Introduction Computers Notes
Introduction Computers Notes
Introduction Computers Notes
COMPUTER STUDIES
A subject that deals with features, uses, benefits and effects of computers.
WHAT IS A COMPUTER?
It is an electronic device that works under the control of stored programs to automatically accept,
store and process data into information. Therefore, a computer has the following characteristics:
• It is electronic: - can only work when there is electricity
• It is a device: a machine
• Is controlled by programs: Works according to instructions, written in computer language,
given by the user for it to perform a specific task.
• Is automatic in operation: Can work with minimum or no human intervention.
• Can accept data: data can be entered into the computer through various means and the
computer accepts it.
• Can store data and programs: Data and programs entered into the computer can be stored
for future use.
• Can process data into information
2. Information: It is data that has been converted into meaningful form. In general, it is
processed data. Information can be understood and therefore can be used for decision making
purposes. Information is meaningful. To get relevant information, data entered into the computer
must be relevant, accurate and up-to date. If data entered into the computer is wrong (Garbage In)
the results will also be wrong (Garbage Out), and is generally referred to as Garbage-In Garbage-
Out (GIGO). It is a rule stating that the quality of the output is a function of the quality of the
input; put garbage in and you get garbage out. Therefore, the accuracy of the results produced by
the computer depends on how accurate the user enters data, functions, formulae and codes program
procedures.
COMPUTER GENERATIONS
Refers to stages through which computers developed from the 1940s to date. These are as
follows:
1. First Generation Computers (1945 -1955): These are the earliest computers that used valves
in controlling machines, e.g. EDVAC, ACE and UNIVAC machines. These were very large
computers, fitting about the size of an average room. They were programmed in a language
understandable by the machine. Such computers used a lot of electricity and were very
expensive to purchase. Only very large organization could afford these computers. Such
computers were huge, slow, expensive and often undependable.
Introduction to Computers
2. Second Generation Computers (1955 -1965): These are computers that used transistors
instead of valves. They were faster, had reduced size, were more reliable and less expensive.
Second generation computers were: faster,
more reliable, smaller, much cheaper to build,
gave off virtually no heat, conduct electricity
faster
Transistor
3. Third Generation Computers (1965 – 1980): These used integrated circuits e.g. the IBM
(International Business Machines) computers. The integrated circuit, also referred to as
semiconductor chip, packs a huge number of transistors onto a single wafer of silicon. These
computers have increased the power, lowered cost, carry out instructions in billionths of a
second, and are smaller.
Microprocessor
5. Fifth Generation Computers (1990 to date and beyond): These use natural language and can
flexibly interact with the human being. Such systems are used in medical diagnosis, mineral
prospecting and in geological researches. Such computer systems are capable of human
intelligence and are commonly called expert systems.
Introduction to Computers
TYPES OF COMPUTERS
The types of computers are: Micro-computers, mainframe computer, super computer & mini-
computer.
1. Micro Computers: These are computers with a microprocessor inside them, and include the
following:
Microcomputers
a. Desktop Computers: These are computers with a separate CPU and monitor and fit on a desk
during usage.
b. Personal Computers (PC): - These are microcomputers made for use at home for general
purpose, and includes desktop computers.
c. Palmtops: These are portable microcomputers that can fit in the palm and are used as diaries
and for other small business applications.
They are Handheld Computers that are small enough to be
carried in a pocket and include Personal Digital Assistants
(PDAs) and Cell phones.
d. Laptops (Notebook computers): - These are portable computers that use an internal battery
for power and can be placed on laps during usage.
Laptops are small like a briefcase and are
portable and can be used in areas where there
is no electricity. They have light weight and
battery powered.
However, laptops can easily get stolen, they
need recharging from time to time, some find
it difficult to use the laptop keyboard and
inbuilt mouse, and they are even expensive to
buy and to repair. They also have limited
expandability and docking stations
Laptop computer
e. Tablet Personal Computers: Type of notebook that accepts input from an electronic
pen
Introduction to Computers
For schools and school children, laptops have the following advantages:
Users can save data in their own storage area wherever they are. Users can get any networked
software wherever they are. School needs fewer printers. Users do not need to keep using the same
machine. Users can access school intranet from anywhere. Users can access Internet from
anywhere. Users do not need to carry CD ROMs. It is easier to communicate with. Can email work
to teachers even from home. Staff can monitor students easily. Students and teachers can share files
and notes easily.
These are very big in size and extremely fast. They have very large memory capacity and can be
used in educational designs.
Mainframe computers
4. Super Computers: These are very powerful computers that are used to perform detailed
calculations and for design purposes, for example, modelling of aircraft wings, testing bombs, etc.
They are the fastest and most expensive computers
Introduction to Computers
Supercomputer
*NB: - The classification of computers as micro, mini, mainframes and super computers have
become blared due to recent technological advancements since a microcomputer can now perform
all functions that were believed to be for mainframes.
Classification of computers can also be made relating to the use of the computer, as follows:
(a)General Purpose Computers: - these are computers that can be used to perform a number of
functions like playing music, playing games, payroll processing and so on.
(b) Special Purpose Computers: - These are computers that are designed to perform one task
only, for example, to monitor patients in hospital.
(c)Analogue Computers: these handle data in continuously varying form.
(d) Digital Computers: Handle data in discrete values; that is in 0s and 1s.
(e)Embedded Computers: – Refers to use of microprocessors in non-computer equipment like in
cameras, washing machines, watches, etc. These are normally dedicated for a specific task they
are designed for. Embedded computers are also found in household items like camera,
microwave, washing machine, video recorder, fridge, sewing machine, air conditioning,
electronic toys, rice cooker dish washer, Televisions, alarms, clock, radio, DVD players, etc.
Tasks performed by microprocessor inside some of the devices include:
In digital camera: automatically adjust film speed, positions the end of film, adjust distance from
object, adjusts light.
In Speed cameras: are used on many roads to take photographs of cars which have exceeded the
speed limit. Some of these cameras use microprocessor controlled chips to store information. The
advantages of speed cameras with microprocessor controlled chips are that:
Data and images can be transferred automatically which will be faster. Image can be viewed
straight away. Can store considerably more data and photos. Can store other information (apart
from photo image) e.g. road conditions. Chips can be re-used.
Tasks which would be carried out by the microprocessor as a speeding car approaches a
camera include:
Sense and record speed of vehicle. Compare speed of vehicle with stored value(s) and decide
whether photograph should be taken. Check on value of light intensity. Adjust focal length, focus
image, adjust shutter speed and set exposure.
Tasks which would be carried out by the microprocessor as the photograph is being taken
include: Log the time. Log the date. Log the speed. Record the road conditions. Operate ―flash‖.
Operate shutter. Store the image. Check on value of light intensity. Adjust focal length and focus
image.
Introduction to Computers
In washing machine: Controls the amount of water. Adjust and controls speed of wash. Control
temperature of water and the time taken to wash the clothes.
In fridges: Controls temperature level. Control the display panel. Switch on lights if door is opened
and off when closed.
In air conditioners: Controls temperature. Controls timing and the display panel
ELEMENTS OF A COMPUTER
The main elements (components) of a computer are classified into Hardware elements and Software
elements
Introduction to Computers
HARDWARE: These are parts of a computer that exits in physical form, for example mouse,
keyboard. Hardware refers to tangible devices of a computer. Hardware is grouped into: Input
Hardware, Processing Hardware, Output Hardware and Storage devices.
INPUT HARDWARE
These are devices used to enter data into the computer, for example mouse and keyboard. Below are
some of the input hardware and their uses:
(I) Keyboard: It is a device used to enter data and instructions into the computer by typing. It is
similar to the traditional typewriter. It is used to enter alphabetic letters (A-Z-both lower case and
upper case), numbers (0-9, positive and negative) and other special characters like the %, $, coma,
and the space. Keyboard entry of data is manual and its excessive use without breaks will cause
Repetitive Strain Injury (RSI).
*NB: - A character is any symbol, digit or letter that can be entered into the computer, e.g. $, %, 5,
h, etc. These characters can be numeric (numbers 0-9, positive and negative), alphabetic (letters A-
Z, both lower and upper case), alphanumeric data (a combination of both numeric and alphabetic
characters) and special characters (space, $, >,
etc.).
*NB: - Control Character: - Refers to non-
printable character code or number in the
character set that do not represent a written
symbol, e.g. carriage return, tab key, etc. These
are mostly used in peripheral devices control
and for communication purposes, for example,
carriage return, tab or backspace; and others
typed by depressing a key and the control key
at the same time.
*NB: -Extended Binary-Coded-Decimal
Interchange Code (EBCDIC) an 8-bit
character set and encoding representing 256
alphanumeric and special characters
Standard keyboard
- ASCII - American Standard Code for Information Interchange: - a code for information
exchange between computers made by different companies; in which a string of 7 binary digits
represents each character; used in most microcomputers. Each character has its ASCII binary code
that can be understood by the computer.
(ii) Mouse: It is a mouse shaped device used to enter data and instructions into the computer by
clicking.
It can also be used for pointing and selecting items. Clicking is the
process of pressing and releasing the mouse button. It is a fast method of
entering data and for selecting items.
Mouse
(iii) Scanner: an input device used to convert images from paper into electrical signals for input
into the computer.
The images can then be edited, printed or
saved.
Mostly used to scan pictures, photographs,
etc.
Introduction to Computers
Flatbed scanners have the paper placed on top of them, in a similar way to a photocopier. These
are more expensive than hand-held scanners but they are usually able to produce higher resolution
images.
Scanners
(iv) Digital Camera: A device use to capture photographs, films, videos or a combination of
both for entry into the computer where they can be edited.
(v) Touch Screen: A screen display on which you could enter data by pointing with a finger on
intended option.
Touch screen
It can be an alternative to a mouse. It consists of a base and a stick perpendicular to the base. The
stick can be moved in any direction, enabling the user to move an object around the computer
screen. A joystick can perform a similar function to a mouse or trackball, but is only commonly
used for playing games.
Introduction to Computers
(vii) Tracer ball: It is an input device with a small ball that can be moved by passing the palm
of your hand over it. This will move an
arrow on the screen.
It is used to draw designs and to select
options from menu. It is mostly found
on laptop computers.
Tracer balls
(viii) Microphone: It is an analogue input device that recognizes human voice for data entry into
the computer.
*NB: -An analogue device is a device that recognizes data in continuously varying form, e.g.
microphone, wall watches (with minute, hour and second hand), fuel petrol gauge, speedometer, etc.
A microphone is used in voice recognition systems (voice synthesis). These are computerized
systems that allow users to communicate with the computer by talking (voice input). Such systems
have the following advantages:
The systems are over 90% accurate. They are appropriate for the handicapped, especially those
without hands. They are very fast in entering data and in giving instructions to the computer. They
are speaker independent. They can recognize natural language.
Disadvantages:
Older systems are speaker dependent. They allow the user to speak slowly, using specific words that
were programmed for it to understand.
NB: Multimedia speakers, sound cards, a microphone and voice recognition software are needed in
voice recognition systems.
(ix) Light pen: A ballpoint shaped device used to enter data by writing on an ink pad. It is also
used to make alterations on the screen to the drawings, to write directly on the screen and to select
commands.
Light pen
(x) Kimball Tags: These are punched cards with a magnetic strip which contains details of a
product, mostly clothes in a shop.
(xi) Graphics tablet: Devices used to provide interface for drawing on the screen and links
with the light pen (xii) Webcam: A digital camera designed to take digital photographs and
transmit them over the internet. (xiii) Sensor: an input device that automatically records data by
sensing the environment it is supposed to record, e.g. humidity sensor.
(xiv) Magnetic Stripes: Magnetic stripes can be seen on train tickets or bank or credit cards.
Introduction to Computers
(xv) Smart Cards: Most bank and credit cards are now smart cards.
Cards have their own processor and memory that can
hold up to 64KB of data. The data that is stored can be
updated and the processor can process simple programs.
Smart cards
(xvi) Barcode Reader: These are devices at Electronic Point of Sale terminals (EPOS) that
read barcodes on products for automatic data entry into the computer. Mostly used in library
systems, luggage handling
systems at airports, warehouse stock control, Barcodes
etc. Barcodes are numbered vertical lines and spaces
of varying size on products that provide data for
such a product to the computer when read by
barcode readers.
If the barcode reader fails to read the barcodes,
data is entered manually through the keyboard
by entering the numbers below the barcodes.
How does the computer system checks that the barcode has been read correctly?
Either the computer performs the following:
Calculates the check digit; remainder = 0 if barcode has been read correctly OR uses the weights
and modulus 11 and use remainder
Introduction to Computers
DOCUMENT READERS
These are devices used for entering data automatically into the computer by reading through
documents. These include:
(i) Optical Mark Recognition (OMR): The Optical Mark Readers use light sensitive devices
to sense pencil marks on a piece of paper for automatic data entry into the computer. Light is
reflected from the document onto the Optical Mark Reader which records the output. It then records
low intensity/zero intensity at certain points. OMR is mostly used in marking multiple choice
exams at ZJC and ‗O‘ Level and reading pupils‘ registers. OMR is fast and accurate in entering
data. An Optical Mark Reader is the device that is used for automatic data entry in OMR systems.
(ii) Optical Character Recognition (OCR): It is the use of light sensitive devices to recognise
alphabetic characters and numbers on a sheet of paper for automatic data entry into the computer.
Mostly used by insurance companies, in billing systems and processing of Bank Giro-forms. An
Optical Character Reader is the device that is used for automatic data entry in OCR systems.
