0% found this document useful (0 votes)
6 views

Information and Communication Technology

The document provides an overview of Information and Communication Technology (ICT), defining data and information, and outlining the advantages of information systems. It discusses various applications of ICT across sectors such as government, education, health, agriculture, and entertainment, while also covering the evolution of computers and their generations. Additionally, it highlights the fundamentals of computer systems, data communication, networking, and data representation methods.

Uploaded by

shareehshiyad
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Information and Communication Technology

The document provides an overview of Information and Communication Technology (ICT), defining data and information, and outlining the advantages of information systems. It discusses various applications of ICT across sectors such as government, education, health, agriculture, and entertainment, while also covering the evolution of computers and their generations. Additionally, it highlights the fundamentals of computer systems, data communication, networking, and data representation methods.

Uploaded by

shareehshiyad
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

INFORMATION AND COMMUNICATION TECHNOLOGY

Data Informa�on
Data refers to unprocessed and meaningless raw Informa�on refers to the processed and
facts, including text, numbers, audio, video, and meaningful data that can be used to update
pictures. knowledge.
Differences
Unprocessed Processed
Independent Dependent on data
Meaningless Meaningful
• Informa�on System: A system that collects, processes, stores, and transforms data into informa�on.

Input Process Output


Function of an information system.

o Advantages of using an informa�on system


 Reduces errors, Increase produc�vity, and Ability to generate reports.
• Characteris�cs of quality informa�on
o Relevancy, Completeness, Accuracy, Timeliness, Cost Effec�veness.

APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY


1. E-Government.
E-Government refers to a government's communica�on with ci�zens, businesses, and organiza�ons
using informa�on and communica�on technology (ICT).
Government to Ci�zen Government to Government to Government to
(G2C) Government (G2G) Business (G2B) Employee (G2E)
 Payment of U�lity  Government Law  Banking Informa�on  Forms
Bills  Aid for Tourists  Business  Gazetes
 Renewal of vehicle  Map of Sri Lanka Registra�on  Circulars
licenses

2. In the Field of Educa�on


a. E-Classroom
i. For Presenta�ons, Videos on Experiments, Educa�onal Games(Edutainment)
b. Learn from anywhere at any �me
i. www.nenasala.lk, www.e-thaksalawa.moe.gov.lk
c. As an Aid for the teacher
i. Using presenta�ons to make lessons interes�ng, Using pictures and anima�ons to explain
subjects that are difficult to explain.
d. Learning Management System (LMS)
i. For a Student
1. Access resources from anywhere at any �me
2. Upload the assignments and homework
ii. For School Management
1. Maintain Student’s Details
2. Share Resources
3. Q & A programs through forums

1|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
3. ICT in the Health Sector
a. Use of ICT in diagnosis
i. CAT - Computerized Axial Tomography Machine
ii. MRI (Magne�c Resonance Imaging Machine)
iii. ECG - Electrocardiogram Machine
iv. EEG (Electro-encephalography)
v. Blood Sugar Tes�ng Machine (Glucometer)
b. Telemedicine
i. Emergency Telemedicine
ii. Home health medicine
iii. Telemedicine Consulta�on
iv. Telesurgery (Remote Surgery)
v. Medical Tele training
4. ICT in the Agricultural Industry
a. Meteorological Devices
b. Automated Insect Control Devices
c. Automa�c Weed remover
d. Seedlings planter using Robo�cs
e. Greenhouse (ICT controls light, moisture and air inside the greenhouse.)
5. ICT in the management of Farmhouse
a. RFID – Radio Frequency Iden�fica�on Device
b. Automated milking and examina�on of cows
c. Farm Management System
6. ICT in the Fishing Industry
a. SONAR Sensor
b. Underwater Cameras
7. ICT in Manufacturing Industry and Business
a. Using robots for manufacturing, packaging, labeling, filling botles, and other tasks.
b. Human Resource Management
c. Online Shopping
i. Open 24 hours.
ii. You can make payments using electronic methods, such as credit cards.
iii. Home delivery of goods and services saves �me and reduces transporta�on costs.
8. ICT in the Transport Sector
a. Use of CCTV
b. Traffic Light Control System
c. Parking iden�fica�on placard
9. ICT in Entertainment
a. Social Networks
b. E-books available online
c. Downloading and listening to music

Demerits(Disadvantages) of ICT:
Addic�on, Building unsuitable friendships through social media and Improper use of internet.

2|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
EVOLUTION OF THE COMPUTER
• In order to add numbers, a device called Abacus was invented around 5000 years ago.
• In 1642, Blaise Pascal invented the Adding Machine.
o This was the world’s first ever mathema�cal machine.
• In 1674, Go�ried Wilhelm Von Leibnitz improved the to perform mul�plica�on and division.
• Joseph Jacquard invented a mechanical loom using Punch Card System.
• Charles Babbage made the Analy�cal Engine using the Punch Card System concept.
o This machine was based on the concepts input, process, output and store.
o Charles Babbage is called the father of compu�ng.
• Madam Ada Augusta Lovelace is the first programmer.
o She wrote programmes for the Analy�cal Engine.
• In the year 1944, Howard Aiken invented the Automa�c Sequence Control Calculator.
o This was named MARK 1.

