Professional Documents
Culture Documents
INFORMATION
TECHNOLOGY
Notes
Name: __________________________________________________
A COMPUTER SYSTEM refers to all the hardware and software working together to process
data. It should be noted that the word computer and computer system is used
interchangeable.
Process
Input Process Output
Input Output
CU ALU
OR
Store
#
Information Technology Revision Notes: DO NOT COPY
Store V
3rm
Hardware components
Hardware is the physical (tangible) part of the computer that you can see and touch. There
are many different kinds of hardware that can be installed inside, and connected to the
outside of a computer. Examples of common hardware components that you will find inside
of a computer are: Motherboard, hard drive and Ram. Common hardware components you
might find outside of the computer are: monitor, keyboard and mouse.
CU ALU
Input Output
Device Device
Main Memory
Secondary storage
computer system. The CPU is divided into two main components the ALU and
the CU.
i. Control Unit (CU) – The Control Unit directs and coordinates most of
the operations in the computer. It read instructions; it interprets the
instructions and directs the other parts of the computer to perform
the task. It Control (regulate) the flow of programs and data in and
out of the primary memory. The control unit also regulates the flow
of information to and from all the components of the computer e.g.
The input devices, output devices, disk drives and printer. This
component receives, decodes, and manages execution of data that
flows through the CPU. The CU does not do any form of Manipulation
(processing), it sends data to be processed in the ALU.
ii. Arithmetic Logic Unit (ALU) - The ALU is the part of the CPU that
performs all the calculations. This includes arithmetic operation,
comparison and logic operations. Arithmetic operation includes
(addition, division and subtraction) and logical operations include
(reasoning and performing the comparison necessary to make
decisions).
Terms to Remember:
Peripheral devices are devices which are connected to a computer, either internally
or externally and are controlled by the CPU. They add additional functionalities to
the system. Input, output and storage devices may be peripheral devices. Please
note that the motherboard and main memory is not considered to be peripheral
devices.
Bistable device/Bi-stable device is a device that can exist in one of two possible
stable states and allows switching between the two states. A light switch can be
considered a Bistable device it can either be on/off. These devices are the
foundation of all digital electronics.
b. ROM (Read Only Memory) – ROM stores the basic input/output instructions
(BIOS) needed by the computer during booting. ROM contains permanent
data and is non-volatile. The content of ROM cannot be changed while the
Information Technology Revision Notes: DO NOT COPY
V
3rm
computer is using it. The contents on ROM are usually programmed by the
manufacturer.
Types of ROM
i. PROM (Programmable Read Only Memory) – PROM is a blank ROM
chip that is programmable, once programmed with data the contents
cannot be changed. This is an OTP (one-time programmable) device.
4. Units of Storage
Bit – A bit (short for binary digit) is the smallest unit of storage in a computer
and is the smallest unit of data the computer can process. A bit has a single
binary value, either 0 or 1. The word Bit is derived from the words Binary
Digits.
5. Storage
Computer storage refers to the media and devices used by a computer to keep data and
instructions available for immediate or later use. Storage can be grouped into two
categories: Primary and secondary storage.
Storage refers to the media and methods use to keep program, data and information
available for later use. Secondary storage save programs and data permanently, it’s also
called auxiliary or backing storage, and is used to store data and instructions when they are
not being process, secondary storage devices are chosen for a particular use base on their
storage capacity (how much data the media can store), access speed (the time needed to
locate the data and transmit it to the CPU), portability (the ability to be easily removed and
use on another system) and cost. Every secondary storage device or media requires its own
drive.
NB: media is plural for medium and is the name given to the physical hardware on which
data is stored e.g. hard disk and floppy disk. The storage device record and retrieve data
from the storage media e.g. floppy disk drive and CD drive.
Optical storage
Magnetic media
This is the most common and cheapest way to store data. It includes media such as floppy
disk, hard disk, zip disk and magnetic tape. These types of media use some form of
magnetism to represent bits or bytes of information.
Floppy disk
Floppy disk has a storage capacity of 1.44MB. They are relatively cheap, light weight and
portable, it reads and writes data slowly and is restricted on the type of data that can be
stored due to its small storage capacity. It is also called diskette.
Hard disk
This is usually fixed inside the computer system unit; but there are external hard disks in use
today. The hard drive controls the motions of hard disk which contains the data. Hard disks
have a storage capacity of several GB and continue to increase. They are able to store and
retrieve data quickly. There are Portable hard disks in use today; additionally, most persons
interchanged the word hard drive and hard disk.
Tracks are concentric circles on the disk, broken up into storage units called "sectors." The
sector, which is typically 512 bytes, is the smallest unit that can be read from or written to.
Two are more adjacent sectors is called a cluster.
There are two types of hard disk: fixed head and moving head hard disk.
The moving read/write head moves to the track that corresponds to the data while the disk
is spinning. A fixed read/write head, as you may expect, does not move. Instead, there is a
fixed head for each track. This gives the fixed-head disk the advantage of having a faster
access time. This is so since fixed head disk has a faster seek time.
Magnetic tape
Magnetic tape are suitable for backing up large amount of data, they are slow but relatively
cheap and has a large capacity. Magnetic tapes are erasable and reusable. They store data
sequentially; this means data retrieve in the order which it was stored.
Zip disk
These are able to store between 100 megabytes to 200 gigabytes, they are removable and
portable; they are relatively cheap but a computer must have a zip drive to read these disk.
Optical storage
Optical storage can store much more data than most magnetic media. There are three basic
types of optical disk (CD [R and RW], Cd Rom, and DVD [digital versatile disk]). Optical disk
drives uses laser technology to read and write to and from these disks.
CD ROM
10
This stands for compact disk read only memory, this means data on the disk can be read but
cannot be changed or deleted; These disk are best for storing multi-media (graphics, sound
and videos) and software (word processor, games encyclopaedia etc).
DVD
This stands for digital versatile disk; these are able to store up to 17 gigabytes of data which
is the equivalent of 20 Cds. However, the most widely used DVD capacity is 4.7 gigabyte
(GB). They are best for storing full length feature films (movies).
The modern computing industry continues to develop new products to assist the computer
user.
Flash memory
The technology use with flash memory is based on EEPROM technology, flash
memory it is therefore non-volatile; flash memory is used in many electronic such as
cell phones, radio, games, PDA (personal digital assistance) etc.
11
Optical disks
- Compact Disk Backup files, Slower 700 Mb
distribute software Yes Access time
Used to store video Yes than hard 17 Gb
- Digital Versatile and backup files drives.
Disk
Flash drive Easy and fast Yes up to
information storage Faster than 64 Gb
Flash memory cards Inserted into devices Yes optical disks. up to
such as digital 32 Gb
cameras and laptops,
provide additional
storage.
