Form Five Notes
Form Five Notes
WRITTEN BY
MR. TAKU ARREY CLOVETTE (MR.T-K)
EMAIL: takuarrey9@gmail.com
Page 1 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
INSTRUCTIONAL ACTIVITIES
It is an educational task designed to promote learning and transfer of knowledge. These activities are integral parts of
lessons are used by teachers to facilitate active learning, reinforce concepts, and assess students’ understanding.
Anonymous Questioning: questions come from learners.
Brainstorming: idea-generation process and exploration.
Case Study: learners are given a situation and asked to analyze it and present recommendations.
Critique: learners are asked to analyze the weaknesses and strengths of a process and make suggestions for
improvements
Demonstration: learners observe the performance of a task or procedure as conducted by an expert.
Discussion: exchange of ideas between facilitator and learners
OBJECTIVES
Identify the different parts of a lesson preparation sheet form.
Propose appropriate content for each field in the lesson preparation sheet form.
Evaluate the structure of a problem situation.
This book comprises of form five summarized notes and past questions; instructions or activities are outline on how
students can approach the tasks and engage in meaning learning experiences.
FOCUS
Problem solving: applying knowledge to solve problems. Engaging in exposes and defend exercises
Integration: combining different knowledge, skills and attitudes to solve problems.
ABOUT CHAPTERS AND LESSONS
This notebook focusses more on the class lessons which also indicates the chapters in accordance syllabus.
Page 2 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
TABLE OF CONTENT
Page 3 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Page 4 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Advantages of CBISs:
➢ Many people can access information at the same time through a network.
➢ Large filling cabinet is replaced by the computer’s large storage capacity.
➢ Save time, resources and money by processing information automatically,
➢ Facilitate communication and resource sharing to multiple users over a network.
➢ Provide fast and accurate information to support decision making.
➢ Improve productivity.
➢ Reduces duplication of information.
Disadvantages of CBISs:
➢ Security is needed to protect data/information.
➢ To use the system, the user has to be trained.
➢ Computers hold personal information which may be misused.
➢ Expensive to develop.
➢ If system crashes, all data/information can be lost.
Page 5 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
An organization is a social unit of people that is structured and managed to meet a need or to pursue collective
goals.
a. Characteristics of an Organization
➢ It has a well-defined authority.
➢ It has a co-operative relationship.
➢ It has specific objectives.
➢ Division of activities and functions.
➢ It has a distinct identity.
➢ It employs some form of leadership.
b. Functions of an Organization
A good organization has to fulfill some functions which are:
➢ It must enable the management to maximize the outputs through provision of an efficient man-machine
system.
➢ It must ensure smooth and effective network of communication and information.
➢ It must offer interesting and meaningful jobs to all individuals working in the organizations.
➢ It must create, maintain and develop its own image or individuality.
Page 6 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
d. Information in an organization
It can be internal, external, objective or subjective. These are also called attributes of information in an
organization.
➢ Internal information: it will describe specific operational aspects of the organization.
➢ External information: it describes the environment surrounding an organization.
➢ Objective information: it describes something that is known.
➢ Subjective information: it attempts to describe something that is currently not known.
In operational level, information flow is primarily vertical upward, from the supervisors to middle management or
tactical management level.
In middle management, information flow is vertically upward to top management and downward to operational level,
horizontal across different unit managers.
In top management, information flow is vertically downward as strategies tactical management, upward to reach external
partners and horizontal amongst members of top management.
Strategic level
Strategic
Tactical level
Strategic
Operational level
Strategic
Page 7 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Page 8 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Characteristics of EIS:
• Are concerned with ease of use.
• Are concerned with predicting the future.
• Are effectiveness oriented.
• Are highly flexible.
• Support unstructured decisions.
• Use internal and external data sources.
• Used only at the most senior management levels.
Design Components:
o Database: Stores information about books (book title, author, ISBN), borrowers (name, ID), and
borrowing transactions (book borrowed, return date).
o User Interface: Interfaces for librarians and users to search for books, manage borrowing, and view
available resources.
o Modules:
▪ Borrowing and returning books.
▪ Adding new books to the system.
▪ Searching and managing user accounts.
Diagram:
Figure 4 ER diagram
Objective: Manage customer information and interactions to improve service and retention.
Design Components:
Page 9 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
• User Interface: Provides interfaces for sales reps, customer service agents, and managers to view and update
customer information.
• Modules:
o Customer records management.
o Interaction tracking (e.g., emails, phone calls).
o Sales pipeline management.
o Reporting and analytics for customer insights.
Diagram:
For simplicity, let's use the Library Management System as an example to demonstrate how a DBMS is applied. A
DBMS for a library might store and manage information about books, borrowers, and transactions.
An ER Diagram represents the data structure in a DBMS by showing the entities and their relationships.
Page 10 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
• USER: Represents the library members who interact with the system.
• BOOK: Represents the books in the library, each with attributes like Title, Author, and ISBN.
• BORROWER: Represents the individuals who borrow books from the library.
• TRANSACTION: Represents the borrowing and returning activities, linking both books and borrowers.
In this diagram:
In a relational database, data is stored in tables (relations) with rows and columns. Let’s map the ER Diagram into a
Relational Model using tables.
2. Book Table
Page 11 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
3. Borrower Table
4. Transaction Table
In a Relational DBMS, each table is related through primary keys (e.g., UserID, BookID, BorrowerID), which are
unique identifiers, and foreign keys (e.g., BorrowerID, BookID) in the Transaction table that establish
relationships between tables.
• Can speed things up or slow them down to see the changes over long or short periods of time.
2. Control systems
A control system is a set of hardware and software that’s used to regulate the operation of a system such that if new
data is outside acceptable range the output from the system affects the next set of inputs. Control systems seek to
actively maintain or change the state of a system through the use of actuators. There are two basic types of control
systems:
➢ Dedicated control systems: They are basic systems that carry out a pre-programmed set of instructions.
For example, traffic light system where the lights change at fixed time intervals.
➢ Computer-controlled systems: These systems use a computer to control the output device and this
computer can be connected to a sensor making the system more flexible.
Some examples of control systems include:
➢ Turning street lights on at night and turning them off again during daylight.
➢ Regulating the temperature in a central heating/air conditioning system.
➢ Changing the traffic light at a road junction.
➢ Operating anti-lock brakes on a car when necessary.
➢ Regulating the environment in a greenhouse.
Page 13 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Other type of control system is the Numeric Control System (NC) which refers to the automation of machine tools
that are operated by programmed commands encoded on a storage medium as opposed to manually controlled via
hand wheels or levers or mechanically automated.
➢ Creating a logical model of the new system and specifying the objectives for the new system;
➢ Specifying the input, processing and output of the new system;
➢ Preparing a plan for implementing the new system;
➢ Specifying the performance criteria of the new system.
c. Design phase
The system design phase involves generating several alternatives technical solutions for the new logical model.
Activities in this phase are:
➢ selecting the best technical alternative;
➢ developing detailed software specifications and again reviewing the project plan;
➢ creating detailed physical model.
d. Development phase
The goal of the system development is to actually create the new system which involves a number of tasks including
acquiring and installing new hardware, writing software, testing software and reviewing project plans. Most of the
efforts deployed in SDLC are devoted to this phase.
➢ Writing software requires that programmers use the software specifications and a programming language or tool
to actually create the working software.
➢ Testing software will employ testing techniques such as: integration testing, acceptance testing and beta testing.
• Integration testing is to test to see if everyone in the organization is able to use the part of the software
developed for the functioning of the IS.
• Acceptance testing is a formal documented process in which users use the new system, verify that it
works correctly under operational conditions and note any errors that needs to be fixed.
• Beta testing is a form of testing involving a limited audience of external users.
e. Implementation
The system implementation phase involves training users, converting existing information to the new system,
converting users, carrying out acceptance testing, and reviewing the project plan.
The project team installs the new software on the new hardware, trains all users on how to use the software, and
goes through a process of acceptance testing.
Conversion: This is the act of moving from the old way of doing things to the new system. Four conversion methods
in common include;
➢ Parallel conversion: Both the old and new systems are allowed to run until it’s sure the new system works
correctly. Though it delays final handover, it is the safest as it allows for gradual change over. It is expensive in
terms of time, money and resources.
➢ Plunge conversion (direct): Here, the old system is unplugged and the new system is used exclusively. It
carries relatively a high risk. However, it may be the option for a system commissioned from scratch or where
resources are limited.
➢ Pilot conversion: Only a selected group of users are targeted to convert to the new system before converting
everyone.
➢ Piecemeal: Here, only a porting of the new system is allowed to run and when it works correctly, the remaining
system is then converted.
f. Support and maintenance
During system support:
➢ The organization provides a formal mechanism for the periodic review of the system.
➢ The users of the system may suggest changes that need to be made.
➢ The organization must evaluate the changes and determine which to undertake.
3. Some popular SDLC Models
There is no one single SDLC model. They are divided into main groups, each with its features and weaknesses.
➢ Waterfall model: It is a breakdown of activities into linear sequential phases, where each phase depends on the
deliverables of the previous one and corresponds to a specialization of task.
Page 15 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
➢ Iterative model: It is a particular implementation of SDLC that focuses on an initial simplified implementation
and iteratively enhances the evolving versions until the complete system is implemented and ready to be
deployed
➢ V-shape model: It represents a development process that may be considered as an extension of the waterfall
model. Instead of moving down in a linear way, the process steps are bent upwards to form a typical V shape.
➢ Prototyping: It is a model in which a prototype is built, tested and then reworked as necessary until an
acceptable outcome is achieve from which the complete system or product can be developed.
2.Data capture
Data capture refers to the process of getting data into a format that can be processed by a computer. Paper-based
data capture and computerized data entry are data techniques used to get data in the format for processing.
In paper-based data capture, people fill forms with information such as their personal details for example; name,
address, telephone number, date of birth, etc.
In computerized data entry, answers from questions are typed directly into the computer and stored in the appropriate
database.
While manual data capture techniques usually use forms, automated data capture method uses automated data
capture devices such as: Barcode reader, Magnetic Ink Character Reader (MICR), Optical Mark Reader (OMR), Optical
Character Recognition (OCR), Sensors, etc.
Page 16 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Character Character checks make sure that the right types of characters have been entered.
Types check Type checks are used to check that the correct type of data has been entered in a field.
E.g. number instead of text and vice versa.
Check digits A digit check is usually placed at the end of an original number. E.g. bank account
number.
Range check Checks if a number lies within a specific range. E.g. >=60.
Length check Some item of information is always of a certain length containing a specified number of
characters. E.g. the registration number of a public service worker in Cameroon always
have eight characters like 955437-P.
Parity check A parity check is used to make sure that data has not been corrupted during transmission.
Even number, even parity. Odd number, odd parity.
Presence When entering data I nto a database the completion of some fields may be optional. E.g.
check certain fields like telephone number may be optional. There are certain fields which must
contain data and the system may come to a halt if left blank.
Page 17 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
2. What is a database?
A database refers to a collection of logically related information organized so that it can be easily accessible,
managed, and updated. Databases are generally accessed electronically from a computer system and are usually
controlled by a database management system. (DBMS). The database administrator (DBA) is the individual
responsible for managing the databases, including database security, access control, backup, and disaster recovery.
a. Types of database in an organization
➢ Operational: store detailed data needed to support the business processes and operations of a company.
➢ Distributed: databases that are replicated and distributed in whole or in part to network servers at a variety of
sites.
➢ External: refer to databases external to an organization and generally accessed over the internet and owned by
other organizations.
➢ Internal: typically include operational databases and data warehouse
Data warehouses contain data collected from several sources, and the data contained within are generally not used for
routine activities. Instead, data warehouse are usually used for business intelligence purposes.
Page 18 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
b. Components of a Database
The five major components of a database are:
➢ Hardware: refers to physical, electronic devices such as computers and hard disks
➢ Software: refer to set programs used to manage and control the database and includes the database software,
operating system, network software.
➢ Data: refer to raw facts and information that need to be organized and processed to make it more meaningful.
➢ Procedures: refer to instruction used in the DBMS and encompass everything from instructions to setup and
install, login and logout.
➢ Database Access Language: It is a language used to write commands to access, update and delete data stored
in a database.
Remark:
In Traditional file processing, data were organized, stored, and processed in independent files of data records.
Some problems of traditional file processing are:
➢ Data Redundancy: duplicate data requires an update to be made to all files storing that data.
➢ Lack of Data Integration: data stored in separate files require special programs for output making ad hoc
reporting difficult.
➢ Data Dependence: programs must include information about how the data is stored so a change in storage
format requires a change in programs.
Note: Data mining refers to the process of analyzing massive volumes of data from different angles in order to identity
relationships between data and transforms them into actionable information.
Page 19 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
➢ Database Administrator: These are scientist responsible for the development of an organizations database
making sure all the data is accurate, available and secure. They design, install, update, modify, maintain,
and repair computer databases.
➢ IT Consultant: These are those who undertake strategic or operational missions, they help a client in
implementation; they help develop or roll out a prototype or software to respond to a specific need.
➢ Web developer: A web developer is a programmer who is specialized in the development of web
applications and network applications that are run over HTTP (Hypertext Transfer Protocol) from a web
server to a web browser. They are found working in large corporations and government agencies, small and
medium size companies or alone as freelancers.
➢ Mobile Application Developer: They main responsibility is to develop and create apps for iOS and
Android systems, etc.
➢ System Analyst: Design IT solutions and existing systems to improve business efficiency and productivity.
➢ Cloud Architect: It is an IT specialist who develops a company’s computing strategy. This strategy
incorporates cloud application plans, cloud application design as well as cloud management and monitoring.
➢ Information specialist: They are responsible for analyzing and managing a company’s information
databases, such as filing, record-keeping, or stocktaking. They specialize in streamlining company
processes, disseminating information to personnel, clients, and shareholders, as well as preparing annual
data summary reports for management review.
b. Communication industry.
The integration of computers & telecommunication facilities has made the transmission and reception of messages
very fast and efficient.
➢ They are used in telephone exchanges to switch incoming & outgoing calls.
➢ For sending & receiving electronic messages, e.g. fax and e-mails, if connected to a computer network.
c. Transport industry.
Computers are used in:
➢ Automobile traffic control, e.g., to monitor vehicle traffic in a busy town.
➢ Railway corporations to co-ordinate the movement of their goods & wagons.
➢ Airports (Airline industry). The computers are used;
➢ To control the movement of aircrafts, take off & landing through the use of radar equipment.
➢ Making reservations (booking purposes).
➢ Storing flight information.
d. Library services
Computers can be used in a library:
➢ To enable the library personnel to easily access & keep updated records of books and other library
materials.
➢ To search for book titles instead of using the manual card catalogue.
Page 21 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
➢ Employment: The emergence of computers has provided employment opportunities to very many people.
h. Government Institutions.
Computers play an important role in government. Some major fields in this category are:
➢ Budgets;
➢ Sales tax department;
➢ Income tax department;
➢ Male/Female ratio;
➢ Computerization of voters lists;
➢ Computerization of driving licensing system;
➢ E-citizen online services;
➢ Weather forecasting.
i. Health Care
Computers have become important part in hospitals, labs, and dispensaries. The computers are being used in hospitals
to:
➢ Keep the record of patients and medicines.
➢ Scanning and diagnosing different diseases.
➢ To control life-supporting machines in the Intensive Care Units (ICU).
➢ To enable medical experts in different countries to share their expertise or labor, thus reducing the
transportation of patients & professionals.
➢ Diagnostic System: Computers are used to collect data and identify cause of illness.
➢ Lab-diagnostic System: All tests can be done and reports are prepared by computer.
➢ Surgery: Nowadays, computers are also used in performing surgery.
j. Banks/Insurance industries
Computers are used by Banks & Insurance industries:
➢ To manage financial transactions. They use special cash dispensing machines called Automated Teller
Machines (ATMs) to enable them provide cash deposit & withdrawal services.
➢ For processing of Cheques.
Page 22 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Symptoms may be felt during typing, when using a mouse, or at other times when no work with the hands is being
performed especially at night when these symptoms might awaken you.
