Académique Documents
Professionnel Documents
Culture Documents
$HEPHAT PHIRI
What is Computer?
Computer is a data processing machine (or device) that under control of a system takes input, processes it
and gives output to another machine. Computer come in different shape, sizes and capabilities. We’ll take a
closer look at their types under the heading ‘Types of Computers’.
Computer studies or computer science is a vast field that deals with all devices that contain a
microprocessor and performs some kind of data processing task. It also covers how the computer systems
are created and maintained to keep it working.
Information Technology
Information technology is the study of people, procedures and devices that create, store, manipulate and
distribute information. It mostly deals with the use of devices such as a personal computer and smart
phone. Students of this subject learn to use a variety of application software.
Data
Data is raw facts and figures. It has a type and a value e.g. Salman, 1.62, 32 Km, 05/05/2015 etc. In this
example “Salman” has the type of text or alpha-numeric, 1.62 is a floating-point number (a number with
decimal point), 32 is an integer (whole number without fractional part) and 05/05/2015 is a date.
Why do we need to provide type of data? Why can’t computer ‘guess’ the correct data type? Computers are
excellent data processing machines but we need to tell them the basics. In the example above if the
computer would wrongfully guess the data type of the data item 05/05/2015 as number, it would try to
divide 5/5 and then divide the answer with 2015. That’s absolutely not what we want so we’d better explain
the data type to computer beforehand.
Information
Information is processed or organized data that is understandable by humans. It might need interpretation
or arrangement before it could be human understandable. E.g.
Name Height Distance Date of Hiring
So in essence humans work with information and computer work with data.
Software
People
Hardware
Hardware is the physical components of a computer system e.g. Keyboard, monitor etc.
Hardware items can be further classified into the following main categories.
Input Devices
Output Devices
Storage Media
Processing Units
Communication
Devices
Software
Program or software is instructions and data given to computer to make it perform any useful task.
Another more formal definition of software would be; collection of programs and its associated
documentation is called software. For example Microsoft Word, Adobe Photoshop and AutoCAD.
© Adobe Corporation ©
Free
Shareware Downloads
Unbiased
Since computer don’t have emotions they are unbiased. They cannot favour anyone, cannot be bribed or
become an enemy.
More organized
They way computers store data forces the user to keep it clutter free. This is also evident from the output
they produce.
Communicate
Computer takes input from the user, processes it and gives output. It can also store data for later use. It can
also be used to send or receive data.
Input Devices
Keyboard
Keyboard is the oldest device that is still widely used in computer systems.
You must have seen the keyboard hundreds of times. Can you label the keys on the picture with the help of
your friends?
Function Keys
Pointing Devices
Mouse
Mouse is the most common input device for selecting option from a Graphical User Interface (GUI). Initially
mouse had only one button where single click showed a pop-up menu and double-click executed the default
command. Modern mouse has two buttons and a scroller. Gaming mouse can have 9 or more buttons!
Trackball
Trackball has a semi-spherical shape. A user can rotate the ball to control the cursor. Two buttons are
provided at the bottom for clicking, right-clicking and double clicking. Some trackballs can also perform click
function from the ball itself.
Joystick
Traditionally used for drawing CAD (Computer Aided Design) maps. Later used for gaming. It is still used to
control robots in industries though.
Game Controllers
Game controllers come in a variety of forms and shapes. Some are specific to a particular type of game such
as car driving games, flight simulators or first person shooter; others are generic like game pads.
Touch Screen
Old touch screens required a stylus to select a menu option or an icon but modern touch screens allow for
human touch. They are rather quick as user doesn’t have to move the cursor around. Touch screens also
allow use of gestures that perform slightly more complex commands such as zooming, resizing and scrolling.
Graphic Tablet
Well it’s not as heavy as old stone tablets and you don’t even have to inscribe using a chisel and hammer. It
is a slate like object on which you can draw or write anything using a stylus. Computer recognizes the hand
written characters and converts them to text. Artists and graphic designers find it way easier than using a
mouse to draw illustrations. Concept of modern tablet PC is based on graphics tablet. The only difference is
that it is operated with a finger rather than a stylus.
Scanning Devices
Microphone
It is used to take voice input. Since human voice is an analogue quantity, it takes analogue input
and then converts it to digital form. Typical uses of microphone are voice chatting, voice mail,
video conferencing, adding vocals and narration.
Biometric Devices
Input Devices for the Disabled People
Computers are very accessible device that many people with disabilities or imparity can still use it. People
who are visually challenged can use high contrast screen, text to speech output, braille keyboard/printer,
voice recognition.
For hearing impaired visual clues can be used to guide the user. For physically challenged people, specially
designed keyboard such as Dvorak layout, trackball instead of mouse and even a wind pipe can be used to
give input.
light pen
Sensors
A sensor is an input device that detects/observe changes in physical quantity. E.g. pressure, heat, speed etc.
since all physical quantities are in the form of analogue data an ADC (Analogue-to-Digital Converter) is
needed to convert the data into digital (computer understandable) format.
Pictures of Sensors
Output Devices
We can produce two types of output from the computer system; softcopy or hard copy. Any output that is
printed on a paper is called hard copy and any output that is not or cannot be printed is called softcopy.
Printers
Printers are used to take hard copy output. Printers vary vastly in their size, shape and capabilities. Some
main types of printers are discussed here.
Dot-Matrix
This is the oldest printing technology that survived. The comparison of features is given below:
Picture of dot-matrix printer, printout and sound
Inkjet
This is a non-impact printer that prints by throwing ink droplets (or bubbles) on paper. These bubbles create
pattern on the paper.
LaserJet
LaserJet printers charge printable area of a paper. It then throws powdered or liquid ink on paper. It sticks
only to charged area of the paper. A heating drum makes it permanent.
Plotters
These are huge colour printers that are used to print on very large papers and pan-a-flex.
Monitors
These are output devices used to display data from computer.
CRT’s
These are high resolution high refresh rate monitors used for graphics and gaming. They emit harmful rays.
