دليل التحضير للامتحان: الأسابيع 1-11
The fundamental concepts of Information and Communication Technology (ICT) form the cornerstone upon which all modern applications and systems are built. Understanding hardware and software components, the history of computer evolution, and the information processing cycle is the first and essential step for any specialist in this field, as this knowledge enables the ability to comprehend more complex systems and analyze them effectively.
The term "Information and Communication Technology" (ICT) is defined as a diverse set of technological tools and resources used to communicate, create, process, store, and manage information. This term is broader and more comprehensive than "Information Technology" (IT) because it integrates communication tools such as the Internet, mobile phones, and TV broadcasting with traditional computing.
The Five Main Components of an ICT System:
The following table summarizes the evolution of the five computer generations over time.
| Generation & Time Period | Core Technology | Examples |
|---|---|---|
| 1st Gen (1940-1950) | Vacuum Tubes الأنابيب المفرغة | ENIAC, UNIVAC |
| 2nd Gen (1950-1960) | Transistors الترانزستور | IBM 1401 |
| 3rd Gen (1960-1970) | Integrated Circuits (ICs) الدوائر المتكاملة | IBM 360 series |
| 4th Gen (1970-1990) | Microprocessors المعالجات الدقيقة | Apple II, IBM PC |
| 5th Gen (1990-Today) | Artificial Intelligence الذكاء الاصطناعي | Smartphones, Cloud Computing, IoT |
Computers are classified based on their size, power, and processing capability.
The CPU is known as the "brain" of the computer and is responsible for executing most processing operations. It consists of two main parts:
| Feature | HDD (Hard Disk Drive) | SSD (Solid State Drive) |
|---|---|---|
| Technology | Mechanical, uses spinning disks and magnetic read/write heads. | Electronic, uses integrated circuits (flash memory) with no moving parts. |
| Speed | Slower in accessing and transferring data. | Much faster in reading, writing, and accessing data. |
| Durability | Less durable and more sensitive to shocks due to moving mechanical parts. | More durable and shock-resistant due to the absence of moving parts. |
| Cost & Capacity | Cheaper and available in higher storage capacities. | More expensive, especially in large storage capacities. |
| Random Access Memory (RAM) | Read Only Memory (ROM) |
|---|---|
| Volatile متقلبة: Loses its contents when power is cut off. | Non-Volatile غير متقلبة: Retains its data permanently even after power is cut off. |
| Temporary Use: Used to store data and programs that the computer is currently working on. | Permanent Use: Used to store Firmware such as the Basic Input/Output System (BIOS). |
| Writable: Data can be read from it and written to it repeatedly. | Not Writable (User): Pre-programmed at the factory and cannot be easily changed by the user. |
Software is the soul that breathes life into silent hardware components, transforming them into powerful and effective tools. ICT applications have become an integral part of our lives, from managing academic affairs via systems like OBS to completing government transactions via the E-Devlet platform, embodying how software facilitates various aspects of daily life.
Software is a set of instructions or programs that direct the computer to perform specific tasks.
The Operating System is the most important program in the computer, acting as a mediator between the user and hardware components, and managing all other resources and programs. Main Functions of the OS:
| Model | Description | Example |
|---|---|---|
| B2B (Business-to-Business) | A company selling its products or services to another company. | Alibaba (Connects manufacturers with wholesalers) |
| B2C (Business-to-Consumer) | A company selling its products or services directly to individual consumers. | Trendyol, Amazon |
| C2C (Consumer-to-Consumer) | A consumer selling their products or services to another consumer via an intermediary platform. | eBay, GittiGidiyor (formerly) |
| B2G (Business-to-Government) | A company providing its services or products to the government via online tenders. | Software company selling systems to the government. |
| C2G (Consumer-to-Government) | An individual transacting with the government electronically. | Paying taxes or renewing a driver's license via the e-Devlet portal. |
| B2E (Business-to-Employee) | A company providing products or services to its employees at discounted rates via an internal portal. | Tech company selling its devices to its employees. |
Networks are the backbone of our interconnected digital world; they enable devices and systems to communicate and share resources. Understanding network architecture and how it works is essential to comprehending how the Internet and digital services we rely on daily—from email to cloud computing—function.