COMPUTER GENERATIONS
Genera�on Hardware So�ware Characteris�cs Inven�ons
1st Genera�on Vacuum tubes for Machine Language High heat genera�on ENIAC
processing, Assembly Language Slow in Processing EDVAC
(1940 – 1956) Punch Card for storing. Large in size EDSAC
16 years Expensive UNIVAC
High electricity usage. IBM 701
2nd Genera�on Transistors for Assembly Language Honeywell 400
processing, High-level IBM 7030
(1956 – 1963) Tapes and Floppy disks Programming CDC 1604
Compara�vely;
7 years for storing. Language. UNIVAC LARC
Less heat genera�on
Faster in Processing
3rd Genera�on Integrated Circuits for Birth of Opera�ng IBM 360
Small in size
Processing, Systems (CLI) PDP 8
Less expensive
(1964 – 1975) High Capacity disks for PDP 11
Less electricity usage
11 years storage, CDC 6600
Mouse & Keyboard for
data input.
4th Genera�on Large Scale Integrated Opera�ng Systems Very small in size IBM PC
Circuits and Very Large with Graphical User Portable Apple II
(1975 – 1989) scale Integrated Circuits interface (GUI) Upgradable
14 years (Microprocessor) for Ex: Unix OS
processing,
High Capacity Hard
disks and Op�cal Disks
for storage,
Faster Computer
Networks.
5th Genera�on Ultra Large Scale Internet and Portable IBM Notebooks
Integra�on circuits for mul�media Easy Opera�on Pen�um PCs
(1989 – Present) processing, applica�ons High reliability SUN
Very High Capacity High efficiency worksta�on
Hard disks and op�cal Ar�ficial
disks for storage, Intelligence (AI)
Internet.

3|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
FUNDAMENTALS OF A COMPUTER SYSTEM

• A computer is an electronic device, which collects data, processes them according to the given
instruc�ons and produces the desired output.
• Features of a computer: Speed, Accuracy, Storing & Retrieving, Efficient, Versa�lity.

Classifica�on of Computers
According to size According to Technology
Super Mainframe Mini Computer Micro Analog Digital Hybrid
Computer Computer Computer Computers Computers Computers
High Compu�ng Less powerful Smaller, less Small

Ex: Speedometer.
Use analog signals

Ex: Smartphones
Use digital signals

Ex: ECG Machine


Use both analog and digital signals.
Power, and expensive powerful, and computers for
Large Sized, than less expensive personal use
Expensive. supercomputers. than
mainframes. Small memory
Used in, Used in, capacity,
Large scale e-business, Common compact size,
businesses, internet purpose low speed,
Military, To transac�ons. computers inexpensive,
solve complex low power
mathema�cal Server consump�on
problems. computers
Ex: Laptops,
handheld
devices,
smartphones.

FUNCTIONS OF A COMPUTER SYSTEM


• The main func�ons of a computer system is to input data, process and store data, and to output
informa�on when needed.

4|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Basic physical components of a computer system
Input Devices Output Devices CPU Computer Computer Ports
Memory
> Keyboard > So� Copy Main component > Main Memory PS/2 Ports – To
101/102 Keys - Monitor of a computer - RAM (Random Connect the
 CRT, LCD, LED system. Access Memory) keyboard and
> Poin�ng Devices - Mul�media Projector mouse
- Mouse 3 Components: Temporarily stores
- Joys�ck > Hard Copy  Arithme�c data (vola�le)
- Light Pen - Printers Logic Unit (ALU) Has both read-
- Touch screen  Impact Printers - Performs all write facility. Parallel Port – To
(Head or needle strikes mathema�cal and connect old
> Imaging and video against ribbon, Noisy) logical func�ons - ROM printers.
input # Dot Ma�x (Read Only
- Digital Camera # Line Printer  Control Unit Memory)
- Webcam  Nonimpact Printers (CU) Permanently stores HDMI – Connects
- CCTV (Not Noisy, High Quality, - Controls all data (non - vola�le) monitor, projector,
High Cost, Quick Prints) devices of a The commands TV and speakers to
> Scanners # Laser Printer computer system required for boo�ng computer
- Flatbed Scanner # Inkjet Printer up a computer are
- Barcode Reader # Thermal Printer  Memory stored in ROM.
- MICR Registers RJ45 Port –
- OCR (Characters) > Sounds - Temporarily - Cache Memory Connects computer
- OMR (Marks) stores data Acts as the to network switch.
- ATM (Scans Card) needed for mediator between
func�on of ALU. CPU and Primary
> Microphone Memory. Audio Ports –
Connects
Computer speed > Secondary Microphone (pink),
is measured by Memory Headphone(Green),
Hertz (MHz and Used to store data CD Player(Blue).
GHz) Permanently (non-
vola�le)
USB – Many types
- Magne�c Media
of input and output
Ex: Hard Disk
devices
- Op�cal Media
Ex: CD, DVD
- Solid State
Devices Video Port –
Ex: USB, SD Card Connects monitor
or mul�media
projector

Serial port –
Connects modem
to a computer

5|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
DATA COMMUNICATION
Basic components for data Transmission
 Sender/Source
 Medium
 Receiver/Des�na�on
Data transmission modes
 Simplex Mode
 Half-duplex Mode
 Full-duplex Mode
Transmission Media Example Characteris�cs
Unshielded Twisted Pair Maximum 100 meters
Used in Telephone Connec�ons
Guided / Wired Shielded Twisted Pair Used in Mobile charging cables
Coaxial Cable Used in TV Antennas, CCTV
Fiber Op�cs Used in Internet cables
Radio Waves Data transmited through air
Used in Wi-Fi and Bluetooth
Micro Waves Data transmited through air
Unguided / Wireless More than 36000km
Used in Dish TV, Satellite
connec�ons
Infrared Used in Remote controllers
• There should be two or more computers to build a computer network.
Networking Device Use
Network Interface Card (NIC) Helps to connect computer to a wireless network.
Switch / Hub Connect mul�ple devices together.
Wireless Fidelity (Wi-Fi) Connect mul�ple networks together.
Modem Connect the device/network to the internet.
Firewall Protects network from unauthorized access.
6|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Switch Hub
Sends data to the relevant computer only Sends the transmited data to all computers
Uses full duplex mode Uses half duplex mode

• Client is the computer that’s reques�ng for the data/informa�on.