LCD’s
Fixed resolution and low refresh rate monitors used in laptops.
Processing Units
This is the chip that performs all the data processing. The most common processing unit is a CPU (Central
Processing Unit). Another well-known processing unit is Graphics Processing Unit (GPU) found in all 3D
Graphics Cards.
The power and capabilities of a processing unit can be evaluated on the following criteria:
Criterion Measuring Unit Why it matters
Clock Speed Hz, KHz, MHz, GHz Higher clock speed is better.
The number of bits of instruction, data or address that can be
Word size bits (4,8,16,32,64)
processed at one time.
Cache KB’s or MB’s See details later
Front Side Bus MHz, GHz The speed at which processor can communicate with the RAM
Processor It’s pretty much like running two or more processor at a time
whole number
Count/Cores except they share the communication lines
Cache
Cache is a temporary storage (usually) built inside the processor. Modern processor can process large
number of instructions. When running a specific type of application a few commonly used instructions are
repeated. Instead of fetching the instructions from the RAM every time an instruction is needed, some
instructions are stored in cache. Caching saves the round trip to RAM and fetches the instruction from the
cache. This significantly speeds up the processing and improves performance greatly. As the whole logic is
created and implemented by the processor manufacturer, user has no control over it.
Flowchart of cache hits/misses
Storage Media
Computer uses two types of memories to store data; internal and external. Internal memory is made up of
ROM (Read Only Memory) and RAM (Random Access Memory). These two are required to make it work.
External memory (auxiliary or backing storage) can be added to extend the capabilities of internal memory.
External memories include HDD (Hard Disk Drive), CD-ROM (Compact Disk Read Only Memory), DVD (Digital
Versatile Disk), Blu-ray Disk or Flash Disk Drive. Internal memory is part of system unit whereas external
memory can be added or removed.
There are two types of memories in terms of how long can they store data;
Volatile memory
This type of memory loses its contents when the power is switched off. For example RAM and processor’s
internal registers collectively called IAS (Immediate Access Store). It contains operating system and all the
running programs as well as user files open at that moment.
Non-volatile memory
This type of memory retains its contents even if the power is switched off. For example ROM contains the
first instructions for the processor to start-up the computer and these never change so ROM is non-volatile.
Primary memory
Primary memory is high speed memory that is directly accessible by the processor. Since it is expensive it is
usually very limited and since it is volatile we need secondary storage to store data permanently.
RAM
RAM is a chip installed on the motherboard inside the system unit. The amount of RAM determines how
many programs can be ‘run’ at one time. RAM is the only memory that processor can use to store data back
and forth. Since the speed of processor is so fast it cannot store data directly on any other external device.
All the data is first copied to RAM and then transferred to other storage media and vice versa. The time delay
you notice while running a program or starting up your computer is actually time required to copy data from
external storage to your computer’s RAM.
ROM
This is also a chip built into motherboard. It contains two critical programs; BIOS (Basic Input Output System)
and Bootstrap Loader. When you start the computer, computer’s internal memory is empty (except for
ROM) so it doesn’t know what to do. ROM provides the initial instructions for the processor to start working.
The first program from the ROM that loads up is called POST (Power-On Self-Test). It checks for all the
required devices if they are connected and are working properly. Any errors at this stage are reported on the
screen or a sequence of beeps is heard.
Later another program starts that is called bootstrap loader. It will search of the presence of operating
system on external storage and then hands over the control to the operating system. If it doesn’t find an
operating system, it reports an error and the computer stops.
Secondary memory
Secondary memory is low speed memory that cannot directly communicate with the processor. It is
inexpensive and slow in speed but is non-volatile. It is also called backing storage and auxiliary storage.
Magnetic Media
It reads and writes data at high speed from metallic or plastic surface.
Magnetic Tape
Provide serial access to data. Used for complete system backups and restore. In past used to store data for
batch processing.
Magnetic Stripe
Found on magnetic cards. Can be read by card readers, pin pads and ATM’s. Very little data storage with very
little security. Can be duplicated and forged.
Zip Disk
Variant of floppy disk with larger capacity and thicker in size than floppies. Can store up to 1 GB of data.
Used in past to store multimedia files.
Floppy disk
Requires a drive to read/write data. Small and light weight but can only store up to 1.44 MB of data.
Optical Media
All the optical media use some kind of laser to read the data. The data is stored in spiral tracks that are
divided equally. This division is not based on the length of track rather on the size of data it stores. That’s
why tracks on the inner side are shorter in length compared to the tracks on the outer side. Inner spirals
have high data density which means data is store close to each other and data on the outer track is spread.
In any case the size of the track (in terms of data) is always the same.
CD-ROM
CD’s of up to 700 MB’s can be read but we can’t write on them.
CD-R
Can read CD’s and record on blank writable CD’s. Data once written cannot be changed or re-written.
CD-RW
Same as CDR but it can also write on a special re-writable CD. Re-writable CD’s can be used about 10 times.
DVD-ROM
DVD uses even more precise laser rays to read data thus capable of reading both CD’s and DVD’s. DVD’s have
a typical capacity of 4.7 GB’s.
DVD-R
It can read both CD’s and DVD’s and write DVD’s as well as CD’s.
DVD-RAM
Can read and write DVD’s at a higher speed. Since these DVD’s are re-writable that’s why it’s called
DVDRAM.
Blu-Ray
Blu-rays have huge capacities of 25, 50 and 100 GB. It is compatible with DVD’s but not CD’s. It is only
available as read only.
Magneto-Optic Disk
Used in music players as a replacement of cassettes and CD/DVD’s. Now obsolete.
Communication Devices
Modem
Short form of ‘Modulation’ and ‘Demodulation’. Modulation means to convert analogue waves into digital
and demodulation is converting digital signals into analogue. A modem is used to connect to the internet
using dial-up connection. Slow in speed and costs of phone call apply. Phone line is busy when modem is in
use.
