IGCSE, GCSE ICT Revision
IGCSE, GCSE ICT revision blog. It contains worksheets, quizzes, interactive quizzes, crosswords, puzzles, mind maps, posters for teachers and students
Saturday 18 June 2011
ICT worksheets on Input Devices
What are Input devices?
An input device is any peripheral (piece of computer hardware equipment) used to provide data and control signals to an information processing system (such as a computer).
Here you can see a keyboard, which is a type of input device.
Wanna know more about INPUT DEVICES? Then follow the link given below.
For more revision notes on GCSE, IGCSE ICT please visit www.dineshbakshi.com
New worksheets on Input devices have been added Click here to download them.
(Please note: you need to register with dineshbakshi.com to download these worksheets. Registration is free!!)
Thursday 29 October 2009
Storage devices and media
What are Storage devices?
Storage Devices are the data storage devices that are used in the computers to store the data.
The computer has many types of data storage devices. Some of them can be classified as the removable data Storage Devices and the others as the non removable data Storage Devices.
The memory is of two types; one is the primary memory and the other one is the secondary memory.
The memory is of two types; one is the primary memory and the other one is the secondary memory.
The primary memory is the volatile memory and the secondary memory is the non volatile memory. The volatile memory is the kind of the memory that is erasable and the non volatile memory is the one where in the contents cannot be erased. Basically when we talk about the data storage devices it is generally assumed to be the secondary memory.
The secondary memory is used to store the data permanently in the computer. The secondary storage devices are usually as follows: hard disk drives – this is the most common type of storage device that is used in almost all the computer systems. The other ones include the floppy disk drives, the CD ROM, and the DVD ROM. The flash memory, the USB data card etc.
Find out more ... Check out ICT section of http://www.dineshbakshi.com/
Find out more ... Check out ICT section of http://www.dineshbakshi.com/
Labels:
GCSE ICT,
ict resources,
IGCSE ICT,
revision,
storage devices
Wednesday 21 October 2009
What is Cyber Crime
It is a criminal activity committed on the internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money".
Cybercrimes can be basically divided into 3 major categories:
1. Cybercrimes against persons: Cybercrimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail.
2. Cybercrimes against property: These crimes include computer vandalism (destruction of others' property), transmission of harmful programmes.
3. Cybercrimes against government: Cyberterrorism is one distinct kind of crime in this category. The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorise the citizens of a country. This crime manifests itself into terrorism when an individual "cracks" into a government or military maintained website.
Read more revision notes on GCSE, IGCSE, AS/A Level ICT on dineshbakshi.com
Watch this video
Wednesday 9 September 2009
Whole new world of cybercrime
Online theft costs $1 trillion a year, the number of attacks is rising sharply and too many people do not know how to protect themselves.
There are a wide range of threats facing the internet.
To start with is the 'traditional cybercrime': committing fraud or theft by stealing somebody's identity, their credit card details and other data, or tricking them into paying for services or goods that do not exist. The majority of these crimes, one participant said, were not being committed by a youngster sitting in a basement at their computer. Rather, they were executed by very large and very well-organised criminal gangs.
Another threat is the 'flaws' in the set-up of the web itself.
It is organised around the principle of trust, which can have unexpected knock-on effects.
It is organised around the principle of trust, which can have unexpected knock-on effects.
Yet another threat is the overdependence on Web which can lead to 'cyber warfare'.
Two years ago, a political dispute between Russia and Estonia escalated when the small Baltic country came under a sustained denial-of-service attack which disabled the country's banking industry and its utilities like the electricity network. This was repeated last year, when Georgia's web infrastructure was brought down on its knees during its conflict with Russia.
Just give it a thought!! Do we need a new approach to handle cybercrimes?
Monday 31 August 2009
ICTFORKIDS.COM launched
dineshbakshi.com has come up with yet another interesting website. The website name is ictforkids.com. This website is targeting at young kids who want to learn ICT and computers in a fun way. ictforkids.com has tutorials on basic computer, MS Office package like MS Word, MS Excel, MS Access.
There are also simple worksheets and interactive quizzes for kids to revise what they have learned. Teachers will really find 'simple to the point' notes and worksheets for their classes.
Though the website is named 'ictforkids', it can be used by anyone who wants to get acquainted with the world of computers.
Check it out and leave us a comment on how you liked it
ictforkids.com
There are also simple worksheets and interactive quizzes for kids to revise what they have learned. Teachers will really find 'simple to the point' notes and worksheets for their classes.
Though the website is named 'ictforkids', it can be used by anyone who wants to get acquainted with the world of computers.
Check it out and leave us a comment on how you liked it
ictforkids.com
Friday 21 August 2009
Pirates look forward to business
Check out this video on how Piracy website are looking for new ways of making this business work 'legally'.
Following several high-profile court cases, more and more previously illegal file-sharing services are trying to reinvent themselves as legitimate businesses.
Gary Fung, Isohunt's founder, hopes indexing sites can work with content owners
Following several high-profile court cases, more and more previously illegal file-sharing services are trying to reinvent themselves as legitimate businesses.
Gary Fung, Isohunt's founder, hopes indexing sites can work with content owners
Friday 12 June 2009
Application of ICT in Libraries
Computers are used in libraries all over the world to provide access to a range of electronic information resources and to manage materials (books, journals, videos, and other media) held in particular collections.
Now, the Libraries not only offers access to printed materials via their reading rooms but also makes available a wide range of electronic information resources. Many libraries digitize material in their collections so that anyone in the world who has access to the Internet can explore the wealth of these collections
Read more Click here goto IGCSE/GCSE ICT revision note
Now, the Libraries not only offers access to printed materials via their reading rooms but also makes available a wide range of electronic information resources. Many libraries digitize material in their collections so that anyone in the world who has access to the Internet can explore the wealth of these collections
Read more Click here goto IGCSE/GCSE ICT revision note
Labels:
application of ICT,
libraries,
library,
notes,
revision
Subscribe to:
Posts (Atom)