0% found this document useful (0 votes)
835 views193 pages

Csec Information Technology 12 Hour CC May 2024

The document provides an overview of computer fundamentals and information processing over 12 sections. It covers topics such as types of computer systems, hardware components, input/output devices, software, data storage, and user interfaces. Sample questions are provided for each section to help students learn the material.

Uploaded by

Daiquan Stanton
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
835 views193 pages

Csec Information Technology 12 Hour CC May 2024

The document provides an overview of computer fundamentals and information processing over 12 sections. It covers topics such as types of computer systems, hardware components, input/output devices, software, data storage, and user interfaces. Sample questions are provided for each section to help students learn the material.

Uploaded by

Daiquan Stanton
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 193

CSEC INFORMATION 12 HOUR

TECHNOLOGY CRASH COURSE


Agenda
1. Section 1 + past papers questions
2. Section 2 + past papers questions
3. Section 3 + past papers questions
4. Section 4 past papers questions
5. Section 5 past papers questions
6. Section 6 + past papers questions
7. Section 7&8 + past papers questions
Types of Computer Systems
Section 1:
Computer Fundamentals &
1. Desktop systems e.g Dell OptiPlex 390 Desktop PC
Information processing
2. Supercomputers e.g Cray 1
3. Mainframes e.g IBM zEnterprise System
4. Mobile devices e.g laptops
5. Embedded devices e.g GPS tracker, dishwasher

9/3/20XX Presentation Title 3


Hardware Components of a Computer

1. Input
2. Processing: CPU
3. Primary memory: RAM & ROM
4. Secondary storage
5. Output

9/3/20XX Presentation Title 4


Input Devices

Input devices function to communicate information to a computer or other information


processing devices. Input devices are types of peripheral devices that communicate with
processing units.

E.g Keyboard, Mouse, Joystick, Light pen, TrackBall, Scanner, Graphic Tablet,
Microphone, Magnetic Ink Card Reader(MICR), Optical Character Reader(OCR),
Barcode Reader, Optical Mark Reader(OMR)

9/3/20XX Presentation Title 5


The CPU is considered as the 'brain' of the computer system because it performs all types of data
processing operations.

The CPU stores data, intermediate results, and instructions (programs). The CPU controls all the
operations of all other parts of the computer systems.

The CPU has three components:


- Memory/Storage Unit
- Control Unit
- ALU: Arithmetic Logic Unit

9/3/20XX Presentation Title 6


CPU

Memory/ Storage
- stores all the data & instructions required for processing.

Control Unit
- it is responsible for controlling the transfer of data & instructions among
other units of a computer
- it manages and coordinates all units of
the computer

ALU
- consists of two sections: arithmetic section & logic section
- they perform arithmetic(+, -, /, x) and logical operations (comparing, selecting,
& merging data)

9/3/20XX Presentation Title 7


Units of Storage

A unit of storage/memory is the amount of data that can be stored in the storage unit. This storage capacity is
expressed in terms of Bytes.

Bit: A binary digit (a bit) is logical 0 or 1 representing a passive or an active (on/off) state of a component in an
electric circuit.
Bytes: A group of 8 bits is called byte. A byte is the smallest unit, which can represent a data item or a character.

- Kilobytes: (KB) 1 KB = 1024 Bytes


- Megabytes: 1 MB = 1024 KB
- Gigabytes: 1 GB = 1024 MB
- Terabytes: 1 TB = 1024 GB

9/3/20XX Presentation Title 8


Important Definitions

Hardware:

this is the term used to refer to all the physical parts of a computer.

Peripheral devices:

are those devices located outside of the CPU but are controlled by it. They are devices that are attached to the
computer system.

9/3/20XX Presentation Title 9


Important Definitions

Software: refers to computer programs that instruct the computer on how to work.

Application software: this is what instructs a computer to do a certain task/application. E.g Word processors &
spreadsheets.

System software: aka OS , operating system. It controls the hardware and how other systems work. E.g
Windows, Ios

9/3/20XX Presentation Title 10


IPOS Cycle

Computers are electronic devices that operate under the control of instructions (programs)
stored in its memory. Computers do four basic tasks:

● Accept data - input


● Manipulate data - processing
● Produce results after processing - output
● Store the data and results for future use - storage

These four tasks represent the IPOS cycle.