Router
Used to connect to a wide area network such as the Internet. Can be wired or wireless. Provides very high
speed data transfer digitally. Determines the next best path for a data packet.
Hub or Switch
Hubs are obsolete due to slower speed and poor security. Switches have replaced hubs. Used to transfer
data from one computer to another. Essential to form a star network.
Motherboard
Used for internal communication of data inside computer system. Transfers data between primary and
secondary storage, graphics card, external cache, network card and sound card etc.
Continuous Discrete
Less accurate, more chances of reading errors More accurate, less chances of reading errors
Measuring Units
Smallest storage unit is a bit. A bit can be set on or off meaning it has a logical value of 1 or 0. An individual
bit cannot be processed by a computer. A processor needs at least a group of bits to process or modify it.
Typically a group of 8 bits is considered a Byte.
8 Bits 1 Byte
A processor completes a cycle in a fraction of a second. To find out how many cycles occur in a processor, we
use the frequency of the quartz crystal that generates pulses. 1 Hertz would mean that a crystal generate a
pulse every second.
In communication speed is calculated as bits per second bps, whereas for storage media we’d use Bytes.
Types of Computers
Numerous types of computers are categorized and named according to their size, shape or specification.
Here are some of the computers discussed:
Mainframe
They are the most powerful, largest in size and oldest type of computers. The first computers that were
made in 40’s, 50’s and 60’s were all mainframes but modern laptop computer can beat these huge
computers in speed and performance. So where are they now? Specially designed super computers are still
pretty much like an array of mainframes. The speed of modern supercomputers is measured in GigaFLOP
that is Billions of Floating Point Operations per second.
Mini computers
They were introduced in 70’s and didn’t last really long. They were smaller in size (roughly the size of a
washing machine) and had lesser storage and processing capabilities than mainframes. They could cater
50100 terminals attached to it.
Microcomputers (PC)
When the computers smaller than mini’s were invented, scientists called it microcomputers. They obviously
are not micro at all by modern standards. So they were renamed as PC (Personal Computer). Initially they
were considered as toys as they could not match the immense processing and storage capabilities of
mainframes.
Laptop
Tablet PC
Smart Phones
Embedded computers/microcontroller
Data types
There are two basic data types:-
1. Text
2. Numbers
Numbers are used only when performing arithmetic calculations; otherwise, we would always use text. For
example we don’t perform arithmetic on telephone numbers so phone number field would be text. Numbers
have two basic types:-
• Integers
• Real numbers (Floating point number, decimal number).
Date/time: Some calculations are based on date or time. It is stored in numbers and displayed in text.
Data Validation
Validation is a set of pre-defined rules, which ensure correct data entry. Computer will check the data for
fitness on the given criteria.
1. Range check
2. Presence check
3. List check
4. Format check
5. Data Type check
Data Verification
Data verification is checking the data against the source to see if it is correct. It is done through proofreading
and double data entry (counter checking).
Software
Total Computer System
System Operating
utilities system
Software
Payroll ERP/CRM
Features:
1. It can accept and print on a variety of media of different sizes such as envelops A3 size paper.
2. It can work with multiple layouts of a page in which text and graphics can be linked so that text
would flow from one box to another.
3. We can create text boxes and picture boxes.
4. The text and the photographs can automatically fit according to the size of the box.
5. The text can flow from one box to another if connected together.
6. The files created with this application can be used directly with plotters and printing press.
Important: Software may have features of other software, but they are differently categorized no
matter how similar they are. E.g. modern word processors can be used to create sophisticated print
publications but that doesn’t turn a word processor into DTP software.
1. Some sophisticated photo editing software allows layers to be used that can be blended to produce
creative effects.
2. Different filters can be applied such as sepia, black and white, blur, negative etc.
3. Pictures can be cropped, resized and enhanced.
4. Background and other undesirable objects can be removed.
5. Two or more pictures can be combined.
6. Text can be added in various styles to a picture.
7. We can zoom in and zoom out our picture.
8. We can change and correct colours.
9. We can apply filters (similar to camera lens filter)
10. Photos can be re-touched to improve their quality such as removing smudges, wrinkles, red eye,
spots etc.
Presentation software
These are used to create sales, marketing, project progress and other informative contents. Multimedia
elements can be added to make the presentation more effective and powerful. Presentation can be linear or
non-linear.
1. It allows users to enter text and various other media such as photographs, illustrations, charts or
graphs, animation, videos, music, speech and sound effects etc.
2. We can create multiple slides in one slideshow and display them one after another.
3. We can add transitions between the slides and animation effects on the objects.
4. We can produce presentation for overhead projectors (OHP), transparency slide projector,
multimedia projector and even web-based slideshow (Webcast).
5. We can print slides, slide handouts and presenter’s notes.
Features:
3D Graphic Software
These are used to create 3D sprites that can be used in games. Characters created with this software
can also be used in creating animation. (Features same as of CAD) Bryce, Maya, zBrush, Photoshop
Extended.
Illustration Software:
This category of software allows users to create line diagrams, illustrations, logos and icons etc.
1. We can create free hand drawing and we can also create pre-defined shapes using vector graphics.
2. We can combine separate objects to make one shape.
3. We can use different types of pens/brushes.
4. We can create paint fills and gradients.
5. It allows users to choose variety of colours for line and fill.
6. It can enlarge pictures without distorting them.
7. Images can be exported in variety of formats for online and print publication.
Animation Software
It allows a user to create simple animation using line art and a time line e.g. Adobe Flash.
Spread Sheets
It is application software that can process large amount of data and it stores the data in form of
rows, columns and cells. Spread Sheets are most commonly used is accounting statements and
statistical analysis.
A single spread sheet file can have more than one page/sheet in it. A few powerful features of a
spread sheet are as follows (Features):
1. Data can be stored is ascending or descending order.
2. We can create charts and graphs of various types.
3. We can use powerful formulas and functions.
4. We can create financial models and test models with various values. This is called a ‘What-If’
scenario.
