Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
100% found this document useful (1 vote)
3K views

Computer Science Note For Form 1

Uploaded by

Horace Praise
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
3K views

Computer Science Note For Form 1

Uploaded by

Horace Praise
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

COMPUTER SCIENCE NOTES FOR FORM 1 && FORM II

ANNUAL PROGRAM Lesson 16 : The Keyboard


CHAPTER 8 : DOING BASIC COMPUTER
CHAPTER 1 : HARDWARE AND SOFTWARE MAINTENANCE
COMPUTING NEEDS Lesson 17 : Cleaning a computer and conserve Storage
Lesson 1 : History and evolution of computers devices
Lesson 2 : Some areas of computer application Lesson 18 : using an antivirus
CHAPTER 2: MANIPULATION OF THE COMPUTER Evaluation N°3
Lesson 3 : Computer basic components
CHAPTER 9 : USING BASIC ELEMENTS OF AN
Lesson 4 : Basic functional Diagram of a computer OPERATING SYSTEM
system
Lesson 19 : What is an OS?
Lesson 5 : Start and Quit a computer Operating Lesson 20 : Function on an OS
System
Lesson 21 : Execution process of command working
CHAPTER 3 : INITIATION TO ALGORITHMIC
THINKING Lesson 22 : Configuration of Date and clock setting
Lesson 6 : Introductive Activity; Cook recipe
Lesson 7 : Examples of Algorithms Evaluation N°4

Evaluation N°1 CHAPTER 10 : ORGANIZING DATA USING THE


COMPUTER
CHAPTER 4 : DISCOVER AND USE I/O PERIPHERALS
Lesson 24 :Open and save documents in the default
Lesson 8 : Making use of keyboard and mouse or external folder

Lesson 9: Modifying Text and Graphics Evaluation N°5

Lesson 10: Entering marks and performing calculations CHAPTER 11 : POCESSING DATA USING THE
with marks COMPUTER

CHAPTER 5 : ADOPT ATTITUDE OF CITIZENSHIP Lesson 21 : Introduction to text processing


Lesson11 : Notions of proprietary rights
Lesson 22: Typing and formatting a text
CHAPTER 6: DISCOVER THE INTERNET
Lesson 23: Inserting Objects and shapes
Lesson 12 : Introduction to the Internet
Lesson 24; Printing a Document
Lesson 13 : Navigating on the Web
REVISION: Project_ Sending an electronic mail
CHAPTER 7: RECOGNITION OF I/O PERIPHERALS
Lesson 14 : Types of printers END OF YEAR EXAMS

Evaluation N°2

Lesson 15 : The mouse

Lesson 23 : perform files and folders operations

FORM 1 NOTES 1 DORIANE FOUOLONG


CHAPTER 1 : HARDWARE AND SOFTWARE COMPUTING NEEDS
 OBJECTIVES:
- Working on basics notion of computer science
- History and evolution of Computers in timelines.
- Introduction to Computer science
- Identify some areas of computer applications
- -Enumerate types of software
- -Enumerate examples of system software
- -Enumerate examples of application software
- -Select material and software needs for specific purpose
 LIFE SITUATION:
 Mastering the history and evolution of computers
 Identifying domains of use of a computer

Lesson 1 : History and evolution of computers


INTRODUCTION
Since the dawn of history, man has always searched for efficient means to make
calculations and process information quickly and without errors. This is why the computer
was created. With the idea of developing a machine which could perform complex
calculations faster and with full accuracy, man invented the ‘computer’. Computer is
derived from the word “compute” which means “calculate” meaning that a computer is
simply a calculating machine.
1.1 DEFINITIONS
- A computer is an electronic device that can accept, store, and process data to
produce information.
It can also be defined as a machine that can take instructions and perform computations
based on those instructions.
- Computer Science is the term used to describe the study of computer technology
and information processing techniques that use computers.
- Data is a piece of raw information collected, stored, or processed without any
organization that could give it meaning. Data can be text, a number, a sound, an
image, etc. Example: 04271967 is data – a piece of information that has no
meaning by itself.
- Information is simply an assembly of data, organized in order to give the data
meaning. Example: 04/27/1967 is information that might represent the day,
month, and year of someone’s birthday.
Data and information are often used interchangeably in the field of computing.

- Processing is the act of storing, manipulating, extracting, and organizing data or


information.
Computers are characterized by their speed in processing data, the amount of
information stored, and how efficiently data is accessed and processed.
1.2 History and Evolution of Computers
people were able to find new ways to make calculations fast and automatic.

FORM 1 NOTES 2 DORIANE FOUOLONG


- At 500 Romans stones called abacus was used as calculating machine
- Blaise Pascal (1623-1662) created the « Pascaline » in 1642. This machine was not
the same as a computer, could be used for addition and subtraction. This was the
first calculating machine,.
- The first practitioner of modern computing was the Englishman Charles Babbage
(1792-1871) who introduced the idea of using punch cards (perforated cards) to
indicate the data and operations to be processed.
- The American mathematician John Von Neumann (1903-1957) identified the five
essential parts of a high-speed automatic computing machine.
- In 1945 John William Mauchly (1907-1980) and John Presper Eckert (1919-1995)
constructed a huge calculating machine called ENIAC (Electronic Numerical
Integrator and Computer). The machine contained more than 18000 vacuum
tubes, weighed 30 tons, and occupied 1500m2
- John Von Neumann later proposed the construction of EDVAC (Electronic
Discrete Variable Computer). This was the first computer to use a stored
program.
- The computer revolution would finally begin with the invention of the «
transistor » in 1948. A transistor is an active electronic component that can play
the role of an amplifier, switch, or, control for computer processes.
- UNIVAC I (Universal Automatic Computer), in 1946. UNIVAC was the first
civilian computer and was used for the first time in 1951 for the United States
Census.
- In 1964, the American firm IBM began selling the IBM-360 computer.
- During the 1980s, more advances in miniaturization reduced the size of computer
components more and more with the coming of smaller integrated circuits.
- IN 1981 , birth of the first personal computer using the pentiums I, II, III, I, 2000

