Computer Science Notes F1
Computer Science Notes F1
THE COMPUTER
What is a computer?
This is an electronic device that accepts data, processes it and give out information.
Data
Information
It is any piece of equipment (or hardware) that can be connected to the Central
Processing Unit.
HARDWARE
Hardware: These are parts of a computer that exits in physical form, for example
mouse, keyboard. Hardware refers to tangible devices of a computer. Hardware is
grouped into: Input Hardware, Processing Hardware, Output Hardware,
Storage devices and communication hardware.
INPUT DEVICES
These are devices that are used to enter data into the computer.
OUTPUT DEVICES
These are devices used to give out data or information from the computer .
STORAGE DEVICES
These are devices that are used to store data or information in a computer .
COMMUNICATION
These are devices which allows communication to take place between two or more
computers .
PROCESSING DEVICE
A device used to convert and to manipulate data as per user requirement. The sole
processing device of a computer is the processor, which is inside the Central
Processing Unit (CPU) casing. Processing involves sorting of data, updating
records, searching certain records, adding a sequence of numbers, and others.
The speed of a processor determines the speed and function of a computer. Until
the 1980s, most computers had one processor, but recent ones have two or more
processors (called co-processors), those with two processors are called dual
processors. Two or more processors share loads and therefore perform operations
faster. The speed of a computer is also determined by the clock speed for each
microprocessor. This speed is measured in Megahertz (MHz). The general
structure of the CPU or Processor is as illustrated below:
Arithmetic and Logic Unit (ALU) and the Control Unit (CU) and Registers
(a) Arithmetic and Logic Unit (ALU) - Carries out arithmetic operations like
add, subtract, divide, etc. Performs logic operations, like AND, OR, etc.
(c) Registers
High-speed storage area in the CPU used to temporarily hold small units of program
instructions and data immediately before, during and after execution by the CPU.
Stores programs and data for programs currently running on the computer. Main Memory
is very close to the processors and therefore the two can coordinate their activities very
fast.
INPUT DEVICES
Joystick digitizer
Digital camera
Remote control
Sensors
Touch screen
Numeric keyboard
(i) Keyboard: It is a device used to enter data and instructions into the computer
by typing. It is a manual input device. It is similar to the traditional typewriter. It is
used to enter alphabetic letters (A-Z-both lower case and upper case), numbers (0-
9, positive and negative) and other special characters like the %, $, coma, ?, and the
space. Keyboard entry of data is manual and its excessive use without breaks will
cause Repetitive Strain Injury (RSI).
*NB: - A character is any symbol, digit or letter that can be entered into the
computer, eg. $, %, 5, h, etc. These characters can be numeric (numbers 0-9,
positive and negative), alphabetic (letters A-Z, both lower and upper case),
alphanumeric data (a combination of both numeric and alphabetic characters) and
special characters
character set that do not represent a written symbol, e.g. carriage return, tab key,
etc. These are mostly used in peripheral devices control and for
communication purposes, for example, carriage return,
tab or backspace; and others typed by depressing a key and
the control key at the same time.
*NB:-Extended Binary-Coded-
Standard keyboard Decimal Interchange Code (EBCDIC) an 8-bit character set
and encoding representing 256
alphanumeric and special characters
(d) Numeric keypads: mostly used to enter numbers only. Used on ATMs, to enter
PIN and amount to be withdrawn. Also found on cell and telephones, Chip and
pin devices, and on Electronic Point of Sale terminals (EPOS). They are
faster in entering numeric data as compared to standard keyboards, very
easy to carry around if found on cell phones. However, they have very small
keys which can be difficult to use. It is difficult to use them for entering text
data.
(ii) Mouse: It is a pointing device used to enter data and instructions into the computer by
clicking. A mouse has either one, two or three buttons. A mouse can be cable or
wireless. The mouse is also used to:
- Select options from a menu
- Position the cursor when editing text/typing - Select an object for drawing and
for editing diagrams - Select icons/text to be formatted, deleted or edited.
- Control movement of pointer on the screen.
It can also be used for pointing and selecting items.
Clicking is the process of pressing and releasing the
Mouse mouse button.
Advantages of mouse
- It is a fast method of entering data and for selecting items as compared to the
keyboard.
- It is faster to move cursor around the screen using a mouse than a keyboard.
- Usually supplied with the computer and so there are no additional costs.
- Very easy to use for most users.
- Take up very small area of the desk
- Very fast to switch between programs
Disadvantages of mouse
- Needs a flat surface on which to operate
- Can be easily stolen or vandalized
- Some people find it very difficult to use
-
(iii) Touchpad
These are pointing devices used on laptops, where one moves a figure to control
the pointer on the screen. Their uses are similar to those of mouse. They aid
portability since they are attached to the whole computer system. Can also be used
where there are no flat surfaces available. However, they are difficult to use, e.g.
when doing drag and drop.
(iv) Scanner: an input device used to convert images from paper (hard copy) into
electrical signals for input into the
computer.
The images can then be edited,
printed or saved. Mostly used to
scan pictures, photographs, etc. they
Flatbed scanners have the paper placed on top of them, in a similar way to a
photocopier. These are more expensive than hand-held scanners but they are
usually able to produce higher resolution images. They are very
accurate in scanning. Images are stored for later editing.
Quality of scanned image can depend on the resolution of scanner.
(v) Digital Camera: A device use to capture photographs, films, videos or a combination
of both for entry into the computer where they can be edited.
- no film is needed (saves costs for purchasing films and developing the film)
- Unwanted images can be deleted straight away
- Images are already digital and therefore can be transferred to a computer for
editing immediately,
- Easier and faster to upload photos to the computer
- Produce better quality images than the traditional camera However:
- Images need to be compressed
- Needs those who are computer literate to use it efficiently
(vi) Touch Screen: A screen display on which you could enter data by pointing/tapping
with a finger on intended option. Used on (ATMs)-Automated Teller Machines, cell
phones, computers, etc.
(ix) Tracker ball: It is an input device with a small ball that can be moved by
passing the palm of your hand over it. This will move an arrow on the screen and
therefore can replace a mouse.
