Essentials of Computer Science Book 1SAMPLE
Essentials of Computer Science Book 1SAMPLE
COMPUTER SCIENCE
FORM 1
PALM
PUBLICATIONS
P R I VAT E L I M I T E D
ESSENTIALS OF
COMPUTER SCIENCE
FORM 1
ISBN: 978-1-77920-812-5
Published By
Palm Publications (Pvt)Ltd
0242 752 788
Cell: 0773593700, 0772261594, 0176061399, 0716577303
Email: [email protected]
PALM
PUBLICATIONS
P R I V AT E L I M I T E D
Contents
CHAPTER ONE
HARDWARE AND SOFTWARE .............................................................................. 1
Introduction .............................................................................................................................................. 2
Overview of a computer system.............................................................................................................. 2
Hardware ............................................................................................................................................................................ 2
So ware ............................................................................................................................................................................... 2
Hardware Components of a Computer System .............................................................................................................. 2
Input Devices............................................................................................................................................. 2
Keyboard ............................................................................................................................................................................. 2
Mouse ................................................................................................................................................................................... 4
Scanner................................................................................................................................................................................. 5
Digital Camera ................................................................................................................................................................... 6
Touch Screen ...................................................................................................................................................................... 7
Joystick ................................................................................................................................................................................. 7
Biometric Scanner .............................................................................................................................................................. 7
Webcam ............................................................................................................................................................................... 8
Sensors ................................................................................................................................................................................. 8
Data loggers ......................................................................................................................................................................... 9
Barcode Reader ................................................................................................................................................................... 9
Stylus ................................................................................................................................................................................. 10
Touchpad ........................................................................................................................................................................... 10
Magnetic Stripe Readers ..................................................................................................................................................11
Tracker ball ........................................................................................................................................................................ 12
Light pen ............................................................................................................................................................................ 13
Graphics tablet .................................................................................................................................................................. 13
Document Readers ...........................................................................................................................................................14
Optical Character Recognition (OCR) ......................................................................................................................... 14
Magnetic Ink Character Recognition (MICR) ............................................................................................................ 15
Processing Device .................................................................................................................................. 16
Arithmetic Logic Unit (LU) .................................................................................................................. 17
Control Unit (CU) .................................................................................................................................. 17
Output Devices........................................................................................................................................ 18
Printer ...............................................................................................................................................................................18
Dot Matrix printer ............................................................................................................................................................ 19
Daisy wheel printer .......................................................................................................................................................... 19
Laser Printers .................................................................................................................................................................... 19
Inkjet printers.................................................................................................................................................................... 20
ermal Printers ............................................................................................................................................................... 20
Line printers ...................................................................................................................................................................... 20
Page printers ...................................................................................................................................................................... 20
Monitor/Screen ................................................................................................................................................................21
LCD (Liquid Crystal Display) ......................................................................................................................................... 22
Plasma Display Panels: .................................................................................................................................................... 22
in Film Transistor (TFT) monitors ............................................................................................................................ 22
Graph Plotter ........................................................................................................................................... 22
Data projector ................................................................................................................................................................... 22
Speakers ............................................................................................................................................................................. 23
Braille Printer .................................................................................................................................................................... 23
Actuators ............................................................................................................................................................................ 23
Storage Devices ....................................................................................................................................... 23
Primary Storage ............................................................................................................................................................... 23
RAM (Random Access Memory): ....................................................................................................... 23
ROM (Read Only Memory) .................................................................................................................. 24
Types of ROM ................................................................................................................................................................... 25
Secondary Storage Media....................................................................................................................... 25
Magnetic Storage Media ..................................................................................................................................................25
Hard Disk........................................................................................................................................................................... 26
Diskette (Floppy Disk) .................................................................................................................................................... 27
Zip Drives ..........................................................................................................................................................................28
Solid State Storage Media....................................................................................................................... 28
Optical Storage Media ............................................................................................................................ 30
2. DVD (Digital Versatile Disc) ............................................................................................................ 32
Methods of Accessing Data ................................................................................................................... 33
Storage Capacity...................................................................................................................................... 33
So ware.................................................................................................................................................... 34
Systems So ware: ............................................................................................................................................................. 34
Operating System: ...........................................................................................................................................................34
Types of Operating Systems ............................................................................................................................................ 35
Glossary of Terms ................................................................................................................................... 39
Revision Exercises .................................................................................................................................. 40
Structured Questions.............................................................................................................................. 43
CHAPTER TWO
APPLICATIONS OF COMPUTER SCIENCE ........................................................ 46
Introduction ............................................................................................................................................ 47
Computers in agriculture ....................................................................................................................... 47
Controlling farm equipment ........................................................................................................................................... 48
Control systems and computer-controlled devices (automated systems) ................................................................. 48
Research and development .............................................................................................................................................. 49
Security..................................................................................................................................................... 49
Computers in banking ........................................................................................................................... 49
Electronic banking (e-banking) ............................................................................................................ 52
Mobile banking ................................................................................................................................................................. 53
Electronic Funds Transfer (EFT) .................................................................................................................................... 53
Computers in education ........................................................................................................................ 54
Security..................................................................................................................................................... 55
Collaborative learning ............................................................................................................................ 55
On-line education ................................................................................................................................... 56
Computer Aided Learning (CAL) ........................................................................................................ 56
Computer Based Training (CBT) ......................................................................................................... 57
Virtual laboratory ................................................................................................................................... 58
Computers in social networking ........................................................................................................... 59
Signing up and logging in for di erent social network accounts is di erent. ............................... 60
Computer applications in research and development ....................................................................... 63
Computer Aided Design (CAD) ........................................................................................................... 65
Interesting facts ....................................................................................................................................... 66
Glossary of Terms ................................................................................................................................... 67
Structured Questions.............................................................................................................................. 71
CHAPTER FOUR
COMMUNICATION NETWORKS AND INTERNET TECHNOLOGIES ........... 88
Introduction ............................................................................................................................................ 89
What is a Computer Network?.............................................................................................................. 89
Networking concepts.............................................................................................................................. 89
1. Local Area Network (LAN) ......................................................................................................................................... 91
2. Wide Area Network (WAN) ....................................................................................................................................... 93
3. MAN (Metropolitan Area Network).......................................................................................................................... 93
4. PAN (Personal Area Network) ................................................................................................................................... 94
Network Topologies ............................................................................................................................... 94
1. Ring Network (token ring) .......................................................................................................................................... 94
2. Star Network: ............................................................................................................................................................... 95
3. Mesh Network .............................................................................................................................................................. 96
4. Bus (Linear/Multi-drop) Network: ........................................................................................................................... 97
5. Hybrid Network Topology .......................................................................................................................................... 98
Peer-peer network................................................................................................................................... 99
e Internet ........................................................................................................................................... 100
Internet Service Providers (ISP) ...................................................................................................................................100
Internet Services .............................................................................................................................................................100
Electronic Mail (E-Mail) ...............................................................................................................................................100
E-commerce .................................................................................................................................................................... 102
E-learning .......................................................................................................................................................................103
Social Media .................................................................................................................................................................... 104
WWW (World Wide Web)............................................................................................................................................ 105
File transfer ......................................................................................................................................................................106
Telnet ................................................................................................................................................................................106
Newsgroups .....................................................................................................................................................................106
Video conferencing ........................................................................................................................................................106
Advertising ......................................................................................................................................................................107
E-banking ........................................................................................................................................................................107
Internet and data security..............................................................................................................................................108
Hacking ............................................................................................................................................................................108
Computer Viruses ................................................................................................................................. 108
Hardware Faults .................................................................................................................................... 108
So ware Faults ...................................................................................................................................... 109
Phishing ..........................................................................................................................................................................109
Pharming ........................................................................................................................................................................109
Interesting Facts .................................................................................................................................... 110
Summary .......................................................................................................................................... 110
Glossary of terms .................................................................................................................................. 110
Revision Exercises................................................................................................................................. 111
Structured questions............................................................................................................................. 113
CHAPTER FIVE
SECURITY AND ETHICS .................................................................................... 116
Introduction .......................................................................................................................................... 117
Cyber wellness ....................................................................................................................................... 117
Cyber wellness principals ..............................................................................................................................................117
Cyber and the social media ...........................................................................................................................................118
Cyber use ......................................................................................................................................................................... 119
Cyber culture ..................................................................................................................................................................120
Safe and Unsafe Websites ..................................................................................................................... 123
When is a website safe? ..................................................................................................................................................123
Blocking websites............................................................................................................................................................124
Online relationships .......................................................................................................................................................125
Social networking relationships ....................................................................................................................................125
Online gaming ................................................................................................................................................................126
Business relationships ....................................................................................................................................................127
Copyrights ............................................................................................................................................. 129
Copyright Laws in Zimbabwe ....................................................................................................................................... 129
Facts about copyrights ...................................................................................................................................................130
Plagiarism Sharing Buttons ................................................................................................................. 131
Cases of plagiarism in Zimbabwe ....................................................................................................... 132
Plagiarism in learning institutions ...............................................................................................................................132
Digital piracy ......................................................................................................................................... 133
So ware piracy................................................................................................................................................................133
Impact of piracy .................................................................................................................................... 133
Piracy in Zimbabwe........................................................................................................................................................134
Summary ................................................................................................................................................ 136
Glossary of terms .................................................................................................................................. 137
Revision Test .......................................................................................................................................... 138
Structured Questions............................................................................................................................ 140
CHAPTER SIX
SYSTEM ANALYSIS AND DESIGN ..................................................................... 142
Introduction .......................................................................................................................................... 143
System development life cycle (SDLC) .............................................................................................. 143
Systems analyst ...................................................................................................................................... 143
System development life cycle Stages ................................................................................................ 146
Problem identi cation ................................................................................................................................................... 147
Data collection techniques ............................................................................................................................................ 148
Interesting Facts .................................................................................................................................... 151
Summary ................................................................................................................................................ 152
Glossary of Terms ................................................................................................................................. 152
Multiple Choice questions ................................................................................................................... 153
Structured Questions............................................................................................................................ 154
CHAPTER SEVEN
ALGORITHM DESIGN AND PROBLEM SOLVING .......................................... 156
Introduction .......................................................................................................................................... 157
What is an Algorithm? ......................................................................................................................... 157
Purpose of an algorithm ................................................................................................................................................157
Control structures/Flow control/Programming Constructs ...........................................................158
Sequence/Linear Structure .................................................................................................................. 158
Algorithm Tools .................................................................................................................................... 159
Description ........................................................................................................................................... 159
Pseudocode ........................................................................................................................................... 160
Flowcharts .............................................................................................................................................. 161
Structure Diagram ................................................................................................................................ 163
Interpreting and testing algorithms.................................................................................................... 164
Types of Test Data ................................................................................................................................. 165
Interesting Facts .................................................................................................................................... 166
Summary ................................................................................................................................................ 166
Glossary of terms .................................................................................................................................. 166
Revision Exercises................................................................................................................................. 167
Structured Questions............................................................................................................................ 170
CHAPTER EIGHT
MICROSOFT VISUAL BASIC 2010 PROGRAMMING ...................................... 172
Introduction .......................................................................................................................................... 173
Programming using Microso Visual Basic 2010 ...........................................................................173
Programming concepts ........................................................................................................................ 173
Program ...........................................................................................................................................................................173
Programming ..................................................................................................................................................................173
Variable ............................................................................................................................................................................173
Constant ...........................................................................................................................................................................173
Operators ............................................................................................................................................... 173
Assignment operators ....................................................................................................................................................174
Arithmetic operators ...................................................................................................................................................... 174
Logical Operators ...........................................................................................................................................................175
Comparison/relational/Boolean operators .................................................................................................................175
Loading VB.Net (on Windows 7 platform) ....................................................................................... 175
Creating a Visual Basic Project ...........................................................................................................178
Interface design ..................................................................................................................................... 179
Assigning code ...................................................................................................................................... 183
Debugging and running the project ................................................................................................... 184
e Structure of a VB.Net Program ................................................................................................... 184
Semantics (logic) of a Language ......................................................................................................... 187
Data Types ............................................................................................................................................. 187
Variables ................................................................................................................................................. 189
Global variables............................................................................................................................................................... 190
Declaring Variables ........................................................................................................................................................190
Constants ............................................................................................................................................... 191
Interesting Facts .................................................................................................................................... 191
Summary ................................................................................................................................................ 192
Glossary of Terms ................................................................................................................................. 192
Revision Exercises ................................................................................................................................ 193
Structured Questions............................................................................................................................ 195
CHAPTER NINE
DATABASES ......................................................................................................... 197
Introduction .......................................................................................................................................... 198
Overview of database ........................................................................................................................... 198
Databases hierarchy ..............................................................................................................................199
Databases Management Systems (DBMS)......................................................................................... 202
Databases Administrator (DBA)......................................................................................................... 202
Database dictionary/Directory ...........................................................................................................203
Field Name ............................................................................................................................................. 211
Setting eld properties ................................................................................................................................................... 212
Field Size ..........................................................................................................................................................................212
Format .................................................................................................................................................... 214
Date formats .................................................................................................................................................................... 215
Validation rule and validation text ..................................................................................................... 217
Input mask ............................................................................................................................................. 219
Creating an input mask..................................................................................................................................................219
Working with tables ..............................................................................................................................221
Deleting records .................................................................................................................................... 221
Renaming a column ..............................................................................................................................224
Replacing data in a table ...................................................................................................................... 227
Filters ...................................................................................................................................................... 229
Filter by Selection ...........................................................................................................................................................229
Filter by Form..................................................................................................................................................................230
Table relationships ................................................................................................................................ 232
Queries ................................................................................................................................................... 234
Forms ...................................................................................................................................................... 240
Creating a form ............................................................................................................................................................... 240
Split form ......................................................................................................................................................................... 241
Form design view............................................................................................................................................................245
Adding controls to a form ................................................................................................................... 246
Reports ................................................................................................................................................... 248
Creating report using the Wizard.................................................................................................................................248
Report design ..................................................................................................................................................................249
Interesting facts ..................................................................................................................................... 251
Glossary of Terms ................................................................................................................................. 252
Summary ......................................................................................................................................... 252
Multiple Choice questions ................................................................................................................... 253
Structured Questions............................................................................................................................ 255
CHAPTER TEN
WEB DESIGN ....................................................................................................... 257
Introduction .......................................................................................................................................... 258
Web page ................................................................................................................................................ 258
Static web page ................................................................................................................................................................259
Dynamic webpages .........................................................................................................................................................259
Elements of a web page ........................................................................................................................ 260
Creating a web page ..............................................................................................................................261
Webpage templates .........................................................................................................................................................262
Web content development .................................................................................................................. 263
Web content .................................................................................................................................................................... 263
Writing web content ............................................................................................................................. 265
Interesting items.................................................................................................................................... 266
Glossary of terms .................................................................................................................................. 266
Multiple choice test ............................................................................................................................... 267
Revision Exercises ................................................................................................................................ 269
CHAPTER ELEVEN
TECHNO-PRENEURSHIP ................................................................................... 270
Introduction .......................................................................................................................................... 271
Elements of Intellectual Capital .......................................................................................................... 271
Human Capital ................................................................................................................................................................271
Social or Relational Capital ...........................................................................................................................................271
Structural or Organizational capital............................................................................................................................. 272
Business Ethics ...................................................................................................................................... 273
Ethics (Unhu, Ubuntu Vumunhu) ...............................................................................................................................273
Business Ethics ............................................................................................................................................................... 273
Basic Principals of Business Ethics ...............................................................................................................................273
Unethical Business Practices ........................................................................................................................................274
Ethical Challenges in Information Technology (IT)..................................................................................................275
Marketing and Business Strategies ..................................................................................................... 276
Marketing strategy .......................................................................................................................................................... 276
E-commerce........................................................................................................................................... 278
E-Commerce (electronic Commerce) ......................................................................................................................... 278
Applications of e-commerce .........................................................................................................................................279
Classi cation of E-Commerce Services .......................................................................................................................280
Consumer to Consumer (C2C) ....................................................................................................................................280
Multiple Choice Questions .................................................................................................................. 283
Structured Questions............................................................................................................................ 285
Interesting facts ..................................................................................................................................... 286
Summary ................................................................................................................................................ 286
Glossary of terms .................................................................................................................................. 286
1
Introduction
is chapter seeks to equip learners with basic skills of identifying di erent hardware use in di erent
situations and to explain how they work in their application areas. It starts by de ning key computer
terms and then gives a general overview of a computer system. From there, the chapter will explore
the input, output, processing and storage devices of a computer. e chapter will end by looking at the
classi cation of so ware.