(iii) Magnetic Ink Character Recognition (MICR): A method of automatically entering data
into the computer by reading characters on documents past a magnetised field with iron oxide, e.g.
reading numbers on the bottom of a
cheque.
Advantages of using magnetic ink
on cheques include:
Bundles of cheques
can be processed very quickly.
It is very difficult to forge a cheque.
The ink can be read by the reader
even if the cheque gets marked or
dirty. A Magnetic Ink Character
Reader is the device that is used for
automatic data entry in
MICR
systems
(i) Printers: A printer is a device that is used to produce hard copies of data held in the computer.
Hardcopy is a document printed on paper. Output from the printer appears as displayed on the
computer screen, thus What You See Is What You Get (WYSIWYG).
Types of Printers
Printers can be classified into impact and non-impact printers.
(a) Impact Printers: these are printers whose write heads hit ink ribbon against paper during
printing, e.g. dot matrix printer. Thus, there is contact between the paper and the write heads during
the printing stage. Examples include drum printers, dot matrix printers, daisy wheel printers and
chain printers. Impact printers have the following advantages: they are very cheap to buy. They are
cheap to repair and to maintain. They can use continuous paper. They are economic in terms of ink
usage.
LaserJet printers
The disadvantages of laser printers are as follows: they are very expensive to buy, they are large
and therefore take up a lot of desk space, they are quite complex and therefore repair bills can be
very high, Multipart stationery cannot be used, Cannot be used with continuous stationery since
they are page printers. *NB: - Printers can also be classified as page printers (these print one page
at a given time and are therefore faster) and line printers (print one line at a time, very slow).
Mostly Non-impact printers are page printers while impact printers are line printers.
(ii) Screen / Monitor: it is a television shaped device used to display contents on the computer
as soft copy. Soft copy refers to data viewed on the screen. The screen can also be called the Visual
Display Unit (VDU). The screen can differ in terms of resolution, that is low resolution screens
display less number of dots per inch on the computer and therefore the display will be of poor
quality. High resolution monitors are needed mostly in graphics packages where colour and many
dots per inch are needed.
(iii) Graph Plotter: This is a device used to produce high quality drawings in various paper
sizes and is used in Computer Aided Design (CAD).
Graph plotter
PROCESSING DEVICE
A device used to convert and to manipulate data as per user requirement. The sole processing
device of a computer is the processor, which is inside the Central Processing Unit (CPU) casing.
Processing involves sorting of data, updating records, searching certain records, adding a sequence
of numbers, and others. Functions of the processor include: Controls the sequence of instructions,
Processes all instructions given by the user, Give commands to all parts of the computer, Carry out
data processing like making calculation to
data given by the user.
Most of the computers have micro-processors
(small execution chip found in microcomputers).
With MSDOS (Microsoft Disk Operating System)
computer chips progressed from 286, 386 and
486 processors. Intel Corporation then developed
Pentium processors, ranging from Pentium 1,
Pentium 2, Pentium 3, Pentium 4 and so on, with
each processor being faster then the preceding
one. Pentium 4 processors have a speed of about
2.6 GHz. Newer chips are faster in
Microprocessors processing.
The speed of a processor determines the speed and function of a computer. Until the 1980s, most
computers had one processor, but recent ones have two or more processors (called co-processors),
those with two processors are called dual processors. Two or more processors share loads and
therefore perform operations faster. The speed of a computer is also determined by the clock speed
for each microprocessor. This speed is measured in Megahertz (MHz). The general structure of the
CPU or Processor is as illustrated below:
NB: Memory (Main memory): Stores programs and data for programs currently running on the
computer. Main Memory is very close to the processors and therefore the two can coordinate their
activities very fast. - ALU operations on data are first loaded into the accumulator register, a
memory which stores instructions, data being processed and results of an operation.
The function of the microprocessor is to fetch, decode and execute instructions. This is also called
the FetchExecute cycle.
The Fetch-Execute Cycle
Step 1. Fetch instruction: In the instruction phase, the
computer‘s control unit fetches the instruction to be executed
from memory. Microprocessor gets software instruction telling it
what to do with data.
Step 2. Decode instruction: Then the instruction is decoded so
the central processor can understand what is to be done.
Microprocessor determines what the instructions mean.
Step 3. Execute the instruction: In the execution phase, the
ALU does what it is instructed to do, making either an arithmetic
computation or a logical comparison. Microprocessor perforsms
the instruction.
Step 4. Store results: Then the results are stored in the registers
or in memory.
Step 3 & 4 are called the execution phase. The time it takes to
complete the execution phase is called the EXECUTION TIME
(E-time).
After both phases have been completed for one instruction, they are again performed for the second
instruction, and so on.
The Fetch-Execute Cycle
STORAGE MEDIA
These are devices used to store data and programs for future use.
Storage Capacity
Refers to the amount (volume) of data a device can store. The following storage measurements can
be used:
Bit: The smallest unit of data a computer can store, either a 1 or a 0.
Nibble: refers to half a byte, that is, a group of 4 bits.
Byte: a group of 8 bits representing a character. For example, the letter C is represented by the byte
01000011.
Kilobyte (KB): this refers to 1024 bytes.
Megabyte (MB): 1 MB is equivalent to 1 048 576 bytes.
Gigabytes (GB): 1024 megabytes (approximately 1 billion bytes)
Terabytes (TB): refers to 1 099 511 627 776 bytes (approximately 1 024 GB)
*NB:-Formatting (initialising) a disk: this is the process of creating new tracks and sectors on the
disk that will be used in storing data. When a disk is formatted, existing tracks and sectors are
destroyed, including the data stored on them, and new ones are created. After formatting, the disk
will be blank. Formatting is done using the FAT or the NTFS file system. FAT (or FAT16) stands
for File Allocation Table:- It is a file system used by MS-DOS and Windows operating systems to
organise and manage files. It is a data structure that Windows creates when you format a volume by
using FAT or FAT32 file system. Windows will store information about each file in a FAT so that
it can retrieve the file later. FAT uses 16 bit filing system. FAT32 uses 32 bit values and uses drive
space more efficiently and supports drives of up to 2 TB. Storage media is grouped in primary
storage and secondary storage:
RAM is volatile, which means that it loses its contents when power is switched off. RAM is in two
forms; that is, dynamic and static RAM. Static RAM is a Random Access Memory chip whose
contents do not change as long as there is continuous power supply. Dynamic RAM is Random
Access Memory chip whose contents can be lost even if there is continuous power supply. Dynamic
RAM needs to be refreshed to prevent loss of data.
The size of RAM also affects the speed of operation of a computer and the number of programs that
can be run on it. RAM size can be 16 MB, 32 MB, 64 MB, 126 MB, 256 MB, 448 MB, 1 GB, etc.
The bigger the RAM size, the better the efficiency of the computer and the bigger the number of
programs it can run at a given time.
(b) ROM (Read Only Memory): ROM is a semi-conductor circuit (chip) whose contents can only
be read from and cannot be erased or modified. ROM contents are fixed during manufacturing, that
is, they are hard – wired. These contents can only be read from and cannot be modified.
The uses of ROM are: Stores the Basic Input-Output System (BIOS-refers to software that test
hardware at start-up, starts the operating system and support data transfer between devices.) of the
computer. Stores control programs for the operation of the computer and its peripherals. Stores
translator programs.
ROM is grouped into:
Programmable Read Only Memory (PROM): This is a ROM chip whose contents can be
changed but only once. It is re-programmable only once.
Erasable Programmable Read Only Memory (EPROM): This is a Read Only Memory chip
whose contents can be erased and modified several times.
Electrically Erasable Read Only Memory (EEPROM): This is a Read Only Memory chip whose
contents can be erased and modified several times using electricity.
*NB:- Firmware (microcode):-refers to coded instructions that are stored permanently in read-
only memory, for example BIOS.
SECONDARY STORAGE (BACKING STORAGE/AUXILIARY STORAGE/EXTERNAL
STORAGE)
These are devices used to store data and programs for future use outside the computer systems. It is
a supplement to main storage. Backing storage is non-volatile. Backing storage is grouped into
magnetic storage and optical storage.
Magnetic Storage
These store data on magnetised field of iron oxide and include magnetic tapes, zip drives, diskettes,
hard drives and flash drives.
(a) Magnetic Tapes: They are similar to a normal cassette tape in shape. They store data in
serial and sequential order. They are mostly used to backup data. Their storage capacity can be up
to 20 GB. Data is also accessed in serial or sequential order. They can be used as off-line storage
media.
Magnetic tapes have the following advantages: Data
can be arranged in any ordered sequence. They are re-
usable, that is can be overwritten several times. Suitable
for high hit rate processing systems like payroll, billing
systems, etc. They last for a very long period of time,
and thus can be used to keep historical records. They
are very cheap to buy. They store very large volumes of
data, of up to 20 GB.
However, they have the following disadvantages: It
takes too long to find (search for) a needed record in a
long list of data records. It is very difficult to update record held in a
Magnetic tape magnetic tape. It takes too long to update records, time wasting. They
are prone to humid (moist) conditions.
(b) Hard Disk (Hard Drive): These are disks used to store large volumes of data and
programs, including operating systems and are resident in the CPU casing. Data is stored on tracks
in a random way and data retrieval is in a random way. Hard disks can store data of up to 300 GB,
but ranges from 2 GB, 8 GB, 20 GB, 40 GB, 80 GB, 120
GB, etc.
Uses of Hard Disk: Creating backups for data. Storing
communication and applications software. Storing of the
operating system from which the computer will boot.
Transferring large volumes of data from one computer to
another.
Hard disks have the following advantages: It is easier
to access data stored on hard disks. They have a long life
span, of about 5 years or more. Provides direct access to
data. It is easier and faster to update data on hard disks.
They are more robust. Have large storage capacity, about
300 GB or more.
Disadvantages of Hard Disks: Are fixed inside the
CPU casing and therefore cannot be repaired once
damaged. Not suitable for processing of files with a high hit rate (they are low processing disks).
Can easily crush if computer is not switched
Hard disc off properly. They are expensive to buy.
(c) Diskette (Floppy Disk): A 3.5 inch and plastic magnetic disk enclosed in a stiff envelope with a
radial slit; used to store data or programs. They have a storage capacity of 1.44 MB. They are used
as backing storage for small volumes of data. Data is stored on tracks in a random way. Direct
access to data is provided. Its features are shown below:
Diagram of a Diskette:
Notes on Diagram
Rigid plastic case: - protects the disk inside from damage.
Write protect Window: When it is open, data cannot be
written on disk, unless it is closed. It is a method of preventing
data on disk from being modified.
Disk Label: this is where the user writes some information,
for example his/her name, disk contents, etc.
High Density Window: - indicates that a disk can store data
on two sides, thus allowing more data to be stored on them.
1.44 MB disks are double density disks.
Uses of diskettes are: Creating backups for small amounts of data. Transferring small amounts of
data from one computer to another. Booting up the computer in case of system failure, for system
recovery. Storage of small programs and data.
Advantages of Diskettes: They are portable (easy to carry around as they can fit in a shirt pocket.).
Conceals less electricity. Most are high Double Density Diskettes.
Disadvantages of Diskettes: have very short life span (not durable). Can be affected by humid
conditions. Can easily be affected by dusty conditions. Can easily be damaged if placed close to the
screen for a long time. Takes long to read data into memory than from a hard disk. Hold very small
amount of data, 1.44 MB. Caring for diskettes: Do not place them near magnetised field or near
the computer screen. Keep them free from dust. Keep of dry place. Do not expose them to direct
sunlight.
(d) Zip Drives: Similar to diskettes in shape but does not flop. Data is stored in a random way.
Data is accessed in a random way. Storage capacity
is 100 MB.
Advantages of Zip Drives: They are portable (easy
to carry around as they can fit in a shirt pocket.).
Conceals less electricity. Most are high Double
Density drives. More durable than diskettes
Disadvantages of Zip Drives: Hold small amount
of data of about 100 MB. Can be affected by humid
conditions. Can easily be affected by dusty
conditions.
Can easily be damaged if placed close to the screen for a long time.
Zip drive
(e) Memory Sticks / Flash Drive: These are small drives that can be plugged on the Universal
Serial Bus (USB) of the CPU. Provide direct storage and
access to data.
Storage capacity ranges from 1 GB, 2 GB, 4 GB, 8 GB and
32 GB.
Advantages of Memory Sticks: have a long life span
about 3 yrs. Have large storage capacity about 8 GB or
more. Provide direct access to data. Very cheap to buy.
Portable since they can fit in a pocket.
Disadvantages of Flash Drives: Older machines have no
sockets to plug in memory sticks.
They need software/drivers installed for them to
work. They can get lost easily. Virus spread quickly through them.
Memory stick
1.Bus: A communication line used for data transfer among the components of a computer system
2.USB: - An external bus that supports Plug and Play installation of devices. Using USB, you can
connect and disconnect devices without shutting down or restarting your computer. You can use a
single USB port to connect up to 127 peripheral devices, including speakers, telephones, CD-
ROM drives, joysticks, tape drives, keyboards, scanners, and cameras. A USB port is usually
located on the back of your computer near the serial port or parallel port.
3.USB port: An interface on the computer that enables you to connect a Universal Serial Bus
(USB) device. USB is an external bus standard that enables data transfer rates of 12 Mbps (12
million bits per second).
(f) Memory Cards: memory card is like a portable hard disk that fits into personal computer card
slot.