The IPOS cycle has that specific order: Input -> Processing -> Output -> Storage.

9/3/20XX Presentation Title 11


IPOS

The IPOS shows how the major hardware components work together within a computer system to make a
computer work:

1. Input
2. Output
3. CPU
4. Primary Memory: Ram & ROM
5. Secondary Storage

9/3/20XX Presentation Title 12


CLOUD & LOCAL STORAGE

Cloud Storage is:

A software application, owned by a 3rd party, that allows users to upload their data using the internet.
A service that allows users to store their data on remote storage servers, called “the cloud”.
On the cloud, users’ data is maintained, managed, backed up and made available to the users over a network such as the internet.

Local Storage:

Includes physical hardware. As its name suggests, local storage is kept nearby. In other words, storage is not remote. You are
responsible for your data storage & protection.

9/3/20XX Presentation Title 13


CLOUD & LOCAL STORAGE

Examples of Cloud Storage:

● Dropbox
● Google Drive
● Onedrive (Microsoft)
● iCloud (Apple)

Examples of Cloud Storage:


● Flash drives
● Hard disk drives
● CDs

9/3/20XX Presentation Title 14


Pros and Cons of Cloud Storage

- It’s inexpensive for the user


- Reduces the chance of data loss due to its backup system
- High usability & accessibility
- Greater storage capacity
- Easy data sharing
- Offers malware protection
*Vulnerable to hackers
*Vulnerable to hardware failure from the 3rd party
* Requires internet connection to access your data

9/3/20XX Presentation Title 15


Pros and Cons of Local Storage

- Your data is under your control; no 3rd parties involved


- Easy to use
- Inexpensive when storing limited amounts of data

*Need the hardware in order to access your data


*Hardware devices can be stolen or misplaced/lost
* Risk of damage from natural disasters

9/3/20XX Presentation Title 16


I/O

9/3/20XX Presentation Title 17


I/O

9/3/20XX Presentation Title 18


I/O

9/3/20XX Presentation Title 19


I/O

9/3/20XX Presentation Title 20


I/O
An output device is
a hardware device used to provide or display information from a computer system in a
human-readable form. This can be as text, images, videos or audio.

It’s basically a hardware device that we use to get information from the computer system.
E.g Monitors, printers

9/3/20XX Presentation Title 21


Types of Software

1. System Software

Aka Operating System (OS) because it controls the hardware and how the other software functions. System
software also includes UTILITY SOFTWARE which works to protect & maintain the system software.

2. Application Software
This is software that tells the computer to execute a specific task or application/job.

There are many types of application software:

- General Purpose Application Software


- Customized Software
- Custom-written Software / Bespoke / Tailor Made
- Specialized Software
- Integrated Software

9/3/20XX Presentation Title 22


9/3/20XX Presentation Title 23
USER INTERFACES

A user interface is what allows you, the user, to interact or communicate with the computer system.

SOFTWARE INTERFACES

There are four (4) main types of software interfaces:


• GUI (graphical user interface)
• Menu- driven
• Command-line or Command-driven
• Touch

9/3/20XX Presentation Title 24


USER INTERFACES

HARDWARE INTERFACES

Include touch screens, sensors, digital cameras and special keyboards.

However, these are also input devices. A game controller is an example of a hardware user interface.

The layout and design of the buttons, touch pad, joystick, and hand grips on the game controller all form the user interface
on the controller.

9/3/20XX Presentation Title 25


Data vs Information

• Data - is the raw facts and results/readings you get after conducting some activity or experiment.
E.g raw number readings obtained after taking the temperature of countries during the
month of July 32, 29, 33

• Information - is processed data. We take the data and give it meaning. After data is processed, it becomes
useful information. E.g the raw temperature reading can be useful to us when we give it meaning by using
the data to list the hottest countries in July and then use that info to pick your travel destination.

9/3/20XX Presentation Title 26


Data - all the reviews on / for a certain restaurant

Information - the average review on this restaurant.


Having this information, you can now use it to help
decide if you’ll give the restaurant a try or not.