Hardware
Hardware refers to the physical (tangible) components of a computer system, for example keyboard,
mouse, monitor, etc. Computer hardware may develop faults with time and need replacement or
repairing. Any hardware component connected to the processor and which a computer may work
without, is called a peripheral, for example printer, keyboard, mouse, joystick, etc.
So ware
So ware refers to various programs used on a computer, e.g. word-processor, spreadsheet, games,
operating systems, etc.
Data Data
Storage Devices
Input Devices
ese are parts of a computer that are used to enter (or feed) data into a computer system for processing.
e following are some of the input devices of a computer:
Keyboard
2
A keyboard is a manual input device, used to enter data and instructions into the computer by
typing. It has keys similar to the traditional typewriter.
It is used to enter alphabetic, numeric and other special characters into the computer by pressing
keys on it. A character is any symbol, digit or letter that can be entered into the computer, e.g. $, %, 5,
h, space, etc. Control characters can also be entered into the computer using the keyboard. Control
characters are non-printable characters that can be used when sending signals to peripherals, e.g.
CTRL+P, etc. e keyboard also has function keys like F1, F2, .. Used for entering frequently
needed tasks. Keyboards can be concept keyboards, Braille keyboards, numeric keyboards or
standard (QWERTY) keyboards.
Concept keyboard
is is a specialised keyboard with keys that are written full words or containing a picture relating
to the task that must be performed. ey can be used in supermarkets or bars and have keys with
words like CHANGE, TOTAL, etc. us they have phrases instead of standard letter. ey are
mostly used where the task should be performed very fast. It has limited options that only t the
business of the organisation.
• ey are fast to make menu choices
• ey are waterproof
• ey are tamperproof
However,
• ey have limited options for the user to select
• ey cannot be used for text selection
Braille keyboard: ese are keyboards that are suitable for the blind.
Standard keyboard: this is the normal, also called QWERTY keyboard. ey have mostly keys with
individual letters on them and thus are used to enter text data
3
Advantages of standard keyboards
• Most people nd them easy to use
• Enable fast entry of text data
Numeric keypads
Mostly used to enter numbers only. Used on ATMs, to enter PIN and amount to be withdrawn. Also
found on cell and telephones, Chip and pin devices, and on Electronic Point of Sale terminals (EPOS).
ey are faster in entering numeric data as compared to standard keyboards, very easy to carry around
if found on cell phones. However, they have very small keys which can be di cult to use. It is di cult
to use them for entering text data.
Advantages of keyboards:
• Most people nd them easy to use for typing and connecting
• ey are one of the cheapest input devices available
• ey are readily available in Zimbabwean shops
• Can also be used for cursor control and for gaming
Disadvantages of keyboards
• ey are manual and therefore are a slower method of entering data into the computer.
• Data entry errors are very common using keyboards.
• Take up valuable desk space as they are large.
• Continuous usage without adequate rest can cause Repetitive Strain injury (RSI)
Mouse
is is a mouse-shaped pointing device used to enter data and instructions into the computer by
clicking. e user holds and moves the mouse on a at surface, thereby moving the mouse pointer to a
desired position on the screen. When the mouse pointer reaches the intended option, the user presses
the mouse button to select theoption. A mouse may have the following, le button, right button and
the scroll disc.
4
A mouse can be connected to a computer using a cable or through wireless technology like infrared or
Bluetooth. A mouse is also used to:
• Choose options from menus
• Placing the cursor at the correct position when editing text/typing
• For drawing and editing diagrams
• Selecting icons/text to be formatted, deleted or edited.
• Controlling movement of pointer on the screen.
Disadvantages of a mouse
• It needs a at surface on which to operate
• Can be easily stolen since it can t in a pocket
• Can be easily vandalised
• Some people who are physically challenged nd it very di cult to use
Scanner
is is an input device used to convert hard copy documents into so copy, mostly images and text
documents. Some scanners have an OCR feature that convert a scanned document into an editable
document e.g. into a word processed document, or into portable document format (pdf). Scanners
can be atbed or handheld scanners, e.g. some Barcode scanners
5
Advantages of using a scanner
• A faster method of entering data into the computer as compared to keyboards
• Gives the user scanning options, like scanning as word document, spreadsheet, pdf or as
picture.
• ey can produce high quality images
• ey are accurate in entering data, especially pictures
• Easy to handle (portable)
Digital Camera
is is a device used to take photographs and videos for entry into the computer where they can be
saved or edited.
Disadvantages
• e images and videos need to be compressed to occupy less disk storage space
• ey are expensive to buy
6
Touch Screen
A screen display on which one could enter data by pointing/tapping with a nger on intended option.
It is used on ATMs, cell phones, computers in shops, etc. A touch screen is an input/output device.
Most mobile phones now use touch screens, as a substitute to keypad.
Joystick
is is a pointing device popularly used for playing games and in in simulations. Some use it as an
alternative to a mouse.
7
biometric systems are more robust and hard to crack. Some of the biometric input devices include:
• Finger print scanner
• Facial scanner
• Palm scanner
• Voice scanner
• Retina or iris scanner
Webcam
It is a digital video camera used to take videos and transmit them over the internet instantly or send
them to the computer. Webcams do not have own memory. Laptops have their own webcam. Webcams
can be placed inside buildings for video conferencing purposes with users seeing each other in real-
time mode while in di erent locations. Webcams can also be used for taking personal images and in
security rooms like shops for CCTV.
Sensors
ese are input devices that automatically record physical data from the environment, e.g. light sensor,
temperature sensor, etc. ey collect data in analogue form. Sensors are used mostly in monitoring
and control systems.
8
Data loggers
ese are devices that use sensors for automatic data collection from the environment for use at a later
stage. ey are used in monitoring and control systems. Data logger have their own storage. Some have
permanent connection to the processor while others have temporary connection to the computer.
Barcode Reader
ese are devices that uses a light beam to read barcodes on products for automatic data entry into
the computer. ey are used at Electronic Point of Sale terminals (EPOS) in supermarkets, library
systems, luggage handling systems at airports, etc.
Barcodes are numbered vertical lines and spaces of varying size on products. ey provide data for a
product.
Information found on barcodes includes, product name, check digit, product number, country of
origin, manufacturer’s number, weight.
e PRICE of an item is NOT FOUND on the barcode. e item price and item quantity displayed on
the screen are stored in the database.
If the barcode reader fails to read the barcodes, data is entered manually through the keyboard by
entering the numbers below the barcodes.
9
Fig 1.12 Bar code
Advantages:
• ey are cheap to use as costs of writing barcodes on paper labels are low.
• ey are very easy to use.
• ey are very accurate in entering data.
• ey are a very fast means of entering data since they are an automatic data entry
method. Customers can be served quickly
• ey give detailed information about a product.
• Automatic stock taking is possible.
• Supermarket workers no longer need to memorise prices of goods in shops
Disadvantages
• ey may fail to detect the barcode on the product.
Stylus
is is an input device used to write on sensitive pads or screens for data entry into the computer. It
is mostly purchased with touch screens. May also be used for making menu selections on tablets and
mobile phones.
10
Fig 1.14 Touch pad
11
Tracker ball
It is an input device with a small ball that can be moved by passing the palm of your hand over it. is
will move an arrow on the screen and therefore can replace a mouse. It is used to draw diagrams (like
in CADS systems) and for menu selections. One can use it as an alternative to the mouse.
Microphone: It is a device that is used to input sound into the computer. It recognises human voice
for data entry. Microphones are used to input sound. In computing, they can be used with voice
recognition systems and a word processing application to enter text. ey can also be used in music
recording.
A microphone is used in voice recognition systems. ese are computerised systems that
allow users to communicate with the computer by talking (voice input). Such systems have the
following advantages:
• e systems are over 90% accurate.
12
• ey are appropriate for the handicapped, especially those without hands.
• ey are very fast in entering data and in giving instructions to the computer.
• ey are speaker independent.
• ey can recognise natural language.
Disadvantages:
• Older systems are speaker dependent.
• ey allow the user to speak slowly, using speci c words that were programmed for it to
understand.
NB: Multimedia speakers, sound cards, a microphone and voice recognition so ware are needed in
voice recognition systems.
Light pen
is is a pen shaped device used to enter data into the computer by writing on an ink pad or directly
on the screen. It is also used to make alterations on the screen to the drawings, to write directly on the
screen and to select commands. In Zimbabwe, they are used at Registry o ce to write signatures when
applying for a new National Identity card. ey are also used in CAD systems.
Graphics tablet
is is an input device used for drawing or tracing images, maps and some animations with the help of
a stylus or a light pen. e tablet has a connection to the computer, while a stylus is connected to the
tablet. is can replace a mouse for making sketches and drawings. When a user writes or draws on
the tablet, the text or diagram does not appear on the tablet but on the computer screen.
13
Document Readers
ese are devices used for entering data automatically into the computer by reading through
documents. ese include:
e Optical Mark Recognition systems use a beam of light to detect pencil marks on paper for
automatic data entry into the computer. Light is re ected from the document onto the Optical Mark
Reader which records the output. OMR is mostly used in marking multiple choice exams, reading
pupils’ registers, playing lotto, etc. An Optical Mark Reader is the device that is used for automatic
data entry in OMR systems.
14
Reader is the device that is used for automatic data entry in OCR systems. It recognises printed or
even handwritten test for input into the computer
Advantages of OCR
• Can convert large amount of text into digital form at once
• Less tiresome since it is an automatic data entry method
• Faster in entering text into the computer
• Accurate in data entry
Disadvantages of OCR
• A lot of data entry errors can be found
• May not work well with tables and diagrams
• Do not work well with handwritten text
15
Disadvantages of using magnetic ink on cheques include:
• Readers and printers are relatively expensive
• e system can only accept limited characters
• Very expensive data entry method
Processing Device
Microprocessor
A chip found in microcomputers that is used for data manipulation. It is also called the Central
Processing Unit (CPU). It contains the Control Unit, Arithmetic and Logic Unit, Registers and the
clock.
is component is used to manipulate data as per user requirement. e Central Processing Unit
(CPU), also called the processor, converts data into information. It is also termed the ‘brain’ of the
computer. Processing involves sorting of data, updating records, searching records, adding a sequence
of numbers, and others. Processor speed is measured in hertz. Hertz equates to the number of
instructions executed per second.
e processor performs the following duties:
• It processes the data and instructions held in main memory.
16
• It controls the transmission of data from input devices to memory.
• It controls the transmission of information from main memory to output devices.
• Controls the sequence of execution of instructions.
• Gives commands to all peripherals.
