or attachments.
    • Basic online safety habits.
  • Access vs. Privacy: School policies on password use to prevent data/work theft.
  • Paranoid ABC:
    • Assume nothing.
    • Believe no one.
    • Check everything.

Next Steps

  • Upcoming practical video covering theory and practical questions.
  • Additional content based on student needs.