NB: Memory capacity is always increasing, In the near future flash drive will surpass
64 Gb and flash memory cards will surpass 32 Gb etc.
12
number one and wants to read number SIX, it will have to read all the
numbers between ONE and SIX in order to get to SIX.
g. Direct access – Direct access, also called random access, means that the
storage device can locate a particular data item or file immediately, without
having to move consecutively through items stored in front of the desired
data item or file.
h. Device interface – A device interface determines how the storage devices are
physically connected to the computer. Three popular device interfaces are:
i. SATA(Serial Advance Technology Attachment) – This is a hard disk
interface that uses serial signals to transfer data, instructions, and
information and has transfer rates of up to 300 Mbps and higher. SATA
is the newest interface.
ii. SCSI (Small Computer System Interface) – SCSI pronounce ‘skuzzy’, is
a peripheral interface that can distribute data among peripherals
attached to the computer.
iii. IDE-IDE/ATA (Integrated Drive Electronics / Advanced Technology
Attachment) is a general purpose interface used to connect internal
storage devices such as CD-ROM drives and floppy drives.
13
14
15
16
: .
Key Terms
Speech Synthesis Speech synthesis is the artificial production of
human speech. A computer system used for this
purpose is called a speech synthesizer, and can
be implemented in software or hardware
products.
17
Hardcopy – This is permanent output since it is printed for you to review away from
the computer. It is the tangible output such as that from the printer or plotter.
Softcopy – This is temporary output. It is the intangible output such as the display on
a monitor, sound from the speaker or signals from a modem.
Human readable – Data that human can understand. If processed data can be read
by humans, it is said to be human readable.
Machine readable – Data that computer can understand. If human beings cannot
understand processed data it is said to be machine readable.
18
NB: Some books consider Microfilm or Microfiche (pronounced Microfish) to be soft copy.
But it is really a Hardcopy output.
Display device
A display device is an output device for presenting information in a visual format. The main
type of display is a monitor.
A monitor is a television like display screen that displays images on the screen. The monitor
is the most common output device and is known as VDU (visual display unit) or VDT (visual
display terminal). A computer monitor is made up of pixels (picture elements). The number
of pixel or dots that makes an image on the screen will determine the monitor resolution
and therefore tell how clear an image is. A monitor refresh rate will determine the
frequency or is the number of times in a second that display hardware draws the data on the
screen.
Pixels - These are tiny dots on the screen that emit light. Pixels are also the smallest unit on
the screen, it can be turned on or off or coloured in different shades to form images. The
higher the pixel the higher the resolution will be.
Types of monitors
CRT – Cathode ray tube, these are the oldest technology use by monitors, they are
big and heavy.
LCD – Liquid crystal display, these monitors are thin, flat and light weight. They are a
newer technology than CRT.
LED – Light emitting diode, these lights acts as a performance base to the monitor
making image quality better.
Audio devices
Speaker – A speaker produces sound from the computer. Some speakers are built into the
computer and some are separate; Sound output may be in the form of MIDI (musical
instrument digital interface) file or music from Cds.
19
Headphone – Headphone present sound output from the computer. They are similar to
speaker, except they are worn on the ears so only the person wearing the headphone can
hear the output.
Printing devices
Plotter- A plotter works by moving mechanical pens across the surface of the paper in order
to produce continuous lines that may vary in thickness or colour, plotters produce very
precise high quality diagrams at a very fast speed and are therefore suitable for engineering
applications. There are two types of Plotters, one where the paper moves (drum), and the
other where the paper is stationary (flatbed plotter). Plotters are way more expensive than
printers. Plotters are mostly used to print large outputs such as architectural diagrams,
maps, car designs and large posters.
Printers
The purpose of the printer is to display on paper the information shown on the computer
screen. The quality of what is on paper and how fast the information is put on the paper is
dependent on your choice of printer.
Characteristics of printers
There are two types/categories of printers: impact printers and non-impact printers.
IMPACT PRINTERS
20
With this type of printer, a hammer strikes an inked ribbon on to the paper to form a
character, like a typewriter. Impact printers are noisy and do not usually print acceptable
graphics. They are suitable for printing multiple copies using carbon paper.
Advantages
Less expensive
Can make multiple copies of a document
Disadvantages
Noisy
The printer quality is poor
Poor graphics or none at all
Impact printers include Dot Matrix, Daisy Wheel, Line printer and 'Band' or 'Train' printer.
Dot Matrix
This printer is relatively inexpensive and can print between 100 - 200 cps.
Typically, a character is made up of a dot matrix 5 x 7. The characters are
printed one at a time.
Advantages
Inexpensive
Can make multi-copy forms.
Disadvantage
Slow
it has very poor printing quality
Daisy Wheel
21
Advantage
Disadvantages
Advantages
Disadvantages
Very expensive
Very loud.
Line Printers
The line printer is an impact printer in which one line of text is printed at a time. Line
printers have speeds in the range 150 to 2500 lines per minute. Characters are held on a
cylinder which prints a complete line of text during one revolution of the cylinder.
Advantages
Very Fast
Disadvantages
Noisy
Prints only black.
22
NON-IMPACT PRINTERS
With this type of printer there is no actual striking of the paper. Instead, it uses ink spray or
toner powder, heat and special paper. These printers are more expensive than impact
printers and print faster and silently.
Advantages
Quiet
They can print graphics and often a wider variety of fonts than impact printers.
Disadvantages
The ink jet printer, in comparison to the dot matrix or daisy wheel
printer, has a much faster printing mechanism. Characters are
formed by spraying ink on to the paper. Colour graphics can be
produced by spraying cyan, magenta, yellow and black ink onto the
page.
Advantages
It is quiet
It produces high-quality text and graphics
It is able to print colour
It is faster than impact printers.
Disadvantages
Thermal Printer
23
Advantage
It is quiet
Disadvantages
Laser Printer
Laser printers are extremely fast and they can produce high-quality
output. They can also print one page at a time. Laser printers work like
a copy machine, using toner(dry powdered ink) and a heat bar.
Advantages
Disadvantages
Firewire – Port that can connect multiple types of devices that requires faster data
transmission speeds.
24
Expansion slot – Socket on a motherboard that can hold an adapter card. An adapter
card is a circuit board that enhances functions of a computer of a system unit and /
or provides connections to peripherals.
10.Describe how data are stored and manipulated within the computer.
Representing numbers as bases
The base determines the number of digits that are available in a number system.
Bases are normally place as a subscript such as 34 10, 10102, 728, and 3716
The following are four main types of number systems used in computers:
The decimal number system or base 10 number system is a number system that
involves ten digits (0, 1, 2, 3, 4, 5, 6, 7, 8, and 9). This is the number system that is
used by us in our daily lives.
The binary number system or base 2 number system is a number system that
involves two digits (0 and 1). This is the number system used by computers for
processing.
The octal number system or base 8 number system is a number system that
involves eight digits (0, 1, 2, 3, 4, 5, 6 and 7).
The hexadecimal number system or base 16 number system is the number
system that involves 16 digits (0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E and F).
Types of numbers
- Natural numbers e.g.: 1, 2, 3, 4, 5, 0.
- Integer numbers e.g.: -5, -6, 7, 8, 4.
- Real numbers e.g.: 5, 5.5, 5 ¼, 9.
- Whole numbers e.g.: 1, 4, 7, 8.