• Server is the computer that responds for the request made.
Types of Computer Networks (Based on geographical loca�on)
LAN (Local Area Network) MAN (Metropolitan Area Network) WAN (Wide Area Network)
A network that connects A network that covers a larger area A network that covers a large
devices within a small areas than a LAN but smaller than a WAN geographical area such as
such as home, office building. such as a city or metropolitan area. country or even the world.

NETWORK TOPOLOGY
Star Topology Bus Topology Ring Topology

The breakdown of switch/hub The breakdown of the main cable The breakdown of one computer
will affect the en�re network will affect the en�re network. may affect the en�re network

Tree Topology Mesh Topology

This is formed by combining bus Very expensive due to high


and star topology. number of cables being used.

Benefits of Networking:
 Data and informa�on can be shared easily.
 Ability to share resources.
 Email
Disadvantages of Networking:
 Possible security issues.
 Breakdown of a Network..
 Training requirements.

7|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
DATA REPRESENTATION METHODS IN THE COMPUTER SYSTEM

Number System Base/Radix Characters Used


Binary 2 0, 1
Octal 8 0, 1, 2, 3, 4, 5, 6, 7
Decimal 10 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Hexadecimal 16 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F

Most Significant Digit Least Significant Digit

329 329
58.32 58.32
Most Significant Bit (Only in Binary) Least Significant Bit (Only in Binary)
23 20
1001 1001
011.101 011.101
21
2-3

Number Conversions
Decimal to Binary Decimal to Octal Decimal to Hexadecimal
Conver�ng 4610 to a binary number. Conver�ng 15810 to a octal number. Conver�ng 4710 to a hexadecimal
number.

Binary to Decimal Binary to Octal Binary to Hexadecimal


Conver�ng 11012 to a decimal Conver�ng 10111012 to a octal Conver�ng 101102 to a hexadecimal
number. number. number.

Octal to Decimal Octal to Binary Octal to Hexadecimal


Conver�ng 12758 to a decimal Conver�ng 4578 to a binary number. Conver�ng 10578 to a hexadecimal
number. number.

8|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Hexadecimal to decimal Hexadecimal to Binary Hexadecimal to Octal
Conver�ng 32916 to a decimal Conver�ng 2AE16 to a binary Conver�ng 23A16 to a octal number.
number. number.

• Following are the rela�onships between units which measure data storage capacity.
o 4 bits = 1 nibble
o 8 bits = 1 byte
o 1024 bytes = 1 kilobyte (KB)
o 1024 kilobytes = 1 Megabyte (MB)
o 1024 Megabytes = 1 Gigabyte (GB)
o 1024 Gigabytes = 1 Terabyte (TB)
o 1024 Terabytes = 1 Petabyte (PB)

Capaci�es of data storage Data Access Speed

Cost per unit storage

9|Page
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Coding Systems
4 bit

BCD – Binary Coded Decimal

7 bit (128 characters)

ASCII – American Standards Code for Informa�on


Interchange

EBCDIC – Extended Binary Coded Decimal 8 bit (256 characters)


Interchange Code
Unicode 16 bit (65536 characters)

LOGIC GATES WITH BOOLEAN FUNCTIONS

Logic Gates
Basic Logic Gates Combina�onal Logic Gates
AND GATE NOR GATE (NOT + OR)

OR GATE

NOT GATE NAND GATE (NOT + AND)

10 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
OPERATING SYSTEMS

• A Computer consists of hardware(any physical component of a computer system with a definite shape),
firmware(boo�ng instruc�ons stored in the ROM) and so�ware(instruc�ons given to the computer to
perform some ac�vity).
• Ini�al Opera�ons of a Computer
1. CPU ac�vates BIOS.
2. POST program checks hardware via CMOS.
3. Reads Master Boot Record from boot drive using bootstrap loader.
4. Loads Opera�ng System into RAM.
5. Displays user interface.

OPERATING SYSTEM

• Importance of an Opera�ng System


o Facilitate the interac�on between user and hardware.
o It helps to install and use other programs.
o Manages all the input, output and computer memory.
• Examples: Microso� Windows, Apple Mac, Ubuntu, Android.
• Services:
o Managing the Hardware of the computer
o Providing user interface.
Types of Opera�ng Systems
Single user Opera�ng System
Provides service to one person at a �me.
Ex: MS DOS Opera�ng System
Mul� user Opera�ng System
Allows mul�ple users to use a system is simultaneously.
Commonly used in Mainframe or Server computer.
Ex: Linux, Windows Server
Mul�-tasking Opera�ng System
Allows to run mul�ple process at the same �me.
Ex: Window 7, Windows 10, Ubuntu, Mac Opera�ng System
Real Time Opera�ng System
Systems which gives the output in real �me without any observable delays.
Ex: ATM Machines, Calculators.
11 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
MAINTAINING THE HARDWARE OF A COMPUTER

Process Management File Management


- Dividing tasks into processes. - Handle file opera�ons
- Ordering process according to a sequence. - Handle file proper�es
- Managing CPU Time - Handle file access
- Handle file systems
 FAT16, FAT32, NTFS, Ex FAT
Memory Management Security Management
- Allocate RAM efficiently for each processes. - Protects PC Against Malware.
- Freeing RAM when a process ends. - Protects PC against Unauthorized Access.
- Protects against data destruc�on.
Device Management Network Management
- Controls peripheral devices such as using deice - Supports wired and wireless connec�vity.
controllers and drivers. - Enables Remote Access.
- Supports data communica�on.