Memory cards
Compact disc
Types of CDs
1. CD-ROM (Compact Disk Read Only Memory) a common form of optical Disks on
which data, once it has been recorded, cannot be modified.
2. CD-W (CD-Writeable) an optical disk that can be written upon, but only once.
3. CD-RW (CD-Rewriteable) on optical disk that allows personal computer users to replace
their diskettes with high-capacity CDs that can be written upon and edited over.
Advantages to schools of storing learning materials on a CD-ROM other than using the
Internet No danger of accessing doubtful websites. Does not take as long to find required
information. Do not have to have a modem. Do not need for a telephone line. Once CD ROM is
bought there is no additional expenditure. Do not have to remember user id/password. Usually
quicker to load material. Information on CD is more reliable
Disadvantages to schools of storing learning materials on a CD-ROM other than using the
Internet CD ROM can be lost easily. CD ROM can be damaged easily. Internet is up to date while
CD ROM is soon out of date. CD ROMs are expensive to replace and to update. Less information
can be stored on the CD-ROM as compared to the internet.
2. DVD (Digital Versatile Disc): Are spherical in shape that can store data on 2 sides. Stores data
on tracks in a random way. Data retrieval is in random order. Storage capacity is about 4 GB.
Writing of data on DVD is done by a device called DVD writer/burner.
Uses of DVDs: Transferring larges volumes of data from one computer to another. Creating backup
storage for programs and data. Booting the computer when loading the operating system or
restoring damaged system files (system repair)
Advantages of DVDs: Provide fast and direct access to data. Has large storage capacity of about 4
GB.
Produces high quality sound and pictures. It is a multi-media device.
Disadvantages of DVDs: Can be affected by direct sunlight. Less durable. They can easily get
scratched.
Caring for DVDs, VCDs and CDs: Do not expose them to direct sunlight. Do not touch the
recording surface. Use soft marker for labelling and not ball point. Keep the free form dust
conditions.
*NB: - Virtual Memory – Refers to temporary storage (on hard disk) used by the computer to run
programs that need more memory (RAM) than the computer has. For example, programs could
have access to 4 gigabytes of virtual memory on a computer's hard drive, even if the computer has
only 32 megabytes of RAM.
SOFTWARE
Software refers to a set of instructions written in computer language that tell a computer to perform
a specific task, like adding a set of numbers. Without software, a computer will be useless.
Software is grouped into systems software and application software. The diagram below illustrates
branches/groups of software:
Systems Software: Refers to programs that control and manages the performance of all computer
systems. Systems software comprises of: (a) operating systems (b) Utility programs (c) Translators
1) Operating System: - refers to the programs that supervise, control and manage the performance
of the computer hardware and software in accordance with set objectives, for example, Windows
XP. Examples of operating systems include: Windows 95/98/2000/XP/ VISTA/ Windows
7/Windows 8, Microsoft Disk Operating System (MS-DOS), Unix, Linux, OS/2, etc.
Functions of the operating system: Controls movement of data to and from peripherals. Acts as a
background on which application programs can run. Manages hardware, software and memory
resources of a computer. Acts as an interface between the user and the computer. Scheduling and
loading of programs to provide continuous job processing sequence. Provides a log of users for the
computer. Handling of errors and correcting them where possible. Protect hardware, software and
data from improper use. Control over the selection and operation of input, output and storage
devices of the computer. Booting and shutting down the computer.
Features (characteristics) of operating systems: Must be reliable in terms of being free from
errors and handling of all jobs. Must be efficient, that is should be able to use resources fully
ensuring good job processing, response time, turnaround time, etc. Must be maintainable. Must be
small in terms of storage space on the disk.
*NB: Response time – the time that elapses from the moment an instruction is given to the
computer and the time that instruction is carried out.
Turn around time – the time taken from the moment a document is produced by a computer and
the moment it is used as an input document to that computer again.
NB. Most operating systems are written in low level language. This is for them to quickly
coordinate computer activities since they will not be converted as they are already in machine
language. The following must be considered when buying an operating system: Hardware type and
computer design e.g. windows operating system works well on IBM compatible machines.
Applications intended for the computer e.g. accounting, stock taking, etc. Method of
communicating with the computer, that is, use of few or many peripherals and terminals. Method
of operating the computer e.g. multi access, multi programming, etc
Advantages of batch processing are as follows: It is less expensive to use. Processing does not
need to be done with anyone present. Users do not need to be specialists in computers. It allows
remote job entry. Disadvantages of batch processing are as follows: Batch processing systems
are not interactive. Data is processed after a long period of time. No action can be taken if anything
wrong happens during processing.
b. Translators: - These are programs that convert source code to object code. Translators are
in two forms, which are interpreters and compilers. These will be covered in more detail under
Programming Languages.
c. Utility Programs: These are programs used to perform specific, useful and frequently
needed tasks in a computer. Utilities include the following:
i. Virus Scan Utility: These are programs that protect computers from virus attacks, for example
Norton Antivirus, AVG, Avast, Esat NOD32, MacAfee, etc.
ii. Sort Utilities: These are programs used to arrange data, files and records into a specific ordered
sequence, for instance in ascending or descending order of a given key.
iii.Debuggers: These are utilities used for assisting in correcting errors in programs.
iv.Dump Utilities: These are programs that assist in copying data from main storage to output
devices and to other storage devices like the hard drive.
v. Editors: These are programs used to make changes to data already held in the computer. vi.
Peripheral Transfer Utility: These are programs used to transfer data from one peripheral
device to another.
vii. System Status Utilities: These are programs that provide information on the state of files,
memory, users and peripherals. viii. File Maintenance Utilities: These are programs used to
reorganise programs and to update them.
APPLICATION SOFTWARE
This refers to programs and their documentation, designed to perform a specific task like payroll
processing, word processing, etc.
Application package (suite):- a collection of application programs purchased as one package, for
example Microsoft Office 2010.
Integrated Package: A collection of a word processor, spreadsheet, database and presentation
packages bought as one package, for example, Microsoft Office 2010.
Advantages of Integrated Packages are: It is cheap to buy as compared to buying single
application programs at a time. Programs have been tried and tested and therefore are free from
errors. Programs are designed in a similar way, making it easier to learn others if you are able to use
one of them. Programs are easier to use and to learn, for example, when designing a database using
Microsoft Access. Regular updates are provided on the internet or on disks.
Disadvantages of integrated packages are as follows: They are not tailored for individual user
requirements. Organisations purchasing them have little or no control over their use. The packaged
programs can only be modified by the programmers (owners). Most of the need regular updating,
which may be expensive.
Disadvantages of Generic Software: May not meet the individual needs of an organisation. May
not run on the organisation‘s hardware. May not interface with other software already in use in the
organisation. Organisations purchasing them have little or no control over their usage.
Organisations purchasing them have no right to modify them. The software can be very
sophisticated and will usually include large sections that you will never use (e.g. Excel or Word)
2. Tailor-made Software (bespoke): These are programs specifically designed to meet the
needs of only one organisation, for example a bank. The organisation would employ or hire an
analyst / programmer who will first asses the needs of the organisation before designing a program
that will solve the problems of the organisation. Easier and more intuitive to use. You will receive
much better support and can in many cases talk directly to the developers concerned
Disadvantages of Tailor-made software: It is very expensive to develop. They take too long to
develop and to implement. If you pick the wrong developer you could end up with an application
that is unstable, unreliable and full of bugs
*NB: A programmer is a person who specialises in designing, coding and testing computer
programs. Software House is an organisation that specialises is developing software; this includes
both generic and tailor-made.
Special Purpose Application Software: - These are programs designed for one specific business
purpose, for example Pastel for accounting purposes.
Advantages of Generic Software Over tailor made software: Off - the - self software is cheaper
to buy while tailor-made software is expensive. Generic software has been tried and tested hence
free from errors while tailor-made software may have some errors. Generic software is easier and
faster to implement while tailor made software takes long to implement. Generic software is used
by many organisations; therefore users can share information on its usage while tailor-made
software is only used by one organisation. Generic software has regular updates available for
download on the internet while tailor-made software does not. Advantages of tailor made
software as compared to Generic Software: Tailor-made software is designed to meet the
requirements of an organisation while generic software might not meet the needs of an individual
company. Organisations have full control over tailor-made software as compared to off-the-shelf
software which is controlled by the programmers.
TYPES OF APPLICATION SOFTWARE:
These include:
1. Word Processing Packages: These are application packages used for creating, editing and
formatting text documents like letters and reports. Word Processing packages include Microsoft
Office Word, WordPerfect, WordPro, Notepad, etc. Word processing packages have the following
advantages over the typewriter: Produces more attractive documents. Word processors are less
noise than typewriters. Documents can be edited and formatted before printing, which reduces
spelling and other typing mistakes on printed documents. Typed documents can be stored in the
computer for future use. Document layout can be viewed on the screen before printing and can be
changed easily. A word processed document can be printed more than once. Other text and
diagrams can be added without the need to retype the document. Word processors can move some
parts of text to another part of the document easily. They have the ability to delete words, sentences
and paragraphs. They are less manual than typewriters.
*NB: Editing: the process of correcting mistakes in a document, for example, spelling mistakes.
Formatting: making a document look more attractive by bolding, underlining, inserting borders,
etc
2. Spreadsheet Packages: These are application programs used to manage and analyse
statistical, numeric and financial data, for example Microsoft Office Excel, Lotus 1-2-3, SuperCalc,
etc.
3. Presentation Packages: These are programs used for designing slides for a presentation to
an audience, for example Microsoft Office PowerPoint, Lotus Smart Suite, etc. Presentation
packages include text, pictures, sound, animation, graphics and tables, thus being multimedia.
Presentations are colourful and attractive. Speakers and projectors are needed. Presentation
packages have the following features: Have Clip art. Can accommodate images and graphics. Can
use sound, video and animation. Incorporate Word Art. Have facility to insert charts and graphs.
*NB: Animation: - Creating illusion of moving sequence using a series of still images as done in
movies and cartoons.
4. Database Packages: Refers to programs used to create databases for storage and
management of a collection of data related to a particular subject, for examples Microsoft Office
Access, Dbase IV, etc
5. Graphics Packages: Refers to programs used to create and edit graphs, diagrams,
drawings, charts and plans for buildings, for example Microsoft Paint, Harvard Graphics, Corel
Draw, Real Draw, etc. Computer graphics are images designed for logos, commercial and news
inserts during television advertisements or transmission.
Advantages of Desktop Publishing: Users have more control over text layout compared to word
processors especially over formatting and layout of text. Lots of different files can be brought
together on the same document. Produces colourful and attractive documents for commercial
purposes like brochures.
8. Authoring Packages: Software that can be used to develop interactive computer programs
without the technically demanding task of computer programming. Also used in multimedia
presentations. These programs can be used for developing databases and material for Computer
Aided Instruction (CAI).
*NB: - Specialist Packages for Business: These are packages for use in a specific business
environment, for example, Pastel for accounting purposes.
*NB: - Install: - to add programs to the computer. Therefore to uninstall is to remove programs
from the computer.
Advantages of Networking
Expensive peripherals like printers and scanners can be shared between users. Messages can be sent
easily and faster between users whether on WAN or LAN. Avoids duplication of information as
users can access the same file on the network. Network software can be purchased cheaply than
buying individual packages for each computer. It is possible to access data or programs from any
terminal or workstation. Data and programs can be stored centrally making it easier to maintain and
backup. Users can be easily prevented from accessing files not intended for them. Allows sharing of
files, software and data held in computers. Allows emails to be send between users.
Disadvantages of Networking
Sophisticated equipment is needed, which may be expensive to buy. Security of data can be a
problem due to hacking. Wiring can be expensive both to buy and to install; wiring can be sunk on
the ground to avoid trailing cables. If a server breaks down, the whole network becomes unusable.
Networks need experienced network managers, who will be highly paid to keep the network
running.
TYPES OF NETWORKS
Computer networks are grouped into Local Area Networks (LAN) and Wide Area Networks
(WAN) and these are described below.
1. Ring Network:
Computers are connected together to form a circle and uses a token when transferring data.
Information travels in one direction only. Information moves around the ring in sequence from its
source to its destination.
The diagram below illustrates the physical
configuration of a ring network:
Advantages of Ring Network
- If one computer breaks down, others will
remain working as they have their own
processors and storage facilities.
- Data processing is faster as each computer
processes its own processor.
- Has very high data transfer rates.
- Uses a token to avoid data collision or loss
2. Star Network:
Computers form a star shape with host
computer at the centre, as shown below:
Advantages of Star Network
- If one terminal breaks down, the network is
not affected.
- If one terminal breaks down, others will
remain working.
- It is cheap in terms of requirements since only
the host computer can have a processor and
storage facility.
- It is very easy to install.
- Management of data is easier as this is done
centrally.
- It is very fast to process data.
- Easier to add new workstation without
disrupting the network.
- No problem of collision of data since each terminal has its own cable to the host computer.
- Gives consistent performance even when the network is heavily utilised.
- More secure than other network topologies
3. Mesh Network
A network in which each computer serves as a relay point for directly sending information to any
other computer on the network. No central device oversees a mesh network, and no set route is used
to pass data back and forth between computers. Thus, if any one computer is damaged or
temporarily unavailable, information is dynamically rerouted to other computers—a process known
as self-healing
4. Bus(Linear/Multi-drop) Network:
Computers are connected together through one main cable and all computers all signals transmitted
by any computer
connected to the
network
(a) Bus: the
dedicated and main
cable that connects all
workstations and other
computer devices
like printers.
