Computer Science Basic Notes by Anonymous
Computer Science Basic Notes by Anonymous
NB: THIS WORK OF ART IS MOST SUITABLE FOR BIGGINERS AND THOSE NEW TO THE WORLD
OF COMPUTERS
THE COMPUTER
What is a computer?
✓ This is an electronic device that accepts data, processes it and give out information.
Data
✓ Is the collection of raw facts, such as numbers, words, measurement, observations or even
just description of things.
✓ Are raw facts or numbers without any meaning.
Information
✓ It is any piece of equipment (or hardware) that can be connected to the Central Processing
Unit.
HARDWARE
Hardware: These are parts of a computer that exits in physical form, for example
mouse, keyboard. Hardware refers to tangible devices of a computer. Hardware is
These are devices that are used to enter data into the computer.
OUTPUT DEVICES
These are devices used to give out data or information from the computer . STORAGE
DEVICES
These are devices that are used to store data or information in a computer .
COMMUNICATION
These are devices which allows communication to take place between two or more
computers .
PROCESSING DEVICE
A device used to convert and to manipulate data as per user requirement. The sole
processing device of a computer is the processor, which is inside the Central
Processing Unit (CPU) casing. Processing involves sorting of data, updating
records, searching certain records, adding a sequence of numbers, and others.
The speed of a processor determines the speed and function of a computer. Until
the 1980s, most computers had one processor, but recent ones have two or more
processors (called co-processors), those with two processors are called dual
processors. Two or more processors share loads and therefore perform operations
faster. The speed of a computer is also determined by the clock speed for each
Arithmetic and Logic Unit (ALU) and the Control Unit (CU) and Registers
(a) Arithmetic and Logic Unit (ALU) - Carries out arithmetic operations like add,
subtract, divide, etc. Performs logic operations, like AND, OR, etc.
(b) Control Unit (CU)
High-speed storage area in the CPU used to temporarily hold small units of program
instructions and data immediately before, during and after execution by the CPU.
(d) Memory (Main memory)
Stores programs and data for programs currently running on the computer. Main Memory is
very close to the processors and therefore the two can coordinate their activities very fast.
INPUT DEVICES
Touch pad trackball
Remote control
Sensors
Touch screen
Numeric keyboard
(i) Keyboard: It is a device used to enter data and instructions into the computer
by typing. It is a manual input device. It is similar to the traditional typewriter. It is
used to enter alphabetic letters (A-Z-both lower case and upper case), numbers
(09, positive and negative) and other special characters like the %, $, coma, ?, and
the space. Keyboard entry of data is manual and its excessive use without breaks
will cause Repetitive Strain Injury (RSI).
*NB: - A character is any symbol, digit or letter that can be entered into the
computer, eg. $, %, 5, h, etc. These characters can be numeric (numbers 0-9,
positive and negative), alphabetic (letters A-Z, both lower and upper case),
alphanumeric data (a combination of both numeric and alphabetic characters) and
special characters
(a) Concept keyboard: uses icons or phrases instead of standard letters, e.g. they can
have the following keys: %, tax, CH, Total, etc. Most are faster for making menu
choices. They have fewer keys. Mostly popular for use in bars, supermarkets, fast
food restaurants, etc. They are quick and easy to use. They are also waterproof. The
keys are tamper proof.
(b) Braille keyboard: Suitable for the blind.
(c) Standard keyboard: this is the normal, also called QWERTY keyboard. Advantages
of standard keyboards:
- Most people find them easy to use
- Enable fast entry of text data
(d) Numeric keypads: mostly used to enter numbers only. Used on ATMs, to enter PIN
and amount to be withdrawn. Also found on cell and telephones, Chip and
pin devices, and on Electronic Point of Sale terminals (EPOS). They are faster
in entering numeric data as compared to standard keyboards, very easy to
carry around if found on cell phones. However, they have very small keys
which can be difficult to use. It is difficult to use them for entering text data.
(ii) Mouse: It is a pointing device used to enter data and instructions into the computer by
clicking. A mouse has either one, two or three buttons. A mouse can be cable or
wireless. The mouse is also used to:
- Select options from a menu
- Position the cursor when editing text/typing - Select an object for drawing and
for editing diagrams - Select icons/text to be formatted, deleted or edited.
- Control movement of pointer on the screen.
It can also be used for pointing and selecting items.
Clicking is the process of pressing and releasing the
Mouse mouse button.
Advantages of mouse
- It is a fast method of entering data and for selecting items as compared to the
keyboard.
- It is faster to move cursor around the screen using a mouse than a keyboard.
- Usually supplied with the computer and so there are no additional costs.
- Very easy to use for most users.
- Take up very small area of the desk
- Very fast to switch between programs
Disadvantages of mouse
- Needs a flat surface on which to operate
- Can be easily stolen or vandalized
- Some people find it very difficult to use
-
(iii) Touchpad
These are pointing devices used on laptops, where one moves a figure to control the
pointer on the screen. Their uses are similar to those of mouse. They aid portability
since they are attached to the whole computer system. Can also be used where there
are no flat surfaces available. However, they are difficult to use, e.g. when doing drag
and drop.
(iv) Scanner: an input device used to convert images from paper (hard copy) into
electrical signals for input into the
computer.
The images can then be edited,
printed or saved. Mostly used to
scan pictures, photographs, etc. they
can use OCR, convert to Word or pdf
format directly.
Flatbed scanners have the paper placed on top of them, in a similar way to a
photocopier. These are more expensive than hand-held scanners but they are
usually able to produce higher resolution images. They are very
accurate in scanning. Images are stored for later editing. Quality
of scanned image can depend on the resolution of scanner.
(v) Digital Camera: A device use to capture photographs, films, videos or a combination
of both for entry into the computer where they can be edited.
- no film is needed (saves costs for purchasing films and developing the film)
- Unwanted images can be deleted straight away
- Images are already digital and therefore can be transferred to a computer for editing
immediately,
(viii) Joystick: A device specifically used for playing games. Can be used to control pointer
on screen by gripping the stick when making selections. Used also in flight simulators.
