Professional Documents
Culture Documents
CONTENT:
1. Ergonomics and computer related disorders
2. Computer related disorders/illnesses and methods to prevent them.
3. Appropriate health and safety practices while using a computer system
4. The negative effects of electronic devices on the environment
5. Proper care and maintenance of computer equipment and accessories.
C1 – WHAT IS ERGONOMICS
Ergonomics is the design of safe and comfortable working environments to fit the employee
in order to optimize performance. This includes furniture design and the design of parts of the
computer like the keyboard and mouse.
A. Back problems
Many computer users suffer serious back problems. This is probably due to a poor
posture or an awkward position while sitting at a computer.
Solutions
A fully adjustable chair should avoid poor posture.
Footrests can reduce these problems.
Screens should tilt and turn to a position that avoids awkward movements.
B. Eyestrain
Eyes can become strained after staring at a computer screen for a long time,
particularly if working in bad light, in glare or with a flickering screen.
Solutions
Screen filters can remove a high percentage of the harmful rays emitted from a
computer screen.
Use screens that do not flicker.
Take regular breaks - do not work for more than one hour without a break.
Lighting must be suitable and blinds fitted to windows to reduce glare.
Solution
To prevent RSI, make sure your posture is correct, use wrists rests and have a
five-minute break from typing every hour.
D. Ozone irritation
Health experts have suggested that ozone emitted from laser printers can lead to
breathing problems.
Solution
It is recommended that laser printers should be situated at least one metre
away from where people are sitting and there should be good ventilation in the
area.
2. Good posture is essential for all computer users. You should adopt a natural and
relaxed position, providing opportunity for movement, from which you can assume a
number of alternative positions.
3. Provide suitable computer equipment that can be used without straining: for
example, large, clear and adjustable displays screen (visual display unit or VDU).
4. Ensure that there is adequate lighting, while at the same time the screen is free from
glare.
2. Harmful Materials – Most electrical devices are made with harmful chemicals
and/or materials such as mercury, lead and PCV (Polyvinyl Chloride). This harm
affects people's health and results in large economic expenses.
CONTENT
1) The Computer
a) First Generation
b) Second Generation etc.
3) Types of Computers
a) Mainframe computers
b) Supercomputers etc.
4) Hardware components of a Computer
a) Types of Software
5) Hardcopy vs. Softcopy
Input devices
Computers are used to make our life easier. Computers are used to store large volumes of
data (e.g. in companies, schools or university library), manage financial records (e.g. banks,
insurance companies, payroll department and accounting departments), track purchases and
sales (e.g. supermarkets, pharmacies, stores), access information from the Internet(e.g.
researching for school based assignment and for general knowledge), communicate with
family and friends ( e.g. Face book chat, Instant Messengers, Skype), monitor devices &
machines ( e.g. In a Chemical Plant, Manufacturing Plant) and to earn a living (e.g. to
provide online services such as shopping online).
Computers are widely used because of their ability to process large volumes of data in a
relatively short time with 100% accuracy consistently and store that information for future
use.
Definition of Terms
Computer: A computer is an electronic device that accepts data (input), manipulates data
(processing), holds processed data (storage) and display a result or information (output).
Computer System: A computer system refers to all the hardware and software working
together to process data.
Computer Hardware: This refers to the physical components of a computer system that can
be seen and touched.
Computer Software: This is the set of electronic program instructions or data a computer
processor reads in order to perform a task or operation.
Information: This refers to data that has been processed, organized, structured or presented
in a given context so as to make it useful
Data is simply facts or figures — bits of information, but not information itself. When data
has been processed, interpreted, organized, structured or presented so as to make them
meaningful or useful, they are called information. Information provides context for data.
For example, a list of dates — data — is meaningless without the information that makes the
dates relevant (dates of holiday).
Types of Computers
Since the advent of the first computer different types and sizes of computers are offering
different services. Computers can be as big as occupying a large building and as small as a
laptop or a microcontroller in mobile & embedded systems.