PROVIDING A USER FRIENDLY INTERFACE

Command Line Interface (CLI) Graphical User Interface (GUI)

Requires good knowledge of commands Beginner Friendly


Doesn’t require more memory Requires more memory
Fast Slower

UTILITY SOFTWARE
• Backup So�ware - To copy files and take back up of hard drives
• Disk scanner - To check the errors in hard drive
• Disk defragmenta�on - Organizing the hard disk by rearranging clusters of small spaces together
and crea�ng a larger free space.
o Fragmenta�on slows down the computer. Defragmenta�on, Reorganizes data for efficient
access.
• File/data compression - Compression of larger files into smaller files
• Task Manager - to display informa�on regarding the processes and programmes in a computer and
the general status of the computer
• System diagnosis tools - to monitor errors in hardware and so�ware of a computer or network of
computers and diagnosis of system errors.
• An�-Virus So�ware - Protec�ng the computer by iden�fying and elimina�ng malicious so�ware
• Clipboard - temporary storage of data/files for cut/copy and paste opera�ons
• Disk par��oning so�ware - can divide an individual drive into mul�ple logical drives

12 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
• System profilers - to provide detailed informa�on about the so�ware installed and hardware
atached to the computer.
• Network u�li�es - to analyze the computer's network connec�vity, configure network se�ngs,
check data transfer or log events.

WORD PROCESSING

• Facili�es Provided by a word processing


so�ware
o Crea�on and edi�ng
o Insert objects such as images
o Print preview and prin�ng
o Spell checking and grammar
o Mail Merge

PROOF READING
1. Correc�ng Spelling and Grammar
2. Thesaurus: Used to find synonyms for the words
3. Find and Replace words
MAIL MERGE – STEPS
Mailings Tab  Start Mail Merge Leters
Select/Create Data Source: Select Recipient  Type new list or use exis�ng
list
Click on customize to modify fields.
Enter data and save.
Create Address block using more and match field.
Add Gree�ng Line.
Add fields using Insert Merge Fields.
Finish & Merge edit individual documents.

13 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
SHORTCUT KEYS

ELECTRONIC SPREADSHEETS

• Advantages of using electronic spreadsheets:


o Presenta�on of data in charts
o Protec�on of data using passwords
o Saving for future use

• The contents of a cell would be either a label, value or formula.


o Label :- A combina�on of leters, numbers, special symbols or the text.
o Values :- The data with numerical figure.
o Formulae :- The expressions beginning with an equals ‘=’ mark using values, cell address and
func�ons.
• Order of operator precedence to use in formulae is BEMDAS. (Bracket, Exponent, Mul�plica�on,
Division, Addi�on, Subtrac�on)
FUNCTIONS IN SPREADSHEET APPLICATIONS
• SUM  Adds the values contained in a range of cells.
• AVERAGE  Finds out the average of the values contained in a range of cells.
• MAX  Finds out the largest value contained in a range of cells.
• MIN  Finds out the smallest value contained in a range of cells.
• COUNT  Counts the number of cells that contain numeric values within a range of cells.
• COUNTA  Counts the number of non-empty cells within a range of cells, including those with
text, numbers, or any other data.
14 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
• Shortcut to iden�fy values and labels  Labels (text) are le�-aligned, while values (numbers) are
right-aligned by default.

1. Font 6. Orienta�on 13. Right Alignment


2. Font Size 7. Number Format 14. Increase Decimal
3. Ver�cal Top Alignment 8. Bold Places
4. Ver�cal Middle 9. Italic 15. Decrease Decimal
Alignment 10. Underline Places
5. Ver�cal Botom 11. Le� Alignment
Alignment 12. Center Alignment

• Rela�ve and Absolute cell reference.


o A1 - Rela�ve cell reference
o A$1 - Row absolute cell reference
o $A1 - Column absolute cell reference
o $A$1 - Row and column absolute cell reference
COPYING A FORMULA (FILL HANDLE TOOL IS USED)
Rela�ve cell reference – Column leter and
Row numbers change.

Row absolute cell reference – Column leter


changes, row number remains.
Column absolute cell reference – Column
leter remains, row number changes.
Row and column absolute cell reference –
Column leter and Row numbers remain.

TYPES OF CHARTS

For comparing three or


more types of data.

15 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
ELECTRONIC PRESENTATIONS

• Tools for presenta�on: • Characteris�cs of a Good Quality


o Overhead Projector. Presenta�on:
o The Slide Projector. o Limit to 6-9 lines per slide for clarity.
o Mul�media Projector. o Use a font size of 32 points or larger for
readability.
o Ensure correct grammar and language
use.
o Include only one image, drawing, table, or
graph per slide to avoid cluter.
o Tailor the presenta�on to the needs and
Presentation Software
interests of the target audience.

Func�on Shortcut
New Presenta�on Ctrl + N
New Slide Ctrl + M
Black screen while B
presen�ng
White screen while W
presen�ng
Next Slide N
Previous Slide P
Slideshow View F5

DATABASE

• Collec�on of organized data can be defined as a database.