1.3 Classification of Computers


Computers range from very small to very large machines with some capable of
doing millions of calculations in a single second, while others may take long periods
of time to do even the most simple calculations. Computers can be classified into five
categories, on the basis of their size and capabilities.
These categories are supercomputers, mainframe computers, minicomputers and
microcomputers.
- Microcomputers are the smallest category of computers that range in size from
servers to handheld devices. They are the type of computers meant for public
use. They are designed to be used by one person at a time. Microcomputers, also
called personal computers (PC), can be further classified into desktop computers,
laptop computers. Tablet PCs and personal digital assistants (PDAs).
- Mainframes are powerful multi-user computers capable of supporting up to
hundreds of users simultaneously. They are used by large organizations like
meteorological surveys and statistical institutes for performing bulk mathematical
computations
- Supercomputers are the fastest and most expensive type of computers. They can
perform hundreds of millions of computations per second and are employed for

FORM 1 NOTES 3 DORIANE FOUOLONG


specialized applications that require immense amounts of mathematical
calculations. Examples of supercomputers are Fujitsu K computer, IBM Blue Gene,
Cray Jaguar and NEC Earth Simulator.

1.4 Generations of Computers


A computer generation is an era or period in the history of computers in which the
computer was characterized by a major technological development that
fundamentally changed the way computers operate. : resulting in increasingly
smaller, cheaper, more powerful and more efficient and reliable devices.
- First Generation (1945-1955)
First generation computers were made using vacuum tubes. A vacuum tube was
a fragile glass device that could control and amplify electronic signals. These
computers were very large taking up entire rooms, very expensive to operate.
Some examples of first generation computers are ENIAC (Electronic Numerical
Integrator And Calculator), EDSAC (Electronic Delay Storage Automatic
Calculator) and UNIVAC I (Universal Automatic Computer I).
- Second Generation (1955-1965)
Transistors replaced vacuum tubes and ushered in the second generation of
computers. The transistor was far superior to the vacuum tube, allowing
computers to become smaller, faster, cheaper, more energy-efficient and more
reliable than their first-generation predecessors. Second-generation computers
still relied on punched cards for input and printouts for output.
- Third Generation (1956-1980)
Third generation computers were designed with the use of integrated circuits
(ICs). Integrated circuits made it possible to embed a large number of transistors
into very small surface area of silicon known as chip. Instead of punched cards
and printouts. Computers for the first time became accessible to a mass audience
because they were smaller and cheaper than their predecessors.
- Fourth Generation
The microprocessor brought the fourth generation of computers, as thousands of
integrated circuits were built onto a single silicon chip. Fourth generation
computers also saw the development of GUIs, the mouse and handheld devices.
What in the first generation filled an entire room could now fit in the palm of
the hand.
- Fifth Generation (1980 - present)
Fifth generation computing devices are based on artificial intelligence. Artificial
intelligence will give computers thinking power and capability to make decisions
like human beings. They are still in development though there are some
applications, such as voice recognition, that are being used today.

Lesson 2 : Some areas of computer application


2.1 INTRODUCTION
Computers are fast becoming our way of life and one cannot imagine life without
computers in today’s world. Their importance can be attributed to the fact that almost

FORM 1 NOTES 4 DORIANE FOUOLONG


every sphere of our life is affected. We find their applications particularly in fields where
computations are required to be done at a very fast speed and where data is so
complicated that the human brain finds it difficult to cope up with.

2.2 Uses for Computers

2.2.1 In Schools

We can use computers in our schools to calculate the averages of students, type exams,
sort lists of students in order of merit or in alphabetical order, type administrative
documents, send and receive messages through the Internet, and do research for classes using
the Internet.

2.2.2 In Business

The management of stores, other businesses, banks, money transfers, the payment of
salaries, and record keeping can all be done using computers.

2.2.3 In Industry

In industry, computers are used as manufacturing tools to control the production of


industrial goods. Thus, they are used to help make such ordinary things as school books and
note paper.

2.2.4 In Medicine

Computers are also used to help make medical diagnoses, give long distance medical
assistance, and assist in surgical procedures.

2.2.5 In Communications

In the field of telecommunications, computers are used to exchange data across


telephone networks or with satellites and to manage telephone communications.

2.2.6 In Offices

Office applications, such as word processors and spreadsheets, are the most widespread
uses of computers. It is difficult to find a single neighbourhood in most towns without seeing
someone in the middle of typing or printing documents using a computer.

2.2.7 In Scientific Research

Scientists use computers to perform complicated calculations, store and process data,
and resolve complex problems.

FORM 1 NOTES 5 DORIANE FOUOLONG


2.2.8 In the Military

Computers are used by many militaries to perform such functions as encoding and decoding
messages, designing weapons, managing communications, guiding drones (pilot less
airplanes), and aiming missiles.
2.2.9. Robotics
Robotics is the branch of technology that deals with the design, construction, operation and
application of robots. A robot is a machine that is designed to repeatedly do what humans
can do with speed and precision.
2.2.10 Advertising
Artists use the Internet to advertise new CD releases, tour dates, merchandise, and bonus
tracks. Samples of new songs are released to entice the listener to buy the album.