1. Supercomputer
2. Mainframe Computer
3. Minicomputer
4. Microcomputer
Supercomputer
The most powerful computers in terms of performance and data processing are the
Supercomputers. These are specialized and task specific computers used by large
organizations. These computers are used for research and exploration purposes, like NASA
uses supercomputers for launching space shuttles, controlling them and for space exploration
purpose. The supercomputers are very expensive and very large in size. It can be
accommodated in large air-conditioned rooms; some super computers can span an entire
building.
Purpose of Supercomputers
Space Exploration: Supercomputers are used to study the origin of the universe, the dark-
matters. For these studies scientist use IBM’s powerful supercomputer “Roadrunner” at
National Laboratory Los Alamos.
Weather Forecasting: Supercomputers are used for weather forecasting, and to study the
nature and extent of Hurricanes, Rainfalls, windstorms, etc.
Nuclear weapons testing: Supercomputers are used to run weapon simulation that can test
the Range, accuracy & impact of Nuclear weapons.
Mainframe Computer
Although Mainframes are not as powerful as supercomputers, but certainly they are quite
expensive nonetheless, and many large firms & government organizations uses Mainframes
to run their business operations. The Mainframe computers can be accommodated in large
air-conditioned rooms because of its size. Super-computers are the fastest computers with
large data storage capacity, Mainframes can also process & store large amount of data. Banks
educational institutions & insurance companies use mainframe computers to store data about
their customers, students & insurance policy holders.
Minicomputer
Minicomputers are used by small businesses & firms. Minicomputers are also called as
“Midrange Computers”. These are small machines and can be accommodated on a disk with
not as processing and data storage capabilities as super-computers & Mainframes. These
computers are not designed for a single user. Individual departments of a large company or
organizations use Mini-computers for specific purposes. For example, a production
department can use Mini-computers for monitoring certain production process.
Microcomputers
Desktop computers, laptops, personal digital assistant (PDA), tablets & smartphones are all
types of microcomputers. The micro-computers are widely used & the fastest growing
computers. These computers are the cheapest among the other three types of computers. The
Micro-computers are specially designed for general usage like entertainment, education and
work purposes. Well known manufacturers of Micro-computer are Dell, Apple, Samsung,
Sony & Toshiba.
Desktop computers, Gaming consoles, Sound & Navigation system of a car, Netbooks,
Notebooks, PDA’s, Tablet PC’s, Smartphones, Calculators are all type of Microcomputers.
Every computer system was designed to perform the following basic functions:
Input- Any information that is put into the computer to be processed is referred to as input. A
variety of devices can be used to enter information into a computer system. These include
keyboards, mice, scanners, microphones and many others. Such devices are called input
devices.
Processing- The process function of the computer system includes taking input or stored data
and converting it into usable information. This function is carried out by the computer’s
Central Processing Unit (CPU).
Output- This refers to information that has been processed by a computer system. Output can
be viewed or heard through output devices such as a monitor, speakers or a hard copy print
out.
Storage- Storage is the capability of a device to hold or retain information. This storage can
occur before or after processing.
The Hardware Components of a Computer System
Input Devices
This refers to peripherals that are used to accept data and enter it into the computer. Input
devices are essential in order to use a computer. These devices allow users to interact with the
applications that the computer displays. The most commonly used or primary input devices
on a computer are the keyboard and mouse.
Output Devices
An output device is any peripheral that receives data from a computer, usually for display,
projection, or physical reproduction. Output devices produce data in different forms including
audio, visual and hard copy. Output devices are all peripheral hardware
connected to a computer using cables or wireless networking.
NB. A peripheral is a device that is connected to and controlled by the central processing
unit (CPU).
Control Unit: The Control Unit directs or “controls” all of the operations of the processor.
It’s responsible for extracting program instructions from memory and
decoding them.
Arithmetic Logic Unit: This is what performs mathematical operations, logical operations
and decision-making operations of the Processor.
Keyboard: A keyboard is one of the primary input devices used with a computer.
Keyboards allow you to input letters, numbers, and other symbols into a
computer that can serve as commands or be used to type text.
