Lesson 01 A/L ICT · Grade 12 · Free

Basic Concepts of ICT with its Role & Applicability

Build your foundation. Understand what ICT really is, how data becomes information, and how technology shapes every domain of modern life.

Life Cycle of Data

Information is the main source used in the decision making process. Good decisions can only be made with good (correct) information. To generate information, we need data — the primary raw material used to make information required in decision making.

Because data is the key component behind every decision, businesses, organizations, welfare groups, and even governments are constantly trying to collect and maintain it. Data is scattered across many sources, so we need to collect and organize it.

01
Data Creation
The first step — creating and capturing data from the world around us.
02
Management
Validating, storing, protecting, and making data accessible to authorized users.
03
Removal of Obsolete Data
Removing outdated data that has lost its value and is no longer useful.

Step 1 — Data Creation

There are 3 ways organisations perform data creation:

Step 2 — Management

Data Management includes administrative tasks such as validating data, storing data, and protecting data. Keeping data securely and making it accessible for authorized users are key tasks here.

📌 Real World Example

A retail company manages data by using a secure database to store customer purchases, validating the information to ensure accuracy, and controlling who can access it to protect customer privacy.

Step 3 — Removal of Obsolete Data

The value of data depends on the time period it is used. The period of data is decided according to the requirement of the relevant institution. Data that is not necessary for the present (outdated) is called obsolete data. These data need to be removed from information systems without further maintenance.

📌 Quick Note — Data Life Cycle Summary

The data life cycle describes the journey of data from its creation to its end. It begins with Data Creation, followed by Data Management (validating, storing, protecting), and concludes with the Removal of Obsolete Data, where old, unnecessary information is securely deleted to save resources and reduce liabilities.

Data vs. Information

What is Data?

Ex: Letters, Numbers, Pictures, Sounds, Shapes

📌 Quick Note

Data are a collection of facts, figures, or symbols that can be processed to create meaningful information. The word "data" comes from the Latin word datum, meaning "something given." In its raw form, data lacks context. However, once organized and analyzed, it becomes a crucial tool for making informed decisions.

Categorization of Data

Data can be categorized in several ways. The most common classification is by its nature. There are 2 types of data:

1. Quantitative Data
  • About quantities — expressed in numbers
  • Ideal for mathematical analysis
  • Can be subjected to arithmetic: addition, subtraction, multiplication, division
  • Can be sorted in numerical order
  • Can be displayed scientifically

Ex: mass, length, time, height

2. Qualitative Data
  • About qualities — descriptive, expressed in words or labels
  • Provides deeper understanding of a topic
  • Subjective and observational
  • Used to explore concepts and experiences
  • Cannot be computed mathematically

Ex: images, symbols, documents

📌 Quick Note

Most of the time we use quantitative data for data processing tasks.

Characteristics of Data

Definition of Information

Information is data that has been processed by a computer into a form that is useful and meaningful to humans or systems. Information is obtained after processing data and can be used for decision making.

Ex: A student database stores raw data (names, marks), but when it shows "Top 5 students by average score," that is information.

DataInformation
Raw facts and figuresProcessed or organized data
Has no context or meaning on its ownHas meaning in context
Can be numbers, text, images, sounds, etc.Useful for decision making
Stored in databases, files, or memoryPresented in reports, charts, summaries
Input for processingOutput of processing

How to Convert Data into Information

The process of converting data into information is called processing of data.

Step 1 Data
Step 2 Process
Step 3 Information

Data Processing Methods

1. Manual Data Processing

Data processed without using machines or computers. All tasks are done by humans using tools like pen, paper, files, or calculators. It is the oldest method of data processing.

✓ Advantages
  • Low cost — no computers or expensive software needed
  • Simple to use — just pen, paper, or calculators
  • No electricity required
  • Good for small amounts of data
  • Human judgment can be applied
✗ Disadvantages
  • Time-consuming — slow for calculations
  • Prone to errors — mistakes are common
  • Difficult to update or correct data
  • Hard to store and retrieve
  • Limited security — paper files can be lost or damaged
  • Not efficient for large volumes of data

2. Mechanical Data Processing

Data is processed using mechanical devices or machines, but without electronic computers. Faster and more accurate than manual processing, but slower than electronic processing. Relies on mechanical tools like typewriters, calculators, or punch-card machines.