• Fetches instructions to be executed
• Decodes instructions and executes them
• Performs arithmetic and logical operations
e processor comprises of: Arithmetic Logic Unit (ALU), the Control Unit (CU), clock and Registers
Processor (CPU)
Control Unit
Input
Output
Devices
Registers Devices
ALU
Backing Main
Storage Memory
Registers: High-speed storage area in the CPU used to temporarily hold small units of program
instructions and data immediately before, during and a er execution by the CPU, e.g. the accumulator
register.
System clock: is is a very fast, electronic timer found in the CPU and is responsible for timing system
operations. It synchronises system operations thereby determining whether the correct operation is
17
carried out at the right time.
Output Devices
ese are devices used to display or show data and information held inside the computer system, for
example: printer, monitor, speakers, actuator and plotter. Output from the computer can be so copy,
hardcopy or audio.
Printer
A printer is a peripheral device used to produce hard copies of data held in the computer. Hardcopy is
a document printed on paper, e.g. a printed school report, a printed letter, etc. Output from the printer
appears as displayed on the computer screen, thus What You See Is What You Get (WYSIWYG).
Types of Printers
Printers can be classi ed in two ways, which are:
• Whether or not there is contact with paper during printing
• eir mode of printing
Classi cation on whether or not there is contact with paper during printing
Using this classi cation method, we get the following types of printers:
• impact printers
• Non-impact printers
1. Impact Printers: these are printers whose print heads (hammer) hit ink ribbon against paper
during printing, e.g. dot matrix printer, chain printer, daisy wheel printer, drum printer,
etc. us, there is contact between the paper and the print heads during the printing stage.
Impact printers have the following
Advantages:
• ey are very cheap to buy.
• ey are cheap to repair and to maintain.
• ey can use continuous paper.
• ey are economic in terms of ink usage.
• ey are robust.
• ey do not necessarily require special paper
18
However, Impact printers have the following disadvantages:
ey produce a lot of noise during printing as the pint heads hit the ribbon and paper
ey are very slow in printing since most are line printers or character printers
ey produce poor quality printout.
b. Non-Impact Printers: ese are printers that do not produce contact between paper, print
heads and ink cartridge during printing. Non-impact printers include: inkjet printer, laser
printer, thermal printer, etc.
Laser Printers
Most of the printers use light and are therefore called laser printers.
19
• Toner is toxic and therefore should be disposed of carefully a er use.
• Requires special paper for them to work.
Inkjet printers
ese use the print head to propel droplets of ink on a sheet of paper, thereby producing the required
character.
Advantages:
• ey are high resolution printers, thereby output is of good quality
• ey are cheap to buy
• Usually small size therefore do not take up large desk space
Disadvantages
• ey have a slow printing speed than LaserJet printers
• Have a water soluble ink which may be spilt
• Running costs are expensive, especially the ink
ermal Printers
ese produce characters by heating thermal paper when it passes over thermal print head. e paper
turns black when heated, thereby producing an image.
Advantages
• Excellent print quality for text and graphics
• ey are quiet in operation
• Easy handling as these is no need for ink/ribbon
• ey o er high printing speed
• ey have lower maintenance costs
Disadvantages
• Classi cation according to mode of printing
• Using this method, printers can be classi ed as:
• Character printers
ese are printers that print one character at a time until the end of the document.
• ey are also called serial printers.
• ey are very slow in printing
Line printers
• ese are printers that print one line at a time until the end of the document, e.g. chain
printers.
• ough they are faster than character printers, they still very slow.
Page printers
• ese print the whole page at a time and therefore are fast in printing, e.g. LaserJet
20
Revision Exercises
Multiple Choice questions
2. e location from which the rst computer instructions are obtained on boot-up is_____
A. Hard disk of the computer
B. ROM BIOS
C. RAM
D. DVD ROM
3. A hard disk is divided into tracks, which are further divided into___________
A. Vectors
B. Clusters
C. Sectors
D. R/W heads
40
8. A system in which transactions are processed individually and results produced instantly is
called ____________
A. Batch processing
B. Real-time processing
C. Time sharing
D. Individualised Processing
11. Which of the following devices is used to monitor computer processing by a user?
A. Console
B. CPU
C. Printer
D. RAM
41
15. So ware refers to _________
A. e tangible parts of a computer
B. Instructions that drive computer hardware
C. Output devices of a computer
D. Storage devices of a computer
42
Structured Questions
2.
a. Draw a well labelled block diagram of a computer system. [6]
b. Describe the use of each component shown on the diagram above, giving examples in each
case. [8]
3. A computer is made up of hardware and so ware
a. Using examples, explain the above underlined words. [4]
b. Explain why the CPU is referred to as the ‘brain of the computer’? [2]
c. De ne the term peripheral. Give an example. [2]
4. Sailthru (Pvt) Ltd is a local company that uses a generic package to keep records of their clients
in a computer system. ey also produce calendars which they give to every client that purchases
goods worth over $100. e supervisor produces a report on daily basis that gives a summary of
all the activities that took place at the work place for submission to the general manager.
a. State the most appropriate type of application so ware that they might be using for:
i. Keeping records of their clients
ii. Producing calendars
iii. Producing a detailed report to the general manager [3]
b. Give two reasons why the company might have chosen to use a generic package and not a
tailor-made package. [2]
c. Some pictures are needed when creating the calendar. State 3 devices that can be used to
enter pictures into the computer [3]
43
f. Time slice
g. Round robin
h. Batch processing [20]
8. Munyikwa High school has decided to introduce e-learning at the school. Information is stored
on a DVD ROM, where learners have to access the information from.
a. Suggest 5 reasons why the school authorities might have chosen to use this e-learning
method than using the internet [5]
b. Give 3 disadvantages of this e-learning method as compared to the internet [3]
c. Suggest a reason why they chose to use DVD ROMs other than CD ROMs [1]
11. a. State 2 examples of automatic data entry devices, and give their application areas. [4]
b. Give 2 reasons why automatic data entry devices a gaining popularity these days. [2]
13. a. Draw a well-labelled block diagram of a computer systems, showing processor components
and their interconnections. [7]
b. State 3 components of a processor and explain their use [3]
c. State any 4 functions of a processor [4]
d. Explain why the processor is called the ‘brain’ of the computer system. [2]
44
e. Explain why the computer may freeze and suggest a solution to the problem [2]
14. a. State any 3 examples of operating systems used on mobile phones [3]
b. State 3 other operating systems used on desktop computers excluding the Windows family
Operating systems [3]
c. Give 4 features of operating systems [4]
d. Explain the di erence between multi-programming and multi-processing [2]
45
CHAPTER TWO
APPLICATIONS OF COMPUTER
SCIENCE
Objectives
• Learners should be able to:
• Describe how computers are used in agriculture, education, banking system,
research and development and social networks..
• Give advantages and disadvantages of using computers in the name application
areas.
• Use the internet to carry out research.
46
Introduction
Computers have become an essential part of modern human life. Owing to the widespread use of
computers in every sphere, life in today’s world would be unimaginable without computers. ey
have made human lives better and happier. ere are many computer uses in di erent elds of
work. Farmers, architects, educators, learners, miners and lmmakers all use computers in their
elds. Educators, writers, and most o ce workers use computers for record keeping, research, word
processing and communication.
Computers in agriculture
Record keeping
Computers are used for keeping records such as customers’ and suppliers’ information,
budgetting, farm equipment inventories and animal health forms.
Internet research
Farmers get a lot of information through internet forums and online knowledge bases on latest
seed variety and new methods of farming. ey share know-how with other farmers and experts.
Farmers even get recent weather live updates on farming matters on their smart phones.
On-line trading
Farmers can connect to foreign customers which can help to improve their product and increase
their production capacity. Many farmers can market their products from their own home or
business.
Communication
Farmers use e-mails for communication with others farmers. Social networking sites such as
WhatsApp and Facebook help farmers communicate important farming information quickly e.g.
spread of an animal disease.
47
Fig 2.2 Cow ear with ear tag for monitoring movement
Bene ts
• is is a better way to reduce water and fertilizer costs.
• It ensures that the crop receives optimum water and fertilizer nutrients.
• Has reduced human labour and animal e ort.
• Increased the speed and quality of production.
48
Bene ts of control and automated systems
• It is cheaper since few workers can be employed to do the monitoring
• Computers will give accurate results
• e computers work very long periods without getting tired or getting a break
Security
Closed Circuit Television Cameras (CCTV) are used to monitor farm premises and capture images of
anyone entering the farm.
Activity 2.1
Learners to make an educational tour to a farm and identify how computers are used.
Activity 2.2
Research on the challenges faced by Zimbabwean farmers in the use of computers in their
farming practices.
Computers in banking
Record keeping
Computers are used for keeping nancial information and processing transactions. Customers
accounting details are kept in the computers. Bank tellers can search for customers’ details quickly in
49
the computer. Banks also use computers to track customer information such as name, address, phone
number, date of birth and place of employment.
Decision making
Banks will perform analyses on customers data held on their computers in order to make decisions
about a customer’s suitability for other products o ered by the bank, for example, whether a customer
quali es for a bank loan may depend on a customer’s ability to manage their current account, overdra ,
credit-cards and loans.
Management
Banks use computers to monitor nancial performance, and produce analyses and reports which
support the strategic development of the bank. e bank’s employee payroll, and operational expenses
are also monitored using computers.
Communication
Bank management can communicate new banking services and promotions with their clients on-
line using e-mails. With the use of mobile smart phones, these e-mails can be received and opened
anywhere and anytime.
Security
Closed Circuit Television Cameras (CCTV) are used to monitor all activities that will be happening in
the bank. In case of robberies it will be easy to track robbers as the video can be viewed later.
50
rooms, away from the clients computers. Servers can be
1. File server
2. Print server
3. E-mail server
4. Web server
5. Application server
Terminal
A terminal is a device on a network, which can be used to send or receive data. A terminal can either
be:
1. Dump terminal: A device on the network which relies on another machine on the network for
it to work. is terminal does not have or has limited storage and processing capabilities, for
example, a VDU at a POS in supermarket.
2. Intelligent terminal: is is a device that has processing and storage capabilities of its own
and can work without control from other devices on the network.
Node
is refers to any active device that is connected to a network, for example, a switch, modem, printer,
server, and others. Nodes are there to receive, store, forward or to send data on the network.
Client
is refers to a computer system that is connected to a server and can send requests and receive
responses. A client can access data or so ware on a server. Processing can either be done on the server
side or on the client side depending on the network setup.
Online
A state of a node being actively connected to the network. An online device can send and receive
signal from other devices on the network. For example, a swiping machine at a POS in supermarket
should be online to a client’s bank server for one to purchase goods using a swiping card. us it must
be actively linked or connected to the host computer.
O ine
A node is said to be o ine if it is not actively connected to a host computer. It implies that this node
cannot communicated with any other device no the network.
90
Firewall
is refers to hardware or so ware that is used to ensure privacy of a private network. Firewalls are
used protect computer systems from intrusion by outsiders who may want to steal, delete, modify
or corrupt data of an organisation. us a rewall is used a protective measure for an organisation’s
private and sensitive data. It lters incoming and outgoing information and block those packets that
are not supposed to enter or leave the private network.
Token
A token is a signal, in the form of a packet/frame, which gives a node the chance to send data in a ring
network. Only the node with the token can transmit data. e node with the token appends data and
the destination to the token before sending it to the next node. e node that receives the message
examines it and removes the data. It then sends an acknowledgement to the sender.
Search Engine
A search engine is a program used to look for data, information and website from the internet on
behalf of the user, e.g. Google, Yahoo, etc. e user just type what needs to be searched and the search
engine does the job. It will search the content from various servers and other computers connected to
the internet and display the search results on the user’s workstation.
Web browser
It is a computer program used to open web pages on the internet, e.g. Google Chrome, Mozilla Firefox,
Internet Explorer, Safari, Microso Edge, CU browser, etc.
Activity 4.1: Group activity Identifying web browsers on computers and setting Windows
rewall
1. Check your computers and identify all web browsers installed on them
2. Learners turn on and O Windows Firewall and write down the stages followed in
doing this task
Types of Networks
e main types of computer networks are:
• Local Area Network (LAN) and
• Wide Area Network (WAN).
91
site or can be within a single room. A LAN is privately owned by an organisation. A school network
is usually a LAN. However, di erent LANS can be connected together or can be connected to a WAN,
for example, a school LAN can be connected to the internet.
An organisation may opt use internet technologies within its restricted private network for the bene ts
of the organisation. Such a network is called an Intranet. is network is only restricted to internal
sta of the organisation and not to outsiders. On an intranet, unwanted sites can be blocked and
users can access it through passwords, where only information bene cial to the organisation can be
accessed and nothing else.
An extranet can also be used by organisations. An extranet is an extension of the intranet giving a few
privileged and authorised outsiders to have controlled access to the intranet.
Workstations/Terminals
ese are computers that are linked to each other on the network.
Network cables
ese are wires that act as pathway for data from one computer to another. Cables can be coaxial,
bre optics, twisted pair, etc. Wireless communication media can also be used.
Hub or a Switch:
A switch or a hub can be used as a connection point for devices and computers on a Local Area
Network. However, most organisations use a switch, which is more intelligent than a hub.
Network cards
Each node on the network needs a network interface card. It is a device that identi es computers
to the network, where network cables are plugged on the node. Each node must have its own
network card.
A bridge
is is a device used to link a LAN to another LAN network. It is also an optional requirement.
e diagram below shows the structure of a LAN that can be connected to another network.
