Complete CXC Information Technology
Notes
CXC INFORMATION TECHNOLOGY – COMPLETE STUDY GUIDE
1. COMPUTER FUNDAMENTALS AND INFORMATION PROCESSING
- Definition: The use of computer systems to process, store, and communicate information.
- Elements of a Computer System: Hardware, Software, Data, Procedures, People.
- Hardware: Physical parts of a computer (e.g., monitor, CPU, keyboard, mouse).
- Types:
- Input Devices: Keyboard, mouse, scanner, microphone.
- Output Devices: Monitor, printer, speakers.
- Storage Devices: Hard disk, SSD, flash drive.
- Processing Devices: CPU (Central Processing Unit).
- Advantages: Speed, accuracy, automation.
- Disadvantages: Cost, dependency, requires power.
- Software:
- Types: System software (OS), Application software (MS Word), Utility programs
(antivirus).
- Data Communication: Transmission of data between devices through a medium like cables
or wireless.
- Peripheral Devices: External devices connected to the computer (e.g., printer, scanner).
- Number Systems:
- Binary (Base 2), Decimal (Base 10), Octal (Base 8), Hexadecimal (Base 16)
- Conversion Examples:
- Decimal to Binary: 13 = 1101
- Binary to Decimal: 1010 = 10
- Binary to Hex: 10101010 = AA
- Binary Arithmetic: Addition/Subtraction (e.g., 1010 + 0101 = 1111)
- ASCII: American Standard Code for Information Interchange; represents text in computers.
- History of Computers: 1st to 5th generation (vacuum tubes to AI/microprocessors).
2. COMPUTER NETWORKS AND WEB TECHNOLOGIES
- Types of Networks: LAN, WAN, MAN, PAN.
- Network Devices: Router, switch, modem, NIC.
- Internet Services: Email, WWW, FTP, VoIP.
- Intranet: Internal organizational network.
- Extranet: External controlled access network.
- Differences: Intranet is private; Extranet shares part with external users.
- Advantages of Networking: File sharing, resource sharing, communication.
- Disadvantages: Security threats, maintenance.
- Web Page Creation: HTML, CSS, JS.
- Website Tools: Tags, forms, hyperlinks.
- Menus: Pull-down, pop-up – GUI features for navigation.
3. SOCIAL AND ECONOMIC IMPACT OF ICT
- Benefits: Improved communication, job creation, efficiency.
- Risks: Privacy issues, job displacement.
- Data Protection: Laws, policies, passwords, encryption.
- Unauthorized Access Prevention:
- Physical: Locks, surveillance.
- Software: Passwords, firewalls, antivirus.
- Integrity Destruction: Viruses, human error, hacking.
4. WORD PROCESSING AND WEB DESIGN
- Word Processing: Formatting, editing, mail merge.
- Web Design: HTML basics, form elements, layout design.
5. SPREADSHEETS
- Functions: SUM, AVERAGE, IF, COUNT.
- Cell References: Relative (A1), Absolute ($A$1), Mixed (A$1).
- Charts: Column, line, pie.
- Data Types: Numeric, alphanumeric.
- Spreadsheet Examples: Salary calculation, budgeting.
- Features: Autofill, formatting, formulas.
6. DATABASE MANAGEMENT
- Definitions:
- Database: Organized collection of data.
- Table: Contains records (rows) and fields (columns).
- Record: One complete set of related data.
- Field: One piece of data (e.g., Name).
- Data Types: Text, number, date, Boolean.
- Keys:
- Primary Key: Uniquely identifies a record.
- Foreign Key: Connects tables.
- Secondary/Alternative Key: Additional identifier.
- Features: Query, Form, Report.
- Relationship: One-to-many, many-to-many.
- Queries: SQL or form-based search.
- Data Integrity: Accuracy, consistency.
- Validation & Verification:
- Validation Types: Range, format, presence.
- Verification: Double-entry, proofreading.
7. PROBLEM-SOLVING AND PROGRAM DESIGN
- Algorithms: Step-by-step instructions.
- Flowchart Symbols:
- Oval: Start/End
- Rectangle: Process
- Diamond: Decision
- Pseudocode:
- Read, Print, IF...THEN, WHILE...DO, FOR...TO.
- Programming Terms: Variable, Constant, Literal.
- Control Structures: Sequence, Selection, Iteration (Loop).
8. PROGRAM IMPLEMENTATION
- Programming Languages:
- Low-level: Machine language, Assembly.
- High-level: Python, C, Java.
- Writing Code: Use of syntax, structure.
- Debugging: Error correction.
- Features: IDEs, compiling, testing.
SECURITY CONCEPTS
- Passwords: Authentication method.
- Benefits: Secure access.
- Risks: Can be cracked or forgotten.
EXAM TIPS
- Practice conversions regularly.
- Understand flowcharts and pseudocode clearly.
- Know definitions and examples for each topic.
- Revise past papers and multiple-choice formats.