It is used to draw designs and to
select options from menu. Used
as an alternative to a mouse. To
operate it the user rotates the ball
which moves the pointer on
screen.
Tracer ball those with limited movement in their hands and are often used in
Computer Aided Design (CAD)
for their increased precision over
a mouse.
Advantages of trackball
- It is stationery and therefore do not need a flat surface to move on
- Less likely to get damaged than mouse
- Less tiring as less movement is needed
- Can be useful in laptops
Disadvantages
- Rolling the ball is less effective than using mouse
- Can be difficult to control
- Not supplied as standard device, so extra cost is incurred - Muscles can be
strained due to repeated movement
Uses
- Used in home entertainment devices like TVs, DVD players, HIFIs, etc
- Remote controls for multimedia systems
- Stop/ start machinery in industrial applications
Advantages: Allows devices to be controlled from a distance, Flexible to the disabled,
safer to use in chemical processes.
Disadvantages: People arm problems/disabilities cannot use them, signals can be blocked
(need a line of sight)
(xi) Microphone: It is an analogue input device that recognises human voice for data
entry into the computer.
Microphones are used to input sound. In
computing, they can be used with voice
recognition software and a word
processing application to enter text.
Webcams commonly have microphones
built-in too.
Disadvantages:
- Older systems are speaker dependent.
- They allow the user to speak slowly, using specific words that were programmed for
it to understand.
NB: Multimedia speakers, sound cards, a microphone and voice recognition software
are needed in voice recognition systems.
(xii) Light pen: A ballpoint shaped device used to enter data by writing on an
ink pad. It is also used to make alterations on the screen to the drawings, to write
directly on the screen and to select commands.
Light pen
(xiii) Kimball Tags: These are punched cards with a magnetic strip which
contains details of a product, mostly clothes in a shop.
(xiv) Graphics tablet: Devices used to provide interface for drawing on the
screen and links with the light pen. Can also be used with a stylus. Can be used for
drawing
(xv) Webcam: A digital video camera designed to take digital photographs and
transmit them over the internet or to the computer. They do not have own
memory. Laptops have their own web cam.
Uses: viewing each other when chatting on internet. For video conferencing. For taking
personal images.
Advantages: can be left on and only activated when required. People can see each other
when chatting.
(xvi) Sensor: an input device that automatically records physical data by sensing
the environment it is supposed to record, e.g. humidity sensor.
(xvii) Magnetic Stripes: Magnetic stripes can be seen on train tickets or bank or
credit cards.
These provide a quick and accurate way of entering details into a computer system
and are simple to operate.
(xviii) Smart Card Readers: Similar to magnetic strip readers except that they are
used to read data stored on a chip. Most bank cards and credit cards are now smart
cards. Also used on royalty cards, ID cards, electronic passports
and transport passes.
Cards have their own processor and memory that can hold up to
64KB of data. The data that is stored can be updated and the
processor can process simple programs.
Smart cards
- Smart cards are simple to produce
- Not easily damaged
- Store a fairly large amount of information - Automatic input devices, reduce
paperwork However:
- Data can be changed by magnetic fields
- The strip can be damaged by scratching
- Limited storage capacity
- Not very secure as thieves can alter the data.
(xix) Barcode Reader: These are devices at Electronic Point of Sale terminals
(EPOS) that read barcodes on products for automatic data entry into the
computer. Mostly used in library systems, luggage handling systems at airports,
warehouse stock control, etc.
Barcodes are numbered vertical lines and spaces
of varying size on products that provide data for
such a product to the computer when read by
barcode readers.
- They are a very fast means of entering data since they are an automatic data entry
method.
- Customers can be served quickly.
- Automatic re-ordering of goods in supermarkets is possible.
- Automatic stock taking is possible.
- Need for fewer people in the stores thereby cutting labour expenses.
- Out of date items can be automatically identified.
- There is no need for supermarket workers to remember prices.
- It becomes easier to do price changes.
Information found on barcodes includes:
- Product name,
- Check digit,
- Product number,
- Country of origin, - Manufacturer’s number, - Weight.
*NB:-The PRICE of an item is NOT FOUND on the barcode.
How does the computer system checks that the barcode has been read correctly?
Either the computer performs the following:
Calculates the check digit; remainder = 0 if barcode has been read correctly OR
uses the weights and modulus 11 and use remainder Areas where barcodes are
used: - Library book systems
(xx)Video digitiser
A video digitiser takes an image from a video camera or television and digitises it
so it can be read by, and stored on, a computer. Video sequences captured using
video digitisers are often used in multimedia presentations.
(xxi) Stylus: device used to write on sensitive pads or screen for data entry into the
computer. Often purchased with touch screens
DOCUMENT READERS
These are devices used for entering data automatically into the computer by reading
through documents. These include:
(i) Optical Mark Recognition (OMR): The Optical Mark Readers use light
sensitive devices to sense pencil marks on a piece of paper for automatic data
entry into the computer. Light is reflected from the document onto the Optical
Mark Reader which records the output. It then records low intensity/zero
intensity at certain points. OMR is mostly used in marking multiple choice exams
at ZJC and ‘O’ Level, reading pupils’ registers, playing lotto, etc. An Optical Mark
Reader is the device that is used for automatic data entry in OMR systems.
- OMR is fast in entering data
- It is also accurate and reliable in entering data.
- Has better recognition than OCR
- Can be prepared where data originates, without machines
- Errors can be corrected easily However:
- Mark readers are relatively slow
- Verification of data is difficult
- Document may be difficult to design
- Forms must be completed clearly for data to be recorded accurately - Papers need
to be clean
very quickly. It is very difficult to forge a cheque. The ink can be read by the
reader even if he cheque gets marked or dirty. A Magnetic Ink Character Reader is
the device that is used for automatic data
entry in MICR systems
Weaknesses
- Low resolution
- Noisy
- Slow printing speed: this is because they can be character based or line based
printers.
(b) Non-Impact Printers: These are printers that do not produce contact
between papers, write heads and ink cartridge during printing. Non-impact
printers include: inkjet printer, laser printer, thermal printer, etc.
Laser printers
Most of the printers use light and are therefore called laser printers.