92
Fig 4.1 A LAN Network at Can be connected to another Network
Communication link
is refers to the transmission media for data, e.g. telephone line, satellite transmission, etc. A
WAN needs media that has high bandwidth, low error rates and less attenuation.
93
by the organisation, e.g. students of a certain university. It enables users to do researches, share
les, libraries, local email and video conferencing.
A PAN enables user to transfer les from a laptop to a PDA, camera or Personal Computer.
Activity 4.2
Group Activity-Compare WAN and LAN Networks
1.Draw well labelled diagrams that show di erences between a LAN and a WAN connection,
labelling the form of communication media appropriate for each type of network
Network Topologies
Network topology refers to the shape formed when the nodes are connected together, usually on a
LAN. e most common physical network topologies are ring, bus, star and mesh.
94
Fig 4.2. Ring network
2. Star Network:
Computers form a star shape with host computer at the centre. All the workstations are connected to
a central device which can be a server, switch or hub and therefore the workstations act as clients. e
95
Server (host computer) manages all the workstations or terminals on the network. is network is as
shown below:
3. Mesh Network
• A network in which each computer serves as a relay point for directly sending information
to any other computer on the network.
• No central device oversees a mesh network, and no set route is used to pass data back and
96
forth between computers.
• us, if any one computer is damaged or temporarily unavailable, information is dynamically
rerouted through other computers a process known as self-healing
97
Fig 4.5. Bus network
Bus/Backbone: the dedicated and main cable that connects all workstations and other computer
devices like printers.
Terminator: device that prevent data in the bus from bouncing back, causing noise and prevents data
from getting lost.
e le server can be optional.
98
Fig 4.6. Hybrid network
Advantages of hybrid Network
• It is very easy to nd fault in the network by separating the network segments
• It is very easy to expand the network without disrupting the existing network setup
• Bene ts of di erent network topologies are combined
It can be noticed that the network topologies discussed above may have or may not have server. Server
based network have a server on them, which manages all other devices on the network. We also have
peer-to-peer networks. ese are networks which do not have a server. In peer-peer networks, all
computers on the network have the same status and there is no any computer which controls others.
A peer to peer network can be found in any network topology. e following are some of the features
of a peer-peer network
Peer-peer network
• A peer-to-peer network is the one which does not have a server.
• All the computers on the network have equal status.
• Users can share data on the network directly without using a server
• Data is stored in di erent computers around the network
• Each computer on the network may have its own operating system and storage facilities
• Because data is distributed around the network, it may be di cult to make backups of the
system
• e network is di cult to manage since data is scattered around the network
• is is mostly suitable for small businesses
• e system is di cult to secure
99
Activity 4.3
Group Activity-Designing a Network Topology of a school
Design a network topology suitable for your school environment connecting all departments
with the school, including the administration o ces and the sta room(s). Clearly label all
devices and that will be needed for this network setup. Discuss the strengths and limitations of
your design.
e Internet
Internet is a world-wide connection of computers for information sharing. Internet stands for
international network, which implies that it spans throughout the whole world. e internet is
therefore comprised of servers, workstations and other devices connected together from di erent parts
of the word. Data and information are stored on the servers scattered across the globe. e internet is
available to everyone. However, each country may regulate internet usage in its own territory.
Internet Services
e following are some of the services that are found on the internet:
100
• e second part (gmail), is the domain name and is used to identify the server where the
person has a mailbox.
• e other part (the one a er the dot (.) indicates the domain type e. g
• . com – commercial organisation
• . edu – educational organisation
• . org – non-pro t making organisation, etc.
• A user’s email address should be known by our friends so that they will know the address
where to send the emails. A password is used to protect the mailbox from illegal
access and should remain con dential.
• When signing up for an e-mail address, one is requested to enter the password twice so as
to verify if it is the intended one.
101
Disadvantages of e-mail
• Some spam or junk mail can be send to a user’s inbox. is will waste time for going
through emails that are useless advertisements
• E-mails can be intercepted by hackers, which means they are not 100% secure.
• One needs to check the inbox regularly in order to view incoming messages
• Equipment used to send and receive e-mails is very expensive as compared to traditional
methods, for example modems, mobile phones, modems, and other
E-commerce
Electronic commerce refers to the use of the internet to buy or sell goods and services. Users do not
need to visit shops in order to buy goods. All transactions are done electronically without involvement
of notes and coins. Electronic commerce is also called internet buying, electronic business or online
shopping. Payment for goods and services is done using credit cards. Using e-commerce, companies
create websites through which users from all over the world can access their services and purchase
goods online.
102
• Ensures huge saving on overheads like rent, warehousing, employee facilities and others
as very few employees are needed.
• Advertising costs are reduced since there are no pamphlets used in advertising.
• Business owner reduce costs of building many shops on the streets.
• Organisations can employ fewer workers thereby cutting labour costs.
• Owners do not need to travel to the shop as business can be run from home.
E-learning
Electronic learning is the use of any electronic technology to aid in the acquisition and development
of knowledge, even outside the traditional classroom. It involves using the computer or computer
related equipment to deliver lessons in schools and colleges, e.g. cell phones, data projectors during
presentations, etc.
rough e-learning, learners can access information and do some researches on the internet even
when the teacher is not around. Besides the internet, students can also use pre-developed e-learning
so ware that can be installed on computers.
In some cases, it involves completing a course on the internet without visiting the college or university
o ering the course. Lessons and examinations can be o ered through the internet. E-Learning can
take the form of Computer Aided Instruction (CAI) or Computer Aided Learning (CAL), Computer
Based Instruction (CBI).
103
• Allows lessons to be conducted on-line, saving transport and accommodation expenses
• Promotes active, and independent learning
Disadvantages of e-learning
• Learners will abuse the service if it is not well monitored and well protected, for examples
watching pornography
• Learner lack direct contact with their teachers, which is very important
• Time management can be di cult since learners can learning at their own convenient
time
• Learners tend to cheat by plagiarising and downloading other learners’ assignments
posted on the internet
• Requirements are expensive. Most learners and schools cannot a ord them other than
simple desktop programs with limited information.
• Maybe di cult to conduct practical lessons on the internet other than just simulations
Social Media
Also commonly known as social networking. ese are services that allow users to interact with each
other and for dating on the internet. ey allow people to share pictures, photos, videos and any
material to social interaction. Discussion groups can also be held on certain topical issues a ecting
the society. Social networks include Facebook, Whatsapp, and Viber and so on. Dating sites are also
available on the internet where users can search for love and friendship, even with those far away from
Zimbabwe.
Advantages
• Allows people to get connected with people from di erent parts of the world easily. One
can make new friends or even meet old friends, classmates and other easily through
social networks.
• It allows real-time sharing of pictures, information in groups, news, videos on social
platforms
• Can be used for advertising, for example on Facebook. Information on social media
becomes viral as soon as it is posted on groups on the social media platform.
• Promotes e-learning through some education groups that can be created on the social
media
• Can be a very e ective tool of promoting awareness of any issue since information
spreads rapidly.
• Allows instant or speedy communication become people in di erent areas, like through
Whatsapp platform
• It is a very cheap means of communication and is therefore a ordable
• Communication can be done any time of the day
• It makes it very easy to nd people with common interest
104
the family.
• Increases criminal o enses like cyber bullying
• ere is a lot of identity the and fraud on social media. For example, there are many fake
accounts on Facebook.
• Personal data can be hacked and thus invasion of privacy
• Can cause some people to be addicted to social media, like Whatsapp, thereby neglecting
families and other important duties in life.
• Can cause viral spread of fake news and stories about individuals, thereby destroying their
reputation
• People tend to have more time for chatting and forget to exercise, leading to obese
populations, which is a health risk
• Cheating in relationships is spreading rapidly through social media
105
File transfer
is is a service that allows users to transfer data from one computer to another on the internet. It
allows users to download data, so ware like games and other onto their workstations.
Telnet
is is a service that allows users to use so ware store on other computers whilst on their workstations.
It allows users, for instance to play games stored on a server in Kenya whilst in Mutare, without
installing the on your computer.
Newsgroups
ese are blogs that allows di erent users to share information through groups on the internet. News
are also obtained from the newspapers that are hosted on the internet.
Video conferencing
is is the process of conducting meetings with several people in di erent locations and seeing
each other on the screen on networked computers. Video images and sound are viewed and
heard in real time on large monitors and through speakers. Members do not need to leave
their homes or work places or conference rooms. In order to conduct video conferencing, the
following are required:
• Internet connection with high bandwidth. is will be used to transmit data at high speed
it video conferencing should take place in real-time. e internet connection could be
through an Integrated Services Digital Network (ISDN) line that has a high bandwidth to
transmit video data at fast speed or through optic bre
• A webcam or video camera to take videos
• A computer with a codec. A codec is so ware that is used to convert and compress
analogue data into digital data so that it can be send over digital lines.
• A microphone. is is where the users would speak through.
• Some speakers. ese will produce sound so that the voices of the member could be
heard.
• Large and high resolution monitor: used to display images or the members taking part in
the electronic conference.
• Sound card: Links to speakers so as to produce sound
• Video card: Links to monitors so that it will produce videos
• Echo cancellation so ware: this is used to avoid echoing back during conversations.
106
• Less travelling means less environmental pollution
• More convenient and economical as it possible to hold short notice meetings
Disadvantages of video-conferencing
• Communication expenses are very high, especially where the telephone line is used.
• Hardware and so ware requirements are expensive for ordinary Zimbabweans.
• People will lack personal contact and will socialise more on the internet than personal
contact.
• ere is no direct eye contact, which plays a large crucial role in communication.
• e quality of video or audio may be low, depending on the bandwidth and strength of
the signal.
• ere may be interruptions due to breakdowns in transmission which may make
communication impossible
• Power cuts may prevent the conference from continuing, especially if there is no plan in
place in such a case.
Advertising
e internet in now one of the leading tools used for advertising products, services and tourist
destinations. Adverts through the internet reach a wider audience globally. us companies that
advertise on the internet tend to bene t more than those that do not have the means to do so.
E-banking
is stands for electronic banking. It involves accessing individual bank accounts using a computer
of mobile phone without visiting the banking halls. Account holders are provided with a self service,
whereby they can make balance enquiries or transfer money between di erent bank accounts
electronically using a computer or mobile phone. Customers can even pay school fees, electricity bills
and settle any debt without handling hard cash. is gives rise to a cashless society. e following
e-banking services promote a cashless society:
107
E ects of E-Commerce and E-banking To the Community
• City centres become deserted as people search for services on the internet
• Shops and banks will close down as very few people visit them
• Loss of jobs as shops and banks close down.
• ere is less personal interaction in the society as people tend to interact more using com-
puters
• is leads to less activity on customer, leading to an obese population.
• e gap between the rich and the poor is widened as the rich become richer while the poor
becomes poorer.
• It leads to less pollution due to less travelling of people.
Entertainment
e internet provides a variety of entertainment for users in form of listening to music, newspapers,
radio stations, and downloading of movies and others. User can also watch live streaming of television
stations on the internet. Users can also play or download games like Need for Speed and others.
Hacking
is involves obtaining unauthorised access to protected and secure computer systems or network,
usually using intelligent methods like cracking the password. Such people who perform the activity
are called hackers. Hacking can be prevented by:
• Installing a rewall on networked computers, especially those on internet
• Locking the computer room to prevent access to the computers (if not on network)
• Encryption of data to prevent hackers from reading the information once illegal access has
been successful
• Using strong usernames and passwords may also help
Computer Viruses
A virus is a malicious program that replicates itself and a ects the normal operations of a computer
to the extent of deleting data stored in the computers. Viruses can be prevented by:
• Installing the latest updatable antivirus program, e.g. AVG, Avast, Eset Nod32, etc. e user
should regularly scan the computer using the antivirus
• Installing a rewall
• Not opening emails from unknown and suspicious sources, etc.
Hardware Faults
is can be crushing of the storage media like hard disk. Loss to data by this method can be minimised
through:
• Keeping backup les of the system
• Use of grandfather-father-son method of updating
108
• Running parallel computer systems
So ware Faults
e programs can crush causing loss of data stored in the computer system. e solution is to backup
data, keep le generations and running of parallel computer systems.
Phishing
It is a way attack by tricking someone into handing over their username and password or bank detail
using an email. e phisher sends an email that looks as if it comes from the recipient’s bank and
contains a link to a website controlled by the phisher. It can be prevented by not clicking on the link
and instead going to the bank’s website directly.
Pharming
is is an attack by hijacking the URL of a genuine website and instead transferring to a rogue website.
It intercepts a browser request and redirects it to another website on which the attacker attempts
to steal authentication credentials or debit or credit card details, as in a phishing attack. It can be
discouraged by changing the password on a router (especially a wireless router) so that the hacker
cannot redirect the DNS information.
Activity 4.4 Demonstration of how to sign up for an email account and sending of emails
Demonstrate how to create a new email account and how to send emails with an attachments
le
109
Interesting Facts
1. e World Wide Web (www) was developed by imothy Berners Lee in 1990
2. e internet was developed by the United States army as a way of ensuring that communica-
tion between the US army will not be completely destroyed in the event of a Russian
missile attack
Summary
• A network is a connection of computers for information sharing
• Networks can be LAN or WAN
• LAN is connection of computers over a very small area, like in a single room
• WAN is a connection of computers over a very large area, like the whole country
• Network topologies can be ring, bus, mesh, hybrid and star
• e internet connect computers over the whole world.
• Some of the services provided by the internet includes e-mail, e-commerce, social media,
researching and entertainment
Glossary of terms
Anti-Virus ese are programs that detect and remove (clean) computer viruses and reduce the risk
of computers being attacked by viruses, e.g. Norton Antivirus, MacAfee, Avira, Avast, AVG, etc.
