Igcse Ict Notes 2023 PDF
Igcse Ict Notes 2023 PDF
Igcse Ict Notes 2023 PDF
WHAT IS A COMPUTER?
It is an electronic device that works under the control of stored programs to automatically
accept, store and process data into information. Therefore, a computer has the following
characteristics:
• It is electronic:- can only work when there is electricity
• It is a device: a machine
• Is controlled by programs: Works according to instructions, written in computer
language, given by the user for it to perform a specific tasks.
• Is automatic in operation: Can work with minimum or no human intervention.
• Can accept data: data can be entered into the computer through various means
and the computer accepts it.
• Can store data and programs: Data and programs entered into the computer can
be stored for future use.
• Can process data into information
2. Information: It is data that has been converted into meaningful form. In general it
is processed data. Information can be understood and therefore can be used for decision
making purposes. Information is meaningful. To get relevant information, data entered into
the computer must be relevant, accurate and up-todate. If data entered into the computer
is wrong (Garbage In) the results will also be wrong (Garbage Out), and is generally
referred to as Garbage-In Garbage-Out (GIGO). It is a rule stating that the quality of the
output is a function of the quality of the input; put garbage in and you get garbage out.
Therefore the accuracy of the results produced by the computer depends on how accurate
the user enters data, functions, formulae and codes program procedures.
COMPUTER GENERATIONS
Refers to stages through which computers developed from the 1940s to date. These are
as follows:
1. First Generation Computers (1945 -1955): These are the earliest computers that
used valves in controlling machines, e.g. EDVAC, ACE and UNIVAC machines. These
were very large computers, fitting about the size of an average room. They were
programmed in a language understandable by the machine. Such computers
used a lot of electricity and were very expensive to purchase. Only very large
organisation could afford these computers. Such computers were huge, slow,
expensive and often undependable.
COMPILED BY X MPOFU
I GCSE ICT NOTES 4017 SYLLABUS
2. Second Generation Computers (1955 -1965): These are computers that used
transistors instead of valves. They were faster, had reduced size, were more reliable
and less expensive.
Transistor
3. Third Generation Computers (1965 – 1980): These used integrated circuits e.g. the
IBM (International Business Machines) computers. The integrated circuit, also referred
to as semiconductor chip, packs a huge number of transistors onto a single wafer of
silicon. These computers have increased the power, lowered cost, carry out
instructions in billionths of a second, and are smaller.
Microprocessor
5. Fifth Generation Computers (1990 to date and beyond): These use natural
language and can flexibly interact with the human being. Such systems are used in
medical diagnosis, mineral prospecting and in geological researches. Such computer
systems are capable of human intelligence and are commonly called expert systems.
TYPES OF COMPUTERS
The types of computers are: Micro-computers, mainframe computer, super computer
& mini-computer.
1. Micro Computers: These are computers with a microprocessor inside them, and
include the following:
COMPILED BY X MPOFU
I GCSE ICT NOTES 4017 SYLLABUS
Microcomputers
a. Desktop Computers: These are computers with a separate CPU and monitor and fit
on a desk during usage.
b. Personal Computers (PC): - These are microcomputers made for use at home for
general purpose, and includes desktop computers.
c. Palmtops: These are portable microcomputers that can fit in the palm and are used
as diaries and for other small business applications.
Laptop omputer
c
Laptops are small like a briefcase and are
portable and can be used in areas where
there is no electricity. They have llight weight
and battery powered.
However, laptops can easily get stolen, they
need recharging from time to time, some find
it difficult to use the laptop keyboard and
inbuilt mouse, and they are even expensive to
buy and to repair. They also have limited
expandability and docking stations
e. Tablet Personal Computers: Type of notebook that accepts input from an electronic
pen
COMPILED BY X MPOFU
I GCSE ICT NOTES 4017 SYLLABUS
For schools and school children, laptops have the following advantages:
Users can save data in their own storage area wherever they are. Users can get any
networked software wherever they are. School needs fewer printers. Users do not need to
keep using the same machine. Users can access school intranet from anywhere. Users
can access Internet from anywhere. Users do not need to carry CD ROMs. It is easier to
communicate with. Can email work to teachers even from home. Staff can monitor
students easily. Students and teachers can share files and notes easily.
Mainframe computers
4. Super Computers: These are very powerful computers that are used to perform
detailed calculations and for design purposes, for example, modelling of aircraft wings,
testing bombs, etc. They are the fastest and most expensive computers
COMPILED BY X MPOFU
I GCSE ICT NOTES 4017 SYLLABUS
Supercomputer
*NB:- The classification of computers as micro, mini, mainframes and super computers
have become blared due to recent technological advancements since a microcomputer
can now perform all functions that were believed to be for mainframes.
Classification of computers can also be made relating to the use of the computer, as
follows:
(a) General Purpose Computers: - these are computers that can be used to perform a
number of functions like playing music, playing games, payroll processing and so on.
(b)Special Purpose Computers: - These are computers that are designed to perform
one task only, for example, to monitor patients in hospital.
(c) Analogue Computers: these handle data in continuously varying form.
(d)Digital Computers: Handle data in discrete values; that is in 0s and 1s.
(e) Embedded Computers: – Refers to use of microprocessors in non-computer
equipment like in cameras, washing machines, watches, etc. These are normally
dedicated for a specific task they are designed for. Embedded computers are also
found in household items like camera, microwave, washing machine, video recorder,
fridge, sewing machine, air conditioning, electronic toys, rice cooker dish washer,
Televisions, alarms, clock, radio, DVD players, etc. Tasks performed by
microprocessor inside some of the devices include:
In digital camera: automatically adjust film speed, positions the end of film, adjust
distance from object, adjusts light.
In Speed cameras: are used on many roads to take photographs of cars which have
exceeded the speed limit. Some of these cameras use microprocessor controlled chips to
store information. The advantages of speed cameras with microprocessor controlled
chips are that:
Data and images can be transferred automatically which will be faster. Image can be
viewed straight away. Can store considerably more data and photos. Can store other
information (apart from photo image) e.g. road conditions. Chips can be re-used.
Tasks which would be carried out by the microprocessor as a speeding car
approaches a camera include:
Sense and record speed of vehicle. Compare speed of vehicle with stored value(s) and
decide whether photograph should be taken. Check on value of light intensity. Adjust focal
length, focus image, adjust shutter speed and set exposure.
Tasks which would be carried out by the microprocessor as the photograph is being
taken include: Log the time. Log the date. Log the speed. Record the road conditions.
Operate ―flash‖. Operate shutter. Store the image. Check on value of light intensity.
Adjust focal length and focus image.
COMPILED BY X MPOFU
I GCSE ICT NOTES 4017 SYLLABUS
In washing machine: Controls the amount of water. Adjust and controls speed of wash.
Control temperature of water and the time taken to wash the clothes.
In fridges: Controls temperature level. Control the display panel. Switch on lights if door is
opened and off when closed.
In air conditioners: Controls temperature. Controls timing and the display panel
COMPILED BY X MPOFU
I GCSE ICT NOTES 4017 SYLLABUS
ELEMENTS OF A COMPUTER
The main elements (components) of a computer are classified into Hardware elements
and Software elements
HARDWARE: These are parts of a computer that exits in physical form, for example mouse,
keyboard. Hardware refers to tangible devices of a computer. Hardware is grouped into:
Input Hardware, Processing Hardware, Output Hardware and Storage devices.
INPUT HARDWARE
These are devices used to enter data into the computer, for example mouse and
keyboard. Below are some of the input hardware and their uses:
(i) Keyboard: It is a device used to enter data and instructions into the computer by
typing. It is similar to the traditional typewriter. It is used to enter alphabetic letters (A-Z-
both lower case and upper case), numbers (0-9, positive and negative) and other special
characters like the %, $, coma, ?, and the space. Keyboard entry of data is manual and its
excessive use without breaks will cause Repetitive Strain Injury (RSI).
*NB: - A character is any symbol, digit or
letter that can be entered into the
computer, eg. $, %, 5, h, etc. These
characters can be numeric (numbers 0-9,
positive and negative), alphabetic (letters
A-Z, both lower and upper case),
alphanumeric data (a combination of both
numeric and alphabetic characters) and
special characters (space, $, >, etc.).
*NB: - Control Character: - Refers to non-
printable character code or number in the
character set that do not represent a
written symbol, e.g. carriage return, tab
key, etc. These are mostly used in
peripheral devices control and for communication purposes, for example, carriage return,
tab or backspace; and others typed by depressing a key and the control key at the same
time.
*NB:-Extended Binary-Coded-Decimal
Interchange Code (EBCDIC) an 8-bit character set and encoding representing 256
alphanumeric and special characters
Standard keyboard
COMPILED BY X MPOFU
I GCSE ICT NOTES 4017 SYLLABUS
Flatbed scanners have the paper placed on top of them, in a similar way to a
photocopier. These are more expensive than hand-held scanners but they are usually able
to produce higher resolution images.
Scanners
Touch screen
(vii) Tracer ball: It is an input device with a small ball that can be moved by passing
the palm of your hand over it. This will
move an arrow on the screen.
It is used to draw designs and to
select options from menu. It is mostly
found on laptop
computers.
COMPILED BY X MPOFU
I GCSE ICT NOTES 4017 SYLLABUS
Tracer balls
(viii) Microphone: It is an analogue input device that recognises human voice for data
entry into the computer.
*NB:-An analogue device is a device that recognises data in continuously varying form,
e.g. microphone, wall watches (with minute, hour and second hand), fuel petrol gauge,
speedometer, etc.
A microphone is used in voice recognition systems (voice synthesis). These are
computerised systems that allow users to communicate with the computer by talking
(voice input). Such systems have the following advantages:
The systems are over 90% accurate. They are appropriate for the handicapped, especially
those without hands. They are very fast in entering data and in giving instructions to the
computer. They are speaker independent. They can recognise natural language.
Disadvantages:
Older systems are speaker dependent. They allow the user to speak slowly, using specific
words that were programmed for it to understand.
NB: Multimedia speakers, sound cards, a microphone and voice recognition software are
needed in voice recognition systems.
(ix) Light pen: A ballpoint shaped device used to enter data by writing on an ink pad.
It is also used to make alterations on the screen to the drawings, to write directly on the
screen and to select commands.
Light pen
(x) Kimball Tags: These are punched cards with a magnetic strip which contains
details of a product, mostly clothes in a shop.
(xi) Graphics tablet: Devices used to provide interface for drawing on the screen and
links with the light pen (xii) Webcam: A digital camera designed to take digital
photographs and transmit them over the internet. (xiii) Sensor: an input device that
automatically records data by sensing the environment it is supposed to record, e.g.
humidity sensor.
(xiv) Magnetic Stripes: Magnetic stripes can be seen on train tickets or bank or
credit cards.
These stripes hold a small amount of data (64 characters) and can be read by a
magnetic stripe reader (card reader) that is connected to a computer system. These
COMPILED BY X MPOFU
I GCSE ICT NOTES 4017 SYLLABUS
provide a quick and accurate way of entering details into a computer system and are
simple to operate.
(xv) Smart Cards: Most bank and credit cards are now
smart cards.
Cards have their own processor and memory that can hold up to
64KB of data. The data that is stored can be updated and the
processor can process simple programs.
Smart cards
(xvi) Barcode Reader: These are devices at Electronic Point of Sale terminals
(EPOS) that read barcodes on products for automatic data entry into the computer. Mostly
used in library systems, luggage handling
systems at airports, warehouse stock Barcodes are numbered vertical lines and
control, etc. spaces of varying size on products that
provide data for such a product to the
computer when read by barcode readers.
If the barcode reader fails to read the
barcodes, data is entered manually through
the keyboard by entering the numbers
below the barcodes.
Barcodes
Barcodes have the following advantages:
They are cheap and easy to use. They are very accurate in entering data. They are a very
fast means of entering data since they are an automatic data entry method. Customers
can be served quickly. Automatic reordering of goods in supermarkets is possible.
Automatic stock taking is possible. Need for fewer people in the stores thereby cutting
labour expenses. Out of date items can be automatically identified. There is no need for
supermarket workers to remember prices. It becomes easier to do price changes.
Information found on barcodes includes:
Product name, Price, Check digit, Product number, Country of origin, Manufacturer‘s
number, Weight.
How does the computer system checks that the barcode has been read correctly?
Either the computer performs the following:
Calculates the check digit; remainder = 0 if barcode has been read correctly OR uses the
weights and modulus 11 and use remainder
DOCUMENT READERS
These are devices used for entering data automatically into the computer by reading
through documents. These include:
(i) Optical Mark Recognition (OMR): The Optical Mark Readers use light sensitive
devices to sense pencil marks on a piece of paper for automatic data entry into the
computer. Light is reflected from the document onto the Optical Mark Reader which
records the output. It then records low intensity/zero intensity at certain points. OMR is
mostly used in marking multiple choice exams at ZJC and ‗O‘ Level and reading pupils‘
registers. OMR is fast and accurate in entering data. An Optical Mark Reader is the device
that is used for automatic data entry in OMR systems.