• They print at very high speeds since they are page printers.
Advantages:
• relatively high resolution
• Good colour production
• Low cost/heap to buy
• Usually small size
Disadvantages
• Slow printing speed
• Ink is expensive
• Has a water soluble ink which may be spilt
• Running costs are expensive
*NB: - Printers can also be classified as page printers (these print one page at a
given time and are therefore faster), line printers (print one line at a time, very
slow) and character printers (print one character at a time).
Advantage of Monitors
- Its output is immediate and visual
- High speed of display
- No noise
- No wastage of paper
- Can display text, graphics, etc
-
Disadvantages
- When the display changes, the previous output is lost.
- Needs a separate device to produce hardcoy
(iii) Graph Plotter: This is a device used to produce high quality drawings in
various paper sizes and is used in Computer Aided Design (CAD). A plotter
can be used to produce high quality, accurate, A3 size or bigger drawings.
They are usually used for Computer Aided Design (CAD) and Computer Aided
Manufacture (CAM) applications, such as printing out plans for houses or car
parts. They print sharper and more precise drawings.
Graph plotter
(v) Speakers: produce sound from music files on the computer. They are used in
conjunction with multimedia files.
(vi) Braille Printer: prints Braille which is readable to the blind people.
(vii) Actuators: these are output/control devices which turns on or off some
devices in control systems. Some of the control devices include electric heater
(supplier heat), electric motor (provide movement/rotation), motorized
pump, buzzers, lights, heaters, actuators, etc.
HEADPHONES
STORAGE DEVICES
STORAGE MEDIA
These are devices used to store data and programs for future use.
Storage Capacity
Refers to the amount (volume) of data a device can store. The following storage
measurements can be used:
Bit: The smallest unit of data a computer can store, either a 1 or a 0.
Nibble: refers to half a byte, that is, a group of 4 bits.
Byte: a group of 8 bits representing a character. For example, the letter C is represented by the
byte 01000011.
Size Equal to
8 bits 1 byte
1024 bytes 1 kilobyte
1024 1 megabyte
kilobytes
1024 1 gigabyte
megabytes
1024 1 terabyte
gigabytes
Kilobyte (KB): this refers to 1024 bytes.
Megabyte (MB): 1 MB is equivalent to 1 048 576 bytes.
Terabytes (TB): refers to 1 099 511 627 776 bytes (approximately 1 024 GB)
RAM is volatile, which means that it loses its contents when power is switched off.
RAM is in two forms; that is, dynamic and static RAM.
Static RAM is a Random Access Memory chip whose contents do not change as long as
there is continuous power supply.
Dynamic RAM is Random Access Memory chip whose contents can be lost even if
there is continuous power supply. Dynamic RAM needs to be refreshed to prevent loss of
data.
The size of RAM also affects the speed of operation of a computer and the number of programs
that can be run on it. RAM size can be 16 MB, 32 MB, 64 MB, 126 MB, 256 MB, 448 MB, 1
GB, etc. The bigger the RAM size, the better the efficiency of the computer and the bigger the
number of programs it can run at a given time.
(b) ROM (Read Only Memory):
ROM is a semi-conductor circuit (chip) whose contents can only be read from and
cannot be erased or modified.
ROM contents are fixed during manufacturing, that is, they are hard – wired.
These contents can only be read from and cannot be modified.
The uses of ROM are:
Stores the Basic Input-Output System (BIOS-refers to software that test hardware at start-
up, starts the operating system and support data transfer between devices.) of the
computer.
Stores control programs for the operation of the computer and its peripherals.
Stores translator programs.
Backing up of data refers to the copying of files to the copying of files & data
to a different ( medium disk tap ,flash drive etc) in case of the problem with the
main storage device
Data could be lost due to failure of the original storage device this could due of (head
crush on hard drive unit) or possible corruption of files e. g caused by power surges.
COMPILED BY MR NYAMBO A. T #FAILURE IS NOT PART OF OUR OBJECTIVES
COMPUTER SCIENCE NOTES FORM 1 BY MR NYAMBO A. T
Backups are also made in case the files need to be used elsewhere.
I. Magnetic.
II. Optical.
III. Solid state.
Magnetic Storage
These store data on magnetized field of iron oxide and include magnetic tapes, zip drives,
diskettes, hard drives and flash drives.
(a) Magnetic Tapes:
They are similar to a normal cassette tape in shape.
They store data in serial and sequential order.
They are mostly used to backup data.
Their storage capacity can be up to 20 GB.
Data is also accessed in serial or sequential order. They can be used as off-line storage
media.
These are disks used to store large volumes of data and programs, including operating
systems and are resident in the CPU casing.
Data is stored on tracks in a random way and data retrieval is in a random way.
Hard disks can store data of up to 300 GB, but ranges from 2 GB, 8 GB, 20 GB, 40 GB,
80 GB, 120 GB, etc. a hard disk can be internal or external.
External hard disks have a larger storage capacity and can be used to back-up the system
COMPILED BY MR NYAMBO A. T #FAILURE IS NOT PART OF OUR OBJECTIVES
COMPUTER SCIENCE NOTES FORM 1 BY MR NYAMBO A. T
A 3.5 inch and plastic magnetic disk enclosed in a stiff envelope with a radial slit; used to
store data or programs.
They have a storage capacity of 1.44 MB.
They are used as backing storage for small volumes of data.
Data is stored on tracks in a random way.
Direct access to data is provided.
Disadvantages of Diskettes:
Have very short life span (not durable).
Can be affected by humid conditions.
Can easily be affected by dusty conditions.
Can easily be damaged if placed close to the screen for a long time.
Takes long to read data into memory than from a hard disk.
Hold very small amount of data, 1.44 MB.
Memory sticks (or ‘thumb-drives’) have made many other forms of portable storage
almost obsolete (why burn a CD or DVD when you can more easily copy your files onto
a memory stick).
Memory sticks are non-volatile, random-access storage devices.
Each of these small devices has some flash memory connected to a USB interface.
Plug it into your computer and it appears as a drive.
You can then add files, erase files, etc.
You can use it to move any type of file between computers.