3. Electronic Data Processing (EDP)

Data is processed using electronic devices such as computers. Uses software and hardware to handle large volumes of data quickly and accurately. This is the most common and widely used method today.

💡 In Short

Electronic Data Processing = Computers + Software → Fast, Accurate, Efficient, and Reliable.

✓ Advantages of EDP
  • Speed — processes large volumes within seconds
  • Accuracy — reduces human errors
  • Storage — huge amounts stored in small space
  • Easy to update — data can be modified quickly
  • Automation — tasks can run automatically
  • Data security — passwords, encryption, backups
  • Search and retrieval — instant using queries
  • Cost-effective in the long run
  • Scalability — handles both small and large data
  • Decision-making support — reports, graphs, analysis
📌 Examples
  • ATM transactions in banks
  • Online shopping systems (Amazon, eBay)
  • School/university databases for student records
  • Payroll systems that calculate salaries automatically
  • Hospital patient management systems

Characteristics of Information

Good information is that which is useful and which has value. Good information is relevant for its purpose, sufficiently accurate, complete enough for the problem, reliable, and targeted to the right person.

Availability
Information should be easy to get when needed. Authorized people should access it anytime.
Accuracy
Information must be correct, exact, and free from errors. Wrong information causes wrong decisions.
Reliability
Comes from a trusted source. Consistent and not changed unnecessarily.
Relevance
Related to the purpose for which it is needed. Irrelevant information wastes time.
Completeness
Must be full and contain all necessary parts. Incomplete information leads to wrong decisions.
Level of Detail
Should have the right amount of detail. Too much is confusing; too little is unclear.
Presentation
Should be presented in a clear, neat, easy-to-understand way — tables, charts, graphs.
Timeliness
Should be available at the right time. If it comes too late, it may become useless.

The Golden Rule of Information

🏆 Key Idea

"Information has value only if it is available at the right time."

The Golden Rule of Information (Value vs Time) states that the usefulness or value of information is highest when it is received at the right time. As time passes, the value of the same information decreases because it may no longer support effective decision-making.

📌 Example

If a student gets an exam timetable one month before the exam → very valuable. If given one day before → less valuable. If given after the exam is finished → completely worthless.

Big Data & The 5Vs

Big Data means extremely large sets of data that are too big or too complex for normal computers or traditional software to handle. It includes data from many sources like social media, online shopping, sensors, mobile apps, banking systems, and more. Big Data is not just about size, but also about how fast it grows and how different the types of data are.

V
Volume
The huge size of data produced every day. Traditional storage systems cannot handle it.
V
Velocity
The speed at which data is generated, transferred, and processed — often in real time.
V
Variety
Data comes in different types: structured (tables), semi-structured (JSON), unstructured (images, video).
V
Veracity
Accuracy, quality, and trustworthiness of data. Data must be cleaned and verified before analysis.
V
Value
The usefulness of data. Large amounts of data have no meaning unless they provide insights.

Traditional Data vs Big Data

Traditional DataBig Data
Structured and organizedStructured, semi-structured, and unstructured
Manageable in volumeExtremely large, growing rapidly
Stored in relational databasesRequires Hadoop, cloud storage, etc.
Low velocity — slower generationHigh velocity — real-time generation
Ex: Sales records, employee infoEx: YouTube uploads, social media, sensors

Applicability of Information in Daily Life

Information performs an important task in the activities of daily life. It can be discussed under four categories:

Availability of Technologies for Information Retrieval & Sharing

The ability to inquire about information stored in a certain media is called retrieval. There are traditional and modern methods used to communicate information.

Traditional Methods
  • Usage of sound for communication
  • Ola Leaves
  • Letters
  • Newspapers and Magazines

High cost and consuming long time periods.

Modern Methods
  • Email
  • Short Message Systems (WhatsApp)
  • Usage of websites

Very little time and very low cost.

Development of Computer Networks, the Internet & WWW

The Internet is the best thing that has happened to the world when it comes to ICT. The fastest method of communication with the world public is the internet — we can call it an "Information Super Highway."

The Internet is a massive, worldwide network of computers and other devices all connected to each other. It allows people and devices to share information and communicate from anywhere in the world.

The World Wide Web (WWW) is a system of interconnected documents and resources accessed via the Internet — connecting all websites together. It's the main service of the Internet.

🌍 Key Concept

The world has become a "Global Village" because of the internet — anyone, anywhere, can communicate and share information instantly.