(ii) Optical Character Recognition (OCR): It is the use of light sensitive devices to
recognise alphabetic characters and numbers on a sheet of paper for automatic data entry
into the computer. Mostly used by insurance companies, in billing systems and processing
of Bank Giro-forms. An Optical Character Reader is the device that is used for automatic
data entry in OCR systems.
COMPILED BY X MPOFU
I GCSE ICT NOTES 4017 SYLLABUS
COMPILED BY X MPOFU
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
OUTPUT DEVICES
These are devices used to display and produce data and information held inside the computer,
for example: screen, printer and graph plotters. These are described below:
(i) Printers: A printer is a device that is used to produce hard copies of data held in the
computer. Hardcopy is a document printed on paper. Output from the printer appears as
displayed on the computer screen, thus What You See Is What You Get (WYSIWYG).
Types of Printers
Printers can be classified into impact and non-impact printers.
(a) Impact Printers: these are printers whose write heads hit ink ribbon against paper
during printing, e.g. dot matrix printer. Thus, there is contact between the paper and the
write heads during the printing stage. Examples include drum printers, dot matrix printers,
daisy wheel printers and chain printers. Impact printers have the following advantages:
they are very cheap to buy. They are cheap to repair and to maintain. They can use
continuous paper. They are economic in terms of ink usage.
LaserJet printers
The disadvantages of laser printers are as follows: they are very expensive to buy, they are
large and therefore take up a lot of desk space, they are quite complex and therefore
repair bills can be very high, Multipart stationery cannot be used, Cannot be used with
continuous stationery since they are page printers. *NB: - Printers can also be classified as
page printers (these print one page at a given time and are therefore faster) and line
printers (print one line at a time, very slow). Mostly Non-impact printers are page printers
while impact printers are line printers.
(ii) Screen / Monitor: it is a television shaped device used to display contents on the
computer as soft copy. Soft copy refers to data viewed on the screen. The screen can also
be called the Visual Display Unit (VDU). The screen can differ in terms of resolution, that is
low resolution screens display less number of dots per inch on the computer and therefore
the display will be of poor quality. High resolution monitors are needed mostly in graphics
packages where colour and many dots per inch are needed.
(iii) Graph Plotter: This is a device used to produce high quality drawings in various
paper sizes and is used in Computer Aided Design (CAD).
Graph plotter
PROCESSING DEVICE
A device used to convert and to manipulate data as per user requirement. The sole
processing device of a computer is the processor, which is inside the Central Processing
Unit (CPU) casing. Processing involves sorting of data, updating records, searching certain
records, adding a sequence of numbers, and others. Functions of the processor include:
Controls the sequence of instructions, Processes all instructions given by the user, Give
commands to all parts of the computer, Carry out data processing like making calculation
to data given by the user.
Most of the computers have micro-processors
(small execution chip found in
microcomputers). With MSDOS (Microsoft
Disk Operating System) computer chips
progressed from 286, 386 and 486
processors. Intel Corporation then developed
Pentium processors, ranging from Pentium 1,
Pentium 2, Pentium 3, Pentium 4 and so on,
with each processor being faster then the
preceding one. Pentium 4 processors have a
speed of about 2.6 GHz. Newer chips are
faster in
Microprocessors processing.
The speed of a processor determines the speed and function of a computer. Until the
1980s, most computers had one processor, but recent ones have two or more processors
(called co-processors), those with two processors are called dual processors. Two or more
processors share loads and therefore perform operations faster. The speed of a computer
is also determined by the clock speed for each microprocessor. This speed is measured
in Megahertz (MHz). The general structure of the CPU or Processor is as illustrated below:
NB: Memory (Main memory): Stores programs and data for programs currently running
on the computer. Main Memory is very close to the processors and therefore the two can
coordinate their activities very fast. - ALU operations on data are first loaded into the
accumulator register, a memory which stores instructions, data being processed and
results of an operation.
The function of the microprocessor is to fetch, decode and execute instructions. This is also
called the FetchExecute cycle.
The Fetch-Execute Cycle
Step 1. Fetch instruction: In the instruction phase, the
computer‘s control unit fetches the instruction to be executed
from memory. Microprocessor gets software instruction
telling it what to do with data.
Step 2. Decode instruction: Then the instruction is
decoded so the central processor can understand what is to
be done. Microprocessor determines what the instructions
mean.
Step 3. Execute the instruction: In the execution phase,
the ALU does what it is instructed to do, making either an
arithmetic computation or a logical comparison.
Microprocessor perforsms the instruction.
Step 4. Store results: Then the results are stored in the registers
or in memory.
Step 3 & 4 are called the execution phase. The time it takes to
complete the execution phase is called the EXECUTION TIME (E-time).
After both phases have been completed for one instruction, they are again performed for the second
instruction, and so on.
The Fetch-Execute Cycle
STORAGE MEDIA
These are devices used to store data and programs for future use.
Storage Capacity
Refers to the amount (volume) of data a device can store. The following storage measurements
can be used:
Bit: The smallest unit of data a computer can store, either a 1 or a 0.
Nibble: refers to half a byte, that is, a group of 4 bits.
Byte: a group of 8 bits representing a character. For example, the letter C is represented by the
byte 01000011.
Kilobyte (KB): this refers to 1024 bytes.
Megabyte (MB): 1 MB is equivalent to 1 048 576 bytes.
Gigabytes (GB): 1024 megabytes (approximately 1 billion bytes)
Terabytes (TB): refers to 1 099 511 627 776 bytes (approximately 1 024 GB)
*NB:-Formatting (initialising) a disk: this is the process of creating new tracks and
sectors on the disk that will be used in storing data. When a disk is formatted, existing
tracks and sectors are destroyed, including the data stored on them, and new ones are
created. After formatting, the disk will be blank. Formatting is done using the FAT or the
NTFS file system. FAT (or FAT16) stands for File Allocation Table:- It is a file system
used by MS-DOS and Windows operating systems to organise and manage files. It is a
data structure that Windows creates when you format a volume by using FAT or FAT32 file
system. Windows will store information about each file in a FAT so that it can retrieve the
file later. FAT uses 16 bit filing system. FAT32 uses 32 bit values and uses drive space
more efficiently and supports drives of up to 2 TB. Storage media is grouped in primary
storage and secondary storage:
RAM is volatile, which means that it loses its contents when power is switched off. RAM is
in two forms; that is, dynamic and static RAM. Static RAM is a Random Access Memory
chip whose contents do not change as long as there is continuous power supply. Dynamic
RAM is Random Access Memory chip whose contents can be lost even if there is
continuous power supply. Dynamic RAM needs to be refreshed to prevent loss of data.
The size of RAM also affects the speed of operation of a computer and the number of
programs that can be run on it. RAM size can be 16 MB, 32 MB, 64 MB, 126 MB, 256 MB,
448 MB, 1 GB, etc. The bigger the RAM size, the better the efficiency of the computer and
the bigger the number of programs it can run at a given time.
(b) ROM (Read Only Memory): ROM is a semi-conductor circuit (chip) whose contents
can only be read from and cannot be erased or modified. ROM contents are fixed during
manufacturing, that is, they are hard – wired. These contents can only be read from and
cannot be modified.
The uses of ROM are: Stores the Basic Input-Output System (BIOS-refers to software that
test hardware at start-up, starts the operating system and support data transfer between
devices.) of the computer. Stores control programs for the operation of the computer and
its peripherals. Stores translator programs.
ROM is grouped into:
Programmable Read Only Memory (PROM): This is a ROM chip whose contents can be
changed but only once. It is re-programmable only once.
Erasable Programmable Read Only Memory (EPROM): This is a Read Only Memory chip
whose contents can be erased and modified several times.
Electrically Erasable Read Only Memory (EEPROM): This is a Read Only Memory chip
whose contents can be erased and modified several times using electricity.
*NB:- Firmware (microcode):-refers to coded instructions that are stored permanently in
read-only memory, for example BIOS.
Magnetic Storage
These store data on magnetised field of iron oxide and include magnetic tapes, zip drives,
diskettes, hard drives and flash drives.
(a) Magnetic Tapes: They are similar to a normal cassette tape in shape. They store
data in serial and sequential order. They are mostly used to backup data. Their storage
capacity can be up to 20 GB. Data is also
accessed in serial or sequential order. They can be
used as off-line storage media.
Magnetic tapes have the following advantages:
Data can be arranged in any ordered sequence.
They are re-usable, that is can be overwritten
several times. Suitable for high hit rate processing
systems like payroll, billing systems, etc. They last
for a very long period of time, and thus can be used
to keep historical records. They are very cheap to
buy. They store very large volumes of data, of up to
20 GB.
However, they have the following disadvantages: It takes too long to find (search for)
a needed record in a long list of data records. It is very difficult to update record held in a
Magnetic tape magnetic tape. It takes too long to update records, time wasting.
They are prone to humid (moist) conditions.
Notes on Diagram
Rigid plastic case: - protects the disk inside from damage. Write protect Window: When
it is open, data cannot be written on disk, unless it is closed. It is a method of preventing
data on disk from being modified.
Disk Label: this is where the user writes some information, for example his/her name, disk
contents, etc.
High Density Window: - indicates that a disk can store data on two sides, thus allowing
more data to be stored on them. 1.44 MB disks are double density disks.
Uses of diskettes are: Creating backups for small amounts of data. Transferring small
amounts of data from one computer to another. Booting up the computer in case of system
failure, for system recovery. Storage of small programs and data.
Advantages of Diskettes: They are portable (easy to carry around as they can fit in a shirt
pocket.). Conceals less electricity. Most are high Double Density Diskettes.
Disadvantages of Diskettes: have very short life span (not durable). Can be affected by
humid conditions. Can easily be affected by dusty conditions. Can easily be damaged if
placed close to the screen for a long time. Takes long to read data into memory than from
a hard disk. Hold very small amount of data, 1.44 MB. Caring for diskettes: Do not place
them near magnetised field or near the computer screen. Keep them free from dust. Keep
of dry place. Do not expose them to direct sunlight.
(d) Zip Drives: Similar to diskettes in shape but does not flop. Data is stored in a random
way. Data is accessed in a random way. Storage
capacity is 100 MB.
Advantages of Zip Drives: They are portable
(easy to carry around as they can fit in a shirt
pocket.). Conceals less electricity. Most are high
Double Density drives. More durable than
diskettes
Disadvantages of Zip Drives: Hold small
amount of data of about 100 MB. Can be
affected by humid conditions. Can easily be
affected by dusty conditions.
Can easily be damaged if placed close to the screen for a long time.
Zip drive
1. Bus: A communication line used for data transfer among the components of a computer
system
2. USB: - An external bus that supports Plug and Play installation of devices. Using USB, you
can connect and disconnect devices without shutting down or restarting your computer. You
can use a single USB port to connect up to 127 peripheral devices, including speakers,
telephones, CD-ROM drives, joysticks, tape drives, keyboards, scanners, and cameras. A
USB port is usually located on the back of your computer near the serial port or parallel port.
3. USB port: An interface on the computer that enables you to connect a Universal Serial Bus
(USB) device. USB is an external bus standard that enables data transfer rates of 12 Mbps
(12 million bits per second).
Memory cards
Compact disc
Types of CDs
1. CD-ROM (Compact Disk Read Only Memory) a common form of optical Disks on which
data, once it has been recorded, cannot be modified.
2. CD-W (CD-Writeable) an optical disk that can be written upon, but only once.
3. CD-RW (CD-Rewriteable) on optical disk that allows personal computer users to replace
their diskettes with high-capacity CDs that can be written upon and edited over.
2. DVD (Digital Versatile Disc): Are spherical in shape that can store data on 2 sides.
Stores data on tracks in a random way. Data retrieval is in random order. Storage capacity
is about 4 GB. Writing of data on DVD is done by a device called DVD writer/burner.
Uses of DVDs: Transferring larges volumes of data from one computer to another.
Creating backup storage for programs and data. Booting the computer when loading the
operating system or restoring damaged system files (system repair)
Advantages of DVDs: Provide fast and direct access to data. Has large storage capacity of
about 4 GB.
Produces high quality sound and pictures. It is a multi-media device.
Disadvantages of DVDs: Can be affected by direct sunlight. Less durable. They can easily get
scratched.
Caring for DVDs, VCDs and CDs: Do not expose them to direct sunlight. Do not touch the
recording surface. Use soft marker for labelling and not ball point. Keep the free form dust
conditions.
*NB: - Virtual Memory – Refers to temporary storage (on hard disk) used by the computer
to run programs that need more memory (RAM) than the computer has. For example,
programs could have access to 4 gigabytes of virtual memory on a computer's hard drive,
even if the computer has only 32 megabytes of RAM.