CHAPTER2: MANIPULATION OF THE COMPUTER


 OBJECTIVES:
- Reproduce the basic functional diagram of a computer system
- Classify basic devices as Input and Output peripherals
- Sketch the principal parts of a central Processing Unit
- Packaging and carrying computer materials
- Using magnetic, optical and wireless devices
- Conserving computer materials
- Connecting computer devices
- Start and Quit your computer operating system (system software)
- Open, Close, and Exit your computer programs or applications
- State the main steps for given software to become functional on screen.
- Move conveniently your cursor and the mouse pointer
- Select and move objects with your mouse,

 DOMAIN LIFE SITUATION:


- Basic notion of computer maintenance
- Using the computer tool (use of didactic software)
- Using an appropriate peripheral
- Using a didactic software package

Lesson 3 : Computer basic components

INTRODUCTION
For a computer to work, we need a power supply, a central processing unit, and input
and output devices. A computer is a fragile device made of many small and delicate
components, such as integrated circuits. To protect a computer, we can:
Connect it with an uninterruptible power source (UPS) that will regulate and maintain
electrical power in the event of power outages;
Use a surge protector that can protect it and other computers in the lab or office from
lightning;

FORM 1 NOTES 6 DORIANE FOUOLONG


Place a voltage regulator in the computer lab that will suppress surges in electrical
voltage;
Avoid bringing any liquids into the computer lab. Spilling liquids onto a keyboard or
other parts of the computer can quickly damage the machine;
Avoid letting dust build up in the computer lab as much as possible. Dust can get inside
computers and damage their internal parts;

3.1 COMPUTER COMPONENTS


Computers are composed of a central unit or system unit that is connected to
other peripherals called devices. The central or the system unit is also by itself called « the
computer » and serves as the « brain » of the system.
- the peripherals are used to enter data (input devices) or to view data (output
devices),
- it is the microprocessor, also called the central processing unit (CPU) of the system
unit that processes information and performs all calculations into the computer.

The system unit: it a case(often called chassis) that contains electronic


components that the computer uses to process and store data, There are 02 types of system
units according to the shapes: the tower with is horizontally represented and the Desktop
System unit which is vertical, The system unit consist of the motherboard or the circuit
board, power supply unit, storage and processing devices, communication ports, cables,
computer fan, CMOS, Disks, memories ,etc.,,
The motherboard, also called the system board is the main circuit board in a
computer to which many electronic devices are attached, Examples of electronic devices
attached to the motherboard are: the microprocessor, memory modules, BIOS chip,
expansion slots, etc.
The system unit contains:
a microprocessor, also called a central processing unit (CPU); which
contains the ALU (Arithmetic and Logic Unit) used to perform calculations and every
arithmetic and logical operations (addition, subtraction, multiplication, division)
A motherboard which represents the main component of the central unit
to which every others components are connected and permit communication between
them.
Communications ports to connect peripherals to computer;
Communication Ports are built into the motherboard
Memories which are used to hold data instruction or result temporarily or
permanently: we distinguish
- The RAM (Random Access Memory) also called main memory is the temporary
storage space into which a computer loads programs and user data when it is
running. It is volatile because its contents are lost when the computer is turned
off.
- The ROM (Read Only Memory) which does not lose its data when computer is
turned off. It is non -volatile
Extension slots. As its name indicates, an expansion slot allows us to
augment the capabilities of the computer with extra components.

FORM 1 NOTES 7 DORIANE FOUOLONG


- The Power Supply: The power supply is the part of the system that supplies other
components with energy.
Mass storage devices (CD( ) or DVD( ) drives, CD burners (CD-R or CD-
RW drives) hard drives, floppy disk drives, etc.);

hard drive floppy disk

A computer can be represented into two mains parts: the software and the hardware.
- Hardware includes all of the components of a computer that we can physically
touch.
- Software is a group of programs or instructions that tell the computer how to
perform specific tasks.

3.2 THE HARDWARE

THE HARDWARE is the physical part of computer which are assembled together to build the computer
system. IT includes the cpu and the devices.

- The CPU contains the ALU which represents the brain of the computer.
- A device is a hardware part which allows users to communicate with computer.
We distinguish the following types of devices:

FORM 1 NOTES 8 DORIANE FOUOLONG


 Input devices: units that allows users to introduce data into a computer for analysis or storage.
Some examples are keyboard, mouse, joystick, light pen, touchpad, trackball, CD-ROM drives,
microphone, webcam, scanner, etc…
 Output devices: Units that are used to show or to display the result of processing. Examples
are: the monitor screen, VDU (Visual Display Unit), the printer, the speakers, video
projectors ….
 The storage or input/output devices: peripherals that can be both used as input or output
devices. Examples are Floppy drives, hard disk, CD-writer (CD-R; CD-R/W), Magnetic tape drive,
USB (Universal Serial Bus) key or removable disk, memory card, etc…..
Computer storage architecture are classified into 2 major levels such as
- Primary storage directly accessible to the CPU. It holds programs and data that the CPU is
currently working with. Primary storage is also called internal memory e.g.(RAM);
- Secondary storage: computer components that hold programs and data for use in the
computer e.g. (ROM; HARD DISK) ;

3.3 The Software


The Software is a collection of computer programs that performs different tasks on a
computer system.
A program is a set of instructions given to a computer system in order to solve a particular
problem or accomplish a specific task.
Hardware is the heart of computer while Software is the soul.
Software can be divided into following general types:
• System software or operating systems OS: kind of software that controls and manage
computer resources (hardware and operations) so that the computer user and applications
can smoothly interact. They help the computer carry out its basic operating tasks. Some
examples of OS are: Windows, Linux, or the Mac OS)

 Utilities: additional programs that ensure maintenance and the proper functioning of the
computer resources (such as Disk defragmenters, PCtools, Norton, and Avast).
Utility software is used to enhance the operating system, or in some other way
improve the usefulness of the system. They help analyse, configure, optimize and m
Disk defragmenters detect computer files whose contents are broken across
several locations on a disk, and move the fragments to one location to increase
efficiency.
Disk cleaners find and delete files that are unnecessary to computer operation,
or take up considerable amounts of space. They help users decide what to delete when
their hard disk is full.
Backup utilities make copies of all information stored on a disk, and restore
either the entire disk (e.g. in an event of disk failure) or selected files (e.g. in an event
of accidental deletion).
Disk compression utilities reduce the space that a file takes up on disk,
increasing the capacity of the disk.