Mobile Communication, Mobile Computing & Cloud Computing

Mobile Communication

A form of wireless communication that allows the transmission of data, voice, and video between devices without physical cables. Relies on a network of towers or satellites transmitting radio waves to connect devices like smartphones, tablets, and laptops.

Mobile Computing

The use of portable computing devices to access and process information while on the move. Combines: mobile communication (wireless networks), mobile hardware (devices), and mobile software (applications and OS).

Cloud Computing

The delivery of computing services — including servers, storage, databases, networking, and software — over the Internet. Instead of owning physical hardware, you rent these resources on an as-needed basis from a cloud provider.

IaaS
Infrastructure as a Service — Virtual delivery of computing resources (servers, storage, networking). Ex: AWS, Microsoft Azure
PaaS
Platform as a Service — Complete environment for developing, testing, and running applications. Ex: Google App Engine, Heroku
SaaS
Software as a Service — Fully functional software over the internet. Ex: Google Docs, Gmail, Office 365
✓ Advantages
  • Low cost to use software and store data
  • Access from anywhere in the world
  • Fewer maintenance problems
  • Always use the latest software (auto-updates)
  • Unlimited storage capacity
  • High security for data
  • Mobile devices save battery by processing in the cloud
✗ Disadvantages
  • Requires continuous internet connectivity
  • Processing speed decreases under low internet connections

Abstract Model of Information Creation

Input Enter Data & Instructions
Process Prepare Data Per Commands
Output Processed Information

Basic Components of a Computer System

Devices and the software installed in it are called a computer system. These components can be divided into three sections:

1
Hardware
Physical, tangible components you can see and touch.
2
Software
Instructions and programs that tell the computer what to do.
3
Liveware
The human element — people who operate and manage the system.

Hardware

All devices connected to a computer that can be seen and touched physically (visible and tangible) are called hardware.

External Hardware (Peripherals)

Input Devices
  • Keyboard — For typing text and commands
  • Mouse — Pointing and navigating
  • Microphone — Captures sound
  • Webcam — Captures video and images
  • Scanner — Converts physical documents to digital
  • Joystick — Controls movement in games
  • Touchscreen — Interact with display using fingers
  • Barcode Reader — Scans barcodes to retrieve product info
  • Digital Camera — Takes pictures and videos
  • Graphics Tablet — Drawing with a stylus
Output Devices
  • Monitor — Displays visual output (Soft Copy)
  • Printer — Creates physical copies (Hard Copy)
  • Speaker — Generates sound
  • Headphones — Audio output for individual listening
  • Projector — Projects images onto a large surface
  • Plotter — Large-format graphic printing (blueprints)
  • Braille Embosser — Prints text for visually impaired

Internal Hardware

Software

Software is a collection of instructions, data, or programs that tell a computer what to do and how to operate. It's the intangible part of a computer. Think of hardware as the body and software as the brain.

1. System Software

Manages and controls the computer's hardware and provides a platform for application software to run. Has 4 sub-types:

Compiler
Translates the entire program into machine language at once before execution.
Interpreter
Translates and executes source code line by line without creating an executable file.
Assembler
Converts assembly language (low-level) into machine code.

2. Application Software

Designed to perform specific tasks for the user. Examples: Productivity Software (MS Office), Multimedia Software (Adobe Photoshop), Web Browsers (Chrome, Firefox).

Two main types:

Bespoke Software

Developed and tailored specifically for a particular organization. Not available to the general public.

Advantages

  • Perfect Fit
  • Scalability
  • No Unnecessary Features

Disadvantages

  • High Cost
  • Long Development Time
  • Risk
Off-the-Shelf Software

Ready-made product designed for a wide range of users. Mass-produced and sold to the general public.

Advantages

  • Low Cost
  • Immediate Availability
  • Regular Updates

Disadvantages

  • Limited Customization
  • Unnecessary Features
  • Lack of Control

Firmware

A type of software providing low-level control for a device's hardware. Permanently embedded into non-volatile memory (ROM or flash memory). Not erased when the device is powered off. Examples: BIOS, UEFI.

Software Classification by Legal Condition

Proprietary Software (Licensed)

Owned by a company. Source code is private. Must purchase a license to use it.

Ex: Microsoft Windows, Adobe Photoshop, macOS

Open Source Software

Source code is publicly available for viewing, use, modification, and distribution.

Ex: Linux, Mozilla Firefox, LibreOffice, GIMP

📌 Shareware

A type of proprietary software distributed for free on a "try before you buy" basis.