9/3/20XX Presentation Title 27


Types of Documents

Machine-readable
Human-readable

Hardcopy
Turn-around
Softcopy

9/3/20XX Presentation Title 28


Validation vs Verification of Data

Validation of data is checking the input data for errors by using the computer and ensuring that the input data
conforms to the data rules or requirements of the system. So it is a computerized method of checking data for
errors...

Whereas

Verification of data is a way of ensuring that the user inputs what they intended to. That’s why some systems
require you to enter your password twice. They are performing a data verification check to test if the data
matches the both times you entered your password.

9/3/20XX Presentation Title 29


Validation vs Verification of Data

Valid: as in it matches a certain format/ data type. E.g the input data is a number when it should be a number.

Verified: as in the data is correct, accurate and free from errors. The email you entered the second time matches the one you
entered the first time. Verifying your email address.

Methods of Verification: Methods of Validation:

- Proofreading (to identify & correct


typographical and transposition errors) - The Range Check

- Double Entry - Reasonableness Check


- Data Type Check
- Consistency Check

- Presence Check
- Format Check
- Length Check
9/3/20XX Presentation Title 30
FILE ORGANIZATION TYPES
● Payroll system
Includes files that store all the information on an employee’s paycheck such as their gross salary, deductions and net pay, etc
Sequential access method is best here.

● Real Time Systems


Such as air traffic-control systems and networked multimedia systems are systems in which correct functioning depends on the timely feedback.
Direct file access method is ideal for real time systems.

● Archiving
Is the process of moving data that is not longer in active use and moving it into long term storage.
Archived files may be accessed serially or directly.

9/3/20XX Presentation Title 31


Jan 2020 P2

RAM stores the instructions or the programs that are currently


being used on the system or by the user

permanently stores files using some type of secondary storage


media

9/3/20XX Presentation Title 32


Permanently stores the start-up instructions of the system. This is
non-volatile memory

9/3/20XX Presentation Title 33


34
Secondary
Direct
Secondary
Serial
Secondary
Random/Direct
9/3/20XX Presentation Title 35
Real-time processing involves receiving instantaneous feedback from the
information systems whereas batch processing involves

doing multiple jobs or copies in one go

Software user interfaces are those interfaces that are primarily programs or
software such as GUI or menu-driven whereas hardware

user interfaces are tangible such as peripheral devices for example a mouse
or special keyboard

9/3/20XX 36
9/3/20XX Presentation Title 37
Kilobyte -> Megabyte -> Gigabyte -> Terabyte

9/3/20XX Presentation Title 38


9/3/20XX Presentation Title 39
Jan 2021

9/3/20XX Presentation Title 40


Pharmaceutical industry and oil and gas exploration industry

9/3/20XX Presentation Title 41


9/3/20XX Presentation Title 42
Input
Input

9/3/20XX Presentation Title 43


Jan 2022

Ensures that data is free of errors and is what the user intended to
enter by methods such as double entry and proofreading

Ensures that data is correct in that it adheres to the rules and


specifications of the system eg it is in the correct format

9/3/20XX Presentation Title 44


Checks to see if the the input data is within the specified
range

months of the year being a


number between 1 and 12 inclusive so the range is 1-12

Checks to see if the the input data is consistent or free


from discrepancies

the entered age matches with


the calculated age using the inputted date of birth

9/3/20XX Presentation Title 45


Jan 2023

9/3/20XX Presentation Title 46


9/3/20XX Presentation Title 47
9/3/20XX Presentation Title 48
Sequential the files are most likely ordered

Serial the master file can be a form of a


records

Direct speed is important for this task

9/3/20XX Presentation Title 49


Jan 2024

9/3/20XX Presentation Title 50


9/3/20XX Presentation Title 51
9/3/20XX Presentation Title 52
9/3/20XX Presentation Title 53
June 2023

9/3/20XX Presentation Title 54


9/3/20XX Presentation Title 55
9/3/20XX Presentation Title 56
9/3/20XX Presentation Title 57
9/3/20XX Presentation Title 58
9/3/20XX Presentation Title 59
9/3/20XX Presentation Title 60
June 2021

9/3/20XX Presentation Title 61


9/3/20XX Presentation Title 62
9/3/20XX Presentation Title 63
9/3/20XX Presentation Title 64
9/3/20XX Presentation Title 65
9/3/20XX Presentation Title 66
9/3/20XX Presentation Title 67
9/3/20XX Presentation Title 68
9/3/20XX Presentation Title 69
June 2022

9/3/20XX Presentation Title 70


9/3/20XX Presentation Title 71
9/3/20XX Presentation Title 72
A computer network is basically the term used to
describe connection of several computers and
devices together.