The main risks associated with using the computer include the following;
➢ Musculoskeletal Problems: These are general problems that range from general aches and pain to more
serious problems like upper limb disorders, back and neck pain and discomfort, tension, stress and
headaches.
➢ Repetitive stress injury (RSI), which occurs when muscle groups are forced through repetitive actions
often with high-impact loads or tens of thousands of repetitions under low-impact loads (working at a
computer keyboard)
➢ Computer vision syndrome (CVS) refers to any eyestrain condition related to display screen use in
desktop computers, laptops, e-readers, smartphones, and handheld video games.
Symptoms include headaches, blurred vision, and dry and irritated eyes.
➢ Carpal tunnel syndrome (CTS), in which pressure on the median nerve through the wrist’s bony
structure, called a carpel tunnel, produces pain.
Symptoms include numbness, shooting pain, inability to grasp objects, and tingling.
Problems and Possible Remedies for Visual Display Unit (VDU) Users
The VDU or the screen is known to be the main equipment that creates a lot of health problems to its users. Below are
some problems and their possible remedies.
Page 23 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
1. Eyestrain caused by glare and -Avoid setting up your VDU in a brightly lit area where light reflects on the
reflection from the screen. screen.
- Do not look directly at windows or bright lights.
- Use an anti-glare screen filter.
2. Stress caused by boredom and - Vary your activity.
slow computer response time.
2. Safety Precautions
The following are guides to be respected when using your computer:
➢ Set up or connect your equipment according to the instructions provided by the supplier or manufacturer.
For example, always be sure that the computer is switched off and disconnected from the main electrical
supply once you have stopped working on.
➢ Make sure that your working room has sufficient light.
➢ Fit in your devices and CD-ROMs correctly because that which is wrongly fitted may vibrate and get
destroyed.
➢ It is important to look away from the screen from time to time and focus your eyes on a distant object to
avoid eye strain.
➢ Before you start working, do the following;
• Adjust the position of the screen, the keyboard, the mouse and the documents you are working with
so as to sit comfortably.
• Keep your upper body as relaxed as possible and don’t over stretch your wrists and fingers. As a
general guide, your forearm should be roughly horizontal and your elbows level with the keyboard
or the mouse.
• If your feet don’t reach the floor when you are sitting in a good position, try to use a foot rest.
• Use a document holder when typing from a manuscript.
➢ Make alternating work tasks. That means that after a short while on the computer leave it and do other
things.
➢ Regularly stretch up to relax your body.
➢ Avoid gripping your mouse too tightly (hold your mouse lightly and click gently).
➢ Be familiar with keyboard short cuts for applications you regularly use to avoid over using the mouse.
➢ Your chair should:
• Support the back,
• Allow chair height to be adjusted from a sitting position,
• Be 18 to 30 inches away from the screen when you are seated.
➢ Your table or desk should:
• Provide sufficient leg room and preferably be height adjustable,
• Have enough room to support the computer equipment and space for documents,
• Be at least 900mm deep,
• Have rounded corners and edges.
➢ To avoid eyestrain take the following precautions;
• Exercise your eyes periodically focusing on objects at different distances,
• Blink regularly,
• Position the monitor to avoid glare,
• Keep your monitor clean,
• Service, repair or replace monitor that flicker.
Page 24 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Note: To ensure about electrical safety, do not be tempted to add too many extension cables to your existing electrical
sockets.
CHAPTER 8: DATABASES
Introduction
Organizations work on vast amount of data and information on daily bases thus, there is need for data and information
to be organized logically. These data may not make meaning if not organized into an appropriate structure. A database
is application software for such a task and is one of the core/main parts of most/all applications/software in use today.
A database is a structured collection of data in a computer system which allows for arranging, modifying, and
extracting information easily in different logical orders. It is a tool that stores data, and lets you create, read, update,
and delete the data in some manner. The management of these data can be computerized or not.
A computerized database is a database that stores and manages its data by the use of application software called
database management system (DBMS) in the computer.
A non-computerized computer is a database that files are grouped in folders or envelops and stored in drawers or
filing cabinets. Both types of database have advantages and disadvantages. An advantage for one is probably a
disadvantage to the others.
Note: Data are raw facts that have no meaning. It needs treatment (processing) to become useful (information).
This table is made up of six fields (columns) i.e. serial number, registration number, surname, first name, sex and
class and four records (rows).
1. A table is the database object that contains the basic data or information to be stored about an entity of the
database. For example, the registration of students in a school form a database called student table which is a
database entity.
2. A field or (attribute) represents one related column of a table and is the smallest logical structure of storage
in a database. It holds one piece of information about an entity or a subject represented by the table. For
example, in the above table we have the following fields; registration no, surname, firstname, sex, and class.
3. A record or tuple is a collection of multiple related fields that can be treated as a unit or a record is a row of
the table for a database which contains a collection of attributes related to an entity (such as student or a
person) of the database. For example, information from the field’s registration no, surname, firstname, sex,
and class for a particular student form a record.
Page 25 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
4. A query is the database tool that allows to retrieve information from one or more tables based on a set of
search conditions you define using the table fields. Queries are covered in more details later.
5. Forms are Access tools that users can create to make data entry in database tables easier. Entering data
directly into a table can be difficult if there is a lot of information to enter. Like an Excel spreadsheet, an
Access table is essentially a screen filled with blank rows where a user enters records. Forms, however,
provide users with an easy-to-read interface where they can enter table data.
6. Reports: It is an effective tool that gives you way to analyse and present data using a specific layout. The
text can be formatted in an Access report, just like it can be in Word documents.
7. Key field or Primary Key: it is a field or a collection of fields in a database whose value can be used to
distinguish one record from another. E.g. in the table above, registration no. can be used as the key field.
8. Foreign Key: a foreign key is a column or group of columns in a relational database table that provides link
between data in two tables. It acts as a cross-reference between tables because it references the primary key of
another table thereby establishing a link between them.
NOTE: a primary key is always distinguish from the other key by a (*) on it or is underlined.
9. Entity: it is a single data item; persons, things, places or events (a table’s name).
NB: Typical data is logically organized as follows; characters, fields, records, files and database.
• Characters are the most basic logical data elements.
• File is a collection of related records. E.g. a table can be referred to as a file.
3. Database Applications
Databases are widely use because it forms an essential part of almost all organizations/software’s/enterprises today.
Here are some representative applications: Banking, Universities/schools, Business, Manufacturing, organizations,
enterprises, government, hospitals, Facebook, Google, Twitter, etc.
Page 26 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Remark:
A database file that consists of a single data table is called a flat-file database. Flat-file databases are useful for
certain single user or small group situations, especially for maintaining lists such as address list or inventories. Data
that is stored, managed, and manipulated in a spreadsheet is similar to a flat-file database.
5. Database models
A database model is a type of data model that determines the logical structure of a database. It fundamentally
determines in which manner data can be stored, organized and manipulate. The most popular example of database
model is the relational model which uses a table-based format. Other examples of database models include: flat file
model, hierarchical model, object-oriented model, network model, Entity-relation model and multi-dimensional
model.
i. Example of ER model:
In the ER diagram shown above the two entities are STUDENT and CLASS. Two simple attributes which are associated
with the STUDENT are Roll number and the name. The attributes associated with the entity CLASS are Subject Name
and Hall Number. The relationship between the two entities STUDENT and CLASS is Attends.
Exercise:
Page 27 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
B. Relational Model
The relational model is a lower-level model. It uses a collection of tables to represent both data and the relationships
among the data. Its conceptual simplicity has led to its widespread adoption; today a vast majority of database
products are based on the relational model. Designers often formulate database schema design by first modeling data
at a high level, using the E-R model, and then translating it into the relational model.
Page 28 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
The software used in a relational database is called a relational database management system (RDBMS). The
relational model is based on the mathematical concept of a relation, which is physically represented as a table.
Note: Referential integrity: It a property of a relational database that enforces valid relationships between tables
such that no foreign key can contain a value that does match a primary key in the corresponding linked table.
i. Terminology
There are different set of terms used to designate the tables, the columns and rows of the relational model. The
following table summarized it.
Page 29 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Data dictionary is a collection of descriptive information about data and objects in a database i.e. a computerized-
base catalogue or directory containing metadata that is data about data. It contains a list of all tables in the database, the
number of records in each table, and the names and types of each field.
6. Database Management Systems (DBMS)
A DBMS is software that is used to create, modify, and extract information from a database. The main idea with a
DBMS is that all the data is kept centrally and only authorized users can have access to data through the DBMS.
A DBMS is a general-purpose software i.e. not application specific. A DBMS consists of:
➢ A part for collection of interrelated and persistent data. This part of DBMS is referred to as database (DB).
➢ A set of application programs used to access, update, and managing data. This part constitutes the
management system (MS).
A. Features of a DBMS
The features of a DBMS are as follows:
1. Queries: to extract data in the database using language like the Structured Query Language (SQL);
2. forms, reports; (see section 1 for definition)
3. Models define rules and standards for all data in the database
4. Data mining has to do with using software to search through data from many sources looking for
connections.
Examples of DBMS are: Oracle, Postgres SQL, Sybase, MySQL, Microsoft Access, SQL, DB2, Open Office Base,
etc.
B. Database languages
A particular language that has emerged from the development of the relational model is the Structured Query
Language (SQL). Over the last few years, SQL has become the standard relational database language.
❖ Objectives of SQL
Ideally, a database language should allow a user to:
➢ Create the database and relation structures,
➢Perform basic data management tasks, such as the insertion, modification, and deletion of data from the
relations,
➢Perform both simple and complex queries.
❖ Data-Definition Language:
We specify a database schema by a set of definitions expressed by a special language called a Data-Definition
Language (DDL). DDL defines the database structure and controls access to the data.
❖ Data-Manipulation Language:
Page 30 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
A data-manipulation language (DML) is a language that enables users to access or manipulate data as organized by
the appropriate data model. Its functions are:
➢ The selection or retrieval of information stored in or from a table;
➢ The insertion of new information into a table;
➢ The deletion of information from a table;
➢ The updating or modification of information stored in a table;
EXERCISES
A database of students is to be set up with the following fields:
FamilyName, OtherName, StudentID, DateOfBirth, DateOfEntry, CurrentClass, CurrentSchoolYear, EmailAddress.
➢ Select a data type for each field.
➢ Which fields should be validated and which fields should be verified?
➢ Decide the validation rules for those fields which should be validated.
➢ Which field is best for the primary key?
➢ Choose a suitable format for the StudentID.
➢ Build a database with at least 10 records. Include all your validation checks.
➢ Run a query to print OtherNames, FamilyName, and EmailAddress in alphabetical order of family name.
➢ Run a query to print OtherNames, FamilyName, and EmailAddress in alphabetical order of family name.
➢ Run a query to select all the students of class four with their StudentID.
1. Definitions
A project is a planned process to achieve a specific objective through a well-defined set of activities, budget and time
frame.
Project Management (PM) is a combination of techniques, procedures, people, and systems focused on the
successful completion of a project. It is also a discipline that will support the planning, implementation, tracking, and
control of projects.
Project management program permits the user to identify tasks, task relationships, resources, and time requirements of
a project. The constraints of a PM are: Scope, Time and Budget. The forth constraint is Quality which is the core of
each and every project.
Page 31 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
➢ Resources (types: budget, people, and material & facilities) are efficiently allocated for activities in the
various project phases.
➢ Project is aimed at satisfying the customers.
➢ Created once and must be sustainable.
A. A project team
It is a group of professionals committed to achieving common objectives, who work well together and who relate
directly and openly with one another to get things done i.e. action performed by a team towards a common goal. A
team consists of more than one person each of whom typically has different responsibilities and they success is the
responsibility of all the members.
Team working is the fuel that allows common people to attain uncommon results. Recent development in
management jargon outlines TEAM as TOGETHER EVERYONE ACHIVES MORE.
Characteristics of effective teams consist of members who have:
➢ A common purpose and clear goals;
Page 32 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
❖ Benefits of teamwork
➢ Maximize strength of each member;
➢ Increase in productivity and product quality and also decrease in the cost of production;
➢ A balance work load as each member can help each other;
➢ Can blame your teammate if the project goes bad;
➢ Encouragement of skills, knowledge sharing and fast learning;
➢ Education of group members on tolerance and understanding.
❖ Disadvantages of teamwork
➢ Never gets enough credit when the project goes well;
➢ Not all members will have the same strengths and weaknesses;
➢ Tasks/work not undertaken on time by some members can let the team down;
➢ Conflicts in ideas can cause tensions and personality clashes can cause issues too;
➢ Opposing views can cause arguments.
B. Project Management Life Cycle (PMLC)
These are the sequence of steps or phases to be completed when implementing a project and are not a linear process.
In each phase are the project activities that are carried out.
a. Project conception and Initiation:
At this phase the idea is carefully examined to determine whether or not it benefits the organization and a decision
making then decides if the project is feasible. The project manager works with the business sponsor or the manager who
wants the project implemented and other stakeholders. The following are examined in this phase:
➢ Analyzing the business needs/requirements in measurable goals.
➢ Stakeholder analysis including users and support from personnel for the project.
➢ Financial analysis of the cost and benefits including a budget.
➢ Project charter (contract) including cost, tasks, deliverable, and schedules.
b. Planning and design:
At this stage all project activities and plan charter may be put in writing outlining the work to be performed. It consists
of the following sub-stages:
➢ Determining how to plan.
➢ Estimate the resource requirements for the activities.
➢ Identifying deliverables and creating the work breakdown structure
➢ Select the planning team
➢ Risk planning.
c. Execution and construction:
In this phase, the project manager knows how many resources and how much budget is needed to work the project.
The project manager then assigns those resources and allocates budget to various tasks and all the teams are informed
of responsibilities. It involves the following process:
➢ Coordinating people and resources.
➢ Integrating project activities.
➢ Performing the project activities in accordance with the project management plan.
Page 33 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Initiating
Planning
Monitoring and
Executing
Controlling
Closing
Page 34 of 129
WRITTEN BY MR.TAKU ARREY CLOVETTE (MR.TK) 671085471
35
➢ Critical task: a task that must be completed on schedule for the project to finish on time.
➢ Path: a set of sequentially connected activities in a project.
➢ Critical path: a critical path is a series of tasks that must be completed on time for a project to finish on schedule.
Each task on a critical path is a critical task.
➢ Lag: describes a delay in the link between a predecessor and a successor task. It tells the logical relationship between
the start and or finish of one activity and the start and or finish of a following activity.
➢ Lag time: it is the amount of time delay between the completion of one task and the start of its successor task. A
negative value against a lag is known as a lead.
➢ Slack time: it is the amount of time an activity can be delayed from its early start without delaying the project finish
date. Also known as float time.
➢ Floating task: a task that can be performed earlier or later in the schedule without affecting the project duration.
➢ Lead: a lead is observed when a task that should theoretically wait for its predecessor to finish starts a little earlier.
➢ Lead time: it the time that a successor is allowed to start before its predecessor goes to completion.
➢ Duration (D): it is the number of days (or hours) it will take to complete a task.
➢ Early Finish date (EF): this is the earliest date that a task can be completed. The EF duration of the last task(s) is the
total duration of the project.
For any one task, EF = ES + Duration.
➢ Early Start date (ES): is the earliest date on which a given task can start.
➢ Effort: it is the number of labor units required to complete an activity or other project element.
➢ Free Float or Slack Time (FF) or (ST): the amount of time an activity can be delayed without delaying the ES date
of any immediate successor activity. It can be calculated as follows:
FF = LS – ES or FF = LF - EF
➢ Late Finish date (LF): is the last date a task can be completed without delaying the project. Equals the EF of the last
task(s).
➢ Late Start date (LS): is the last date a task can be start without delaying the project. Calculated as follows: LS = LF
– Duration.
➢ Dependency: a dependency between two tasks says that these two tasks are linked. The most common kind of
dependency is finish-to-start. This means that task A must be finished before task B can start.
➢ Fast tracking: it is performing more critical activities in parallel.
➢ Risk: it is an event which has a probability of happening and whose effect may adversely impact the project.
➢ Forward pass: is a calculation performed on each task determining its early start date and early finish date.
➢ Backward pass: is a second calculation for each task on the project starting on the project finish date and working
backwards to the first task. It calculates the late finish date and late start date of each task.