25
o Speed: As the ‘brain’ of the computer, the CPU determines how fast
instructions can be carried out. The CPU contains a clock. Each time the
clock ‘ticks’, one instruction is carried out. So the faster the clock ticks,
the more instructions can be carried out. The processor speeds of most
personal computers (PC) are measure in MHz (mega hertz) or GHz (Giga
Hertz). MHz means that it can execute approximately 1 million
instructions per second and GHz means that it can execute approximately
1 billion instructions per second. (Hertz – is the basic unit of
measurement of computer speed, in cycles per second).
o Type: The CPU type determines the type of application for which a
particular type of processor is used. For instance mainframe computer
CPU would be different from a PC CPU. Three main types of Intel
processors are (Pentium, Core and Celeron) and four main types of AMD
processors are (Athlon, Sempron, Turion and Phenom). Intel processors
are little more expensive than AMD’s due to the small difference in
performance. Based on the performance requirement for a specific task
you have to decide which processor you need to buy.
Main memory: It is important to know the memory capacity, type, word size
and speed of main memory.
o Capacity: More memory capacity indicates that it can hold more
programs at a time, which will improve the computer performance.
Modern PCs, memory capacity is measured in GB.
o Type: There are two main types of RAM (SDRAM – Synchronous Dynamic
RAM and RDRAM – Rambus Dynamic RAM). RDRAMSs are faster and
more expensive than SDRAM, are used mainly for high performance
computers. SDRAMs (also called PC100 or PC133) are more common and
can be Double Data Rate (DDR) RAM, which offers double data transfer
rates.
o Word size: This determines the number of bits that can be stored and
processed at a time by the CPU.
o Speed: RAM speed indicates how fast the chip updates the data that it
contains. In modern PCs, RAM speed is measured in Mega Hertz (MHz).
Hard disk: The two main specifications to note for a hard disk are its storage
capacity and its speed.
o Capacity: The storage capacity of a hard disk determines the amount of
information that it can store for later use. More hard disk space means
more programs and data can be stored. Current Hard disk capacities are
measured in Gigabytes or Terabytes.
o Speed: Hard disk speeds are normally expressed as data transfer rates or
revolution per minute. The data transfer rate measures the speed by
which data can be transferred from the hard disk to the CPU. The rate at
which data can be transferred partly depends on how fast the disk spins.
Information Technology Revision Notes: DO NOT COPY
V
3rm
26
This spin speed is measured in revolutions per minute (rpm). For example
7200 rpm.
PORTS: A computer system needs to send and receive information from
peripheral devices. A port is a piece of technology that is used to connect
external devices to a computer system. There are Different kinds of ports such
as:
o Parallel port
o Serial port
o USB
o Firewire – Used to transfer video images from digital devices at a very
high speed.
Expansion slots: These are sockets found on the main circuit board
(motherboard) that are used to insert additional circuit board. They can be used
for adding more memory, graphics cards and other special devices. Three types
of expansion slots are:
o PCI (Peripheral Component Interconnect) – used for attaching sound
cards, network cards and video cards.
o AGP (Accelerated Graphics Card) – mainly used for connection Graphics
cards.
o ISA (Industry standard Architecture) – used for attaching modems and are
not commonly seen on most modern computers.
All of the hardware specifications listed above is very important when purchasing a new
computer. Consequently, the brand of a computer should not be the only thing a person
looks for when buying a computer. One should carefully assess a computer using his/her
knowledge of hardware specifications before spending thousands of dollars to buy a
computer system.
27
System software:
System software: are programs that control the computer hardware. It enables the
running of the application software and the management of the system resources.
The operating system, translator and utility programs are the three major categories
of system software.
28
File management
File management describe the method use for organizing files on storage media.
Windows explorer is a file management utility that maintain a directory of each
device.
File
A file refers to a document that is created within an application. Each file is
given a name by which it may be identified. A complete file name carries two
parts, the name and the Extension. Example “Student.doc” the extension
indicates the nature of the file (that is the program use to create or that will
open that file). In the example “student” would be the file name, while .doc
would be the extension. Files are grouped together and pasted within folder or
directory. Directory allows files that are in some way related to be placed in one
location.
A new disk does not have any folders but a single base position called the root
drive. The root drive will be:
C:\ or (C:/on some systems) for hard drive
A:\ or (A:/ on some systems) for floppy disk
D:\ or (D:/ on some systems) for CD-ROM, DVD etc
Path
A path is use to locate a file. It is the sequence taken to get to a specific folder or
file. A path always starts with a drive letter e.g.: C:/cxc/unit1.doc where C:\
represents the drive (hard disk), cxc represents the folder, unit1 represent the
file name and .doc represents the extension.
C:\ Unit1
Data mining ethics
Unit2
Information Technology Revision Notes: DO NOT COPY
V
3rm
29
Intro to programming.doc
Grade 10
C:\Unit2\intro to programming.doc
C:\Unit1\data mining ethics
C:\Grade 10\
Application program
Application program: carries out specific tasks for a user, but they are not essential
for the computer to work. If you want to type a letter, you would need to use a word
processor.
30
o Well tested
o Disadvantages
o Might not contain all features required by a user.
31
Multitasking – The concurrent execution (at the same time) of two or more related
tasks. A group of cooperating tasks is executed simultaneously to achieve a common
goal. Or when the operating system allows the user to perform several tasks at the
same time, switch between them and share information. For example, in the
windows operating system a document can be edited while another document is
being printed.
Terms to know
- Single user – This is where only one person can use a computer system and have
access to all the computer resources at a time.
- Multi user – This is where many users can access the computer system
simultaneously, each having different access right and share resources.
- Single tasking – This is where only one program can be used at any one time
14.Processing modes
Data can be processed in four ways: batch processing, online processing, real-time
processing and time sharing.
a. Batch processing is when a number of transactions, or jobs, are processed in
one go. The jobs are processed from start to finish, and generally require very
little or no user intervention. Batch processing is useful for a high volume of
transactions that need not be processed immediately. Once a batch job
Information Technology Revision Notes: DO NOT COPY
V
3rm
32
15.User Interface
This controls how you enter data and instructions and how information is displayed
on the screen; allows the user to communicate or interact with the computer. Users
can interact with a computer through a software interface or a hardware interface:
Software Interface
There are three broad types of software user interface (graphical user interface,
Command line and menu driven).
a. graphical user interface (GUI – pronounced goo-ee), you interact with
menus and visual images such as buttons and other graphical objects such
as windows, icons, menus and the pointer (WIMP) to issue commands. It
is friendlier to use, even a novice computer user will be able to interact
with this interface.
b. In a command-line interface (cmd), a user types commands or presses
special keys on the keyboard to enter data and instructions. It is difficult
to use since the user must have knowledge of the code to be able to use
this interface.
33
c. Menu-driven interface displays options for tasks and action you can
perform by choosing relevant options.
i. Pull-down menus drop a list of options when they are clicked. You
typically find pull-down menus across the top of the screen, in the
menu bar. Also called drop-down menu.
ii. Pop-up menus are usually activated by a right mouse click and are
displayed wherever the cursor is on the screen.
CMD GUI
a. Braille keyboards allow a user to use their sense of touch to type letters
into a computer. Are available for blind users.
b. Touch screen – on a touch screen there is a visual display where a user
presses icons and buttons using their fingers or a stylus. Touch screen
make the input much faster than a keyboard and mouse.