A Computer Network is a system connecting two or more devices to share resources (like printers and files) and exchange data.
| Circuit Switching تحويل الدوائر | Packet Switching تحويل الحزم |
|---|---|
| A dedicated, fixed communication path is established between the two parties for the duration of the session. | Data is split into small packets, and each packet is routed independently across the network. |
| Efficiency: Less efficient, as the path remains reserved even if no data is being sent. | Efficiency: More efficient, as multiple users can share the same path simultaneously. |
| Delay: Fixed and low delay once the connection is established. | Delay: Variable delay, as packets may face congestion and delay at different nodes. |
| Connection Req: A connection must be established before data transfer begins. | Does not require prior connection establishment (Connectionless). |
TCP/IP Model:
| Layer | Main Function | Example |
|---|---|---|
| Application | Provides protocols for applications to communicate over the network. | HTTP, SMTP, FTP |
| Transport | Ensures reliable data transfer from end-to-end. | TCP, UDP |
| Internet | Responsible for addressing and routing data packets across networks. | IP (Internet Protocol) |
| Network Access | Manages how data is sent over the physical network media. | Ethernet, Wi-Fi |
Effective file management is an indispensable essential skill in any digital environment. It contributes directly to increasing productivity, facilitating collaboration, and ensuring data security and protection from loss, whether on an individual or institutional level.
Key Concepts:
| Extension | File Type |
|---|---|
| .docx | Microsoft Word Document |
| PDF Document | |
| .jpg / .png | Image File |
| .mp3 | Audio File |
| .zip / .rar | Compressed File |
Create, Read, Write, Delete, Copy, Move.
| Operation | Copy النسخ | Move النقل |
|---|---|---|
| Effect on Original | Original file remains in place unchanged. | Original file is deleted from its old location. |
| Need for Space | Requires extra storage space for the new copy. | Does not require extra space, as only file location changes. |
Backup is the process of creating a copy of data and storing it in a separate location to protect it from loss due to causes like hardware failure, human error, or malware attacks.
Backup Types:
Cloud Storage: A model for storing data on remote servers accessible via the Internet. Benefits: 1. Access from anywhere. 2. Automatic synchronization across devices. Examples: Google Drive, Dropbox, OneDrive.
File Compression:
The ICT field is characterized by rapid and continuous change, with new innovations reshaping how we work and live. Understanding current technology trends, along with their accompanying ethical, security, and societal issues, is crucial for any professional seeking to keep up with the digital age.
Word processing software, led by Microsoft Word, are essential tools in the ICT environment, enabling users to efficiently create, format, and share professional documents, ranging from academic reports to official correspondence.
Basic Keyboard Shortcuts: Ctrl+C (Copy), Ctrl+V (Paste), Ctrl+S (Save).
Importance of Styles: Using built-in styles like Heading 1 and Heading 2 is a necessary practice to create an organized document structure. This organization not only improves readability but also facilitates creating an Automatic Table of Contents, which is vital in long documents and official reports.
Microsoft Excel plays a vital role as a powerful tool for analyzing, managing, and visualizing numerical data. Mastering Excel skills is indispensable in the ICT field, where it is used for everything from budgeting and project tracking to analyzing big data sets.
Cell references determine how Excel handles cell addresses when copying and pasting formulas.