Section 2: Networks connect computers to each other so they


Computer Networks & can share resources such as peripheral devices like
printers and information.
Web Technologies
Networks can have various sizes, connecting
thousands or just a few devices together.

9/3/20XX Presentation Title 73


Types of Networks

1. LAN
2. MAN
3. WAN
4. Mobile Networks

9/3/20XX Presentation Title 74


Wireless Network Technologies

Some common wireless network technologies are WI-FI, bluetooth, and hotspots.

Bluetooth replaces cables, and WiFi provides high speed wireless access to networks.

Bluetooth allows data exchange over short distances among wireless and wired devices.

A hotspot on the other hand, is a public area usually as small as a room or a public park and it allows internet
access via WLAN. WIFI hotspots are is usually set up at cafes, restaurants and other public places & you have
to be within a certain range to stay connected.

9/3/20XX Presentation Title 75


Privacy levels of Networks
Privacy levels of Networks

Intranet - very private

Extranet - private but gives access to authorized vendors etc

Internet - public network

9/3/20XX Presentation Title 76


Transmission media

This can be thought the same as communication channels because transmission


media are ways or media used to transmit data among computers.

You can use a cabled/wired method or a wireless method to transmit data.

However, wireless media comprise microwaves, satellite, and infrared waves.


Wireless media transmits the data through the air rather than through physical
cables as with wired (cabled) media.

Wired - Coaxial, Twisted pair, Fibre optics

9/3/20XX Presentation Title 77


Network components

These devices (components of a computer network) are used to connect to the internet.

Switch - used to increase the number of devices that can be connected to a router.

Router - this is needed if you are using more than one computer with a modem. A router is the component that directs the signal traffic in
a network.

Modem - modulator/demodulator is provided to you by your internet service provider or ISP. A modem functions to convert analogue
and digital signals between a landline and the internet.

NIC - network interface card- A NIC is a hardware component that provides a computer with a dedicated connection to a network and
can be used for cabled or wireless connections.

9/3/20XX Presentation Title 78


Web Technology Concepts

● WWW
● HTML
● HTTP
● Hyperlinks
● Web browser
● Web Servers
● Web Pages
● FTP
● URL
● Uploading & Downloading

9/3/20XX Presentation Title 79


June 2022

9/3/20XX Presentation Title 80


9/3/20XX Presentation Title 81
9/3/20XX Presentation Title 82
June 2023

9/3/20XX Presentation Title 83


9/3/20XX Presentation Title 84
June 2021

9/3/20XX Presentation Title 85


Jan 2024

9/3/20XX Presentation Title 86


Modem
Router
Cables/wires
Switch

The internet is the place where all the resources


are shared whereas the www gives us access to
those resources on the internet

9/3/20XX Presentation Title 87


Uniform resource locator

Protocol
domain name
webpage

9/3/20XX Presentation Title 88


Jan 2023

9/3/20XX Presentation Title 89


2
4
3
1

9/3/20XX Presentation Title 90


Private - Public
Limited users - Unlimited users
Requires authorization - Doesn’t require authorization
Costly to build - Not costly
Secure - Not secure

9/3/20XX Presentation Title 91


Jan 2022

LAN
MAN
WAN

LAN

9/3/20XX Presentation Title 92


An intranet is a private network that only allows the employees of
an organization access whereas an extranet allows access to outside
parties such as vendors, customers and stakeholder

9/3/20XX Presentation Title 93


Jan 2021

Fibre optics , coaxial,


twisted pair

fibre optics

9/3/20XX Presentation Title 94


Jan 2020

Simplex is when data can be transmitted in one direction only whereas half duplex
involves data being transferred in both directions but one direction at a time

9/3/20XX Presentation Title 95


Computer security is very important in today’s
world. Businesses invest lots of capital to ensure
that their information is secure against threats,
hackers, and just any disaster (man-made or
Section 3: natural) that might occur and cause them to lose
their valuable information.
Social & Economic
Impact of ICT The fear of losing their data and resulting
frustration and havok, is why organizations hold
securing their computer systems, data, and
networks in such a high regard.