➢ Total project duration: it is the length of time the whole project will take, all tasks start to finish as calculated by the
forward pass. It equals the length of the critical path.
➢ Project finish date: is the number of days a project will finish.
➢ Milestone: a significant event in the project usually the completion of a major component.
Example 1:
The following table shows the expected duration of each task. The task dependencies are shown.
Page 36 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
The network diagram is based on the tasks and their dependencies (predecessor tasks). Task A has no predecessor, and therefore
starts the project on the left. Task B has only task A as a predecessor, and is therefore the next task. The diagram shows that tasks
Page 37 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
D, E and H (writing test plans, code and manuals) all have task C (specification) as a predecessor, and can therefore be carried
out simultaneously.
Identify the critical path: The critical path is determined by using the estimated times to work out the earliest start (ES) and
finish (EF) times (forward pass), and latest start (LS) and finish (LF) times (backward pass), and identifying the tasks where ES
and LS are equal.
Step1: Forward pass.
This is done by working from left to right across the chart. The ES of task A is week 0, and the EF is 6 since this is the ES plus
the duration (estimated time). The earliest that task B can begin is week 6 (since task A must be complete) so its ES is 6, and EF
is 6 + 3 = 9. Note that task G has an ES of 27 because it is dependent on both task D and task F being complete first, and the
earliest that both tasks will be completed is week 27.
b. Gantt chart
A Gantt chart is a graphic display of a schedule that helps to plan, coordinate, and track specific tasks in a project. It was
developed in 1918 by H.L. Gantt. In a Gantt chart, activities are listed down the left side of the chart, dates are shown across the
top, and planned activity durations are shown on horizontal bars.
It is a tool which enables project managers organizes time, people, equipment, and money. Allows managers to monitor the
progress of a project and ensures the right people and equipment are in the right place and the right time. It can be created using
Spreadsheet.
The time relation of all tasks to each other (for example, tasks carried out simultaneously) is therefore clearly apparent in a Gantt
chart. Unlike PERT charts, GANTT charts do not show the critical path, however, dependencies between tasks can be indicated
by lines linking tasks.
Page 38 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Page 39 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Task 1 has no predecessors, and can thus start on 12 June. The Gantt chart shows the task as a box starting on 12 June and
finishing on 13 June on the horizontal access. Task 2 requires Task 1 to be completed, and the duration is three days, so the box
covers the dates 14 to 16 June. The line from the finish of Task 1 to the start of Task 2 indicates the dependency. Note that Tasks
4, 5 and 8 all require Task 3 to be completed, and have no other dependencies, so these all start on the same date. The chart below
show all seven days of the week, but often, weekend days are excluded.
Computers are digital devices (don‘t have fingers) so uses two states either ‗0‘ or ‗1‘, ON or OFF, True or False,
High or Low. A computer can understand the positional number system where there are only a few symbols called
digits and these digits (symbols) represent different values depending on the position they occupy in the number.
Definitions
Number system: it is a set of symbols and rules used to represent numbers in a certain base.
Base: the number of different symbols used in a given number system is known as the base or radix of the number
system. The largest value of a symbol (digit) in a given number system is always less than the base or radix of that
system. If the base of a system is represented by “b”, then the largest value a digit in that system can assume or have
is “b-1”.
Binary digit: it is a made up of “0” or “1”. The short form of Binary digit is BIT. Computers deal with numbers in groups
of bits usually a length that is the power of 2.
For example, a digit is called a bit, Bits are commonly stored and manipulated in groups of 4 (known as a
nibble), 8 (known as a byte), 16 (usually known as a half word), 32 (a word), or 64 bits (a double word).
Sometimes other groupings are used like 16 (known as a word), 32 (known as a double word).
Truth table: as seen in logic gates.
Types of Number system
Number system Elements/symbols
Binary (base 2) 0,1
Octal (base 8) 0,1,2,3,4,5,6,7
Decimal (base 10) 0,1,2,3,4,5,6,7,8,9
Hexadecimal (base 16) 0,1,2,3,4,5,6,7,8,9, A=10, B=11, C=12, D=13,
E=14, F=15
❖ Base 8 to Base 10
(237)8 = 22 31 70 = 2*82 + 3*81 + 7*80 = (159)10
❖ Base 16 to Base 10
(4AC9)16 = (19145)10
✓ The left-most bit in a binary number is the most significant bit while the right-most bit is the least significant bit.
LSB
To convert (250)10 to base 8 and base 16, divide by 8 and 16 respectively writing the remainder. (250)10 = (372)8 and
(250)10 = (FA)16.
E.g. (15.375)10
The whole part is (15)10 = (1111)2. The fractional
part is (0.375)10 Then it is converted as follows:
0.375*2= 0.75 0↓
0.75*2=1.5 1
0.5*2=1.0 1
Page 42 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
✓ To convert from base 8 to base 16, the number in base 8 is first converted 0 0 0 0
to base 2 then to base 16 by grouping the number in base 2 into groups 0 0 1 1
of 4-bits then looking for each of the equivalent 4bits group from the 0 1 0 2
3
hexadecimal conversion table (truth table). 2 = 8.
0 1 1 3
Table 1:
1 0 0 4
Binary to Octal conversion ✓ A base 8 number has 3-bits (3
variables). table 1 0 1 5
1 1 0 6
✓ To convert from base 16 to base 8, the number in base 16 is first 1 1 1 7
converted to base 2 then to base 8 by grouping the number in base 2 into
groups of 3-bits then looking for each of the equivalent 3-bits group from the octal conversion table (truth table).
24 = 16. A base 16 number has 4-bits (4 variables).
A B C D Hexadecimal equivalent
0 0 0 0 0
0 0 0 1 1
0 0 1 0 2
0 0 1 1 3
0 1 0 0 4
0 1 0 1 5
0 1 1 0 6
0 1 1 1 7
1 0 0 0 8
1 0 0 1 9
1 0 1 0 A
1 0 1 1 B
1 1 0 0 C
1 1 0 1 D
1 1 1 0 E
1 1 1 1 F
Table 2: Binary to Hexadecimal conversion table
Page 43 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
………………………………….
………………………….
…………………………..
Binary Subtraction
Examples
()
…... ( )
( )
1. Definitions
A logic gate is an is an elementary building block of a digital circuit. It is an electronic circuit implementing a
Boolean function, a logical operation performed on one or more binary inputs that produces a single binary output.
Logic gates use the principles of a mathematical system known as Boolean algebra. As well as a standard Boolean
expression, the input and output information of any logic gate or circuit can be schemed into a standard table to give a
visual representation of the switching function of the system. The table used to represent the Boolean expression of a
logic gate function is commonly called a Truth Table. A logic gate truth table shows each possible input combination
to the gate or circuit with the resultant output depending upon the combination of these input(s).
To construct a truth table, we evaluate the Boolean expression for all possible combinations of values for the input
variables. The number of possible combinations is always equal to 𝟐𝒏 where 𝒏 is the number of input variables.
Page 44 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
b. AND gate
An AND gate is a circuit with two inputs and a single output which is set to one only if both the inputs are 1. This
means that it will give a high output only if all of the inputs are high.
For example, in a simple lighting circuit with two switches in series the lamp will light only if both switches are pressed.
The multiplication sign stands for the AND operation. The standard symbol for the AND gate and its truth table is
shown below. A and B are input variables while Y is the output variable.
Y=A.B or Y=AB. It reads as Y equals A AND B. This is the case for two input variables.
c. OR gate.
An OR gate will give a high output if any of the inputs is high. For example, in a simple lighting circuit with two
switches in parallel the lamp will light if either switch is pressed.
The OR gate is composed of two inputs and a single output and performs logical addition. The sign (+) stands for the OR
operation and not for ordinary addition.
OR gate,
Truth Table
and
Circuits as shown
below. Read as A OR B gives Y
Truth table of an OR gate
Page 45 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
➢ NAND Gate: It is composed of two input variables and a single output variable. The term NAND gate is formed
by the combination of NOT-AND and implies an AND function with an inverted on the output.
The logical operation of the NAND gate is such that the output is LOW (0) only when all the inputs are HIGH (1) else the
output is HIGH (1).
A B X
0 0 1
X = (AB) 0 1 1
1 0 1
➢ NOR Gate: The NOR gate which is composed of two inputs variable and a single output variable also has a
universal property. The term NOR is formed by the combination of NOT-OR and implies an OR function with
an inverted output. The logical operation of the NOR gate is such that the output is HIGH (1) only when all the
input variables are LOW (0) else the output is LOW (0).
A B X
0 0 1
0 1 0
X = (A+B) 1 0 0
Truth table of a NOR
1 1 0
gate
➢ Exclusive-OR (XOR) and Exclusive-NOR (XNOR): These gates are usually formed from the combination of
the other logic gates. The exclusive-OR is an INEQUALITY function and the output is HIGH (1) when the
inputs variables are not equal to each other. Conversely, the exclusive-NOR is an EQUALITY function and the
output is HIGH (1) when the inputs are equal to each other. The output of XOR is as follows:
Page 46 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
4. Boolean algebra
Boolean algebra is a mathematical
system, developed by the English
mathematician, George Boole, which is
used for the formulation of the logical
statements with symbols so that the
Truth table of a XOR gate
problems can be solved in a definite manner of ordinary algebra. In short, Boolean algebra is the mathematics of
digital systems. Since Boolean algebra deals with the binary number system, the variables used in the Boolean
equations have only two possible values (0 or 1). Thus, for performing the logical algebraic operations, that is,
'addition' and 'multiplication', Boolean algebra follows certain rules.
• Complement law
𝐴∙𝐴=0 | 𝐴+𝐴=1
Page 47 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
• Idempotence law
𝐴·𝐴=𝐴 | 𝐴+𝐴=𝐴
• Absorption law
𝐴(𝐴 + 𝐵) = 𝐴 | 𝐴 + (𝐴𝐵) = 𝐴
• Involution law
𝐴=𝐴
• Identity law
𝐴·1=𝐴 | 𝐴+0=𝐴
• Redundancy law
𝐴·0=0 | 𝐴+1
Page 48 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
A Boolean function is an expression formed with binary variables and logical operators like (OR,
AND, NOT with an equality sign). In essence, a truth table is a list which defines a Boolean function.
For example, X = A · B + A · C. Let us determine the truth table of the given function:
There are 3 inputs; thus we must have 23 (i.e. 8) possible combinations of 1s and 0s.
A B C A∙B A∙C A∙B + A∙C
0 0 0 0 0 0
0 0 1 0 0 0
0 1 0 0 0 0
0 1 1 0 0 0
1 0 0 0 0 0
1 0 1 0 1 1
1 1 0 1 0 1
1 1 1 1 1 1
Page 49 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Example: A car travels 150km in 2h. How fast is the car moving?
Input: distance, time.
Processes: Ask for the distance and time, set the speed to: distance/time, display the speed.
Output: speed.
Methods usually employed when solving problems in Computer Science are Stepwise Refinement and Top-Down
Design.
➢ Stepwise Refinement: this means replacing existing algorithmic steps/instructions with a new version that
fills in more details. When carrying out stepwise refinement, the complex problem is broken down into a
number of simpler steps which are simpler than the one required solving the overall problem. Refinement
of the steps continues in this manner until each step is sufficiently detailed.
➢ Top-Down Design: the goal of the top-down design is to divide a given problem into sub-problems. A sub-
problem in turn can be thought of as simply another problem and so it can be divided into sub-problems
which would be easier to solve than the original problem. The division of the problem starts at the top level
down that is why the process is called top-down design.
Page 50 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
3. Characteristics of Algorithms
A good algorithm should have the following characteristics:
➢ It must be explicit: i.e.be clear and obvious.
➢ It must be precise or unambiguous: it must be specified exactly and accurately and there should be no doubt
about what to do next
➢ It must be effective or executable: it must produce a result and there should be no impossible or unknown
steps in the algorithm
➢ It must be finite or terminate: it must have a beginning and an end though there are some that do not end.
➢ Efficient: some algorithms may work correctly but be inefficient by taking more time and using more
resources (space) than required to solve the problem.
➢ Must have an input and output
To satisfy these quality standards, one can put the following question at the time of the resolution of the algorithm
problem:
➢ Which are the data on which the algorithm will work?
➢ Which are the processes which it must execute to offer these services?
➢ Which are the services which it most produce (this include respond to users request or another algorithm)?
3. Effectiveness of a solution
There are many different solutions to the same problem so in order to consider the effectiveness of a given solution,
the following questions may be asked:
➢ Does the solution work for all sets of data?
➢ Does the solution have any unnecessary processes that are never used?
➢ Are any actions repeated more often than necessary?
➢ Can the solution be simplified and still work as well?
II. Representing algorithms
There are many ways in which algorithms can be represented. We shall consider just 3 ways. They are: Structured
English (Natural language), Flow charts, and Pseudo code.
1. Structured English
To represent algorithms in Structured English, we simply write down the steps to follow in solving a problem in
chronological order.
Examples:
An algorithm to add 2 numbers and to find the An algorithm to make tea will be given as
difference
1. Get two numbers a and b; 1. Put water into the coffee machine
2. Add tea to it
2. Add a and b;
3. Plug the machine to the current
3. Subtract b in a; 4. Wait for ten minutes
4. Display the sum; 5. Stop machine
6. Unplug it from current
5. Display the difference; 7. Serve tea in a tea cup
8. Add sugar
9. Drink
2. Flow charts
A flow chart is a graphical representation of an algorithm. It uses graphic symbols to describe the nature and flow
of steps in an algorithm. Each step in a flowchart contains information about what must be done, and the arrows show
the order in which the instructions must be executed.
Page 51 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Page 52 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Examples:
Begin Begin
X <- a + b
Add a and b
Write X
Display the sum
end
end
3. Pseudo code
A pseudo code is an outline of a computer program written in a mixture of a programming-like language and English.
Pseudo-codes help programmers write out the program in a simple clear language before attempting to put it in a
suitable programming language of their choice. Writing pseudo code is one of the best ways to plan a computer
program.
The three standards for writing good pseudo-code are:
➢ Number each instruction or use indentation: this is to enforce the notion of an ordered sequence in which
instructions are carried out.
➢ Each instruction should not be ambiguous but effectively computable.
➢ Nothing should be left out.
The advantage of pseudo-code is that it allows the programmer to concentrate on how the program works while
ignoring the details of the language.
For example, here is a pseudo code outline of a program that reads two numbers and says which is greater:
Begin
Read (a, b);
If a is greater than b then;
Write (“a is greater than b”);
If b is greater than a then;
Write (“b is greater than a”);
End
The advantages of pseudo-code are:
➢ It allows the programmer to concentrate on how the program works while ignoring the details of the
language.
➢ It describes how an algorithm should work
➢ It explains the computing process to less technical users.
Page 53 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
❖ Constant: it is an object whose value cannot be modified in the course of the algorithm or program. A constant
is given a value that remains the same all through the program.
To declare a constant, we use the keyword CONST followed by the name and the value. The syntax is as follows:
CONST name_of_constant = value
Example declaration of 𝜋 equal to 3.14 as a constant.
CONST PI = 3.14
Variables and constants are characterized by:
➢ An identifier: This is the name of the object.
➢ A value: This is the content of the object.
➢ A type: This defines the domain in which the object gets its value
❖ A Literal: is anything (numbers or text) that is fixed (set) by a programmer during the creation of the program’s
code. It is usually written within double quotes. Examples “Enter a number”, “The result is” are literals.
Page 54 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
c. Basic Instructions
An instruction is a processing order to perform an action. The three basic instructions used in an algorithm are input,
output and assignment instructions.
❖ An input instruction allows to read a value from the keyboard using the keyword “read ()”, “readln ()” or Get.
The value read is saved in a variable of the same.
The syntax is: read(name_of_variable);
Example: read(a);
❖ An output instruction allows to display an information on an output device such as monitor or printer. We use
the keyword: “write ()”, “writeln ()” or print.