• Advantages of Databases:
o Easy to obtain copies.
o Smaller Physical space to store data.
o Ability to Analyze Data.
o Data can be shared easily.
• Features of an Electronic Database:
o Minimal data redundancy
If the same data is stored in several tables, this is called data redundancy.
By storing related database in tables, data redundancy can be minimized.
o Minimal Data inconsistency
The same data being saved in different forms in various tables is called data inconsistency.
By minimizing data redundancy, data inconsistency can be reduced or prevented.
o Increases efficiency
o Increases accuracy
o Security

16 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
• Data: An individual piece of informa�on related to a specific field.
• Field: A single piece of data or atribute within a record.
• Record: A collec�on of related fields represen�ng a single en�ty or item.
• Table: A collec�on of records organized in rows and columns.
• Rela�onal Database: A collec�on of related tables that store data and allow for rela�onships between
different data sets.
• A column which enables to iden�fy a record uniquely is called primary key.
• The primary key which consists of two or more columns of a table uniquely iden�fies a record is called
Composite Primary Key.
• If a field of one table can be used to uniquely iden�fy rows of another table, this field is called the
foreign key.
• Recording column data repeatedly is called data duplica�on.
o Disadvantages of Data Duplica�on:
 Inability to select a primary key field to maintain iden�ty of records.
 Inability to analyze data properly.
 Reduced efficiency.
 Possibility to make errors in dele�ng data.
• Commonly used Data types in a Database:
o Numeric (Integer [Ex: 12, -23] & Real [Ex: 2.20808, -2349.2])
o Text (Leters, Numbers, Special Characters)
o Currency [Ex: $145.96, Rs. 2208.08]
o Date / Time [Ex: 15/01/2025, 08:30PM]
o Boolean [Ex: True or False].
• Rela�ons in a Rela�onal Database
o One to One Rela�onship (only a row of a table is related to a row of another table)
o One to Many Rela�onship (each record of a table is related to several records of the other table)
o Many to Many Rela�onship (record of a table is related to several records of another table and if
a record of that related table is related to several records of the other table)
• Forms are used to enter data to a table in Database Management Systems.
• A query is used to obtain necessary informa�on from the data of related tables.
• Reports are used to obtain printed copies of important informa�on received from the data of related
tables.

17 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
PROGRAMMING

• Input refers to the data received by a system to be processed. Process is the ac�on taken by a system to
transform input data into a meaningful informa�on. Output is the result produced by a system a�er
processing the input.
CONTROL STRUCTURES
1. Sequence
Ex: Climbing up or down step by step when going on a staircase

2. Selec�on
Ex: If the mark is 35 or more It is a Pass If not It is a Fail

3. Repe��on
Ex: Marking the atendance register student by student �ll the last name of the register is called.
FLOWCHARTS
• Flowcharts are used to present how the algorithm is built step by step in a drama�c manner.

PSEUDO CODES
• When an algorithm is presented in simple English terms it is called a pseudo code.
TERMS USED IN PSEUDO CODES
BEGIN - To indicate a beginning
END - To indicate an end
INPUT , READ , GET - To indicate an input
OUTPUT, DISPLAY , SHOW - To show an output
PROCESS, CALCULATE - To indicate a process
IF … THEN .. .ELSE … ENDIF - To indicate a selec�on
FOR – DO
WHILE – ENDWHILE - To indicate a repe��on
REPEAT – UNTIL
18 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Flowchart Pseudo Code
Example 1: Finding whether a number is even or odd

Example 2: Finding the total of some numbers

Example 3: Finding the smallest number from 10 input numbers

19 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
PASCAL PROGRAMMING

• An iden�fier is a term used to represent a variable, constant or a program.


RULES TO BE FOLLOWED WHEN DECLARING AN IDENTIFIER
- Reserved words in Pascal cannot be used as an iden�fier name.
- Should start with an English leter.
- A�er the first leter of the iden�fier, leters (a-z, A-Z) or numbers (0-9) and underscore ( _ ) can be used.
- Not case sensi�ve (E.g. - Art, art, ART will be the same iden�fier)
- There should not be any space between words. (E.g. – “Student Name” is Not valid)
- The only valid special character is the underscore ( _ )
STANDARD DATA TYPES IN PASCAL
- Integer > Plus or minus whole numbers
- Real > Plus or minus decimal numbers
- Boolean > True or False
- Char > Any one character of the keyboard
- String > Any sequence of characters
VARIABLES, CONSTANTS AND OPERATORS
- A variable is an iden�fier which changes the values given to it when the program is being executed.
o In Pascal, “var” is used to declare a variable
- A constant is an iden�fier which do not change their values while the program is executed.
o In Pascal, “const” is used to declare a constant.
- Operators are required to perform calcula�ons, comparisons, and to evaluate logical expressions.
1. Algebra Operators

2. Comparison Operators

3. Logical Operators
 AND Operator, OR Operator, NOT Operator
ORDER OF OPERATIONS IN PASCAL

20 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
BASIC COMPONENTS OF A NORMAL PASCAL PROGRAM

IF Statement
IF... THEN.... ENDIF IF... THEN.... ELSE .......... ENDIF
Program: If the input number is only posi�ve, print Program: Finding the larger number from two
the number. unequal numbers

NESTED IF

21 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
CASE STATEMENT

FOR – DO (Method 1) FOR – DO (Method 2)

WHILE DO
Statements inside the loop are executed only if the condi�on is true.
REPEAT UNTIL
Loop is started if the condi�on is false only.

ARRAYS
• An array is used to save data items of the same type in memory using a single variable iden�fier name.
𝑉𝑉𝑉𝑉𝑉𝑉 𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁_𝑜𝑜𝑜𝑜_𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴 ( 𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 [𝑓𝑓𝑓𝑓𝑓𝑓𝑓𝑓𝑓𝑓 𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖 . . 𝑙𝑙𝑙𝑙𝑙𝑙𝑙𝑙 𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖] 𝑜𝑜𝑜𝑜 𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑 𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡

SUB PROGRAMS
• Sub programs are used to ease the complex programs.
• There are two types of sub - programs in addi�on to the main programs:
o Func�on is a subprogram which returns an output.
o Procedure is a subprogram which does not give an output.