SOFTWARE
Software refers to a set of instructions written in computer language that tell a computer to
perform a specific task, like adding a set of numbers. Without software, a computer will be
useless. Software is grouped into systems software and application software. The diagram
below illustrates branches/groups of software:
Systems Software: Refers to programs that control and manages the performance of all
computer systems. Systems software comprises of: (a) operating systems (b) Utility programs
(c) Translators
1) Operating System: - refers to the programs that supervise, control and manage the
performance of the computer hardware and software in accordance with set objectives, for
example, Windows XP. Examples of operating systems include: Windows 95/98/2000/XP/
VISTA/ Windows 7/Windows 8, Microsoft Disk Operating System (MS-DOS), Unix, Linux,
OS/2, etc.
Functions of the operating system: Controls movement of data to and from peripherals.
Acts as a background on which application programs can run. Manages hardware,
software and memory resources of a computer. Acts as an interface between the user and
the computer. Scheduling and loading of programs to provide continuous job processing
sequence. Provides a log of users for the computer. Handling of errors and correcting them
where possible. Protect hardware, software and data from improper use. Control over the
selection and operation of input, output and storage devices of the computer. Booting and
shutting down the computer.
Features (characteristics) of operating systems: Must be reliable in terms of being free
from errors and handling of all jobs. Must be efficient, that is should be able to use
resources fully ensuring good job processing, response time, turnaround time, etc. Must be
maintainable. Must be small in terms of storage space on the disk.
*NB: Response time – the time that elapses from the moment an instruction is given to the
computer and the time that instruction is carried out.
Turn around time – the time taken from the moment a document is produced by a
computer and the moment it is used as an input document to that computer again.
NB. Most operating systems are written in low level language. This is for them to quickly
coordinate computer activities since they will not be converted as they are already in
machine language. The following must be considered when buying an operating system:
Hardware type and computer design e.g. windows operating system works well on IBM
compatible machines. Applications intended for the computer e.g. accounting, stock taking,
etc. Method of communicating with the computer, that is, use of few or many peripherals
and terminals. Method of operating the computer e.g. multi access, multi programming, etc
- Monitor (supervisor) programs: - These are programs that supervise and manage hardware
and software elements of the computer
2. Time sharing operating systems: This type of operating system allows many
users to use the same processor at a time, using the round robin method by use of time
slices. In Round Robin, each user is given a fraction of a second to use the processor so
that all users seem not to be sharing the processor.
*NB: - Time slice: A brief period of time during which a particular task is given control of
the microprocessor in a time-sharing multitasking environment. A computer's processor is
allocated to an application, usually measured in milliseconds. Time slice is also called
quantum.
Multitasking: It is the concurrent execution of two or more programs on the same computer by
use of time slices.
3. Multi Access / Multi user operating systems: It is when many online users
access one processor at the same time to make use of multi-programming.
4. Multi-programming: This is whereby two or more programs (tasks) are being
processed (run) at the same time on one computer by use of time slices, for example
playing music while typing a document. Programs may take turns to make use of the
processor, thus when one is using the CPU, others will be using the peripherals. It uses
interrupts to pass control from one program to another.
5. Multiprocessing: A type of operating system that allows one computer to have two
or more processors but sharing the same memory, e.g. dual core computers.
6. Batch Processing System: - A system in which data is collected over a long
period of time, put in groups and processed with minimum or without user interaction as in
payroll processing. Jobs can be entered at a remote terminal, that is, without direct
communication with the host computer. Thus batch processing promotes Remote Job
Entry (RJE): which is the entering of data into the computer through a terminal far away
from the host computer.
- For instance, a central computer can process batches of cheques collected from
different branches, mostly during the night. If there are errors, the results will also be
wrong. Batch processing is very cheap to operate and easy to run. Users can also perform
some other tasks while batch processing takes place.
- In batch processing, there is minimum or no human intervention during data
processing period. It is used where large amounts of data is processed and where
processing does not need to be done immediately, e.g. in Payroll processing, water billing,
electricity billing, telephone billing, clearance of cheques, etc).
b. Translators: - These are programs that convert source code to object code. Translators
are in two forms, which are interpreters and compilers. These will be covered in more detail
under Programming Languages.
c. Utility Programs: These are programs used to perform specific, useful and frequently
needed tasks in a computer. Utilities include the following:
i. Virus Scan Utility: These are programs that protect computers from virus attacks, for
example Norton Antivirus, AVG, Avast, Esat NOD32, MacAfee, etc.
ii. Sort Utilities: These are programs used to arrange data, files and records into a specific
ordered sequence, for instance in ascending or descending order of a given key.
iii.Debuggers: These are utilities used for assisting in correcting errors in programs.
iv. Dump Utilities: These are programs that assist in copying data from main storage to output
devices and to other storage devices like the hard drive.
v. Editors: These are programs used to make changes to data already held in the computer. vi.
Peripheral Transfer Utility: These are programs used to transfer data from one peripheral
device to another.
vii. System Status Utilities: These are programs that provide information on the state of
files, memory, users and peripherals. viii. File Maintenance Utilities: These are programs
used to reorganise programs and to update them.
APPLICATION SOFTWARE
This refers to programs and their documentation, designed to perform a specific task like
payroll processing, word processing, etc.
Application package (suite):- a collection of application programs purchased as one package,
for example Microsoft Office 2010.
Integrated Package: A collection of a word processor, spreadsheet, database and presentation
packages bought as one package, for example, Microsoft Office 2010.
Advantages of Integrated Packages are: It is cheap to buy as compared to buying single
application programs at a time. Programs have been tried and tested and therefore are
free from errors. Programs are designed in a similar way, making it easier to learn others if
you are able to use one of them. Programs are easier to use and to learn, for example,
when designing a database using Microsoft Access. Regular updates are provided on the
internet or on disks.
Disadvantages of integrated packages are as follows: They are not tailored for
individual user requirements. Organisations purchasing them have little or no control over
their use. The packaged programs can only be modified by the programmers (owners).
Most of the need regular updating, which may be expensive.
3. Presentation Packages: These are programs used for designing slides for a
presentation to an audience, for example Microsoft Office PowerPoint, Lotus Smart Suite,
etc. Presentation packages include text, pictures, sound, animation, graphics and tables,
thus being multimedia. Presentations are colourful and attractive. Speakers and projectors
are needed. Presentation packages have the following features: Have Clip art. Can
accommodate images and graphics. Can use sound, video and animation. Incorporate
Word Art. Have facility to insert charts and graphs.
*NB: Animation: - Creating illusion of moving sequence using a series of still images as done in
movies and cartoons.
4. Database Packages: Refers to programs used to create databases for storage and
management of a collection of data related to a particular subject, for examples Microsoft
Office Access, Dbase IV, etc
Graphics, Corel Draw, Real Draw, etc. Computer graphics are images designed for logos,
commercial and news inserts during television advertisements or transmission.
Advantages of Desktop Publishing: Users have more control over text layout compared
to word processors especially over formatting and layout of text. Lots of different files can
be brought together on the same document. Produces colourful and attractive documents
for commercial purposes like brochures.
8. Authoring Packages: Software that can be used to develop interactive computer
programs without the technically demanding task of computer programming. Also used in
multimedia presentations. These programs can be used for developing databases and
material for Computer Aided Instruction (CAI).
*NB: - Specialist Packages for Business: These are packages for use in a specific
business environment, for example, Pastel for accounting purposes.
*NB: - Install: - to add programs to the computer. Therefore to uninstall is to remove programs
from the computer.
TYPES OF SYSTEMS
1. Real Time Processing System: - An online system in which individual, discrete
transactions are processed as they occur to influence the activity currently taking place, as
in airline reservation. Results of the process are produced immediately. The system
response quickly and give feedback of a request. Thus the system is interactive in nature.
Such systems include airline reservation systems, hotel reservations, stock control, etc. 2.
Transaction Processing System: A mode of processing whereby only individual items of
data need immediate processing e.g., processing of salary of one worker only in an
organisation, airline reservation, balance enquiry at an ATM, etc. Transaction processing‘s
requirements include: A large quantity of hardware support. Large and fast main storage,
over 1 GB. Large and fast backing storage like hard drives of about 300 GB. Efficient
communication equipment like fibre optics, satellites, etc. Efficient, secure and reliable
operating systems. However, transaction processing systems are very expensive to run.
3. On-Line System: A system that is directly linked to the host computer for real-time
communication and provides interaction between the user and the job, as in POS terminals
in supermarkets. In networked computers, the terminals must be directly linked to the host
computer. Examples include ATM systems in banks, airline reservation systems. Online
systems can just be for information retrieval. Information retrieval systems are there for
users to access certain information promptly as on the internet. In contrast, offline
systems are computer systems that work without being directly connected to the host
computer.
4. Network Systems: - A system in which processing is carried out independently in
more than one location but with shared and controlled access to some common facilities
like file storage.
5. Control System: - A system in which one or more computers are used to monitor
the operations of some non-computer equipment like in oil refineries. Control systems
involve monitoring and logging of physical quantities, provide an analysis of performance
and allows some user interaction. Feedback is an essential element as well as timing.
Most control systems are real-time systems, e.g. oil refining, chemical processing, traffic
control, etc.
6. Automated Systems: - These are control systems that are dedicated to one
particular task and lack the ability to collect and analyse data as in digital cameras. They
do not allow for or act on user interaction, e.g. washing machines, cameras, watches. Most
control systems have embedded computers systems inside them.
7. Multimedia Systems: - Are systems that enable presentation of data in a number
of formats like sound, pictures, films, video, etc. A computer that can be referred to be a
multimedia system should have at least a CD – ROM/DVD-ROM drive, speakers, large
RAM size, large disk storage space, sound card (device for recording and playing back
music), video card and multimedia software like Windows Media Player
8. Distributed (decentralised) Systems: A system whereby processing is done
independently in more than one location but with shared and controlled accessed to
common facilities, like file storage as applied in departmental shops. These systems are
normally found in departmental shops, bank branches that will be linked together, etc.
Advantages of distributed systems: Users feel more involved and responsible and this
increase motivation. Systems often meet user specific needs and requests for changes are
more readily met. Costs of physical and electronic movement of data are reduced. The
total breakdown of information processing disappears. Disadvantages of distributed
systems: There is often lack of coordination and control. It is difficult to impose
standardisation, adequate security measures and sharing of data and knowhow. Difficult to
obtain integrated information for top management. Duplication of data is rampant.
Excessive investment in hardware, software and personnel is involved.
9. Centralised systems: This is whereby processing is carried out at one central
location for an organisation with a number of branches. Users in other locations can view
data and utilise it but with limited capabilities. Centralised processing has the following
advantages: Hardware within the organisation will be compatible and can be linked. The
organisation gets better deals in terms of maintenance contracts. Employees do not have
to learn new systems when they move from one department (or branch) to another. It is
easier to coordinate staff training courses using the same software and hardware for all
departments (or branches). There is better control over use of unlicensed software. Data
can be exchanged easily between similar types of hardware and software
Advantages of Networking
Expensive peripherals like printers and scanners can be shared between users. Messages
can be sent easily and faster between users whether on WAN or LAN. Avoids duplication
of information as users can access the same file on the network. Network software can be
purchased cheaply than buying individual packages for each computer. It is possible to
access data or programs from any terminal or workstation. Data and programs can be
stored centrally making it easier to maintain and backup. Users can be easily prevented
from accessing files not intended for them. Allows sharing of files, software and data held
in computers. Allows emails to be send between users.
Disadvantages of Networking
Sophisticated equipment is needed, which may be expensive to buy. Security of data can
be a problem due to hacking. Wiring can be expensive both to buy and to install; wiring can
be sunk on the ground to avoid trailing cables. If a server breaks down, the whole network
becomes unusable. Networks need experienced network managers, who will be highly
paid to keep the network running.
TYPES OF NETWORKS
Computer networks are grouped into Local Area Networks (LAN) and Wide Area Networks
(WAN) and these are described below.
SOFTWARE REQUIREMENTS
FOR A LAN CONNECTION
1. Communication
software like TCP/IP –
Transmission Control
Protocol Internet Protocol. A
protocol is a set of rules
followed by devices when
they are communicating.
- 2. Network operating system:
manages the network and network devices
1. Ring Network:
Computers are connected together to form a circle and uses a token when transferring data.
Information travels in one direction only. Information moves around the ring in sequence from its
source to its destination.
2. Star Network:
Computers form a star shape with host computer
at the centre, as shown below:
Advantages of Star Network
- If one terminal breaks down, the network
is not affected.
- If one terminal breaks down, others will
remain working.
- It is cheap in terms of requirements since
only the host computer can have a processor and
storage facility.
- It is very easy to install.
- Management of data is easier as this is
done centrally.
- It is very fast to process data.
- Easier to add new workstation without
disrupting the network.
- No problem of collision of data since each
terminal has its own cable to the host computer.
- Gives consistent performance even when the network is heavily utilised.
- More secure than other network topologies
3. Mesh Network
A network in which each computer serves as a relay point for directly sending information
to any other computer on the network. No central device oversees a mesh network, and no
set route is used to pass data back and forth
between computers. Thus, if any one
computer is damaged or temporarily
unavailable, information is dynamically
rerouted to other computers—a process
known as self-healing
4. Bus(Linear/Multi-
drop) Network:
Computers are connected
together through one main
cable and all computers all
signals transmitted by any
computer connected to the network
(a) Bus: the dedicated and main cable that connects all workstations and other
computer devices like printers.