5. Cells and ranges can have defined names that can be used as reference in formulas.
6. Data can be imported and exported in various forms.
7. The spread sheet software automatically updates the formulae results and charts as soon as the
values are changed.
Databases
It is an application program that stores data in an organized way. We can retrieve data using queries.
A data base can handle large number of records.
E.g. name of a student, model of a car, size of a house, ISBN (international serial book number), price of a
product etc.
Table: It is a collection of records. Every table must have its own primary key. Table can be linked together
using along fields. E.g. of tables: a student’s tables, pay table, a product table and etc.
Record: It is a set of complete information about a subject or topic. It is represented by a row in a table. E.g.
record of a product, a student’s record, a fee’s record etc.
Key Field/Primary Key: It is a field in a table that uniquely identifies a record in a table. A primary key cannot
be repeated/ duplicated and cannot be left empty.
Foreign Key: A primary key of a table that appears in another table is called a foreign key. Foreign key can be
replaced/ duplicated.
Networks
A network is a collection of computers that are connected to each other in such a way that they can share
data.
Intranet
Using internet technologies in a company’s LAN or WAN. A browser is used to access resources. It allows
restricted access to the internet.
Internet
It is a wide area network that is made up of many networks and it spans across the globe.
The services available on the Internet:
Servers
A server is a computer in a network that is responsible for providing one or more services to the network
users. Servers which perform only one service are called dedicated servers and the ones that provide
multiple services are called shared servers. Example of services are; printing, storage, security, scanning etc.
Role of Servers
Networks can be classified into categories with respect to the role of server in the network.
Server-based systems
A single very powerful server is used to do all the processing from security permissions to running programs.
A dumb terminal is attached to input or output data.
Client-Server Systems
Clients have their own processing power but certain services are provided by servers such as data storage.
Peer-to-Peer System
In a peer-to-peer network all computers have almost the same processing power and storage capacity. Some
computers can act like server at any given time.
Types of Servers
Proxy Server
This type of server uses software to request web resources on behalf of multiple users. Before sending a
page to user it keeps a copy of the page in its cache. When other users request the same page it transfers
the page from cache rather than downloading from original site again. This way the browsing speed
improves. Secondly certain sites/resources can be blocked/filtered using proxy servers. Most ISP’s and even
some countries use proxy servers to limit access to the Internet.
Network Server
This server is also known as domain controller. It is responsible for keeping track of all the resources
(hardware/software) available in a network and access rights of the users to these resources. E.g. certain
group of users will have high priority to use a printer and a group of student might be denied access to result
database in school network.
Web Server
This server effectively runs a website. When a page is requested it delivers it to the requesting computer.
Gateway
When two different types of networks are connected together, you need a computer that would perform the
translation task. Such a computer is called a gateway. Let’s say one office uses a mail server and a user wants
to send email to another type of mail server. In this case the request must pass through mail gateway and
translated into understandable format for the next mail server.
Mail Server
This server is used to send and receive emails. Users can download the mails from this server to their
computer. Until the mail is downloaded or deleted by the user it remains on the mail server. Users access
their individual mail accounts using their login names and passwords.
File Server
File server stores user files in central location. It has high access large storage space. A quota can be assigned
to each user and if properly configured it shows up as a network drive of users’ computer. User can not only
store their original files but also use this as a backup. They can also share it with other users if they wish but
normally every user has their own storage space accessed with login and password.
Print Server
This server is responsible for managing users’ print requests in a queue and prints them in order of priority. It
has its own storage and is attached to a network.
Network Topology
Serial Bus
Star
Ring
Mesh
Hybrid
Tree
Wireless Networks
WLAN
Disadvantages:-
• It is expensive to establish.
Advantages:-
Bluetooth:-
• Range is limited.
• Uses EM waves.
• It is established to communicate between home appliances.
• Poor security.
• Is commonly available.
• It is easy to transfer data between devices. E.g. cell phones. Data transmission rate is
slow.
Infrared:-
• Light wave.
• Common device is TV remote control. It is very prone to interference.
• There must be a line of sight for data transmission.
• It can be only used for point to point communication. Data transmission can occur only between
two devices.
• It requires straight path without any hindrance. Slow transmission speed.
Advantage:-
Wireless Networks
WEP= Wireless encryption protocol
WPA2, PSK
Advantages
1. It is portable
2. It is hassle free
Disadvantages:
1. Poor security
2. Expensive to establish
Bluetooth
Features:
1. Its range is limited
2. Uses EM waves
Disadvantages:
1. Because it is a wireless, security is vulnerable
Advantages:
1. Commonly available
Infrared
Features:
1. It uses light waves
Disadvantages:
1. Can only be used for point-to-point communication
Applications of Computer
Steps of ATM processing:-
Video Conferencing
Advantages:
Disadvantages:
Requirements
Hardware: Webcam, modem or router, speakers, large screen.
Supermarket systems
1. The purpose and outcome of this system is to efficiently manage the sales and stocks of super
market. The customers don’t have to wait in long queues.
2. The customers will receive an electronic bill with details and individual items. The calculations will be
very accurate.
3. The shopkeeper can keep track of his/her stocks and even gets notified when the stock level is low.
4. Shopkeeper can serve more customers in a day. Thus increasing their sales and profit.
E-commerce
Providing and receiving goods and services through the Internet is called e-commerce. E.g. auction sites,
online shopping, online banking etc.
Online Banking
Providing traditional banking services online is called online banking. It includes services such as account
creation, EFT (electronic funds transfer), cash withdrawal, loan processing and account management.
• No personalized services can be availed. For e.g. filling up a form, deciding account type.
• Customers have to be computer-literate to utilize most of the services. There are higher
chances of losing critical data.
• Certain services are still not available through online banking. For e.g. cash deposit.
Virtual-reality systems
It is when the computer system simulates real life situation in such a way that human senses are deceived.
Advantages:
Simulation:
Simulation is to mimic real-life situation that could not be observed otherwise. For e.g. the growth of cancer
cells and the simulation of a car crash.
Database Software
A database system stores data in an organized way. Data can be searched through queries.