Storage capacity ranges from 1 GB, 2 GB, 4 GB, 8 GB and 32 GB.
Advantages of Memory Sticks:
Have a long life span about 3 yrs.
Have large storage capacity about 32 GB or more.
Provide direct access to data.
Very cheap to buy.
Portable since they can fit in a pocket.
Advantages of CDs:
Provide fast and direct access to data.
Has large storage capacity of about 750 MB.
Produces high quality sound and pictures.
It is a multi- media device.
Disadvantages of CDs:
Can be affected by direct sunlight.
Less durable.
They can easily get scratched.
Not so easy nor fast to save data on them
Types of CDs
1. CD-ROM (Compact Disk Read Only Memory) a common form of optical Disks on which
data, once it has been recorded, cannot be modified.
2. CD-W (CD-Writeable) an optical disk that can be written upon, but only once. Often called
WORM (Write Once Read Many) disks.
3. CD-RW (CD-Rewriteable) on optical disk that allows personal computer users to replace
their diskettes with high-capacity CDs that can be written upon and edited over.
Advantages to schools of storing learning materials on a CD-ROM other than using the
Internet
No danger of accessing doubtful websites.
Does not take as long to find required information.
Do not have to have a modem.
Do not need for a telephone line.
Once CD ROM is bought there is no additional expenditure.
Do not have to remember user id/password.
Usually quicker to load material.
Information on CD is more reliable
Disadvantages to schools of storing learning materials on a CD-ROM other than using the
Internet
CD ROM can be lost easily.
CD ROM can be damaged easily. Internet is up to date while CD ROM is soon out of
date.
CD ROMs are expensive to replace and to update.
Less information can be stored on the CD-ROM as compared to the internet.
Disadvantages of DVDs:
Can be affected by direct sunlight.
Less durable.
They can easily get scratched.
*NB: - Virtual Memory – Refers to temporary storage (on hard disk) used by the computer to
run programs that need more memory (RAM) than the computer has. For example, programs
could have access to 4 gigabytes of virtual memory on a computer's hard drive, even if the
computer has only 32 megabytes of RAM.
SOFTWARE
What is software?
Types of software
SYSTEM SOFTWARE
APPLICATION SOFTWARE
System software
These are programs that manages, oversee and control all activities of computer.
Operating system software.
Is a large, complex of programs, which provides for loading and execution of other
programs.
Examples of operating system.
Windows family.
Mac OS.
Linux.
UNIX.
MS DOS
Functions of the operating systems:
Controls movement of data to and from peripherals.
Acts as a background on which application programs can run.
Device management/Input-Output management: Operating system manages hardware
components of the computer.
Handling of interrupts
Manage software resources of the computer
Memory management: Manages memory resources of a computer - Acts as an interface
between the user and the computer.
Scheduling of tasks
Loading and running of programs
Provides a log of users for the computer.
Handling of errors and correcting them where possible. (error handling and reporting)
COMPILED BY MR NYAMBO A. T #FAILURE IS NOT PART OF OUR OBJECTIVES
COMPUTER SCIENCE NOTES FORM 1 BY MR NYAMBO A. T
Utility programs.
These are programs responsible for housekeeping functions in the computer system.
-There are also known as service programs.
-There are designed to analyze, configure, optimize and maintain the computer system
These are programs used to perform specific, useful and frequently needed task in a
computer system. They usually have one single task to perform on the computer system.
Utilities include the following:
i. Virus Scan Utility: These are programs that protect computers from virus attacks, for example
Norton Antivirus, AVG, Avast, Eset NOD32, MacAfee, etc.
ii. Sort Utilities: These are programs used to arrange data, files and records into a specific
ordered sequence, for instance in ascending or descending order of a given key.
iii. Debuggers: These are utilities used for assisting in correcting errors in programs.
iv. Dump Utilities: These are programs that assist in copying data from main storage to output
devices and to other storage devices like the hard drive.
v. Editors: These are programs used to make changes to data already held in the computer.
vi. Peripheral Transfer Utility: These are programs used to transfer data from one peripheral
device to another.
vii. System Status Utilities: These are programs that provide information on the state of files,
memory, users and peripherals.
viii. File Maintenance Utilities: These are programs used to reorganise programs and to update
them.
(d) Device Drivers: Programs that allows a device, e.g. printer to work on a given operating
system/computer.
Application software.
Is a software that allow users to perform specific set of task/activities.eg database.
Application software ( also called end user program ) include such things as
database programs, word processor , web browsers and spreadsheets.
COMPILED BY MR NYAMBO A. T #FAILURE IS NOT PART OF OUR OBJECTIVES
COMPUTER SCIENCE NOTES FORM 1 BY MR NYAMBO A. T
FACTS
Computers are used for keeping records such as budget information , farm
equipment inventories and animal health form
Farm implements
farm implements such as tractors , fertilizers sprayers have computers that farmers
can program to automatically adjust the amount of fertilizers according to the
requirements of soil and crop which help in improving soil and higher crop
yield.
Farm equipment
Farmers can use computer system to guide the steering of their farm equipment
during planting or harvesting ; if the system experiences problem , Technicians can
diagnose and fix the issues remotely from another computer.
Farm software
with regard to live stock farming ready-made computer applications are available
to track individual animals , storing and evaluating information such as age , health
record, milk production , offspring productive cycle status this is often called herd
recording .
Agribusiness
Internet forums , social networking and online knowledge bases: through internet
forums ,social network sites and online knowledge bases farmers get a lot of
information with these they contact with other farmers and experts and
exchange know-how there are many online data base , articles, newspaper in
which there is a lot of information available for farmers which help them in
increasing productivity.
Farmland Assessment
Geographic information systems (gis) are being used for developing ranking systems that
evaluate land and provide a site assessment to aid what is now known as precision
agriculture .These hi-tech, interactive systems provide information based on a variety of
factors such as soil conditions, drainage and slope conditions, soil ph and nutrient status,
etc.
The use of computer technology has revolutionized how we do our banking transactions ,
for example :
Find balance in our account
Change your pin (Personal identification number)
Transfer funds
Many credit cards are equipped with a chip as well as magnetic stripe, this
contains key information such as pin.