Mouse: The mouse is the most popular pointing device. Generally, it has two buttons called
the left and the right button and a wheel is present between the buttons. A
mouse can be used to control the position of the cursor on the screen, but it
cannot be used to enter text into the computer.
Optical Mark Reader: Optical mark reader is a special type of optical scanner used to
recognize the type of mark made by pen or pencil. It is used where one out of
a few alternatives is to be selected and marked. It is specially used for
checking the answer sheets of examinations having multiple choice questions.
Optical Character Reader: Optical Character Recognition is a technology that enables users
to convert different types of documents, such as scanned paper documents,
PDF files or images captured by a digital camera into editable and searchable
data.
Magnetic Ink Card Reader: The magnetic ink card reader input device is generally used in
banks this is because there are large numbers of cheques to be processed every
day. The bank's code number and cheque number are printed on the cheques
with a special type of ink that contains particles of magnetic material that are
machine readable. This reading process is called Magnetic Ink Character
Recognition .The main advantages of the magnetic ink card reader is that it is
fast and less error prone.
Touchpad: This is a device typically found on laptop computers. It works like a mouse or
trackball, except it's a flat panel you move your finger across. The motion of
your finger registers as cursor movement on the screen. Many touchpads now
enable gestures to scroll through documents or zoom in on a photo. Buttons
are typically below the touchpad.Scanner: These devices allow a user to
input a photograph or document into the computer. By placing a piece of
media in a scanner, you can create an image file that can be opened and
manipulated on the computer.
Joystick: Joysticks are most commonly used when playing games. Originally, they
consisted of a single movable stick and a button or two, allowing you to control a game
character's movements. Modern joysticks group a number of sticks and buttons together,
allowing you to control complex movements with a couple of finger flicks.
Barcode Reader: Bar Code Reader is a device used for reading bar coded data (data in the
form of light and dark lines). Bar coded data is generally used in labeling
goods, numbering the books, etc. It may be a handheld scanner or may be
embedded in a stationary scanner.
Printer: A printer is an external hardware output device that takes the electronic data stored
on a computer or other device and generates a hard copy of it. Printers are one of the
most popular computer peripherals and are commonly used to print text and photos.
The most common types of printers used in offices include laser printers, inkjet
printers, dot matrix (impact) printers and plotters.
2. Non- Impact
An impact printer makes contact with the paper. It usually forms the print image by pressing
an inked ribbon against the paper using a hammer or pins.
A non- impact printer prints characters and graphics on a piece of paper without striking the
paper, because these printers do not hammer against the paper they are much quieter.
Dot-Matrix Printers: A dot matrix printer has a print head through which the tips of nine
wires project, forming a vertical column of dots. The wire tips strike a ribbon which touches
the paper, producing horizontal patterns of dots that form letters, numerals, lines and other
characters. Because the printer can control the placement of individual dots, the mechanism
can produce simple graphics such as line drawings and bar codes.
Daisy-wheel printer: Daisy wheel printers are roughly the size of a typewriter, and were
early substitutes for typewriters. The print mechanism uses a set of molded characters
arranged around the circumference of a circle; each letter sits at the end of a thin metal or
plastic stalk, so the whole set resembles the petals of a daisy. A mechanism moves the daisy
wheel back and forth across a page; as it does, the wheel rotates, moving the appropriate
letters into place as a electric hammer strikes the character. The printer manufacturers
designed the daisy wheels to be replaceable; you could print using characters of different
fonts by changing the wheel.
Line printer: The line printer is an impact printer that prints one entire line of text at a time.
In business where enormous amount of material are printed, the character-at-a-time printers
are too slow; therefore, these users need line-at-a-time printers. Line printers, or line-at-a-
time printers, use special mechanism that can print a whole line at once; they can typically
print the range of 1,200 to 6,000 lines per minute. Drum, chain, and band printers are line-at-
a-time printers.
Drum printer: Drum printers share features with chain printers; both print at high speeds, As
the drum rotates, electric hammers strike the paper, forcing it against a ribbon that sits
between the paper and the drum. The print drum is quieter than a chain, as the drum makes no
noise as it rotates. As with the chain printer, it prints only the characters on the drum.