Information Technology Revision Notes: DO NOT COPY
V
3rm
34
Finding the correct solution to a problem can be considered as problem solving. Problem
solving involves identifying, analysing and resolving problems using logic, reasoning skills and
analytical skills. There are five general steps in problem solving:
Steps in problem-solving
Definition of the problem
Propose and evaluate solutions
Determination of the most efficient solution
Develop and represent algorithm
Test and validate the solution
35
36
o Terminate
5. Representing algorithms
Algorithms are represented using Pseudocode or Flowcharts. A Pseudocode is a
language consisting of English-like statements used to define an algorithm while a
flowchart is a pictorial representation of an algorithm.
Uses of flowchart symbols: The six basic shapes are:
Pseudocode Keywords
For Input – Read, Input, Get
For Output – Print, Output, Display, Write
Assignment operator -
37
Statement(s)
ENDFOR
o While Loop
READ variable
WHILE condition DO
Statement(s)
READ variable
ENDWHILE
o Repeat Loop
REPEAT
Statement(s)
UNTIL condition
Control Structures
Control structures determine the execution sequence of statements or
instructions in an algorithm/program. The three main types are sequence,
conditional branching and loops.
Classification of loops:
38
Operators:
Relational Operators <, >, = Less than, greater than, equal to.
Relational Operators <=, >=, <> Less than equal to, greater than equal
to, not equal to.
Logical Operators AND, OR, NOT And, or, not.
Arithmetic +, -, *, / Addition, subtraction, multiplication,
Operators division.
39
A quick and easy way to test whether your algorithm works is to use a dry
run test, also called desk checking. This is where you substitute values for
variables and follow the instructions in the algorithm step by step to arrive
at a solution. A trace table is used to hold the values during dry run test
40
Third generation is also called 3GLs. 3GLs use a series of English-like words to
write instructions.
o Third generation language are procedural languages i.e. the programmer
writes instructions that tell the computer what to accomplish and how to
do it. Example: Pascal, C, java, BASIC, FORTRAN.
41
Fifth generation also called 5GLs. These are nonprocedural languages meaning
that the programmer states the goal to be achieved, but not the steps required in
order to achieve the goal. Example: Prolog and Mercury
o 5GLs computers will be able to communicate in natural spoken language
with their users. However, they are very complex to design, programmer
must be highly trained. These languages are used extensively in artificial
intelligence research.
42
43
Example:
Var
Number : integer;
firstName : string;
7. Manipulating data
Pascal keywords
o Reading from (keyboard, files etc) – Read() or Readln()
Information Technology Revision Notes: DO NOT COPY
V
3rm
44
- The / operator can be used with integers or real numbers but always produces a
result that is a real number. The result must be stored in a variable that has been
declared with the real data type.
- The div operator can only be used with integers and the result is always an integer.
It is usually used with the mod operator, which gives the remainder after a div
operation.
Conditional branching:
IF-THEN
IF condition THEN
BEGIN
Statement(s);
End;
IF-THEN-ELSE
IF condition THEN
BEGIN
Statements_if_true;
END
ELSE
BEGIN
Statements_if_false;
END;
Information Technology Revision Notes: DO NOT COPY
V
3rm
45
Loop: WHILE
Read controlvariable;
WHILE condition THEN
Begin
Statement(s);
Read controlvariable;
End;
Loop: REPEAT
REPEAT
Statement(s);
UNTIL condition; All the For Loops learned in
Pseudocode can be implemented in
Pascal.
Loop: FOR
For variable := 1 to end_value DO
begin
Statement(s);
End;
46
E.g.
Var
ExamMark: array [1..5] of integer; [array size is 5, therefore can store five items]
E.g.
ExamMark [1] := 8;
47
Var
my_array : array[1..6] of integer;
counter : integer;
Begin
Writeln (‘each value in the array’);
For counter := 1 to 6 do
writeln (my_array[counter]);
End.
The array is called Fruit; the bottom row contains the subscript or
index. Notice the subscripts are arrange from 1 to 4. You cannot
construct an array with random numbers for subscripts.
The top row contains each array element. There are four array
elements and each one has been assigned the name of a fruit.
Element 2 of Fruit has the value “orange”.
Internal documentation
a. Internal documentation is also called technical documentation.
Programmers write technical guides that may have indexes and
mnemonics used in coding details of how the program was written.
Technical guides may contain diagrams, flowcharts and algorithms to
help explain the program. In Pascal documentation can be written
using the { } symbols. Anything between both symbols will not be
executed by the computer.
48
49
f. Transmission media – Are the cables and signalling methods that carry data
communications from one point to another in a network. It can be cabled
(wired) or wireless.
50
Wireless Networks
o Bluetooth technology allows devices to connect to each other
automatically. Bluetooth-enabled devices can transmit radio signals
within a short range. It can establish a connection with another
Bluetooth enabled device (another device that can accept a responses
in the same range).
o Wi-Fi Is a wireless protocol for data transmission that is used in LANs
and for internet access. Wi-Fi allows data to be transmitted quickly
between connected devices. Wi-Fi enabled devices do not need direct
line of sight to communicate with each other.
g. Hotspot – A public place where users can access Wi-Fi network and gain
access to the internet or network resources.
h. Modem – A modem (modulator / demodulator): A device that connects a
computer to a telephone or cable television network and allows information
to be transmitted to and received from other computers. This device
converts signals from analogue to digital and vice-versa. The word modem
derives from the word Modulator and Demodulator. Modem is both an Input
and Output device.
i. Bandwidth describes how much data can be transmitted at a time. The
greater the bandwidth, the faster information can be sent and retrieved. Or
Bandwidth measures the capacity of a communication channel. The larger
the bandwidth, the more signals can be sent. The channel with the biggest
capacity is usually referred to as broadband. Three bandwidth are outlined
below:
Information Technology Revision Notes: DO NOT COPY
V
3rm
51
52
53
54
example.com – this part is the domain name for the website. Domain
names are purchased from a domain name registrar.
Viper – this is a folder or directory in the root folder.
contact.htm – this part is the name of the file. In this case, the
filename ends in .htm so it must be a web page.
r. E-commerce – Buying and selling of goods and services over the internet.
s. E-learning – this is a type of computer-base learning. Students are able to
stay at home or someplace else and take classes offered by local schools or
foreign schools.
t. Pod-casting – This is a form of audio broadcasting using the Internet. It can
be downloaded from the web using a web feed. RSS is the most common
type of web feed.
u. Bulletin board – This is a central system on the Internet that allows people to
post messages about a subject.
v. VoIP – Voice over Internet Protocol. It is a protocol which governs the
transmission of voice over the Internet. VoIP is also known as IP Telephony.
w. Client – The term client machine refers to a user's computer that is connected
to a network and accesses another computer, called a server, to request
various kinds of resources, to save data or to run certain programs or perform
certain functions. Sometimes the term "client" is used interchangeably with
client machine, but client is a less specific term that can also refer to a
computer application rather than an actual computer.
x. Peer – is one single computer used to communicate with other computers
y. Search Engine – This is a software or facility on the internet that allows for
the searching of specific information; Google, Yahoo, and Bing are examples.