Card is inserted into the chip and reader.
The card is checked to see if its valid( expiry date, whether stolen card)
If card is stolen or expires then the transaction is terminated.
The customer then enters the pin using a key pad
The pin is read from the chip on the card and is compared to the one just keyed in.
If they are the same , then transaction is processed , if different , transaction is
terminated.
A check is then whether there is enough fund, if there are not enough funds
transaction is terminated .Otherwise transaction is authorized.
Authorization code is sent, money is deducted from the customer`s account.
The same amount of money is credited to the shop`s bank account.
A receipt is produced as proof of purchase.
DEFINITIONS
SOCIAL NETWORKS- A web site that brings people together to talk , share ideas and
interests, or make new friends.
SOCIAL NETWORKS
Classmates ( http: // www.classmates.com/)-One of the largest and most used websites for
connecting people who graduated from a high school and allows you to keep in touch with
them and any future reunions.
Face book- (https:// www. facebook.com/)-The popular social networking websites on the
internet. Face book is a popular destination for users to set up personal space and connect
with friends , share pictures , share movies , talk about what you are doing , etc. .
LINKEDIN( https:// www. linkedin.com/)- One of the best if not the best location to
connect with current and past co-workers and potentially future employers .
NEWS AND CURRENT EVENTS-By staying up-to-date to news and current event
Internet
Before you start research, you often want to quickly learn about possible issues or topics
of study by searching available source of information . Nearly all academic journals are
available online, and many organized into online data base. Government agencies often have
demographic or economic information online you can use in your research.
INFORMATION STORAGE
Computers store vast amounts of information .You can quickly and efficiently organize and
search information , making for easier retrieval than paper storage. You can store your raw
data in multiple formats. Some research conduct the research online, often through the use of
surveys .
COMMUNICATION TOOLS
COMMUNICATION
3 Data Representation
Binary
Binary Conversion
This involves converting a number in binary from to either denary (base 10), octal (base 8) or
Hexadecimal (base 16)
(a) Conversion from decimal (denary) to Binary
Divide the denary number by 2, listing the remainders until the answer is 0 remainder 1.
Take the remainders only from the last one until the first. For example:
Add all the equivalent to values in the table, whose binary digit correspond to 1 and add
them.
The result is the denary equivalent.
That is 16 + 4 = 20. This is a short form of (16 x 1) + (4 x1) = 20
LOGIC GATES
A logic gate is a device that produce signals of 1 or 0 when the input logic requirements
are met and are used in manipulating binary information.
A logic gate is a device (or electrical circuit) that performs one or more logical operations
on one or more input signals.
Output represent Boolean (T or F) or binary values (1 or 0) as voltages.
Logic gates are the building blocks of digital technology.
They can be used in applications like:
Building computer chips
Programming traffic signals
Chips for automatic alarm systems
Chips for automated control systems
Electronic circuits operate using binary logic gates.
Logic gates process signals which represent TRUE or FALSE, ON or OFF , 1 or 0
(a) OR gate
This represents two inputs entering the gate and one output from the gate.
The inputs can be represented by any alphabetic characters, e.g. A and B, while the
output can be X, given as follows:
COMPILED BY MR NYAMBO A. T #FAILURE IS NOT PART OF OUR OBJECTIVES
COMPUTER SCIENCE NOTES FORM 1 BY MR NYAMBO A. T
X= A OR B
The output (X) is true if the INPUT A OR INPUT B are true.
Thus if any one of the inputs is 1, the output is automatically 1
Output only becomes 0 if all inputs are 0
The output (X) is only true if the INPUT A AND INPUT B are both true. If any one of
the inputs is 0, then the output becomes 0 also. Thus X = A AND B.
The NOT gate has only one input and one output. The input is negated. Thus if input is 1,
output is 0, and vice versa.
The output (X) is true when the INPUT A is NOT TRUE. The output (X) is False when
the INPUT A is TRUE.
EXAMPLES
TYPES OF NETWORKS
REASONS OF NETWORKING
Types of networks
i. LAN (Local Area Network
A LAN is a privately owned connection of computers on a very small geographical area for
sharing of data and files by users of the network, for example, within a single room. Usually
connected using cables of radio connections.
Hardware Requirements for a LAN
• Network Interface Card (NIC):- Each computer on the network must have this as it allows
computers to be linked and to be uniquely identified on the network.
• Server: - to store software that controls the network, software and files and also data that can
be shared by all users of the network
• Hub or alternatively a Switch:-
A hub is a device that connects workstations together in order to make a LAN. It receives
signal/data from workstations, regenerates it and the sends it to all ports on it. Thus all
workstations connected to it will get the signal or data packets. Hubs are less intelligent, they do
not determine the exact computer the data is addressed to and so they broadcast the signal. This
is a security risk. It is usually used on a star network or on a hybrid network. A hub has many
ports on which cables to all computers on the network are connected.
A switch is a networking device that allows multiple devices and workstations to be connected
to each other on a LAN just as a hub does. However, a switch is more intelligent than a hub. A
switch directs traffic across a LAN, enabling computers to talk to each other and share resources.
It joins computers on a LAN and is found at layer 2 of the OSI reference model. It allows
different nodes on the network to directly communicate with each other. A switch runs in full
duplex mode. It can recognise different devices onthe network using their MAC address so that data
and signals can be send to exact/intended devices. This is more secure than a hub. Switches can be LAN
switches or ATM switches which are used on WANs and MANs.
• Terminals: - these are computers that are connected to each other through a server and cannot
work without the server. Terminals can be dump or intelligent. A dump terminal does not have
neither processing nor storage capabilities and thus wholly depends on the host computer for it to
work. An intelligent terminal has limited processing and or storage capabilities.
• Workstation: - these are the computers connected to the server and are less powerful than the
server
• Cables: - connects computers together and acts as pathway for data moving from one
workstation to another.
• Bridge: - this is a device that connects networks using the same communication protocols. It is
used to connect different parts of a LAN, thus is used to connect different LAN segments
together. However, it cannot handle multiple paths for data. In general a bridge is used for:
WAN refers to connection of computers over a very large geographical area and may cover the
whole world. The internet is part of the WAN. A WAN is created by joining several LANs
together, for example, connecting different branches of a company that are in different provinces
or countries. Computers are usually linked together using fibre optic cables, satellite links,
telephone lines, etc.