22 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
• The purpose of the use of sub-programs are to improvement of code reusability, readability, ease of
tes�ng and maintainability

Programming languages
Machine language Assembly language High-level language
Binary numbers such as 0s and 1s Designed to use simple symbols. Designed with simple English
(bits) are used to provide words enabling the programmer
instruc�ons. to understand it easily.
Fast in Opera�on Compara�vely slower than the Compara�vely slower than
machine language Assembly language
No need of transla�ng programs Should be translated using an Should be translated using
assembler compiler or interpreter
Dependency on Machines. Does not depend on machine

DIFFERENT APPROACHES TO COMPUTER PROGRAMMING


Programming Paradigms
Impera�ve Declara�ve
Procedural Object Oriented Parallel Processing Logic Func�onal Dataflow Database
C Java Java Prolog Lisp SQL
BASIC Python CUDA Datalog TensorFlow MongoDB

LANGUAGE TRANSLATORS
Two types of language translators can be used to translate a program writen in a high-level language to
machine language instruc�ons. They are:
1. Interpreter
This is the language translator which translates each statement writen in a high-level computer
language to machine language commands one by one and the translated program is executed using
the necessary commands instantly.
2. Compiler
Compiler translates the en�re program writen in a high level language to machine language as a
whole, before it could be executed.

23 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
SYSTEM DEVELOPMENT LIFE CYCLE

• A system is a collec�on of components that interact to achieve a specific task. A system which
converts data into Informa�on is known as informa�on system.

Computer based informa�on systems Manual Systems


Errors are Minimal More room for Errors
Data can be processed efficiently Compara�vely Less efficient
Requires less physical space for storage Requires larger physical space for storage
Provide Security No Security

PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE FACT FINDING TECHNIQUES


1. Iden�fica�on of requirements 1. Observa�on
2. Designing the solu�on 2. Interviews
3. Coding of the solu�on 3. Ques�onaries
4. Tes�ng and debugging 4. Document sample collec�on
5. Deployment of the system 5. Prototyping
6. Maintenance of the system

METHODS TO TEST A SYSTEM


Unit Tes�ng Each unit in the system is tested.
Integra�on Tes�ng Integrated system is tested
System Tes�ng The complete system is tested for its outputs for the given inputs.
Acceptance Tes�ng Carried out at with the users of the system and the user is allowed to use
the system.

METHODS TO DEPLOY A SYSTEM


Direct Deployment The exis�ng system is totally terminated and the new system is installed.
Parallel Deployment The exis�ng and the new systems are used parallel for a certain period.
Pilot Deployment Using the newly developed system in a selected area.
Phased Deployment New system is deployed in stages.

SDLC MODELS
Waterfall Method Defini�on: An SDLC model where each phase must be completed before
the next begins, with no overlap between phases.
Advantage: Well-suited for projects with clear requirements.
Disadvantage: Not ideal for complex or evolving projects.
Itera�ve Incremental Model Defini�on: This model focuses on an ini�al implementa�on, then
progressively adds more features through itera�ons, allowing for
feedback and refinements.
Advantages: Can see a part of the system before release, Allows for
feedback and con�nuous improvement.
Disadvantages: Requires effec�ve planning and design.
Prototyping Model Definition: Creating a prototype (a working model) early in the development
process to understand requirements and refine them through iterative feedback.
Spiral Model Definition: Combination of iterative development with the systematic aspects of
the Waterfall Model, focusing on risk analysis at each iteration.

24 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
THE INTERNET AND THE ELECTRONIC MAIL

• The Internet is a collec�on of computer networks around the world.


• The Internet does not possess a single owner.
• A non-profitable organiza�on called "The Internet Society" is in charge of the ethics and principles
related to the use of the Internet and the protocols which maintain Internet opera�ons.
PARTS OF A URL

IP ADDRESS
- Internet Protocol (IP) addresses are used to individually iden�fy all the computers in the Internet.
- These IP addresses are assigned by an Internet Service Provider (ISP).
HOW THE INTERNET WORKS

The Internet is controlled by protocols. Following are some protocols used in the Internet.

Protocol Full Form Usage


HTTP Hypertext Transfer Protocol HTML document exchange
TCP/IP Transmission Control Protocol / Internet Controlling the exchange of IP addresses
Protocol
FTP File Transfer Protocol File exchange
SMTP Simple Mail Transfer Protocol Electronic mail exchange
ICMP Internet Control Message Protocol Informing and controlling messages when
there are errors

25 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
SERVICES OF THE INTERNET
1. World Wide Web – WWW
- World Wide Web is a large collec�on of electronic documents saved in computers all around the world
connected to the Internet.
- Sir Tim Berners Lee is considered the father of WWW
2. File Transfer Protocol
- FTP is used to transfer large files of one computer in the Internet to another computer.
3. Remote Access
- Controlling and opera�ng a computer in the Internet remotely is performed through remote access.
4. File Sharing
- Sharing of various files in the Internet.
5. Streaming of Media

6. Search Engines
- Search engines are designed for the Internet users to find any informa�on easily.
7. Electronic Mail (e mail)
- Electronic mail enables exchanging messages as electronic mails or files between two or more people.
- E mails are categorized inside an e mail account for easy use.
o Inbox - To store mails received.
o Dra�s - To store mails that are composed to be sent but could not be completed .
o Sent - To store mails sent.
o Trash/Deleted - To store mails for a certain period that are deleted.
o Spam/Junk - To store mails that are unwanted.
VIDEO CONFERENCING
• Video conferencing is conduc�ng a conversa�on between two or more persons in different (remote)
loca�ons using audio and video transmission over computer networks.
• The requirements are as follows for a video conference Computers, Web cam, Internet connec�on and
Communica�on so�ware
CLOUD COMPUTING

• Cloud compu�ng is the prac�ce of using a network of remote servers hosted on the Internet to store,
manage and process data, rather than a local server or a personal computer.