Advantages of trackball
- It is stationery and therefore do not need a flat surface to move on
- Less likely to get damaged than mouse
Disadvantages
- Rolling the ball is less effective than using mouse
- Can be difficult to control
- Not supplied as standard device, so extra cost is incurred - Muscles can be strained
due to repeated movement
- Used in home entertainment devices like TVs, DVD players, HIFIs, etc
- Remote controls for multimedia systems
- Stop/ start machinery in industrial applications
Advantages: Allows devices to be controlled from a distance, Flexible to the disabled, safer
to use in chemical processes.
Disadvantages: People arm problems/disabilities cannot use them, signals can be blocked
(need a line of sight)
(xi) Microphone: It is an analogue input device that recognises human voice for data entry
into the computer.
Microphones are used to input sound. In computing,
they can be used with voice
recognition software and a word
processing application to enter text.
Webcams commonly have microphones
built-in too.
- They are appropriate for the handicapped, especially those without hands.
- They are very fast in entering data and in giving instructions to the computer.
- They are speaker independent.
- They can recognise natural language.
Disadvantages:
- Older systems are speaker dependent.
- They allow the user to speak slowly, using specific words that were programmed for
it to understand.
NB: Multimedia speakers, sound cards, a microphone and voice recognition software are
needed in voice recognition systems.
(xii) Light pen: A ballpoint shaped device used to enter data by writing on an ink
pad. It is also used to make alterations on the screen to the drawings, to write
directly on the screen and to select commands.
Light pen
(xiii) Kimball Tags: These are punched cards with a magnetic strip which contains
details of a product, mostly clothes in a shop.
(xiv) Graphics tablet: Devices used to provide interface for drawing on the screen
and links with the light pen. Can also be used with a stylus. Can be used for drawing
(xv) Webcam: A digital video camera designed to take digital photographs and
transmit them over the internet or to the computer. They do not have own memory.
Laptops have their own web cam.
Uses: viewing each other when chatting on internet. For video conferencing. For taking
personal images.
Advantages: can be left on and only activated when required. People can see each other
when chatting.
(xvi) Sensor: an input device that automatically records physical data by sensing
the environment it is supposed to record, e.g. humidity sensor.
(xvii) Magnetic Stripes: Magnetic stripes can be seen on train tickets or bank or
credit cards.
(a) Card with magnetic strip (b) Magnetic strip reader These stripes
hold a small amount of data (64 characters) and can be read by a magnetic
stripe reader (card reader) that is connected to a computer system.
These provide a quick and accurate way of entering details into a computer system and
are simple to operate.
(xviii) Smart Card Readers: Similar to magnetic strip readers except that
they are used to read data stored on a chip. Most bank cards and credit cards are
now smart cards. Also used on royalty cards, ID cards, electronic
passports and transport passes.
Cards have their own processor and memory that can hold up to
64KB of data. The data that is stored can be updated and the
processor can process simple programs.
Smart cards
- Smart cards are simple to produce
- Not easily damaged
- Store a fairly large amount of information - Automatic input devices, reduce
paperwork However:
- Data can be changed by magnetic fields
- The strip can be damaged by scratching
- Limited storage capacity
- Not very secure as thieves can alter the data.
(xix) Barcode Reader: These are devices at Electronic Point of Sale terminals
(EPOS) that read barcodes on products for automatic data entry into the computer.
Mostly used in library systems, luggage handling systems at airports, warehouse
stock control, etc.
Barcodes are numbered vertical lines and spaces
of varying size on products that provide data for
such a product to the computer when read by
barcode readers.
How does the computer system checks that the barcode has been read correctly?
Either the computer performs the following:
Calculates the check digit; remainder = 0 if barcode has been read correctly OR
uses the weights and modulus 11 and use remainder Areas where barcodes are
used: - Library book systems
(xx)Video digitiser
A video digitiser takes an image from a video camera or television and digitises it
so it can be read by, and stored on, a computer. Video sequences captured using
video digitisers are often used in multimedia presentations.
(xxi) Stylus: device used to write on sensitive pads or screen for data entry into the
computer. Often purchased with touch screens
DOCUMENT READERS
These are devices used for entering data automatically into the computer by reading
through documents. These include:
(i) Optical Mark Recognition (OMR): The Optical Mark Readers use light
sensitive devices to sense pencil marks on a piece of paper for automatic data entry
into the computer. Light is reflected from the document onto the Optical Mark
Reader which records the output. It then records low intensity/zero intensity at
certain points. OMR is mostly used in marking multiple choice exams at ZJC and ‘O’
Level, reading pupils’ registers, playing lotto, etc. An Optical Mark Reader is the
device that is used for automatic data entry in OMR systems.
- OMR is fast in entering data
- It is also accurate and reliable in entering data.
- Has better recognition than OCR
- Can be prepared where data originates, without machines - Errors can be
corrected easily However:
- Mark readers are relatively slow
- Verification of data is difficult
- Document may be difficult to design
- Forms must be completed clearly for data to be recorded accurately - Papers need
to be clean
(ii) Optical Character Recognition (OCR): It is the use of light sensitive devices
to recognise alphabetic characters and numbers on a sheet of paper for automatic
data entry into the computer. Mostly used by insurance companies, in billing
systems and processing of Bank Giro-forms. An Optical Character Reader is the
device that is used for automatic data entry in OCR systems. It recognises printed or
even hang written test form input into the computer
OUTPUT DEVICES
These are devices used to display and produce data and information held inside the
computer, for example: screen, printer and graph plotters. These are described below:
Three form of outputs are:
Sound- output from a speaker.
(a) Impact Printers: these are printers whose write heads hit ink ribbon
against paper during printing, e.g. dot matrix printer, chain printer, daisy wheel,
printer, drum printer, etc. Thus, there is contact between the paper and the
write heads during the printing stage. Examples include drum printers, dot
matrix printers, daisy wheel printers and chain printers. Impact printers have
the following advantages:
• They are very cheap to buy.
• They are cheap to repair and to maintain.
• They can use continuous paper.
• They are economic in terms of ink usage.
Weaknesses
- Low resolution
- Noisy
- Slow printing speed: this is because they can be character based or line based
printers.
(b) Non-Impact Printers: These are printers that do not produce contact
between papers, write heads and ink cartridge during printing. Non-impact
printers include: inkjet printer, laser printer, thermal printer, etc.