Gateways are usually used to bridge the different networks.
Hardware Requirements for a WAN
• Routers: - this is a network device that connect different types of networks together, for
example, connects a school LAN to the internet (which is a WAN). It can route packets of the
same protocol (e.g. TCP/IP) over networks with dissimilar architectures (e.g. Ethernet to token
ring). It receives transmitted messages and forwards them to their correct destinations over the
most efficient available route. A router is used to form complex networks with multiple paths
between network segments (subnets), each subnet and each node on each subnet is assigned a
network address.
A Router is very intelligent. It uses network addresses and IP addresses of other routers to create
routes between two networks. They keep tables of addresses that will be used in routing
information. Routers are thus used for:
Determining the path of data packets using destination addresses of the packets.
Used for packet switching
• Gateway: - a device used to connect different kinds of networks. Thy act as link to different
WANs. A gateway is a device that connects networks with different architectures and different
protocols. When packets arrive at a gateway, the software strips all networking information from
COMPILED BY MR NYAMBO A. T #FAILURE IS NOT PART OF OUR OBJECTIVES
COMPUTER SCIENCE NOTES FORM 1 BY MR NYAMBO A. T
the packet, leaving only the raw data. The gateway translates the data into the new format and
sends it on using the networking protocols of the destination system. Thus it becomes a protocol
converter.
• Modem (Modulator Demodulator):- This is a device that converts digital signal received
from a computer into an analogue signal that can be sent along ordinary telephone lines, and
back to digital at the receiving end. Mostly used to connect to the internet using the ordinary
telephone line. The speed of modems is measured in bits per second e.g. 56K bps. The following
parameters must be specified when a modem is installed:
the telephone number of the ISP
baud rate of modem
number of data bits per block
number of stop bits
whether odd or even parity is used
Cable modems - employ broadband transmission across regular cable television wires.
Only the computer with the token is allowed to send data at a given time. One may not
send data when another node (computer) is still sending its own data.
System is less secure as token together with data has to pass through other nodes that do
not concern it.
2. Star Network:
Computers form a star shape with host computer at the centre.
The Server (host computer) manages all other computers/terminals on the network.
If the terminals are not intelligent, they have to rely on the host computer for everything.
This network is as shown below:
3. Mesh Network
A network in which each computer serves as a relay point for directly sending
information to any other computer on the network.
No central device oversees a mesh network, and no set route is used to pass data
back and forth between computers.
Thus, if any one computer is damaged or temporarily unavailable, information is
dynamically rerouted to other computers—a process known as self-healing
(a) Bus/Backbone: the dedicated and main cable that connects all workstations and other
computer devices like printers.
(b) Nodes: these are connection points for workstations and the bus.
(c) Terminator: devices that prevent data in the bus from bouncing back, causing noise and
prevents data from getting lost.
Advantages of Bus network
If one workstation breaks down, others will remain functional.
If one workstation breaks down, the network remains working.
All computers have processing and storage capabilities.
It is cheap to install due to less cabling.
Easy to add workstation without disrupting the network.
Requires less cabling than a star network.
Less expensive network than the other systems
Disadvantages of Bus Network
Computers cannot send data at the same time nor while there is data being transferred in
the bus.
Can cause collision of data during transmission.
It is slow in transferring data.
Its requirements are expensive, that is computers with their own processors and storage
facilities.
The system will be down if the main cable (bus) is disrupted at any point.
Less secure.
Performance worsens as new stations added
NB: Point – to-Point Connection: Point-to-point topology is the simplest connection, consisting
of two connected computers.
E-commerce
The phrase e-commerce is a buzzword which relates to buying or selling via the Internet.
Increasingly you can purchase directly via a Web site by selecting the goods or services
which you require and entering your credit card details.
When you send your credit card details these SH OULD be encrypted by the site
operators so that no one can intercept your details.
Most sites which accept credit card payment are on secure services and your Internet
browser program (i.e. Microsoft Internet Explorer or Netscape Communicator) will
normally inform you (via a popup) when you are entering or leaving a secure server.
There are numerous web sites from where you can purchase online, a famous example
being amazon.com.
Most Internet based shopping sites use a virtual “shopping cart” system.
As you browse the site you can add any products you want to purchase to your cart.
Once you have placed items in the cart you can then move to the checkout stage.
At the checkout you enter your name & address, select the type of delivery you want and
enter your payment details.
Advantages of e-commerce
There are many advantages in using e-commerce:
Services available 24/7
Large stock range
Detailed product information
Ability to compare prices
Right to return defective goods
Disadvantages of e-commerce
Possible credit card fraud
Is the website genuine?
What about returning faulty goods? Be sure you know about a company’s returns policy,
BEFORE you make an online purchase.
E-learning
E-learning refers to learning via the Internet or working through a disk based tutorial.
There are many advantages, but also some disadvantages.
Advantages include:
One trainer can train many people at many different locations.
If the training is solely computer based, then the students can work at their own pace, and
repeat parts of a course which they do not understand.
Also the teaching can be at any time, 24 hours a day, and 7 days a week.
Often e-learning solutions are cheaper to provide than other more traditional teaching
methods.
Disadvantages include:
There may be no opportunity to ask a question of a real person.
The Internet connection may temporarily fail for some reason.
You may have to pay for the connection time, by the minute.
The download speed may be too slow for some forms of e-learning.
Because of the increased time required to produce some types of e-learning packages,
the e-learning tutorials may not be available for some time following the release of a new
version of software, or a new certification syllabus.
NB. When creating an e-mail, one is requested to enter the password twice in order to verify
if it is the one you intend to use.
Mailbox: - An electronic folder used to store electronic mails. It contains the inbox; which
contains incoming mails; and the outbox; which is used to save outgoing messages.
Disadvantages of e-mail
Not everyone has equipment to send e-mails.
Junk mail (spam) is a problem.
You waste a lot of time looking through mails that are just adverts.
E-mails are not as secure as traditional mails.