(b) Nodes: these are connection points for workstations and the bus.
(c) Terminator: devices that prevent data in the bus from bouncing back, causing
noise and prevents data from getting lost.
THE INTERNET
It is a global connection of computer networks.
Other requirements
1. An internet account: a unique personal identifier given by the Internet Service Provider
(ISP). An ISP is an organisation that links users to the internet, for example, Mweb, Ecoweb,
Africaonline, Yahoo and Google Inc. The internet has become a source of a wide range of
information globally.
Can be accessed from anywhere in the world. Information on the internet is up-to-date.
Multimedia can be used. Huge amounts of information can be accessed; e.g., magazines,
encyclopaedia, dictionaries, newspapers, textbooks, etc. Search engines are available to
assist in finding information. Using emails you can access experts from all over the world
on certain subjects.
Disadvantages of the Internet as a Source of Information
Equipment and connections needed are very expensive (computers, modems (ISDN
adapters) ISP, telephone). One needs knowledge to perform searches effectively. Problem
of hackers. Breaches of copyrights are very common. Rampant spread of rumours on the
internet. Spread of pornography to young people. Leads to loss of privacy. Some people
become internet addicted and tend to interact with computers more than with human
beings. Credit card fraud is rampant.
feel left out as they consider themselves too old to learn. Equipment used to send and
receive e-mails is very expensive as compared to traditional methods.
However, despite the increase in the use of e-mail, there has been a sharp increase in the
amount of paper used. This is because: People print copies for meetings and then destroy
them afterwards, but if needed again, print out another copy. Some people find it difficult
reading large amounts of text on the screen. People often e-mail colleagues rather than
use the phone who then print out the document.
4. View data (videotext) systems: These are interactive systems on which users view data
when they access specialized databases like Prestel. The requirements include the telephone
line or cable TV, specialized keyboard and a Television set. Information on the database is
provided by companies that advertise their products like news, weather reports, and so on. View
data systems have the advantage that they are interactive and the service is provided for free to
the public. However, its requirements are expensive.
6. Facsimile (Fax): A method whereby output from a scanned document is send over
telephone line and reproduce on a fax machine on the receiving end. Fax method has the
following advantages:
It is very cheap to send messages. It is very easy to use. It is a very fast method of sending
messages.
However, it has the following disadvantages:
Its requirements are expensive (fax machine). There must be a person at the receiving end to
attend to the fax when receiving messages.
The use of fax, e-mail, view data, teletext, teleconferencing and video conferencing in an
office brings about an electronic (paperless) office. An electronic office is an office in which
the storage and processing of data as well as communication are done electronically. An
electronic office is efficient because: Communication is easier and faster. Less paperwork
is involved. Current and up-to-date information is provided. Ensures a clean office
environment.
However, it is very expensive to setup and maintain an electronic office.
*NB- The use of computers to perform all clerical and office duties is called Office Automation.
Tele and video conferencing as well as networking bring about tele-commuting (tele-
working). Telecommuting is carrying out work without leaving home. Communication is
done through networked computers. Requirements for telecommuting includes: modem,
very fast communication links (for example telephone line), computers, internet services,
etc.
Benefits of telecommuting
Easier to concentrate on work in a quiet environment than in a noisy office. It saves time
spent in travelling to the work place thereby increasing productivity. It cut costs involved in
travelling to work place. The employer saves costs of office space and overheads like
water and electricity. People can be recruited from a wide geographical area. People with
disabilities like the handicapped can be employed. People in different locations can work
as a team.
Disadvantages of tele-commuting
Workforce not in office is difficult to control. Workers would not understand corporate goals
and will not be loyal to the organisation. Employees feel isolated and miss the environment
of an office full of colleagues. People may find it difficult to work in teams. It is difficult to
separate work from home duties while at home. Unions find it difficult to mobilise workers
for demonstrations and strike.
NB. Hyperlink :- an HTML page on the World Wide Web. The websites must be stored on a
server provided by the Internet Service Provider (ISP)
2. File Transfer Protocol (FTP): program that allows users to transfer files from host
computers on the internet to their personal computers.
3. News groups: a global electronic bulletin board system in which users exchange
information on different topics.
4. Entertainment: the internet provides an option for users to download and listen to
music, newspapers, radio stations, etc.
Business is carried out any time of the day (provides a 24 hour shopping service).
Increases sales due to greater number of customers from all over the world. No wastage
space for goods is involved. Ensures huge saving on overheads like rent, warehousing,
employee facilities. More goods can be made available. It is cheaper to use as there are
no leaflets, pamphlets, etc. Can reduce the number of shops on the streets. Organisations
can employ fewer workers thereby cutting labour costs. No need to travel to the shop as
business can be run from home.
To businesses
Increase in cases of industrial espionage. Industrial espionage involves selling of
company secrets by employees to rival companies and the use of destructive methods by
competitors to destroy other organisations.
DATA COMMUNICATION
This deals with the means of sending and receiving data on networked computers. Transmitted
data can be in analogue or in digital form.
Digital Data: Data is in discrete value, that is, in ones and zeros.
Analogue Data: Data is in continuously varying form, e.g. human voice.
Transmission Modes
Transmission modes include Simplex, Duplex (Full duplex) and Half Duplex
Simplex Transmission Mode Half Duplex Transmission Mode Duplex Transmission Mode
Diagram A B C
Simplex Mode: This is a mode of data transmission in which data travels only in one direction.
Thus one computer acts as the sender and the other as a receiver. See diagram A, above.
Half Duplex: This is a transmission mode in which data travels in both directions but not
simultaneously. See diagram B above. The receiver waits until the sender has finished sending
data in order for him to respond.
Transmission impairments
This refers to change in signal form as it propagates through the transmission channel.
Transmission impairments include:
Attenuation: The loss of signal power as it moves through the transmission channel.
Noise: Occurs when an unwanted signal from other sources than the transmitter enters the
transmission channel.
Multiplexing
This is a method of allowing multiple signals to share the same channel, reducing too much
cabling, as shown below:
A multiplexer is used in
multiplexing. A multiplexer is a
device that joins two or more
channels into one channel
while the de-multiplexer is
responsible for splitting a
channel into a number of them
Transmission Media
Refers to forms of media through which data is transferred from one point to another. These
include:
1. Twisted Pair: These are cables with two copper wires of about 1 millimetre thick.
The wires are twisted to avoid crosstalk. Twisted pair is very cheap to buy and offer good
performance over short distances. Disadvantages of twisted pair: Twisted pair is very
cheap to buy. Has big attenuation. Has low bandwidth
3. Fibre optics: A media that uses light to transmit data. It has less attenuation, has
very high bandwidth and cannot corrode (not affected by corrosion), it is thin and therefore
has less weight. However, fibre optics is very expensive to buy and is uni-directional
(travels in one direction only)
WIRELESS COMMUNICATION
This is a method of networking computers and computer devices without the use of
cabling, e.g. using blue tooth, radio, optical, satellite, infra-red, microwave, etc. The
devices that are used in wireless technology include: 3G (Wireless Application Protocol
(WAP)) mobile phones /cell phone/remote key pad/remote control/ remote keyboard. infra-
red mouse. Multimedia mobile handsets and notebooks. GPRS (general packet radio
service) modems. Wireless LAN(or Wi-Fi –Wireless Fidelity: A local area network that uses
high frequency radio signals to transmit and receive data over distances of a few hundred
feet; uses Ethernet protocol). PDAs (personal digital assistants).
GPS - A navigational system involving satellites and computers that can determine the
latitude and longitude of a receiver on earth by computing the time difference for signals
from different satellites to reach the receiver
with an appropriate device can use your Wireless LAN and broad band link. Any one who
walks past your house or WLAN linked into a corporate system can access sensitive
information like credit card details. 3G phones are not compatible with 2G phones. Blue
tooth has limited range. Signals can be blocked, distorted or will be weak. Can lead to
health problems from microwaves
COMPUTER VIRUSES
A computer virus is a program which replicates itself, damages or corrupts files and
memory of the computer, for example, a Trojan horse. By replication, it means that the
virus can multiply itself (produces several similar copies of itself) when it enters the
computer system.
Signs and symptoms of virus attack on a computer:
Reduced system performance (reduced speed of operation). The computer displays nasty
messages on the screen. The computer displays a blank screen. The computer system
produces wrong results of a process. Unexplained and frequent lose of data held in the
computer. The hard disk becomes inaccessible (the user cannot access data held in the
computer). The computer fails to boot.
Antivirus programs
These are programs that detect computer viruses and reduce the risk of computers being
attacked by viruses for example Norton Antivirus, MacAfee, Avira, Avast, AVG, etc.
Advantages of GUI: It is faster to give commands by just clicking. It is easier for a novice
(beginner) to use the system right away. It is user friendly (this is an interface that is easy
to learn, understand and to use). There is no need for users to remember commands of
the language. It avoids typing errors since no typing is involved. It is easier and faster for
user to switch between programs and files. A novice can use the system right away.
Disadvantages of GUI: The icons occupy a lot of disk storage space that might be used
for storage of data. Occupy more main memory than command driven interfaces. Run
slowly in complex graphics and when many windows are open. Irritate to use for simple
tasks due to a greater number of operations needed.
2. Command Driven Interface: This is an interface which allows the user to type the
command to be carried out by the computer through the keyboard as supported by MS-
DOS. The user has to remember the commands to be typed when performing a specific
task. An example of a program that uses command driven interface is Microsoft Disk
Operating System (MS-DOS). The commands are abbreviated and short e.g. Del (for
delete), copy, print, etc.
Advantages of Command Driven Interface: It saves disk storage space since there are
no icons involved. It is very fast in executing the commands given once the user mastered
the commands. It saves time if the user knows the commands by heart.
Disadvantages of Command Driven Interface: It takes too long for the user to master all
the commands by heart. It is less user friendly. More suited to experienced users like
programmers. Commands for different software packages are rarely the same and this will
lead to mix-up of commands by the user.
3. Menu Driven Interface: This type of interface displays a list of options / commands
from which the user has to choose one by use of the mouse or keyboard. Below is an
illustration of a menu driven type of interface:
1. PRINT RECORD
2. DISPLAY RECORD
3. DELETE RECORD
4. EDIT RECORD
5. MY OPTION IS: __
The user has to enter 1, 2, 3 or 4 and then press enter on the keyboard.
Advantages of Menu Driven Interface: It is fast in carrying out task. The user does not need
to remember the commands by heart. It is very easy to learn
Disadvantages of Menu Driven Interface: The user is restricted to those few options
available and thus is not flexible to use.
4. Direct Manipulation Interface: The user is given a list of options and the effect of
carrying out an option is displayed on the
screen. The options are often represented by
an icon as shown below:
1. Buffers: This is a temporary memory store for data awaiting processing or output,
compensating speed at which devices operate, for example printer buffer. Buffering is
appropriate where an output device processes data slower than the processor. For
example, the processor sends data to the printer, which prints much slower and the
printer does not need to wait for the printer to finish printing in order for it to carry out the
next task. It therefore saves the data in a buffer where it will be retrieved by the printer.
Buffering usually match devices that work at different speeds, e.g. processor and disk.
Reasons for using printer buffers: Stores data or information being sent to the printer
temporarily. Compensates for difference in speed of CPU and printer. Allows CPU to carry
out other tasks whilst printer is printing.
Benefits of increasing size of buffer in a printer: Reduces the number of data transfers to the
printer. Ensures a more efficient use of the CPU. Larger files can be sent to the printer without
problems
6. Scheduling: This is whereby the processor decides the loading and execution of
programs to provide continuous job processing sequence. Scheduling can do this by giving
time slices to each computer or by queuing jobs. Scheduling generally ensures that:
No resource is heavily under-utilised or over-utilised. The maximum number of interactive
users get a reasonable response time. Making sure that no job is pushed to the back of a
queue. Getting maximum number of jobs done in the minimum amount of time.
*NB: Directory: - a folder used to store other folders and files in a hierarchical structure.
Directories are usually created in MS-DOS systems.
COMPUTER APPLICATION
1. COMPUTER APPLICATION IN HOSPITALS:
Uses of computers in hospitals include:
Storage of patient, supplier, asset and employee records. Monitoring patients and alerting
the doctors / nurses when a problem occurs. Taking measurements on patients, for
instance: blood pressure, temperature level, weight, etc. This relieves nurses of some
duties that will be boring, making them faster and more reliable. Used to aid medical
researches by analysing data produced from experiments. Used to aid diagnosis (used to
answer patient problems). Used to hold data for children‘s immunisation processes. Used
in medical diagnosis, whereby the computers are used to identify patient problems and
the therapy (treatment). Monitoring of patients during surgery as they control body
scanners and sensors.
There are however some hospital tasks that are more suitable for human beings to perform
than computers. These include dressing patients, bathing patients, etc. Control systems
are also used to monitor patients. Computers also act as expert systems. Computers have
the following advantages in hospitals:
Precise 'tests' and medical examinations. Faster medical alerts, which are more accurate
time-wise. Enhanced data about a patient‘s medical history. Accuracy in diagnosis.