Software Restrictions:
a. Passwords – This is a private combination of characters associated with a user
name that allows access to certain computer resources, only persons who
know the password will be able to gain access.
b. Encryption – This is the process of encoding data and information to an
unreadable form.
c. Virus protection – this locates and deletes virus on a computer system. A
virus is a computer program that has been created in order to cause damage
to computer systems.
d. Firewall – A firewall is software or device that defends the weak points in a
computer network to prevent hackers from gaining entry. It also blocks
access to certain websites.
Information Technology Revision Notes: DO NOT COPY
V
3rm
55
56
57
58
In this section we will look at some of the different software and hardware requirements
different groups or sector would use:
59
Car manufacturers use CAM and robots to assemble cars. The hardware
requirements of a manufacturing organization are the robots as well as a
server and microcomputers. The software will be specialized software or
custom made software to control the robots and instruct it to complete
given task.
The hardware requirements could be powerful microcomputers or even a server that can
process data and store a lot of information, as well as sensors that can gather the data.
Education
Schools and other educational institutions use computers in several ways:
— Software can help students understand a subject better. Some software can simulate
science experiments.
— Software is available for disabled persons and hardware such as Braille keyboard
to assist blind persons. Screen readers reader can also be used to read out the text on a
computer screen to visually impaired students.
60
— Persons can attend school or classes from the comfort of their home
—Students can do research on the Internet and put together projects.
— Database can be used to store information on staff and students
Law enforcement
Law enforcement agencies use computer technology to help them investigate
crimes and settle cases faster and more efficiently. The names, photos and details of
criminals are kept on databases.
Here are the software requirements:
—database management systems that can store information on criminals.
—software that can collect forensic evidence and analyze DNA.
—Software for monitoring, such as phone-tapping software or
software that the police use to track vehicles and people.
61
—playing music and putting together their own personalize playlists to play on a MP3 or
MP4 player.
—using the internet to listen radio.
—editing and creating videos they can burn on to DVD.
—playing a variety of realistic-looking games that cover sports, combat, strategy, driving,
flying and many other themes.
You will need the software for your chosen recreation. For example, to edit photos you will
need photo-editing software such as Adobe Photoshop.
Music
The music industry uses computer technology for a range of tasks. Computers are used to
create sound tracks or even edit previous music. Studios use computers to modify the
quality of music, and add sound effects. Most music software at large music companies is
custom-written, but there are programs such as FL Studio 11 which music professionals can
purchase in stores. Some hardware requirements are computers and servers to run the
software and the recording and editing equipments.
62
Computer skills
Nowadays staffs are expected to have some sort of computer skills, which they will need
to do their jobs. Job advertisements often specify exactly what skills are required.
Engineers
Engineers normally complete complex tasks and are required to use computers for
assistance. Engineers need to be able to:
—use engineering software, such as CAD and CAE software
—use plotters
—design computer systems for what they are doing, such as systems to control
machinery design.
Medical staff tends to have very hands-on jobs, because they are dealing with patients
and medicines. But medical staff also:
—access and modify patient records stored in databases
—use equipment to monitor patients' health and to perform surgical procedures
—use software to track medical inventory, patient admissions and patient discharges
—use databases and the internet to research symptoms and see the latest medical
developments.
The movie industry is increasingly using computers to create and edit movies. People in
the movie industry use:
—animation software and graphics editing software
—special effects software.
—Sound effects software
63
Mass media workers are journalists, reporters, photographers and anyone else who
contributes to the widespread availability of information and news. They should be able
to:
—use word processing software
—combine photos, text and graphics using desktop publishing and graphics
manipulation programs
—use the Internet to carry out research and publish items.
—take photos and use a computer to edit and publish items for newspapers
Law enforcement workers range from police officers to trained investigators in forensic
labs. And need the following basic skills:
—access database records, such as the details of known criminals
—scan in biometric data, photos and other information that can be used
to solve and prevent crime
—use basic forensic equipment, such as software that performs DNA analysis
Loss of jobs
Computers now do a lot of work that was once done by people. Robots and machines can do
difficult tasks, dangerous and repetitive tasks without losing concentration, getting tired or
complaining. Computers have made many office workers redundant. Now people send e-
mails instead of using the post. As computers are used more and more in the workplace,
people with few computer skills may be replaced by people with many computer skills.
Retraining
Technology in the workplace requires employees to be trained how to use some software
and computer systems. They need to be retrained if the software is updated or replaced
with other software. To keep up with the latest technology, people need to be trained at
work, at school and in tertiary education. Training is often costly and time consuming.
Training materials can be expensive and the business loses productive hours from its
employees. But properly trained employees can do their jobs better and will not struggle
with unfamiliar programs and software.
64
Telecommuting
Computer technology allows persons to work from home instead of travelling to work. These
workers are usually people that need few meetings with clients or colleagues. Many writers,
editors and computer programmers work from home. They need to have a computer and
internet access, and they may be able to connect to the office network remotely. A person
who works from home saves on travel time, travel costs and contribute less to Global
Warming. Working at home is less stressful than working in an office and there is no need to
wear office clothes. But there is very little social interaction and there is the possibility of
being lonely. Additionally, it is very difficult for managers to monitor employees who work
at home.
Improve Productivity
If used correctly, computers in the workplace can improve productivity and contribute
positively to the goals of the company.
65
f. Network administrators – They set up new networks, add and remove users,
monitor resource use over a network, and ensure that all users have the
necessary software and hardware. They carry out all necessary maintenance
of the network.
g. File librarians – They store, achieve and retrieve data, as well as controlling
the distribution of data. File librarians normally works in the data library and
keeps track of the tapes and disks that are stored and logged out for use.
h. Computer technicians – They assemble and fix computer problems. Some
can also fix peripheral devices and at times lay cables to printers and phone.
i. Computer engineers – They design computer configurations/hardware and
determine the cabling and power requirements for a network. They also
develop computer chips. They design processes for the manufacturing of
computer parts.
j. Software engineers – They work on the overall design and creation of the
software systems, similar to an analyst. They use mathematical and scientific
processes to develop software.
k. Software testers – They test all aspects of a program using test cases. They
try to find bugs in a program and make sure the program is doing what it is
suppose to do.
l. Webmaster – They put a finished website online and look after it. They make
sure it works properly and update it when necessary. They monitor web
pages and the traffic they receive and respond to external inquires regarding
web operations. The webmaster can also be the web-developer.
m. Web-developer – They create websites for the Internet and other interactive
services on the web. A web developer is also a webmaster.
n. Software trainer – They teach people how to use software. They explain and
demonstrate all aspects of the software that the trainee needs to understand.
o. Multimedia artists and graphic designers – They combine computer skills
with artistic flair to create computer graphics, adverts, animations and other
forms of multimedia.
p. Electronic data processing auditor - closely examines data processing
operations to guard against loss through mistakes, carelessness, or fraud;
brings problems to the attention of managers or authorities.
q. Data communication specialist - Designs, implements and administers
Metropolitan Area Network (MAN) and complex Local Area Networks (LAN)
such as Virtual Local Area Networks (VLAN) and Wireless Local Area Networks
(WLAN) and provides technical advice to Local Area Network (LAN) support
staff on complex issues involving network design, configuration, security, and
performance.
66
Information processing refers to computer-based systems that takes in data and generate
information. It is also when a machine or processor interacts with the outside world and acts
on the input it receives.