FORM 1 NOTES 9 DORIANE FOUOLONG


File managers provide a convenient method of performing routine data
management tasks, such as deleting, renaming, moving, copying, merging, generating
and modifying files.
Disk partition utilities divide an individual drive into multiple logical drives,
each with its own file system which can be mounted by the operating system and
treated as an individual drive.
Disk formatters
Virus checkers prevent, detect, and remove malware, .maintain the computer.

• Application software: program or group of programs written to accomplish a specific


set of tasks. word processing (Word), spreadsheets (Excel), publishing software (Publisher,
Corell Draw, Power Point, Adobe Acrobat), relational database programs (Access),
programming languages (Turbo pascal, Fortran, Matlab, Java, Javascript…), drawing and
design software (Paint, Autocad), games (Solitaire), entertainment software (Windows
Media Player), Internet software (Internet Explorer, Mozilla Firefox, Netscape,
Dreamweaver), and educational or reference software (Microsoft Encarta, Power Translator,
Isis Proteus, Crococlip, Tell Me More).

 Device Driver
A device driver is software that allows interaction between the operating system and
a hardware device. It is an interface for communicating with the device through the
specific computer bus that the hardware is connected to. Without an appropriate
device driver the system cannot communicate with a device, rendering the device
useless. Installation of device drivers usually happens automatically when hardware is
connected (plug n play), or from a CD provided with the device. Sometimes a device
driver needs to be updated to stay functional.
3.4 THE BIOS: Basic Input Output System
Basic input output system (BIOS) is software that contains hundreds of programs that allow for
communication between the CPU and devices. It is stored on ROM, which is a permanent chip on
the motherboard.
There are three kinds of BIOS for hardware devices:
 Permanent never changing BIOS for never changing hardware like the keyboard
 BIOS for hardware that changes occasionally. It requires extra volatile information so
it is stored on a separate chip called CMOS (Complementary Metal Oxide Semiconductor).

Lesson 4 : Basic functional Diagram of a computer system


INTRODUCTION

To buy a computer, we must first know what it will be used for. The criteria people often
look for when deciding whether or not to buy a computer can include:

FORM 1 NOTES 10 DORIANE FOUOLONG


 a processor with a high frequency (speed);
 a large amount of RAM;
 a hard drive with a high storage capacity;
 a sound card, or, sound port on the motherboard;
 a CD burner (for creating CDs); a floppy disk drive;
 a network card or network port on the motherboard;
 a fast CD-ROM drive(Compact Disk Read Only Memory).
4.1 Functions of a Computer

Using both hardware and software together, a computer can:


Perform mathematical operations, such as addition, subtraction, multiplication, and
division;
Create images and graphical representations;
Allow communications;
Manipulate alphanumeric data (letters and numbers);
Store information;
Perform many other functions.

Computers function using binary data. Binary data is data that is composed of a series of the
numbers 1 and 0. All information stored or processed in a computer is ultimately reduced to a
series of 0s and 1s in different combinations. A bit is one instance of either the number 0 or 1 in
a group of binary data. A byte is a group of 8 bits linked together. A kilobyte (kb) of data
corresponds to 1024 bytes. A Megabyte (Mb) corresponds to 1024 kilobytes, and a Gigabyte
(Gb) corresponds to 1024 Megabytes( ).

4.2 The BLOCK DIAGRAM of a Computer


It is a diagram showing the processing steps of the information from the input to the
Output of a computer
The functional design of a computer is illustrated by the following diagram:

Data are going into a computer through input devices. After being processed by the CPU, The
result of processing is sending out through Output devices and stored into storage devices.

Lesson 5 : Start and Quit a computer Operating System

5.1) Communication ports

FORM 1 NOTES 11 DORIANE FOUOLONG


Ports are sockets or slots on the back front or side of the system unit into which devices are
connected, we often used:
- PS/2 port to connect keyboard and mouse,
- Ethernet port for network
- Serial port for dial-up modem
- LPT 1 printer port for printer
- Speakers port
- Line in port
- Microphone port
- Game or joystick port
- VGA (Video Graphics Adapter) port for connecting the monitor
- RJ45 port for connection to an Ethernet network
- RJ14 for connection to the Internet via phone line
- USB port for connecting USB drives devices like Flash drives, printers, keyboards and mouse
- Serial ports for connecting serial devices like PDAs
- Parallel port connecting parallel devices like printers
- Fire wire is high performance serial bus, for connecting devices to your personal computer
5.2) Starting a computer
To start a computer, process as follow:
- Check if all the components are well- connected to each others.
- Press the power button on the CPU
- Press the power button on the monitor
- Then wait to let the BIOS Be loaded and your computer’s operating system will start.

5.3) Shutting down or Quit a computer operating system


To turn off a computer, we do not unplug the machine or press the power button again. To properly
turn off a computer that uses Windows,
- click the «Start» menu on the screen and then the button «Turn Off the Computer». After
clicking on the button with the mouse, the following screen will appear:
- • To turn off the computer, click on «Stop» or shut down or turn off.
- • The computer can also be put in «Stand By» mode by clicking on the «Stand By»
button. Putting a computer in stand by mode does not completely turn off the computer. It
only turns off certain components in order to save power.
- • Finally, we can restart the computer by clicking on «Restart». This will shut down the
computer and immediately restart it automatically.