The syntax is write (“What we want to display”);
Example write(“bonjour”);
❖ The assignment or affectation instruction allows a value to be assigned to a variable. the content of a variable
can be assigned as the content of another variable. The symbols used for affectation statement are: “←” or “:=”
The syntax is name_of_variable ← value;
Example: a ← 2; message ← “bonjour Peter”; sum ← a + b;
❖ Incrementation/ decrementation instruction
➢ Incrementation is the operation of adding 1 (and by extension any fixed integer value) to a variable
called a counter.
The syntax is: i ← i +1; i++;
➢ Decrementation is the operation of substracting 1 (and by extension any fixed integer value) to a
variable called a counter.
The syntax is: j ← j +1; j - -;
Activity: Complete the table below
Instruction x y z
x←2 / /
x←x+1 / /
y←1+x
z←x+y
y←z+x
Page 55 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
i. Sequence Structure
A sequence control structure executes a set of instructions (Actions) one after the other from the first to the last in
the order they are given.
Syntax: Instruction 1
Action 1
Get a ;
Instruction 2
Get b ;
… Action 2
Instruction n c← a + b ;
print (“Sum =”, c) ;
Action n
Explanation: If condition1 is true, we move to condition2. If condition2 is true, then instruction 1 is executed otherwise,
instruction 2 is executed. If condition 1 is false, instruction 3 is executed. Instruction1 or instruction 2 will be executed
if and only if condition 1 is true.
Get day
❖ Case … of Case day of
1: print “today is Monday”;
Syntax: Case variable of 2:print “today is Tuesday”;
Case 1: Instruction 1 ….
7:print “Today is Sunday”;
Case 2: Instruction 2 end
…
Page 56 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Case n: Instruction n
end
Explanation: the value of variable is evaluated, if it matches with case 1, instruction 1 is executed. If it matches
with case 2, instruction 2 is executed and so on. Case…of is a multiple selection structure. It is used when an important
number of choices are to be considered depending on the value of a variable.
Instructions
Explanation: The condition is evaluated, if it is true instruction(s) is/are executed. Instruction(s) is/are executed as
long as condition remains true. When the condition becomes false, the loop stops.
❖ Repeat Loop Syntax: Get n
Repeat i ← 1;
Instruction(s) repeat Initialization
Until condition print “this is a repeat loop”;
i ← i + 1;
until i <= n Instructions
Condition
Explanation: The instruction or set of instructions is executed and the condition is evaluated. If it evaluates to
false, the instruction or set of instructions is executed again. If condition evaluates to true, the program exits the loop.
Get n
❖ For Loop Syntax: For i: = 1 to n do
For var ← low_limit to hi_limit do Initialization
Print “this is a for loop”
Instruction(s); End For
End for Or
Or Get n Condition
For var: ← hi_limit downto low limit do For i: = n down to 1 do
Instruction(s) Incrementation
Print “this is a for loop” /decrementation
End for End For
Instructions
Explanation: var (variable) is given a value low limit or hi limit depending on the loop, which is automatically
incremented or decremented (by 1) after any execution of the loop. The loop stops when low limit becomes greater
than hi_limit. In both cases, if hi_limit is less than low limit, the loop body is not executed at all.
Page 57 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Remark: Some problems are recursive in nature. The solution to such problems involves the repeated
application of the solution to its own values until a certain condition is reached. Algorithms for such problems are
known as recursive algorithms.
A recursive algorithm is one that calls (invokes) itself during an execution. Examples are the Factorial function,
the sum function, and the Fibonacci function.
Recursion can be defined as the calling of a procedure by itself thereby creating a new copy of the procedure.
Exercises
1) Write an algorithm to calculate the area of a circle.
2) Write an algorithm to solve a linear equation.
3) Write an algorithm that reads a person‘s sex and writes good morning sir if it’s male and good morning madam
if it‘s female.
4) Write an algorithm that solves a quadratic equation
Lesson 2: Programming
Introduction
Programming or program development is the act of writing computer programs.
A computer program is a set of instructions written in a programming language that tells the computer what to do in
order to solve a problem. In other words, it is an algorithm expressed in a programming language.
Page 58 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
➢ Assembly Language: it is a low-level language that uses words or symbolic codes called mnemonic codes
to represent machine language instructions. Assembly language is the second generation of programming
languages. ADD, LOAD, and STORE are known as mnemonics. For example:
LOAD R0 Number1 Loads number1 in register 0
ADD R2 R0 R1 Adds registers 0 and register 1 and store result in register 2.
❖ Advantages of low level languages
➢ Programs are easier to write and understand when compared to machine language.
➢ It can produce small size program.
➢ It can produce very fast code as it allows low-level access to hardware features.
❖ Advantages of an Interpreter
➢ Good at locating errors in programs since interpretation is done line by line.
➢ Debugging is easier since the interpreter stops when it encounters an error.
➢ If an error is corrected, there is no need to retranslate the whole program.
❖ Disadvantages of an Interpreter
➢ It is slow as interpretation is done line by line.
➢ Translation has to be done every time the program is to be executed since no object code is produced.
➢ For the program to run, the interpreter must be present.
4. Program Errors and Correction
➢ Syntax Error
Syntax is the set of rules that specify how the symbols of a language can be put together to form meaningful
statements. A syntax error is a place in a program where the syntax rules of the programming language were
not followed. A syntax error will stop a program compilation or interpretation.
➢ Semantic Error
Semantics specify the meaning of an orderly well-formed program. A semantic error is a situation where the
programmer misunderstood the meaning of something in the programming language. Compilation and
interpretation do not detect semantic errors. Semantic errors are detected from wrong results. They are also
called logical errors.
Something may be syntactically correct but semantically incorrect.
➢ Run-time Error
Run-time error is an error that occurs when a program is being executed. For example, a run-time error may
occur if division by 0 is attempted. A run-time error may cause the program to stop execution.
➢ Debugging
An error in a computer program is known as a bug and debugging is the process of finding and removing bugs.
Syntax errors and semantic errors are bugs. A debugger is the software tool (or person) used for this purpose.
5.Key Words and Operators
a. Key Words
Any high-level language has its own set of predefined words which are used to write programs. Each of these words
has a specific meaning, and cannot be used for any other purpose within the programming language IDE. These words
are known as key words or reserved words.
A reserved word is a key word in a programming language that has a specific meaning and cannot be used for any
other purpose. E.g. If, Else, For, To and goto.
b. Operators
Operators are used to perform various operations on data. They may be arithmetic, relational or logical. Arithmetic
operators are +, -, *, %, ++ and -- and /. Relational operators include <, >, ==, <=, >= and !=. Logic operators are NOT
(!), AND (&&) and OR (||).
6.Programming paradigms
It is a fundamental style and methodology of computer programming. There are: imperative (procedural),
declarative, and object oriented Paradigms.
➢ Imperative Paradigm: It is also known as procedural programming paradigm. It uses sequences of instructions
that are executed by the processor in the order the programmer designed. Imperative programming manipulates
variables and data structures/types stating how to obtain the results. Examples: C, Pascal, FORTRAN, Ada, etc.
➢ Declarative Paradigm: Made up of logic Paradigm and Functional Paradigm. Its control flow is implicit i.e.
the programmer states only what the result should look like not how to obtain it.
➢ Logic paradigm is a programming process that consists of a set of facts and rules (axioms) describing
properties of a certain objects and theorems to be proved. E.g. Prolog, Mercury. Prolog and Mercury are fifth
generation language also called Natural Languages.
➢ Functional programming paradigm: Here a program development is the construction of mathematical
functions. E.g. Lisp, Mathematical, etc.
➢ Object Oriented Paradigm (OOP): Here software is viewed as a collection of units called objects which
receive messages each of which is capable of performing the actions that are immediately related to it as well
Page 60 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
as requesting actions of other objects. Objects respond to messages by performing operations called methods.
Together, these objects interact to solve the problem. E.g. design of graphical user interface using C++,
Python, Perl, Java.
7.Software development tools
These are software that are used to develop applications and system software.
➢ Source code editor: A source code editor is a text editor program designed specifically for editing source
code of computer programs. It could be a standalone application or it may be built into an IDE.
➢ Integrated Development Environment (IDE): An IDE is single software that provides comprehensive
facilities to computer programmers in which all software development is done. Also known as Integrated
Design Environment or Integrated Debugging Environment. An IDE normally consist of: a source code
editor, a compiler or interpreter, automation tools, a debugger.
➢ Linker: This is software that is used to combine object code modules (sub-programs) together to make a
complete program.
8.Stages in the program development cycle
➢ Problem Analysis.
➢ Task Analysis.
➢ Algorithm Development.
➢ Coding
➢ Testing and Debugging.
➢ Documentation and Maintenance.
Lesson 3: Introduction to C Programming Language
Introduction
C is a very powerful all-purpose programming language mostly used in creating OSs and more sophisticated
programs.
C is one of the oldest programming languages and the most widely used, it was developed in the 70s, but it is still very
powerful. Learning C is a great way to introduce yourself to more complex languages as well, and the knowledge you
gain will be useful in almost every programming language and can help you get into application development.
1.Why to use C?
C was initially used for system development work in particular the programs that make-up the operating system. C
was adopted as a system development language because it produces code that runs nearly as fast as code written in
assembly language. The modern version of C is Objective C & C++.
Some examples of the use of C might be: Operating Systems, Language Compilers, Assemblers, Text Editors, Print
Spoolers, Network Drivers, Modern Programs, Databases, Language Interpreters, and Utilities.
3.Reserved/Key words in C
These are words that should not be used as an identifier to define variables or functions in a program.
void Used to indicate that a function takes no arguments or returns no value
Data structures-
related
typedef Used to associate a type with an identifier
const Used to declare constants
Page 61 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
➢ The # i nc l u de < s t di o . h> It is a preprocessor command which tells a C compiler to include stdio.h file
before going to actual compilation and also loads libraries that contain the functions you need. In this example,
s t di o . h lets us use the p r i n t f ( ) and system( ) functions.
➢ The i n t m ai n ( ) command tells the compiler that the program is running the function called "main" and that
it will return an integer when it is finished. All C programs run a "main" function.
➢ The braces { } indicate that everything inside them is part of the function. In this case, they denote that
everything inside is a part of the "main" function.
➢ /* …. */ : is comment and is ignored by the C compiler , to comment in C place / * at the start of the comment
and * / at the end.
➢ The p r i nt f ( ) function displays the contents of the parentheses on the user's screen. The quotes ensure that
the string inside is printed literally. The \ n sequence tells the compiler to move the cursor to the next line.
➢ The “ ; ” denotes the end of a line. Most lines of C code need to end with a semicolon.
➢ The system (“pause”) or g e t c h ar ( ) command tells the compiler to wait for a keystroke input before
moving on. This is useful because many compilers will run the program and immediately close the window.
This keeps the program from finishing until a key is pressed.
➢ The r et u r n ( ) command indicates the end of the function.
Remark: Comments are part of the code that is not compiled but allows you to explain what is happening. This is useful
for reminding yourself what your code is for and for helping other developers who might be looking at your code.
Page 62 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
5.Using Variables
Variables allow you to store data either from computations in the program or from user input. Variables need to be
defined before you can use them and there are several types to choose from.
Some of the more common variables types in C programming include i nt , c ha r , and f l o a t . Each one stores a
different type of data.
Note: you can declare multiple variables on the same line as long as they are of the same type. Simply separate the
variable names with commas.
Like many lines in C, each variable declaration line, instruction line needs to end with a semicolon.
Variables must be declared at the beginning of each code block (The parts of your code that are enclosed in {}
brackets). If you try to declare a variable later in the block, the program will not function correctly.
Example 1
#include <stdio.h>
int main()
{
int x;
printf("Enter a number: ");
scanf("%d", &x);
printf("You entered %d", x);
system("PAUSE");
return 0;
Page 63 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
➢ The " % d" string tells s can f to look for integers in the user input.
➢ The & before the variable x tells s ca n f where to find the variable in order to change it, and stores the integer
in the variable.
➢ The final p r i n t f command display the inputted integer to the user.
Example 2:
1. /*this program computes the dimensional weight of a box*/
2. #include<stdio.h>
3. Int main (void)
4. {
5. Int height, length, width, volume;
6. Float weight;
7. Printf (“enter the length of box: ”);
8. Scanf (“%d”, &length);
9. Printf (“enter the width of box: ”);
10. Scanf (“%d”, &width);
11. Printf (“enter the height of box: ”);
12. Scanf (“%d”, &height);
13. Volume = length*width*height;
14. Weight = (volume+165)/166;
15. Printf (“volume (cubic inches) : %d\n”, volume);
16. Printf (“dimensionalweight (pounds) : 2f\n”, weight);
17. Return 0;
18. }
1 A comment describing what the program does and is ignored by the compiler.
2 Commands beginning with the # are known as pre-processor directives.
3 The main function starts the execution of the program. The keyword ‘int’ indicates the return
type is an integer. Also the keyword ‘void’ indicates that the function takes no arguments.
4, 18 The braces each indicate where the body of the program begins and ends respectively. They
can also be use to group statements.
5, 6 Define the type of data that each variable i.e. height, length, width, volume and weight will
hold. Here we have integers and float (decimal numbers)
7, 9, 11 Printf statement: it causes the message ‘enter length, width, and height of box” to be displayed
on the console screen.
8, 10, 12 Scanf statement: it reads input and stores it in the specified variable. %d indicate s that the
input is a decimal integer, %f; input is a floating point number, %s input is a string. The
‘&’specifies the location where the variable is stored.
13, 14 Computations
15, 16 Printf displays the values of the numeric expressions volume and weight as integers and
floating point numbers respectively. For the weight, ‘2f’ specifies that the value printed will
have just 2 digits after the decimal point. The ‘\n’ character tells printf to move the cursor to
the beginning of a new line.
Page 64 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
17 Indicates that the main function terminates and the program returns the value ‘0’ to the O.S.
when it terminates or returns a value to the user.
Operators Description
== Equality. The result is true if both operands are equal, and false otherwise
!= Not equal. The result is true if operands are not equal, and false if they are equal
Greater than. The result is true if the left operand is greater than the right operand
>
and false otherwise.
Less than. The result is true if the left operand is less than the right operand, and
<
false otherwise.
Greater than or equal to. The result is true if the left operand is greater than or equal
>=
to the right operand, and false otherwise.
Less than or equal to. The result is true if the left operand is less than or equal to the
<=
right operand, and false otherwise.
❖ Logical operators:
These operators perform logical operations on their operands; the result is a true or false
Operators Descriptions
The AND operator.
&& In C, the result is true if both operands are non-zero, otherwise the result is false.
In Pascal, the result is true if both operands are true, otherwise the result is false.
The OR operator.
|| In C, the result is true if any of the two operands is non-zero, otherwise the result is false.
In Pascal, the result is true if any of the two operands is true, otherwise the result is false.
The NOT operator. Used to reverses the logical state of its operand. If a condition is true
!
then the NOT operator will make false
Page 65 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Operators Descriptions
Simple assignment operator. Assigns the value of the right hand side expression to the left
hand side operand Statements involving the assignment operator may look mathematically
= incorrect.
Examples: c = c + 5; (in C) or c := c + 5; (in Pascal) should be interpreted as follows: Assign
to variable c a value which is the same as the old value of c, plus 5.
These C operators perform an arithmetic operation, then assign the result to the left operator.
+=,-=,*=,
Example, += (add AND assignment operator) adds right operand to the left operand and
/=, %=
assign the result to left operand. Hence, c += 5 is equivalent to c = c + 5;
Page 66 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
else {
printf("With age comes wisdom.\n");
}
return 0;
}
The program takes the input from the user and takes it through the IF statements. If the number satisfies the first
statement, then the first pr i n t f statement is returned. If it does not satisfy the first statement, it is taken through each
ELSE IF statement until it finds one that works. If it doesn't match any of them, it goes through the ELSE statement at
the end.
8.Loops
Loops are one of the most important aspects of programming, as they allow you to repeat blocks of code until specific
conditions are met. This can make repeating actions very easy to implement, and keeps you from having to write new
conditional statements each time you want something to happen.
Loops use what is known in C as Increment and Decrement. The unary operator ++, --, is used to increment and
decrement which acts upon single operand. Increment operator increases the value of variable by one. Similarly,
decrement operator decreases the value of the variable by one. These operators can only be used with the variable but
can’t be used with expression ++(x+y+z) or constants ++6.