| Reference Type | Example | How it changes when copied |
|---|---|---|
| Relative المرجع النسبي | A1 | Changes automatically based on the new location of the formula. (e.g., copying A1 from B2 to B3 changes it to A2). |
| Absolute المرجع المطلق | $A$1 | Remains fixed and never changes when the formula is copied, thanks to the dollar sign ($) locking column and row. |
| Mixed المرجع المختلط | A$1 or $A1 | Locks either the row (A$1) or the column ($A1) only, while the other part remains relative and changes upon copying. |
| Function | Description |
|---|---|
| SUM | Adds values of cells in a specified range. |
| AVERAGE | Calculates the arithmetic mean of values in a specified range. |
| MIN | Finds the smallest value in a specified range. |
| MAX | Finds the largest value in a specified range. |
| IF | Performs a logical test and returns one value if true, and another if false. |
| COUNTIF | Counts cells in a range that meet a specific condition. |
| VLOOKUP | Searches for a value in the first column of a table and returns a corresponding value from another column in the same row. |
Databases represent the beating heart of most modern ICT systems. They provide an organized and secure means to store, manage, and retrieve data that organizations rely on for daily operations and strategic decision making, ranging from banking systems to e-commerce applications.
SQL is the standard language used to interact with relational databases, used to create tables, insert, update, delete, and retrieve data.
| Category | Function | Examples |
|---|---|---|
| DDL (Data Definition Language) | Used to define and modify database structure. | CREATE, ALTER, DROP |
| DML (Data Manipulation Language) | Used to manage data within tables. | SELECT, INSERT, UPDATE, DELETE |
Transaction: A logical unit of work consisting of one or more database operations. Treated as a single unit: either all operations succeed, or all fail. ACID properties ensure transaction reliability:
E-commerce is a direct and powerful application of ICT concepts, integrating databases to manage products and customers, networks to connect buyers and sellers, and software to provide user-friendly interfaces, creating global markets transcending geographical borders.
Main E-Commerce Models:
The e-commerce ecosystem consists of: Website/Online Store, Payment Gateways (secure transaction processing), Logistics & Supply Chain (inventory, shipping, returns), Security (SSL encryption), and Digital Marketing (SEO, Social Media). AI helps customize shopping experiences, while Cloud Computing provides flexible infrastructure.
| Pros | Cons/Challenges |
|---|---|
| Global Reach: Selling to customers anywhere. | Security Threats: Fraud and data breaches. |
| 24/7 Availability: Open all the time. | Trust Issues: Building customer trust online. |
| Lower Costs: Compared to physical stores. | Intense Competition: Easy entry for new competitors. |
| Personalization: Analyzing customer data for offers. | Logistics Complexity: Managing shipping/returns. |
Business Intelligence (BI) and Business Analytics (BA) are fields specialized in turning raw, useless data into actionable insights. By analyzing data, organizations can understand past performance and predict future trends, enabling informed strategic decisions supporting growth and innovation.
| Feature | Business Intelligence (BI) | Business Analytics (BA) |
|---|---|---|
| Focus | What happened? Focuses on describing and analyzing past and current performance. | What will happen? Why? Focuses on predicting future outcomes and discovering patterns. |
| Time Orientation | Past and Present. | Future. |
Process of discovering, documenting, sharing, and applying knowledge within an organization.
Project Management is the systematic methodology ensuring specific goals are met within time and budget constraints. In ICT, this skill is vital to ensure any initiative—whether developing software or building a network—is executed successfully and effectively.
Project Management Triangle (Triple Constraint): To manage any project successfully, three main constraints must be balanced, with Quality as a central element affected by all:
Note: Changing one constraint inevitably affects at least one other (e.g., reducing time may increase cost or reduce scope).
| Feature | Waterfall الشلال | Agile الرشيقة |
|---|---|---|
| Process Nature | Linear: Phases flow sequentially; one doesn't start until previous ends. | Iterative: Work in short cycles (Sprints), delivering working parts at end of each. |
| Requirements | Fixed: Must be clear/fully defined at start. | Variable: Welcomes changes even late in project. |
| Suitability | Projects where requirements are well known/stable (Construction). | Projects where requirements are unclear or expected to change (Software). |
Scrum is a popular Agile framework focusing on working in short cycles called "Sprints" (usually 2-4 weeks). Main Roles:
Project Risk: Any uncertain event/condition that can positively or negatively affect project goals if it occurs. Basic Steps:
These concepts and practices reviewed from Weeks 1 to 11 form the foundational knowledge necessary to understand and succeed in the ICT work environment, where understanding technology integrates with the ability to manage and apply it effectively to achieve desired goals.