FORM 1 NOTES 12 DORIANE FOUOLONG


- Warm booting : Restarting a computer when it is already On.
- Cold booting: Starting a computer which is off

NB : When one buys a computer, for example, one should know the references of the BIOS (Basic Input
Output System), verify the CMOS (Complementary Metal Oxide Semiconductor) properties.

The BIOS contains the programs and drivers that allow the computer to boot up. Its role is to
verify the presence of the principle components of the computer (keyboard, mouse, hard disk…) and
store the information of the computer’s configuration in the CMOS memory.

CHAPTER 3 : INITIATION TO ALGORITHMIC THINKING

 Objectives:
- Writing basic solution procedure to problems
- Ordering solution steps

Lesson 6 : Introductive Activity; Cook recipe

INTRODUCTION

Algorithm is a part of our daily life. We accomplish any task by following an algorithm. For example making a
cake, Computing rectangle surface.

Computer science is based in programs or applications whose execution can be summarized as: problem posed
– analysis – algorithm – program – compilation – execution.

An Algorithm is a well-defined step by steps instructions specifying how to complete a task.

6.1 DEFINITION

An algorithm is a well-defined set of step-by-step instructions for solving a problem in a finite amount of time.
A set of instructions is not an algorithm if there is no definite stopping place, or if the instructions are too vague
to be followed clearly. An algorithm cannot be directly executed by a computer, but it has to be translated into
a program using a programming language.

6.2 CHARACTERISTICS OF A GOOD ALGORITHM

A good algorithm:

FORM 1 NOTES 13 DORIANE FOUOLONG


- should be explicit (i.e. clear and obvious)

- should be precise (i.e. exact and accurate)

- should be unambiguous (i.e. no doubts about what to do/ only one way of interpreting the instructions)

- should be effective (i.e. produce good results)

- should be finite (i.e. have a definite stopping place)

6.3 INTRODUCE ACTIVITY: COOK RECIPE

1. PROBLEM TO SOLVE OR TASK TO PERFORM: state the step by step instructions to follow in order to obtain
at the end the pineapple juice. Specify the input elements, the result or the output of your algorithm.

2. SOLUTION

- This define the problem to solve: how to make pineapple juice

- The definite stopping point: when the juice is done

- The above activity is an algorithm to prepare a pineapple juice.

- Pineapple juice is the output

- The ingredients constitute the Input

- The cooking steps represents the instructions steps.

RECIPE PINEAPPLE JUICE (Output)


INGREDIENTS - 1 lemon
(inputs) - 1 orange
- 1 pineapple
- 1 litter of water
- 3 eating spoon of sugar
- 1 eating spoon of grated ginger
COOKING - Wash lemon and orange
(set of instructions) - Cut them into small pieces and put them to the fridge
- Peel the pineapple and cut them into small pieces
- Mix the pieces of lemon, orange, pineapple, water, grated
ginger;
- Grind them
- Sleeve it to extract the juice
- Then put the juice into the fridge

EXERCISE: write and algorithm to make a cup of tea

Solution:

Algorithm Making _ a_cup_ of_ tea

Inputs: Sugar, water, ovaltin, milk, fire

Set of instructions:

1- Prepare the Fire

FORM 1 NOTES 14 DORIANE FOUOLONG


2- Put the pot on the fire
3- Boil water
4- Put the milk, Ovaltin, sugar inside the tea cup
5- Add the boil water to it
6- Stir to make sure that it is uniform
7- Test the tea if it is not OK perform step 4 Else

END Drink your tea

Lesson 7 : Examples of Algorithms

7.1 Structure of an Algorithm

To write an algorithm, you have to specify:

- The name of the algorithm which has to be clear and explicit. It should clearly present the problem
to be solve.
- The inputs that represents data we need to solve the problem.
- The set of instructions : that explains how to solve the problem
- The Output: That represents the final result we should obtain.

7.2 Example of algorithm: Calculating the surface of a rectangle

PROBLEM: Write an algorithm that calculate the surface of a rectangle

SOLUTION:

Algorithm : Surface_of_a_Rectangle;

INPUTS: Width: W;

Height: H;

SET OF INSTRUCTIONS:

1. PROMPT USER TO ENTER WIDTH AND HEIGHT


2. READ THE WIDTH AS W AND THE HEIGHT AS H
3. COMPUTE THE SURFACE BY MULTIPLYING THE HEIGHT H BY THE WIDTH W
4. STORE THE RESULT AS S=H×W

END PRINT THE SURFACE S

Exercise: Write an algorithm to calculate the surface of a square.

CHAPTER 4 : DISCOVER AND USE I/O PERIPHERALS

 Objectives:
- Describe the basic parts of keyboard, mouse, printer, and screen,
- Use productivity software in the discovery of Input and Output peripherals,

FORM 1 NOTES 15 DORIANE FOUOLONG


--Enter marks and perform calculations with marks,
- Transcribe a list,
--Modify texts and graphics (insert, delete, search and replace,…)
 Domain life situation:
- Using a didactic Software package
- Transcription of a list
- Designing Greeting card.

Lesson 8 : Making use of keyboard and mouse

INTRODUCTION
People control computers using input devices such as the keyboard and mouse… Input devices send
information to the central processing unit. There are many input devices: keyboard, mouse, joystick,
drawing tablet, scanner, microphone, digital camera …

8.1 The Keyboard


The keyboard is an input device that allows the user to send information to the computer. There are several
types of keyboards. The best known are: AZERTY (French language keyboard) and QWERTY (English
language keyboard).
When the buttons on the keyboard are pressed by the user’s fingers, they send electrical signals to the
processor through the operating system.
The keys on the keyboard include letters, numbers, and symbols and are divided into several groups (or,
keypads): the function keys, the numeric keypad, the alphanumeric keypad, and the cursor keys.

1. The Alphanumeric Keypad


The alphanumeric keypad is used to type letters, numbers, and symbols.
The « Tab » or « Tabulation » key adds a space at the beginning of each paragraph typed.