There are three main types of loops: FOR, WHILE, and DO...WHILE.
In the above program, y is set to 0, and the loop continues as long as the value of y is less than 15. Each time the
value of y is printed, 1 is added to the value of y and the loop is repeated. Once y = 15, the loop will break.
❖ Use a WHILE loop.
WHILE loops are more simple than FOR loops. They only have one condition, and the loop acts as long as that
condition is true. You do not need to initialize or update the variable, though you can do that in the main body of the
loop.
#include <stdio.h>
int main()
{
int y=0;
while (y <= 15){
printf( "%d\n", y );
y++;
}
getchar();
}
The y + + command adds 1 to the y variable each time the loop is executed. Once y hits 16 (remember, this loop goes
as long as y is less than or equal to 15), the loop breaks.
Page 67 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
This loop will display the message even though the condition is FALSE. The variable y is set to 5 and the WHILE
loop is set to run when y does not equal 5, so the loop terminates. The message was already printed since the condition
is not checked until the end.
To create a web page you need a text editor like notepad, notepad++, blocknote, Adobe Dreamweaver, Brackets,
CoffeeCup, Edit plus, etc. Save the code with extension .html or .htm and then run (compile) the code using any of
your favourite web browsers like Internet Explorer or Google Chrome, or Firefox etc.
2. Basic HTML document
In its simplest form, following is an example of an HTML document:
<!DOCTYPE html>
<html>
<head>
<title>This is document title</title>
</head>
<body>
<h1>This is a heading</h1>
<p>Document content goes here.....</p>
</body>
</html>
After running this code with Mozilla Firefox or any other browser, the output will look like this:
Page 68 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
A. HTML
Tags
It is a set of characters constituting a formatted command for a web page. As told earlier, HTML is a markup language
and makes use of various tags to format the content. These tags are enclosed within angle braces <Tag Name>. Except
few tags like <hr /> tag is an example of the empty element where you do not need opening and closing tags, as there
is nothing to go in between them. The <hr /> element has a space between the characters hr and the forward slash. Most
of the tags have their corresponding closing tags. For example, <html> has its closing tag</html> and <body> tag has
its closing tag </body> tag etc.
Above example of HTML document uses the following tags:
Tag Description
<!DOCTYPE...> This tag defines the document type and HTML version.
This tag encloses the complete HTML document and mainly comprises of
<html> document header which is represented by <head>...</head> and document
body which is represented by <body>...</body> tags.
This tag represents the document's header which can keep other HTML tags
<head>
like <title>, <link> etc.
<title> The <title> tag is used inside the <head> tag to mention the document title.
This tag represents the document's body which keeps other HTML tags like
<body>
<h1>, <div>, <p> etc.
<h1> This tag represents the heading.
<p> This tag represents a paragraph.
To learn HTML, you will need to study various tags and understand how they behave while
formatting a textual document. Learning HTML is simple as users have to learn the usage
of different tags in order to format the text or images to make a beautiful webpage.
World Wide Web Consortium (W3C) recommends using lowercase tags starting from HTML4.
B. General HTML Document Structure
A typical HTML document will have the following structure:
Document declaration tag
<html>
<head> … </head>
<body>
…
</body>
</html>
Remark: The <!DOCTYPE> declaration tag is used by the web browser to understand the version of the HTML used
in the document. Current version of HTML is 5 and it makes use of the following declaration: <!DOCTYPE html>
C. HTML Elements
An HTML element is defined by a starting tag. If the element contains other content, it
ends with a closing tag, where the element name is preceded by a forward slash as shown below with few tags:
Page 69 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
E. HTML Attributes
We used them so far in their simplest form, but most of the HTML tags can also have attributes, which are extra bits
of information.
An attribute is used to define the characteristics of an HTML element and is placed inside the element's opening tag.
All attributes are made up of two parts: a name and a value:
➢ The name is the property you want to set. For example, the paragraph <p> element in the example carries
an attribute whose name is align, which you can use to indicate the alignment of paragraph on the page.
➢ The value is what you want the value of the property to be set and always put within quotations. The below
example shows three possible values of align attribute: left, center and right.
Attribute names and attribute values are case-insensitive. However, the World Wide Web
Consortium (W3C) recommends lowercase attributes/attribute values in their HTML 4 recommendation.
Example:
<!DOCTYPE html>
<html>
<head>
<title>Align Attribute Example</title>
</head>
<body>
<p align="left">This is left aligned</p>
<p align="center">This is center aligned</p>
Page 70 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
G.HTML Lines
The HTML horizontal rule can be used to divide content areas and uses the <hr> tag. Inserting the <hr> tag will draw
a horizontal line across your content area.
H. HTML Comments
Comments can be inserted into HTML code to make it more readable and to explain to the reader of your code what
it is you plan to do or what you have changed. It’s always good practice to comment your HTML code. Comment
elements are written as follows and do not show on your rendered page.
<!-- This is a comment -->
The <!-- is the beginning of the comment and the --> is the end. Everything typed within these tags will be invisible
to the viewer unless the source code is viewed.
T. HTML “White Space”
Browsers will ignore all “white space” in your HTML document. White space can be added to make your code more
human readable, but it will be completely ignored when the browser renders the document. Keep this in mind when
you write your code. Everything is controlled by a tag. Tags tell the browser what to do, if you instruct nothing,
nothing will result.
U. HTML Headings
HTML headings are defined with <h1> through <h6> tags. <h1> defines the most important heading while <h6>
defines the lease important heading.
V. HTML Paragraphs
HTML Documents are divided into paragraphs. Paragraphs are defined with the <p> tag. Browsers will automatically
add white space above and below a paragraph tag. Make sure to include the closing </p> tag to complete the paragraph
and start the next.
W. HTML Formatting
HTML also uses tags for formatting text, much like you would with a word processing
program. Text formatting means simply things like bold, italic, and underline. You
should note, however, that underlining text in an HTML document is terribly poor
form as it can be misconstrued as a link. All formatting tags must be closed.
Page 71 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Tag Description
<b> Defines bold text
<strong> Also defines bold text
<i> Defines italic text
<em> Also defines italic text
<sub> Defines subscript text
<sup> Defines superscript text
<blockquote> Defines a section of text that will be indented
Example:
<p>Text formatting means simply things like <b>bold,</b><i> italic,</i> and
<u> underline. </u>
X. HTML Links
The HTML <a> tag defines an anchor or hyperlink.
A hyperlink (or link) is a word, group of words, or image that you can click on to jump to another document. When
you move the cursor over a link in a Web page, the arrow will turn into a little hand. The most important attribute of the
<a> element is the href attribute, which indicates the link’s destination.
By default, links will appear as follows in all browsers:
➢ An unvisited link is underlined and blue.
➢ A visited link is underlined and purple.
➢ An active link is underlined and red.
Y. HTML Link Syntax
An HTML link is required to have an attribute in order to have a function. The <a> tag will surround the content you
wish to effect, whether it be an image, text or any other HTML element. The value of the attribute must be contained
in quotes.
Attribute Value
href Specifies the destination of the link
target Specifies the browser window to display the link
id Specifies a bookmark inside a document
title Displays a tooltip (not required)
Example
<a href=http://www.andar360.com> Andar360.com</a>
<a id=”top”>Top of the page</a>
<a href=”#top”>Go to the top of the page</a>
<a href=”home.html” target=”_parent”>Go to Home Page</a>
❖ Target Attribute
There are five values for the target attribute. The target attribute specifies where to open the linked document and is
supported in all major browsers. As with all attributes the value must be contained in quotes.
Value Description
Value Description
_Blank Opens the linked document in a new window or tab
_Self Opens the linked document in the same frame as it was
clicked
_Parent Opens the linked document in the parent frame
_Top Opens the linked document in the full body of the window
Framename Opens the linked document in a named frame
Page 72 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Z. HTML Head
The HTML <head> element is a special container element to contain all of the head specific elements. Elements
inside the head can include scripts, tell the browser where to find external information such as style sheets or JavaScript
and provide search engines with descriptive information about the content of the page.
Tag Description
<head> Defines information about the document
<title> Defines the title of a document
<base> Defines the default address of the page
<link> Links to the document to an external resource
<meta> Defines metadata about an HTML document
<script> Defines a client-side script
<style> Defines style information for a document
HTML Images
Images are displayed in HTML by use of the <img> tag. The <img> tag does not need to be closed. The <img> tag
has multiple attributes to define what to display and how it should be displayed. As with other attributes, values must
be contained in quotes.
Attribute Value Description
alt Plain text Alternate text to describe the image
border Pixels # Width of border around an image “0” for none
height Pixels # Height in pixels
src URL The location of the image file
width Pixels # Width in pixels
HTML Tables
A table is comprised of rows and columns, similar to a spreadsheet, and can be quite complex. Tables consist of a
number of tags and will always start with the <table> tag. Like many other tags the table tag can have attributes assigned
to it such as width and follow the same rules as other attributes. The <table> tag signifies the start of a table but will
need other tags to assign rows and columns inside it.
❖ Table Rows and Columns
Table Rows are defined using the <tr> tag and columns are defined using the <td> tag. The <td> tag stands for ‘Table
Data’ and can contain text, images, links, lists or any other HTML element. Below is an example of a simple table in
HTML.
<table>
<tr>
<td>Row One – Column One</td>
<td>Row One – Column Two</td>
</tr>
<tr>
<td>Row Two – Column One</td>
<td>Row Two – Column Two</td>
</tr>
</table>
<li>List Item</li>
</ul>
Ordered List
<ol>
<li>List Item</li>
<li>List Item</li>
</ol>
_________________________________________________________________
Page 74 of 129
WRIITEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Page 75 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
While Analogue communications is the transfer of continuously varying information signal, analogue
communications is the transfer of discrete messages. The messages are either represented by a sequence of pulses by
means of a line code (baseband transmission), or by a limited set of continuously varying wave forms (pass band
transmission), using a digital modulation method.
b. Asynchronous vs. Synchronous Transmission
Asynchronous transmission refers to the exchange of data between two or more parties without the requirement for
all the recipients to respond immediately. There is gap present between the data and consist of start bit (1) and end bit
(0) in middle of which actual data is present. It is much better and flexible than synchronous communication though
it’s slow and cheaper.
In synchronous transmission, data is sent in form of blocks or frames. Here, there is no gap present between data.
Synchronous transmission means that two or more people exchange information in real-time. Mostly used to confirm
an important operation immediately and it’s fast and costlier.
Page 76 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Page 78 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
7. Network/communication protocols
The protocols in human communication are rules about appearance, speaking, listening and understanding. These
rules, also called protocols of conversation, represent different layers of communication. They work together to help
people communicate successfully. The need for protocols also applies to computing systems.
The Internet Protocol (IP) and the Transmission Control Protocol (TCP) are the most important of these, and the term
Internet Protocol Suite, or TCP/IP suite, refers to a collection of its most used protocols. Most of the communication
protocols in use on the Internet are described in the Request for Comments (RFC) documents of the Internet
Engineering Task Force (IETF).
Some most used protocols of the TCP/IP suite include:
➢ IPX/SPX: (Internetwork Packet Exchange/Sequenced Packet Exchange) is a data transmission protocol
developed by Novell and widely used in local area networking.
➢ ARP: (Address Resolution Protocol) used to convert logical address to physical and vice versa.
➢ DHCP: (Dynamic Host Configuration Protocol) used to assign automatically IP address in a network.
➢ FTP: (File Transfer Protocol) used to transfer files over the network.
➢ HTTP: (Hypertext Transfer Protocol) used to transfer web pages over internet.
➢ ICMP: (Internet Control Message Protocol) used to manage errors on the internet.
➢ SCTP: (Stream Control Transmission Protocol) transmission protocol that combines the best of UDP & TCP.
➢ SMTP: (Simple Mail Transfer Protocol) used to transmit electronic mail on the internet.
➢ SNMP: (Simple Network Management Protocol) used for administration task on distance computer.
➢ UDP: (User Datagram Protocol) used to transfer packets of data called user datagram.
➢ VoIP: (Voice Over Internet Protocol) used on the internet to make telephone calls.
2.5. Repeater
A repeater is a device used to expand the boundaries of a wired or wireless LAN. With physical media, data
transmissions can only span a limited distance before the quality of the signal degrades. Repeaters are used to preserve
signal integrity and extend the distance over which data can safely travel by regenerating the signals they receive. Active
hubs are considered as repeaters (multiport repeaters).
2.6. Bridge
A bridge, also called a layer 2 switch, is a device used to create a connection between two separate computer networks
or to divide one network into segments. Creating multiple segments in a local network reduces the network traffic
making the network to be faster and more efficient.
2.7. Router
A router is a device that joins several networks together and is responsible for routing data from one network to another.
It keeps track of the IP addresses of the computers on the networks connected to its network interface cards and directs
data packets appropriately. It is more powerful than a bridge because instead of just choosing network segments based
Page 80 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
on previous traffic, a router can look up the best route for a packet to take. Routers can be computers with operating
systems and special network software, or they can be other dedicated devices built by network manufacturers. The
Internet relies heavily on routers.
2.8. Modem
MODEM (MOdulator-DEModulator) is a device that encodes data for transmission over a particular medium, such as
telephone line, coaxial cable, fiber optics, or microwaves. It converts digital signals from a computer to analog signals
or waveform for transmission over a medium (modulation) and converts analog signals from the medium to digital
signals understandable by the computer (demodulation). It can be external, internal i.e. mounted inside the computer, or
built-in i.e. integrated in the motherboard.
Common types of modems are:
o Dial-up Modem
o Cable Modem
o Domain Subscriber Line Modem (Asymmetric DSL & Symmetric DSL)
o Sat modem
2.9. Multiplexer
A multiplexer abbreviated (MUX) is a device that takes input signals from different sources and transmits them over a
single transmission line. This process is known as multiplexing. There are different types of multiplexing:
• Frequency-division multiplexing (FDM), in which the carrier bandwidth is divided into sub channels of different
frequency widths, each carrying a signal at the same time in parallel.
• Time-division multiplexing (TDM), in which the multiple signals are carried over the same channel in alternating
time slots.
• Code-division multiplexing (CDM), in which the multiple signals are carried over the same channel but every
signal is coded differently.
Orange and MTN use a combination of FDM and TDM called GSM while Camtel uses CDM.
2.10. Cables
A cable is use to physically connect nodes together. There are three common types of cables: coaxial cable, twisted pair
cable and fiber optical cables.
a. Coaxial Cable
Coaxial cable consists of an inner core and an outer flexible braided shield, both of conductive material separated by an
insulator. The braided shield prevents the cable from picking up or emitting electrical noise. There are two types of
coaxial cables: thin net and thick net.
b. Twisted Pair
Twisted-pair cable is the most common type of cabling used in LAN networks today. It consists of a pair or pairs of
insulated wires twisted together. Cable twisting helps reduce noise pickup from outside sources and crosstalk on multi-
pair cables. There are two types of twisted pair cables: shielded twisted pairs (STP) and unshielded twisted pairs (UTP).
c. Fiber Optic Cable
Fiber optic cables use optical fibers that carry digital data signals in the form of modulated light pulses. An optic fiber
consists of an extremely thin cylinder of glass, called the core, surrounded by a concentric layer of glass, known as the
cladding. Each cable has two fibers - one to transmit and one to receive.
There are two types of fiber optic cables:
• Single Mode Fiber (SMF) uses a single ray of light to carry transmissions over long distances.
• Multi-Mode Fiber (MMF) uses multiple rays of light simultaneously with each ray of light running at a different
reflection angle to carry transmissions over short distances.
2.11. Gateway
A gateway is a device that connects two different computer networks using direct and systematic translations between
protocols. A gateway translates outgoing network traffic to the protocol needed by the destination network. The term
gateway is also sometimes loosely used to describe any device that acts as the entry or exit point for a network.
2.12. Interworking
It is a technique of linking different networks by using intermediary devices such as routers or gateways.
3. Network Topologies
It is the arrangement of nodes in a communications network. There are two types of network topologies. Physical
network topology which refers is the physical layout or arrangement of the components of a network. Logical network
Page 81 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
topology which refers to the way data circulates or travels along communication lines in a network. The following are
physical Network topologies.
a. Advantages
➢ Easy and inexpensive to set up as little cabling is required.