Data Encryption data encryption is the scrambling of data before sending, for security reasons, so
that it is not readable unless it is decrypted using. However, some government do not allow encryption
in their countries for security reasons against terrorism.
Back-up le A duplicate (copy) of the original le that is created and stored at di erent location with
the original le, for security reason.
Grandfather Father-Son les: Also called le generations: these are three versions of les that are kept
at an organisation and are created as a result of sequential le updating and are used for data recovery
when the current master le is lost.
Parallel systems Refers to the running of two di erent systems but doing the same job in the same
organisation. Each system will have its own les.
Password A password is a secret group of alphanumeric characters used to protect a document or le
from unauthorised access
Firewall Hardware and associated so ware used to protect networked private computer systems from
unauthorised access by preventing outside data/users from entering/accessing the system while at the
same time preventing internal data from leaving the system.
Attenuation Loss of signal strength as it propagates through a transmission channel
Bandwidth e volume of data that a transmission channel can carry at given period of time, usually
measured in bits per second.
110
Revision exercises
Multiple choice
6. Which one of the following is the correct format of gmail email address?
A. [email protected]
B. [email protected]
C. @tinayek.gmail.com
D. gmail.com@tinayek
111
8. ___________ refers to any active device on a network.
A. Node
B. Client
C. Computer
D. Server
10. Which of the following internet services is NOT appropriate for learners to use at school?
A. Email
B. Social networks
C. E-learning
D. Researching
11. A computer system allows a user can verify her email password during sign-up process by:
A. Entering it twice
B. Hiding the characters when typing the password
C. Forcing a user to enter a password with at least 8 characters
D. Keeping the password secret
12. Which of the following is less likely to be shared by users logged on to a network at the same
time but in di erent locations?
A. Printer
B. Data stored on a server
C. Mouse
D. So ware on a server
112
15. A private organisation’s network restricted to sta members while using internet technologies is
called _______________
A. Local Area network
B. A Wide Area network
C. An intranet
D. An extranet
Structured questions
1. Explain the following terms, giving examples where appropriate:
a. Modem
b. Internet
c. Intranet
d. Extranet
e. Network
f. LAN
g. Hacking
h. Data encryption
i. Email
j. E-learning [20]
2. Nyorai Pvt (LTD) uses e-mail facility to communicate with its o cers in di erent parts of the
country using WAN as well as o cers in the same building using a LAN.
a. What does WAN and LAN stand for? [2]
b. State two communication media which can be used on a WAN [2]
c. Outline two advantages to the organisation of using e-mail over conventional postal system.
[2]
d. Explain the use of a mail box in an e-mail system [2]
e. Explain why is a password is necessary in e-mail communication [2]
f. In order to access the email system, a modem is needed. Explain the use of the modem in
this situation [2]
3. Mrs Muswere wants to buy a car from Japan through the internet.
a. State any one service that is provided by the internet that will allow her to buy the car from
japan without leaving Zimbabwe [1]
b. Give three reasons why Mrs Muswere chose to use this service other than travelling to Japan.
[3]
c. State 2 risks that she might encounter when using this service [2]
d. State one item of so ware she would use to nd the car she want to buy from the internet.[1]
e. State one item of so ware that she needs to open web pages on the internet [1]
4. Mutambwi High School has a Local Area Network (LAN) which is used by its learners. Learners
login on a workstation and use so ware such as word processors and Spreadsheets. ey can also
receive and send electronic mail via an Internet Service Provider. e LAN is a star network
a. Explain terms LAN and workstation [4]
113
b. Using an example, explain the term internet Service provider [2]
c. Draw a labelled diagram of the star network. [4]
d. Give one advantage and one disadvantage of a star network over a ring network. [2]
5. a. Computer devices can be connected together to form networks. Give two advantages a net
work has over stand-alone computers [2]
b. LAN and WAN are two di erent types of networks. What does LAN and WAN stand for?
[2]
c. Give the main di erence between a LAN and a WAN [2]
d. Networks create security concerns because of the increased number of users sharing the
system. Give three ways of making a network more secure. [3]
e. Name one item of hardware that is required to connect a computer to a LAN [1]
f. Name one item of so ware and one item of so ware that are required to connect a computer
to a WAN [2]
6. Munyikwa High School has received a donation of computers which they later connected to the
Local Area Network. e school authorities are intending to connect the computers to the inter-
net. e internet would be used by learners for researches, communication and for e-learning
purposes
a. Suggest any two hardware items that they school should buy in order to connect their LAN
to the internet and explain their use. [4]
b. Suggest any two forms of communication that will be available form learners on the internet
[2]
c. State any 2 dangers that the learners would be exposed to while they are using the internet.
[2]
d. Suggest how the school would be able to protect the learners from each of these dangers, be
sides constant supervision [2]
e. e computers on the network can also be attacked by viruses. State any two precautions
against viruses at this school. [2]
f. Give 3 advantages of using the internet as a source of information for the learners.[3]
114
c. Give 2 disadvantages of e-learning for the learners [2]
115
CHAPTER FIVE
116
Introduction
In this chapter we look at the importance of safe and responsible use of the internet. Leaners are
also empowered with knowledge and skills in handling online content. e chapter also focuses on
the importance of copyrights in protecting authors’ works, and the copyright laws of Zimbabwe. e
chapter closes with a discussion on the concept of plagiarism and its e ects to the society.
Cyber wellness
Refers to the positive wellbeing of internet users. It involves an understanding of the risks and dangers
associated with online behavior both to self and the community around. Cyber wellness is focused to
help users to be responsible internet users. It helps users to respect self and others. In schools cyber
wellness is taught with an aim to encourage students to harness the power of ICT for positive purposes
and to make students safe and responsible users of the internet. e use of the internet is faced with
many threats such as summarized in the diagram below.
Cyber-Bullying
Daners of Game
Online Addiction
Socialisation Cyber
Wellness
Internet Invasion of
Viruses Privacy
117
Fig 2: Cyber Wellness Principals
118
Fig 3: Social Media
Advantages of social media
• Connectivity: people from di erent locations and backgrounds can connect in just a click
allowing uses to learn and share ideas
• Education: helpful to leaners and educators through access to information from experts
and educational sites
• Help: provides a platform for those who need online help for example xing a car or
assembling devices
• Information update: current information is always available and ready for the use
• Advertisement: business people can advertise their businesses online and to the whole
world
• Charity work: social platforms and sites makes available sites and information on charity
seekers and donors
Cyber use
Expresses how computer users interact on the cyber space. Cyber use which in other words refers to the
use of the internet could be through activities, games, social media or any other base of applications.
e behavior of the user on the internet is of great importance .It determines if one is a good or bad
user, safe or unsafe user. e internet has been termed by some “a lawless jungle “due to the rise of
dangers it poses to its users. e internet provides resources for research, online games for leisure and
entertainment, chartrooms for making new friends on cyber space. e more users spent time on the
internet the more they are exposed to cyber dangers such as addiction. It is very important to teach
119
users how to make good online decisions and learn to surf the internet safely and moderately. Use of
the internet can leave the user enslaved or empowered. Fig 4 show some of the activities which can be
done on the internet.
Instant
Messaging
Uploading Chat
Videos Rooms
Sharing Social
Files Online Networks
Gaming Internet
Surfing
Mobile
Phones
120
• Questions are very simple to answer.
• It saves time as questionnaires can be distributes and then collected later.
• Respondents can ll questionnaires at their own pace.
• Give guarantees con dential of information, thereby encouraging respondents to give
accurate information.
• ey are cheap to use as travel expense can be low
Disadvantages
• Questions must be well thought out and precise.
• Some questions are le blank.
• Some questionnaires may not be returned. Biased information can be collected.
• Respondents usually do not ll the correct information.
• It is di cult to analyse information collect using questionnaires.
• ey are expensive to use if the postal system is used.
• Abusive information can be lled by respondents.
Observation
To get a better understanding of a user in their current work environment, the analyst may observe
the user themselves or view the actual system in operation. User observation is helpful in assisting the
analyst by getting a full grasp of how the user interacts with the system. Observation can be passive
or active. In passive observation, the analysts does not interact with the user while they are working.
ey simply observe and take notes. While in active observation, the consultant will ask the user
questions during the session.
Advantages
• First-hand information is collected.
• May identify problems that the users did not see
• Accurate and reliable information can be obtained.
• Only areas of interest can be observed.
• e researcher can take part in operating the system thereby getting insight on how the
system operates.
Disadvantages
• Inaccurate information can be collected as people may pretend when they are being
observed. Some sers may become nervous, and not perform as they normally would.
• e researcher may not understand some of the activities being observed.
• It is time consuming to collect the required information.
• e researcher may interrupt some of the activities being done.
• More expensive than other methods
• It may still be di cult to capture enough information in one session. ere is need to for
many
• sessions to verify information.
• Analysts may be biased in what they expected to see, and what they actually observed.
150
Activity 6.4
1. Learners in groups, design and produce at least two data collection tools for the area
selected in activity
2. Learners collect data using one of the data collection tools they produced.
3. Learners have a class discussion on how e ective the data collection tools were in nding
data from the users.
Activity 6.5
Suppose in a bank all customers loan application forms are processed manually. e bank
is having many new customers every year. So, the number of customers in the bank has in-
creased. Manual processing of loan application forms is becoming very di cult. e man-
agement is considering the option of computerising the loan processing system. e systems
analyst would need to investigate the existing system.
Find the limitations of the manual loan application system.
How would computerisation of the loan application help the bank?
Interesting Facts
1. ere are many System Development Life Cycle Models such as Waterfall model, V shaped
model, Evolutionary Prototyping model and Spiral Method that can be used to develop new
systems.
2. Large systems may take several months or even years to complete.
151
Summary
• Computerised systems may be introduced for a number of reasons such as improved service,
better performance, competition, reduced costs and changes in technology.
• e systems analyst is a very important person in the development of new systems.
• e stages of the systems development life cycle are problem identi cation, feasibility study,
system analysis, system design, system development and testing, implementation and evalua-
tion and maintenance.
• Information to develop a new system may come from users, top management, government `
regulations etc.
• Major activities under the problem identi cation stage are understanding the problem,
understanding he project scope and constraints, carry out fact nding and estimate project
development time and the costs.
• e methods of data collection are interview, questionnaire, record sampling and observa-
tion,
Glossary of Terms
System :A collection of parts that work together to achieve a certain goal.
System Development Life Cycle:System Development Life Cycle refers to the stages in their order
that can be taken to develop a system from start to nish.
Systems analyst: A system analysts is a person who helps in identifying problems of existing systems,
designs and develops solutions to problems of theexisting system.
152
Multiple Choice questions
1. e following are stages of the systems development life cycle except ______
A. maintenance and evaluation
B. feasibility study
C. system analysis
D. system scope and constraints
6. Most system users are unhappy about using manual systems. One reason is______
A. More information is produced
B. ere is improved service delivery
C. ere is lack of system security
D. e system has better performance
153
8. Which of the following is NOT involved in identifying system problems?
A. system programmers
B. system users
C. system management
D. ksystem management
9. To get a better understanding of a user in their current work environment, the systems analyst
uses _________
A. interview
B. record sampling
C. observation
D. questionnaire
10. A er the preliminary investigation, the system analyst may recommend the following except
____
A. leave the system as it is
B. hire new system management
C. improve the current system
D. develop a new system
Structured Questions
2. a. State and explain any three reasons that will motivate an organisation to develop a new com-
puterised system. [6]
b. You have been promoted to the position of a systems analyst in a local insurance company.
Outline your ve principal duties in the insurance company [5]
3. a. Give one reason why the systems analyst must correctly identify the problems
b. of the current system. [1]
c. State any two activities performed under problem identi cation. [2]
d. Name any three groups of people who are involved in identifying the problems in the system.
[3]
e. Give two reasons why system users are important in the development of the system. [2]
154
5. Give two advantages and two disadvantages of the following data collection methods:
a. Interview
b. Questionnaire
c. Record sampling
d. Observation [8]
155
CHAPTER SEVEN
Objectives
Learners should be able to:
• De ne an algorithm
• Give examples of algorithms
• Explain the purpose of algorithms
• Explain the sequence control structure
• Apply the sequence control structure
• Interpret sequence control structure
• Solve problems using a sequence control structure
• Dry run algorithms that employ sequence control structure
156
Introduction
In our daily activities we nd problems that needs to be solved and tasks that need to be performed.
What is important is how we solve the problem and the steps that we follow when performing such
task. We normally sit down and plan on how to perform tasks at hand. Computer based problems
also need planning and need clearly laid down steps to be followed. is chapter shall look at basic
algorithm tools that are used to solve computer based problems. Learners will be presented with
problems and they should be able to design the step followed in solving the problems at hand. is
chapter should be a foundation for those who would want to take programming as a career.
What is an Algorithm?
It is a sequence of well-de ned steps that are followed when solving a particular problem, for example
nding the shortest route between Bulawayo and Mutare. It is a step by step procedure of solving a
speci ed problem. An algorithm can be created to sort a list of student names in alphabetic order. A
good algorithm should be:
• Well-ordered and thus easy to follow
• Should have a nite number of statements
• It should not tolerate any form of ambiguity (statements with more than one meaning)
A recipe is a very good example of an algorithm. Before writing an algorithm, one must rst of all
understand the problem that needs to be solved, otherwise you solution might not solve the problem
at hand and you will not get payment if you are a hired programmer.
Activity 7.1
Group work –Writing algorithm to prepare a favourite dish or food
In groups, write an algorithm to prepare your favourite food, e.g. sadza, and present to the class for
discussion.