FORM 1 NOTES 16 DORIANE FOUOLONG


The « Caps Lock » key allows us to type blocks of capital letters. A light on the keyboard is turned on when
this key is pushed.
The « Shift » key allows us to write a single capital letter, or, the second character on a key with two
characters (the second character is normally located above the main character for the key).
The « Control » key allows us to quickly carry out special or alternative commands for some computer
programs. (For example: selecting multiple files in Windows Explorer.)
The « Alt » button is also used for alternative functions in some programs.
The « space bar » produces a space between letters when pressed.
The « Enter » key allows us to start a new line in a text document, or, to accept a choice or execute certain
functions in some computer programs.
The « Backspace » key allows us to move the cursor backwards in a document and erase the letter to the
left of the cursor

2- The Function Keys:


The functions keys are used as shortcut for special commands in some programs. The role of each function
key is different depending on the software being used.

3- The Numeric Keypad:


The numeric keypad allows us to quickly type numbers when the «Num Lock » key has been pressed.

4- The Cursor Keys:


The cursor keys (arrow keys) allow us to move the cursor within a document to the left, to the right, up,
or down. Arrow keys are also found on the numeric keypad and can be used in the same way when the
« Num lock » key has not been pressed.

FORM 1 NOTES 17 DORIANE FOUOLONG


8.2 THE MOUSE
A mouse is a handheld device which is moved across a flat surface to control the movement of a pointer on a computer
screen. The mouse has two buttons, the right and the left buttons, which are clicked (pressed)to enter commands into
the computer.
Different actions that can be performed with a mouse are:
 Click: Pressing the left mouse button.
 Right-click: pressing the right mouse button
 Double-click: pressing the left button two times in quick succession
 Drag: pressing the left button and while holding, moving the mouse
 Drop: Releasing the left button after dragging

Drag and drop can be used to move files or documents from one place to another.
A mouse connects to a computer through PS/2 cable (PS/2 mouse), USB cable (USB mouse), or wireless (optical mouse).

8.3 THE MONITOR SCREEN

The monitor’s principal role is to display data on its screen. We can distinguish between two types of
monitors: the cathode ray tube, and liquid crystal display.

FORM 1 NOTES 18 DORIANE FOUOLONG


Liquid crystal display the cathode ray tube

Lesson 9 & 10: Modifying Text and Graphics && Entering marks and performing calculations with marks

9.1 The Windows Desktop

When Windows is started, the computer displays the «Windows Desktop». As its name indicates, the desktop
is a space on the screen where the user can work. It is comparable to a physical desktop: a space or surface
where we can arrange books, papers, etc. The desktop is built around several key concepts: the taskbar, the
start button, and the icons.

Taskbar
Start Button

Icon

FORM 1 NOTES 19 DORIANE FOUOLONG


- The taskbar is the part of the desktop which displays the software applications that are
currently open (in use), an icon for volume (sound), the date and time, the start button, and
other information.
- The star button: Also called the «Start Menu», clicking here displays a number of menus and
options (All Programs, a list of software recently used, Search, Run, My Computer, Control
Panel, Printers and Faxes, Log Off, Turn Off Computer, etc.).
- The icons: These are small images that generally represent software, a file, or a folder. Double-
clicking on an icon will start the program or open the file or folder it represents. We can also
do this by single-clicking on the icon and then hitting the Enter button on the keyboard.

9.2 STARTING A PROGRAM

 Click on the « Start » menu button

 Slide the mouse pointer over « All Programs »

 Slide the pointer horizontally over the icon for the program and single-click on the icon with
the mouse, or, if the icon is not listed in « All Programs », find the folder in the list that
contains the icon (for example, programs in the Microsoft Office suite of applications such as
Microsoft Word or Microsoft Excel are often found in a folder called « Microsoft Office »),

FORM 1 NOTES 20 DORIANE FOUOLONG


move the pointer over the folder and click on the icon in the list of icons that appears within
the folder

 Finally, we can find the icon for a program or document using any of the means listed above,
and then:

 Right-click on the icon for the program or document with the mouse

Click on the option « Open » in the menu that appears.

PRACTICALS EXERCISES:

- Open Microsoft Office Word and type any text of your choice. Example a greeting card
- Open pain application and draw any graphic of your choice. Modify it , delete it , save it
- Open the calculator, then enter marks and effectuate multiplication, addition and subtraction.

CHAPTER 5 : ADOPT ATTITUDE OF CITIZENSHIP

 Objectives:

- Verify the correctness of typed data


- Check the validity of outcomes from processing
- Support with examples your findings ;
- Recognize and support intellectual proprietary rights ;
- Outline some elements of digital citizenship

 Domain life situation:


- Computer safety
- Notion of Proprietary Rights , License, Legacy and Authors’ Rights

Lesson 11 : Notions of proprietary rights


11. 1 Computer Ethics
Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices that
guide their own behaviour. Ethical principles place a value on human acts according to whether they are good or bad.
Computer ethics refers to standards of good conduct applied within the use of computers. It defines principles for judging
computing acts whether they are good or bad.
A computer crime is any illegal act that involves the computer either as the target of the crime or as a tool used in
committing the crime
Computer system security is the process of preventing and detecting the unauthorized use of computer systems.

11.2 Fundamental Principles of Computer Ethics and computer crime

The fundamental principles of computer ethics formulated by the Computer Ethics Institute (CEI) as the“ten
commandments” of computer ethics are:
1. Thou shall not use a computer to harm other people.
2. Thou shall not interfere with other people’s computer work.
3. Thou shall not snoop around in other people’s files.
4. Thou shall not use a computer to steal.
5. Thou shall not use a computer to bear false witness.
6. Thou shall not copy or use proprietary software for which you have not paid.
7. Thou shall not use other people’s computer resources without authorization or proper compensation.