Table (file):
It is a set of associative data i.e. logically separated from other data e.g. student’s table.
Record (row):
A complete set of information about one subject is called a record e.g. record of a patient.
Column (field):
Relationship:
The link between two or more tables is called relationship. It is based on primary keys and forward key. It has
the following types:-
It is a field in a table that uniquely identifies individual records. A primary key must be unique (cannot be
duplicated) and cannot be left empty.
Spreadsheets
Spreadsheet is software that is commonly used for calculations, data analysis, data summary and basic
statistical analysis.
List of applications:-
• Communication systems
• E-mail
• Video conferencing
• Digital telephone systems
• Library systems
• Office automation
• Multimedia (CBT/CBL)
• E-commerce
• Online information system retrieval
• Wireless technology
• Dial-up versus broadband
• Virtual reality
Internet
Internet: It is a wide area network that is made up of many networks and it spans across the globe.
Website
Features:
1. A site map is provided to view a structure and lay out of the site
2. Search feature is provided to search with in the website
3. A login and sign up button/ box to identify repeating/ repeat visitors
4. A “contact us” page to show physical address and other contact information.
5. Advertisements and special offers
6. A shopping cart/ basket and a check out page where visitors can view their cart and provide credit
card information.
7. Useful and related links to other websites.
8. Feedback form.
Features of a webpage:
1. A web page is divided into two sections <head> and <body>.
2. The <head> section contains basic information about the webpage such as character encoding
(language), author, title of the page and key words in the page.
Some Sample tags found in a Head Section:
<meta author= “name of author”>
<title>IGSCE ICT</title>
<meta keyword= “education”>
Features:
1. It can display text, pictures and other multimedia elements such as sound, music, videos and
animation.
2. For text we use <P> that represents a paragraph.
3. Headings in a document would be written as <h1><h2> until <h6>.
4. Bulleted lists are created and represented with <ul>. This stands for unsorted lists.
5. Numbered lists are represented as <ol>. OL means ordered lists.
6. Pictures are included using <img>. This is abbreviation of image.
7. Videos and sounds as well as animations are included in a page using <object>.
8. Links to other web pages with in the site or with in the page and to other websites can be created
with <href>. HREF stands for hyper-text reference.
Search Engine
It is a website/ remote data base application/ web application that hold addresses of various
websites that can be searched through a key word.
Features:
1. Some sites are not included in the search engine regardless how good or relevant they are to your
search.
2. Some people falsely portray their website to be relevant while it is not.
3. Some sites are listed as sponsored that might be relevant but not exactly what you looking for.
4. Search engine might misunderstand some confusing words.
5. There might be a large number of sites listed without any authenticity.
6. There might be too many results to practically visit them.
Computer crimes
1. Hacking: Hacking is to gain illegal access to computer resources. It is illegal even to view data that
you are not authorized.
2. Phone phreaking: It is to use mobile phones or landlines to listen to conversations, use someone’s
credit balance or faking caller identity etc.
3. Phishing: To make a fake webpage in order to collect user data.
4. Pharming: Making fake websites to collect data from large number of users.
5. Online scams: scams are all such offers that are fake and only intended to rip you off of your money.
6. Spam: Spam is an unsolicited message sent over a network to the user s without their consent.
7. Viruses: Virus is a malicious computer program that duplicates itself without user’s knowledge. It can
harm a computer in many ways.
8. Spyware: Spyware is software that resides in user’s computer without their knowledge. It collects
user’s data and sends to unknown server.
9. Phantom withdrawal: Phantom withdrawal is modifying ATM card then giving instruction to release
all the money held within. To avoid this situation, ATMs are situated in busy market places. A
security camera is installed and a guard is placed outside the ATM. A minimum account of cash is
maintained and ATMs are located close to the actual bank branch.
10. Software piracy: It is making illegal copies of software without the permission of Copyright holder.
Violating Terms of Service contract is also a crime.
11. Cookies: Cookies are small text files stored on client computers by the web server. Cookies cannot
contain viruses as they are not executable files but they can be used to hijack a session or retrieve
passwords.
Protection from spam
• Spam-filtering and anti-spam software.
• Modern web-mail systems use automatic spam filtering.
• Do not open e-mails from unknown senders.
• If you identify a spam message, report it to relevant authorities.
• Do not click anywhere within the message and don’t even reply to it.
Physical Security:
• The physical location of the server is not disclosed and only authorized personnel are allowed.
• Systems units are locked with a padlock to avoid vandalism.
• System units can also be locked in cabinets.
• No data capture or storage device is allowed in computer labs.
Expert Systems
Expert system mimics the knowledge of an expert in any particular field e.g. a car engine diagnosis system.
Features
1. Series of questions.
2. Backtracking-go to previous question and change the answer.
3. Justification with answer.
Examples
1. Mineral prospecting system
2. Chess playing system
3. Medical diagnosis system
4. Financial investment adviser
5. Different types of decision making systems
User Interface
Sample pictures of different interfaces
User interface is a method to communicate with the computer system. It is used to enter data and give
instructions to computer system. E.g. menu-based system, form-based system, graphical user interface
(GUI), Command line interface (CLI), Natural language Interface.
Menu driven system: In this system, user is provided with a series of options to choose from.
User is limited to the options provided by the system. It is secure because user cannot issue
command at his will. It is easy to use even for non-computer literate users. For example ATM
and information kiosk.
Form based interface: In this interface, the user is provided with an online form that looks
similar to printed form. This is mostly used for entry purpose. It may have limited buttons to
navigate and save records.
Graphical user interface: It makes use of WIMP (windows icons menus and pointer). It is an
easy to use interface, where the output is displayed graphically. User interacts with the
system with the help of cursor or pointer that is usually controlled with a mouse. User can
open multiple windows and switch between them. Commands are not typed rather it is
selected from a choice of menu options.
Command Line Interface: in this interface, a prompt is displayed where user can enter
commands with various options. These options are called switches. Commands are usually
very powerful but require the users to remember them exactly. All the routers and
sometimes networks are managed through CLI. E.g.