Accuracy in billing. Automated updating of medical history
EXPERT SYSTEMS
An expert system is a program that mimic human reasoning in a specific field, for example
in medical diagnosis, mineral prospecting, engineering, coding games like chess,
tax/financial calculations, weather forecasting, fault diagnostics, criminology/forensic
science, career choices, etc. Expert systems are programs that make decisions or solves
problems in a particular field, such as finance or medicine.
An expert system contains the following:
i. A knowledge Base: a representation of facts (data) in a particular field (e.g. diseases,
symptoms, treatments, etc) ii. Inference procedure (engine): contains reasoning
methods used to arrive at a conclusion using information in the knowledge base. It
contains interrogation technique/questions and answers.
They are expensive to develop and to setup. They lack common sense as human beings
do. They lack creativity. They are unable to learn outside the system. They lack sensory
experience. They take time and are difficult to develop. They need to be constantly
updated to keep pace with recent developments in the field they are applied. This may be
difficult and time consuming. Data is entered by humans who may make mistakes in doing
so.
An expert system can be improved by: Frequently carrying out researches and making
updates. Quickly inputting new data into the knowledge base. Assigning its control to a
number of highly experienced personnel who will monitor and make updates as soon as
possible.
Artificial Intelligence
Artificial Intelligence(AI) is the science of developing computer systems that have the
ability to learn from experience and mimic human reasoning in specific areas, as in
medical diagnosis, mineral prospecting, etc. Expert systems are a branch of Artificial
Intelligence.
2. SIMULATION
It is the studying of the behaviour of a system by using models to predict future real life
events, like population growth, flight simulator, etc. In simulation, past and present data, as
well as models are analysed in order to predict the future. A model is a pictorial
representation of a real object, e.g. a bridge, house, etc. The use of real things has the
following disadvantages in simulation other than use of models:
Too dangerous to test with. Too large a time scale is required. It involves wastage of materials.
Takes much longer to build the real thing.
Simulation in Population Growth: Data needed include birth rate for the country, death
rate, previous growth rate for the previous 5-10 years, present population size, etc.
Cognisance can also be taken of natural disasters like floods, war, earthquakes, which
may distort the figures.
Simulation can also be used in Virtual Reality; which is the creation of simulated multi-
dimensional representation of real things, e.g. armies fighting against each other, in
chemical plants. Virtual reality needs devices like goggles (headsets), gloves, special suits
fitted in sensors, motors that provide movement, etc. Virtual reality ensures safety other
than using real objects, can perform real tasks without risks, can be used in dangerous
areas, and can store data and results on the computer.
- Simulation can be applied to games like chess, where the opponent‘s moves can be analysed.
ii. Stock Control Systems: Stock refers to goods purchased for resale. A computer
system can be used by managers to manage their stock in an efficient way in order to
provide efficient service to customers. Managers shall avoid overstocking and under-
stocking as this will have a negative effect in business. Typical records may have the
following:
Quantity in stock, item name, serial number, supplier name, minimum re-order level, etc.
If the quantity in stock reaches the minimum re-order level, an order should be placed for
more items. Computerised stock control systems are used to monitor stock levels in an
organisation. Computerised stock control can be done when goods are purchased at the
Point of Sale Terminal (POS) or as goods are moved from the warehouse. The computer
at the POS will be connected to the server in the manager‘s office. As the items are
bought, the number of quantity in stock is automatically reduced by the number of goods
purchased. If the quantity in stock reaches or becomes lower than the minimum re-order
level, the computer alerts the manager. This helps the manager as he is freed from the
task of manually counting the stock items and placing some orders.
The POS terminals can also be connected to the main server in banks like CABS,
Barclays, etc. This enables customers to purchase goods electronically without the burden
of carrying cash around. This is called Electronic Funds Transfer at Point of Sale
(EFTPOS). Customers can also be given cash back at the EFTPOS after purchasing
goods using debit cards.
After purchasing the goods, a receipt is produced. The receipt will have the following
details: date of purchase, time purchased, shop attendant, item (s) bought, quantity
bought, unit price, total price, amount tendered, change, etc.
Advantages of Using Electronic POS terminal to supermarket managers
It is automatic and more accurate to control stock. Automatic updating of stock file is ensured.
Automatic reordering of stock items is involved. Less staff and wages needed. Sales statistics
are always available.
Faster throughput is ensured. Itemised receipts are produced quickly. The system records
every transaction. The system records staff work rates. Less pilfering by staff as it is easier
to identify pilfering. Fewer errors are produced. Faster calculations are made. There is no
need to remember prices of goods.
NB. The system updates the master file when an item is sold. It first searches the master file.
Using the barcode number (or product code) it decrease the number in stock and increase the
quantity sold
*NB:
POS –Point of Sale terminal: the point where customers pay for goods purchased in shops,
either by cash or otherwise.
Difference between Electronic Point Of Sale (EPOS) and Electronic Funds Transfer at
Point Of Sale (EFTPOS).
EPOS terminal only involves scanning of goods electronically by use of barcodes and by
keyboard entry. EFTPOS involves electronic scanning of goods at point of sale by use of
scanners and barcodes (and use of keyboard) and has an added feature of allowing
customers to transfer money from one account to another, usually to the account of the
shop where the goods are being bought. Customers can also get cash-back at the
EFTPOS terminal in shops.
iii. Payroll Processing Systems: These are batch processing systems used to
process employee wages and produce payslips at the end. Data is first put in batches, e.g.
number of hours worked for each employee per day. Processing is later on done at
month-end or every Friday by compiling all the hours worked each day. A typical payroll
processing system will have the following details:
Employee name, employment number, national identification number, net salary, gross
salary, deductions (aids levy, NSSA, PAYE, Pension, etc) number of hours worked, salary
grade, bank name, account number, etc.
iv. Accounting Systems: These deal with handling of company‘s finances and could
be accounts receivables or accounts payables. Special accounting packages like Pastel
Accounting are used in financial systems. Calculations could be done automatically.
4. COMPUTER APPLICATION IN
BANKS Uses of computers in banks:
i. Used for storage of client account details like, account name, account number,
address, sex, date of birth, national identification number, balance, withdrawal, deposit,
overdraft, interest, etc.
ii. Used for cash disbursement at the Automated Teller Machine (ATM). An ATM is
a computerised, special purpose cash disbursement machine outside banking halls used
even when banks are closed. Services offered at the ATM include: Balance enquiry, mini-
bank statement, facility to change PIN code, cash withdrawal, cash deposit, etc.
PIN (Personal Identification Number) - a secret number used by individual account
holders to access his bank account and get service at the ATM. The account holder needs
a debit card for him/her to access bank services at the ATM.
The Account holder inserts the debit card into the hole on the ATM, which in turn request
the user‘s PIN. The user enters the PIN and then presses enter. The ATM validates the
PIN, and if it is correct, allows the user to select service required from the list of options
available. If the user enters the wrong PIN for three consecutive attempts, the ATM would
not eject the debit card, assuming that you are not the owner of the card and no service
shall be given.
iii. Clearance of cheques: The main branch receives cheques from other branches
and processes them using the batch processing method. MICR is used to read data from
the cheques into the computer.
Electronic banking (e-banking): the process of carrying out all bank transactions electronically
on the internet (internet banking) and by use of cell phones. This is almost similar to tele-
banking.
For Internet banking, credit cards are required for clients to get access to the bank
accounts. Data about credit cards is stored on the magnet strip and this includes: Date of
issue, Bank code, Branch code, Account number, Card number and Expiry date.
Information entered by a client to access banking services from home includes: Account
Number, Account name and password.
In home banking, users can stop a cheque, enquire their account balances, transfer
money between accounts, pay bills, order a cheque book, look at account transactions for
a given period, request a change of pin or password, amend or create standing
orders/direct debits, print statements and change personal details. It is impossible to
withdraw cash or pay in cash.
When purchasing the goods, the supermarkets and any other shops check the following on the
credit card:
Check if the card is valid. Check if credit limit is not exceeded. Check if credit card is not
reported as stolen. Check if expiry date has not been exceeded.
The introduction of ATMs, EFT and electronic banking, including internet banking has the
following advantages and disadvantages.
Advantages to Bank workers
Their workload is reduced, for instance the burden of counting cash and service many
clients can be done the ATM. Reduction in mistakes, for instance counting cash and
updating wrong accounts as the computers validate details during entry. Reduction in
working hours. Increased salaries. Better working conditions
ii. Distance learning made easier through chartrooms, digital interactive television,
CD-ROM (storage of encyclopaedia, learning materials (content)). Learning materials like
the encyclopaedia can be stored on the CD ROM as it will have the following advantages
as compared to a printed (manual) encyclopaedia: Cannot write to it so cannot be
changed. Can use sound, text as well as video for students to understand better. Search
of data is quicker. Can printout data conveniently. It takes up less space. Is more
portable.
iii. People with communication difficulties like the blind and deaf are assisted, e.g. in
voice recognition systems.
iv. Computers can be used to organise events in schools, for example, parents‘ visits,
timetable, etc. v. Used to store students data, exams, teachers records, etc. vi. Used as
teaching aids in all subjects. Enables interactive teaching vii. For marking multiple choice
examinations on scanner sheets viii. For storage of student data pertaining to subjects,
teachers and subjects taken. ix. Used as a subject for student to learn, e.g. Computer
Science, Information Technology, etc.
x. Used for carrying out researches and experiments which may be dangerous for human
beings to do. xi. Computers can also be used in Computer Aided Learning (CAL) and
Computer Aided Instruction (CAI). CAI: a teaching system that operates on drill and
practice principle, for instance, in teaching computers, a student is presented with a word
and its meaning. The student studies it and will be asked its meaning at a later stage.
CAL: This whereby a lesson is rehearsed before the computer and then played back to the
class when the teacher is not physically present. The computer is thereby used to teach
the pupil. For example, the computer present a topic just like a teacher does in a lesson.
Pupils are asked questions. If they fail, the lesson is repeated; otherwise a new topic will
be presented. CAL has the following advantages:
This system allows pupils to study at their own pace, repeating sections they do not
understand. Material is presented in a consistent way making learning easier. Few
teachers are required. Computers are endlessly patient and can repeat sections that pupils
did not understand without hesitation.
xii. Used for typing and printing examination papers and keeping of student results.
Some schools have pupils who are either blind or partially sighted. Computers could be used to
help these pupils to learn in the following ways:
Use of sound (voice) output and speech synthesiser. Use of speech (voice) input,
recognition or microphones. Type using large characters (large font size) on the screen.
Use of Braille keyboards, touch screens, touch pads. Use of bright colours to improve
visibility. Use of scanners to input information and output speech. Use of printers which
give output in Braille
iii. Used for industrial automation: whereby computers take control of all production
processes in industries. Computers ensure that products produced are of good quality
and are standardised.
v. Used for monitoring the production process (production control). Computer can monitor
and control temperature level, pressure level, etc, that might be vital for production
process. In this case, feedback is vital. If temperature becomes too high, the computer
will switch off the power supply and switch it on when temperature becomes low.
vi. Computers also monitor robots in car assemblies, television production, computer
manufacturing, etc. A robot is a computer controlled human-like device used in the
production of goods in industries. It is a reprogrammable, multifunctional device
designed to perform multiple tasks in industries, like spray painting, welding parts. The
term Robotics therefore denotes the science of developing and the use of computer
controlled devices to replace human beings in manufacturing. Robots are mostly used in
the following areas: Very dangerous areas for human beings work, e.g. fire fighting,
nuclear power stations, underground mining, chemical, nuclear factories, deep in the
ocean, in space
Areas where heavy items are to be lifted, e.g. for loading containers in ships, in
production lines Areas where the degree of accuracy is of utmost importance.
Thus producing standardised goods. Where work is repeatedly executed and
boring, like at, road junctions
9. Microprocessor-controlled streetlights
Input: Sunset time and Sunrise time and then sending a signal or
- Light sensor sends measurement of light to microprocessor, ADC converts this to digital
Processing: Compare sunrise time, sunset time and current time. If sunrise time = current time
or higher, switch off lights, else, if signal equals sun set time, the switch on light. Also the
amount of light is compared
with preset value. If higher – nothing happens, If lower or equal sends
signal to light Output: Lights switched on or off
DATA LOGGING
The process of automatically collecting data from source at set intervals for use at a later
stage. A device that automatically collects data from source at set intervals for use at a
later stage is called a data logger. Data loggers have the following features:
They contain processor inside them. They have own storage facility. They contain sensors
used for collecting data. They can be connected to small keyboards or other special
reading attachments. They are connected to an Analogue to Digital Converter (ADC),
which converts data signals in continuously varying form collected by sensors into discrete
values that can be accepted by the computer.
Data loggers can be used to measure the pollution level in a dam or river, as shown below:
Reasons why computers are used rather than manual methods for this pollution data
logging
It takes more accurate readings. More readings can be taken in a short period of time.