9/3/20XX Presentation Title 96


Important Terms

• Vulnerability - a weakness in a computer system that can be exploited

• Threat - a potentially harmful action to the computer system

• Attack- any harmful or offensive action to a computer system or its


data

• Countermeasure - an action or step taken to prevent another action,


usually to prevent danger or an attack

9/3/20XX Presentation Title 97


Internal & External Vulnerabilities
Vulnerabilities of a computer system include:
1. Its hardware & software
2. Its users & data communications (methods of transmitting data e.g cables)

Vulnerabilities of a computer system and its data can be categorized as internal


weakness and external weakness.

Sources of External vulnerabilities:


3. Little to no protection of the systems and its data (from natural disasters or power
surges & spikes)
4. Terrorists’ activity that destroy buildings with computer systems

9/3/20XX Presentation Title 98


1. Sources of Internal vulnerabilities:
2. Failure to backup files/data
3. Human error (employees’ mistakes, erase data)
4. No protection from viruses (lack of anti-virus software)
5. Fraudulent behaviour by employees
6. Lack of passwords and ID authentication that grants only authorized access to the system.

9/3/20XX Presentation Title 99


Computer misuse by people/organizations

Certain people intentionally try to cause damage to others’ system and corrupt
or try to gain unauthorized access to them systems or network.
Some examples of intentional threats caused by people are:

• Hacking - Electronic Eavesdropping


• Phishing - Software and Music Piracy
• Industrial Espionage - Propaganda
• Identity theft
• DOS attack
• Financial abuse
• Cyberbullying
9/3/20XX Presentation Title 100
Countermeasures against computer threats

A countermeasure is an action or procedure that eliminates or prevents some danger or threat. In the computing
scope, it is something that mitigates the effects of the computer threats we discussed earlier.

There are physical measures such as backing up files and implementing other recovery systems or procedures,
setting up hardware firewalls, implementing intrusion detection systems on your devices, and using biometrics
to access the computer systems.

There are software measures such as having effective passwords and authentication/validation systems,
encrypting your data, establishing firewalls, and installing anti-virus and malware detection software.

There are also personal security practices such as verifying the authenticity of emails from companies or
unfamiliar persons, actually looking over and assessing website URLs for authenticity, restricting access to open
Wi-Fi networks, and securing mobile devices.

9/3/20XX Presentation Title 101


Health Concerns of IT in the workplace

I.T has impacted persons in the workplace in relation to their health and safety. There are some common issues
that working with computers have caused:

~ Repetitive strain injury (RSI) ~ Back problems

~ Eye problems ~ Stress

9/3/20XX Presentation Title 102


The Roles of Personnel in Computer-related
professions
The computer-related professions we’ll be looking at are:

- Networks engineers
- Computer Programmers
- Computer support specialists
- Computer system Analysts
- Software Developers
- Database Administrators, Network and System Administrators
- Web Developers
- Social media specialists

9/3/20XX Presentation Title 103


Jan 2020

9/3/20XX Presentation Title 104


Jan 2021

9/3/20XX Presentation Title 105


Jan 2022

9/3/20XX Presentation Title 106


Jan 2023

9/3/20XX Presentation Title 107


108
June 2023

9/3/20XX Presentation Title 109


9/3/20XX Presentation Title 110
9/3/20XX Presentation Title 111
June 2021

9/3/20XX Presentation Title 112


9/3/20XX Presentation Title 113
9/3/20XX Presentation Title 114
What’s a webpage
A web page is a document that users can view by
using a web browser. Web pages contain text,
images, videos, and hyperlinks to other web pages
and files.
Section 4:
Web Page Design Web pages are usually written in a language called
HyperText Markup Language ( HTML). HTML is
not a programming language but it is a universal
language that was made specifically to design the
layout of web pages through the use of tags to
present text and images on the page.

9/3/20XX Presentation Title 115


HTML ?

HTML helps users share documents on the internet because using this
standard language, any web browser can read a basic HTML document.

They also help users link to other documents through the use of
hyperlinks.

Websites can be a standalone web page or be multiple web pages linked


together. So in the lesson, when I say ‘website’, I can mean either a
singular web page or multiple pages.