Algorithms are not necessarily written in any programming language but can be in form of Descriptions,
pseudocode, owcharts, structure diagrams or even the actual program code.
Purpose of an algorithm
Algorithms are used to express the structure of a program before it is coded. It is used to make a dra
of a program and to present the logic of a program before coding. Algorithms can be run using a trace
table/dry run table in order to determine the logic of a program.
Characteristics of an algorithm
• Finiteness – the algorithm should stop at a certain point when the instructions are executed.
• Input –It should also have a nite number of inputs, if they exist.
• Output – the algorithm should produce some form of output.
• Should be precise on what is supposed to be done and thus no ambiguity. Statements in it must
only have one meaning.
• Should have a termination point
157
Advantages of algorithms
• It is independent of any programming language thereby exible to write
• easy to convert to a program code or owchart
• easy to determine logic errors
• has nite steps which lead to a solution
Disadvantages
• time consuming to design, for example, rst converting to owchart, then to program code
• most people nd them di cult to learn
Sequence/Linear Structure
is is a control structure in which instructions are executed one a er the other in the order given,
without skipping or repeating any one of them.
e general form of a linear structure is as shown below:
Statement 1 will be executed, followed, by statement 2 and lastly statement 3. Each instruction is run
only once.
For example, the following program accepts 2 numbers entered through the keyboard, adds them
and display the total on the screen
158
1. Total = 0
2. Enter rst number, rst
3. Enter second number, second
4. Total = rst + second
5. Display Total
6. End
When running the above program, the computer will rst execute instruction 1, followed by instruction
2, then instruction 3, instruction 4 and lastly instruction 5, in the order given in the program. Like
what have been said earlier, no instruction is skipped or repeated. Each instruction is executed once
and only once.
It can be realised that the program above has 4 main sections; namely
• Initialisation stage: Line 1: Total =0
• Initialising involves giving starting values to variables. is is done to clear memory of the
computer so that correct values will be calculated.
• NB: Only those variables whose values are to be calculated are initialised.
• Input of values: Line 2 and Line 3
• is is whereby data is entered in the computer through the keyboard
• Processing: Line 4: Total = rst + second
• is is whereby calculations are performed on data entered.
• Output: Line 5: is involves displaying of calculated values on the screen
• A program should have most if not all of the above sections.
Algorithm Tools
e basic tools that are used in writing algorithms are:
• Descriptions
• Pseudocodes
• Flowcharts
• Structure diagrams
Description
ese are general statements that are followed in order to complete a speci c task. ey are not
governed by any programming language. An example:
Using description, write a program that accept student marks entered through the keyboard for the
following subjects, Shona, Ndebele, Computers and English. e program then calculates the average
mark and displays the average mark on the screen.
e result will be as follows:
Enter student marks, for Shona, Ndebele, Computers and English
159
Calculate the Average of the marks
Print the Average Mark
End the program.
Pseudocode
A pseudocode is a set of English-like statements, closer to programming language that indicates
steps followed in performing a speci c task. Pseudocodes are however independent of any
programming language. For example:
Using pseudocode, write a program that accept student marks entered through the keyboard for
the following subjects, Shona, Ndebele, Computers and English. e program then calculates the
average mark and displays the average mark on the screen.
From the program above, INPUT tells us that the user must enter a value required in that statement.
INPUT can also be replaced by ENTER.
On the other hand, S, N, C, E, AVERAGE and SUM are called variables. A variable is a named memory
location that will store a value when the program is running. In this instance, S will store the Shona
mark, N will store the Ndebele mark, C will store the Computers mark and E will store the English
mark.
e statement SUM = S + N +C + E means that, SUM is a memory location which will store that value
obtained a er adding values in memory locations S, N, C and E. e computer will search the stated
memory locations and take the values stored there for computations.
Likewise, AVERAGE = SUM/4, means that the computer will take the value stored in memory location
SUM and then divide it by 4. e answer will be stored in memory location called AVERAGE.
160
is implies that one needs to specify memory locations for values and use those memory locations
when carrying out computations.
PRINT (or DISPLAY) allows a value or data to be displayed on the screen. So, the statement, PRINT
AVERAGE, means that the computer will look for the value in memory location AVERAGE and
display it on the screen.
If the value of AVERAGE = 20 then:
PRINT AVERAGE will display 20 on the screen.
However, PRINT “AVERAGE”, in quotes, will display the word AVERAGE on the screen. is is so
because everything in quotes is displayed as it is in the quotes, even if it has wrong spellings.
e END statement tells the computer that the program should stop running.
Because this is a pseudocode, no one is penalised for any grammar used, as long as it is easy and clear
what needs to be done by each statement.
Advantages of pseudocode
• ey are not written in any programming language and therefore easy to understand.
• It is easier to develop a program from pseudocode than a owchart
• It is very easy to convert a pseudocode into any programming language
• Pseudocodes are usually very short in their codes
Disadvantages of pseudocodes
• ey waste programming time since they need to be converted to an actual program code
later on.
• One needs to be good in writing pseudocodes so that actual programming becomes easy.
Flowcharts
A owchart is a diagram used to show the sequence in which instructions are executed in a program.
Flowcharts are drawn using speci c symbols, each with its own meaning, as given below:
161
Input /output is is a parallelogram shaped symbol, indicating
where data is being entered into the computer or
output from the computer, either as a screen display or
printout.
Process Symbol is is a rectangular shape which indicates where
some form of processing occur, for example where
there is a formula to be applied, like addition,
subtraction, etc.
Decision/ is represents where selection is to be done. It is
Condition used where a condition is, especially in repetition and
selection structures. Mostly used where comparisons
are done and it should evaluate to either true or false.
Pre-de ned Indicates a module/subprogram/procedure inside a
process main program. is subprogram may also have its own
separate owchart.
Connector Circular in shape. is denotes the start or end of a
subroutine/module/procedure. Nothing should be
written inside it.
Example
Write a owchart of a program that accept student marks entered through the keyboard for the
following subjects, Shona, Ndebele, Computers and English. e program then calculates the average
mark and displays the average mark on the screen.
e result will be as follows:
SUM= 0 ( is an assignment statement so it use a process symbol)
AVERAGE = 0 (Process symbol)
INPUT Student Mark obtained in Shona, S (input statement so we use Input/output symbol)
INPUT Student Mark obtained in Ndebele, N (Input/output symbol)
INPUT Student Mark obtained in Computers, C (Input/output symbol)
INPUT Student Mark obtained in English, E (Input/output symbol)
SUM = S + N +C + E (processing statement so we use process symbol)
AVERAGE = SUM/4 (processing statement so we use process symbol)
PRINT AVERAGE (output statement so we use Input/output symbol)
End (terminal symbol)
162
e resultant owchart will be as follows:
Start
SUM = 0
AVERAGE = 0
Sum = S+N+C+E
Average = Sum / 4
Print Average
Structure Diagram
It is a diagram that show relationships between di erent modules in a hierarchical order as given
below.
163
Can you write pseudocode for the diagram above?
Dry running is done using a trace table (dry run table). Dry running is carried out as follows:
• Study the algorithm carefully and understand its task
• Identify all variables in the algorithm
• On paper, draw a table with each variable representing its own column
• Go through each instruction in turn, entering values in the rows below the corresponding
variable. Each change in value must be recorded. A set of all possible test data must be used
• Trace each instruction, even loops until the end of the program, recording each change.
• e last row in each column is the nal value of that variable.
Read each statement line by line, inputting values in the table above under the correct column. us:
164
Line 1: SUM is assigned the value 0, so we write 0 under SUM
Line 2: AVERAGE is also assigned to 0, so we write 0 under AVERAGE.
Line 3: Requires one to input the mark for Shona. 45 is the rst values in our data so it automatically
becomes the mark for Shona and it will be stored in memory location S. So we write 45 under column
S.
Line 4: 78 becomes the mark for Ndebele, stored in memory location N. We write it under N.
Line 5: 23 becomes the mark for Computers and will be stored in memory location C. We write it
under C
Line 6: 89 becomes the mark for English and will be stored in memory location E. We therefore write
it under E.
ere is no more any other input statement, therefore 94 will not be entered in this program. ere is
nowhere to write it so it is le out.
Line 7: SUM is obtained by adding data in memory locations S, N, C and E, that is 45 + 78 + 23 + 89
= 235. So we write 235 under SUM
Line 8: AVERAGE is obtained by dividing SUM by 4, this becomes
235/4=58.75. So we write 58.75 under AVERAGE
Line 9: e average is printed on the screen. us the computer displays 58.75, the output
Line 10: Ends or stops the program
iii. Abnormal Data: is refers to data outside a given range. e values -1, -50 and all values
from 101 and above are abnormal data. e computer system must generate an error message and
reject abnormal data if it is entered.
165
Interesting Facts
1. e rst computer programmer was a woman, Ada Lovelace of Britain.
2. Most programmer started programming games as teenagers, e.g. Steve Jobs
3. Most people have a phobia of programming, but they get much better with practice
Summary
• An algorithm is a step-by-step way of performing a task, like cooking sadza
• Algorithms are independent of any programming language
• Algorithms can be presented using pseudocode, structure diagrams, descriptions and ow-
charts
• A program can be tested using the following test data: standard, extreme and abnormal data
• Dry running involves manually testing output of the program on paper. It is used to test the
logic of the program
Glossary of terms
Algorithm: A step-by-step procedure of solving a given problem. e steps are not governed by any
programming language rules
Dry running: Testing output of a program by running it manually on paper, writing done the results.
Flowchart: A diagram with shapes that are connected with arrows illustrating the step for solving a
given problem
Logic errors: ese are errors that cause a program to output wrong or unexpected results, normal
due to wrong formulas or wrong sequencing of instructions.
Problem: A challenge presented to programmers for them to solve.
Program: A set of detailed and nite instructions, written in computer language, that tell a computer
what do
Programmer: A person who is skilled in designing, coding and testing computer programs.
Programming language: Formal codes, commands and rules that are used when writing computer
programs, e.g. Visual Basic 2010.
Pseudocode: An algorithmic tool that express a solution to a problem using simple English like
statements that are closer to programming language. Variable: A name given to a memory location
that will store values which many change during the running of a program.
166
Revision Exercises
Multiple Choice Questions
1. An error in a program is called_______________
A. Bug
B. Debugger
C. Virus
D. Dry run
2. A table which shows the results of manually executed program instructions is ____________
A. Results table
B. Trace table
C. Instructions Table
D. Formulated table
5. Data which is used to test each feature of a program for correctness is called__________
A. Taste Data
B. Standard Data
C. Test Data
D. Input Data
6. __________ refers to an algorithm structure in which instructions are executed only once and
strictly in their order given.
A. Repetition
B. Selection
C. Recursion
D. Sequence
167
8. When owchart direction are not clear, the programmer can use_________
A. Vertical Lines
B. Arrows
C. Lines
D. Horizontal Lines
13. State the output of the following algorithm using the following data: 4 and 2.
Input First Number, First
Input Second Number, Second
Product=First * Second
Print “Product”
End
A. 6
B. 8
C. 2
D. Product
168
14. Which control structure is represented by the following diagram?
A. Linear
B. Selection
C. Iteration
D. Recursion
169
Structured Questions
1. Explain the following terms, giving examples where appropriate:
a. Program
b. Algorithm
c. Pseudocode
d. Flowchart
e. Extreme data
f. Variable
g. Dry running [14]
2. Study the following algorithm carefully and answer the questions that follow:
Result = 0
First=20
Second = 2
Result = First ^ Second
Display “ e answer is ”, Result
3. a. Write a program using pseudocode, that will accept 3 integers and then multiply them, then
add them and display the results on the screen [7]
b. Write a corresponding owchart for the above program [7]
4. Write a program that calculates the area of any given rectangle. [5]
5. Write a program that calculates the area and perimeter of a triangle [7]
7. A student at Muchekayaora High School designed a program that captures the ages of students at
the school. e program only accepts ages from 15 to 18 years. He then decides to test the pro-
gram using some test data.
Using examples from this situation, state and explain the types of test data that he can use to
make sure that the program accepts correct ages. [9]
8. Using a trace table, dry run the following algorithm using the following data:
170
Database DATABASE
A database is a collection of related les, for
example, College database, church database FILE
etc.
RECORD
FIELD
BYTE
BIT
Flat le database
A at le database is a database that contains only one table. All the data is stored in one table. A at
le has disadvantage of e ciency, space required, and maintenance time.
200
Fig 9.3 PatientsDetails table
201
Retrieval of records from di erent les is Retrieval of records from di erent les is
faster slower
Better security of records is enhanced Less security of data from unauthorised
access
ere is centralised management of data No central data management, di cult to
which is more e cient manage and less security
Activity 9.2
Research on the internet and write three examples and three functions of a DBMS.
202
be accessed and / or changed by each user.
• Allocates usernames and passwords to database users.
• Provides training to users on how to access and use the database.
• Maintain data consistency and security
• Provides back-up and recovery procedures in case the database fails.
Activity 9.3
Carry out a research on the internet on the required minimum quali cations and attributes of
a database administrator.
Database dictionary/Directory
e data dictionary contains the names and descriptions of every data element in the database. It also
contains descriptions of how data elements in the database relate to each other. e data dictionary
also ensures that data is stored in a uniform and consistent manner thereby eliminating redundancy.
Entity
A physical object like person, patient or event on which information or data is being collected.
Attribute
An individual data item within an entity e.g. date of birth, surname, rstname etc. It is a eld in a table.