(b) Nodes: these
are connection
points for
workstations and the
bus. (c) Terminator:
devices that prevent data
in the bus from bouncing
back, causing noise and prevents data from getting lost.
Other requirements
1. An internet account: a unique personal identifier given by the Internet Service Provider (ISP).
An ISP is an organisation that links users to the internet, for example, Mweb, Ecoweb,
Africaonline, Yahoo and Google Inc. The internet has become a source of a wide range of
information globally.
However, despite the increase in the use of e-mail, there has been a sharp increase in the amount of
paper used. This is because: People print copies for meetings and then destroy them afterwards, but
if needed again, print out another copy. Some people find it difficult reading large amounts of text
on the screen. People often e-mail colleagues rather than use the phone who then print out the
document.
3. Video conferencing: Conducting meetings with several people in different locations and
seeing each other on the screen of networked computers. Delegates do not need to leave their
homes or work places. Video conferencing requires the following:
A computer with a codec. Video cameras. Microphone. Speakers. Large and high resolution
monitor. An integrated Services Digital Network (ISDN) line with a high bandwidth to transmit
video data at fast speed. Sound card. Video card
4. View data (videotext) systems: These are interactive systems on which users view data
when they access specialized databases like Prestel. The requirements include the telephone line or
cable TV, specialized keyboard and a Television set. Information on the database is provided by
companies that advertise their products like news, weather reports, and so on. View data systems
have the advantage that they are interactive and the service is provided for free to the public.
However, its requirements are expensive.
5. Teletext: It is a broadcast service that comes as a television transmission. It is cheaper than
the internet service. However, it is non-interactive.
6. Facsimile (Fax): A method whereby output from a scanned document is send over
telephone line and reproduce on a fax machine on the receiving end. Fax method has the following
advantages:
It is very cheap to send messages. It is very easy to use. It is a very fast method of sending
messages.
However, it has the following disadvantages:
Its requirements are expensive (fax machine). There must be a person at the receiving end to attend
to the fax when receiving messages.
The use of fax, e-mail, view data, teletext, teleconferencing and video conferencing in an office
brings about an electronic (paperless) office. An electronic office is an office in which the storage
and processing of data as well as communication are done electronically. An electronic office is
efficient because: Communication is easier and faster. Less paperwork is involved. Current and up-
to-date information is provided. Ensures a clean office environment.
However, it is very expensive to setup and maintain an electronic office.
*NB- The use of computers to perform all clerical and office duties is called Office Automation.
Tele and video conferencing as well as networking bring about tele-commuting (tele-working).
Telecommuting is carrying out work without leaving home. Communication is done through
networked computers. Requirements for telecommuting includes: modem, very fast communication
links (for example telephone line), computers, internet services, etc.
Benefits of telecommuting
Easier to concentrate on work in a quiet environment than in a noisy office. It saves time spent in
travelling to the work place thereby increasing productivity. It cut costs involved in travelling to
work place. The employer saves costs of office space and overheads like water and electricity.
People can be recruited from a wide geographical area. People with disabilities like the
handicapped can be employed. People in different locations can work as a team.
Disadvantages of tele-commuting
Workforce not in office is difficult to control. Workers would not understand corporate goals and
will not be loyal to the organisation. Employees feel isolated and miss the environment of an office
full of colleagues. People may find it difficult to work in teams. It is difficult to separate work from
home duties while at home. Unions find it difficult to mobilise workers for demonstrations and
strike.
NB. Hyperlink :- an HTML page on the World Wide Web. The websites must be stored on a server
provided by the Internet Service Provider (ISP)
2. File Transfer Protocol (FTP): program that allows users to transfer files from host
computers on the internet to their personal computers.
3. News groups: a global electronic bulletin board system in which users exchange
information on different topics.
4. Entertainment: the internet provides an option for users to download and listen to music,
newspapers, radio stations, etc.
5. Internet Shopping: (Internet buying, electronic commerce, online shopping): The internet
provides a facility for customers to purchase products from the internet without visiting shops.
Credit cards are used in internet buying.
To businesses
Increase in cases of industrial espionage. Industrial espionage involves selling of company secrets
by employees to rival companies and the use of destructive methods by competitors to destroy other
organisations.
DATA COMMUNICATION
This deals with the means of sending and receiving data on networked computers. Transmitted data
can be in analogue or in digital form.
Digital Data: Data is in discrete value, that is, in ones and zeros.
Analogue Data: Data is in continuously varying form, e.g. human voice.
Transmission Modes
Transmission modes include Simplex, Duplex (Full duplex) and Half Duplex
Simplex Transmission Mode Half Duplex Transmission Mode Duplex Transmission Mode
Diagram A B C
Simplex Mode: This is a mode of data transmission in which data travels only in one direction.
Thus one computer acts as the sender and the other as a receiver. See diagram A, above.
Half Duplex: This is a transmission mode in which data travels in both directions but not
simultaneously. See diagram B above. The receiver waits until the sender has finished sending data
in order for him to respond.
Transmission impairments
This refers to change in signal form as it propagates through the transmission channel.
Transmission impairments include:
Attenuation: The loss of signal power as it moves through the transmission channel.
Noise: Occurs when an unwanted signal from other sources than the transmitter enters the
transmission channel.
Multiplexing
This is a method of allowing multiple signals to share the same channel, reducing too much cabling,
as shown below:
A multiplexer is used in
multiplexing. A multiplexer is a
device that joins two or more
channels into one channel while
the de-multiplexer is responsible for splitting a channel into a number of them for easy
transmission to the intended destination.
Bandwidth
Refers to the caring capacity of a transmission channel (measured in bits per second: bps). It
determines the amount of data a channel can transmit at a given period of time.
Transmission Media
Refers to forms of media through which data is transferred from one point to another. These
include:
1. Twisted Pair: These are cables with two copper wires of about 1 millimetre thick. The
wires are twisted to avoid crosstalk. Twisted pair is very cheap to buy and offer good performance
over short distances. Disadvantages of twisted pair: Twisted pair is very cheap to buy. Has big
attenuation. Has low bandwidth
2. Coaxial cable: It is a stiff copper wire surrounded by an insulating material. It has less
attenuation than twisted pair, has high bandwidth and has low error rates. However, coaxial cable is
expensive to buy and is stiff, making it difficult to handle.
3. Fibre optics: A media that uses light to transmit data. It has less attenuation, has very high
bandwidth and cannot corrode (not affected by corrosion), it is thin and therefore has less weight.
However, fibre optics is very expensive to buy and is uni-directional (travels in one direction only)
4. Infra-red waves: Refers to data transmission in form of waves as through some remote
controls of televisions. It has enormous bandwidth. However, infrared waves do not travel through
obstacles like buildings, they only work for very short distances, affect eyes and consume a lot of
power.
WIRELESS COMMUNICATION
This is a method of networking computers and computer devices without the use of cabling, e.g.
using blue tooth, radio, optical, satellite, infra-red, microwave, etc. The devices that are used in
wireless technology include: 3G (Wireless Application Protocol (WAP)) mobile phones /cell
phone/remote key pad/remote control/ remote keyboard. infra-red mouse. Multimedia mobile
handsets and notebooks. GPRS (general packet radio service) modems. Wireless LAN(or Wi-Fi –
Wireless Fidelity: A local area network that uses high frequency radio signals to transmit and
receive data over distances of a few hundred feet; uses Ethernet protocol). PDAs (personal digital
assistants).
GPS - A navigational system involving satellites and computers that can determine the latitude and
longitude of a receiver on earth by computing the time difference for signals from different
satellites to reach the receiver
Advantages of wireless communication include: Cheaper as no wires are needed for networking.
Ensures fast wireless Internet access. Wireless LAN is faster than a modem or mobile. Wireless
LAN enables working at home. Users can create and send multimedia messages to mobiles or e-
mail while in transit. Users can send greetings from mobiles to mobiles/PCs. Ensures instant
transmission. Users can download e-mail and file attachments while on mobile. Users can watch
live web cast on mobile. Users can listen to streaming video on mobile. Users can watch news,
weather, sport, games while on the move. Users can access information from mobile anytime. Users
can send, receive, delete e-mail while on the move. Users can view business appointments while
out of office on mobile. Users can send corporate e-mail while out of office - even behind a firewall
on mobile. Users can use wireless internet connection from chat rooms for discussions with
colleagues while on the move.
Disadvantages of Wireless Technology: Wireless LAN speeds are slower than Net access at work
due to narrow bandwidth. Any one within the Wireless LAN nodes range with an appropriate
device can use your Wireless LAN and broad band link. Any one who walks past your house or
WLAN linked into a corporate system can access sensitive information like credit card details. 3G
phones are not compatible with 2G phones. Blue tooth has limited range. Signals can be blocked,
distorted or will be weak. Can lead to health problems from microwaves
SECURITY
COMPUTER VIRUSES
A computer virus is a program which replicates itself, damages or corrupts files and memory of the
computer, for example, a Trojan horse. By replication, it means that the virus can multiply itself
(produces several similar copies of itself) when it enters the computer system.
Signs and symptoms of virus attack on a computer:
Reduced system performance (reduced speed of operation). The computer displays nasty messages
on the screen. The computer displays a blank screen. The computer system produces wrong results
of a process. Unexplained and frequent lose of data held in the computer. The hard disk becomes
inaccessible (the user cannot access data held in the computer). The computer fails to boot.
Antivirus programs
These are programs that detect computer viruses and reduce the risk of computers being attacked by
viruses for example Norton Antivirus, MacAfee, Avira, Avast, AVG, etc.
2. Command Driven Interface: This is an interface which allows the user to type the
command to be carried out by the computer through the keyboard as supported by MS-DOS. The
user has to remember the commands to be typed when performing a specific task. An example of a
program that uses command driven interface is Microsoft Disk Operating System (MS-DOS). The
commands are abbreviated and short e.g. Del (for delete), copy, print, etc.
Advantages of Command Driven Interface: It saves disk storage space since there are no icons
involved. It is very fast in executing the commands given once the user mastered the commands. It
saves time if the user knows the commands by heart.
Disadvantages of Command Driven Interface: It takes too long for the user to master all the
commands by heart. It is less user friendly. More suited to experienced users like programmers.
Commands for different software packages are rarely the same and this will lead to mix-up of
commands by the user.
3. Menu Driven Interface: This type of interface displays a list of options / commands from
which the user has to choose one by use of the mouse or keyboard. Below is an illustration of a
menu driven type of interface:
1. PRINT RECORD
2. DISPLAY RECORD
3. DELETE RECORD
4. EDIT RECORD
5. MY OPTION IS: __
The user has to enter 1, 2, 3 or 4 and then press enter on the keyboard.
Advantages of Menu Driven Interface: It is fast in carrying out task. The user does not need to
remember the commands by heart. It is very easy to learn
Disadvantages of Menu Driven Interface: The user is restricted to those few options available
and thus is not flexible to use.
4. Direct Manipulation Interface: The user is given a list of options and the effect of
carrying out an option is displayed on the screen. The options are often represented by an icon as
shown below:
1. Buffers: This is a temporary memory store for data awaiting processing or output,
compensating speed at which devices operate, for example printer buffer. Buffering is appropriate
where an output device processes data slower than the processor. For example, the processor sends
data to the printer, which prints much slower and the printer does not need to wait for the printer to
finish printing in order for it to carry out the next task. It therefore saves the data in a buffer where
it will be retrieved by the printer. Buffering usually match devices that work at different speeds, e.g.
processor and disk.
Reasons for using printer buffers: Stores data or information being sent to the printer
temporarily. Compensates for difference in speed of CPU and printer. Allows CPU to carry out
other tasks whilst printer is printing.
Benefits of increasing size of buffer in a printer: Reduces the number of data transfers to the
printer. Ensures a more efficient use of the CPU. Larger files can be sent to the printer without
problems
3. Polling: A process whereby the processor interrogates peripherals to determine if they are
in a certain condition (or are present). Polling can take place during booting, where the processor
checks the connected devices like keyboard, mouse, hard disks, etc. It also occurs in time-sharing
systems where the processor checks if the terminal has anything that needs processing.
6. Scheduling: This is whereby the processor decides the loading and execution of programs
to provide continuous job processing sequence. Scheduling can do this by giving time slices to each
computer or by queuing jobs. Scheduling generally ensures that:
No resource is heavily under-utilised or over-utilised. The maximum number of interactive users
get a reasonable response time. Making sure that no job is pushed to the back of a queue. Getting
maximum number of jobs done in the minimum amount of time.
*NB: Directory: - a folder used to store other folders and files in a hierarchical structure.
Directories are usually created in MS-DOS systems.
COMPUTER APPLICATION
1. COMPUTER APPLICATION IN HOSPITALS:
Uses of computers in hospitals include:
Storage of patient, supplier, asset and employee records. Monitoring patients and alerting the
doctors / nurses when a problem occurs. Taking measurements on patients, for instance: blood
pressure, temperature level, weight, etc. This relieves nurses of some duties that will be boring,
making them faster and more reliable. Used to aid medical researches by analysing data produced
from experiments. Used to aid diagnosis (used to answer patient problems). Used to hold data for
children‘s immunisation processes. Used in medical diagnosis, whereby the computers are used to
identify patient problems and the therapy (treatment). Monitoring of patients during surgery as
they control body scanners and sensors.
There are however some hospital tasks that are more suitable for human beings to perform than
computers. These include dressing patients, bathing patients, etc. Control systems are also used to
monitor patients. Computers also act as expert systems. Computers have the following advantages
in hospitals:
Precise 'tests' and medical examinations. Faster medical alerts, which are more accurate time-wise.