Laser printers
Most of the printers use light and are therefore called laser printers.
The advantages of laser printers are as follows:
• They print at very high speeds since they are page printers.
• Cannot be used with continuous stationery since they are page printers.
• Toner is toxic and therefore should be disposed of carefully after use.
*NB: - Printers can also be classified as page printers (these print one page at a
given time and are therefore faster), line printers (print one line at a time, very
slow) and character printers (print one character at a time).
(ii) Screen / Monitor: it is a television shaped device used to display contents on the
computer as soft copy. Soft copy refers to data viewed on the screen. The screen can
also be called the Visual Display Unit (VDU). The screen can differ in terms of
resolution, that is low resolution screens display less number of dots per inch on the
computer and therefore the display will be of poor quality. High resolution monitors
are needed mostly in graphics packages where colour and many dots per inch are
needed.
Monitors are of two main types:
Advantage of Monitors
- Its output is immediate and visual
- High speed of display
- No noise
- No wastage of paper - Can display text, graphics, etc
-
Disadvantages
- When the display changes, the previous output is lost.
- Needs a separate device to produce hardcoy
(iii) Graph Plotter: This is a device used to produce high quality drawings in various paper
sizes and is used in Computer Aided Design (CAD). A plotter can be used to produce
high quality, accurate, A3 size or bigger drawings. They are usually used for Computer
Aided Design (CAD) and Computer Aided Manufacture (CAM) applications, such as
printing out plans for houses or car parts. They print sharper and more precise
drawings.
Graph plotter
(v) Speakers: produce sound from music files on the computer. They are used in
conjunction with multimedia files.
(vi) Braille Printer: prints Braille which is readable to the blind people.
(vii) Actuators: these are output/control devices which turns on or off some devices in
control systems. Some of the control devices include electric heater
(supplier heat), electric motor (provide movement/rotation), motorized pump,
buzzers, lights, heaters, actuators, etc.
HEADPHONES
Storage Capacity
✓ Refers to the amount (volume) of data a device can store. The following storage
measurements can be used:
Bit: The smallest unit of data a computer can store, either a 1 or a 0.
Nibble: refers to half a byte, that is, a group of 4 bits.
Byte: a group of 8 bits representing a character. For example, the letter C is represented by the
byte 01000011.
Size Equal to
8 bits 1 byte
1024 bytes 1 kilobyte
1024 1 megabyte
kilobytes
1024 1 gigabyte
megabytes
1024 1 terabyte
gigabytes
Kilobyte (KB): this refers to 1024 bytes.
Megabyte (MB): 1 MB is equivalent to 1 048 576 bytes.
Terabytes (TB): refers to 1 099 511 627 776 bytes (approximately 1 024 GB)
✓ RAM is volatile, which means that it loses its contents when power is switched off.
✓ RAM is in two forms; that is, dynamic and static RAM.
✓ Static RAM is a Random Access Memory chip whose contents do not change as long as
there is continuous power supply.
✓ Dynamic RAM is Random Access Memory chip whose contents can be lost even if there
is continuous power supply. Dynamic RAM needs to be refreshed to prevent loss of data.
The size of RAM also affects the speed of operation of a computer and the number of programs
that can be run on it. RAM size can be 16 MB, 32 MB, 64 MB, 126 MB, 256 MB, 448 MB, 1
GB, etc. The bigger the RAM size, the better the efficiency of the computer and the bigger the
number of programs it can run at a given time.
(b) ROM (Read Only Memory):
✓ ROM is a semi-conductor circuit (chip) whose contents can only be read from and cannot
be erased or modified.
✓ ROM contents are fixed during manufacturing, that is, they are hard – wired.
✓ These contents can only be read from and cannot be modified.
The uses of ROM are:
➢ Stores the Basic Input-Output System (BIOS-refers to software that test hardware at startup,
starts the operating system and support data transfer between devices.) of the computer.
➢ Stores control programs for the operation of the computer and its peripherals.
➢ Stores translator programs.
✓ Backing up of data refers to the copying of files to the copying of files & data to
a different ( medium disk tap ,flash drive etc) in case of the problem with the main
storage device
✓ Data could be lost due to failure of the original storage device this could due of (head crush
on hard drive unit) or possible corruption of files e. g caused by power surges.
✓ Backups are also made in case the files need to be used elsewhere.
I. Magnetic. II.
Optical.
III. Solid state.
Magnetic Storage
These store data on magnetized field of iron oxide and include magnetic tapes, zip drives, diskettes,
hard drives and flash drives.
(a) Magnetic Tapes:
✓ They are similar to a normal cassette tape in shape.
✓ They store data in serial and sequential order.
✓ They are mostly used to backup data.
✓ Their storage capacity can be up to 20 GB.
✓ Data is also accessed in serial or sequential order. They can be used as off-line storage
media.
➢ It takes too long to update records, time wasting. ➢ They are prone to humid (moist)
conditions.
➢ They are very slow to write to and read from
✓ These are disks used to store large volumes of data and programs, including operating
systems and are resident in the CPU casing.
✓ Data is stored on tracks in a random way and data retrieval is in a random way.
✓ Hard disks can store data of up to 300 GB, but ranges from 2 GB, 8 GB, 20 GB, 40 GB,
80 GB, 120 GB, etc. a hard disk can be internal or external.
✓ External hard disks have a larger storage capacity and can be used to back-up the system
Uses of Hard Disk:
➢ Creating backups for data.
➢ Storing communication and applications software.
➢ Storing of the operating system from which the computer will boot. ➢ Transferring large
volumes of data from one computer to another.
✓ A 3.5 inch and plastic magnetic disk enclosed in a stiff envelope with a radial slit; used to
store data or programs.
✓
✓ They have a storage capacity of 1.44 MB.
✓ They are used as backing storage for small volumes of data.
✓ Data is stored on tracks in a random way. ✓ Direct access to data is provided.
Disadvantages of Diskettes:
➢ Have very short life span (not durable).
➢ Can be affected by humid conditions.
➢ Can easily be affected by dusty conditions.
➢ Can easily be damaged if placed close to the screen for a long time.
➢ Takes long to read data into memory than from a hard disk.
➢ Hold very small amount of data, 1.44 MB.