Database creation
Electronic databases can be created using di erent application programs such as Oracle, Lotus
Approach, MySQL, Microso Access etc. Each electronic database that is created is stored as a
database le. A er the creation of the database le, tables with records and elds to hold data are
created. Queries, forms, reports, and other database elements can also be created. For the purpose of
illustrations Microso Access 2007 will be used
Database objects
A database is made up of the following important objects:
• Table
• Queries
• Forms
• Reports
203
Fig 9.5 Database objects
Creating a database le
Follow these steps to create a database.
1. Launch your Microso Access database so ware.
• Click on Blank Database icon.
• Under File name, enter the database name e.g. Students.
• Click Create button to create the database le.
2. A new database is created. e database name, Students will appear on the title bar of the database
window.
204
Fig 9.7 A newly created database le
Now you are ready to create a table to hold your data.
Introduction to tables
Tables are the foundation of any Microso Access database. Microso Access stores data in tables. A
table is a grid made up of a set of columns and rows that store information in a database. Each column
is called a eld. e number of attributes in a table is called degree.
e row is called a record. e number of rows/turples in a table is called cardinality. Within a table,
each eld must be given a name and no two elds can have the same name.
For example, a table may have elds ID Number, Lastname, FirstName, Sex, Form, City, DOB, Club,
YearEnrolled and Units as shown in Fig 9.8 below.
Table name
Record 1
Record 4
Field Field
FirstName DOB Field
All of the data in a table should refer to the same subject. For example, all of the data in the
205
LearnersDetails table should refer to learners and the data in the Courses. erefore. Microso Access
database can be viewed as a collection of related tables.
Creating tables
Microso Access provides three ways to create a table for which there are icons in the Database
Window.
1
3
206
3. Create a table using a table template by clicking on Table Templates. Access includes tem-
plates for common subjects, such as contacts, issues and tasks.
4. Creating a table using table design view by clicking on Table Design. You can add elds, de-
ne the elds data types and formats before adding data to the datasheet. e window is divided
into two parts: a top pane for entering the eld name, data type, and an option description of the
eld and a bottom pane for specifying eld properties.
Fig 9.12 Table design view with de ned eld names and data types
Tip: You can switch between Datasheet view and Design view by clicking the View button
beneath the O ce Button.
207
3
2
1
Fig 9.13 Datasheet view
Tip: Use the Rename option at any time to rename any column. For example, you can
rename the ID column ID Number.
Activity 5
Find out another method of adding a eld to the table.
208
1
3
2
3
Fig 9.14 Saving a table
1. Click the Save button on the Quick Access toolbar. e Save As dialog box appears.
2. Type the name you want to give your table.
3. Click OK. Access names your table.
Tip: You can also click the O ce button and click Save As to save the table for the rst name
or to give it a new name.
Activity 6
Find out another method of saving a table in Access.
1
2
209
1. Click on Create tab.
2. Click Table Design in the Tables group. Access changes to Design view and the Table
Tools become available.
12
2
6
3 5 7
210
Field Name
is is the name of the eld that should represent the contents of the eld such as “LastName”.
Data type
is is the type of data that can be entered in the elds.
Text- Text type allows any combination of letters and numbers up to a maximum of 255 charac-
ters per record.
• Memo- A text type that can store up to 65, 535 characters
• Number-Numeric data such as 20
• Date/Time-Stores a date or time
• Currency-Monetary values that include dollar sign ($), correct decimal and comma posi-
tions.
• AutoNumber- A unique integer created by Access automatically when a new record is creat-
ed. It can be useful if you want to know the number of records entered in the table.
• Yes/No-Used for True/False, Yes/No, On/O , or other values that must be only one of two.
Yes/No elds are displayed as check boxes by default on the datasheet.
• OLE Object- OLE stands for Object Linking and Embedding). An OLE is an image, docu-
ment (word document or Excel spreadsheet), graph, sound and other objects from O ce and
Windows-based programs.
• Hyperlink-You can store links to Web sites, les on an intranet or Local Area Network
(LAN), and sites or les on your computer. It can also link to another location in the data-
base.
• Attachment- is is new in Access 2007. You can attach images, spreadsheet les, documents,
charts, and other types of supported les to the records in your database, much like you at-
tach les to e-mail messages. You can also view and edit attached les.
• Lookup Wizard- is choice is not actually a data type but can be used to create lookup
elds. For example, you can have a Sex eld where instead of typing Female or Male on every
record, you can simply select Female or Male form a list. Indeed, this saves time and data
entry errors.
211
Setting eld properties
Properties of each eld are set from the bottom pane of the Design view window.
2 2
1. Click the eld for which you want to set the eld properties.
2. Activate the General tab in the Field Properties area.
3. Set the properties you want to set.
4. Repeat steps 1 through 3 until you have set all the properties for all elds.
Tip: A er you nish the task, you must save the table by clicking the Save button on the
Quick Access toolbar.
Field Size
Is used to set the number of characters and type of numbers to enter in the eld. For example, if
the eld can have a maximum of three characters, set the led size to 3 to save disk storage space or
212
prevent data entry errors by limiting the number of characters to be entered. e eld size is set in
exact characters for Text type.
213
Format
Displays the layout for the eld when data is entered into the datasheet. You can select a prede ned
format or enter a custom format.
Symbol Explanation
. (period) Decimal separator
, (comma) ousand separators
0 Digit placeholder. Displays a digit or zero
214
# Digit placeholder. Displays a digit or nothing
$ Displays the literal character “$”
% Multiplies the value by 100 and adds a percentage sign
Table 9.3 Custom number formats
Activity 9.19
Use Microso Access Help or the internet to nd out how positive or negative numbers are
displayed using (+) for positive numbers and parentheses () and (-) for negative numbers.
Currency formats
e currency format consists of four sections separated by semicolons and uses a di erent
format for each section: Format for positive numbers; Format for negative numbers; Format for
zero values; Format for Null values.
Date formats
Prede ned formats for the Date/Time data type are shown in Fig 9.20 below.
215
e following symbols can be used to create custom dates and custom time.
Symbol Explanation
/ Date separator
: (colon) Time separator
D Day of the month in one or two numeric digits (1 to 31)
Ddd First three letters of the weekday (Sun to Sat)
Dddd Full name of the weekday (Sunday to Saturday)
Ddddd Same as the Sort Date prede ned format
Dddddd Same as the Long date prede ned format
W Day of the week (1 to 7)
Ww Week of the year (1 to 53)
M Month of the year in one or two numeric digits (1 to 12)
Mm Month of the year in two numeric digits (01 to 12)
Mmm First three letters of the month (Jan t0 Dec)
Mmmm Full name of the month (January to December)
Y Number of the day of the year (1 to 366)
Yy Last two digits of the year (01 to 99)
Yyyy Full year (0100 to 9999)
H Hour in one or two digits (0 to 23)
Hh Hour in two digits (00 to 23)
N Minute in one or two digits (0 to 59)
Nn Minute in two digits (00 to 59)
S Second in one or two digits (0 to 59)
Ss Second in two digits (00 to 59)
AM/PM Twelve-hour clock with the uppercase letters “AM” or “PM”
am/pm Twelve-hour clock with the lowercase letters “am” or “pm”
Table 9.5 Prede ned formats for custom dates and custom time.
Format Display
dddd”,”mmmm d”,”yyyy Tuesday, February 15, 2001
ddd”,”mmm”.” d”,”yy Mon, Jan. 1, ‘01
“Tomorrow is” dddd Tomorrow is ursday
h:n:s: AM/PM 12:00:00 AM
“ is is week number”ww is is week number 34
Table 9.6 Examples of Prede ned formats for custom dates and custom time.
216
Validation rule and validation text
An expression that limits the values that can be entered in the eld. Validation rules prevent wrong
data being entered in the table. Validation text is the error message that is displayed when a prohibited
value is by the validation rule is entered.
• Field validation rules are validation rules use to check the value that you enter in a eld
when you leave the eld. For example, suppose you have a Date eld, and you enter
>=#01/01/2017# in the Val idation rule property of that eld. If you enter a date earlier
than 2017and then try to place the focus on another eld, Access prevents you from leaving
the current eld until you x the problem.
• Record validation rules are validation rules to control when you can save a record (a row
in a table). A record validation rule refers to other elds in the same table. You create record
validation rules when you need to check the values in one eld against the values in another.
1. Open the table in Design View and ick the led to be validated.
2. In the lower section of the table designer, on the General tab, select the Validation Rule prop-
erty box, and then enter your validation rule e.g. >= 4 And <=36 to allow only units from 4
to 36.
3. Select the Validation Text property box and enter a validation message e.g. “Enter value from
4 t0 36”. is will be the message that will be displayed if you enter a value less than 4 and a
217
value greater than 36.
4. Save your work.
Fig 9.22 Validation message displayed when a prohibited value (45) is entered.
218
Activity 9.4
In pairs, practice creating a validation rule using the Expression Builder by clicking the
Expression Builder button (…) in the Validation Rule property box
1. Click the Expression Builder button (…) to start the Expression Builder
Input mask
A pattern for all data to be entered in the eld. It controls what you can and cannot enter in a eld.
ey are similar to the Format property, but instead display the format on the datasheet before the
data is entered. For example, an ID Number eld can be formatted with an input mask to accept three
characters that starts with two digits followed by any letter e.g. 77N. e input mask will be like 00?
1
q
2
q
3
q
Fig 9.24 Creating an input mask
219
1. In Design view, place the cursor in the eld that the input mask will be applied to.
2. Click the blank space following Input Mask under the General tab.
3. Click the (…) button to use the wizard or enter the mask, 00? or 99L.
4. Save your work.
5. Switch to datasheet view to enter your data.
Symbol Explanation
A Letter or digit. You must enter a letter or digit in this position
A Letter or digit. Letter or digit in this position is optional
0 A digit 0 through 9 without a + or – sign and with blanks displayed as
zeros
9 A digit 0 through 9 without a + or – sign and with blanks displayed as
spaces
# Digit, space, + or – sign with blanks displayed as spaces
? Letter. Single letter is optional
L Letter. You must enter a single letter in this position.
& Character or space. You must enter a single character or space
C Character or space. Single character or space is optional
< Convert letters to lower case
> Convert letters to upper case
Password Creates a password entry box. Asterisks (*) are displayed
Table 9.8 Input mask symbols
Activity 9.5
Discussion on examples of input masks that can be used on
i. text or memo eld
ii. number eld
Caption: e label for the eld when used on a form. If you do not enter a caption, the eld name is
used as the caption.
Default value: A value that is automatically entered in the eld for new records. It is useful in cases
where the value of a eld will usually be the same for all records. is helps to avoid typing the same
data many times.
Required:Set it to Yes if you require data in the eld, otherwise set it to No.
Text Align :Alignment of text in the eld. e options are General, Le , Right, Center, Distribute. e
default alignment is General that aligns text to the le and numbers to the right.
220
Fig 3:Webpage structure
260
tents of the web page to users.
5. Credits
ese are informational elements of a web page that are not content. ey provide informa-
tion about the page which include publication dates, copyright, privacy, and information
about the writer.
6. Hyperlinks
Used to connect to other content or open other pages.
e image bellow by Dr Madhusudhan gives a summary of the elements of a web page
261
Fig5 :Webpage structures
Webpage templates
is is a structured webpage where users can edit the content and customize it using web publishing
tools such as Tripod and Word press which o ers free web page creation and hosting. Webpage
templates are used to allow web designers and developers to generate a standard web page .It allows
the use of static elements of a webpage. ey also give a basic structure and appearance of a webpage.
Once a template is downloaded or purchased the user will replace the information on the template
with personal information. Templates are designed for di erent content and use. Below are some
examples of templates.
• Templates which displays information about an organization
• A template to display personal information
• Showing family structure or history
• Showing a gallery of photos
Webpage templates can be downloaded and modi ed using for example Adobe Dreamweaver and any
other HTML editors. Below is an example of a web page template ready for editing.
262
Advantages of using templates
• You already know how the page will look like.
Activity 10.4
Download a static web page template from the internet, sites such as Dream Template, Site 123
can be used. Fill in the content and upload the page.
Activity 10.5
e leaners Download a dynamic web page template with a photo gallery theme . ey ll in
the content and upload the page.
Activity 10.6
Invite a web content developer to demonstrate on how to develop professional webpages and
how to upload the pages.
Web content
ese are text les, images, videos, audio les and expressions that users get into conduct with on
web pages and web sites.
263
1. Have a clear de nition of your requirements. ese can be expressed by answering the ques-
tions.
• What information do I need to publicize?
• What must be and not be on the web page?
• Am I going to use text, videos, and audio les?
• What should dominate graphics or text?
2. Identify your users
• Know the audience for your page, the class of people who are likely to visit your page.
is will help in the way information can be presented and the type of information to
publish.
3. Navigation
• Expresses how the visitors will go round the page accessing information. is involves the
use of search, dropdown menus, scroll bars and many other tools.
4. Loading speed
• e nature of content on the web page a ect the loading speed of the web page .Too many
large videos and images may a ect the loading speed of a web page, so there is need to
balance the content and time.
5. Fonts and color
• Choose a good font type and font size for the page with a bias to the type of audience .A
good color combination on the background and objects will make the web page attractive.
6. Headlines
• Proper headlines to be used. A headline which attract the attention of visitors. A headline
is the rst thing that attracts the visitors to the page so it has to be properly structured.
7. Further information
• Gives visitors ways to nd more information, there should be links to allow further
explation of concepts also information on the writers such as conduct information and
alternative links.
264
Writing web content
Writing web content is not the same as writing for print document. e use of keywords and appealing
information is important in web content development. Below are tips on how to write simple and
e ective content.