Information processing has many benefits that make our lives easier and more efficient:
It makes a lot of tasks easier and faster. Such as online bill payment or cashless store
purchase.
Information Technology Revision Notes: DO NOT COPY
V
3rm
67
A lot of data is stored during information processing. This data can be accessed quickly
and easily by authorised persons.
With information processing information is easy to pass along and stored. It facilitates
easy access of Information and analysis. This means that trends can be spotted faster
and people can share ideas on how to improve processes.
Once an information processing system has been set up, it is often easy to maintain.
Overall security can be increased due to less human intervention with the actual
processing.
It can be very expensive to set up initially because of the hardware, software and
technical requirements.
Depending on the system, it can be expensive to maintain.
Hardware and software must be replaced and kept up to date, and specialists are often
needed to operate these systems.
Some jobs may be lost as a result of computerisation.
Some staff must be trained or retrained.
Face-to-face interaction between staff may be reduced.
We are very reliant on information processing systems. When they fail or do not work
properly, it can cause disruption and disorder. For instance if an automatic teller machine
(ATM) is not working, people will be unable to withdraw money.
Control systems
A control system is a device, or set of devices, that manages, commands, directs or
regulates the behaviour of other device(s) or system(s). They are widely used in our
everyday lives:
Household appliances use control systems to sense when they should start operating,
how they should operate and when to stop.
Traffic lights are programmed to control the flow of traffic. Many traffic lights also
contain sensors that can tell when there are cars waiting at a red light and change it
to green.
Information Technology Revision Notes: DO NOT COPY
V
3rm
68
Alarm systems use heat and motion sensors to determine whether an intruder is in
a room.
Thermostats sense when the temperature is below a set value and switch the
heating on. They switch off when the temperature reaches another set value.
Key Terms
Control system
Control system use computer to control machinery and robots.
Automation system
Automation system Are a straightforward type of control system in which tasks are carried
out automatically.
69
industries. Computers automate tasks and do them more efficiently and effectively than
humans. They control robots to package products or assemble cars and electronics.
Electronic circuit boards are often assembled using computer systems.
Sources of Data
To create useful information from data, you must get that data from a suitable source. Data
can be captured using machine-readable or human- readable documents.
source document
A source document is one that contains data that is going to be inputted into a computer
system for processing. Source documents are human-readable, which means that a person
will read and enter information into that document. The best example is a form, which may
be a hard copy or electronic copy. A form contains spaces and blocks that allow a person to
enter relevant details. The data is then entered into a computer. Forms are used for surveys,
censuses, opinion polls, applications and market research, among other things
Turnaround document
A turnaround document is a machine -readable document that has some
information printed on it by a computer but has more information added to it by a
human. It is then fed back into a computer to transfer this newly ad ded
information. These documents serve two main purposes. They
To verify the accuracy and completeness of information that has already
been entered.
Update information already entered with additional data.
Examples are utility bills, such as water bills, with the perforated section that is completed
by the customer and then used as input.
70
or indirect methods. Direct methods of data capture are when a computer uses sensors or
peripherals to capture the data directly from the document. Turnaround documents are
designed for direct data capture. Sample direct data capture:
optical mark recognition
magnetic ink character recognition
Indirect methods of data capture are when data has to be taken from a source
document and physically entered into a computer. A person called a data capturer, or
data entry clerk, types everything on the document into a computer. It does not
require direct input technology but it is error-prone and quite time-consuming.
Information management
This ensures that all data is input accurately, stored correctly, retrieved easily and output in
a way that provides useful information.
—Accidental errors are errors that are not made on purpose. The incorrect birth year on the
passport was an accidental error.
—Typographical (transcription) errors are the typing errors that persons make when
they hit the wrong key. E.g. qather (father)
71
—Transmission errors occur when data is sent from one computer to another. The
data received by one system is not the same as that transmitted by the sender.
—Deliberate errors are errors made on purpose, usually for gain or to cause disorder. To
get a bigger loan, someone may enter false information about their salary on a loan
application.
There are two ways to prevent data errors caused by humans: data verification and
data validation.
Data verification
Data verification takes place when a person checks to make sure that data has been
correctly keyed into a computer system. This type of check does not guarantee the
inputted data will be correct, since the source document might have inaccurate data.
Data validation
Data validation checks are carried out by a computer system when data is entered. It
checks the input data for errors before it is processed.
Data verification
Data verification ensures that data entered into a computer contains no errors at all. It is a
very thorough way of making sure the data entered is correct. Two methods of data
verification are double-entry and proofreading.
Double-entry is where the same data is entered twice, sometimes by different people. If the
data differs between the two entries, it does not get processed. It can be expensive and
time-consuming to use this method, but it does ensure very accurate data capture.
A simpler example of double-entry is when a program asks you to retype a password,
perhaps when you set up an e-mail account. When you type, the screen shows only asterisks
(*) so that no one can see your password. But this means you cannot see whether you have
mistyped any characters. Without double entry, if you mistype a character when you set up
your password, the password in your head will not match what you told the program and
will be rejected when you type it correctly. Double entry asks you to type the password
twice and accepts the password only if the two versions match. It is possible to make the
same typing mistake each time. Then the password for the program will still be different
from the password in your head.
Proofreading checks the data entered against the data on the original source document, the
person entering the data reads the source document and check, that it matches what he or
she has entered into the computer. Sometimes a second person will check the entered data.
This is very time-consuming.
72
If you have to enter large amounts of data from documents into a computer, it may be wise
to proofread the data you have entered. It is easy to make mistakes when you have been
working on the same task for a long time.
Data validation
Data validation uses a variety of checks to make sure that data is as accurate and
complete as possible. It does not check the complete accuracy of data, but it does help
ensure that fewer mistakes are made. If data does not pass the checks, the program may
return an error or the field will not be filled in. The checks compare the user-entered data
against a rule. The check depends on the type or nature of data that is entered. Here are
some Data Validation checks: Range checks, Reasonableness checks, Data type checks,
Consistency checks, Presence checks, Length checks, Check digits, Parity checks.
Range checks
A range check ensures that numerical data entered fall within a specific range. If you are
entering times of the day, you may need to check that the values for hours cannot go higher
than 24. If someone enters 25 hours by mistake, that value will not compute.
Reasonableness checks
Reasonableness checks ensure that data is reasonable— not completely unrealistic. If you are
entering salary information into a payroll system, a reasonableness check will ensure that you
do not enter extra zeros by mistake.
Consistency checks
A consistency check compares the contents of two or more fields to make sure that they
make sense. For instance, if you enter a person's year of birth and their age in separate
fields, a consistency check will ensure that the two fields correspond with each other.
Consistency checks can be used to make sure that false or dishonest data has not been
entered.
73
Presence checks
Documents and forms have required fields and optional fields. A required field is one that
has to contain a value whereas an optional field can be left blank. A presence check is used
to ensure that the required fields contain data.
Length checks
A length check determines whether the entered data is the correct length — the right
number of digits. Area codes and phone numbers usually have a fixed length. If a number
is entered that is longer or shorter than this length, the program will return an error.
Check digits
A check digit is an extra digit added to the end of a code, this extra digit is calculated from
the other digits using an algorithm. Barcodes and other number sequences include a
check digit.