Enhanced data about a patient‘s medical history. Accuracy in diagnosis. Accuracy in billing.
Automated updating of medical history
EXPERT SYSTEMS
An expert system is a program that mimic human reasoning in a specific field, for example in
medical diagnosis, mineral prospecting, engineering, coding games like chess, tax/financial
calculations, weather forecasting, fault diagnostics, criminology/forensic science, career choices,
etc. Expert systems are programs that make decisions or solves problems in a particular field, such
as finance or medicine.
An expert system contains the following:
i. A knowledge Base: a representation of facts (data) in a particular field (e.g. diseases, symptoms,
treatments, etc) ii. Inference procedure (engine): contains reasoning methods used to arrive at a
conclusion using information in the knowledge base. It contains interrogation technique/questions
and answers.
An expert system can be improved by: Frequently carrying out researches and making updates.
Quickly inputting new data into the knowledge base. Assigning its control to a number of highly
experienced personnel who will monitor and make updates as soon as possible.
Artificial Intelligence
Artificial Intelligence(AI) is the science of developing computer systems that have the ability to
learn from experience and mimic human reasoning in specific areas, as in medical diagnosis,
mineral prospecting, etc. Expert systems are a branch of Artificial Intelligence.
2. SIMULATION
It is the studying of the behaviour of a system by using models to predict future real life events, like
population growth, flight simulator, etc. In simulation, past and present data, as well as models are
analysed in order to predict the future. A model is a pictorial representation of a real object, e.g. a
bridge, house, etc. The use of real things has the following disadvantages in simulation other than
use of models:
Too dangerous to test with. Too large a time scale is required. It involves wastage of materials.
Takes much longer to build the real thing.
Simulation in Population Growth: Data needed include birth rate for the country, death rate,
previous growth rate for the previous 5-10 years, present population size, etc. Cognisance can also
be taken of natural disasters like floods, war, earthquakes, which may distort the figures.
Simulation can also be used in Virtual Reality; which is the creation of simulated multi-
dimensional representation of real things, e.g. armies fighting against each other, in chemical
plants. Virtual reality needs devices like goggles (headsets), gloves, special suits fitted in sensors,
motors that provide movement, etc. Virtual reality ensures safety other than using real objects, can
perform real tasks without risks, can be used in dangerous areas, and can store data and results on
the computer.
- Simulation can be applied to games like chess, where the opponent‘s moves can be analysed.
ii. Stock Control Systems: Stock refers to goods purchased for resale. A computer system
can be used by managers to manage their stock in an efficient way in order to provide efficient
service to customers. Managers shall avoid overstocking and under-stocking as this will have a
negative effect in business. Typical records may have the following:
Quantity in stock, item name, serial number, supplier name, minimum re-order level, etc.
If the quantity in stock reaches the minimum re-order level, an order should be placed for more
items. Computerised stock control systems are used to monitor stock levels in an organisation.
Computerised stock control can be done when goods are purchased at the Point of Sale Terminal
(POS) or as goods are moved from the warehouse. The computer at the POS will be connected to
the server in the manager‘s office. As the items are bought, the number of quantity in stock is
automatically reduced by the number of goods purchased. If the quantity in stock reaches or
becomes lower than the minimum re-order level, the computer alerts the manager. This helps the
manager as he is freed from the task of manually counting the stock items and placing some orders.
At the POS terminal, the hardware required includes:
(a) Input Hardware: barcode reader (automatically enter details of goods purchased into the
computer), keyboard (manually typing in product code if the barcode reader fails to do so),
mouse (selecting item by clicking)
(b) Output Devices: printer (producing receipts), VDU - monitor (displays item details and
items that are being purchased by the client, amount paid and change)
(c)Network Cables: connecting the VDU to the main computer.
The POS terminals can also be connected to the main server in banks like CABS, Barclays, etc.
This enables customers to purchase goods electronically without the burden of carrying cash
around. This is called Electronic Funds Transfer at Point of Sale (EFTPOS). Customers can also
be given cash back at the EFTPOS after purchasing goods using debit cards.
After purchasing the goods, a receipt is produced. The receipt will have the following details: date
of purchase, time purchased, shop attendant, item (s) bought, quantity bought, unit price, total price,
amount tendered, change, etc.
Advantages of Using Electronic POS terminal to supermarket managers
It is automatic and more accurate to control stock. Automatic updating of stock file is ensured.
Automatic reordering of stock items is involved. Less staff and wages needed. Sales statistics are
always available.
Faster throughput is ensured. Itemised receipts are produced quickly. The system records every
transaction. The system records staff work rates. Less pilfering by staff as it is easier to identify
pilfering. Fewer errors are produced. Faster calculations are made. There is no need to remember
prices of goods.
NB. The system updates the master file when an item is sold. It first searches the master file. Using
the barcode number (or product code) it decrease the number in stock and increase the quantity sold
*NB:
POS –Point of Sale terminal: the point where customers pay for goods purchased in shops, either
by cash or otherwise.
Difference between Electronic Point Of Sale (EPOS) and Electronic Funds Transfer at Point Of Sale
(EFTPOS).
EPOS terminal only involves scanning of goods electronically by use of barcodes and by keyboard
entry. EFTPOS involves electronic scanning of goods at point of sale by use of scanners and
barcodes (and use of keyboard) and has an added feature of allowing customers to transfer money
from one account to another, usually to the account of the shop where the goods are being bought.
Customers can also get cash-back at the EFTPOS terminal in shops.
iii. Payroll Processing Systems: These are batch processing systems used to process
employee wages and produce payslips at the end. Data is first put in batches, e.g. number of hours
worked for each employee per day. Processing is later on done at month-end or every Friday by
compiling all the hours worked each day. A typical payroll processing system will have the
following details:
Employee name, employment number, national identification number, net salary, gross salary,
deductions (aids levy, NSSA, PAYE, Pension, etc) number of hours worked, salary grade, bank
name, account number, etc.
iv. Accounting Systems: These deal with handling of company‘s finances and could be
accounts receivables or accounts payables. Special accounting packages like Pastel Accounting are
used in financial systems. Calculations could be done automatically.
4. COMPUTER APPLICATION IN
BANKS Uses of computers in banks:
i. Used for storage of client account details like, account name, account number, address,
sex, date of birth, national identification number, balance, withdrawal, deposit, overdraft, interest,
etc.
ii. Used for cash disbursement at the Automated Teller Machine (ATM). An ATM is a
computerised, special purpose cash disbursement machine outside banking halls used even when
banks are closed. Services offered at the ATM include: Balance enquiry, mini-bank statement,
facility to change PIN code, cash withdrawal, cash deposit, etc.
PIN (Personal Identification Number) - a secret number used by individual account holders to
access his bank account and get service at the ATM. The account holder needs a debit card for
him/her to access bank services at the ATM.
The Account holder inserts the debit card into the hole on the ATM, which in turn request the user‘s
PIN. The user enters the PIN and then presses enter. The ATM validates the PIN, and if it is correct,
allows the user to select service required from the list of options available. If the user enters the
wrong PIN for three consecutive attempts, the ATM would not eject the debit card, assuming that
you are not the owner of the card and no service shall be given.
iii. Clearance of cheques: The main branch receives cheques from other branches and
processes them using the batch processing method. MICR is used to read data from the cheques
into the computer.
iv. Electronic Funds Transfer at Point of Sale (EFTPOS): This is a method of transferring
money from one account to another electronically without handling of cash at the Point of Sale
terminal in shops. The Point of Sale terminals will be online the bank‘s database, enabling the shop
to deduct cash from the customer‘s account and transfer it to the shop‘s account. For this to occur
the customer is supposed to produce the debit card, which is wiped on the card reader which in turn
requests the client to enter the PIN. Some cash back is available at the POS.
Electronic banking (e-banking): the process of carrying out all bank transactions electronically on
the internet (internet banking) and by use of cell phones. This is almost similar to tele-banking.
For Internet banking, credit cards are required for clients to get access to the bank accounts. Data
about credit cards is stored on the magnet strip and this includes: Date of issue, Bank code, Branch
code, Account number, Card number and Expiry date. Information entered by a client to access
banking services from home includes: Account Number, Account name and password.
In home banking, users can stop a cheque, enquire their account balances, transfer money between
accounts, pay bills, order a cheque book, look at account transactions for a given period, request a
change of pin or password, amend or create standing orders/direct debits, print statements and
change personal details. It is impossible to withdraw cash or pay in cash.
When purchasing the goods, the supermarkets and any other shops check the following on the credit
card:
Check if the card is valid. Check if credit limit is not exceeded. Check if credit card is not reported
as stolen. Check if expiry date has not been exceeded.
The introduction of ATMs, EFT and electronic banking, including internet banking has the
following advantages and disadvantages.
Advantages to Bank workers
Their workload is reduced, for instance the burden of counting cash and service many clients can be
done the ATM. Reduction in mistakes, for instance counting cash and updating wrong accounts as
the computers validate details during entry. Reduction in working hours. Increased salaries. Better
working conditions
ii. Distance learning made easier through chartrooms, digital interactive television, CD-ROM
(storage of encyclopaedia, learning materials (content)). Learning materials like the encyclopaedia
can be stored on the CD ROM as it will have the following advantages as compared to a printed
(manual) encyclopaedia: Cannot write to it so cannot be changed. Can use sound, text as well as
video for students to understand better. Search of data is quicker. Can printout data conveniently.
It takes up less space. Is more portable.
However, the electronic encyclopaedia has the following disadvantages as compared to a manual
one: Users need a suitable multimedia computer for them to use it. The computer could crash and
access to data will not be possible. Can lead to electricity expenses. Cannot be read in awkward
locations. Takes time to start up the computer. The disk can be stolen easily. You can‘t add notes to
a Recordable Compact Disk
iii. People with communication difficulties like the blind and deaf are assisted, e.g. in voice
recognition systems.
iv. Computers can be used to organize events in schools, for example, parents’ visits,
timetable, etc. v. Used to store student’s data, exams, teacher’s records, etc. vi. Used as teaching
aids in all subjects. Enables interactive teaching vii. For marking multiple choice examinations on
scanner sheets viii. For storage of student data pertaining to subjects, teachers and subjects taken.
ix. Used as a subject for student to learn, e.g. Computer Science, Information Technology, etc.
x. Used for carrying out researches and experiments which may be dangerous for human beings to
do. xi. Computers can also be used in Computer Aided Learning (CAL) and Computer Aided
Instruction (CAI). CAI: a teaching system that operates on drill and practice principle, for instance,
in teaching computers, a student is presented with a word and its meaning. The student studies it
and will be asked its meaning at a later stage.
CAL: This whereby a lesson is rehearsed before the computer and then played back to the class
when the teacher is not physically present. The computer is thereby used to teach the pupil. For
example, the computer presents a topic just like a teacher does in a lesson. Pupils are asked
questions. If they fail, the lesson is repeated; otherwise a new topic will be presented. CAL has the
following advantages:
This system allows pupils to study at their own pace, repeating sections they do not understand.
Material is presented in a consistent way making learning easier. Few teachers are required.
Computers are endlessly patient and can repeat sections that pupils did not understand without
hesitation.
xii. Used for typing and printing examination papers and keeping of student results.
Some schools have pupils who are either blind or partially sighted. Computers could be used to help
these pupils to learn in the following ways:
Use of sound (voice) output and speech synthesiser. Use of speech (voice) input, recognition or
microphones. Type using large characters (large font size) on the screen. Use of Braille keyboards,
touch screens, touch pads. Use of bright colours to improve visibility. Use of scanners to input
information and output speech. Use of printers which give output in Braille
v. Used for monitoring the production process (production control). Computer can monitor and
control temperature level, pressure level, etc, that might be vital for production process. In this
case, feedback is vital. If temperature becomes too high, the computer will switch off the power
supply and switch it on when temperature becomes low.
9. Microprocessor-controlled streetlights
Input: Sunset time and Sunrise time and then sending a signal or
- Light sensor sends measurement of light to microprocessor, ADC converts this to digital
Processing: Compare sunrise time, sunset time and current time. If sunrise time = current time or
higher, switch off lights, else, if signal equals sun set time, the switch on light. Also the amount of
light is compared
with preset value. If higher – nothing happens, If lower or equal sends signal to
light Output: Lights switched on or off
DATA LOGGING
The process of automatically collecting data from source at set intervals for use at a later stage. A
device that automatically collects data from source at set intervals for use at a later stage is called a
data logger. Data loggers have the following features:
They contain processor inside them. They have own storage facility. They contain sensors used for
collecting data. They can be connected to small keyboards or other special reading attachments.
They are connected to an Analogue to Digital Converter (ADC), which converts data signals in
continuously varying form collected by sensors into discrete values that can be accepted by the
computer.
Data loggers can be used to measure the pollution level in a dam or river, as shown below:
Reasons why computers are used rather than manual methods for this pollution data logging
It takes more accurate readings. More readings can be taken in a short period of time. Results can
be obtained more easily and quickly. Graphs are automatically produced. No chance of forgetting to
record the temperature. Collects temperature over long periods continuously/automatically. Data
can be automatically stored and used in other programs. The results of the system can be stored in a
spreadsheet package or a database package for future reference.