✓ Refers to devices that use light to store data on them and these include Compact Disks,
Digital Versatile Disks, Video Compact Disks, etc
1. CD (Compact Disk):
✓ It is spherical disc that uses laser beam technology to read and write data.
✓ It stores data on tracks in a random way.
✓ Data retrieval is in random order.
✓ Storage capacity is 750 MB.
✓ Writing of data on CD is done by a device called CD writer/burner.
Advantages of CDs:
➢ Provide fast and direct access to data.
➢ Has large storage capacity of about 750 MB.
➢ Produces high quality sound and pictures.
➢ It is a multi-media device.
Disadvantages of CDs:
➢ Can be affected by direct sunlight.
➢ Less durable.
➢ They can easily get scratched.
➢ Not so easy nor fast to save data on them
Types of CDs
1. CD-ROM (Compact Disk Read Only Memory) a common form of optical Disks on which
data, once it has been recorded, cannot be modified.
2. CD-W (CD-Writeable) an optical disk that can be written upon, but only once. Often called
WORM (Write Once Read Many) disks.
3. CD-RW (CD-Rewriteable) on optical disk that allows personal computer users to replace
their diskettes with high-capacity CDs that can be written upon and edited over.
Advantages to schools of storing learning materials on a CD-ROM other than using the
Internet
➢ No danger of accessing doubtful websites.
➢ Does not take as long to find required information.
➢ Do not have to have a modem.
➢ Do not need for a telephone line.
➢ Once CD ROM is bought there is no additional expenditure.
COMPILED BY ANONYMOUS #NO RISK NO REWARD
COMPUTER SCIENCE BASIC NOTES
Disadvantages to schools of storing learning materials on a CD-ROM other than using the
Internet
➢ CD ROM can be lost easily.
➢ CD ROM can be damaged easily. Internet is up to date while CD ROM is soon out of date.
➢ CD ROMs are expensive to replace and to update.
➢ Less information can be stored on the CD-ROM as compared to the internet.
Disadvantages of DVDs:
➢ Can be affected by direct sunlight.
➢ Less durable.
➢ They can easily get scratched.
➢ Use soft marker for labelling and not ball point. ➢ Keep the free form dust conditions.
*NB: - Virtual Memory – Refers to temporary storage (on hard disk) used by the computer to
run programs that need more memory (RAM) than the computer has. For example, programs
could have access to 4 gigabytes of virtual memory on a computer's hard drive, even if the
computer has only 32 megabytes of RAM.
SOFTWARE
What is software?
Types of software
➢ SYSTEM SOFTWARE
➢ APPLICATION SOFTWARE
System software
✓ These are programs that manages, oversee and control all activities of computer.
Operating system software.
✓ Is a large, complex of programs, which provides for loading and execution of other
programs.
Examples of operating system.
➢ Windows family.
➢ Mac OS.
➢ Linux.
➢ UNIX.
➢ MS DOS
Functions of the operating systems:
➢ Controls movement of data to and from peripherals.
➢ Acts as a background on which application programs can run.
➢ Device management/Input-Output management: Operating system manages hardware
components of the computer.
➢ Handling of interrupts
➢ Manage software resources of the computer
➢ Memory management: Manages memory resources of a computer - Acts as an interface
between the user and the computer.
➢ Scheduling of tasks
➢ Loading and running of programs
Utility programs.
✓ These are programs responsible for housekeeping functions in the computer system.
✓ -There are also known as service programs.
✓ -There are designed to analyze, configure, optimize and maintain the computer system
✓ These are programs used to perform specific, useful and frequently needed task in a
computer system. They usually have one single task to perform on the computer system.
Utilities include the following:
i. Virus Scan Utility: These are programs that protect computers from virus attacks, for example
Norton Antivirus, AVG, Avast, Eset NOD32, MacAfee, etc.
ii. Sort Utilities: These are programs used to arrange data, files and records into a specific ordered
sequence, for instance in ascending or descending order of a given key.
iii. Debuggers: These are utilities used for assisting in correcting errors in programs.
iv. Dump Utilities: These are programs that assist in copying data from main storage to output
devices and to other storage devices like the hard drive.
v. Editors: These are programs used to make changes to data already held in the computer.
vi. Peripheral Transfer Utility: These are programs used to transfer data from one peripheral
device to another.
vii.System Status Utilities: These are programs that provide information on the state of files,
memory, users and peripherals.
viii. File Maintenance Utilities: These are programs used to reorganise programs and to update
them.
(d) Device Drivers: Programs that allows a device, e.g. printer to work on a given operating
system/computer.
Application software.
✓ Is a software that allow users to perform specific set of task/activities.eg database.
Application software ( also called end user program ) include such things as database
programs, word processor , web browsers and spreadsheets.
Off shelf software.
✓ It is a software that is readily available on the market.
Bespoke /Customized/Tailor made.
✓ This is a specific software that is developed for a specific purpose.
FACTS
➢ Computers are used for keeping records such as budget information , farm equipment
inventories and animal health form
Farm implements
➢ farm implements such as tractors , fertilizers sprayers have computers that farmers
can program to automatically adjust the amount of fertilizers according to the
requirements of soil and crop which help in improving soil and higher crop yield.
Farm equipment
➢ Farmers can use computer system to guide the steering of their farm equipment
during planting or harvesting ; if the system experiences problem , Technicians can
diagnose and fix the issues remotely from another computer.
COMPILED BY ANONYMOUS #NO RISK NO REWARD
COMPUTER SCIENCE BASIC NOTES
Farm software
➢ with regard to live stock farming ready-made computer applications are available to
track individual animals , storing and evaluating information such as age , health
record, milk production , offspring productive cycle status this is often called herd
recording .
Agribusiness
➢ Internet forums , social networking and online knowledge bases: through internet
forums ,social network sites and online knowledge bases farmers get a lot of
information with these they contact with other farmers and experts and exchange
know-how there are many online data base , articles, newspaper in which there is
a lot of information available for farmers which help them in increasing
productivity.
Farmland Assessment
➢ Geographic information systems (gis) are being used for developing ranking systems that
evaluate land and provide a site assessment to aid what is now known as precision
agriculture .These hi-tech, interactive systems provide information based on a variety of
factors such as soil conditions, drainage and slope conditions, soil ph and nutrient status,
etc.