➢ Easy to include additional stations without disrupting the network.
➢ Failure of one node does not affect network.
b. Disadvantages
➢ High rate of data collision.
➢ Fails if there is any damage to the bus.
➢ Any break in the bus is difficult to identify.
a. Advantages
➢ Breakdown of anode does not affect the network.
➢ No disruption of the network when connecting or removing devices.
➢ It is easy to detect faults.
➢ Good security because no workstation can interact with another without going through the server first.
b. Disadvantage
➢ Failure of the central node affects the entire network .
➢ It is costly due to the amount of cables required to connect the devices.
Page 82 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
a. Advantage
➢ No collision as data travels in one direction.
b. Disadvantage
➢ If a node in the network fails, the entire network fails.
➢ Network is disrupted when additional stations are added.
3.5. Tree Topology: Tree Topology integrates the characteristics of Star and Bus
Topology. In Tree Topology, the number of Star networks is connected using Bus.
3.6. Hybrid Topology: Hybrid, as the name suggests, is mixture of two or more than
two different things. Similarly in this type of topology we integrate two or more different topologies to form a
resultant topology which has good points (as well as weaknesses) of all the constituent basic topologies rather than
having characteristics of one specific topology.
4. Network Standards
4.1. Token Ring Network
Token ring (IEEE 802.5 standard) is a network technology developed by IBM in which computers are connected
together in a ring. Token ring’s media-access method is called token passing. A special message, called token, circulates
along the ring from one computer to another and each computer can transmit only while it is holding the token.
Information flows in one direction along the ring from source to destination and back to source. When a station wishes
to transmit, it waits for the empty token to pass by. It seizes it and inserts data into it and then releases it to the medium.
The token circulates until it gets to the destination computer that picks it and retrieves the data. After retrieving the data,
it regenerates the token and sends it back to the medium.
4.2. Ethernet Network
Ethernet (IEEE 802.3 standard) is the most common and widely used technology to establish any computer network.
An Ethernet network is formed by physically connecting the individual computer units to each other in a bus topology
or a star topology. Ethernet’s media access policy is CSMA/CD (Carrier Sense Multiple Access with Collision
Detection).
• CS: means that a station listens to the medium and transmits only if medium is idle
• MA: means that any station can use (access) the medium
• CD: means that each station stops transmitting immediately it senses a collision
When a collision is detected, the two stations involved will retransmit after a random time wait created by a back off
algorithm.
Page 83 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
4.3. Fiber Distributed Data Interface (FDDI)
FDDI is a network technology that uses fiber-optic cables in a ring topology with dual rings on which information can
travel in opposite directions. The media access method for FDDI is token passing. The primary ring is used for data
transmission, and the secondary ring remains idle. Because of this double ring topology, if a station fails or a cable
becomes damaged, the dual ring is automatically wrapped around itself, forming a single ring. This prevents downtime
as a result of a failed machine or faulty wiring.
4.4. Wireless Network Standards
Wireless networks are established without physical wiring techniques involved. They use radio and infrared signals and
are based around one of these technologies: Bluetooth, Wi-Fi, WiMax, terrestrial microwaves and satellite.
a. Bluetooth: is a low power, short-range wireless technology largely used to interconnect computing devices
into a personal area network. It is based on IEEE standard 802.15 which gives specifications for Wireless Personal Area
Network (WPAN).
b. Wi-Fi: stands for Wireless Fidelity. It is based on a set of wireless networking technologies known as
802.11. These include 802.11b, 802.11a, 802.11g and 802.11n. The range of Wi-Fi network transmission is about 30-
40m indoors and up to about 100moutdoors.
c. WiMax: stands for Worldwide Interoperability for Microwave Access. It is based on IEEE standard 802.16
and facilitates high speed wireless network links to both fixed and mobile devices. The range of a WiMax wireless
connection is around 3-10km.
REMARK A Hybrid network combines client/server and peer-to-peer architectures. It is the most commonly used
network architecture.
Different between Intranet and Extranet: these are networks that are used within organizations.
Intranet: An intranet is a private network based on TCP/IP protocols belonging to an organization usually a corporation
and is only accessible to the organizations members, employees, or others with authorization. Mostly protected using
firewall software or firewall device. They are now the fastest-growing segment of the Internet because they are much
less expensive to build and manage than private networks based on proprietary protocols e.g. companies, military, secret
services like MI5 and CIA, etc.
Extranet: An extranet is a controlled private network allowing customers, partners, vendors, suppliers, and other
businesses to gain information without granting access to the organization entire network. It is often a private part of a
website e.g. banks, etc. it is expensive to implement and maintained.
Page 84 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
Computer networks have improved the way people communicate. People all over the world can communicate and
collaborate in a matter of minutes thanks to networks. In organizations, computer networks serve as the backbone of
daily communication
d. Save costs
Shared resources mean reduction in hardware costs. Shared files mean reduction in memory requirements which
indirectly means reduction in file storage expenses.
e. Increased Storage Capacity
A stand alone computer might fall short of storage memory, but when many computers are on a network, the memory
of different computers can be used in such a case.
f. Teleconferencing or Videoconferencing
This is a communication technology that integrates video and voice to connect remote users with each other as if they
were in the same room. Each user needs a computer, webcam, microphone, and broadband internet connection to
participate. This enables organizations to save travelling cost for employees.
g. Backups: Files can be backed up more easily when they are all on a central file server rather than when they
are scattered across a number of independent workstations.
Page 85 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
The data source is John, the transmitter is John’s phone, the communication channel is the telephone cable or microwave,
the receiver is Peter’s phone and the destination is Peter.
Communication Software’s: To communicate over a network you need some communication software. Since there
are a number of different communication tasks, there are different kinds of software to manage each task. There are
NOS, Dialing software, File transfer software, Terminal emulation programs, Data encryption programs, and Instant
messaging programs.
b. Digital Signals
A digital signal is one in which information is represented as a sequence of binary values 0 and 1.These two values
represent two conditions, on or off, corresponding to two known levels of voltage or current.
Digital signals do not continuously vary as analog signals. Signals are transmitted within the computer as digital signals.
Systems that use digital technology are known as baseband systems.
3. Transmission Media
A transmission medium is the physical pathway that connects computers and other devices on a network. There are two
categories of transmission media: guided and unguided media.
3.1. Guided Media
Guided media are the physical links through which signals are confined to narrow path. They are made up of an internal
conductor (usually copper) bounded by jacket material. They are also called bounded or conducted media. Three
common types of guided media are used for data transmission.
a. Coaxial cable
b. Twisted pair cable
i) Unshielded Twisted Pair (UTP)
ii) Shielded Twisted Pair (STP)
Page 87 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
c. Fiber optic cable
4. Unguided Media
Unguided media do not use physical means to define the path to be taken. They provide a means for transmitting
electromagnetic waves but do not guide them. They are also called unbounded media. Examples of unguided media are
infrared waves, radio waves, microwaves and satellite.
• Communication Satellites. A communication satellite is a microwave relay station placed in outer space. A
microwave signal is transmitted from earth to the satellite which amplifies the signal and sends it back to earth.
The earth station transmits the signal to the satellite on an up-link, on one frequency and the satellite repeats those
signals on a down link which is on another frequency.
6. Communication Protocols
A protocol is a set of rules and conventions that govern how devices on a network communicate. Protocols set message
formats and procedures that allow machines and application programs to exchange information. These rules must be
followed by each machine involved in the communication in order for the receiving host to be able to understand the
message. The need for a protocol is obvious: it allows different computers from different vendors and with different
operating characteristics to ‘speak the same language’. A protocol may be physical or logical.
7.2. IP Address
An IP address is a unique identifying number given to every single computer on a TCP/IP network. All computers,
desktops, laptops, PDAs, phones, tablet PCs connected to the Internet, have IP addresses by which they are identified.
Two versions of IP addresses are available: IPv4 that uses 32 bits and IPv6 that uses 128 bits.
An IPv4 is made up of four sets of numbers separated by periods such as 123.23.168.22. Each of the four numbers
separated by periods can be any number from 0 to 255, making for a total of 4.3 billion potential IPv4 addresses
(i.e. 255 × 255 × 255 × 255).
An IPv6 has eight sets of numbers separated by colons such as 3ffe:1900:4545:3:200:f8ff:fe21:67cf.
IP addresses are assigned manually (by an administrator) or automatically (by DHCP or APIPA), unlike MAC addresses
that are assigned during manufacture. MAC addresses are physical addresses while IP addresses are logical addresses.
8. NETWORK SECURITY
Network security deals with the security of information during its transmission from a user on one computer network to
another.
8.1 Network Security Problems Network security problems can be divided roughly into four intertwined areas: secrecy,
authentication, nonrepudiation and integrity control. 1. Secrecy: This is also called confidentiality, and has to do with
keeping information out of the hands of unauthorized users. 2. Authentication: this deal with determining whom you
are talking to before revealing sensitive information or entering into a business deal. 3. Nonrepudiation: This deal with
signatures: How does amazon.ca prove that Musa indeed placed an order for a book, which Musa claims he never
placed? 4. Integrity of service: How does one ensure that the message received was really the one sent, and not
something that a malicious adversary modified in transit or concocted?
8.2 Types of attacks over a network: We will also classify the attacks that compromise network security as passive
attacks and active attacks.
a) Passive Attacks: These attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of
the opponent is to obtain information that is being transmitted. Passive attacks are very difficult to detect since they do
not involve the alteration of the data. Two types of passive attacks are:
Release of message contents: where an eavesdropper tries to learn the contents of what is being transmitted. This can
be prevented by encryption.
Traffic analysis: where the opponent tries to observe the pattern, frequency and length of messages being exchanged
which could be used in guessing the nature of the communication that is taking place.
b) Active Attacks: Active attacks involve some modification of the data stream or the creation of a false stream. It is
difficult to prevent active attacks absolutely because to do so would require physical protection of all communications
facilities and paths at all times.
8.3 Data compression and data encryption: In other to send data easily through a network, it is required to compress
it in other to reduce space for storage and bandwidth for transmission. Data compression is the process of converting
data from a large format into a smaller format, usually by the means of an algorithm. The data can be expanded back to
its original state, usually by means of decompression algorithm. The procedure for compressing data is known as data
compression techniques or coding schemes. Some popular examples of data compression techniques include:
a) Graphic Interchange Format (GIF): This is a widely used compression format that is used for storing and
transferring graphic images in relatively small files over computer network such as Internet.
b) Joint Picture Expert Group (JPEG): This is a popular file compression format for storing and transferring color
photograph and high quality images in relatively small files over computer network such as Internet.
c) Motion Picture Expert Group (MPEG): This is a standard file compression format for storing and transferring
digital audio and video (moving images) in relatively small files over computer network.
d) Huffman coding: This is a lossless compression technique in which the characters in a data file are converted to a
binary code, where the most common characters in the file have the shortest binary code, and the least common have
the longest.
e) Run-length encoding: This a compression technique that is designed for compressing, long, repetitive character
strings in a piece of text, as well as compressing byte of a monochrome image file.
An important characteristic feature in any coding scheme is the compression ratio. It is the ratio of a compressed file
to the original uncompressed file. There are two basic form of data compression: lossless compression and lossy
compression.
- Lossless compression is the form of compression in which the original data can be restores exactly. (Ex: zip).
- Lossy compression is the form of compression in which the original data cannot be restored exactly due to loss of
some of its elements (ex: mp3)
Data encryption refers to mathematical calculations and algorithmic schemes that transform plaintext into cypher text,
a form that is non-readable to unauthorized parties. The recipient of an encrypted message uses a key which triggers the
algorithm mechanism to decrypt the data, transforming it to the original plaintext version.
Page 90 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
LESSON 2: THE INTERNET AND THE WORLD WIDE WEB (WWW)
Plan
➢ History
➢ Definition
➢ Internet Access, ISPs and Services offered by the Internet like e-mail
➢ Advantages and Disadvantages
➢ WWW and E-mails
➢ Internet protocols
➢ Collaborative environments
➢ Social networking
➢ Electronic services like e-commerce, e-government, e-learning, e-banking, e-health, and computer assisted learning
(CAL) giving its advantages and disadvantages.
1.Generation
Generation in computer terminology is a change in technology a computer was being used. Initially, the generation
term was used to distinguish between varying hardware technologies but nowadays, generation includes both hardware
and software which together make up an entire computer system. Each generation is characterized by a medium
technological development which radically changed the way computer resulting in increasingly smaller, cheaper, more
powerfully and more efficient machines and they include the 1st, 2nd, 3rd, 4th and 5th.
Following are the main five generations of computers:
➢ First Generation: The period of first generation: 1940-1956. Vacuum tube based. And used batch Oss.
Inputs were based on punched cards and paper tape while output was displayed on print out.
➢ Second Generation: The period of second generation: 1952-1964. Transistor based. Still relayed on
punched cards and print outs. In this generation assembly language and high level programming language
like FORTRAN, COBOL was used. They were Batch processing and Multiprogramming Operating system
used.
➢ Third Generation: The period of third generation: 1964-1972. Integrated Circuit based. Users interacted
with computers using keyboards and monitors. An interface with operating system allowed the device to
run more than one program at a time with a central program monitoring the memory.
➢ Fourth Generation: The period of fourth generation: 1972-1990. Very Large Scale Integrated circuits
(VLSI) microprocessor based. In this generation Time sharing, Real time, Networks, Distributed Operating
System were used.
➢ Fifth Generation: The period of fifth generation: 1990-onwards. Ultra Large Scale Integration (ULSI)
microprocessor based. This generation is based on parallel processing hardware and AI (Artificial
Intelligence) software.
3.Base on purpose
Here they are grouped as special and general purpose computers:
➢ Special purpose computers: Also called embedded computers, it is designed for a particular job only.
➢ General purpose computers: Also called jack-of-all trade, it is designed to solve multiple problems/tasks.
Page 92 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
5. Thou shall not use a computer to bear false witness.
6. Thou shall not copy or use proprietary software for which you have not paid.
7. Thou shall not use other people’s computer resources without authorization or proper compensation.
8. Thou shall not appropriate other people’s intellectual output.
9. Thou shall think about the social consequences of the program you write or the system you design.
10. Thou shall use a computer in ways that show consideration and respect for your fellow humans.
2.Codes of Ethics and Professional Conduct
A code of ethics and professional conduct sets the standards for what is expected of a professional. They are promises
by professions to regulate themselves in the general interest of the society. Code of ethics for information technology
professionals encourage them to behave ethically and responsibly with the tools and information they have in their
control. Codes of ethics are promulgated by associations such as the British Computing Society (BCS), the
Association for Computing Machinery (ACM), the Institute of Electrical and Electronics Engineer (IEEE) etc.
a. The BCS (British Computing Society) Code of Ethics
This code sets out the professional standards required by the society as a condition of membership. It applies to
members of all grades, including students, and affiliates, and also non-members who offer their expertise as part of the
Society’s professional Advice Register.
Within this document, the term ‘relevant authority’ is used to identify the person or organization which has authority over
your activity as an individual. If you are a practicing professional, this is normally an employer or client. If you are a
student, this is normally an academic institution.
❖ The public interest
1) You shall carry out work or study with due care and diligence in accordance with the relevant authority’s
requirements, and the interest of system users. If your professional judgment is overruled, you shall indicate the
likely risks and consequences.
2) In your professional role you shall have regard for the public health, safety and environment.
❖ Duty to relevant authority
3) You shall avoid any situation that may give rise to a conflict of interest between you and your relevant authority.
You shall make full and immediate disclosure to them if any conflict is likely to occur or be seen by a third party
as likely to occur.
4) You shall not disclose or authorize to be disclosed, or use for personal gain or to benefit a third party.
❖ Duty to the profession
5) You shall uphold the reputation and good standing of the BCS in particular, and the profession in general, and
shall seek to improve professional standards through participation in their development, use and enforcement.
6) You shall act with integrity in your relationships with all members of the BCS and with members of other
professions with whom you work in a professional capacity.