A word processor or DTP package can then be used to produce reports of the results. The
procedure will be as follows:
Spreadsheet file will be saved in suitable format. The template is created in DTP package. The
Spreadsheet file is copied and pasted in to the DTP package. The Pictures are imported into DTP
package. Text is typed in and formatted. Headings are formatted and then printed
*NB: Sensor: A sensor is an input device that automatically records data by sensing the
environment it is supposed to record. Sensors receive a signal and respond to it in a distinctive
manner. The type of sensor is derived from the type of information it is designed to collect. Some
of the examples of sensors include: Optical sensors, light sensors, pressure sensors, temperature
sensors, humidity level sensors, sound sensors, proximity sensors, position sensors, push switch,
mercury tilt switch, pH sensor, weight sensors, air pressure sensor, conductivity sensor, distance
sensor, motion sensor, oxygen sensor, ultra-violet irradiance sensor, radiation sensor, escaping gas
sensor, etc. Sensors are mostly used in conjunction with Analogue to Digital Converter (ADC) –
This is a device used to convert data in continuously varying form from the sensor into discrete
value for entry into the computer. A device that will convert digital data into analogue for is called
a Digital – Analogue Converter (DAC).
Nuclear Power Stations
The diagram below shows a nuclear reactor cooled by pumping gas around the core. The reactor is
monitored and controlled by a computer.
Sensors that are used to monitor the core include:
pressure sensor, temperature sensor, radiation sensor and
escaping gas sensor.
system loops.
Advantages of using a computer system rather than a manual system to monitor and control the
reactor
Can monitor process at a distance. It is a safer way of operation and is less dangerous to humans.
Computer is faster at taking necessary action. Has the ability to automatically analyse data and
produce graphs. There is less need for human intervention. It ensures a 24 hour monitoring while
workers can get tired. It is a more accurate control mechanism.
DATA CAPTURING
It is the process of collecting and changing data from source into machine sensible form before
processing is done. It involves getting data into a structure in which it can be processed by the
computer. The following are some of the data capturing techniques/methods:
Key-to-disk – A way of inputting data directly into the computer and onto the disk using the
keyboard. Voice Recognition/input, OMR, OCR, MICR, Barcodes , Tags (Kimball tags),
Turnaround Document: it is a document produced by the computer that can latter be used as an
input document to the computer, e.g. water bills, telephone bills, etc.
CODING DATA
Data to be entered into the computer can be coded / written in a short way, for example:
In databases, a field for sex can be coded as follows: F for Female, M for Female. In this case the
user just enters F or M and not the whole field as it is. The column for colour can also be coded as
B for Black, R for Red, Y for Yellow, etc.
NB: a UPS is a device connected between a computer and a power source to ensure that electrical
flow is not interrupted. UPS devices use batteries to keep the computer running for a period of time
after a power failure. UPS devices usually provide protection against power surges and blackouts as
well.
2. Data integrity
This refers to the correctness and accurateness of data held in the computer. The issue of data
integrity and security lead to the introduction of some data protection laws which govern how
organisations holding public data must operate.
A database system (elements) is made up of stored data, software to maintain the database and the
person working with the database.
TYPES OF DATABASES
These includes relational, hierarchical and network databases
1. Relational databases: These are database that organises data in a table format, consisting of
related data in another file, allowing users to link the files. Each column represents an attribute
(characteristic or field). Each row represents a record, as shown below.
Relational databases organise data in a flexible manner. They are also simple to construct and are
easy to use. However, it may be difficult to come up with relationships. From the above database
structure, it can be noticed that:
- There are three records for Kapondeni, Turugari and Moyo. A record is also called a tupple.
- There are four fields: Student Number, Surname, First Name and Date of Birth.
- The student Number is used as a Primary Key (Key field) because it gives a unique(one) record. A
primary key is a field that is used to identify a unique record from a database. All other fields
from the above database are not appropriate for a key field because they can identify more than
one record. That is surnames can be similar for 2 or more people as well as date of birth.
*NB: Concatenated key: the combination of two or more fields in a database in order to identify a
unique record, e.g. using the Surname, First Name and Date of Birth in search of one record.
*NB: Secondary Key: A field used to identify more than one record at a time, e.g. a surname.
*NB: Attribute: A characteristic of a record, e.g. its surname, date of birth.
Entity: any object or event about which data can be collected, e.g. a patient, student, football
match, etc.
3. Hierarchical database: These are databases in which records are subordinates to other records
in a tree structure of database. It promotes grandfather, father, and son relationship of records as
illustrated below.
Sample Question
A database stores details about cars in a showroom: The database information can be amended,
deleted or new ones inserted due to:
Amended: information in the databases is incorrect. Price of vehicle needs to be changed (e.g.
sales).
Change of vehicle colour.
Deleted (record deleted): Vehicle is sold or Vehicle is scrapped
Inserted/ added: new vehicle arrived. More information about current vehicle becomes known.
FILE HANDLING
Types of files
1.Master File: It is a relatively permanent file that is kept up-to-date by applying transactions that
occur during business operations. It contains permanent and semi-permanent data. Static
(permanent) data stored in database files can include Surname, First names, Date of birth, etc.
2.Transaction Files: These are files that contain data that can change regularly, e.g. on daily bases
and it is used to update the master file. This includes sales per day, student mark in a weekly test,
etc. Transaction files are used to update master files.
3.Reference files: These are files that contain permanent data which is required for reference
purposes only.
This includes data on tax bands, formulae, etc. No changes to files are done.
4.Data file: A set of related records (either written or electronic) kept together.
NB:- * Indicates the end of field marker, and the ≈ indicates the end of record
marker Variable length records have the following advantages:
They are more economical in terms of usage of disk storage space as they do not allow spaces to lie
idle.
Data entered will not be cut but appears as entered no matter how long it is.
However, variable length records have the following disadvantages:
End of field and end of record markers occupy disk storage space that might be used to store data.
These records are difficult to update as the transaction and master files might have different lengths.
FILE ORGANISATION
Refers to the way in which records in a file are stored, retrieved and updated. This affects the
number of records stored, access speed and updating speed. The most common methods of file
organisation are: Serial File Organisation, Sequential File organisation, indexed – sequential
file organisation and random (direct) file organisation.
1. Serial File Organisation: This is whereby data is recorded one after another as they occur,
without any definite order as on magnetic tapes. Data is read from the first record until the needed
data is found, as on magnetic tapes. New records are added to the end of the file. Serial file
organisation is not appropriate for master files since records are not sorted and therefore are
difficult to access and to update. Suitable for temporary transaction files since records are not
sorted.
2. Sequential File Organisation: This is whereby records are sorted into a key sequence, that
is, in ascending or descending order of a given key filed as on magnetic tapes. Sequential files
organisation is appropriate for files with a high hit rate like payroll processing. They are suitable for
master files since they are ordered. However, it takes too long to access required data since the
records are accessed by reading from the first record until the required data is found. Adding of new
records is difficult as this is done by re-entering the data and the new record is inserted at its right
position. It time consuming to update such records. Suitable for master files since records are
sorted. This is used where all records need processing
3. Indexed-Sequential Files: This is whereby records are ordered in sequence based on the
value of the index or disk address as supported by hard disks. This is used for storing master files
records since the records are ordered. It is also suitable for real time processing applications like
stock control as it is fast in accessing records and in updating them. It provides direct access to data
as on hard disks, diskettes and compact disks.
4. Random (Direct) File Organisation: This is whereby records are stored in no order but
accessed according to their disk address or relative position, as supported by hard disks and
compact disks. It is appropriate where extremely fast access to data is required as in airline
reservation. Updating of records is in situ, very simple and very fast. Hard disk, compact disks and
diskettes promotes random file organisation.
FILE PROCESSING
Refers to any form of activity that can be done using files. This includes: file referencing, sorting,
maintenance and updating.
1. File Referencing/Interrogation: This involves searching of record and displaying it on the
screen in order to gain certain information, leaving it unchanged. The record can also be printed.
2. Sorting: Refers to a process of arranging (organising) records in a specific ordered
sequence, like in ascending or descending order of the key field.
3. Merging Files : This is the process of combining two or more records into one. Below is an
example of how records can be merged:
Record A (sorted) Record B (unsorted)
12 34 71 78 101 103 67 3 90 12
Record C (Merged and sorted for records A and Record B)
3 12 34 67 71 78 90 101 103
4. File maintenance: This is the process of reorganising the structure of records and changing
(adding or removing or editing) fields. This can be due to changes due to addition or deletion of
records.
5. File Updating: Updating is the process of making necessary changes to files and records,
entering recent information. Only master files are updated and they must be up-to-date. For
updating to occur, any one of the following must have occurred:
A new record has been entered. Deletion of an unwanted record. An amendment (change) to the
existing data has been made, e.g. change in date of birth only.
In sequential file updating, it is recommended to keep at least three master file versions that will be
used for data recovery in case of a system failure or accidental loss of data. The first master file is
called the Grandfather file, the second master file is called the father file and the third master file is
the son file. This relationship is called the grandfather-father-son version of files. The process of
keeping three versions of master files (grandfather-father-son) as a result of sequential file updating
is called File Generations. Thus the first master file (grandfather file) is called the first generation
file, the second master file (father file) is called the second generation file and the third master file
(son file) is the third generation file. The following diagram illustrates the sequential file updating
process:
*NB:- A backup is a copy of file(s) on an alternative medium like CD-ROM in case the original file
is damaged or lost and will be used for recovery purposes. The original files could be deleted
accidentally, deleted by hackers, corrupted by system failure or could be corrupted by hackers.
PROGRAMMING LANGUAGES
A programming language is a set of symbols in computer language that are used in coding
computer programs. Programming languages are of the following types:
1. Low Level Languages (LLL): These are programming languages used to write programs in
machine code, that is in zeros and ones or in mneumonic codes. Low level language is in two
forms: Machine Language and Assembly Language.
a. Machine code (language) is the language used to write programs in binary form (zeros and
ones). Machine language has the following advantages:
(i) Programs run faster since they are already in computer language. There is no need for
conversion as programs are in machine language. (ii) Programs occupy very small disc storage
space by storing just 1s and 0s.
Disadvantages of Machine language:
They are very difficult to learn. They are difficult to understand. Very difficult to use and takes too
long to find an error in a program. It takes too long too develop working programs. They are
machine dependent (they can only work on type of computer designed for and not work on other
computers)
b. Assembly Language: These are programming languages that use mneumonic codes in coding
programs. Mneumonic codes are abbreviations used in coding assembly language programs, for
example, LDA for Load, ADD for Addition, etc. Mneumonic codes are very close to machine code,
hence are low level language assembly language codes
Advantages of Assembly language:
One assembly language instruction corresponds to one machine code instruction and therefore
translation is easier and faster. Programs run faster since they are close to machine code. They
occupy very small disk storage space hence are economical to use. Easier for a programmer to use
than machine language.
Disadvantages of Assembly Language
They are very difficult to learn. They are very difficult to understand. Takes too long to develop
working programs. They can be machine dependent.
NB. Assemblers: These are programs used to convert assembly language instructions into machine
language. Other uses of assemblers include:
They generate machine code that is equivalent to assembly language. They are used to check the
validity of instructions, that is, checking for syntax errors in an instruction. They also assign
memory locations to variables.
2. High Level Languages (HLL): These are programming languages that use English-like
statements in coding programs, for example COBOL, Pascal, BASIC, etc. There are so many high
level languages because each language is designed for a specific problem to be solved in our daily
lives. For example BASIC was designed for learning purposes, COBOL for business applications,
FORTRAN for scientific purposes, etc. Below is an example of a BASIC program that accepts two
numbers entered through the keyboard, adds them and display the result on the screen:
INPUT ―ENTER FIRST NUMBER.‖, A
INPUT ―ENTER SECOND NUMBER.‖, B
SUM = A + B
PRINT SUM
END
Programs written in High Level Language are first converted to machine code before running.
Disadvantages of HLL
Takes long to run since they need to be first converted to machine code. They occupy a lot of disk
storage space as compared to low level languages.
TRANSLATORS
These are programs used to convert High level Language programs into machine code, and are in
two types, which are interpreters and compilers, which are further explained below:
Interpreters
These are programs that convert and run one instruction of a program at a time until the end of the
program, e.g. the BASIC interpreter. They do not produce the machine code version of a program;
hence conversion is repeated when you run the program again.
Functions of Interpreters
They check syntax error in a program statement. They translate an instruction into machine
language and run it. Allocates storage space to variables.
Advantages of interpreters
It is easy to find and correct syntax errors in interpreted programs. It is very fast to run programs for
the first time. It is very fast to run small programs.
Disadvantages of interpreters
They are very slow in running very large programs. They do not produce an object code of a source
code and hence difficult to use.
Compilers
These are programs that convert a high level language program into its machine code equivalent at
one go and then run it, e.g. the COBOL compiler. Once compiled, the program no longer needs
conversion since the machine code version is the one that will be run, until some changes are made
to the program code. Functions of Compilers
They check syntax errors in program statements. They allocate storage space to variables. Translate
the whole program into machine code at one go. Run an object code of the program. Produces a
program listing which indicates position of errors in a program.
Advantages of Compilers
Compiled programs runs faster since the object code is run. Compilers indicate the line numbers
with syntax errors and therefore assist programmers in debugging programs. They are appropriate
even for very large programs.
Disadvantages of Compilers
Slower than interpreters for running programs for the first time. They can cause the computer to
crash. Difficult to find errors in compiled program.
*NB: Source Code refers to the program written in English-like statements (High Level Language)
by the programmer.
Object Code refers to a machine code version of a source code. All programs written in source
code must be converted to object code for the computer to understand them.