The system relies on people checking their mails regularly.
Old people feel left out as they consider themselves too old to learn.
Equipment used to send and receive e-mails is very expensive as compared to
traditional methods.
However, despite the increase in the use of e-mail, there has been a sharp increase in the
amount of paper used. This is because:
People print copies for meetings and then destroy them afterwards, but if needed
again, print out another copy.
Some people find it difficult reading large amounts of text on the screen. People often
e-mail colleagues rather than use the phone who then print out the document.
COMPUTER SECURITY- is the protection of computing systems and the data that they
store or access.
COMPUTER ETHICS-is set of moral principles that regulate the use of computers.
CYBER WELLNESS
ONLINE RELATIONSHIP
Is a relationship between people who have met online, and in many cases they know each
other only via the internet.
Types of relationships
Internet dating.
Cybersex- this include individuals communicating sexually via video or audio.
Social networking relationships.
Online gaming etc.
COPYRIGHT ISSUES
Copyright
Is a legal right created by the law of a country that grants the creator of an original work
exclusive rights for its use and distribution.
Protects tangible or fixed expression of an idea but not the idea itself.
Is automatically assigned when created.
May need to be registered in some countries.
Exists when:
Plagiarism
Piracy
Is the act of using or reproducing a copyrighted or patented material without the owner’s
approval. Such as:
Music downloads and uploads.
Movie downloads and uploads.
Software downloads and uploads.
TIPS AGANST
Plagiarism
Piracy
Plagiarism
Piracy
SYSTEM
A collection of components that work together to realize some objectives forms a system.
PROBLEM IDENTIFICATION
Preliminary Investigation
Interviews can also be done over the phone but the most common ones are face to
face.
Interviews are done when you want to collect information from a very small
population sample.
Advantages of Interviews
Effective when gathering information about a system
The researcher can ask for clarification on some points that may not be clear.
Encourages good rapport between the researcher and the respondent.
Non-verbal gestures like facial expressions can help the researcher to determine
if the respondent is telling the truth.
Information can be collected even from the illiterate since the respondent’s
language could be used.
First-hand information is collected.
The researcher can probe to get more information.
Disadvantages of Interviews
It is expensive since the researcher has to travel to the interview venue.
Difficult to remain anonymous
It is time consuming as more time is spent travelling and carrying out the
interview.
Good interview techniques are required as failure may lead to disappointments.
Biased information can be given since the respondent may not tell the truth.
2. Record inspection
A fact finding method which involves scrutinising system documents in order to
solicit information.
Advantages
Accurate information is collected from system records.
Shows how data is collected within the system.
Shows the exact data that is collected.
Shows information that must be produced by the system
First-hand information is obtained.
Gives a good idea of the ways things are actually done rather than how they are
supposed to be done.
Disadvantages of record inspection
It is time consuming to go through all system records.
Manual files can be tiresome to go through and some of the data may be illegible.
Confidential files are not given to the researcher.
Documentation may difficult for an outsider to understand.
Some records may not be relevant.
3. Questionnaire
A document with carefully crafted questions to be answered by the respondent by
filling on the spaces provided.
Questionnaires are used when collecting information from a widely spaced
population sample and when collecting information from many people.
A questionnaire contains open-ended and closed questions. Open-ended questions
are gap filling questions which require the respondent to express his or her own
view.
Closed questions are guided questions where the respondent just chooses Yes or
No, True or false, or by just putting a tick on given options.
Questionnaires can be distributed personally or by post.
Advantages of questionnaires
Effective when collecting a lot of data.
Questions are very simple to answer.
It saves time as questionnaires can be distributes and then collected later.
Respondents can fill questionnaires at their own pace.
Give guarantees confidential of information, thereby encouraging respondents to
give accurate information.
They are cheap to use as travel expense can be low.
Disadvantages of questionnaires
Questions must be well thought out and precise.
Some questions are left blank.
Some questionnaires may not be returned. Biased information can be collected.
COMPILED BY MR NYAMBO A. T #FAILURE IS NOT PART OF OUR OBJECTIVES
COMPUTER SCIENCE NOTES FORM 1 BY MR NYAMBO A. T
ALGORITHM
EXAMPLES OF ALGORITHMS
1. Flowcharts
2. Pseudo codes
3. Programming constructs (e.g. sequence, iteration/repetition and selection.)
SEQUENCE CONSTRUCT
A series of actions one after the other from beginning to the end either from top to bottom
or from left to right or a combination of these movements.
Question: Write a program to accept two numbers, add them and print the two numbers and the
sum.
SOLUTION
Accept number1
Accept number2
EXAMPLE 2
Question: write a program that accept your first name and last name, and display “hello your
name and last name.”
SOLUTION
PRINT (“hello”+firstname+””+lastname+”!”)
PROGRAMMING CONCEPTS
Programming
Program
Syntax
In computer science, the syntax is the set of rules that defines the combinations of
symbols in a programming language.
Semantics
Is the field concerned with the rigorous mathematical study of the meaning of
programming languages.
Constant
Operators
Variable
Arrays
EXAMPLES OF VARIABLES
through +/-
7.9228162514264337593543950335 with
28 places to the right of the decimal
4.94065645841246544E-324 through
1.79769313486231570E+308, for positive
values
8 bytes on 64-bit
platform
OPERATORS
There are many programming languages one may choose to use when developing systems,
projects or applications in computer science ranging from python, vb.net, c++, c, c#, pascal, java,
android, e.t.c.As stated by your syllabus we will be focusing more on vb.net.
When we want to develop a program using any programming language, we follow a sequence of
steps. These steps are called phases in program development. The program development life
cycle is a set of steps or phases that are used to develop a program in any programming
language.
Generally, program development life cycle contains 6 phases, they are as follows….
1. Problem Definition
2. Problem Analysis
3. Algorithm Development
4. Coding & Documentation
5. Testing & Debugging
6. Maintenance
1. Problem Definition
In this phase, we define the problem statement and we decide the boundaries of the problem. In
this phase we need to understand the problem statement, what is our requirement, what should be
COMPILED BY MR NYAMBO A. T #FAILURE IS NOT PART OF OUR OBJECTIVES
COMPUTER SCIENCE NOTES FORM 1 BY MR NYAMBO A. T
the output of the problem solution. These are defined in this first phase of the program
development life cycle.