Parity checks
Data transmission sometimes corrupts 1s and Os by changing a 1 into a 0 or a 0 into a 1. One
change can be detected by adding a parity bit. In an odd-parity system the parity bit is set so
the total number of 1s in a bit pattern is an odd number. In an even-parity system the parity bit
is set so the total number of 1s in a bit pattern is an even number.
Suppose you want to send 10011 using odd parity, there are three 1s, there is an odd
number, so the parity bit is 0. You send 100110, which consists of data 10011 and parity bit
0. Now suppose that one data bit is corrupted during transmission so the receiver gets
100010, which consists of data 10001 and parity bit 0. The received data contains two 1s, so
the parity database bit should be 1. The parity check would detect that a data bit was
corrupted during transmission.
Files need to be organised so they are easily accessible and easy to update when
necessary. People and organisations capture and store a lot of data. A database is an
organized collection of data. Viper Manufacturing is a large company that uses a
database to keep data about all aspects of the business. The database has several
components:
—A file is an entire set of data. For example, Viper Manufacturing has a file in its database
that contains information about all its suppliers. A file can be a collection of as many
records as needed.
Information Technology Revision Notes: DO NOT COPY
V
3rm
74
Sequential access means accessing records one by one in the order they are stored until
the right one is reached. This type of access is used with sequential file ordering. It can be
slow if there is a lot of data to go through, but it is very effective for accessing, viewing
and modifying records in large batches. Serial access works in the same way - the records
are read one by one in the order they are stored until the desired record is found.
Random file ordering, also known as direct access file ordering, is where files are stored
in any order. The computer maps where all this data is stored so you can immediately
access it when you search for it. This type of file ordering is useful if you want fast
access to records, or if you want to store data that is unrelated or does not need to be in
any particular sequence.
Random access, or direct access, allows you to access the record you want without
75
76
WORDPROCESSING
1. Difference between copy and cut: cut deletes what is selected but stores it on the
clipboard.
Copy stores a copy of whatever is selected on the clipboard. Past put onto a
document a copy of the last item stored on the clipboard.
2. Mail merge –this is a feature that allows a person to type a document and send it to
multiple recipients.
Two main parts to mail merge:
i. Main document (primary file) – contains the document or letter which
should be sent to each individual recipient. It also contains merge
fields.
ii. Data source (secondary file) – contains the personalised information
for each recipient, that would vary in each document, such as names
and addresses.
3. Formatting and formatting features
Word processing allows you to format the text and the document. You can apply
different styles to your text and the change the layout of you document. This helps
to make your document look neat and professional.
a. Character formatting
i. Character formatting can be controlled using the Font group on the
Home tab. Listed below are a number of character formatting you can
apply to your text:
Bold – makes the text thicker
Italic – pushes the text into a right slant
Underline – draws a line underneath the text
Font types and Font sizes. (Fonts are the different
character styles you can apply to text, such as Arial,
Times New Romans and Comic Sans Ms)
Case Change (upper case or Lower case)
Highlighting and text colour
Superscript and subscript. (Superscript character is one
that is raised above the normal line. E.g. 4th. th would
be the superscript). (subscript characters are placed
Information Technology Revision Notes: DO NOT COPY
V
3rm
77
b. Document formatting
i. To change the appearance of a document there are a number of
features you can use. A number of document formatting can be
controlled using the Paragraph group on the Home tab. Some of these
features are listed below:
Justification – refers to how text is align. There are four
main types:
o Align text left – lines up text with the left margin and
the text on the right is ragged (text on right can vary in
length).
o Center – lines up text in the centre of the page, left and
right sides are ragged.
o Align text right – lines up text with the right margin and
leave the left side ragged.
o Justify: lines up text with left and right margin, no side
is ragged.
78
79
PRESENTATION
1. Presentation – is a talk to an audience that can be supported by a slide show.
2. Slide show – is a sequence of slides that can be used in a presentation.
3. Slide – a slide is a single ‘page’ that can be shown on a screen to an audience.
4. Uses for presentation software (such as Microsoft PowerPoint)
Enhance public speaking
To deliver lectures
To present projects and reports
To effectively present sales and marketing ideas
5. Wizard –is a short program within a software package that asks the user basic
information and then creates a complete document or slide show.
6. Thumbnail –is a small version of an image that is also available in a full size version.
7. Title slide – the first slide in a slideshow.
8. Placeholder – a box that holds an individual item, such as a block of text, on a slide.
9. Slide layouts – this deals with how text and other graphics are arrange on the slide.
10. Template – this is a document written in a software package that can be used over
and over again for a variety of purposes.
11. Slide master-is a special slide where you can create your own design. Your design is
then applied to all the slides in your slide show.
12. Speaker notes – are notes that do not display on a slide. They are only visible to the
person who controls the computer for the presentation.
80
Views of slides
Normal view – display three panes (the outline pane on the left, the task pane on the
right and the notes pane under the slide pane.
Slide sorter – shows thumbnails of all the slides. If you want to change a slide order,
delete a slide, etc, you can use the slide sorter view.
Slide show view – displays the slides full screen as they will be seen in the
presentation.
Notes page – displays a document with the slide at the top and the notes from the
notes pane underneath.
N.B. All the formatting features that is available in Microsoft word is also available in
Microsoft PowerPoint (font size, colour, etc).
If there is a STAR on a slide it means some form of transition effects has been applied to the
slide: An example is shown below. The star is usually shown near one of the corner on the
slide.
81
2. You should design your website with the intended audience in mind: think about the
colour you will use, layout and the language used.
There are four important features to consider when you design a website:
i. The number of pages needed
ii. The content of each page
iii. A site map – (a graphical representation of all pages in a website and how
they link to each other)
iv. The layout of each page
3. Home page – This is the parent page where all other pages link to.
4. Index page – is the first page that is downloaded when a visitor goes to a website.
The index page may or may not be the home page.
5. Web authoring tools - a program that helps you write hypertext or multimedia
applications. Authoring tools usually enable you to create a final application merely
by linking together objects, such as a paragraph of text, an illustration, or a song.
Tools that do this are called WYSIWYG tools (what you see is what you get). Example
web authoring tools are Microsoft FrontPage 2003 and adobe Dreamweaver.
6. Hyperlinks – is a piece of text or part of picture that you click and it takes you to
another web page or section of the web page. Hyperlink text is normally coloured
blue.
N.B.: There are a number of other endings that are available. A quick Google search
for “top level domain” would return other types. Domain names ending can also
82
identify in which country a web site has been registered, e.g.: .com.jm – for sites
registered in Jamaica, .com.bb – for sites registered in Barbados.
Domain name server (DNS) – Are server(s) that assigned domain names to websites.
DNS allow persons to find a website by translating Domain names to IP addresses.
Web Host – A company that gives you some space on the internet to publish your
website. Sample hosting companies are: godaddy, fatcow, LIME and justhost.com.
FTP (File Transfer Protocol) - is a standard network protocol used to transfer files
from one host (computer) to another. FTP is most commonly used to download a file
from a server using the Internet or to upload a file to a server (e.g., uploading a Web
page file to a server).