FORM 1 NOTES 21 DORIANE FOUOLONG


FORM 1 NOTES 22 DORIANE FOUOLONG
11.3 Legislation, Copyright, Design and Patent Act
 Legislation is the act of making and passing laws.
Some laws that govern the use of computers area : the Data Protection Act, the Computer Misuse Act, the Copyright,
Design and Patent Act, and the Health and Safety Act.

 Copyright, Design and Patent Act : Act designed to protect all types of intellectual property and
ensure that authors or creators of a piece of work receive both credit and compensation.

 Copyright is a statutory grant that protects original work. Something that is copyrighted is not
to be reproduced, published or copied without permission from the copyright holder. Ideas
are not protected by copyright; only the specific presentation of the idea is copyrightable.

 Design is the appearance or construction of something. A design is not immediately protected.


It must be registered with the appropriate institution,

 A Patent is a grant to inventors that give them exclusive monopoly over their invention. It gives
them the right to stop others from producing, selling or using their invention. Unlike
copyrights, patents protect the ideas or design of the invention rather than any tangible form
of the invention.
11.4 Software Distribution Licenses
Software are distributed under different licenses. They include public domain, freeware, shareware, open source and
all rights reserved.
 Public Domain
Public domain software has no owner and is not protected by copyright law. It was either created with public funds or
the ownership was forfeited by the creator. Public domain software can be copied, sold and/or modified. It is often of
poor quality.

 Shareware
Shareware is copyrighted software that allows you to use it for a trial period but you must pay a registration fee to the
owner for permanent use. Purchasing the right to use the software may also get you a version with more powerful
features and published documentation.
 Freeware
Freeware is copyrighted software that is licensed to be copied and distributed without charge. Freeware is free but it
is still under the owner’s control. Examples are Eudora and Netscape.
 Commercial Software
All rights reserved software is software that must be used by the purchaser according to the exact details spelt out in
the license agreement.
 Open Source Software
Open source software is software whose source code is published so that a variety of people can add contribution.
Examples are Linux OS, MySQL, Mozilla and OpenOffice.
11.5 Measures to Combat Computer Crimes
The following measures can be used to combat computer crimes:
 Install strong doors and locks to computer rooms to prevent computer equipment theft.
 Use access control mechanisms that will ensure confidentiality, integrity and availability.
 Encrypt confidential data stored in computers or transmitted over communication networks.
- Use passwords and login to secure your data. A password is a group of alphabetic or alphanumeric characters
that must be typed in order to allow the computer to open a file or folder.
 Install antivirus software and update it regularly
 Install intrusion detection systems to help detect any unauthorized access to the system.
Install firewalls to prevent unauthorized access to local networks

CHAPTER 6: DISCOVER THE INTERNET

 Objectives:

FORM 1 NOTES 23 DORIANE FOUOLONG


-Start a navigator (Web and Ordinary Browsers)
- Start and Access a search engine
-Start a web page
- Navigate on the web

 Domain life situation:

- Discovering and navigating the Internet


- Chatting and writing short messages

Lesson 12 : Introduction to the Internet


INTRODUCTION
The Internet can be defined as a worldwide/global system of interconnected computer networks.
The term INTERNET is the short form of Inter-connecting Network. It is the network of networks in
which users can view information on the World Wide Web, exchange electronic mail, participate in
electronic discussion forums (newsgroups), send files from any computer to any other and even use
each other’s computers directly if they have appropriate passwords. Another name for the Internet
is information superhighway.
Definition: internet can be also defined as a giant network that result from the interconnection of
millions of computers and reliable equipment all over the world.
12.1 Uses of the Internet
The Internet is often compared to a giant library. This is not really an accurate description
because the information found on the internet is not classified or organized under a single system
and there is no head librarian deciding how to arrange all of this information.
The internet allows us to:
 Faster Communication: send electronic messages from our computer to other
computers around the globe
 Video-Conferencing: participate in organized forums or discussion groups
 Chatting: have on line discussions between people in real time
 Entertainment: Online games, Online movies and songs
 Information domain: read and write web pages
 Sharing resources: transfer files (such as text documents, images, sounds) between
computers around the world
 Educational purposes: do research on the Internet
 E-Commerce: make purchases on line
 E-Learning: publish or read information from government agencies, non-governmental
organizations, scientific journals, etc.

FORM 1 NOTES 24 DORIANE FOUOLONG


12.2 DISADANTAGES OF THE INTERNET
Like all things made by humans, the Internet also has many inconveniences and dangers:
 The information one finds on the Internet is not always correct. Anyone can publish
information on the Web. Because of this, it is easy to find false and unreliable
information on the Internet. Make sure you are using reliable web sites.
 Information on the internet is very disorganized and often difficult to find. Happily,
web sites called « search engines » exist that can help us do research. A « search engine
» is a site where we can enter subjects (such as names, places, or events) and that will
search for web sites regarding those subjects on the west (for example: Google).
 Information on the internet is not always as definitive or as accurate as that found in
books. Also, many web sites are not updated regularly and contain a lot of outdated
information.
 The Web makes it easy to spread « computer viruses ». A computer virus is a program
written by someone who wants to cause harm and that somehow damages or disrupts
a computer’s operations.
 Spamming: denotes distribution of bad messages in large numbers.
 Theft of personal details: hacker may steal information like credit card number,
password
 Scamming: To pretend to offer a service on the web that does not effectively exit.