✓ The use of computer technology has revolutionized how we do our banking transactions ,
for example :
➢ Find balance in our account
➢ Change your pin (Personal identification number)
➢ Transfer funds
✓ Many credit cards are equipped with a chip as well as magnetic stripe, this contains
key information such as pin.
✓ Card is inserted into the chip and reader.
✓ The card is checked to see if its valid( expiry date, whether stolen card) ✓ If card is
stolen or expires then the transaction is terminated.
✓ The customer then enters the pin using a key pad
✓ The pin is read from the chip on the card and is compared to the one just keyed in.
✓ If they are the same , then transaction is processed , if different , transaction is
terminated.
✓ A check is then whether there is enough fund, if there are not enough funds transaction
is terminated .Otherwise transaction is authorized.
✓ Authorization code is sent, money is deducted from the customer`s account.
✓ The same amount of money is credited to the shop`s bank account. ✓ A receipt is produced
as proof of purchase.
DEFINITIONS
SOCIAL NETWORKS
Classmates ( http: // www.classmates.com/)-One of the largest and most used websites for
connecting people who graduated from a high school and allows you to keep in touch with
them and any future reunions.
Face book- (https:// www. facebook.com/)-The popular social networking websites on the
internet. Face book is a popular destination for users to set up personal space and connect
with friends , share pictures , share movies , talk about what you are doing , etc. .
LINKEDIN( https:// www. linkedin.com/)- One of the best if not the best location to connect
with current and past co-workers and potentially future employers .
YOU TUBE ( https:// www.youtube.com/)- An excellent network of users posting video blog`s
and other fun and exciting video.
NEWS AND CURRENT EVENTS-By staying up-to-date to news and current event
Internet
Before you start research, you often want to quickly learn about possible issues or topics
of study by searching available source of information . Nearly all academic journals are
available online, and many organized into online data base. Government agencies often have
demographic or economic information online you can use in your research.
INFORMATION STORAGE
Computers store vast amounts of information .You can quickly and efficiently organize and
search information , making for easier retrieval than paper storage. You can store your raw
data in multiple formats. Some research conduct the research online, often through the use of
surveys .
COMMUNICATION TOOLS
COMMUNICATION
3 Data Representation
Binary
➢ Data is represented in 0s and 1s, thus in base 2. It is obtained by dividing the denary number
by 2, taking the remainders only. The number of bits in the answer does not matter unless
specified.
➢ Binary = base 2.
➢ Octal = base 8.
➢ Denary = 10.
➢ Hexadecimal = base 16.
Binary Conversion
This involves converting a number in binary from to either denary (base 10), octal (base 8) or
Hexadecimal (base 16)
(a) Conversion from decimal (denary) to Binary
➢ Divide the denary number by 2, listing the remainders until the answer is 0 remainder 1.
➢ Take the remainders only from the last one until the first. For example:
➢ Add all the equivalent to values in the table, whose binary digit correspond to 1 and add
them.
➢ The result is the denary equivalent.
➢ That is 16 + 4 = 20. This is a short form of (16 x 1) + (4 x1) = 20
LOGIC GATES
✓ A logic gate is a device that produce signals of 1 or 0 when the input logic requirements
are met and are used in manipulating binary information.
✓ A logic gate is a device (or electrical circuit) that performs one or more logical operations
on one or more input signals.
✓ Output represent Boolean (T or F) or binary values (1 or 0) as voltages.
✓ Logic gates are the building blocks of digital technology.
✓ They can be used in applications like:
➢ Building computer chips
➢ Programming traffic signals
➢ Chips for automatic alarm systems
➢ Chips for automated control systems
✓ Electronic circuits operate using binary logic gates.
✓ Logic gates process signals which represent TRUE or FALSE, ON or OFF , 1 or 0
(a) OR gate
➢ This represents two inputs entering the gate and one output from the gate.
➢ The inputs can be represented by any alphabetic characters, e.g. A and B, while the output
can be X, given as follows:
➢ X= A OR B
➢ The output (X) is true if the INPUT A OR INPUT B are true.
➢ Thus if any one of the inputs is 1, the output is automatically 1
➢ Output only becomes 0 if all inputs are 0
✓ The output (X) is only true if the INPUT A AND INPUT B are both true. If any one of the
inputs is 0, then the output becomes 0 also. Thus X = A AND B.
✓ The NOT gate has only one input and one output. The input is negated. Thus if input is 1,
output is 0, and vice versa.
✓ The output (X) is true when the INPUT A is NOT TRUE. The output (X) is False when
the INPUT A is TRUE.
EXAMPLES
TYPES OF NETWORKS
REASONS OF NETWORKING
✓ Many internet games accounts are being played by players all over the world using
common servers these gives fun and enjoyed to people and also improved their
skills.
Types of networks
i. LAN (Local Area Network
A LAN is a privately owned connection of computers on a very small geographical area for
sharing of data and files by users of the network, for example, within a single room. Usually
connected using cables of radio connections.
Hardware Requirements for a LAN
• Network Interface Card (NIC):- Each computer on the network must have this as it allows
computers to be linked and to be uniquely identified on the network.
• Server: - to store software that controls the network, software and files and also data that
can be shared by all users of the network
• Hub or alternatively a Switch:-
A hub is a device that connects workstations together in order to make a LAN. It receives
signal/data from workstations, regenerates it and the sends it to all ports on it. Thus all
workstations connected to it will get the signal or data packets. Hubs are less intelligent, they do
not determine the exact computer the data is addressed to and so they broadcast the signal. This is
a security risk. It is usually used on a star network or on a hybrid network. A hub has many ports
on which cables to all computers on the network are connected.
A switch is a networking device that allows multiple devices and workstations to be connected
to each other on a LAN just as a hub does. However, a switch is more intelligent than a hub. A
switch directs traffic across a LAN, enabling computers to talk to each other and share resources.
It joins computers on a LAN and is found at layer 2 of the OSI reference model. It allows different
nodes on the network to directly communicate with each other. A switch runs in full duplex mode.
It can recognise different devices onthe network using their MAC address so that data and signals
can be send to exact/intended devices. This is more secure than a hub. Switches can be LAN switches
or ATM switches which are used on WANs and MANs.