26 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
• The main services of cloud compu�ng are;
o Infrastructure as a Service (IaaS)
o Pla�orm as a Service (PaaS)
o So�ware as a Service (SaaS)
• Advantages: Lower so�ware cost, Improves performance, Instant so�ware updates
• Disadvantages: Requires a constant internet connec�on, Does no work well with slow internet speed.

USE OF MULTIMEDIA

• Drawings or images, created with the use of computer graphic so�ware, are called digital graphics.
• Basic elements of digital graphics
o Pixel
 A pixel is a �ny illuminated dot having a colour which is displayed on a computer screen.
 𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶 𝑝𝑝𝑝𝑝𝑝𝑝 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 = 2𝑏𝑏𝑏𝑏𝑏𝑏 (𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏 𝑝𝑝𝑝𝑝𝑝𝑝 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝)
o Resolu�on
 The physical dimension is displayed as the image resolu�on.
o Size
 The size of a graphic is determined by the number of pixels, the number of lines and the colour
combina�ons used for the crea�on.
 Graphic compression is used to compress file size.
Lossy Compression Lossless Compression
Original form of Data is Lost Original Data is preserved
Smaller File Size Larger File Size
Reduced quality depending on level of No loss in quality
compression
File Formats: JPEG, TIFF, BMP File Formats: GIF, PNG, RAW

o Colour
 There are about 16 million of recognizable colours visible to the naked eye.
 Two widely used colour models are RGB(Red, Blue, Green) and CMYK(Cyan, Magenta, Yellow,
Black).
 RGB is used to create images on television screens or computer screens using coloured lights.
 CMYK is used for prin�ng on paper using coloured inks.
GRAPHIC TYPES

Criteria Raster Graphic Vector Graphic


Creation of the graphic Array of pixels in different By collec�on of straight or curved
colours lines
File Records No Records Maintains a record.
Quality of the graphic Quality is lost when the size Quality is not lost when the size
changes changes
For high quality creations Not suitable Suitable
Creation and saving Use less memory space Needs more memory space
Computer speed in Creation Does not change Reduces
Examples of Software Adobe Photoshop, GIMP Adobe Illustrator, CorelDRAW

27 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
GIMP – FOR RASTER GRAPHICS - TOOLBOX

28 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
ANIMATION
- Anima�on is an op�cal illusion to show the movements of an object or objects.
- Key Frame: The main, sta�c frame in a series of frames to be used with the crea�on of an anima�on.
- Tween Frames: Anima�on is created in the Tween Frame.
- Blank Keyframe: Provides a blank frame to include a content.
- Anima�on So�ware: Vectorian Giato

AUDIO EDITING
- So�ware Used: Audacity

• A video clip that is created using Windows Movie Maker is saved .WLMP (Movie Maker Projects)
format.

WEB DESIGNING USING MULTIMEDIA


WEB APPLICATIONS WEB USER GROUPS
i) Informa�on Communica�on Those who access a website and use are known
ii) e Commerce as the users of the website. The following are
iii) Entertainment useful in understanding them:
iv) Adver�sing 1. Language and culture
v) News 2. Age
vi) Social Media 3. Educa�onal Level
vii) Search Engine 4. Gener
viii) Personal 5. Preferences
WEB CONTENT FEATURES OF A WELL ORGANIZED WEBSITE
- Texts
- Easy to use
- Images
- Can find the informa�on user needs fast
- Sound
- Atracts users
- Video
- Easy to update
- Anima�ons
- Has room to add new features later

29 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
USE OF BASIC HTML

• HTML Stands for Hyper Text Markup Language.


• HTML Editors: CoffeeCup, Seamonkey, Eclipse
• There will be no error messages if the HTML tag is indicated incorrectly, however, the web browser will
ignore that par�cular.
BASIC STRUCTURE OF AN HTML DOCUMENT THREE PARTS OF AN HTML TAG

HTML TAGS
Header Tag <h1>….</h1> makes the leters big and bold
The size and the thickness of the leters are
decreased gradually from <h1> to <h6>

Font Tag <font size=”5” face=”verdana” color=”grey”>LWA</font>


Center Tag <center>….</center>
This is a tag used to align content of your web page to the center along the
horizontal axis.
Text Forma�ng Tags

Image Tag <img src=”Path to Image” alt=”Text to show when image is unloadable”>

Other Atributes: width, height, border, align


No Closing Tag. These are called blank tags.
Paragraph Tag <p>…….</p>

Alignment can be adjusted using ‘align’ atribute with ‘le�’, ’right’, ‘center’,
‘jus�fy’ values

30 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Line Break <br>
Unordered Lists <ul type= “disc”>
<li>Item 1</li>
<li>Item 2</li>
</ul>

Type can be ‘disc’, ‘circle’, ‘square’


Ordered Lists <ol type=“I”>
<li>Item 1</li>
<li>Item 2</li>
</ol>

Type can be ‘1, ‘A, ‘a’, ‘i’, ‘I’