Results can be obtained more easily and quickly. Graphs are automatically produced. No
chance of forgetting to record the temperature. Collects temperature over long periods
continuously/automatically. Data can be automatically stored and used in other programs.
The results of the system can be stored in a spreadsheet package or a database package
for future reference.
A word processor or DTP package can then be used to produce reports of the results.
The procedure will be as follows:
Spreadsheet file will be saved in suitable format. The template is created in DTP package.
The Spreadsheet file is copied and pasted in to the DTP package. The Pictures are
imported into DTP package. Text is typed in and formatted. Headings are formatted and
then printed
*NB: Sensor: A sensor is an input device that automatically records data by sensing the
environment it is supposed to record. Sensors receive a signal and respond to it in a
distinctive manner. The type of sensor is derived from the type of information it is
designed to collect. Some of the examples of sensors include: Optical sensors, light
sensors, pressure sensors, temperature sensors, humidity level sensors, sound sensors,
proximity sensors, position sensors, push switch, mercury tilt switch, pH sensor, weight
sensors, air pressure sensor, conductivity sensor, distance sensor, motion sensor, oxygen
sensor, ultra-violet irradiance sensor, radiation sensor, escaping gas sensor, etc. Sensors
are mostly used in conjunction with Analogue to Digital Converter (ADC) – This is a device
used to convert data in continuously varying form from the sensor into discrete value for
entry into the computer. A device that will convert digital data into analogue for is called a
Digital – Analogue Converter (DAC).
Nuclear Power Stations
The diagram below shows a nuclear reactor cooled by pumping gas around the core. The
reactor is monitored and controlled by a computer.
Sensors that are used to monitor the core include:
pressure sensor, temperature sensor, radiation sensor
and escaping gas sensor.
system loops.
Advantages of using a computer system rather than a manual system to monitor and
control the reactor
Can monitor process at a distance. It is a safer way of operation and is less dangerous to
humans. Computer is faster at taking necessary action. Has the ability to automatically
analyse data and produce graphs. There is less need for human intervention. It ensures a
24 hour monitoring while workers can get tired. It is a more accurate control mechanism.
DATA CAPTURING
It is the process of collecting and changing data from source into machine sensible form
before processing is done. It involves getting data into a structure in which it can be
processed by the computer. The following are some of the data capturing
techniques/methods:
Key-to-disk – A way of inputting data directly into the computer and onto the disk using the
keyboard. Voice Recognition/input, OMR, OCR, MICR, Barcodes , Tags (Kimball tags),
Turnaround Document: it is a document produced by the computer that can latter be used as
an input document to the computer, e.g. water bills, telephone bills, etc.
CODING DATA
Data to be entered into the computer can be coded / written in a short way, for example:
In databases, a field for sex can be coded as follows: F for Female, M for Female. In this
case the user just enters F or M and not the whole field as it is. The column for colour can
also be coded as B for Black, R for Red, Y for Yellow, etc.
Features of Codes
Should be of the same length. Must be easy to use. Must not be too short in case you will run out
of codes. Codes are often unique
NB: a UPS is a device connected between a computer and a power source to ensure that
electrical flow is not interrupted. UPS devices use batteries to keep the computer running
for a period of time after a power failure. UPS devices usually provide protection against
power surges and blackouts as well.
palm recognition systems. Installing the latest anti-virus software. Log users for computer
use. Use call back facility for incoming information. Check references of potential staff for
employment purposes. Divide jobs between several people and then supervise the staff.
Use physical locks like burglar bars, installing electric fences, etc.
2. Data integrity
This refers to the correctness and accurateness of data held in the computer. The issue of
data integrity and security lead to the introduction of some data protection laws which
govern how organisations holding public data must operate.
DATABASES
A Database is a collection of related files. Databases enable
addition, deletion and modification of data held in the computer.
A database system (elements) is made up of stored data, software to maintain the database and
the person working with the database.
TYPES OF DATABASES
These includes relational, hierarchical and network databases
1. Relational databases: These are database that organises data in a table format,
consisting of related data in another file, allowing users to link the files. Each column
represents an attribute (characteristic or field). Each row represents a record, as shown
below.
Relational databases organise data in a flexible manner. They are also simple to construct
and are easy to use. However, it may be difficult to come up with relationships. From the
above database structure, it can be noticed that:
- There are three records for Kapondeni, Turugari and Moyo. A record is also called a tupple.
- There are four fields: Student Number, Surname, First Name and Date of Birth.
- The student Number is used as a Primary Key (Key field) because it gives a unique(one)
record. A primary key is a field that is used to identify a unique record from a database. All
other fields from the above database are not appropriate for a key field because they can
identify more than one record. That is surnames can be similar for 2 or more people as well as
date of birth.
*NB: Concatenated key: the combination of two or more fields in a database in order to identify
a unique record, e.g. using the Surname, First Name and Date of Birth in search of one record.
*NB: Secondary Key: A field used to identify more than one record at a time, e.g. a surname.
*NB: Attribute: A characteristic of a record, e.g. its surname, date of birth.
Entity: any object or event about which data can be collected, e.g. a patient, student, football
match, etc.
2. Network Databases
3. Hierarchical database: These are databases in which records are subordinates to other
records in a tree structure of database. It promotes grandfather, father, and son relationship of
records as illustrated below..
DBMS components
i. Data Dictionary: this contains names and descriptions of every data element in the
database. Descriptions are on how data elements are related to each other. The Data
Dictionary (DD) stores data in a consistent memory, reducing data redundancy. ii. Data
Languages: a Special language used to describe the characteristics of a data element
placed into the DD. This language is called the DDL iii. Security Software: provides tools
used to shield the database from unauthorised access. iv. Recovery and archiving
system: these allow data to be copied onto backups in case of disaster.
v. Report writers: these are programs used to design output reports without writing an
algorithm in any programming language. vi. Teleprocessing monitors: Software that
manages communication between the database and remote terminals.
Advantages of Databases
Validation checks are made on data during entry thereby reducing data entry errors.
Searching and retrieval of data is very fast. Less likelihood of data getting lost. Record
structure can be easily modified if the need arises. Files can be linked together making file
updating easier and faster. Avoids data redundancy. Data can be secured from
unauthorised access by use of passwords. Users can share data if the database is
networked. Duplication of records is eliminated. Ad hoc reports can be created easily.
Sorting of records in any order is very fast
Disadvantages of databases
If the computer breaks down, you may not be able to access the data. It is costly to initially
setup the database. Computer data can be easily copied illegally and therefore should be
password protected. Takes time and costs to train users of the systems. Expensive to
employ a database administrator who will manage the database
Advantages of computer based systems as compared to manual filing systems.
Work can be done anywhere, even at offices in different countries. It is quicker to transfer
files to other offices. Fewer staff is employed thereby saving expenses on wages. There
are less chances of files getting lost. Less paperwork and storage requirements are
needed. It is quicker to search needed records. It is quicker to sort records in any order
using any field. It is quicker to cross reference files. It is quicker and easier to insert
sections of files into reports
However, the introduction of the computer systems means that staff would need new skills,
can lead to unemployment, people are likely to work from home, could lead to de-skilling
and some health problems will suffice.
Sample Question
A database stores details about cars in a showroom: The database information can be
amended, deleted or new ones inserted due to:
Amended: information in the databases is incorrect. Price of vehicle needs to be changed (e.g.
sales).
Change of vehicle colour.
Deleted (record deleted): Vehicle is sold or Vehicle is scrapped
Inserted/ added: new vehicle arrived. More information about current vehicle becomes known.
FILE HANDLING
Types of files
1. Master File: It is a relatively permanent file that is kept up-to-date by applying
transactions that occur during business operations. It contains permanent and semi-
permanent data. Static (permanent) data stored in database files can include Surname,
First names, Date of birth, etc.
2. Transaction Files: These are files that contain data that can change regularly, e.g. on
daily bases and it is used to update the master file. This includes sales per day, student
mark in a weekly test, etc. Transaction files are used to update master files.
3. Reference files: These are files that contain permanent data which is required for
reference purposes only.
This includes data on tax bands, formulae, etc. No changes to files are done.
4. Data file: A set of related records (either written or electronic) kept together.
NB:- * Indicates the end of field marker, and the ≈ indicates the end of record
marker Variable length records have the following advantages:
They are more economical in terms of usage of disk storage space as they do not allow spaces
to lie idle.
Data entered will not be cut but appears as entered no matter how long it is.
However, variable length records have the following disadvantages:
End of field and end of record markers occupy disk storage space that might be used to store
data. These records are difficult to update as the transaction and master files might have
different lengths.
FILE ORGANISATION
Refers to the way in which records in a file are stored, retrieved and updated. This affects
the number of records stored, access speed and updating speed. The most common
methods of file organisation are: Serial File Organisation, Sequential File organisation,
indexed – sequential file organisation and random (direct) file organisation.
1. Serial File Organisation: This is whereby data is recorded one after another as
they occur, without any definite order as on magnetic tapes. Data is read from the first
record until the needed data is found, as on magnetic tapes. New records are added to the
end of the file. Serial file organisation is not appropriate for master files since records are
not sorted and therefore are difficult to access and to update. Suitable for temporary
transaction files since records are not sorted.
2. Sequential File Organisation: This is whereby records are sorted into a key
sequence, that is, in ascending or descending order of a given key filed as on magnetic
tapes. Sequential files organisation is appropriate for files with a high hit rate like payroll
processing. They are suitable for master files since they are ordered. However, it takes too
long to access required data since the records are accessed by reading from the first
record until the required data is found. Adding of new records is difficult as this is done by
re-entering the data and the new record is inserted at its right position. It time consuming to
update such records. Suitable for master files since records are sorted. This is used where
all records need processing
3. Indexed-Sequential Files: This is whereby records are ordered in sequence based
on the value of the index or disk address as supported by hard disks. This is used for
storing master files records since the records are ordered. It is also suitable for real time
processing applications like stock control as it is fast in accessing records and in updating
them. It provides direct access to data as on hard disks, diskettes and compact disks.
4. Random (Direct) File Organisation: This is whereby records are stored in no
order but accessed according to their disk address or relative position, as supported by
hard disks and compact disks. It is appropriate where extremely fast access to data is
required as in airline reservation. Updating of records is in situ, very simple and very fast.
Hard disk, compact disks and diskettes promotes random file organisation.
FILE PROCESSING
Refers to any form of activity that can be done using files. This includes: file referencing,
sorting, maintenance and updating.
1. File Referencing/Interrogation: This involves searching of record and displaying it on
the screen in order to gain certain information, leaving it unchanged. The record can also be
printed.
2. Sorting: Refers to a process of arranging (organising) records in a specific ordered
sequence, like in ascending or descending order of the key field.
3. Merging Files : This is the process of combining two or more records into one. Below is
an example of how records can be merged:
4. File maintenance: This is the process of reorganising the structure of records and
changing (adding or removing or editing) fields. This can be due to changes due to addition or
deletion of records.
5. File Updating: Updating is the process of making necessary changes to files and
records, entering recent information. Only master files are updated and they must be up-to-date.
For updating to occur, any one of the following must have occurred:
A new record has been entered. Deletion of an unwanted record. An amendment (change) to
the existing data has been made, e.g. change in date of birth only.
a. Updating by copying
This happens in sequential file updating. This is done through the following steps:
- A record is read from master file into memory. A record is then read from transaction
file into memory. Record keys from each file are compared. If record keys are the
same, the master file is updated by moving fields form transaction file to the master
file.
In sequential file updating, it is recommended to keep at least three master file versions that
will be used for data recovery in case of a system failure or accidental loss of data. The first
master file is called the Grandfather file, the second master file is called the father file and the
third master file is the son file. This relationship is called the grandfather-father-son version of
files. The process of keeping three versions of master files (grandfather-father-son) as a result
of sequential file updating is called File
Generations. Thus the first master file
(grandfather file) is called the first
generation file, the second master file
(father file) is called the second
generation file and the third master file
(son file) is the third generation file. The
following diagram illustrates the
sequential file updating process:
PROGRAMMING CONCEPTS
Definition of terms:
- Program: a set of detailed and unambiguous instructions that instructs a computer to
perform a specific task, for example, to add a set of numbers.
- Programming: A process of designing, coding and testing computer programs
- Programmer: A person who specialises in designing, coding and testing computer
programs - Problem: any question or matter involving difficulty or uncertainty and is
proposed for solution.
PROGRAMMING LANGUAGES
A programming language is a set of symbols in computer language that are used in coding
computer programs. Programming languages are of the following types:
1. Low Level Languages (LLL): These are programming languages used to write programs
in machine code, that is in zeros and ones or in mneumonic codes. Low level language is in
two forms: Machine Language and Assembly Language.
a. Machine code (language) is the language used to write programs in binary form (zeros and
ones). Machine language has the following advantages:
(i) Programs run faster since they are already in computer language. There is no need for
conversion as programs are in machine language. (ii) Programs occupy very small disc
storage space by storing just 1s and 0s.