Title –should be short and precise
Headings –main headings should be H1 and subheading to follow the H2, H3,…, H6.
Content-should be rich where possible use examples.
Articles-should be well researched, write substantial information.
Quality –should be high so that we can gain competitive advantage
Optimization - content to be optimized so that it can be visible on the page.
Focus – content to meet the user needs
Proofreading –work to be checked and edited before publishing.
Links - to add links both internal and external to help users
Webpage templates can be downloaded free or bought online and start adding content. Sites like”
Site 123” allows users to download add content and upload webpages. Below are examples of images
of templates that can be used to add content.
265
Activity 10.7
Tour to so ware development companies with an objective to learn how web sites are devel-
oped and hosted.
Interesting items
• e rst web page was created at by Tim Berners Lee in 1991
• e longest web page takes about 2 hours to scroll down. Using keyboard down arrow key it
will take more than 15 minutes
• Most world worst webpages are educational
Glossary of terms
Summary
• A web page is created using HTML or other web based applications and can be opened by a
web browser.
• A webpage can be dynamic or static.
• Webpage elements are the basic items which make up a web page such as links, images head-
ings, content, and others.
• A webpage can be easily made using templates
• ey are many advantages in using a web page template.
• Special facts to be considered before developing content for a webpage.
266
Multiple choice test
4. A static webpage
A. is not easy to develop
B. is expensive to host
C. is dynamic
D. is cheaper to develop than dynamic
6. Web templates are the easiest way to develop your own webpage. Which of these is not an advan-
tage of using web templates
A. You will already know how the webpage may look
B. Produces a static page
C. Choice of templates is wide
D. You don’t need to be a web designer to use the templates
267
8. A web designer has many responsibilities and duties in an organization. Which one will be more
relevant when developing a webpage?
A. Update web content
B. Producing web releases
C. Creating original content
D. Publishing marketing material
9. When developing webpage it is important to take note of the requirements. is can be ex-
pressed by
A. the information I need to publicize
B. the cost of a template
C. things I should not add to the page
D. where to use videos and images
10. Which of the elements below would a ect the speed of a webpage?
A. Long text document
B. Large images
C. Large videos
D. e processor speed
268
15. Which one is not a good tip for writing e ective web content?
A. Use of links
B. Proofreading
C. Adding visuals
D. Use of webservers
269
CHAPTER ELEVEN
TECHNO-PRENEURSHIP
Objectives
• Describe the elements of intellectual capital
• Explain the attributes of business ethics
• Identify the elements of marketing and business strategies
• Explain the elements of marketing and business strategies
270
Introduction
e topic opens up with explaining the elements of intellectual capital and their importance to
business. It further explains the concept of business ethics and its importance in setting up and
running a business. In closing the chapter further looks and explore the role of marketing strategies
and e-commerce in a business.
Intellectual Capital
It’s the value attached to the Intangible assets of an organization which include skills and knowledge
that a company has developed to make its goods and services competitive. It includes employee
knowledge, business training, interaction with markets and customers, stakeholders and any other
piece of information that gives the company competitive advantage. Intellectual capital is made up of
three basic elements.
Human Capital
is is an expression of knowledge experiences skills and competencies which are found in an employee
which are bene cial to the organization. Most of these are unique to an individual and the employee
go away with them when they leave, examples are innovativeness, creativity, previous experiences,
exibility, tolerance, loyalty, training and education. In summary it entails the following attributes
from the employee.
• Know – how
• Education
• Vocational quali cation
• Work related knowledge
• Occupational assessments
• Work – related competencies
• Innovativeness
271
Structural or Organizational capital
It is de ned as the intangible assets which stay within the rm when all has been withdrawn. It
includes data bases, trademarks, organizational image, so ware, copyrights, systems, cultures for
example organizational exibility, knowledge center, use of information technologies. ey may be
summarized as follows
• patents
• copyrights
• design rights
• trademarks
• service marks
272
Business Ethics
Ethics (Unhu, Ubuntu Vumunhu)
A group of moral principles, rules of conduct which de ne what is right or wrong in a speci c
community. It’s about standards of behavior the society accepts. ose things which conscience tell
you it’s right or wrong. Give examples of things that are considered wrong at a work place or your
school which are not acceptable?
Business Ethics
It de nes the framework of behavior of both the company and individuals that business may choose
to follow to gain public acceptance. ese aspects of behavior may be written or not. e aim of
Business Ethics is to determine aspects of human behavior which are wrong or right. Basically it is
knowing what is right and wrong and choosing to do what is right. It is the duty of the organization
to set the standards for right and wrong. Business ethics ensures that a level of trust exists between
consumers and business. In the gure below we see the major sources of ethics.
273
Fig 3: Aspects of business ethics
Bene ts for Ethical Standards
• High moral within employees.
• Attract new customers.
• Build high customer loyalty.
• Reduces the risk of negative publicity.
• Makes good and positive information on the community.
• Builds a good name for the company.
274
Example of unethical practices in Zimbabwe
e article below was published by the public media in Zimbabwe
(Zimbabwe diamond mining companies continue dumping toxic waste
africabusiness.com 20/4/04/03/Zimbabwe -3)
e following are some of the areas where Information Technology professionals face ethical
challenges
a. Privacy
b. Security of information
c. Copyright infringement
d. Increasing computer crime
e. Untrustworthy employees using technology
Ethics plays an important role to IT professionals ethical practices should be exercised from gath-
ering of data, storing, use and transmission. Ethics should stand in where Information Technology
laws are not yet established.
275
Activity 11.4 (Research )
Research on the role of Religion, law and culture in the formation of Business Ethics.
Marketing strategy
It is business or organization’s plan of action which shows the tactics or strategies the company uses to
win customers and perform better than its competitors. Its main goal is to increase sales and to gain
competitive advantage. It should be drawn from market research and a good product mix. Most small
business owners spend so much time building websites, sending, advertising and so on. ey take less
time working on strategic decisions that will improve the performance of their companies. ings to
consider when making a marketing and business strategies:
276
A marketing strategy sets the overall direction and goals for your marketing. A good marketing
strategy helps you to target your products and services to the people most likely to buy them. e
following are elements which help in the development of marketing strategies
4. Competition
To decide on the nature and area of competition e.g. the strategy may be to compete on quality,
price, services or other areas.
5. Product
Describe the product, how does it relate to the market. Also work on the pricing ,positioning and
branding .Should establish the price for the product and the Brand to be used.
6. Pro le your competitors
Keep a record of your competitors. Identify their products, who they supply, price of products,
how they supply, their strengths and weaknesses.
277
Fig 4: e 7Ps
8. Develop strategies to support your goals
Draw up a set of strategies for your targeted market.eg strategies like,
• To increase awareness of your product and company through social Media by posting regular
updates and ads on Facebook, Tweeter.
• To develop and run a website for the company
278
Fig 6: e- commerce
Applications of e-commerce
Online Auctions:
• is is when bidders buy and sell items on the internet using Auction sites such as e-bay,
shop Good will example in Zimbabwe myauction.co.zw
Internet Banking
• Accessing banking services using internet services and technologies. is includes
mobile banking electronic fund transfer money from the bank account to an electronic
wallet (e-wallet) or deposit into another account using a mobile phone. You don’t need to
physically visit your bank to do a transaction.
279
Online Ticketing or booking
• Purchase and Booking of Services online e.g. Air tickets, movie tickets, Bus tickets, sporting
events tickets. It removes the labor of queuing.
Below is a diagram showing the process of online shopping
280
D. mesh
16. When a new password is changed, the system usually asks the user to key in the password twice.
is is to ________
A. ensure that the computer remember the password
B. ensure that the password remains correct
C. ensure that the user identi es him/herself to the computer
D. ensure that the password is keyed correctly
19. A network were all computers are of equal importance is called ______
A. a ring network
B. a mesh topology
C. a hybrid topology
D. a peer-to-peer network
300
20. A series of English-like statements that describes an algorithm is called _______
A. owchart
B. code
C. pseudocode
D. program
23. A computer on a local area network that stores programs and data is called _____
A. le server
B. print server
C. e-mail server
D. network server
24. A er carrying out problem identi cation the systems analyst produces the following documents
except:
A. a detailed statement of the problem of the manual system
B. a detailed statement of the scope of the project
C. a detailed statement of the objectives of the new system
D. a feasibility report with the expenses and costs of the new system
301
1. De ne the following terms as used in computer science, giving examples were necessary:
a. network [2]
b. so ware piracy [2]
c. algorithm [2]
d. e-commerce [2]
e. systems analyst [2]
f. cyber wellness [2]
g. program [2]
i. Bus [3]
ii. Ring [3]
iii. Star [3]
iv. Mesh [3]
3. Give two advantages and two disadvantages of a star network topology. [4]
4. Arrange in order, the following stages of the system analysis and development cycle (SDLC). Sys-
tem implementation, System analysis, System development and testing, Problem identi cation,
System design, Feasibility study, System evaluation and maintenance [7]
9. Zimbabwe High School has decided to have a Local Area Network connected to the internet for
302
use by the learners and teachers.
a. Give three advantages and three disadvantages of having a network to the school. [6]
b. Name any three hardware devices besides the computer that the school has to buy to setup a
Local Area Network. [3]
c. e school headmaster prefers to communicate with the parents using e-mail.
g. Besides using e-mail, the headmaster can use social media for communication with the parents.
Name any two social networking websites that the headmaster can use. [2]
h. Besides e-mail and social networking state four services o ered on the internet. [4]
10. Study the algorithm below and answer the question that follow;
Begin
Input number1
Input number2
Sum = number1+number2
Average = (number1+number2)/2
Print Sum, Average
Stop
Using the trace table, dry run the algorithm using the following sets of data
6,4 10,15 4, 16 0,50 [4]
303
Test 3
is test has been compiled from chapters 8, 9, 10 and 11
Paper 1
Multiple Choice
304
B. A=B\C
C. BC=A
D. A=BC
305
D. Surname = txtSurname.Text
15. Which one of the following is NOT one of the types of the main programming errors?
A. Logic Error
B. Declaration Error
C. Run time Error
D. Syntax Error
17. Which one of the following best describes keywords in Visual Basic.Net?
A. ey are used to name all controls like textboxes and command buttons
B. ey are used in naming variables
C. ey have special meaning and therefore are not used in naming variables
D. ey can be used as identi ers for variables and procedure names
19. Which of the following is NOT part of the Visual Basic IDE?
A. Code Window
B. Form Designer
C. Toolbox
D. Variables
21. A teacher gave her learners a computer science test which was out of 50. Which one of the fol-
lowing is a valid validation rule using Microso Access that the teacher can use
A. Between 0 and 50
B. From 0 to 50
C. Greater than 0 and less than 50
D. Greater or equal to 0 and less or equal to 50
306
22. Which of the following is not part of the Access objects and views?
A. Reports
B. Queries
C. Forms
D. Fields
23. Which of the following dates uses the date format dd/mm/yyyy?
A. 06/27/2017
B. 06/27/17
C. 27/06/2017
D. 27/06/17
24. Which of the following Fields is NOT valid using Miscroso Access
A. Date Of Birth
B. DOB
C. D.O.B
D. DateOfBirth
25. A valid StudentNumber should start with 7 digits followed by an uppercase alphabetic character,
for example 0948810P. e correct input mask for the StudentNumber is___.
A. >9999999L
B. <9999999L
C. >9???????
D. <9???????
26. A cell phone number starts with a zero, followed by any other 9 digits, for example 0715117608.
What is the most appropriate data type for the cell phone number?
A. Integer
B. Number
C. Text
D. Boolean
27. A student name has the length 5. What will be the output if the name Hamunyari is entered?
A. Hamun
B. Hamunyari
C. Hamu
D. Hamunya
28. Which of the following is used as a container for data stored in databases?
A. Form
B. Query
C. Report
D. Table
307
29. Which of the following is not a valid type of query?
A. Delete Query
B. Select query
C. Table query
D. Select query
308
B. <Title>
C. <HTML>
D. <h1>
309
Paper 2
1. Explain the following terms, giving examples where appropriate:
a. Database [2]
b. Web page [2]
c. HTML [2]
d. Ethics [2]
e. Constant [2]
f. Global variable [2]
g. Boolean data [2]
h. Query [2]
4. Identify any 5 errors in the following Visual Basic program segment. Justify your answer.
Dim First Number, Second, 1total As Integer
First = Val (txtFirst.Text)
txtSecond.Text = Second
Sum = First + Second
txtResult.Text = Sums [5]
6. e following is a sample of a Table that stores student records, where RegNumber has a xed
length.
Surname RegNumber Class AmountPaid Paymentdate
Mapfumo 000002 3Q $245.20 17/03/2017
Muchabaiwa 003456 4M $300.05 23/04/2017
Makura 237298 3U $520.00 01/02/2017
Mutimhodyo 018574 4J $450.00 14/03/2017
Mapfumo 002756 3T $200.35 14/03/2017
310
c. Which eld can be used as the primary key? Justify your answer. [2]
d. State the data type for each of the following elds:
RegNumber
PaymentDate
AmountPaid [3]
e. Write the appropriate input masks for the Paymentdate and Class elds. [2]
f. State the length of the RegNumber data items [1]
g. State the Registration Numbers that will be displayed if the following query statement is
written at the intersection of Class and criteria in the Design View of the Student Query. [3]
h. Which RegNumbers will be displayed if the following search criteria is used using the
AmountPaid eld:
i. Between 200 and 300 [2]
10. State and explain any 3 business ethics an organization should observe. [6]
311