❖ Professional competence and integrity
7) You shall seek to upgrade your professional knowledge and skill, and shall maintain awareness of technology
developments, procedures and standards which are relevant to your field, and encourage your subordinates to do
likewise.
8) You shall not claim any level of competence that you do not possess. You shall only offer to do work or provide
a service that is within your professional competence.
9) You shall accept professional responsibility for your work and for the work of colleagues who are defined in a
given context as working under your supervision.
b. The ACM (Association for Computing Machinery) Code of Ethics
1. General Moral Imperatives
As an ACM member I will…
1.1. Contribute to society and human well-being.
1.2. Avoid harm to others.
1.3. Be honest and trustworthy.
1.4. Be fair and take action not to discriminate.
1.5. Honour copyrights and patents.
Page 93 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
1.6. Give proper credit for intellectual property.
1.7. Respect rights to limit access to computing and communication systems.
1.8. Respect the privacy of others.
1.9. Honour confidentiality.
Page 94 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
3.Copyright, Design and Patent Act
This Act is designed to protect all types of intellectual property and ensure that authors or creators of a piece of
work receive both credit and compensation.
➢ Copyright: is a statutory grant that protects original work. Something that is copyrighted is not to be
reproduced, published or copied without permission from the copyright holder. Ideas are not protected by
copyright; only the specific presentation of the idea is copyrightable.
➢ Design: a design is the appearance or construction of something. A design is not immediately protected; it
must be registered with the appropriate institution.
➢ Patent: a patent is a grant to inventors that give them exclusive monopoly over their invention. It gives
them the right to stop others from producing, selling or using their invention. Unlike copyrights, patents
protect the ideas or design of the invention rather than any tangible form of the invention.
4.Health and Safety Act
This act is designed to protect employees. The original Act and its many added regulations cover the range of
hazards an employee may face like handling hazardous material. Some of the regulations that apply to the computing
industry are:
➢ Display Screen Equipment Regulations: it covers the precautions that must be taken when an employee uses
a visual display unit. The regulation covers items such as the chair which must be adjustable, the desk which
must be at the appropriate height, the monitor which must be adjustable and the lighting which must be
appropriate.
➢ Moving and Handling Regulations: these regulations lay down the rules for safe moving of heavy objects. All
employees involved in such activities must receive proper training on avoiding injury when moving heavy
objects.
➢ Control of Substances Hazardous to Health (COSHH): these regulations cover the safe storage and use of
hazardous materials. This includes items such as laser printer toners and anyone involved in replacing such
items must be made aware of the potentially toxic nature of toners.
_________________________________________________________________
Page 95 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
It is a computer program that can copy itself and infect a computer where it destroys files and disrupts the operation
of the computer. A virus can spread from one computer to another (in some form of executable code) when its host is
taken to the target computer.
❖ Worm
It is a self-replicating malicious program which uses a computer network to send copies of it to other computers
(nodes) on the network and it may do so without any user intervention. Unlike a virus, it does not need to attach itself
to an existing program. Worms cause harm to the network by consuming bandwidth whereas viruses corrupt or modify
files on a targeted computer.
❖ Trojan horse
It is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates
unauthorized access of the user's computer system. Once a Trojan horse has been installed on a target computer system,
a hacker may have access to the computer remotely and perform various operations, limited by user privileges on the
target computer system and the design of the Trojan horse.
❖ Spyware
It is software that monitors a computer user’s activity without their knowledge and reports it to a central location.
The purpose of spyware ranges from purportedly benign (enforcing copyrights, displaying targeted advertisements) to
very malicious (stealing passwords and credit card numbers).The most common way to get spyware on your computer
is to install it yourself when you are tricked into installing free software.
❖ Logic bomb
Also known as slag code, is a piece of computer code that executes a malicious task such as clearing a hard drive
or deleting specific files when it is triggered by a specific event. It is secretly inserted into the code of a computer's
existing software, where it lies dormant until that event occurs. This event may be a specific date and time or failure to
input a command at a certain time.
❖ Software Key loggers
It is software that record keystrokes entered by a user, usually to secretly monitor and/or maliciously use this
information. They can record instant messages, email, passwords and any other information you type at any time using
your keyboard. Software key loggers may also be embedded in spyware, allowing your information to be transmitted to
an unknown third party over the Internet.
❖ Denial or Degradation of Service (DoS) Attack
It is an attack to a computer system that puts it out of action by overloading it with data in a way that the system
was never prepared to handle. A DoS attack makes the system unavailable to its intended users.
❖ Social Engineering
It refers to a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking
other people to break normal security procedures. A person using social engineering to break into a computer network
might try to gain the confidence of an authorized user and get them to reveal information that compromises the network's
security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses.
❖ Cyber stalking Cyber bullying
It is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant
messaging (IM), or messages posted to a web site or a discussion group. Cyber stalking messages differ from ordinary
spam in that a cyber-stalker targets a specific victim with often threatening messages, while the spammer targets a
multitude of recipients with simply annoying messages.
❖ Cyber terrorism
Cyber terrorism can be defined as an act of terrorism committed through the use of cyberspace or computer
resources. As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be
considered cyber terrorism.
❖ Spamming
This is the act of sending unwanted bulk of e-mail for commercial purposes.
Other types of computer crime are: scamming, theft of computer equipment, pharming, spoofing, social engineering
and phreaking.
2.Measures to Combat Computer Crimes
➢ Install strong doors and locks to computer rooms to prevent computer equipment theft.
➢ Use access control mechanisms that will ensure confidentiality, integrity and availability.
➢ Encrypt confidential data stored in computers or transmitted over communication networks.
➢ Install anti-virus software and update them regularly.
➢ Install intrusion detection systems to help detect any unauthorized access to the system.
Page 96 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
➢ Install firewalls to prevent unauthorized access to local networks.
3.Computer Security
Computer security is the process of preventing and detecting the unauthorized use of computer systems from
accidental or intentional harm by unauthorized users. Prevention helps stop unauthorized users from accessing any part
of the computer system by controlling access to the system, while detection helps determine whether or not someone
attempted to break into the system, if they were successful, and what they may have done. Computer security has three
main goals, confidentiality, integrity and availability, which can be conveniently summarized by the acronym "CIA":
➢ Confidentiality ensures that information is not accessed by unauthorized persons.
➢ Integrity ensures that information is not altered by unauthorized persons in a way that is not detectable by
authorized users.
➢ Availability ensures that the system is running and reachable.
Different mechanisms are used to ensure the security of computer systems.
a. Authentication
Authentication is the process of determining if someone is who they declare to be. Three basic authentication
strategies are:
➢ something the user knows (password)
➢ something the user has (smartcard)
➢ something the user is (biometrics)
❖ Passwords
When authentication is done through the use of a password, knowledge of the password is assumed to guarantee
that the user is authentic. Passwords can be guessed or "cracked" and so if you are using a password to protect your
system, the following guidelines will help make them more secure:
➢ Keep your password secret.
➢ Change your password regularly.
➢ Make your password at least eight characters long.
➢ Do not use proper words of phrases - these can be found using a dictionary cracker.
➢ Use a mixture of upper and lower case letters and numbers.
➢ They should be different for each system that is used.
➢ The number of attempts to enter a correct password should be limited so as to frustrate intruders or hackers.
❖ Smart Card
A smart card is a small card that holds user authentication information. When the card is inserted into a card reader,
electrical fingers wipe against the card. The information in the card is read and used to authenticate the person. Cards
can be stolen and so are not as reliable as biometrics.
❖ Biometric
Biometrics is the science and technology of measuring and analyzing biological data. In computer security, biometrics
refers to the use of measurable biological characteristics such as fingerprints, eye retinas, iris patterns, facial patterns,
voice patterns or hand measurements, to identify a person. It is the safest authentication technique.
b. Encryption
Encryption is the process of transforming data or information using an algorithm into a form unreadable by anyone
except the intended recipient. The original message is known as plaintext, the algorithm is cipher and the encrypted text
is the cipher text. To read an encrypted data, one must have access to a secret key or password that enables you to
decrypt it. The original data is known as plain text, the algorithm is cipher and the encrypted data is cipher text. The
reverse process is referred to as decryption.
c. Firewall
A firewall is a computer program or a device designed to prevent unauthorized access to or from a private network.
Firewalls are implemented in either hardware or software form, or a combination of both. They prevent unauthorized
Internet users from accessing private networks connected to the Internet. All messages entering or leaving the network
must pass through the firewall which examines each message and blocks those that do not meet the specified security
criteria. Some Operating Systems like Windows XP, 7, 8, Mac OS X, and more have built-in firewalls.
d. Intrusion Detection
Intrusion detection is the art and science of sensing when a system or network is being used inappropriately or
without authorization. An intrusion-detection system (IDS) monitors system and network resources and activities and,
using information gathered from these sources, notifies the authorities when it identifies a possible intrusion.
Page 97 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
e. Digital Signatures
A digital signature is basically a way to ensure that an electronic document is authentic. Authentic means that you
know who created the document, and you know that it has not been altered in any way since that person created it. A
digital signature is a computed digest of the text that is encrypted and sent with the text message. The recipient decrypts
the signature and compares it with the received text. If they match, the message is authenticated and proved intact from
the sender.
Page 98 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
These computers or computer-related technologies take up new roles in various forms. Some people say these
technologies have made life easier and more convenient. Others say they have made life more complex and stressful.
Some of the impacts of computers include:
1.Positive impacts
ICT has impacted the world positively in several ways. The following are some of the benefits of ICT to mankind:
(1) Fostering of globalization: ICT has allowed different regions of the world not only to interact with one another but
also to be interdependent on one another. These regions share information quickly and efficiently in many different
areas, for example, governments, education, technology, commerce, medicine, and culture.
(2) Cost effectiveness of businesses: the computerization of business processes has rendered the business more cost
effective.
(3) Faster and cheaper communication: with the help of ICT, communication has also become faster, cheaper, and
more efficient.
(4) Job creation: one of the greatest advantages of IT is the creation of new and interesting jobs. Database
administration, computer programmers, system analysts, hardware developers, software developers, web designers,
and computer technicians, etc. etc.
(5) Unlimited working hours: it is now possible with the help of ICT for companies all round the world to open their
doors all day making purchase from other parts of the world easier and more convenient.
(6) Faster and easier operation on data: a computer allows a user to manipulate data easily and quickly for example
downloading information from the Internet, sending text and images over the Internet.
(7) Broader market for sellers and buyers, faster and less-problematic bookings, advancement of science and
technology, improvement of security systems.
2.Negative impacts
(1) Unemployment and Reliability is not guaranteed i.e. insecurity like privacy concerns, phone call interceptions, e-
mail hacking, stealing of personal information, etc. etc. is the order of the day with IT.
(2) Dominant culture: ICT has contributed to some cultures dominating others. The United States for example is a
country whose culture is known to influence cultures in other countries. Languages too have become overshadowed
with English becoming the principal communication language for business and many other things.
(3) Health problems: extended use of computers may cause finger and eyesight disorders such as repetitive strain
injury (RSI) and carpal tunnel syndrome (CTS). RSI refers to an injury to muscles and tendons caused by
continuous repetitive use of particular muscles especially by using a keyboard. CTS refers to a painful disorder
caused by compression of a nerve in the carpal tunnel; characterized by discomfort and weakness in the hands and
fingers and by sensations of burning or numbness. Other examples of ICT-related health problems are: visual strain,
headache etc.
(4) Lack of human abilities: computers are unable to reason, learn, or decide. They cannot understand and don’t have
emotions. They cannot adapt to unexpected circumstances. Consequently, they are incapable of doing some of the
things that human beings would normally do.
(5) Addiction: games, chat rooms, search engines, shopping sites that can keep users occupied for hours and days have
cause some people to forgo their basic daily duties because of their strong commitment to these exciting Internet
services.
(6) Electronic waste (E-waste): computer and related devices usually generate e-waste. E-waste is the collective
name for all electronic devices that are no longer useful as originally indented. E.g. computers, TV, DVD players,
photocopiers are examples of e-waste. These wastes can be recycled. It is the fastest growing segments of the
world’s waste stream.
(7) Digital divide: It is the gap between those with regular effective access to digital technologies and those without
i.e. the use of IT widens the gap between the developed (rich) countries and the developing (poor) countries. Many
developing countries do not have the expertise or the money to invest on IT and these countries consequently tend
to become poorer and poorer. Developed countries on the other hand become richer and richer. Hence IT fosters
digital divide.
_________________________________________________________________
Page 99 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
IMPACTS OF SOCIAL NETWORKS
The use of social networking has become increasingly relevant today. Smartphones have added great potential by
enabling an increase in the use of social networking and in the number of hours spent on such sites. Being online for a
long time and being able to access different information from different sources at the same time could cause information
overload. People also could face problems in filtering the information they receive and they might find it difficult to
decide which sources they can trust and, therefore, which to select.
Social networking can be defined as “the relationship that exists between networks of peoples”. Online social
networks give people the ability to communicate and share their interests with others over long distances. However,
social networking sites provide information for a group of people who share common interests. Overall, the term ‘social
media’ is broader than ‘social networking sites.
Some of the positive impacts of social networking are highlighted as follows:
➢ It enables easy access to a vast quantity of materials related to ones need.
➢ It makes peoples more sociable.
➢ Individual identity and self-expression.
➢ Creativity.
➢ Sense of belonging and collective identity.
➢ It improves the academic experience in general.
➢ It is useful for clarification of news.
➢ It is useful to keep in touch with family and friends.
➢ It is useful for sharing tutorials.
________________________________________________________________
TYPES OF COMPUTING ENVIRONMENTS
➢ Cloud computing: It is a collective use of software and hardware to deliver services over a network especially the
Internet. It works by giving users data and information on a cloud available to have access to anywhere, anytime.
Its categorized into cloud computing networks as follows; public, private, community and hybrid networks and
provides its services in three ways; infrastructure, platform and software as a service.
Advantages:
• Less cost.
• Available 24/7 anywhere on any computer related device.
• Flexible in capacity.
• Automated updates on software.
• High security and easily managed.
Disadvantages
• Lack of personnel’s
• Difficult to fix what you can’t see.
• Lack of options.
➢ Time sharing environment: This type of computing allows multiple users to share the system simultaneously.
Each user is provided a time slice and the processor switches rapidly among the users according to it.
➢ Client server environment: Here the client requests a resource and the server provides that resource.
A server may serve multiple clients at the same time while a client is in contact with only one server.
➢ Personal computing environment: Here there is a single computer system where all the processing is done.
Merge cells: This option merges the cells across the selected rows and columns and maintains default alignment
for the data type of the first cell of the merged cells.
To merge selected cells ➜ On the Home tab, in the Alignment group, display the Merge & Center list, and then
click Merge Cells to merge the entire selection, maintaining the horizontal alignment of the data type in the first
cell.
❖ Working with multiple sheets
By default, a new workbook includes only one worksheet. You can add blank worksheets to the workbook or copy
or move worksheets from another workbook.
To insert a new worksheet
➜ Click the New sheet button at the right end of the worksheet tab section.
➜ On the Home tab, in the Cells group, click the Insert arrow, and then click Insert Sheet. To rename a
worksheet.
● Right-click the worksheet tab and then click Rename.
● Enter the new worksheet name and then press Enter.
Excel allows you to build formulas and functions that reference data stored on different worksheets within the
same workbook. So you can be on worksheet3 and refer back to a cell worksheet1.when referring to a cell on a
different worksheet, you type the name of the worksheet followed by an exclamation sign (!) and then the column
letter and the row number. If you are on worksheet2 in cell D9 and want to refer back to cell C4 on
worksheet1, the reference would look like this: D9 =worksheet1!C4.
If you are on a worksheet named March, and you want to refer back to cell C7 on a sheet name January, the
reference would look like this: =January!C7. If you want to make that an absolute reference, it would look
like this: =January!$C$7.
Excel also allows you to reference data stored in a different workbook i.e. a different Excel file. A cell reference to a
different excel workbook (file) would look like this: [workbook name]worksheet name cell name, e.g.