Descrip�on Lists <dl>
<dt> Title for the List </dt>
<dd>Item 1</dd>
<dd>Item 2</dd>
<dd>Item 3</dd>
</dl>
Anchor Tag <a href=“Path to Link”>LWA </a>
Table Tag <table border=’1’>
<tr>
<th>Column 1</th>
<th>Column 2</th>
</tr>
<tr>
<td>Item 1</td>
<td>Item 2</td>
</tr>
<tr>
<td>Item 3</td>
<td>Item 3</td>
</tr>
</table>

Atributes such as align, width, height, bgcolor, border, cellpadding,


cellspacing can be used for <table> tag
Atributes such as colspan, rowspan can be used in <td> tag

WEB DESIGNING SOFTWARE


There are various types of web designing so�ware. For instance,
1. Web authoring tools
Ex: Kompozer, Ckeditor, Bluegriffon
2. Content Management Systems (CMS)
So�ware used for dynamic website designing.
Ex: Joomla, Wordpress, Drupal

31 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Two Types of Websites according to Nature
Sta�c Websites Dynamic Websites
If the content of a website is maintained If the web content is o�en changed, such a
without any change over a period of �me, such website is called a dynamic website.
a website is called a sta�c website.
These are designed using so�ware such as PHP,
The web content can be changed only by ASP.net, JSP.
changing the code.
Here the web server generates informa�on
using a data base or program.

ROLES RELATED TO WEB DESIGNING FILE TRANSFER PROTOCOL/FTP


- Author - Designs interfaces of the website. - These are the so�ware used to transfer the
- Editor - Writes codes, checks errors and website you have designed to the selected
rec�fies those. web host
- Publisher - Fulfills tasks related to the - Examples: Filezilla, SmartFTP
publishing of the website.
WEBSITE DESIGNING AND DEVELOPMENT
- Administrator - Fulfills maintenance tasks
related to the web server and database.
- Users - Use the website.
REQUIREMENTS TO PUBLISH A WEBSITE
- A web designing so�ware
- A web host
- A domain name
- File Transfer Protocol
- Internet connec�on

INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY


ICT in Entertainment
- 3D Technology
- Holographic image processing
- Cartoon Films
- Digital Audio Materials
- Digital Games
32 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Problems Associated with the use of ICT
Legal Issues Related to Values Physical Problems Logical Security
> Data The�s > Plagiarism > Power cut  UPS > Using strong
> Unauthorized Access > Electricity passwords
to Computer systems Ways to avoid this: Fluctua�on  > Using so�ware
> Intellectual Property - Ci�ng Surge Protector firewalls
Right - Quo�ng > Robbery  CCTV > Backup your data
> Fraud - Referencing > Natural Disaster  to cloud storage.
Backup Data
Malicious So�ware Health issues E waste Social Issues
Effects: > Musculoskeletal Health hazards: > Digital Divide
> Decreased efficiency Problems > Damage to brain Digital divide is an
> Weaken computer > RSI – Repe��ve cells economic and social
hardware Stress Injury > Disrup�on of the inequality due to the
> Data the� and > CTS – Carpel nervous system differences in access
destruc�on Tunnel Syndrome > Allergies on the to, ability to or use of
> CVS - Computer skin Informa�on
Types: Vision Syndrome > Damage to DNA Communica�on
> Computer Virus > Headache and chromosome Technology.
> Computer worm > Stress
> Spyware Proper disposal of e- Reasons:
> Adware Steps to avoid: waste > Lack of Educa�on
> Bot > Keeping the > Reduce - Reduce > Poverty
> Browser Hijacking computer at eye unnecessary > Rural Background
> Phishing level. purchase
> Spam > The distance > Reuse - Sell or Digital bridge is
between the donate old without forming connec�ons
ICTA, Sri Lanka Standards computer screen discarding among people
Bureau and the Sri Lanka and the eye to be > Recycle - Direc�ng avoiding the digital
Emergency Computer 18 – 28 inches or irreparable devices divide.
Services have together 45 – 70 cm. to an ins�tute
organized to cer�fy > Keeping legs which recycle them > Digital Literacy
Informa�on Security ver�cal to the > Supply of
Management Systems ground with the computers
(ISMS) to ensure security soles flat on the
of informa�on. surface > De-skilling is also
one of the effects
of using ICT.
Machinery or
automa�on has
taken over skilled
labour in places of
work

33 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6
Misuse of ICT to harm Society
Cyber Crime
- Irresponsible use of social media has engendered misconduct in society. This irresponsible use is
iden�fied as cybercrime. A few such acts are:
o Uploading others’ images without permission
o Releasing unsuitable photographs or videos of women or young girls to the Internet and
making use of such images or videos to frighten, threaten or blackmail
o Giving publicity to informa�on that can harm a person’s reputa�on
o Using social media to give out false informa�on and, thereby atract others to finally destroy
lives
o Using unfair means to gain access to others’ personal accounts and stealing personal
informa�on.
- How can we protect ourselves from using social media?
o Be careful in selec�ng social media over the Internet
o Be cau�ous about making friends through social media over the Internet
o Avoid accessing suspicious e-mails
o Do not click on suspicious links that come through e-mail
o Ignore anonymous e-mails
o Do not allow social media to access the e-mail address book
o Do not use personal e-mail to access social media
o Avoid installing applica�ons in your computer that come through social media.
o Think twice before using social media

________________________________________________________________________________

For more free educational resources, notes, and tips to help with your studies, follow:
https://learnwithammaar.com/whatsapp

Learn with Ammaar


Empowering Students for a Brighter Future
Contact: [email protected] | +94 776 770 886
Follow us on Instagram: @LearnWithAmmaar
All rights reserved © 2025

34 | P a g e
Ammaar Ghani
07 7 6 7 7 0 8 8 6

You might also like