SECTION 7: SPREADSHEETS
1. Definition of spreadsheet: a spreadsheet is a table consisting of cells (rows, column
locations) that hold accounting or financial data and simulates the traditional physical
spreadsheet; it captures displays and manipulates data.
d. Cell Address – a cell address identifies a single cell in a worksheet. E.g. B23,
where the letter indicates the column and the number indicates the row.
e. Active Cell – The active cell is the cell that has the current focus. i.e. If you are
typing something, the cell in which the data is appearing would be the active
83
cell. When you click into a cell on the worksheet the edges become
highlighted with a bold, black line.
Some facts
In spreadsheet a cell can contain one of three types of
date/information: Label (text), value (number) or formulae.
g. Label – In spreadsheet, a label is text entered into a cell that explains the
contents of other cells.
i. Formula – A formula carries out calculations, using the values held in one or
more cells on a worksheet, and displays the result in another cell. Users
create formula from scratch. Formula my also contain functions.
Sum()
Average()
Sqrt()
Count()
countA()
max()
min()
rank()
date()
today()
Vlookup
IF()
84
k. Cell reference - Each cell in a spreadsheet has an 'address' that describes its
position in the worksheet. The address is made of two parts: its row position
and its column position. This address is called the 'cell reference'. Example of a
cell reference is A12.
l. Cell referencing - To reference the value stored in a single cell, enter its cell
address as a function argument. For example, to have the data in cell B1 appear
in another cell, enter =B1 into that cell.
m. Absolute addressing – An absolute address always refers to one specific cell and
is not adjusted when the formula is copied to another cell. Example of absolute
addressing ($A$1 + $A$2)
q. Row and Column title – A title can be the heading of a row or a column of data.
Titles are useful to navigate your way around the worksheet. Titles usually
identify the type of data stored in a row or column.
r. Record – Records are rows of data where each cell, called a field, contains an
item of data relating to the record.
s. Title locking - If you've entered descriptive titles in the top rows or left columns
of the spreadsheet, you can lock them so that they remain in view when you
scroll.
3. Format a spreadsheet
a. Text formatting – all the formatting features available in Microsoft Word can be
applied to text in a spreadsheet. Such as text alignment (left align, center, right
align and justify), borders can be applied to text and cells.
85
b. Numeric data formatting – there are a number of formatting features that can
be applied to number values in a spreadsheet. Listed below are some examples
of such formatting features:
i. Comma separated format (1,000,334)
ii. Currency and accounting format ($9.00)
iii. Percent (23.7%)
4. Sort a spread sheet
a. To sort means to arrange data in order. Spreadsheet can be sorted in ascending
order (A-Z, 1-9) etc, and in descending order (Z-A, 9-1) etc.
Miscellaneous
86
Information can be retrieved faster in ad hoc They are time consuming to design
situations using queries.
You can design and create your own queries Initial training is required
with minimum knowledge of databases
Less errors and increased consistency as data Suitable hardware and software are needed
is standardised to run the program.
Data duplication is reduced They can be expensive to buy and maintain
Security of data is increased Computer breakdown can cause files to
become in accessible or corrupted.
You are able to present multiple views of
data using report features.
It is easy to make backup copies of the
database
Related files can be linked together.
Database management systems (DBMS) are computerized databases that were developed to
make the storage and retrieval of information faster and easier. DBMS stores data in a
structured and organized way; this contributes to faster retrieval time compare to manual
databases. DBMS requires less space than manual databases. Examples of DBMS are: Microsoft
Access, Corel Project, Lotus Approach and Oracle.
87
Column 1 Column 2
Row 1 Row 1, Column 1 Row 1, Column 2
Row 2 Row 2, Column 1 Row 2, Column 2
Row 3 Row 3, Column 1 Row 3, Column
88
There are two types of numeric field you need to know about:
o Real - used for decimal numbers such as 3.4, 3.1427 and 6.0 etc.
Real numbers can be formatted as currency (i.e. £5.67) or to a
fixed number of decimal places (i.e. entering 3.1427 into a real
number field formatted to two decimal places would mean it
appeared as 3.14)
When to use - if the field is going to be used to store numbers
with decimal places such as 'height', 'length' etc.
o Integer - used for whole numbers.
When to use - if the field is only going to be used to store whole
numbers, i.e. 'number of children', 'car doors' etc.
Logical/Boolean fields - a field of this data type will only let you enter a
'Yes' or a 'No'. This may be as text (YES/NO or TRUE/FALSE) or as a
tick/blank.
When to use - when you only need to store something as 'true' or 'false'
or store whether something exists or does not exist.
Date fields - a field of this type stores days, months and years. Date fields
can display the date information in different formats such as the full
name of the day/month (28th August 1961) or the numerical versions
(28/08/61)
When to use - for any field which will be used to store date information.
89
q. Field size – field size determines the amount of information (in characters) a
field can store.
r. Table structure – A table structure is a plan that shows the names, data types
and the field sizes of fields in a table.
s. Primary keys – A primary key is a field that acts as a unique identifier for each
record in a table.
t. Candidate key –A candidate key is a field that could possibly act as the primary
key for a table.
u. Alternate key - An alternate key is any candidate key that is not the primary key.
Alternate keys
are sometimes referred to as secondary keys.
v. Composite key – A composite key is a primary key that consists of two or more
fields together.
w. Foreign key – A foreign key is a field in a table that has been linked with the
primary key field of another table.
x. Query –A query is a database feature that allows you to display records that
meets a particular criteria, or to display the records from tables.
y. Calculated fields - Calculated fields are a special type of field. The value of the
field is not stored within the database record, but is instead calculated or
computed based on the values of other fields within that record. The calculation
is called a formula. This formula can consist of values from other fields,
constants, and the results of functions
90
Network Cables
Twisted Pair Cable Twisted Pairs
Coaxial cable
Fibre Optics
91
USB
SATA Cable
SCISI Cable
IDE Cable
92
Miscellaneous Topics
LAN Topologies:
The word topology means ‘arrangement’, so when we talk about the topology of a network, we
mean how the different parts are arranged and connected together.
Bus Network
In this type of network, a long, central cable, the ‘bus’ is used to connect all of the computers
together. Each computer has a short cable linking it to the ‘bus’.
A bus network…
Ring Network
In this type of network each computer is connected to a loop of cable, the ‘ring’. (If you took a
bus network and connected the ends of the bus cable together, you would have a ring
network.)
A ring network…
Can cope with a break in the ring cable since all computers are still joined together (it is
now a bus network)
93
Star Network
In this type of network every computer is connected to a central device. The device passes
messages between computers.
At the centre of a star network you might use a hub (cheap, but slower) or a switch (more
expensive, but faster).
A star network…
Is quite expensive to install (you have to buy lots of cable and the central device)
Is very fast since each computer has its own cable which it doesn’t need to share
Can cope with a broken cable (only one computer will be affected)
Will stop working if the central device breaks
Is the most common network topology
The term open source refers to software whose source code — the medium in which programmers
create and modify software — is freely available on the Internet; by contrast, the source code for
proprietary commercial software is usually a closely guarded secret. Open Source allows users to
change and improve software and to distribute it if they want to. While propriety software is sold with
the notion that the seller retains ownership of the software and the buyer purchase only the license to
use the software.
94