• Terminals: - these are computers that are connected to each other through a server and
cannot work without the server. Terminals can be dump or intelligent. A dump terminal does not
have neither processing nor storage capabilities and thus wholly depends on the host computer for
it to work. An intelligent terminal has limited processing and or storage capabilities.
• Workstation: - these are the computers connected to the server and are less powerful than
the server
• Cables: - connects computers together and acts as pathway for data moving from one
workstation to another.
• Bridge: - this is a device that connects networks using the same communication protocols.
It is used to connect different parts of a LAN, thus is used to connect different LAN segments
together. However, it cannot handle multiple paths for data. In general a bridge is used for:
WAN refers to connection of computers over a very large geographical area and may cover the
whole world. The internet is part of the WAN. A WAN is created by joining several LANs
together, for example, connecting different branches of a company that are in different provinces
or countries. Computers are usually linked together using fibre optic cables, satellite links,
telephone lines, etc.
Gateways are usually used to bridge the different networks.
Hardware Requirements for a WAN
• Routers: - this is a network device that connect different types of networks together, for
example, connects a school LAN to the internet (which is a WAN). It can route packets of the
same protocol (e.g. TCP/IP) over networks with dissimilar architectures (e.g. Ethernet to token
ring). It receives transmitted messages and forwards them to their correct destinations over the
most efficient available route. A router is used to form complex networks with multiple paths
between network segments (subnets), each subnet and each node on each subnet is assigned a
network address.
A Router is very intelligent. It uses network addresses and IP addresses of other routers to create
routes between two networks. They keep tables of addresses that will be used in routing
information. Routers are thus used for:
✓ Determining the path of data packets using destination addresses of the packets.
✓ Used for packet switching
• Gateway: - a device used to connect different kinds of networks. Thy act as link to
different WANs. A gateway is a device that connects networks with different architectures and
different protocols. When packets arrive at a gateway, the software strips all networking
information from the packet, leaving only the raw data. The gateway translates the data into the
new format and sends it on using the networking protocols of the destination system. Thus it
becomes a protocol converter.
• Modem (Modulator Demodulator):- This is a device that converts digital signal received
from a computer into an analogue signal that can be sent along ordinary telephone lines, and back
to digital at the receiving end. Mostly used to connect to the internet using the ordinary telephone
line. The speed of modems is measured in bits per second e.g. 56K bps. The following parameters
must be specified when a modem is installed:
➢ the telephone number of the ISP
➢ baud rate of modem
➢ number of data bits per block
➢ number of stop bits
➢ whether odd or even parity is used
Cable modems - employ broadband transmission across regular cable television wires.
➢ Only the computer with the token is allowed to send data at a given time. One may not
send data when another node (computer) is still sending its own data.
➢ System is less secure as token together with data has to pass through other nodes that do
not concern it.
2. Star Network:
✓ Computers form a star shape with host computer at the centre.
✓ The Server (host computer) manages all other computers/terminals on the network.
✓ If the terminals are not intelligent, they have to rely on the host computer for everything.
✓ This network is as shown below:
3. Mesh Network
✓ A network in which each computer serves as a relay point for directly sending
information to any other computer on the network.
✓ No central device oversees a mesh network, and no set route is used to pass data
back and forth between computers.
✓ Thus, if any one computer is damaged or temporarily unavailable, information is
dynamically rerouted to other computers—a process known as self-healing
(b) Nodes: these are connection points for workstations and the bus.
(c) Terminator: devices that prevent data in the bus from bouncing back, causing noise and
prevents data from getting lost.
Advantages of Bus network
➢ If one workstation breaks down, others will remain functional.
➢ If one workstation breaks down, the network remains working.
➢ All computers have processing and storage capabilities.
➢ It is cheap to install due to less cabling.
➢ Easy to add workstation without disrupting the network.
➢ Requires less cabling than a star network.
➢ Less expensive network than the other systems
Disadvantages of Bus Network
➢ Computers cannot send data at the same time nor while there is data being transferred in
the bus.
➢ Can cause collision of data during transmission.
➢ It is slow in transferring data.
➢ Its requirements are expensive, that is computers with their own processors and storage
facilities.
➢ The system will be down if the main cable (bus) is disrupted at any point.
➢ Less secure.
➢ Performance worsens as new stations added
NB: Point – to-Point Connection: Point-to-point topology is the simplest connection, consisting
of two connected computers.
E-commerce
✓ The phrase e-commerce is a buzzword which relates to buying or selling via the Internet.
✓ Increasingly you can purchase directly via a Web site by selecting the goods or services
which you require and entering your credit card details.
✓ When you send your credit card details these SH OULD be encrypted by the site operators
so that no one can intercept your details.
✓ Most sites which accept credit card payment are on secure services and your Internet
browser program (i.e. Microsoft Internet Explorer or Netscape Communicator) will
normally inform you (via a popup) when you are entering or leaving a secure server.
✓ There are numerous web sites from where you can purchase online, a famous example
being amazon.com.
✓ Most Internet based shopping sites use a virtual “shopping cart” system.
✓ As you browse the site you can add any products you want to purchase to your cart.
✓ Once you have placed items in the cart you can then move to the checkout stage.
✓ At the checkout you enter your name & address, select the type of delivery you want and
enter your payment details.
Advantages of e-commerce
There are many advantages in using e-commerce:
➢ Services available 24/7
➢ Large stock range
➢ Detailed product information
➢ Ability to compare prices
➢ Right to return defective goods
Disadvantages of e-commerce
➢ Possible credit card fraud ➢ Is the website genuine?
➢ What about returning faulty goods? Be sure you know about a company’s returns policy,
BEFORE you make an online purchase.
E-learning
✓ E-learning refers to learning via the Internet or working through a disk based tutorial.
There are many advantages, but also some disadvantages.
Advantages include:
➢ One trainer can train many people at many different locations.
➢ If the training is solely computer based, then the students can work at their own pace, and
repeat parts of a course which they do not understand.
➢ Also the teaching can be at any time, 24 hours a day, and 7 days a week.
➢ Often e-learning solutions are cheaper to provide than other more traditional teaching
methods.
Disadvantages include:
➢ There may be no opportunity to ask a question of a real person.