DIR/OD/P/AH,IPCONFIGDIR*.mp3/b/s>>mylist.m3u.
Contents
Original contents
Updated links
Usability
Site map simple view
Search function
Visual design
Consistent colour scheme
Accessibility
From various devices/software
Impairment
Wiki
Wiki is a site that contains user contributed articles on various topics. It can be very specialized and specific
to one topic or general. The validity of information on wikis is doubtful as articles are written by anonymous
users. The information can be searched through keywords.
Blogs
Social networking
Media sharing
Podcast
Tagging
Bit streaming
Communication
Takes very little time (a few seconds) Takes a bit of time (a few minutes) Local mail takes a day or two and
ordinary mail can take up to weeks!
Inexpensive all you have to pay is for Quite expensive as you have to pay for Still quite expensive if you send mail
a PC and internet charges. fax machine and long distance call abroad
charges
Messages can be encrypted making Communication can be hijacked or Messages can be leaked out or copied
highest level of security copied easily
Send the same message to multiple Broadcast fax service can be used but no Manually send letters to multiple
recipients even mail merge mail merge recipients
`Don’t have to leave home to send it Don’t have to leave home to send it Must go to post office or letter box to
send it
Viruses can infect your computer No chance of viruses No chance of viruses
system
You get plenty of spam from all over Due to cost you almost never get a You can get spam from local venders
the world spam message
Less accessible, user must have a PC, User must have fax machine Virtually everyone in this world is
internet connection and an email accessible through letter post
address
The user might not check his/her Can be used to send urgent messages No sense of urgency
account regularly
Messages are safe in the mail server for Messages cannot be stored Messages will be stored in the
specific time mailbox until retrieved.
Home appliances
Digital Camera
Input devices
Light level sensor
Motion sensor
Buttons/Touch screen
Output
Flash light
LCD screen
Poloride printer
Processing
When the camera’s light sensor detects low-light level, it will turn on the flash automatically. This avoids a
common problem in photography i.e. over exposure, under exposure (Dark photographs)
Different settings can be adjusted using buttons to take photograph after a few seconds.
Motion detectives can figure out a shaking hand and can delay photograph for a friction of second to avoid
blurry picture. Similarly, some sensors can detect objects in a frame and focus automatically.
Microwave Oven
Input devices:
• Key pad/touch pad
• Thermal sensor
• Pressure sensor
• Metal detector
• Barcode reader
Output devices:
• Buzzer
• LCD screen
Processing:
When the user inputs a time to heat up the food, the microwave controller decrements the time until it
reaches zero. Then the microwave stops and the buzzer rings to notify the user.
Some microwaves can detect metallic objects in the chamber and would not work until the object is
removed from the chamber. Moreover, some microwaves can sense the weight placed on the tray. If it goes
beyond the limit of the microwave, then it won’t start until the weight is reduced.
Feedback system: A system in which the output affects the future or next input.
Washing Machine
Input devices
• Water level sensor
• Pressure sensor
• Density sensor
Output devices
• Buzzer
• Stepping motor
Processing
When we place clothes and water in the machine, it detects if the tank can bear the weight of the clothes
through the pressure sensor. It will also notify the user if the water level is higher than the capacity.
Afterwards, the controller starts the stepping motor to wash clothes. When the washing is done, it will beep
to notify the user that the washing is done. Some machines can be set to a specific timer and type of cloth so
that the motor would adjust rotations per minute according to it.
Digital Camera
Input devices light level sensor, motion sensor and navigation buttons/touch screen.
Processing when the cameras light sensor detects low light level, it will turn on the flash automatically.
This avoids a common in photography that is over exposure or under exposure (dark photographs).
Different settings can be adjusted using buttons or touch screen e.g. camera can be programmed to take
photographs after a few seconds.
Motion detectors can determine a shaking hand and can delay photographs for a friction of a second to
avoid blurry picture. Similarly some sensors can detect objects in a frame and focus automatically.
Microwave Owen
Input devices keypad/touch screen, thermal sensor, pressure sensor, metal detector, barcode reader.
Processing when the user inputs a time to heat up the food, the microwave controller will decrement the
time until it reaches zero then the microwave and buzzer rings to notify the user.
Some microwaves can detect metallic objects in the chamber and would not work until the object is
removed from the chamber. Moreover some microwaves can sense the weight placed on their trey. If it goes
beyond the limit/capacity of the microwave then it won’t start until the weight is reduced.
Feedback system a system in which the output affects the future or next input.
Washing machine:
Input devices water level sensor, pressure sensor, density sensor
Processing when we place clothes and water in the machine, the machine detects if the tank can bear the
weight of the clothes through pressure sensor. It will also notify the user if the water level is higher than the
capacity. Afterwards the controller starts the stepping motor to wash the clothes. When the washing is done
it will beep to notify the user that the process is complete or washing is done. Some machines can be set to a
specific timer and type of cloth so that the motor would adjust RPM’s according to it.
Ships Navigation System: Ships use GPS service to find out their current location. This way they don’t lose
their path and go astray. Ships continuously receive their location information so that they can follow a
route.
Drawbacks:
GPS-Navigation Systems
GPS (global positioning system) it is a global or international service that can report the position of an
object anywhere in the world. The position is reported in the form of XYZ axis that is represented in the form
of latitude, longitude and altitude.
1. Ship navigation system: Ships use GPS service to find out their current location. This way they don’t
lose their path and go astray. Ships continuously receive their location information so that they can
follow their route.
CCTV close-circuit television. It is called close-circuit because its transmission is not broadcasted.
Surveillance cameras can detect abnormal activity and follow and zoom in using actuators.
Industrial Robots
Effects on quality control
After the introduction of robots, the quality control has achieved high level e.g. the exact amount of the raw
material can be calculated.
Objects produced with the help of robots have the same quality.
The quality checked through computers is very accurate and a product can be tested at initial stages of
manufacturing
1. After introduction of robots the quality control has achieved high levels e.g. the exact amount of raw
material can be calculated.