3. Very High Level Languages (VHLL) – 4GLs: These only specify the desired end result
and do not indicate steps that the computer needs to take to make the calculation, e.g. SQL used in
relational databases. 4GLs are flexible and easy to use since no coding is required.
4. Natural Language – Artificial Intelligence and expert systems: These are programs that
mimic human reasoning and learn from experiences.
Procedural Languages: These languages give a precise definition of the steps to be followed by
the computer in order to perform a specific task. Most High Level Languages are procedural
languages.
Object Oriented Languages (non-procedural). These languages just specify the constraint and
objects to be produced and do not specify the steps to be followed to perform a task. Very High
Level Programming Languages are procedural languages, e.g. SQL
TOP-DOWN PROGRAM DESIGN
Refers to the splitting of a program into simpler subtasks called modules which will be easier to
solve. For example, a program can be split into modules to Accept Number, Add, Divide, Subtract
and to Display Results. Modules are also called procedures, routines, sub-routines or functions. The
splitting of a problem into a series of self-contained modules is called modularisation (modular
programming).
Advantages of modularisation (modular programming)
Programmer can concentrate at one task at a time. Modules are simpler and easier to understand and
to solve. Modules are easier to test and to debug. Program modification is easier since changes are
isolated with specific modules. More experienced programmers can be assigned complex modules.
It saves programming time by sharing tasks. A large project will be easier to monitor. It is easier to
update (modify) modules However, it may be difficult to link the modules together.
*NB: Library programs: this refers to a collection of standard programs and subroutines that are
stored and available for immediate use by other modules in the system. Library programs are
referenced by most modules in the systems.
*NB: Stepwise refinement: a technique used in developing the internal working of a module.
ALGORITHMS
A set of instructions describing the steps followed in performing a specific task, for example,
calculating change. Algorithms can be illustrated using the following: Descriptions, Flowcharts,
Pseudocodes, Structure diagrams
a. Descriptions: These are general statements that are followed in order to complete a specific
task. They are not governed by any programming language. An example is as follows:
Enter temperature in oC
Store the value in box C
Calculate the equivalent temperature in oF
Store the value in box F
Print the value of box C
and F End the program.
A number of control structures are used in designing Pseudocodes. These includes: simple
sequence, selection and iteration.
i. Simple sequence: This is whereby instructions are executed in the order they appear in a program
without jumping any one of them up to the end of the program. Statements are executed one after
another in the order they are. It is simple and avoids confusion. Example:
Enter first number, A
Enter second number, B
C=A+B
Print C
Stop
ii.Selection Structure:
This allows one to choose the route to follow in order to accomplish a specific task. Selection is
written using the IF ....THEN...ELSE statement or the CASE statement.
IF...THEN ...ELSE statement: A programming structure that allows the user to choose one from
at least two routes of solving a problem. The following Pseudocodes compares two numbers
entered through the keyboard and determines the bigger one.
Enter first Number, A Enter first Number, A Enter first Number, A
Enter second number, B Enter second number, B Enter second number, B
IF A>B THEN IF A > B THEN IF A>B THEN Print A is bigger
Print A is bigger Print A is bigger IF A<B THEN Print B is bigger
ELSE ENDIF IF A=B THEN Print Numbers are
IF A<B THEN IF A < B THEN equal
Print B is bigger Print B is bigger END
ELSE ENDIF
Print Numbers are equal IF A = B THEN
ENDIF Print Numbers are equal
ENDIF ENDIF
END END
A B C
The above 3 Pseudocodes produces the same result.
CASE Statement: This is an alternative to the IF...THEN...ELSE statement and is shorter. For
example:
Enter first Number, A
Enter second number, B
Enter operand (+, -, * /)
CASE operand of:
“+”: C = A + B
“-”: C = A-B
“*”: C = A*B
“/”: C = A/B
ENDCASE
Print C
END
iii. Repetition/Iteration/looping:
A control structure that repeatedly executes part of a program or the whole program until a certain
condition is satisfied. Iteration is in the following forms: FOR...NEXT LOOP, REPEAT... UNTIL
Loop and the WHILE...ENDWHILE Loop.
a. For...Next Loop: A looping structure that repeatedly executes the loop body for a specified
number of times. The syntax of the For...Next loop is as follows:
A group of statements between the looping structures is called the loop body and is the one that is
repeatedly executed.
The For...Next loop is appropriate when the number of repetitions is known well in advance, e.g.
five times. An example of a program that uses the For...Next loop is as follows:
Sum, Average = 0
FOR I = 1 to 5 DO
Enter Number
Sum = Sum + number
NEXT I
Average = Sum/5
Display Sum, Average
End
b. Repeat...Until Structure: This is a looping structure that repeatedly executes the loop body
when the condition set is FALSE until it becomes TRUE. The number of repetitions may not be
known in advance and the loop body is executed at least once. The syntax is as follows:
Repeat
Statement 1
Statement 2 loop body
................
Until {Condition}
For example
Sum, Average, Count = 0
Repeat
Enter Number (999 to end)
Sum = Sum + Number
Count = count + 1
Until Number = 999
Average = Sum / count
Print Sum, count, Average
End
In the above program:
- Count records the number of times the loop body executes.
- 999 is used to stop further data entry through the keyboard and thereby ending the loop.
Such a value that stops further data entry through the keyboard thereby terminating a loop
is called a Rogue value or sentinel.
- The condition here is {Number = 999}. The loop exits when the number 999 is entered. If
999 is part of the number to be entered in this program, then the user has to split it into two
numbers, that is 999 = 990 + 9, therefore can be entered separately as 990 and 9.
- A flag is also used to control the loop. In this case 999 is also a flag.
NB. As for the Repeat...Until loop, the condition is tested after the loop body has been run at least
once, even when the condition is true from start. This is rather misleading.
c. While ... Do Statement: A looping structure in which the loop body is repeatedly executed when
the condition set is TRUE until it becomes FALSE. It is used when the number of repetitions is not
known in advance. The condition set is tested first before execution of the loop body. Therefore the
loop body may not be executed at all if the condition set is FALSE from start. The syntax of the
WHILE…ENDWHILE structure is as follows:
WHILE {condition}
Statement 1
Statement 2 loop
body ................ ENDWHILE
The word WEND can be used to replace the word ENDWHILE in some structures and therefore is
acceptable. The word Do, after the condition is optional.
Differences between the Repeat...Until and the While…ENDWHILE structures
c. Flowcharts
It is a diagram used to give details on how programs and procedures are executed. Flowcharts are
drawn using specific symbols, each with its own meaning, as given below:
Symbol Explanation
Process Symbol - Indicates where some form of processing occur
Enter number, A
Enter number, B
Sum = A + B
Display Sum
Stop
Repeat
Enter Number
Count = count + 1
End
Enter Number
Count = count + 1
WEND
END
End Module
Flowchart (a) above indicates modules named Accept Numbers, Add numbers Multiply Numbers
and Display Results. Flowcharts for individual modules can then be designed as given in diagram
(b) above, only the first module is indicated. Can you do the rest?
d. Structure Diagrams: These are diagrams that show relationships between different modules as
given below.
Start
Sum, Product = 0
Sum = A + B
Product = A * B
End
The structure diagram above indicates five sub-programs of the program Process Numbers, namely
Initialise, Accept Numbers, Process Numbers, Display Results and Exit. The module Process
Numbers has its own subprograms, which are Add Numbers and Multiply Numbers. Modules are
appropriate for very large programs. Can you write pseudocode for individual modules? The
program can be written as a continuous single program as indicated on the right side of the diagram.
INTERPRETING AND TESTING PROGRAMS
Dry running (desk checking): the process of manually testing the logic of a program on paper
before coding on the computer. Dry running is done to determine the logic of a program (to check if
it gives intended results.) Debugging: The process of finding and correcting errors in a program.
Bugs are errors in a program. A debugger is a program used in aiding the finding and removal of
errors in a program.
PROGRAMMING ERRORS
Programming errors are grouped into:
i. Syntax error: this is an error of violating the grammatical rules governing sentence
construction in a certain programming language, for example, leaving a semi-colon at the end of
each line in Pascal. Syntax errors are detected by the computer. A program cannot run with syntax
errors.
ii. Logic error (Semantic error): refers to an error in the sequencing of instructions, modules
and specifying wrong formulae that will produce undesirable results. For example, instructing the
computer to display result before any processing has been done. Logic errors cannot be detected by
the computer. The user just finds wrong and unintended results of a process. It is also an error
generated by entering the wrong data type during program execution, for example, entering a text
value where a numeric value is needed.
iii. Runtime (execution) error: These are errors that occur during program execution and can
be generated when the computer tries to read past an end of file marker or by dividing a number by
zero.
DATA TESTING
After a program has been coded, it must be tested with different data types to determine if intended
results are produced. The types of test data that can be used include:
i. Extreme Data: Refers to the minimum and the maximum values in a given range. For example, a
computer program requires the user to enter any number from (between) 1 to 20. 1 and 20 are
extreme data and the computer must accept these. Thus extreme data is accepted by the computer.
ii. Standard (normal) Data: This refers to data that lies within (in-between) a given range. In our
example above, the numbers from 2 to 19 are standard data and are accepted by the computer.
iii. Abnormal Data: This refers to data outside a given range. As to our example above, the number
0, -1, -50 and all number from 21 and above are abnormal data. iv. Valid data: refers to data of the
correct data type. Invalid data is data of the wrong data type. Thus if the user enters the value
―Tungamirai‖ instead of a number, this is referred to as a wrong (invalid) data type. Only numbers
are needed, not text.
PROGRAM TESTING
A very large program must be tested using the following types of tests:
Unit testing: the process of testing each program unit singly to determine if it produces expected
results.
System testing: the testing of the whole program after joining the modules to determine if it runs
perfectly.
Integration Testing: testing to see if modules can combine with each other.
User acceptance testing: determining if users of the new system are prepared to use it.
SYSTEMS ANALYSIS AND DESIGN
This is a process of identifying problems of an existing system and finding the best solution to such
a problem.
System: A groups of elements working together to achieve a common goal. Systems are of two
types:
Physical system: refers to tangible systems like schools, firm, shop, etc
Conceptual systems: these exist in mind or paper and cannot be touched. They just represent a
physical system.
This chapter is concerned with the development and maintenance of system like stock control,
patient monitoring, banking and payroll which are part of physical systems.
1. Investigation,
2. Analysis,
3. Design,
4. Conversion,
1.Problem identification/Recognition/Definition/Realisation:
This refers to the realisation of the need for a new system by managers or users. This includes the
general statement of the problems being experienced by they system.
2.Feasibility Study:
This is a preliminary investigation conducted to determine if there is need for a new system or
modification of the existing one. It involves evaluation of systems requests from users and to
determine if it is feasible to construct a new one. Feasibility can be measured by its:
Economic feasibility: determining whether the benefits of the new system will out-weigh the
estimated cost involved in developing, purchasing, installing and maintenance of the new system.
The cost benefits analysis is important. Benefits can be tangible and quantifiable, e.g. profits in
terms of monetary values, fewer processing errors, increased production, increased response time,
etc. Other benefits are intangible, e.g. improved customer goodwill, employee moral, job
satisfaction, better service to the community, etc.
Technical feasibility: determines if the organisation can obtain software, equipment and personnel
to develop, install and operate the system.
Social feasibility: a measure of the system‘s acceptance by the general public; if it will not violet
the norms and values of the society.
After carrying out the feasibility study, a feasibility study report must be produced and it contains
the following information:
A brief description of the business. Advantages and problems of the existing system. Objectives of
the new system. Evaluation of the alternative solutions. Development timetable. Management
summary. Terms of reference. Contents page. Title page. Proposed solution. Appendices.
i. Interview:
This refers to the face-to-face communication between two or more people in order to obtain
information. Interviews can also be done over the phone but the most common ones are face to
face. Interviews are done when you want to collect information from a very small population
sample.
Advantages of Interviews
The researcher can ask for clarification on some points that may not be clear. Encourages good
rapport between the researcher and the respondent. Non-verbal gestures like facial expressions can
help the researcher to determine if the respondent is telling the truth. Information can be collected
even from the illiterate since the respondent‘s language could be used. First hand information is
collected. The researcher can probe to get more information.
Disadvantages of Interviews
It is expensive since the researcher has to travel to the interview venue. It is time consuming as
more time is spent travelling and carrying out the interview. Good interview techniques are required
as failure may lead to disappointments. Biased information can be given since the respondent may
not tell the truth.
iii. Questionnaire:
A document with carefully crafted questions to be answered by the respondent by filling on the
spaces provided. Questionnaires are used when collecting information from a widely spaced
population sample and when collecting information from many people. A questionnaire contains
open-ended and closed questions. Open-ended questions are gap filling questions which require the
respondent to express his or her own view. Closed questions are guided questions where the
respondent just chooses Yes or No, True or False, or by just putting a tick on given options.
Questionnaires can be distributed personally or by post.
Advantages of questionnaires
Questions are very simple to answer. It saves time as questionnaires can be distributes and then
collected later. Respondents can fill questionnaires at their own pace. Give guarantees confidential
of information, thereby encouraging respondents to give accurate information. They are cheap to
use as travel expense can be low
Disadvantages of questionnaires
Some questions are left blank. Some questionnaires may not be returned. Biased information can be
collected. Respondents usually do not fill the correct information. It is difficult to analyse
information collect using questionnaires. They are expensive to use if the postal system is used.
Abusive information can be filled by respondents.
iv. Observations:
It is a fact finding method that involves viewing the actual system in operation by the researcher.
The researcher can even take part in operating the system. It is used when the researcher wants to
see for himself how the system operates.