9/3/20XX Presentation Title 116


Jan 2023

9/3/20XX Presentation Title 117


Specimen P32

9/3/20XX Presentation Title 118


Productivity Tools
1. Word processing
2. Spreadsheets
3. Database management
4. Programming

9/3/20XX Presentation Title 119


Section 4:
Word Processing

JAN 2020 120


9/3/20XX Presentation Title 121
JAN 2021 Presentation Title 122
9/3/20XX Presentation Title 123
JAN 2023 Presentation Title 124
9/3/20XX Presentation Title 125
JAN 2024 Presentation Title 126
9/3/20XX Presentation Title 127
JUNE 2021 Presentation Title 128
9/3/20XX Presentation Title 129
JUNE 2022 Presentation Title 130
9/3/20XX Presentation Title 131
Section 5:
Spreadsheets

JUNE 2022 Presentation Title 132


9/3/20XX Presentation Title 133
9/3/20XX Presentation Title 134
JUNE 2023 Presentation Title 135
9/3/20XX Presentation Title 136
9/3/20XX Presentation Title 137
9/3/20XX Presentation Title 138
9/3/20XX Presentation Title 139
JAN 2024 Presentation Title 140
9/3/20XX Presentation Title 141
JAN 2023 Presentation Title 142
9/3/20XX Presentation Title 143
9/3/20XX Presentation Title 144
JAN 2022 Presentation Title 145
9/3/20XX Presentation Title 146
9/3/20XX Presentation Title 147
JAN 2021 Presentation Title 148
9/3/20XX Presentation Title 149
Database Terminology

Table/relation - the files in which data is stored;


consist of records

Section 6:
Record/row/tuple - a line of data that includes info
Database Management from each
field

Field/column - an attribute of the entity on which


data is
stored (e.g name field) or column in the table

9/3/20XX Presentation Title 150


More database Terminology

When creating your db tables and linking them together, you’ll come across the following terms:

Primary key - a unique identifier (field) that is used to find records e.g student ID field. No null

Secondary key - a key that is considered a candidate key for the primary key

Candidate key - can also be a primary key if it is unique. These keys are optional and can be excluded from a db table. They
can have null values and a table can have multiple of these. (Just another field(s) that can be used as the primary key).

Composite key - is a primary key that consists more than one field.

Foreign key - is the key field that needs to be present in two tables, to link them. This field enables the linking
tables/relations together.

9/3/20XX Presentation Title 151


Data types found in db tables

Numeric

This type deals with numbers e.g 25, 36, 40

Text

Allows long or short text- alphanumeric & special characters

Logical/Boolean = Yes/No

Can select only one of two values, either Yes or No, T/F

9/3/20XX Presentation Title 152


Data types found in db tables

Date/time

Date: dd/mm/yy and time information

Currency

Different money currencies - dollar, pound, euro

Data types tell what kind of data can be allowed or entered in the table and what operation the db can carry out
on or using the data.

9/3/20XX Presentation Title 153


Relationships in a Database

● one-to-one

Denoted by 1:1

This relationship occurs when the primary key or one record from one table links to one and only one
record of another table.

E.g one clerk links to only one employee record

9/3/20XX Presentation Title 154


Relationships in a Database

● one-to-many

Denoted by 1:M or 1:∞

This relationship occurs when one record from a table links to many records in another table. E.g one
student links to many courses because they are registered to many

9/3/20XX Presentation Title 155


MANIPULATING DATA IN A DATABASE
Here we’ll learn to create forms, reports and make queries.
FOR FORMS WE’LL LEARN TO:
(i) Use form wizard
(ii) select suitable fields
(iii) use subforms.

FOR QUERIES, WE’LL LEARN TO:


(i) use more than one criterion;
(ii) use select;
(iii) use a calculated field
(iv) two or more fields involving the use of relational and logical operators.

FOR REPORTS, LEARN TO:


(i) use report wizard;
(ii) sort, group,use statistical & summary features e.g count,sum,& average;
(iii) generate a report to screen, printer & file;
(iv) rename the report title.