=[workbook1]worksheet1!N10. If its absolute then it would look like this: =[workbook1]worksheet1!$N$10
❖ Functions
Spreadsheets usually include some built-in formulas called functions which are used for performing predefined
operations using the operations keyword. E.g. =SUM(D2:D15) is a function with the keyword “sum” and
this =D2+D3+D4+D5 is a formula.
Different calculations: The following are some of the many other functions for performing mathematical
calculations on spreadsheet.
- Copy a formula: to copy in a spreadsheet is just like in MS Word, click on the start cell and drag until you reach
the desired cell, then right click and chose copy.
The following are mathematical functions (sum, product, average, division (keyword is quotient),
subtraction (uses only a formula). Other advanced functions.
➢ Exponents: D4^B2,
➢ Square root : =SQRT(D4),
➢ Minimum : =MIN(D2:D10),
➢ Maximum : =MAX(D2:D10),
➢ ROUND() to round a set a values to a specified number of decimal places,
➢ TODAY () to show the current date,
➢ Rank: =RANK(D2,D$2:D$10,O or 1). 0 is decreasing order and 1 is increasing,
➢ COUNT: =COUNT(D2:D10) returns the number of cells that contents numeric value,
➢ Count-if: =COUNTIF(D2:D10, “condition”),
➢ The SUM-IF: =SUMIF(D2:D10, “condition”),
➢ IF: =IF(logic test, “condition if true”, “condition if false”),
Page 103 of 129
WRITTEN BY MR. TAKU ARREY CLOVETTE (MR.TK) 671085471
FORM FIVE FULL NOTES NEW 2024/2025
➢ Nested if: it is the use of more than one IF function in a function e.g. =if (logic test, “condition”, if (logic test,
“condition”, if (logic test, “condition”, if (logic test, “condition”)))). Mostly used to give grades to students‘
scores like A grade, B grade, C grade etc.
➢ Concatenation: the function concatenate is used to relate up to 255 chain of text in a single chain. The elements
to be related can be text, numbers, and cell reference of cells or a combination of all. For example if in the
worksheet the surname of a person is in cell A1 and the name is in cell B1, these two elements can be combined
in one value in another cell with the help of this function.
Syntax: =concatenate (text1, text2, text3, …) OR concatenate (A1, B1, C1, ..) Which relates the texts
or contents of the cells without a space.
=concatenate(A1, “ ”,B1). Relates the contents of the cells with a space i.e. a space between the contents of A1
and that of B1. NB: the next argument is a space.
Remark: you can equally use the ampersand or character “&” like the operator to replace the concatenation
function with a formula. E.g. =A1 & B1 which is equivalent to the function =CONCATENATION(A1, “&”
,B1).
➢ COUNTA: =COUNTA(D2 :D10) Returns the number of cells that contain any content (are not empty).
➢ COUNTBLANK: =COUNTBLANK(D2 :D10) Returns the number of empty cells.
To hide selected rows or columns.
1. On the Home tab, in the Cells group, display the Format list.
2. In the Visibility section of the Format list, point to Hide & Unhide, and then click Hide Rows to hide the selected
row(s) or Hide Columns to hide the selected column(s).
To find hidden rows or columns in a worksheet
Open the Go To Special dialog box, click Visible cells only, and then click OK. In the highlighted content, cells
adjacent to hidden cells have a thin white border.
To unhide rows or columns.
1. Select the columns or rows on both sides of the hidden column(s) or row(s).
2. Right-click the selection, and then click Unhide.
Or
1. Select the rows or columns on both sides of the hidden rows or columns.
2. On the Home tab, in the Cells group, display the Format list.
3. In the Visibility section of the Format list, point to Hide & Unhide, and then click Unhide Rows to display the
hidden row(s) or Unhide Columns to display the hidden column(s).
To hide a worksheet
➜ Right-click the worksheet tab, and then click Hide. To display a hidden worksheet
1. Right-click any visible worksheet tab, and then click Unhide.
2. In the Unhide dialog box, select the worksheet you want to display, and then click OK.
Error Types: Certain types of errors happen in excel because of one of the following reasons.
Type When It Happens
#DIV/0! When you divide by ZERO
#N/A! When a formula or a function inside a formula cannot find the referenced data
#NAME? When the text in a formula is not recognized.
#NULL! When a space was used instead of a comma in formulas that reference multiple ranges. A
comma is necessary to separate range references
#NUM! When a formula has numeric data
#REF! When a reference is invalid
#VALUE! When the wrong type of operand or function argument is used
INSTRUCTIONS TO CANDIDATES
Read the following instructions carefully before you start answering the question in this paper. Make sure you have
a soft HB pencil and an eraser for this examination.
1. USE A SOFT HB PENCIL THROUGHOUT THE EXAMINATION.
2. DO NOT OPEN THIS BOOKLET UNTIL YOU ARE TOLD TO DO SO.
Before the examination begins:
3. Check that this question booklet is headed “Ordinary Level -0795 Computer Science 1 ”.
4. Fill in the information required in the spaces above.
5. Fill in the information required in the spaces provided on the answer sheet using your HB pencil: Candidate
Name, Exam Session, Subject code and Candidate Identification Number.
Take care that you do not crease or fold the answer sheet or make any marks on it other than those asked
for in these instructions.
Two Hours
Answer any FIVE questions
All questions carry 20 marks each. For your guidance, the approximate mark for each part of question is indicated
in the brackets
You are reminded of the necessity for good English and orderly presentation in your answers.
In calculations, you are advised to show the steps in your working, giving your answer at each stage.
X A
P
Y
R
B
Q
Figure 1
X Y P Q R
0 0
0 1
1 0
1 1
Figure 2
(3 marks)
(iii) Write the logic equations for outputs P, Q and R in terms of X and Y. (3 marks)
______________________________________________________________________________________________
4. (a) A team of system developers has identified six tasks described in the table below:
Task No. Task Description Task Constraints Duration
(in days)
A System specification None 3
B Try software Starts after system specification 2
C Customize Test software Starts after software trial 4
D Purchase of Test hardware Starts after system specification 3
E Install software Starts after Hardware Testing 2
F Train staff Starts after software customization 1
Table 2
Days
Tasks 1 2 3 4 5 6 7 8 9 10 11
A
B
C
D
E
F
(iii) Define the terms lag time and critical path as used in project development. (2 marks)
(iv) State the critical path of the project above and hence determine the project duration. (2 marks)
(b) A school’s computer resource center has stand-alone computers. The school has row decided to
connect the computers into a local network and to the internet.
(i) State what you understand by the network terms ISP and protocol. (2 marks)
(ii) Give the name of a protocol that
- governs the movement of data across the internet.
- is used to access pages on a web server. (2 marks)
(iii) Briefly explain the following database concepts :
- Primary key
- Field
- File
- Query
(4 marks)
(b) Showing all steps in solving the following number representation problems.
(i) Convert the hexadecimal number 2C into a binary number. (2 marks)
(ii) Convert the octal number 67 into hexadecimal. (3 marks)
(iii) Perform the binary addition 10112 + 11012 (3 marks)
(c) (i)
State what you understand by backup and give one characteristic of a backup storage device
(ii)
Briefly explain the term portability in relation to:
- Storage devices
- Software (2 marks)
___________________________________________________________________________________________
6. (a) (i) With the aid of diagrams, distinguish between serial and parallel data transmission. (5 marks)
(ii) Briefly describe the following modes of transmission giving an example in each case where they are used :
Simplex, half duplex, full duplex. (6 marks)
(b) (i) Name and briefly explain the function of the three main parts of the CPU. (6 marks)
(ii) State three main stages of the machine cycle. (3 marks)
__________________________________________________________________________________________
7. (a) (i) State the main technological feature that distinguished each of the following computer classifications:
- 1st generation
- 2nd generation
- 3rd generation
- 4th generation (4 marks)
(c) (i) State two advantages and two disadvantages of using electronic mail as a means of communication.
(4 marks)
(ii) State a difference between intranet and extranet. (2 marks)
For your guidance, the approximate mark for each part of question is indicated in the brackets
You are reminded of the necessity for good English and orderly presentation in your answers.
In calculations, you are advised to show the steps in your working, giving your answer at each stage.
SCORE
Marked by: ………………………………………..................................
Do all tasks (Task 1, Task 2 and Task 3) specified in this question paper.
Examine the text below and answer the questions that follow.
1. Launch a word processor. Set the page orientation to portrait, and the page size to A4. Type the given
passage.
You are not required to place a border around the passage. (8 marks)
2. Format the heading of the passage as follows: (4 marks)
a. Font size: 18
b. Font name: Arial
c. Alignment: Centre
d. Case: Upper case
3. Format the rest of the text as follows: (4 marks)
a. Font size: 13
b. Line spacing: 1.5
c. Alignment: Full justification
d. Font name: Times New Roman
4. Format the table as follows: (2 marks)
5. Use bullets to itemsize the list of ICT tools in the passage. (2 marks)
______________________________________________________________________________________
The worksheet below shows the prices of various items in local supermarkets. Study it and answer the questions
that follow.
A B C D E F G
2 Supermarkets
3 Lowcost PicknPay GreenShop Rainbow
4 Milk 1400 1200 1250 1150
Items
___________________________________________________________________________________________
6. Type the label “Average” in cell G3. Then insert a formula to calculate the average cost of milk in Cell G4
Copy the formula to the cells in the range G5:G7. (2 marks)
7. Write in the space below, the formula in cell G7 after the copy procedure above is done. (1 mark)
__________________________________________________________________________________________
8. Select the range B3:G7, and format the cells in the range to have single borders. (2 marks)
9. Create a column chart using the entries in the range B3:F6, with prices on vertical axis and
supermakets in the horizontal axis. For each supermarket, a separate vertical bar shoul be draw for
each food item. (4 marks)
10. Save your work as Task 2
11. Print Task 2.
The C and Pascal programs below perform the same task using modular arithmetic. Select any one of them and
answer the questions that follow.
C Program
#include <stdio.h>
int main (void) {
int i, m , km, num ;
i=1;
while (i <= 3 ) {
printf ( "i = %d\n" , i) ;
printf ("Enter number of metres : ") ;
scanf("%d", &num) ;
km = num / 1000 ;
m = num % 1000 ;
printf ( "%d m is equivalent to %dkm and %dm\n\n", num, km, m) ;
i = i+1 ;
}
char c = getchar( ) ;
}
Pascal program
Program Numbers ;
var i, m , km, num : integer ;
BEGIN
i := 1 ;
while (i <= 3 ) do
begin
writeln ( ‘i = " , i) ;
write (‘Enter number of metres : ‘) ;
readln (num) ;
km := num div 1000 ;
m := num mod 1000 ;
writeln ( num, ‘m is equivalent to ’, km, ‘km and ’, m, ‘m’) ;
writeln ;
i : = i+1 ;
end ;
readln ;
END.
1. Launch either a C or Pascal program development environment, and key in the corresponding programs, compile
the program. If any errors, keep correcting and compiling until all the errors are corrected. Save as Task 3.
(2 marks)
2. Run the program and provide 25, 300, and 4500 when prompted for a number, pressing the <Enter> key after
each number is entered. Write the output you observe. (3 marks)
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
4. The keyword “while”, which is used in the program is the program is an example of which programming construct?
Explain how the stated programming construct works. (2 marks)
____________________________________________________________________________________________
Programming construct :
____________________________________________________________________________________________
____________________________________________________________________________________________
Explantation :
___________________________________________________________________________________________
5. Save your work as Task 2.
6. Print your work.
(d) (i) Name any four components of a Data Transmission System. (4 marks)
(ii) Briefly describe the role of any two of the components listed above. (2 marks)
______________________________________________________________________________________________
4. (a) Study the line of codes written in HTML below and answer the question that follow:
1. <html>
2. <head>
3. <title> Computer Science </title> </head>
4. <body>
5. <marquee><font size = “16” color = “red”><q><u> THANK YOU
</u></q></font></marquee>
6. <br>
7. <hr size = 16 width “50%” align = “center” color = “blue”>
8. <ol type = “I” start = “3”>
9. <li> English Language </li>
10. <li> Computer Science </li>
11. <li> Arithmetic </li>
12. </ol>
13. </body>
14. </html>
(b) A student gets up a 5:30 AM and performs the following activities shown in Table 2 within the indicated duration,
in order to get to school.
Table 2
No. Activity Duration
In Minutes
1. Facial clean-up 10
2. Heat water for shower 15
3. Prepare breakfast 10
4. Take a shower 15
5. Clean shoes 5
6. Dress up 15
7. Take breakfast 10
8. Walk to school 15
Assuming that activities 2 and 3 can start at the same time, as well as activities 5 and 6,
(i) Draw a Gantt chart for the above activities. (6 marks)
(ii) What do you understand by the terms:
- Critical path
- Slack time (4 marks)
(iii) Determine the critical path for these activities. (2 marks)
Once upon a time, there lived a very cunning and mischievous fox. He used to speak to other
animals sweetly and gain their trust, before playing tricks on them. One day the fox met a stork. He
befriended the stork and acted like a very good friend. Soon, he invited the stork to have a feast with him.
The stork happily accepted the invitation.
The day of the feast came, and the stork went to the fox’s house. To her surprise and disappointment,
the fox said that he could not make a big feast as promised, and just offered some soup. When he brought
the soup out of the kitchen, the stork saw that it was in a shallow bowl ! The poor stork could not have any
soup with its long bill, but the fox easily licked the soup from the plate …
The day arrived and the fox reached the stork’s place. After exchanging pleasantries, the stork
served souup for both of them, in a narrow jar with a long neck. She was able to have the soup very easily
with her long bill, but the fox obviously could not. After finishing hers, the stork asked the fox if he was
enjoying the soup. The fox remembered the feast he himself had given the stork, and felt very ashamed. He
stammered, "I …I’d better leave now. I have a tummy ache." Humiliated, he left the place running.
Morale : One bad turn begets another.
Source https://www.kidsworldfun.com/shortstories_foxandstork.php
Figure 1
1. State the name(s) of the word processor(s) installed in your PC.
______________________________________________________________________________ (1 mark)
2. Launch a word processor program from your PC and type the text of Figure 1.
Justify the three paragraphs. (10 marks)
3. For the title, Bold, Center, underline, and apply a font size of 16. (1 mark)
5. Select the body text and apply a serif font of size 12. (2 marks)
6. Insert the image called ‘foxandstork’ (found on the desktop) at the left of the first paragraph
and wrap text to its light. (2 marks)
8. Insert a footer with the text ‘One bad turn begets another’ at bottom left. (1 mark)
9. Save your work as Task 1 in your working directory.
10. Print copy of task 1.
Figure 2
1. Create a workbook called Task 2 and enter the worksheet data exactly as provided. (5 marks)
3. Add the following three column headers to the right of column I: SubSat, Avge and Rank. (1 mark)
4. For the first student Njie Fabian, use the suitable spreadsheet functions (or formulas) to calculate:
a) number of subjects sat, (2 marks)
b) average (correct to 2 decimal places ) and (2 marks)
c) rank (2 marks)
d) Hence, calculate similar values for the other students. (2 marks)
5. Save your work as Task 2 in your working directory.
6. Print a copy of Task 2.
The C and Pascal programs below perform the same task. Select any one of them and answer the questions that follow
C Program
#include <stdio.h>
int main (void) {
int num ;
printf ( "Enter a number : ") ;
scanf("%d", &num) ;
while (num < 5 ) {
printf ( "%d " , num) ;
num = num+1 ;
}
getchar( ) ;
}
Pascal program
program Numbers ;
var num : integer ;
BEGIN
write (‘Enter a number: ‘) ;
readln (num) ;
while num < 5 do
begin
write( num, ‘ ’) ;
num := num + 1 ;
end ;
readln ;
END.
1. Launch either a C or Pascal program development environment, and key in the corresponding programs, compile the
program. If any errors, keep correcting and compiling until all the errors are corrected.
(2 marks)
2. Run the program and enter -2 when prompted for a number. Write the output you observe in the space below.
Write NONE if there is no output. (1 mark)
_______________________________________________________________________________________________
_________________________________________________________________________________________
3. Run the program again but this time, enter 10 when prompted for a number. Write the output you observe in the space
below. Write NONE if there is no output. (1 mark)
_______________________________________________________________________________________________
_________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
_______________________________________________________________________________