Steps of Data Processing

1
Data Gathering
Collecting necessary data and entering it into the computer.
2
Data Validation
Methods and techniques to ensure data is accurately entered.
3
Data Processing
Converting entered data into information according to requirements.
4
Output
Obtaining the output after converting data into information.
5
Storage
Storing data and information for future use.

Data Gathering Methods

Data is scattered and we have to collect and gather it to make information. There are two types of data gathering methods:

1. Manual Data Gathering

Collecting and recording data without automated systems. Relies entirely on human effort.

2. Semi-Automated and Automated Methods

Automated tools handle bulk data gathering. When the system encounters an anomaly, it flags data for a human to review.

Automated Data Gathering Tools

Data Validation & Verification

Data Validation

The process of ensuring that data is correct, clean, and useful before it is stored or processed. A proactive step that checks for accuracy and integrity at the point of entry.

Data Verification

The process of checking that data has been entered accurately by comparing it with the original source document. Ensures the data captured is a true and correct copy.

Modes of Data Input

Direct Data Input
Data entered directly from source without manual transcription. Fast and error-free. Ex: Barcode readers, MICR, OMR, RFID.
Remote Data Input
Data entered from a geographically distant location, transmitted over a network. Ex: ATM transactions.
Online Data Entry
Data entered while directly connected to the central computer. Real-time feedback. Ex: Online registration forms.
Offline Data Entry
Data entered without continuous connection. Stored locally, transmitted later in batches. Ex: Field surveys.

Batch Processing vs Real-Time Processing

Batch ProcessingReal-Time Processing
Data collected over time, processed all at onceData processed as soon as it is received
Significant time delay between entry and resultsMinimal to no delay — immediate response
Highly efficient for large volumesEssential for tasks requiring instant feedback
Cost-effective, lower resourcesMore expensive, resource-intensive
Ex: Payroll systems, utility billingEx: ATM transactions, airline booking

Data Storage Methods

Applications of ICT in Different Domains

📚
Education
Video clips, e-learning platforms, digital tools, remote degree programs.
🏥
Healthcare
EHR, Telemedicine, medical imaging, patient monitoring, hospital management.
🌾
Agriculture
Precision farming, farm management software, supply chain, market info systems.
💼
Business & Finance
ERP systems, online banking, financial management, high-frequency trading.
⚙️
Engineering
Machinery production, CAD designs, planning and simulations.
🛒
Trade
Online markets (Amazon), e-commerce, saving time and money.
🔒
Security
CCTV, access control (fingerprints), alarm systems, military applications.
🎮
Entertainment
Film, music production, streaming services, gaming, AR/VR, E-sports.

Evaluates the Impact of ICT on Society

Benefits of ICT

ICT provides 24/7 services, reduces operational costs, improves customer access, and enables automation that significantly increases efficiency across all sectors.

Issues Caused by ICT

Confidentiality, Phishing & Piracy

Confidentiality Issues
When sensitive information is accessed or disclosed without authorization — through hacking, data interception, human error, or physical theft of devices.
Phishing
Online fraud where attackers pretend to be a trustworthy entity to trick people into giving up sensitive information via fake emails, texts, or websites.
Piracy
Illegal copying, sharing, and use of copyrighted digital content without permission — software, movies, music, e-books.

Licensed vs Unlicensed Software

Quick Revision — True or False

🧠 Test Yourself — Can you answer these?

01Data is the primary raw material used to create information.
02Qualitative data can be subjected to arithmetic processes like addition and subtraction.
03Electronic Data Processing (EDP) is the most widely used data processing method today.
04The "Velocity" of Big Data refers to the speed at which it is generated and processed.
05According to the Golden Rule of Information, the value of information increases over time.
06The main disadvantage of cloud computing is its limited storage capacity.
07An interpreter translates an entire program into machine code at once before execution.
08The "try before you buy" model for software is known as Freeware.
09Data validation checks if the entered data is an exact copy of the source data.
10A printer is an example of an input device.
11Google Docs is an example of a Software as a Service (SaaS) application.
12Liveware refers to the physical devices and components of a computer system.

💡 Answers available when you join the class — ask Sahan on WhatsApp!

Want to Master the Full Lesson?

This is just Lesson 01 of 13. Join Qubit Academy and get access to all lessons, live classes, past paper practice, and Sahan's personal guidance.