9/3/20XX Presentation Title 156


JUNE 2021 Presentation Title 157
9/3/20XX Presentation Title 158
JUNE 2022 Presentation Title 159
9/3/20XX Presentation Title 160
JUNE 2023 Presentation Title 161
JAN 2024 Presentation Title 162
9/3/20XX Presentation Title 163
Section 7&8:
Problem solving &
Programming

9/3/20XX Presentation Title 164


The program implementation process

1. Create source code by transforming your pseudocode algorithm using a programing


language e.d JAVA, Pascal

2. Identify errors & debug source code

3. Execute/run the program to test that the code is working properly i.e displaying error
messages when needed and producing the correct results

4. Maintain the program

9/3/20XX Presentation Title 165


Program errors

1. Syntax errors
2. Logic errors
3. Runtime errors

9/3/20XX Presentation Title 166


Data Tyes

Data types:

- Integer = a whole number e.gs 36, 25, 1


- Real/Double/ Float = a real number incl. decimal form e.g 30.9994
- Character = a singular keyboard character e.g A or 4 or ;
- String = a word or list of characters
- Boolean/Logical = True or False

9/3/20XX Presentation Title 167


A constant is a variable whose value does not change throughout the life of the program.
Its value remains constant.

E.g const

max = 100;

A variable then, is a ‘container’ used in the program to hold values. The values of variables
may change and be updated during the runtime of the program. Variables are used in the
calculations in the program.

9/3/20XX Presentation Title 168


Conditional Statements

E.g of IF THEN

if age < 18 then

print (“This person is a child”)

E.g of IF...THEN...ELSE

if age < 18 then

print (“This person is a child”)

else

print(“This person is an adult”)

9/3/20XX Presentation Title 169


Conditional Statements

E.g of IF...THEN...ELSE If

if age < 18 then

print (“This person is a child”)

else if age == 18

print(“This person is a young adult”)

else if age > 30 then

Print (“This person is an adult”)

9/3/20XX Presentation Title 170


Loops /Iterations

Looping Statements

These are aka iteration (Loops). We’ll be looking at these three types of iteration:

- For

For loops use a specified range, from start to stop, and carry out an action.

E.g: for num = 1 to 10 do

write (“I’m passing I.T with a grade 1”)

End for

Notice the range of the variable ‘num’. The loop will run 10 times, then break.

9/3/20XX Presentation Title 171


Loops /Iterations

- While

While loops do not use a specified range or does not have a predetermined number of times to
iterate. They are used when you only know the condition that stops the loop. E.g in C++:

x=10

while x > 0

print (“TSH for the win”)

x = x-1 // this will alter the value of x

End while

9/3/20XX Presentation Title 172


Loops /Iterations

Repeat...Until loops follow the syntax below:

repeat

Cost = cost + num

num = num - 2

until num = 0

So we are repeating the statements above, until the value of ‘num’ is 0.

9/3/20XX Presentation Title 173


Program Documentation

Documenting your code really is describing or explaining what the code does, how it functions.

This documentation commonly includes:

- The date the program was created/modified & author names


- An overview of the tasks and processes involved

Features of external documentation (user manual)

There is also user documentation which is written for the users.

User documentation should explain to the user how the program works and how to use it.

It includes instructions on how to input data into the program, format output, access the program features,
and how to understand system messages that may pop up.

9/3/20XX Presentation Title 174


Program Documentation

Features of internal documentation (program documentation)

- use of mnemonic, variable names,


- use of comments, indentation,
- effective use of white space

It is recommended that you write comments in your code as you are coding and not wait until the end
when the program is working, as you may forget certains things.

9/3/20XX Presentation Title 175


JUNE 2022 Presentation Title 176
9/3/20XX Presentation Title 177
9/3/20XX Presentation Title 178
9/3/20XX Presentation Title 179
JAN 2024 Presentation Title 180
9/3/20XX Presentation Title 181
9/3/20XX Presentation Title 182
JAN 2021 Presentation Title 183
9/3/20XX Presentation Title 184
JAN 2022 Presentation Title 185
9/3/20XX Presentation Title 186
9/3/20XX Presentation Title 187
JAN 2023 Presentation Title 188
9/3/20XX Presentation Title 189
9/3/20XX Presentation Title 190
JUNE 2023 Presentation Title 191
9/3/20XX Presentation Title 192
Thank you, guys, for attending
And wishing you all the very best in all your
exams !

Questions?

Miss Ariel

You might also like