Chain printer: A chain printer has a set of metal characters and numbers arranged in a
continuous loop, resembling the blade of a chainsaw. Behind the paper, a row of hammers
strike the characters as they come around on the chain. The chain mechanism has print speeds
up to several hundred lines per minute, faster than a dot matrix. The chain printer is also more
expensive than a dot matrix, as it is more complicated mechanically. Its character set is
limited to whatever the chain contains
Band printer: A type of impact printer which contains a metal band with character shapes
imprinted on it. During output, the band rotates horizontally past the paper, and a hammer
strikes the band opposite the appropriate character, pressing it through an inked ribbon and
onto the paper.
Types of non- impact printers
Inkjet Printer: Inkjet printers are the most common type of consumer printers. The inkjet
technology works by spraying very fine drops of ink on a sheet of paper. As the paper is fed
through the printer, the print head moves back and forth, spraying thousands of these small
droplets on the page.
While inkjet printers used to lack the quality and speed of laser printers, they have become
almost as fast as laser printers and some can even produce higher-quality images.
Laser Printer: A laser printer is a printer that uses a focused beam or light to transfer text
and images onto paper. Once the pattern has been created on the drum, it is coated with toner
from a toner cartridge. The toner is black in most cartridges, but may be cyan, magenta, and
yellow in color laser printers. Because laser printers do not use ink, they have less image
smearing problems than inkjet printers and are able to print pages faster.
Monitor: The most common computer output device is the monitor or computer screen.
Monitors create a visual display for you to view from processed data. They come in a
variety of screen sizes and visual resolutions.
Soft copy is an electronic display of digital information, such as files viewed on the pc
monitor,
cell phone or tablet. A digital JPG file, a digital Word document, an email attachment are all
examples of soft copy. Once soft copy is printed or burned, they are referred to as hard copy.
The term hard copy itself describes something touchable, physical and tangible. And copy
means
the result of a production or information. So the collective meaning of hard copy is,
production
of any record or information in a physical object or form. A hard copy output is a printed
copy of
information from a computer. Sometimes referred to as a print out, a hard copy is so-called
documents, etc. all are kinds of hard copy. Hard copy is an older way of keeping the record in
physical form. Soft copy means a data or information which can be stored in any kind of
digital
memory. It is an intangible form of preserving the material. You can see the record but
cannot
touch it. Monitors or others display screens are used to see the soft copy results.
CPU stands for Central processing unit. It is also known as microprocessor or processor. A
CPU is brain of a computer. It is responsible for all functions and processes. Regarding
computing power, the CPU is the most important element of a computer system. The CPU is
consisted of thin layers of thousands of transistors. Each transistor receives a set of inputs and
produces output. Transistors hold a key role in functioning of CPU as they make computer
able to count and perform logical operations which is called processing. It processes the
instructions that it collects by decoding the code in programs.
1. Fetch: Each instruction is stored in memory and has its own address. The processor
takes this address number from the program counter, which is responsible for tracking
which instructions the CPU should execute next.
2. Decode: All programs to be executed are translated to into assembly instructions.
Assembly code must be decoded into binary instructions, which are understandable to
the CPU. This step is called decoding.
3. Execute: While executing instructions the CPU can do one of three things: Do
calculations with its ALU, move data from one memory location to another, or jump
to a different address.
4. Store: The CPU must give feedback after executing an instruction and the output data
is written to the memory.
The main components of CPU help it in performing various functions. The components of a
CPU work together, and their making or manufacturing determine the complexity of
operations as well as how fast they can be carried out.
3. Memory Unit: This unit can store instructions, data and intermediate results. This unit
supplies information to the other units of the computer when needed.
System and Application Programmes
System Software
System software is a type of computer program that is designed to run a computer's hardware
and application programs. These programmes are dedicated to managing the computer.
Without system software installed in a computer, users would have to type every instruction
they want the computer to perform.