2. Problem Analysis
In phase 2, we determine the requirements like variables, functions, etc. to solve the problem.
That means we gather the required resources to solve the problem defined in the problem
definition phase. We also determine the bounds of the solution.
3. Algorithm Development
During this phase, we develop a step by step procedure to solve the problem using the
specification given in the previous phase. This phase is very important for program development.
That means we write the solution in step by step statements.
This phase uses a programming language to write or implement actual programming instructions
for the steps defined in the previous phase. In this phase, we construct actual program. That
means we write the program to solve the given problem using programming languages like C,
C++, Java etc.,
During this phase, we check whether the code written in previous step is solving the specified
problem or not. That means we test the program whether it is solving the problem for various
input data values or not. We also test that whether it is providing the desired output or not.
6. Maintenance
During this phase, the program is actively used by the users. If any enhancements found in this
phase, all the phases are to be repeated again to make the enhancements. That means in this
phase, the solution (program) is used by the end user. If the user encounters any problem or
wants any enhancement then we need to repeat all the phases from the starting, so that the
encountered problem is solved or enhancement is added.
9 DATABASE
DATABASE THEORY NOTES
Database
File
Field
Record
A collection of related fields describing an entity, e.g patient.
Tables
These are equivalent to files and therefore are used to store data.
The data is stored in rows and columns.
Each row in a table is called a record which is made up of a number of fields (columns in
the table).
The data type in the fields is usually either text, numeric or date/time.
Most databases contain a number of tables which are usually linked together in some
way.
Forms
Forms are commonly called data entry screens since they are the user interface which
allows data in the tables to be viewed, entered or edited.
Forms permit the control of how other users interact with the information in the
database e.g. only allow certain fields to be seen or only allow certain operations to be
carried out.
This subsequently helps the protection of the information and also ensures it is entered
correctly
Reports
Queries
Queries are questions that request certain data from tables, e.g, Amount <200.
It can also be an instruction to search data which meets a certain criteria from table and
display it on the screen in form of another table created from the original table.
Most commonly allow information to be retrieved from tables.
They also allow filtering so only the records required are seen.
Macros
DATA TYPES
Numeric
consists of digits 0-9 only (negative or positive), 12, 900, -50, etc
Alphabetic
Consists of letters of the alphabet (a-z, lowercase or uppercase) only, for example a
person’s name, like TINOTENDA.
Alphanumeric
Combination of digits and letters of the alphabet, eg. National Identification Number,
like 27-134575-C-27.
Text
Combination of digits and letters of the alphabet.
String
Combination of digits and letters of the alphabet
Currency
in monetary value, e.g. $10.00
Date/time
shows date and time, e.g. 27/01/1997
Array
An array is a series of elements of the same type placed in contiguous memory locations
that can be individually referenced by adding an index to a unique identifier.
FIELD SIZE
The reason being that this makes the database more efficient, as allowing 2555
characters for every field when only 10 characters are normal is a waste of storage.
VALIDATION RULES
Validation rules prevent bad data being saved in your database table.
Basically, they look like criteria in a query.
You can create a rule for a field (lower pane of table design), or for the table (in the
properties box in the table design.) use table’s rules to compare fields.
There is one trap to avoid.
In some versions of Access, you will not be able to leave the field blank once you add
the validation rule, i.e. you must enter something that satisfies the rule.
If you need to be able to leave the field blank, add OR IS NULL to your rule.
INPUT MASK
Refers to a string expression, defined by a developer that governs what a user is allowed
to enter in as input in a textbox.
A template, or set format that entered data must conform to, mainly used for the purposes
of data integrity by preventing transcription errors.
PRACTICAL NOTES
10 WEB DESIGN
Web design
Website
Refers to the central location that contains more than one page. For example school
website.
Collection of related pages.
Web address
Is a reference to a web resource that specifies its location on a computer network and a
mechanism for retrieving it.
Example.
https:// protocol
Www subdomain
Paragon / u Directories
Web page
HTML
HTML contains or consist of tags that let the browser know what action to perform.
<a>
< br >
< h1 to h6 >
<p>
<u>
<b >
e.g. 1
< Head > < title > my first web page < / title > </Head >
</p >
< / Html>
e.g. 2
<html>
<head>
<title>Contact Us</title>
</head>
<body>
</body>
</html>
11 TECHNO-PRENEURSHIP
Techno- preneurship
It is the process of merging technology prowess and entrepreneurial talent and skills.
INTELLECTUAL CAPITAL
Is the intangible value of a business, covering its people (human capital), and the value
inherent in its relationships (relational capital, and everything that is left when the
employees go home.
Human capital
Organizational capital
Social capital
HUMAN CAPITAL
The skills, knowledge, and experience possessed by an individual or population,
viewed in terms of their value or cost to an organisation or country.
ORGANISATIONAL CAPITAL
The collective know how, beyond the capabilities of individual employees.
SOCIAL CAPITAL
Is a form of economic and cultural capital in which social networks are central,
transactions marked by reciprocity, trust, and cooperation, and market agents
produce goods and services not mainly for themselves, but for a common good.
BUSINESS ETHICS
Is a form applied ethics or professional ethics that examines ethical principles and moral
or ethical problems that arise in a business environment. OR
Is the study of proper business policies and practices regarding potentially controversial
issues, such as corporate governance, insider trading, bribery, discrimination, corporate
social responsibility and fiduciary responsibilities.
COMPILED BY MR NYAMBO A. T #FAILURE IS NOT PART OF OUR OBJECTIVES
COMPUTER SCIENCE NOTES FORM 1 BY MR NYAMBO A. T
Honesty. You need to be honest in all your actions, and every communication you make.
Integrity
Keeping your promises
Loyalty
Fair
Caring
Respect
Obeying the law
Marketing Strategy
Is a process that can allow an organisation to concentrate its limited resources on the
greatest opportunities to increase sales and achieve a sustainable competitive advantage.
Business strategy
THE END…………………………………………………………………………………………