Disadvantages of Machine language:
They are very difficult to learn. They are difficult to understand. Very difficult to use and
takes too long to find an error in a program. It takes too long too develop working
programs. They are machine dependent (they can only work on type of computer designed
for and not work on other computers)
b. Assembly Language: These are programming languages that use mneumonic codes in
coding programs. Mneumonic codes are abbreviations used in coding assembly language
programs, for example, LDA for Load, ADD for Addition, etc. Mneumonic codes are very
close to machine code, hence are low level language assembly language codes
Advantages of Assembly language:
One assembly language instruction corresponds to one machine code instruction and
therefore translation is easier and faster. Programs run faster since they are close to
machine code. They occupy very small disk storage space hence are economical to use.
Easier for a programmer to use than machine language.
Disadvantages of Assembly Language
They are very difficult to learn. They are very difficult to understand. Takes too long to develop
working programs. They can be machine dependent.
NB. Assemblers: These are programs used to convert assembly language instructions into
machine language. Other uses of assemblers include:
They generate machine code that is equivalent to assembly language. They are used to
check the validity of instructions, that is, checking for syntax errors in an instruction. They
also assign memory locations to variables.
2. High Level Languages (HLL): These are programming languages that use English-like
statements in coding programs, for example COBOL, Pascal, BASIC, etc. There are so
many high level languages because each language is designed for a specific problem to
be solved in our daily lives. For example BASIC was designed for learning purposes,
COBOL for business applications, FORTRAN for scientific purposes, etc. Below is an
example of a BASIC program that accepts two numbers entered through the keyboard,
adds them and display the result on the screen:
INPUT ―ENTER FIRST NUMBER.‖, A
INPUT ―ENTER SECOND NUMBER.‖, B
SUM = A + B
PRINT SUM
END
Programs written in High Level Language are first converted to machine code before running.
Disadvantages of HLL
Takes long to run since they need to be first converted to machine code. They occupy a lot of
disk storage space as compared to low level languages.
TRANSLATORS
These are programs used to convert High level Language programs into machine code, and are
in two types, which are interpreters and compilers, which are further explained below:
Interpreters
These are programs that convert and run one instruction of a program at a time until the
end of the program, e.g. the BASIC interpreter. They do not produce the machine code
version of a program; hence conversion is repeated when you run the program again.
Functions of Interpreters
They check syntax error in a program statement. They translate an instruction into machine
language and run it. Allocates storage space to variables.
Advantages of interpreters
It is easy to find and correct syntax errors in interpreted programs. It is very fast to run
programs for the first time. It is very fast to run small programs.
Disadvantages of interpreters
They are very slow in running very large programs. They do not produce an object code of a
source code and hence difficult to use.
Compilers
These are programs that convert a high level language program into its machine code
equivalent at one go and then run it, e.g. the COBOL compiler. Once compiled, the
program no longer needs conversion since the machine code version is the one that will be
run, until some changes are made to the program code. Functions of Compilers
They check syntax errors in program statements. They allocate storage space to variables.
Translate the whole program into machine code at one go. Run an object code of the
program. Produces a program listing which indicates position of errors in a program.
Advantages of Compilers
Compiled programs runs faster since the object code is run. Compilers indicate the line
numbers with syntax errors and therefore assist programmers in debugging programs.
They are appropriate even for very large programs.
Disadvantages of Compilers
Slower than interpreters for running programs for the first time. They can cause the
computer to crash. Difficult to find errors in compiled program.
*NB: Source Code refers to the program written in English-like statements (High Level
Language) by the programmer.
Object Code refers to a machine code version of a source code. All programs written in source
code must be converted to object code for the computer to understand them.
6 Occupy large disk storage space on the Occupy small disk storage space on the computer
computer
7 They are machine independent They are machine dependent
3. Very High Level Languages (VHLL) – 4GLs: These only specify the desired end
result and do not indicate steps that the computer needs to take to make the calculation,
e.g. SQL used in relational databases. 4GLs are flexible and easy to use since no coding
is required.
4. Natural Language – Artificial Intelligence and expert systems: These are
programs that mimic human reasoning and learn from experiences.
Procedural Languages: These languages give a precise definition of the steps to be followed
by the computer in order to perform a specific task. Most High Level Languages are procedural
languages.
*NB: Library programs: this refers to a collection of standard programs and subroutines
that are stored and available for immediate use by other modules in the system. Library
programs are referenced by most modules in the systems.
*NB: Stepwise refinement: a technique used in developing the internal working of a module.
ALGORITHMS
A set of instructions describing the steps followed in performing a specific task, for
example, calculating change. Algorithms can be illustrated using the following:
Descriptions, Flowcharts, Pseudocodes, Structure diagrams
a. Descriptions: These are general statements that are followed in order to complete
a specific task. They are not governed by any programming language. An example is as
follows:
o
Enter temperature in C
Store the value in box C
o
Calculate the equivalent temperature in F
Store the value in box F
Print the value of box C
and F End the program.
A number of control structures are used in designing Pseudocodes. These includes: simple
sequence, selection and iteration.
i. Simple sequence: This is whereby instructions are executed in the order they appear in
a program without jumping any one of them up to the end of the program. Statements
are executed one after another in the order they are. It is simple and avoids confusion.
Example:
Enter first number, A
Enter second number, B
C=A+B
Print C
Stop
ii. Selection Structure:
This allows one to choose the route to follow in order to accomplish a specific task. Selection
is written using the IF ....THEN...ELSE statement or the CASE statement.
IF...THEN ...ELSE statement: A programming structure that allows the user to choose one
from at least two routes of solving a problem. The following Pseudocodes compares two
numbers entered through the keyboard and determines the bigger one.
Enter first Number, A Enter first Number, A Enter first Number, A
Enter second number, B Enter second number, B Enter second number, B
IF A>B THEN IF A > B THEN IF A>B THEN Print A is bigger
Print A is bigger Print A is bigger IF A<B THEN Print B is bigger
ELSE ENDIF IF A=B THEN Print Numbers
IF A<B THEN IF A < B THEN are equal
Print B is bigger Print B is bigger END
ELSE ENDIF
Print Numbers are IF A = B THEN
equal Print Numbers are
ENDIF equal
ENDIF ENDIF
END END
A B C
The above 3 Pseudocodes produces the same result.
CASE Statement: This is an alternative to the IF...THEN...ELSE statement and is shorter. For
example:
a. For...Next Loop: A looping structure that repeatedly executes the loop body for a specified
number of times. The syntax of the For...Next loop is as follows:
Statement 1
Statement 2
loop body ................
NEXT {variable}
A group of statements between the looping structures is called the loop body and is the one that
is repeatedly executed.
The For...Next loop is appropriate when the number of repetitions is known well in advance,
e.g. five times. An example of a program that uses the For...Next loop is as follows:
Sum, Average = 0
FOR I = 1 to 5 DO
Enter Number
Sum = Sum + number
NEXT I
Average = Sum/5
Display Sum, Average
End
b. Repeat...Until Structure: This is a looping structure that repeatedly executes the loop
body when the condition set is FALSE until it becomes TRUE. The number of repetitions
may not be known in advance and the loop body is executed at least once. The syntax is
as follows:
Repeat
Statement 1
Statement 2 loop body
................
Until {Condition}
For example
Sum, Average, Count = 0
Repeat
Enter Number (999 to end)
Sum = Sum + Number
Count = count + 1
Until Number = 999
Average = Sum / count
Print Sum, count, Average
End
In the above program:
- Count records the number of times the loop body executes.
- 999 is used to stop further data entry through the keyboard and thereby ending the
loop. Such a value that stops further data entry through the keyboard thereby
terminating a loop is called a Rogue value or sentinel.
- The condition here is {Number = 999}. The loop exits when the number 999 is
entered. If 999 is part of the number to be entered in this program, then the user
has to split it into two numbers, that is 999 = 990 + 9, therefore can be entered
separately as 990 and 9.
- A flag is also used to control the loop. In this case 999 is also a flag.
NB. As for the Repeat...Until loop, the condition is tested after the loop body has been run at
least once, even when the condition is true from start. This is rather misleading.
c. While ... Do Statement: A looping structure in which the loop body is repeatedly
executed when the condition set is TRUE until it becomes FALSE. It is used when the
number of repetitions is not known in advance. The condition set is tested first before
execution of the loop body. Therefore the loop body may not be executed at all if the
condition set is FALSE from start. The syntax of the WHILE…ENDWHILE structure is as
follows:
WHILE {condition}
Statement 1
Statement 2 loop
body ................ ENDWHILE
The word WEND can be used to replace the word ENDWHILE in some structures and
therefore is acceptable. The word Do, after the condition is optional.
c. Flowcharts
It is a diagram used to give details on how programs and procedures are executed. Flowcharts
are drawn using specific symbols, each with its own meaning, as given below:
Symbol Explanation
Process Symbol - Indicates where some form of processing occur
Decision Represents a selection stage. Often used where a condition is, especially in repetition
and selection structures.
Enter number, A
Enter number, B
Sum = A + B
Display Sum
Stop
IF A<B THEN
Print B is bigger
ELSE
Print Numbers are equal
ENDIF
ENDIF
END
3. Using Iteration
(a) Repeat ... Until Structure
Flowchart Pseudocode
equivalent
Sum, Average, Count = 0
Repeat
Enter Number
Count = count + 1
End
Enter Number
Count = count + 1
WEND
END
Flowchart (a) above indicates modules named Accept Numbers, Add numbers Multiply
Numbers and Display Results. Flowcharts for individual modules can then be designed as
given in diagram (b) above, only the first module is indicated. Can you do the rest?
d. Structure Diagrams: These are diagrams that show relationships between different modules
as given below.
Start
Sum, Product = 0
Sum = A + B
Product = A * B
End
The structure diagram above indicates five sub-programs of the program Process
Numbers, namely Initialise, Accept Numbers, Process Numbers, Display Results and Exit.
The module Process Numbers has its own subprograms, which are Add Numbers and
Multiply Numbers. Modules are appropriate for very large programs. Can you write
pseudocode for individual modules? The program can be written as a continuous single
program as indicated on the right side of the diagram.
PROGRAMMING ERRORS
Programming errors are grouped into:
i. Syntax error: this is an error of violating the grammatical rules governing sentence
construction in a certain programming language, for example, leaving a semi-colon at the
end of each line in Pascal. Syntax errors are detected by the computer. A program cannot
run with syntax errors.
ii. Logic error (Semantic error): refers to an error in the sequencing of instructions,
modules and specifying wrong formulae that will produce undesirable results. For example,
instructing the computer to display result before any processing has been done. Logic
errors cannot be detected by the computer. The user just finds wrong and unintended
results of a process. It is also an error generated by entering the wrong data type during
program execution, for example, entering a text value where a numeric value is needed.
iii. Runtime (execution) error: These are errors that occur during program execution
and can be generated when the computer tries to read past an end of file marker or by
dividing a number by zero.
DATA TESTING
After a program has been coded, it must be tested with different data types to determine if
intended results are produced. The types of test data that can be used include:
i. Extreme Data: Refers to the minimum and the maximum values in a given range. For
example, a computer program requires the user to enter any number from (between) 1 to
20. 1 and 20 are extreme data and the computer must accept these. Thus extreme data is
accepted by the computer. ii. Standard (normal) Data: This refers to data that lies within
(in-between) a given range. In our example above, the numbers from 2 to 19 are standard
data and are accepted by the computer.
iii. Abnormal Data: This refers to data outside a given range. As to our example above,
the number 0, -1, -50 and all number from 21 and above are abnormal data. iv. Valid
data: refers to data of the correct data type. Invalid data is data of the wrong data type.
Thus if the user enter the value ―Tungamirai‖ instead of a number, this is referred to as a
wrong (invalid) data type. Only numbers are needed, not text.
PROGRAM TESTING
A very large program must be tested using the following types of tests:
Unit testing: the process of testing each program unit singly to determine if it produces expected
results.
System testing: the testing of the whole program after joining the modules to determine if it runs
perfectly.
Integration Testing: testing to see if modules can combine with each other.
User acceptance testing: determining if users of the new system are prepared to use it.
Conceptual systems: these exist in mind or paper and cannot be touched. They just represent
a physical system.
This chapter is concerned with the development and maintenance of system like stock control,
patient monitoring, banking and payroll which are part of physical systems.
1. Investigation,
2. Analysis,
3. Design,
4. Conversion,
1. Problem identification/Recognition/Definition/Realisation:
This refers to the realisation of the need for a new system by managers or users. This includes
the general statement of the problems being experienced by they system.
2. Feasibility Study:
This is a preliminary investigation conducted to determine if there is need for a new system
or modification of the existing one. It involves evaluation of systems requests from users
and to determine if it is feasible to construct a new one. Feasibility can be measured by its:
Economic feasibility: determining whether the benefits of the new system will out-weigh
the estimated cost involved in developing, purchasing, installing and maintenance of the
new system. The cost benefits analysis is important. Benefits can be tangible and
quantifiable, e.g. profits in terms of monetary values, fewer processing errors, increased
production, increased response time, etc. Other benefits are intangible, e.g. improved
customer goodwill, employee moral, job satisfaction, better service to the community, etc.