Windows 8 – this is the latest release of Microsoft’s operating system. It was first geared
towards tablets and other touch-screen mobile devices but developed a version for desktop
and laptop computers as well. Windows 8 introduces a new tile oriented user interface, giving
users an immersive full-screen experience. It also provides improved startup times and
overall performance than previous versions of Windows.
Windows 7 – This is the most popular operating system to date. It has managed to keep a
large number of users happy with its familiar interface and snappy performance. Windows 7
addressed many of the problems plaguing its predecessor, Windows Vista, such as the poor
performance and numerous software compatibility issues.
Windows XP – This operating system brought a fresh new visual interface to the Windows
operating system. XP can be easily identified by its default green start button and blue
taskbar. Apart from the new look, XP introduced the “fast user switching” feature that
allowed multiple users to be logged into their own sessions at the same time.
Windows Vista- Released to the public on January 30, 2007, Windows Vista (box shown
right) is the successor to Windows XP in Microsoft's Windows line of operating systems.
Vista incorporated a search bar to the start menu, making it faster and easier to search
through your programs and files. Windows Vista was a complete redesign of the Windows
operating system. This resulted in hardware and software compatibility issues on a massive
scale.
Mac OS- Mac OS is the computer operating system for Apple Computer's Macintosh line of
personal computers and workstations.
Application Software
Application software is a term which is used for software created for a specific purpose. It is
generally a program or collection of programs developed to help the user to perform specific
tasks it can be called an application or simply an app.
Database programs
Word Processing software
Entertainment software
Business software
Educational software
Spreadsheet software etc.
System software is also known as the operating system and includes Microsoft Windows,
Apple's OSX and Linux, while application software refers to programs that perform tasks
such as includes Microsoft Office, Adobe Photoshop and Apple iTunes.
Primary storage devices are components that store information currently being used so that it
can be directly accessed by the computer’s CPU. Information stored in primary storage
devices can be accessed very quickly, making it ideal for storing active / running programs.
The computer’s processor can only handle data stored in primary storage. Therefore, when a
program. Primary storage can be categorized as volatile or non-volatile. Memory that is
volatile loses stored information when the device loses power. Memory that is non-volatile
retains stored information when the power is turned off. This is why it is recommended you
save your work (such as a word document) periodically. Doing so moves that information
from primary storage to a secondary storage device such as a hard drive. The term “primary
storage” is more often referred to as just “memory”.
Read only Memory: Read-Only Memory or ROM, is a type of computer memory on which
data has been stored during the manufacturing process. As the name suggests, this data can
only be read. This data cannot be removed and new data cannot be added. ROM is non-
volatile. This means that ROM retains its stored information even when the power is turned
off. Because of this, ROM is used to store vital information, such as the instructions to boot
the computer.
Secondary storage devices are components that store information but cannot be accessed
directly by the CPU. To make up for the slower operating speed of secondary storage
devices, computer systems temporarily transfer information from these devices into RAM
when necessary. This allows the computer to take advantage of the faster access speeds of
primary storage. This also makes accessing data from secondary storage slower since it needs
to be transferred to primary storage first.
The main advantage of secondary storage is that it retains information even when powered
off. This allows your programs, documents, music etc. to remain stored even after the
computer is shut down so that it is available thereafter.
Another advantage of secondary storage is that it has a higher storage capacity than primary
storage. This simply means that secondary storage is capable of holding more information.
Types of Secondary Storage Devices
Hard drive: A hard disk drive (sometimes abbreviated as Hard drive, HD, or HDD) is a non-
volatile memory hardware device that permanently stores and retrieves data on a computer.
Jump drive: Alternatively referred to as a USB flash drive, data stick, pen drive, memory
unit, key chain drive and thumb drive, a jump drive is a portable storage device. It is often the
size of a human thumb and it connects to a computer via a USB port. Flash drives are an easy
way to store and transfer information. They are available in sizes ranging from 2 GB to 1 TB.
Secure Digital Card (SD Card): A Secure Digital (SD) card is a tiny flash memory card
designed for high-capacity memory and various portable devices, such as car navigation
systems, smart phones, digital cameras, music players, digital video camcorders and personal
computers.