Advantages of observations
First hand information is collected. Accurate information can be obtained. Areas of interest can be
observed. The researcher can take part in operating the system thereby getting insight on how the
system operates.
Disadvantages of observations
People work differently if they feel that they are being observed, therefore inaccurate information
can be collected. The researcher may not understand some of the activities being observed. It is
time consuming to collect the required information. The researcher may interrupt some of the
activities being done.
4. Design Stage:
This stage is concerned with the development of the new computer based solution as specified by
the analysis stage. Design stage involves:
Input Design: includes designing of data entry forms, input methods (e.g. by filling forms, use of
barcodes, etc) and the user interface.
Output Design: Includes design of reports, data output formats, screen displays and other printed
documents like receipts, etc
File design: Involves designing tables/files, records and validation rules. It also involves
determining how data is to be stored and accessed, the media to be used for storage and the mode of
file organisation. Fields in each files ca be designed, their length and data type, e.g.
File Name: Student File
Storage Location: Hard Disk
Mode of Access: Direct/Random
File Structure:
Program Design: Involves design of systems flowcharts, structure diagrams, dataflow diagrams,
algorithms, etc. Selection of appropriate hardware: Specify the input hardware, output hardware,
processing hardware and speed, storage media, RAM size, etc. Selection of appropriate software:
specifying the type of operating system, programming language or database package and other
application packages to be used. Design of test plan and strategy, Design of the user manual,
Design of the technical documentation
5. Implementation Stage:
This involves the construction and assembling of the technical components that are needed for the
new system to operate. This includes preparation of the computer room environment, coding of the
computer program using a specific programming language, testing of the coded program, user
training (users are trained on how to enter data, search records, edit fields, produce reports, etc), etc.
Ergonomics: the design and functionality of the computer environment and includes furniture
setup, ventilation, security, space, noise, etc. some of the ergonomic concerns include:
Incorrect positioning of the computer facing the window can lead to eyestrain from screen glare.
Incorrect sitting positioning can lead to backache. Constant typing with inadequate breaks can lead
to RSI. Printer noise can lead to stress. Badly designed software can cause stress. Trailing
electricity cables are a safety hazard.
6. Conversion (Installation/Changeover) Stage:
This involves putting the new computer system into operation, that is, changing from the old system
to the new one. It involves file conversion, which is the changing of old data files into the current
format. Different changeover methods can be used, and these include:
a. Parallel Run: This involves using of both the old and new system concurrently until the new
system proves to be efficient. It involves operating the new and old systems simultaneously until
management is confident that the new system will perform satisfactorily. Other workers will be
using the old system while others use the old system but doing the same type of job.
Advantages of parallel run
Results for both systems are compared for accuracy and consistency. If the new system develops
problems, it will be easier to revert to the old one. There is enough time given to determine if the
new system produces expected results. Employees have enough time to familiarise with the new
system.
Disadvantages of Parallel run
Running two systems at the same time is very expensive. Running two systems simultaneously is
demanding to employees. It may be difficult to reach a decision when comparing the two systems.
There is duplication of tasks which in turn stresses employees
ii. Abrupt (Direct) changeover: Involves stopping using the old system on a certain day and the
new system takes over on the next morning. This is suitable for control systems like in chemical
plants and for traffic lights.
Advantages of Direct Changeover
Reduces cost as of running two systems at the same time. Faster and more efficient to implement.
There is minimum duplication of tasks. Enough resources can be allocated to make sure that the
new system operates successfully.
Disadvantages of Direct Changeover
It will be difficult to revert to the old system if the new system fails.
iii. Phased / Partial conversion: This is whereby the old system is gradually removed while the
new system is gradually moved in at the same time. This can be done by computerising only one
department in an organisation this month, then the next department in two months time, and so on
until the whole system is computerised.
Advantages of phased conversion
Avoids the risk of system failure. Saves costs since the new system is applied in phases. It could be
easier to revert to the old system if the new system fails since only one department will be affected.
Disadvantages of phased conversion
It could be very expensive since the organisation will be running two systems but in different
departments.
iv. Pilot conversion: This is whereby a program is tested in one organisation (or department), and
is applied to the whole organisation if it passes the pilot stage. It serves as a model for other
departments. A pilot program can then be applied in phases, directly or using the parallel run
method.
7. Maintenance/review/evaluation Stage:
This stage is concerned with making upgrades and repairs to an already existing system. Certain
sections of the system will be modified with time.
Employee resistance: When a new system is introduced, some employees may resist the change
and this could be catastrophic if not handled appropriately. Some fear losing their jobs, of being
demoted or being transferred and change of their job description. Resistance can be in the following
forms:
Through strikes and demonstrations. Giving false information during system investigation. Entering
wrong and inappropriate data so that wrong results are produces, etc
User training:
Once a new system is put in place, existing employees are trained on how to operate the new
system, otherwise new employees are recruited. User training can be in the following forms:
i. On the job training: Users are trained at their organisation by hired trainers. This has the
following advantages:
Learners practice with actual equipment and the environment of the job. Learners can engage in
productive practices while on training. This is cheaper for the organisation. Enough practice is
gained on how to operate the system.
Disadvantages of on the job training
Distractions occur in a noisy office. Instructional methods are often poor. The need to keep up
output may lead to hasty teaching
ii. Classroom training: Users are send to other colleges and institutions which offer courses on the
subject matter. This could be expensive to organisations since employees take study leave while
being paid at the same time. Employees can also be trained on aspects that they will not apply when
they finish the course. The gap between what is learnt and what is needed at the job may be too
wide.
SYSTEM DOCUMENTATION
Documentation refers to the careful and disciplined recording of information on the development,
operation and maintenance of a system. Documentation is in two main types: user documentation
and technical documentation
(a) User Documentation: It is a manual that guides system users on how to load, operate,
navigate and exit a program (system). User documentation contains the following:
System/program name. Storage location. System password. Instruction on how to install the
program.
instruction on how to operate the system: loading, searching data, adding new records, deleting
unwanted records, modifying existing records, saving data, backup procedures, etc. How to quit the
program
(b) Technical Documentation: This is a manual for programmers which aid them in
modifying the system and in correcting program errors. The following are found in technical
documentation:
Algorithms of the program, Program testing procedures and test data, Sample of expected system
results, Program structure showing modules and their relationships, System flowcharts,
Programming language used, Program code, program listings, File structures.
DATA ENTRY ERRORS
Data can be entered incorrectly into the computer and this can have the following effects:
- A company can be prosecuted under the Data Protection Act if incorrect information causes a
person or organisation some loss.
- Wrong decisions can be made by managers due to wrong information given.
- Customers may be angry if they are sent wrong bills.
Types Of Errors
1. Transcription Errors: These are mistakes due to misreading or mistyping of data, e.g.,
confusing the number 5 with the letter S, 0 (zero) instead of the letter O, etc. This can also be
caused by bad handwriting.
2. Transposition Errors: These are mistakes caused by swapping 2 letters or digits, e.g.
typing ‗ot‘ instead of ‗to‘, 5721 instead of 7521. Transposition errors occur mostly when typing at
very high speeds.
(h) Check Digits: A check digit is an extra figure added to the end of an original number for error
checking purposes. It s calculated from the original number.
*NB: - Check digits are used where data entered automatically as in using barcode readers.
SYSTEMS FLOWCHARTS
A systems flowchart is a diagram used to show the flow of data in a program. It shows the overview
of the system, tasks carried out by the system, whether manual or computer, devices, output media
and files used. Common symbols for designing systems flowcharts are as follows:
*NB: Meanings of these symbols are not universal and mean a different thing to others. Some
symbols are borrowed from program flowcharts.
Below is a systems flowchart for a payroll processing
Below is a systems flowchart that is used to update a
system that uses batch processing stock master file when stock items are
ed.purchas
PAPER 2 (PROJECTS)
1. Statement of the problem: Limitations of the existing manual solution should be
considered. These must be realistic and should justify computerisation. At least six problems should
be cited. Each problem must be expanded or must be clear and should be solved using the
computer. The problem can just be listed and then briefly explained how it affects the current
solution. If the system is said to be expensive to run, pupils are supposed to give the statistics of the
costs of running the system over a given period of time. If the system is slow to serve clients or to
run, the number of minutes or hours must be specified so as to give clarity. Pupils should avoid
vague points like ―too slow, expensive to run, slow to update records, difficult to update records‖
etc. These problems must be clear, qualified, quantified and justifiable.
2. Aims and objectives: Good objectives must be cited and these must be achievable and
measurable. A list of the desired outcomes of the proposed solution is needed: what will the
proposed computer system be able to do? For instance; what should it be able to enter, what will
have to be processed, what will need to be updated (that is addition, deletions and editing of which
records), what form of reports will need printing? The objectives must link with the above stated
problems. Include at least 6 objectives.
3. Data flow in existing solution: What data items are used in the existing solution? Identify
all the data items for each file used in the system. Pupils can just give a file and the data items
found in it. For example: Client File: Client Surname, Client First Name, Client ID Number, Client
Address, Item Bought, Quantity bought, Unit price, Total Price, Date of purchase, etc.
All data items in each file must be exhausted.
4. Description of the existing Solution: A broad description of the processes that take place
in the existing system must be given. Pupils must describe how the system works, taking into
consideration the data items cited in 3 above. Explain how each file is processed and what it is used
for. At least 6 files must be described. There is no need of drawing data flow diagrams if the pupil
can describe the processes involved. Pupils can even attach system forms of the current system
being investigated and put them in appendices.
5. Evaluation of the existing solution: A good evaluation should assess both sides, the
weaknesses and the strengths, and not just one side. Pupils should give 6 advantages and more
disadvantages for the existing solution. A good evaluation should be able to qualify and quantify
the limitations and strengths. Statements like: ―it is too slow‖, ―it is expensive‖, ―it is inefficient‖
are not enough. Pupils must specify how slow is being too slow, how expensive is expensive, how
inefficient is being inefficient. For instance, they could specify the number of minutes, amount of
expensiveness in $ amount, etc, so as to clarify the point.
6. Evaluation of the alternative solution: An alternative solution is the one that can be used
to solve current problems. This could not be the current solution nor the candidate ‘s proposed
solution but other solutions. At least two solutions must be given and evaluated. Pupils are expected
to list the alternative solution, briefly describe how it will be operated before giving it weaknesses
and strengths. At least 6 advantages and more disadvantages are to be cited and clarified for each
solution.
7. Overall Plan: This is the candidate‘s plan to realise the proposed computer solution.
Normally a modular approach in a top-down structure is considered. The problem is split into
modules in a tree structure. Tables (files) or forms could be taken as the modules. Pupils are
supposed to indicate files. This can be given as shown below:
*NB: The above is just a sample and is incomplete. All files in the system must be included in the
hierarchy chart. After the hierarchy chart given above, a systems flowchart will suffice.
8. Modules: Student should identify the modules to be used in the system. And give a valid
linkage in the system. This can be obtained from the overall plan. This can be given as shown
below:
Linkages within the system must be clear. Instead of given a diagram as above, the modules can be
given as below:
Module Name: Student File Module
Module Purpose:……..
Modules Called:…….
Modules Called from: ……
9. Algorithms: Annotated flowchart and Pseudocodes are acceptable. Good algorithms should
be valid, clear, logical and plausible. Each algorithm should be clearly related to the system
requirements. An explanation of the purpose of each module should be given first before the
algorithm is written. For example:
Algorithm Name: Add New Student Record
Purpose: Responsible for accepting new student details for students who are joining the school
Algorithm:…….
At least six modules and their algorithms should be cited and explained.
10. Hardware Requirements: A list of at least 2 hardware requirements should be cited for
each of the following categories:
- Input Hardware, Processing hardware, Storage device, Output hardware
Explain the use of each device in relation to the system being designed, what it will be used for.
The listed devices should be in the scope of the project and student capability. For storage devices,
pupil could further include the storage capacity and what it will be used to store in the system.
Lastly, pupils should select the processor type appropriate and the reason why such a processor type
and speed is needed.
11. Testing for standard and extreme data: Use a table format for this. Pupils can also
include sample runs produced by the system. Avoid screen dumps but actual reports produced by
the system. Only numeric data and dates is acceptable.
12. Test for Abnormal Data: Again a table format can be used to illustrate the abnormal data
being tested. Actual data being entered in the system is considered, NOT menus and keystrokes.
Error messages produced by the system must be included in the project.
13. User Documentation: This documentation should enable a novice to start-up the
candidate‘s solution and to navigate through without further assistance. Include how to install the
program, software compatible, etc.
14. Sample runs: A lot of sample runs (reports) produced from different files must be printed
and attached. Screen dumps are not acceptable. At least 6 report generated from different files are
needed.
15. Technical Documentation: This includes program listing, algorithms, modules, data
dictionary, program comments and file structures. At least four items of the above listed should be
included.
16. Evaluation of the solution: The weaknesses and strengths of the newly designed computer
solution must be cited. At least eight strengths and six weaknesses must be given. The strengths
must be able to solve the problems cited in the earlier stages (stage 1). More advantages must be
given other than the disadvantages. 17. Opportunities for development: Possible improvements to
the system must be given and clarified. These improvements must be in the scope of the system and
the student‘s capability. Do not entertain fancy ideas that are beyond the student‘s capability.
*NB:
1.The documented project for the student must be accompanied by a working disk that is virus free.
2.Your system should have the following features:
- Should have menus
- Should be able to sort records
- Should be able to search records (queries and filters are acceptable)