Technical feasibility: determines if the organisation can obtain software, equipment and
personnel to develop, install and operate the system.
Social feasibility: a measure of the system‘s acceptance by the general public; if it will not
violet the norms and values of the society.
After carrying out the feasibility study, a feasibility study report must be produced and it contains
the following information:
A brief description of the business. Advantages and problems of the existing system.
Objectives of the new system. Evaluation of the alternative solutions. Development
timetable. Management summary. Terms of reference. Contents page. Title page.
Proposed solution. Appendices.
i. Interview:
This refers to the face-to-face communication between two or more people in order to
obtain information. Interviews can also be done over the phone but the most common ones
are face to face. Interviews are done when you want to collect information from a very
small population sample.
Advantages of Interviews
The researcher can ask for clarification on some points that may not be clear. Encourages
good rapport between the researcher and the respondent. Non-verbal gestures like facial
expressions can help the researcher to determine if the respondent is telling the truth.
Information can be collected even from the illiterate since the respondent‘s language could
be used. First hand information is collected. The researcher can probe to get more
information.
Disadvantages of Interviews
It is expensive since the researcher has to travel to the interview venue. It is time
consuming as more time is spent travelling and carrying out the interview. Good interview
techniques are required as failure may lead to disappointments. Biased information can be
given since the respondent may not tell the truth.
iii. Questionnaire:
A document with carefully crafted questions to be answered by the respondent by filling on
the spaces provided. Questionnaires are used when collecting information from a widely
spaced population sample and when collecting information from many people. A
questionnaire contains open-ended and closed questions. Open-ended questions are gap
filling questions which require the respondent to express his or her own view. Closed
questions are guided questions where the respondent just chooses Yes or No, True or
False, or by just putting a tick on given options. Questionnaires can be distributed
personally or by post.
Advantages of questionnaires
Questions are very simple to answer. It saves time as questionnaires can be distributes
and then collected later. Respondents can fill questionnaires at their own pace. Give
guarantees confidential of information, thereby encouraging respondents to give accurate
information. They are cheap to use as travel expense can be low
Disadvantages of questionnaires
Some questions are left blank. Some questionnaires may not be returned. Biased
information can be collected. Respondents usually do not fill the correct information. It is
difficult to analyse information collect using questionnaires. They are expensive to use if
the postal system is used. Abusive information can be filled by respondents.
iv. Observations:
It is a fact finding method that involves viewing the actual system in operation by the
researcher. The researcher can even take part in operating the system. It is used when the
researcher wants to see for himself how the system operates.
Advantages of observations
First hand information is collected. Accurate information can be obtained. Areas of interest can
be observed. The researcher can take part in operating the system thereby getting insight on
how the system operates.
Disadvantages of observations
People work differently if they feel that they are being observed, therefore inaccurate
information can be collected. The researcher may not understand some of the activities
being observed. It is time consuming to collect the required information. The researcher
may interrupt some of the activities being done.
take place or not. The analysis stage also specifies the hardware and software
requirements.
Dataflow Diagrams
These are diagrams that show how data moves between external sources, through
processes and data stores of a particular system. Dataflow diagrams use the following
symbols:
4. Design Stage:
This stage is concerned with the development of the new computer based solution as specified
by the analysis stage. Design stage involves:
Input Design: includes designing of data entry forms, input methods (e.g. by filling forms, use
of barcodes, etc) and the user interface.
Output Design: Includes design of reports, data output formats, screen displays and other
printed documents like receipts, etc
File design: Involves designing tables/files, records and validation rules. It also involves
determining how data is to be stored and accessed, the media to be used for storage and
the mode of file organisation. Fields in each files ca be designed, their length and data
type, e.g.
File Name: Student File
Storage Location: Hard Disk
Mode of Access: Direct/Random
File Structure:
5. Implementation Stage:
This involves the construction and assembling of the technical components that are
needed for the new system to operate. This includes preparation of the computer room
environment, coding of the computer program using a specific programming language,
testing of the coded program, user training (users are trained on how to enter data, search
records, edit fields, produce reports, etc), etc.
Ergonomics: the design and functionality of the computer environment and includes furniture
setup, ventilation, security, space, noise, etc. some of the ergonomic concerns include:
Incorrect positioning of the computer facing the window can lead to eyestrain from screen
glare. Incorrect sitting positioning can lead to backache. Constant typing with inadequate
breaks can lead to RSI. Printer noise can lead to stress. Badly designed software can
cause stress. Trailing electricity cables are a safety hazard.
6. Conversion (Installation/Changeover) Stage:
This involves putting the new computer system into operation, that is, changing from the
old system to the new one. It involves file conversion, which is the changing of old data
files into the current format. Different changeover methods can be used, and these include:
a. Parallel Run: This involves using of both the old and new system concurrently until the
new system proves to be efficient. It involves operating the new and old systems
simultaneously until management is confident that the new system will perform
satisfactorily. Other workers will be using the old system while others use the old system
but doing the same type of job.
Advantages of parallel run
Results for both systems are compared for accuracy and consistency. If the new system
develops problems, it will be easier to revert to the old one. There is enough time given to
determine if the new system produces expected results. Employees have enough time to
familiarise with the new system.
Disadvantages of Parallel run
Running two systems at the same time is very expensive. Running two systems
simultaneously is demanding to employees. It may be difficult to reach a decision when
comparing the two systems. There is duplication of tasks which in turn stresses employees
ii. Abrupt (Direct) changeover: Involves stopping using the old system on a certain
day and the new system takes over on the next morning. This is suitable for control
systems like in chemical plants and for traffic lights.
Advantages of Direct Changeover
Reduces cost as of running two systems at the same time. Faster and more efficient to
implement. There is minimum duplication of tasks. Enough resources can be allocated to
make sure that the new system operates successfully.
Disadvantages of Direct Changeover
It will be difficult to revert to the old system if the new system fails.
iii. Phased / Partial conversion: This is whereby the old system is gradually removed
while the new system is gradually moved in at the same time. This can be done by
computerising only one department in an organisation this month, then the next
department in two months time, and so on until the whole system is computerised.
Advantages of phased conversion
Avoids the risk of system failure. Saves costs since the new system is applied in phases. It
could be easier to revert to the old system if the new system fails since only one department will
be affected.
Disadvantages of phased conversion
It could be very expensive since the organisation will be running two systems but in different
departments.
iv. Pilot conversion: This is whereby a program is tested in one organisation (or
department), and is applied to the whole organisation if it passes the pilot stage. It serves
as a model for other departments. A pilot program can then be applied in phases, directly
or using the parallel run method.
7. Maintenance/review/evaluation Stage:
This stage is concerned with making upgrades and repairs to an already existing system.
Certain sections of the system will be modified with time.
Employee resistance: When a new system is introduced, some employees may resist the
change and this could be catastrophic if not handled appropriately. Some fear losing their
jobs, of being demoted or being transferred and change of their job description. Resistance
can be in the following forms:
Through strikes and demonstrations. Giving false information during system investigation.
Entering wrong and inappropriate data so that wrong results are produces, etc
User training:
Once a new system is put in place, existing employees are trained on how to operate the new
system, otherwise new employees are recruited. User training can be in the following forms:
i. On the job training: Users are trained at their organisation by hired trainers. This
has the following advantages:
Learners practice with actual equipment and the environment of the job. Learners can
engage in productive practices while on training. This is cheaper for the organisation.
Enough practice is gained on how to operate the system.
Disadvantages of on the job training
Distractions occur in a noisy office. Instructional methods are often poor. The need to keep
up output may lead to hasty teaching
ii. Classroom training: Users are send to other colleges and institutions which offer
courses on the subject matter. This could be expensive to organisations since employees
take study leave while being paid at the same time. Employees can also be trained on
aspects that they will not apply when they finish the course. The gap between what is
learnt and what is needed at the job may be too wide.
SYSTEM DOCUMENTATION
Documentation refers to the careful and disciplined recording of information on the
development, operation and maintenance of a system. Documentation is in two main
types: user documentation and technical documentation
(a) User Documentation: It is a manual that guides system users on how to load,
operate, navigate and exit a program (system). User documentation contains the following:
System/program name. Storage location. System password. Instruction on how to install the
program.
instruction on how to operate the system: loading, searching data, adding new records, deleting
unwanted records, modifying existing records, saving data, backup procedures, etc. How to quit
the program
(b) Technical Documentation: This is a manual for programmers which aid them in
modifying the system and in correcting program errors. The following are found in technical
documentation:
Algorithms of the program, Program testing procedures and test data, Sample of expected
system results, Program structure showing modules and their relationships, System
flowcharts, Programming language used, Program code, program listings, File structures.
Types Of Errors
1. Transcription Errors: These are mistakes due to misreading or mistyping of data,
e.g., confusing the number 5 with the letter S, 0 (zero) instead of the letter O, etc. This can
also be caused by bad handwriting.
2. Transposition Errors: These are mistakes caused by swapping 2 letters or digits,
e.g. typing ‗ot‘ instead of ‗to‘, 5721 instead of 7521. Transposition errors occur mostly when
typing at very high speeds.
(h) Check Digits: A check digit is an extra figure added to the end of an original number for error
checking purposes. It s calculated from the original number.
*NB: - Check digits are used where data entered automatically as in using barcode
readers.
SYSTEMS FLOWCHARTS
A systems flowchart is a diagram used to show the flow of data in a program. It shows the
overview of the system, tasks carried out by the system, whether manual or computer,
devices, output media and files used. Common symbols for designing systems flowcharts
are as follows:
*NB: Meanings of these symbols are not universal and mean a different thing to others. Some
symbols are borrowed from program flowcharts.
PAPER 2 (PROJECTS)
1. Statement of the problem: Limitations of the existing manual solution should be
considered. These must be realistic and should justify computerisation. At least six
problems should be cited. Each problem must be expanded or must be clear and should
be solved using the computer. The problem can just be listed and then briefly explained
how it affects the current solution. If the system is said to be expensive to run, pupils are
supposed to give the statistics of the costs of running the system over a given period of
time. If the system is slow to serve clients or to run, the number of minutes or hours must
be specified so as to give clarity. Pupils should avoid vague points like ―too slow,
expensive to run, slow to update records, difficult to update records‖ etc. These problems
must be clear, qualified, quantified and justifiable.
2. Aims and objectives: Good objectives must be cited and these must be
achievable and measurable. A list of the desired outcomes of the proposed solution is
needed: what will the proposed computer system be able to do? For instance; what should
it be able to enter, what will have to be processed, what will need to be updated (that is
addition, deletions and editing of which records), what form of reports will need printing?
The objectives must link with the above stated problems. Include at least 6 objectives.
3. Data flow in existing solution: What data items are used in the existing solution?
Identify all the data items for each file used in the system. Pupils can just give a file and the
data items found in it. For example: Client File: Client Surname, Client First Name, Client
ID Number, Client Address, Item Bought, Quantity bought, Unit price, Total Price, Date of
purchase, etc.
All data items in each file must be exhausted.
4. Description of the existing Solution: A broad description of the processes that
take place in the existing system must be given. Pupils must describe how the system
works, taking into consideration the data items cited in 3 above. Explain how each file is
processed and what it is used for. At least 6 files must be described. There is no need of
drawing data flow diagrams if the pupil can describe the processes involved. Pupils can
even attach system forms of the current system being investigated and put them in
appendices.
5. Evaluation of the existing solution: A good evaluation should assess both sides,
the weaknesses and the strengths, and not just one side. Pupils should give 6 advantages
and more disadvantages for the existing solution. A good evaluation should be able to
qualify and quantify the limitations and strengths. Statements like: ―it is too slow‖, ―it is
expensive‖, ―it is inefficient‖ are not enough. Pupils must specify how slow is being too
slow, how expensive is expensive, how inefficient is being inefficient. For instance they
7. Overall Plan: This is the candidate‘s plan to realise the proposed computer
solution. Normally a modular approach in a top-down structure is considered. The problem
is split into modules in a tree structure. Tables (files) or forms could be taken as the
modules. Pupils are supposed to indicate files. This can be given as shown below:
*NB: The above is just a sample and is incomplete. All files in the system must be included in
the hierarchy chart. After the hierarchy chart given above, a systems flowchart will suffice.
8. Modules: Student should identify the modules to be used in the system. And give
a valid linkage in the system. This can be obtained from the overall plan. This can be given
as shown below:
Linkages within the system must be clear. Instead of given a diagram as above, the modules can
be given as below:
Module Name: Student File Module
Module Purpose:……..
Modules Called:…….
Modules Called from: ……
9. Algorithms: Annotated flowchart and Pseudocodes are acceptable. Good
algorithms should be valid, clear, logical and plausible. Each algorithm should be clearly
related to the system requirements. An explanation of the purpose of each module should
be given first before the algorithm is written. For example:
Algorithm Name: Add New Student Record
Purpose: Responsible for accepting new student details for students who are joining the
school Algorithm:…….
At least six modules and their algorithms should be cited and explained.