2. Design can be materialised using CAD/CAM and robots.
3. Objects produced with the help of robots have the same quality.
4. The quality checked through computers is very accurate and product can be tested at initial stages of
manufacturing.
Effects on environment
Produces pollution
Less wastage of raw material due to inaccuracy and quality control
Large amount of good quality products are available
Products would cost less to consumers as well as manufacturers.
Workforce diversity
Opportunity for more employment in various fields.
A lot of old skills have become totally obsolete e.g. developing photographs. This is called deskilling.
Now people have to upgrade their previous skills to newer ones e.g. composing music. This concept is called
re-skilling.
Now people with disabilities can also compete and become part of the workforce.
2- It can make use of multimedia elements that can make it more attractive.
3- Students can learn at the convenience of their homes or anywhere else where they can access study
material.
Disadvantages
1- There is no or limited interaction.
Applications in music
Computers are extensively used in music industry e.g. music composition, editing, mixing, sound
normalization, digitizing of music etc.
Features
1. MIDI file format is compact and only stores instructions to play notes on specific device.
2. Since it is a binary file format, it can be edited using computer software.
3. The quality of music produced by MIDI is dependent on hardware being used i.e. capabilities of
soundcard or electronic keyboard.
4. MIDI cannot store vocals.
MIDI port is usually found on high end sound cards. In the past, it was used to plug in joysticks. But now it is
exclusively used to attach musical instruments to the computer e.g. electric guitar, electronic keyboard.
Computers can be used to manufacture the moulds for different objects that were designed using CAD. This
process is called CAM.
Simulation
It is a computer generated situation to study a real life phenomenon. It is used in the following areas:
• If the real life event takes too long to properly observe the changes occurring.
• If the event is too quick or too small to be observed by humans.
• If it is practically impossible to generate such situation in real-life.
• If the situation is dangerous or hazardous to human life.
• It is a computer generated situation to study a real phenomenon. It is used in the following cases:
• If the real life event takes too long to properly observe the changes occurring. If the event is
too quick or too small to be observed by humans.
• If it is practically impossible to generate such situation in real life
• If the situation is dangerous or hazardous to human life
Model
It is a computer generated object to study the behaviour of simulation e.g. we would create a car model to
see how it would affect the driver in case of a car crash. Similarly a financial model in a Spreadsheet can be
used to determine the future trends.
It is a computer generated object to study the behaviour of simulation e.g. we would create a car model to
see how it would affect the driver in case of a car crash. Similarly a financial model is a spread sheet can be
used to determine the future trends
Weather Forecasting System (Curriculum Content 1.1.4):
Input
Thermistor/Thermal Sensor/heat sensor: It collects heat data at specific intervals to find out the temperature
throughout the day.
Light level sensor: It detects the level of light during different times of the day to see if it is cloudy or sunny.
Humidity sensor: It detects the amount of humidity in the air that helps determine the probability of rain.
Wind pressure sensor: It detects the speed and direction of wind. It helps determine the air pressure in
different zones that helps predicting in blizzards and wind storms.
Processing the data collected from the sensor in is displayed in real time as well as stored permanently. At
the end of the day the data is analysed and compared with historical data to make predictions.
The data in control room will be logged and will be analysed to determine the flow of traffic. On some busy
crossings, there might be LEDs that might be used to divert the traffic from busy junctions. In case the sensor
`would malfunction, the signals will revert to default system. One problem that might occur is that if heavy
load of traffic is detected on all sides, then, the green interval might be too short to be reasonable.
System software
The programs that are used to run, manage and maintain the computer hardware are called system software
e.g. disk defragmenter and device drivers. It does not provide direct benefit to the user.
Device Drivers
It is an essential piece of software required to make a hardware equipment work. Most operating systems
already have device drivers for thousands of common devices.
Application software: It solves everyday problems (particularly business tasks). Users can get direct benefit
from these software e.g. word processing and web browsers.
Operating System
Features of operating system:
Translators
1- Assembler translates assembly language programs into binary code.
2- Interpreter translates and executes on line of high level language code. An interpreter must be loaded into
memory before running the program. If there is any error in any line of code (statement), then the
program stops and interpreter lets the programmer change or correct the mistake.
3- Compiler is a software that converts a high level language program into machine code in one go. The high
level language program code is called source code and the binary code generated by compiler is called
object code.
Programming Languages
Computer understands two types of programming languages:
1- Low Level languages: Machine/binary language and assembly language are considered as
low level languages. Computers only understand binary language. All the programs must be
converted into binary language in order to execute.
2- High Level languages: These languages are closer to human languages (English). It must be
translated into machine code to run.
Algorithms
Algorithm is a solution to a problem in finite number of steps. Using algorithms we can solve common
business and real world problems using pseudo code or program flow charts. Pseudo code is a standard
English-like notation used to write computer programs.
Sequence
Building Expression
Entering Data
Selection
Single line IF
Nested IF
Switch Statement
Repetition
REPEATE … UNTIL
Modules
Interviews
Interviews are interactive question answer sessions conducted orally.
Features of interviews:
• Conducted face to face that why the body language of the interviewee can be assessed.
• Interviewee may forget some critical factual information.
• We can change the course of discussion based on interviewee’s responses.
• We have to setup a meeting time before we could interview someone.
• We can conduct an interview even if the interviewee is illiterate.
Questionnaires
Questionnaires are a forum containing questions that are answered by the users. Questionnaires are used to
collect information from a large number of people. It can contain close ended and open ended questions.
Features of questionnaires:
• Extremely useful in performing statistical analysis.
• It might take a long time to distribute and collect questionnaires.
• People might skip or choose not to answer any critical question or important question.
• Questionnaires must be carefully planned and designed to avoid ambiguity and confirm to users
literacy level.
• People might be careless or in hurry while filling the forum and can even be dishonest.
• Questionnaires can be presented as documented evidence.