NB. When creating an e-mail, one is requested to enter the password twice in order to verify if
it is the one you intend to use.
Mailbox: - An electronic folder used to store electronic mails. It contains the inbox; which
contains incoming mails; and the outbox; which is used to save outgoing messages.
Disadvantages of e-mail
➢ Not everyone has equipment to send e-mails.
➢ Junk mail (spam) is a problem.
➢ You waste a lot of time looking through mails that are just adverts.
➢ E-mails are not as secure as traditional mails.
However, despite the increase in the use of e-mail, there has been a sharp increase in the amount
of paper used. This is because:
➢ People print copies for meetings and then destroy them afterwards, but if needed again,
print out another copy.
➢ Some people find it difficult reading large amounts of text on the screen. People often
e-mail colleagues rather than use the phone who then print out the document.
✓ COMPUTER SECURITY- is the protection of computing systems and the data that they
store or access.
✓ COMPUTER ETHICS-is set of moral principles that regulate the use of computers.
CYBER WELLNESS
ONLINE RELATIONSHIP
✓ Is a relationship between people who have met online, and in many cases they know each
other only via the internet.
Types of relationships
➢ Internet dating.
➢ Cybersex- this include individuals communicating sexually via video or audio.
➢ Social networking relationships.
➢ Online gaming etc.
COPYRIGHT ISSUES
Copyright
✓ Is a legal right created by the law of a country that grants the creator of an original work
exclusive rights for its use and distribution.
✓ Protects tangible or fixed expression of an idea but not the idea itself.
✓ Is automatically assigned when created.
✓ May need to be registered in some countries.
Exists when:
Plagiarism
Piracy
✓ Is the act of using or reproducing a copyrighted or patented material without the owner’s
approval. Such as:
➢ Music downloads and uploads.
➢ Movie downloads and uploads.
➢ Software downloads and uploads.
TIPS AGANST
Plagiarism
Piracy
Plagiarism
Piracy
✓ A collection of components that work together to realize some objectives forms a system.
PROBLEM IDENTIFICATION
Preliminary Investigation
4. Preliminary plan
✓ It consist of all findings in written form for approval.
✓ It is also called feasibility report.
✓ It is normally submitted to the top managers of the organisation.
✓ They may accept, modify or reject the report.
✓ Closed questions are guided questions where the respondent just chooses Yes or
No, True or false, or by just putting a tick on given options.
✓ Questionnaires can be distributed personally or by post.
Advantages of questionnaires
➢ Effective when collecting a lot of data.
➢ Questions are very simple to answer.
➢ It saves time as questionnaires can be distributes and then collected later.
➢ Respondents can fill questionnaires at their own pace.
➢ Give guarantees confidential of information, thereby encouraging respondents to
give accurate information.
➢ They are cheap to use as travel expense can be low.
Disadvantages of questionnaires
➢ Questions must be well thought out and precise.
➢ Some questions are left blank.
➢ Some questionnaires may not be returned. Biased information can be collected.
➢ Respondents usually do not fill the correct information.
➢ It is difficult to analyse information collect using questionnaires.
➢ They are expensive to use if the postal system is used.
➢ Abusive information can be filled by respondents.
4. Observations
✓ It is a fact finding method that involves viewing the actual system in operation by
the researcher.
✓ The researcher can even take part in operating the system.
✓ It is used when the researcher wants to see for himself how the system operates.
Advantages of observations
➢ First-hand information is collected.
➢ May identify problems that the users did not see ➢ Accurate information can be
obtained.
➢ More reliable information is obtained.
➢ Only areas of interest can be observed.
➢ The researcher can take part in operating the system thereby getting insight on
how the system operates.
Disadvantages of observations
➢ People work differently if they feel that they are being observed, therefore
inaccurate information can be collected.
➢ The researcher may not understand some of the activities being observed.
➢ It is time consuming to collect the required information.
➢ The researcher may interrupt some of the activities being done.
➢ More expensive than other methods
ALGORITHM
EXAMPLES OF ALGORITHMS
1. Flowcharts
2. Pseudo codes
SEQUENCE CONSTRUCT
✓ A series of actions one after the other from beginning to the end either from top to bottom
or from left to right or a combination of these movements.
Question: Write a program to accept two numbers, add them and print the two numbers and the
sum.
SOLUTION
Accept number1
Accept number2
EXAMPLE 2
Question: write a program that accept your first name and last name, and display “hello your name
and last name.”
SOLUTION
PRINT (“hello”+firstname+””+lastname+”!”)
PROGRAMMING CONCEPTS
Programming
Program
Syntax
✓ In computer science, the syntax is the set of rules that defines the combinations of symbols
in a programming language.
Semantics
✓ Is the field concerned with the rigorous mathematical study of the meaning of programming
languages.
Constant
Operators
Variable
EXAMPLES OF VARIABLES
Decimal 16 bytes
0 through +/-
79,228,162,514,264,337,593,543,950,335
(+/-7.9...E+28) with no decimal point; 0
through +/-
7.9228162514264337593543950335 with
28 places to the right of the decimal
4.94065645841246544E-324 through
1.79769313486231570E+308, for positive
values
8 bytes on 64-bit
platform
OPERATORS
There are many programming languages one may choose to use when developing systems,
projects or applications in computer science ranging from python, vb.net, c++, c, c#, pascal, java,
android, e.t.c.As stated by your syllabus we will be focusing more on vb.net.
When we want to develop a program using any programming language, we follow a sequence of
steps. These steps are called phases in program development. The program development life cycle
is a set of steps or phases that are used to develop a program in any programming language.
Generally, program development life cycle contains 6 phases, they are as follows….
1. Problem Definition
2. Problem Analysis
3. Algorithm Development
4. Coding & Documentation
5. Testing & Debugging
6. Maintenance
1. Problem Definition
In this phase, we define the problem statement and we decide the boundaries of the problem. In
this phase we need to understand the problem statement, what is our requirement, what should be
the output of the problem solution. These are defined in this first phase of the program
development life cycle.
2. Problem Analysis
In phase 2, we determine the requirements like variables, functions, etc. to solve the problem.
That means we gather the required resources to solve the problem defined in the problem
definition phase. We also determine the bounds of the solution.
3. Algorithm Development
During this phase, we develop a step by step procedure to solve the problem using the specification
given in the previous phase. This phase is very important for program development.