Compact Disk: Compact disks can store software programs that can be loaded onto a
computer. They save files for backup or transfer to another computer, as well as hold music
to play in a CD player.
Digital Versatile Disk: A digital versatile disk is a type of optical media used for storing
digital data. It is the same size as a compact disk, but has a larger storage capacity. Some
DVDs are formatted specifically for video playback, while others may contain different types
of data, such as software programs and computer files.
Cloud Computing
If you use an online service to send email, edit documents, watch movies or TV, listen to
music, play games or store pictures and other files, it is likely that cloud computing is making
it all possible behind the scenes. The first cloud computing services are barely a decade old,
but already a variety of organizations from tiny startups to global corporations, government
agencies to non-profits are embracing the technology for all sorts of reasons. Here are a few
of the things you can do with the cloud:
Cloud computing is a big shift from the traditional way businesses think about IT resources.
Some of the benefits of cloud computing include the following:
1. Cost: Cloud computing eliminates the capital expense of buying hardware and software
and setting up and running on-site datacenters—the racks of servers, the round-the-clock
electricity for power and cooling, the IT experts for managing the infrastructure. It adds up
fast.
2. Speed: Most cloud computing services are provided self service and on demand, so even
vast amounts of computing resources can be provisioned in minutes, typically with just a few
mouse clicks, giving businesses a lot of flexibility and taking the pressure off capacity
planning.
3. Global scale: The benefits of cloud computing services include the ability to scale
elastically. In cloud speak, that means delivering the right amount of IT resources—for
example, more or less computing power, storage, bandwidth—right when its needed and
from the right geographic location.
4. Productivity: On-site data centers typically require a lot of hardware set up, software
patching and other time-consuming IT management chores. Cloud computing removes the
need for many of these tasks, so IT teams can spend time on achieving more important
business goals.
5. Performance: The biggest cloud computing services run on a worldwide network of
secure data centers, which are regularly upgraded to the latest generation of fast and efficient
computing hardware. This offers several benefits over a single corporate datacenter,
including reduced network latency for applications and greater economies of scale.
6. Reliability: Cloud computing makes data backup, disaster recovery and business
continuity easier and less expensive, because data can be mirrored at multiple redundant sites
on the cloud provider’s network.
UNIT 3: COMPUTER ETHICS AND RESEARCH
CONTENT
Computer Ethics
Ethics is the moral principles that govern a person or group's behaviour, while morals are
standards of behaviour; principles of right and wrong. Therefore computer ethics is set of
moral principles that regulate the use of computers.
1. Intellectual property rights – are the legal rights that cover the privileges given to
individuals who are the owners and inventors of a particular item, and have created
something with their intellectual creativity. Intellectual property rights are the
foundation of the Software and Information Technology industry on a whole.
2. Plagiarism – is the practice of taking someone else's work or ideas and passing them
off as one's own.
3. Trademark – is a symbol, word, or words legally registered or established to be used
as representing a company or product.
4. Copyright – is the exclusive and assignable legal right, given to the originator for a
fixed number of years, for its use and distribution.
Unethical Behaviours
Unethical behaviour is an action that falls outside of what is considered morally right or
proper for a person, a profession or an industry.
1. A high risk for depression, anxiety and stress-related disorders for victims who are
cyber bullied or stalked.
2. Legal consequences can be applicable as the offenders can be charged with acts of
harassment, intentional infliction of emotional pain, negligence and vicarious liability.
Computer/internet crime law deals with the broad range of criminal offenses
committed using a computer or similar electronic device.
The following offences are punishable under the Jamaican Cybercrime Act:
1. A person who knowingly obtains, for himself or another person, any unauthorized
access to any program or data stored on a computer commits an offence (hacking).
2. A person who does any act which that person knows is likely to cause any
unauthorized modification of the contents of any computer, commits an offence.
3. A person commits an offence if that person knowingly:
secures unauthorized access to any computer for the purpose of obtaining,
directly or indirectly, any computer service;
without authorization, directly or indirectly intercepts or causes the
interception of any function of a computer.