Observations
System analyst may observe the working of an organisation by him. A typical day’s work of an organisation
can give an insight into the problem. Observations can be formal or informal.
Features of observations:
• The subjects may behave unnaturally, i.e., they might get nervous or pretend to work better.
• Observations might take a lot of time and would be tiring for the analyst.
• The observation of the analyst could be biased or incorrect.
Document browsing
document browsing means checking the existing system’s documents to understand the working.
Design
Data dictionary: this document contains details of all the data files. It contains field names, data types, sizes
and a reason for storing a particular data item. It also specifies primary keys and foreign keys.
Output report: In design face the analyst must also design an output report. The first question is that
whether the report is softcopy or a hardcopy. Secondly the layout of the report is determined. The layout
will be whether columnar/tabular, justified or stepped. The orientation can be portrait or landscape.
Development
In this phase the software is developed using a programming language. Sometime some parts of software
are tested and design documents might get changed too.
Testing
Test strategy
Software cannot be tested from every aspect that’s why in test strategy we determine what part of the
software will be tested after that a test plan is devised.
Test plan:
in test plan the detail of testing is specified it includes the components being tested, the data that would be
provided, type of test, expected outcome and the results.
1) Normal testing
2) Extreme testing
3) Abnormal testing
Normal testing:
Normal data is provided to see if the system accepts it and produces appropriate results. E.g.: $4.99 is
normal data for the price field.
Extreme testing:
Data that is on the verge of being rejected is provided to the system. System must accept and process
extreme data. E.g.: 0 and 100 are extreme data for a percentage field.
Abnormal testing:
Data that falls outside the normal range is called abnormal data that must be rejected by the system. E.g.: -1
and 101 are abnormal data for percentage field.
Implementation
In this phase we decide how the system would be implemented; what method would be used and the user
will be trained?
Methods:
Direct implementation
In this method old system is replaced by the new one overnight.
Parallel implementation
In this method both systems (old and new) run simultaneously for some time until the new system is proven
effective.
Features:
• It requires twice as much resource to run both systems.
• In case the new system collapses we have back up of data and a fall back option.
• It gives ample time to the employees to become familiar with the system.
Phased implementation
In this method one part or phase of an organisation is converted to the new system and once it is fully
operational the next department adopts the new system. Once eventually when all the phases are converted
to the new system then all the components is connected together.
Features:
• It takes a lot of time to fully implement the new system.
• It might be a complex task to interlink all the subsystems.
Pilot implementation: in this method the whole project or system is implemented on a small scale if the pilot
project proves successful then the whole organization adopts the new system.
Documentation:
All the documents produced throughout the system life cycle which includes all the planning documents,
work logs and reports are collectively called documentations. There are two major types of documentations
namely:
1) Technical documentation 2)
User documentation.
Technical documentations
Is made up of flowcharts, algorithms and other design documents. They are in technical language and are
meant for system developers and technical support staff.
User documentations
Is made up of user manual, quick start guide, installation guide, troubleshooting guide, reference card, online
help, FAQs, wikis, support forums, email chart, and telephone customer support. User
documentations is in non-technical language and easy to understand. It might have screen shots to explain
different tasks.
Flowcharts
Logic Gates
Logic gates are components that have a pre-defined output (finite state) based on a given input. A circuit
made up of many logic gates can be built to perform operations such as simple arithmetic to complex
process control.
A microchip (Integrated Circuit) designer would study a real world problem, create a function equation, draw
a logic diagram, verify output using truth table and then build the circuit.
A circuit designer might use any of the gates available along with other components. There are about 7 gates
that can be used as a building block for a complex circuit. We will study the following 5 gates:
1. AND
2. OR
3. NOT
4. NAND
5. NOR
Modes of Processing
There are two modes of processing:
Batch processing:
In batch processing input is collected and validated before processing. All the data is processed in one go
without human intervention. If there is an error in a batch, the whole batch must be repeated. Minor errors
are reported in the end.
E.g. salary slips, utility bills, fee slips and stock report etc.
Real-time processing:
In this process there is no significant delay between input and processing. The response to user input is
immediately produced. E.g. computer game or air traffic control system.
Example for both
ATM (first real-time while transaction) + batch when full day reports are printed.
Supermarket: Real-time processing when making sale and batch when full day report is reported.
Multi-access system:
It is a system that is designed in such a way that more than one user could use its resources at the same
time. E.g. if a user is changing a file, it will become Read-Only or locked for other users, ATMs connected to a
server.
Multi-tasking system:
Multi-tasking is the capability of a system to run more than one task at one time by providing a time slice.
The users get the impression that the tasks are running concurrently.
Process-control systems:
These are fault-tolerant systems that not only display the status, but also store it for future reference.
Network systems:
They are meant to keep track resources and provide access in multi-user and multi-access environment. It
provides higher level of security through login/passwords and encryptions.
Thermal sensor collects heat data at specific intervals to find out the temperature throughout the day.
It detects the level of light during different times of the day to see if it is cloudy or sunny.
3) Humidity sensor
It detects the amount of humidity in the air that helps determine the probability of rain.
4) Wind Pressure sensor
It detects speed and direction of the wind. It helps determine the air pressure in different zones which helps
predicting in blizzard and wind storms.
Processing:
The data collected from the sensors is displayed in real-time as well as stored permanently. At the end of the
day, the data is analysed and compared with historical data to make predictions.
Glossary
Macros
Macro is a feature of application software that allows user to customize the application and automate
routine tasks. E.g. a macro can be created to produce a chart in Spreadsheet software and display in
presentation software. Similarly a macro can be created to convert data from one format to another.
Encryption
Encryption is a method to encode sensitive data in such a way that it becomes un-understandable by
anyone. This data can only be decrypted using appropriate key. This is usually helpful in data transmission.
Backup
It is another copy of original data that is kept safely away from the original data. It is used in case if
the original data is lost or damaged. Actuator
Actuator is an output device that produces physical movement e.g. a robotic arm or a stepping motor.
Handshaking
Buffer
Interrupt
Website