That means we write the solution in step by step statements.
This phase uses a programming language to write or implement actual programming instructions
for the steps defined in the previous phase. In this phase, we construct actual program. That
means we write the program to solve the given problem using programming languages like C,
C++, Java etc.,
During this phase, we check whether the code written in previous step is solving the specified
problem or not. That means we test the program whether it is solving the problem for various
input data values or not. We also test that whether it is providing the desired output or not.
6. Maintenance
During this phase, the program is actively used by the users. If any enhancements found in this
phase, all the phases are to be repeated again to make the enhancements. That means in this
phase, the solution (program) is used by the end user. If the user encounters any problem or
wants any enhancement then we need to repeat all the phases from the starting, so that the
encountered problem is solved or enhancement is added.
9 DATABASE
COMPILED BY ANONYMOUS #NO RISK NO REWARD
COMPUTER SCIENCE BASIC NOTES
Database
File
Field
Record
✓ A collection of related fields describing an entity, e.g patient. Tables
✓ These are equivalent to files and therefore are used to store data.
✓ The data is stored in rows and columns.
✓ Each row in a table is called a record which is made up of a number of fields (columns in
the table).
✓ The data type in the fields is usually either text, numeric or date/time.
✓ Most databases contain a number of tables which are usually linked together in some way.
Forms
✓ Forms are commonly called data entry screens since they are the user interface which
allows data in the tables to be viewed, entered or edited.
✓ Forms permit the control of how other users interact with the information in the database
e.g. only allow certain fields to be seen or only allow certain operations to be carried out.
✓ This subsequently helps the protection of the information and also ensures it is entered
correctly
Reports
✓ The data on report is extracted from queries or tables as per user requirement.
✓ They display certain required data as needed by the user, e.g. after searching or filtering of
data.
✓ Reports can be printed out as hardcopy, or viewed on the screen or exported (e.g. to a word
processor, an email message, etc.).
Queries
✓ Queries are questions that request certain data from tables, e.g, Amount <200.
✓ It can also be an instruction to search data which meets a certain criteria from table and
display it on the screen in form of another table created from the original table.
✓ Most commonly allow information to be retrieved from tables.
✓ They also allow filtering so only the records required are seen.
Macros
DATA TYPES
Numeric
✓ consists of digits 0-9 only (negative or positive), 12, 900, -50, etc
Alphabetic
✓ Consists of letters of the alphabet (a-z, lowercase or uppercase) only, for example a
person’s name, like TINOTENDA. Alphanumeric
✓ Combination of digits and letters of the alphabet, eg. National Identification Number, like
27-134575-C-27.
Text
✓ Combination of digits and letters of the alphabet.
String
✓ Combination of digits and letters of the alphabet Currency
✓ in monetary value, e.g. $10.00 Date/time
✓ shows date and time, e.g. 27/01/1997
Array
✓ An array is a series of elements of the same type placed in contiguous memory locations
that can be individually referenced by adding an index to a unique identifier.
FIELD SIZE
VALIDATION RULES
✓ Validation rules prevent bad data being saved in your database table.
✓ Basically, they look like criteria in a query.
✓ You can create a rule for a field (lower pane of table design), or for the table (in the
properties box in the table design.) use table’s rules to compare fields.
✓ There is one trap to avoid.
✓ In some versions of Access, you will not be able to leave the field blank once you add the
validation rule, i.e. you must enter something that satisfies the rule.
✓ If you need to be able to leave the field blank, add OR IS NULL to your rule.
INPUT MASK
✓ Refers to a string expression, defined by a developer that governs what a user is allowed
to enter in as input in a textbox.
✓ A template, or set format that entered data must conform to, mainly used for the purposes
of data integrity by preventing transcription errors.
PRACTICAL NOTES
10 WEB DESIGN
Web design
✓ It includes the information architecture, user interface, site structure, navigation, layout,
colors, fonts and imagery.
Website
✓ Refers to the central location that contains more than one page. For example school
website.
✓ Collection of related pages.
Web address
✓ Is a reference to a web resource that specifies its location on a computer network and a
mechanism for retrieving it.
Example.
Www subdomain
Paragon / u Directories
HTML
HTML contains or consist of tags that let the browser know what action to perform.
<a>
< br >
< h1 to h6 >
<p>
<u>
<b >
e.g. 1
< Head > < title > my first web page < / title > </Head >
</p >
< / Html>
e.g. 2
<html>
<head>
<title>Contact Us</title>
</head>
<body>
</body>
</html>
11 TECHNO-PRENEURSHIP
Techno- preneurship
✓ It is the process of merging technology prowess and entrepreneurial talent and skills.
INTELLECTUAL CAPITAL
✓ Is the intangible value of a business, covering its people (human capital), and the value
inherent in its relationships (relational capital, and everything that is left when the
employees go home.
➢ Human capital
➢ Organizational capital
➢ Social capital
✓ HUMAN CAPITAL
➢ The skills, knowledge, and experience possessed by an individual or population,
viewed in terms of their value or cost to an organisation or country.
✓ ORGANISATIONAL CAPITAL
➢ The collective know how, beyond the capabilities of individual employees.
✓ SOCIAL CAPITAL
➢ Is a form of economic and cultural capital in which social networks are central,
transactions marked by reciprocity, trust, and cooperation, and market agents
produce goods and services not mainly for themselves, but for a common good.
BUSINESS ETHICS
✓ Is a form applied ethics or professional ethics that examines ethical principles and moral or
ethical problems that arise in a business environment. OR
✓ Is the study of proper business policies and practices regarding potentially controversial
issues, such as corporate governance, insider trading, bribery, discrimination, corporate
social responsibility and fiduciary responsibilities.
ATTRIBUTES OF BUSINESS ETHICS
➢ Honesty. You need to be honest in all your actions, and every communication you make.
➢ Integrity
➢ Keeping your promises
➢ Loyalty
➢ Fair
➢ Caring
➢ Respect
➢ Obeying the law
Marketing Strategy
✓ Is a process that can allow an organisation to concentrate its limited resources on the
greatest opportunities to increase sales and achieve a sustainable competitive advantage.
Business strategy
THE END…………………………………………………………………………………………