4. A person commits an offence if that person, without authorization or without lawful
justification or excuse, wilfully causes, directly or indirectly:
a degradation, failure, interruption or obstruction of the operation of a
computer;
a denial of access to, or impairment of, any program or data stored in a
computer.
5. A person commits an offence if they, without the authorization of the owner,
facilitates the commission of possessing, receiving, manufacturing, selling,
importing, distributing, disclosing or otherwise makes available:
a computer;
any access code or password.
There are other punishable crimes that predate and are also extended to the internet.
These are inclusive of:
Theft
Fraud
Vandalism
Trespassing
Harassment
Copyright Infringements
1. Keep your software/apps updated and delete the ones not in use.
2. Be careful when dealing with emails from unknown sources.
3. Don’t click on random links and online ads.
4. FREE does not mean SAFE.
5. Do not relieve sensitive information online.
6. Keep your account information to yourself.
7. Report illegal activities or offending content.
8. Be careful what you post online as it stays online forever.
9. Use antivirus protection before you go online.
10. Create backup copies of your important documents.
REFERENCING
The APA style was created in 1929 by a group of Psychologists, anthropologists and
business managers who saw the need for a simple set of guidelines or rules that a publisher
observes to ensure clear and consistent written materials. Over the years, different editions of
the referencing style have been created. The 6th edition is the most current and it was created
in the year 2009.
Your reference list should appear on a new page at the end of your project and the page
should be labelled "References" as well as centred at the top of the page (do NOT bold,
underline, or use quotation marks for the title). It provides the information necessary for a
reader to locate and retrieve any source you cite in the body of the project. Each source you
cite in the paper must appear in your reference list; likewise, each entry in the reference list
must be cited in your text.
All lines after the first line of each entry in your reference list should be indented one-half
inch from the left margin. This is called hanging indentation.
Authors' names are inverted (last name first); give the last name and initials for all authors of
a particular work for up to and including seven authors. If the work has more than seven
authors, list the first six authors and then use ellipses after the sixth author's name. After the
ellipses, list the last author's name of the work.
Reference list entries should be alphabetized by the last name of the first author of each work.
For multiple articles by the same author, or authors listed in the same order, list the entries in
chronological order, from earliest to most recent.
Present the journal title in full. Maintain the punctuation and capitalization that is used by the
journal in its title. e.g. ReCALL not RECALL or Knowledge Management Research &
Practice not Knowledge Management Research and Practice. Capitalize all major words in
journal titles.
When referring to books, chapters, articles, or Web pages, capitalize only the first letter of the
first word of a title and subtitle, the first word after a colon or a dash in the title, and proper
nouns. Do not capitalize the first letter of the second word in a hyphenated compound word.
Italicize titles of longer works such as books and journals. Do not italicize, underline, or put
quotes around the titles of shorter works such as articles or essays in edited collections.
In-Text Citation
When using APA format, follow the author-date method of in-text citation. This means that
the author's last name and the year of publication for the source should appear in the text, for
example, (Jones, 1998), and a complete reference should appear in the reference list at the end
of the paper:
According to Jones (1998), "Students often had difficulty using APA style, especially when it
was their first time" (p. 199).
or
Jones (1998) found "students often had difficulty using APA style" (p. 199); what
implications does this have for teachers?
Place direct quotations that are 40 words, or longer, in a free-standing block of typewritten
lines, and omit quotation marks. Start the quotation on a new line, indented 1/2 inch from the
left margin, i.e., in the same place you would begin a new paragraph. Type the entire quotation
on the new margin, and indent the first line of any subsequent paragraph within the quotation
1/2 inch from the new margin. Maintain double-spacing throughout. The parenthetical citation
should come after the closing punctuation mark.
MLA is most commonly used to write papers and cite sources within the liberal arts and
humanities. The 8th edition is the most recent of MLA editions and it was released in the year
2016.
MLA has turned to a style of documentation that is based on a general method that may be
applied to every possible source, to many different types of writing. But since texts have
become increasingly mobile, and the same document may be found in several different
sources, following a set of fixed rules is no longer sufficient.
When deciding how to cite your source, start by consulting the list of core elements. These
are the general pieces of information that MLA suggests including in each Works Cited
entry. In your citation, the elements should be listed in the following order:
Author. Title of source, The container, Other contributors, Version, Number, Publisher,
Publication date, Location. Each element should be followed by the punctuation mark
shown. Author
Begin the entry with the author’s last name, followed by a comma and the rest of the
name, as presented in the work. End this element with a period.
The title of the source should follow the author’s name. Depending upon the type of
source, it should be listed in italics or quotation marks. A book and website should be
in italics. A periodical (journal, magazine, newspaper article) should be in quotation
marks. A song or piece of music on an album should be in quotation marks:
*The eighth edition handbook recommends including URLs when citing online sources.
Title of container – Containers are the larger wholes in which the source is located.
For example, if you want to cite a poem that is listed in a collection of poems, the
individual poem is the source, while the larger collection is the container. The title of
the container is usually italicized and followed by a comma, since the information that
follows next describes the container.
Kincaid, Jamaica. "Girl." The Vintage Book of Contemporary American Short Stories, edited
by Tobias Wolff, Vintage, 1994, pp. 306-07.
Other contributors – In addition to the author, there may be other contributors to the
source who should be credited, such as editors, illustrators, translators, etc. If their
contributions are relevant to your research, or necessary to identify the source, include
their names in your documentation.
If a source is listed as an edition or version of a work, include it in your citation.
The in-text citation is a brief reference within your text that indicates the source you
consulted. It should properly attribute any ideas, paraphrases, or direct quotations to your
source, and should direct readers to the entry in the list of works cited. For the most part, an
in-text citation is the author’s name and page number (or just the page number, if the author
is named in the sentence):
Imperialism is “the practice, the theory, and the attitudes of a dominating metropolitan center
ruling a distant territory” (Said 9).
or
According to Edward W. Said, imperialism is defined by “the practice, the theory, and the
attitudes of a dominating metropolitan centre ruling a distant territory” (9).
PROBLEM-
SOLVING AND
PROGRAM DESIGN
UNIT 4: PROBLEM-SOLVING AND PROGRAM DESIGN
In our everyday life we actually solve simple problems. For example, you have a problem
meeting your deadlines.
1. First you need to examine the problem – determine why you are having difficulty
meeting your deadlines.
2. Determine possible solutions to the problem such as: using reminders for the deadlines
you have to meet on your phone, work book etc, get your parents involved in reminding
you about your deadlines, completing the tasks you have to complete as soon as you get
them etc.
3. The possible solutions you would then evaluate to determine the best solution to the
problem.
The computer programmer creates the instructions for the computer to follow. These
instructions are referred to as computer programs. You were introduced to the term computer
programs when we looked at software.
Defining the problem is a way to help the programmer understand what he or she is required
to do. It involves breaking down the problem into three key components:
These three components can be illustrated using what is a called a defining diagram. Some
text may refer to this as the Input Processing and Output (IPO) chart. The defining diagram
is a formal approach to defining a problem. The defining diagram is a table with three
columns, which represents the three components: input, processing and output.
The input is the source data provided. You can identify what is the input in a given problem
by the following keywords: given, get, read or accept.
The Output
The output is the end result required. You can identify what is the output in a given problem
by the following keywords: print, display and output.
The Processing
The processing column is a list of what actions are to be performed to achieve the required
output.
Let us look first at a real world scenario. You are learning to bake a cake for the first time.
How would you represent this problem using the defining diagram concept? See the example
below.
Defining Diagram:
Example 1
A program is required to read two (2) numbers calculate and print their total.
1. Identify the input (that is, the data that is given). The keyword, read, identifies the
input as two numbers, that is, any two numbers.
2. Identify the output. The keyword, print, identifies the output as the total (or sum) of
the two numbers.
3. List the processing steps. Here, we list all the actions that must be performed in
order to get the desired results. For example: What do we have to do to the two
numbers in order to print their total?
1. Read/get 2 numbers
Example 2
Problem 2
A program is required to read three numbers calculate and print their product.
Defining Diagram
1. Accept 3 numbers