Lesson 13: Navigating on the Web


13. 1 Some Vocabulary and Definitions
o A web browser is computer program that can connect to a web server and retrieve
information and render web pages. A web browser is used to access and “browse” the
internet.
Examples : Internet Explorer, Netscape, Mozilla Firefox, Safari…
o A web page is a single document that is suitable for the WWW and the web browser,
typically written in HTML
o A web site is a group of related and linked web pages under the same domain or
subdomain. Examples : google.com, yahoo.com
o A url (uniform resource locator) identifies the address and type of internet resource to
which your computer is connecting.
Example: http://www.google.com.
o A hyperlink (or link) is a direct, click-able connection to additional information either
within a web document or to another document. Hyperlinks are usually highlighted
and/or underlined within a web page to differentiate them from normal text.
o Bookmarks/Favourites are a list of websites that you frequently visit or want to access
again later.
o History is a list of websites which the web browser has recently visited.
o

FORM 1 NOTES 25 DORIANE FOUOLONG


13.2 ISP and Internet Access
An Internet service provider (ISP), (also sometimes referred to as an Internet access provider
(IAP)), is a company that offers Internet access to individuals and organizations in returns of
money.
ISPs may provide Internet e-mail accounts to users which allow them to communicate with one
another by sending and receiving electronic messages through their ISP’s servers.. Different
methods exist for connection to the Internet.
Some examples of ISP in Cameroon are : CAMTEL, MTN, ORANGE, NEXTEL, RINGO,
YOMEE .
NB : By using a phone, we only need a SIM card to connect to internet ecause its already have
an integrated modem .

13.3 How to connect to internet


To access the internet, you need :
- A modem or an internet key
- A SIM card
- A computer or a telephone line
- An Internet Service Provider : ISP
A modem (Modulator- Demodulator) is a unit that converts digital data from a local computer
into an analog signal to be send over a telephone line.

13.4 INTERNET SERVICES


IT denotes any activity that can e done on the web. Some of them are :
- The WWW : World Wide Web.
The World Wide Web (WWW) is a system on the Internet which allows documents to be
connected to other documents by hypertext links, enabling the user to search for information by
moving from one document to another. It consists of a large number of web servers that host
websites. A website consists of a number of web pages connected by hypertext links. A web page
is a text file that contains information stored using a structured language called HTML (Hypertext
Markup Language).
A website can be accessed by typing its address or URL (Uniform/Universal Resource
Locator) into the address bar of a web browser. An example of a URL is
http://www.crtv.cmwhere *
http is the protocol used
and www.crtv.cm, the domain name (address) of the site.

Example 1: http://www.bgsmolyko.edu/Ls3,4/ict796/intenet.pdf
http is the protocol used (hypertext transfer protocol)
www.bgsmolyko.edu is the domain name (the machine at BGS Molyko that hosts the
website)
Ls3,4/ict796/internet.pdf is the path of the document (resource) on the host computer.
Ls3,4 is the folder, ict796 is the subfolder and internet.pdf is the file(resource).

Example 2: www.minsup.gov.cm
gov is the top level domain which specifies that the URL is for a government institution.
cm specifies the country in which the URL is hosted or the country in which the
institution is found.
FORM 1 NOTES 26 DORIANE FOUOLONG
- The E-mail : to receive and send messages.
Electronic mail or e-mail (email) is a means of sending messages, text, and computer files
between computers via the Internet. To send and receive e-mails, you need an Internet connection
and an e-mail account which can be created within a webmail service such as Yahoo, Hotmail or
Gmail. When you create an e-mail account, you are given a unique email address that gives you
access to your mail box. An email address is made up of two parts separated by the symbol @
pronounced “at”. For example bgsmolyko@yahoo.com.
In the above address,
bgsmolyko is the user ID, user name or login
yahoo.com is the domain name. The domain specifies the mail server (computer) on
which the mail box is located.

- Search tools to do research


A search engine is a computer program that searches for specific words on the World Wide Web
and returns a list of documents in which they were found. Examples of search engines include
Google and yahoo.
- Social network which is the way for searching and sharing information pictures and videos on
internet . Some examples are : twitter, facebook, Google, Whatsapp
(Social networking sites are websites that allow user to build personalized communities to
socialize with. Common features include a customizable profile, the ability to add other users
as friends, the ease of sharing pictures, music, text, and links, and built-in chat and mail features.
Examples of social networking sites are Facebook, Twitter and Instagram).

13.5 NAVIGATING ON THE WEB


A web browser always first opens the default home page. To visit another website, we must enter
the web address (URL) of that website into the address bar. To do this, click in the address bar, delete
the current address, and type the url of the website to visit, and press Enter/Return to validate.
By opening Mozilla Firefox, we have the following:

The most important parts of a web browser are:


o 1. back button: allows you to go back to the previous web page visited
o 2. forward button: after using the back button, the forward button allows you to return forward
to a web page

FORM 1 NOTES 27 DORIANE FOUOLONG


3. refresh button: reloads a web page

o 4. . stop button: stops the loading of a web page


o 5. address bar: where you enter the web address (url) of the website you want to visit

13 .6 SEARCH ENGINE AND THE PRINCIPLES OF RESEARCH


A search engine is a program, accessed through the web that searches web documents for
specified keywords and returns a list of relevant documents in which those key words are found.
Not all search engines organize and present their search results in the same manner, so the
results may vary from one search engine to another.

To conduct a web search, we must first open a web browser and type the URL (web
address) of the search engine, such as www.google.com into the address bar and press return/enter on
the keyboard (*note: in a bilingual country such as Cameroon, you must verify the language in which
you are searching).
The welcome page of google looks like the following:

To conduct an effective web search, it is necessary to first, define the keywords for the search.
“Key words” are the words necessary that allow a search engine to effectively find relevant
documents on the internet.
For example, if an instructor asks a student to research the independence of Cameroon, an
example of bad, ineffective keywords would be “I want to research the independence of Cameroon.”
In this example there are words that do not serve any purpose such as “I” and “to” and “the.” A more
effective request would be simply “independence Cameroon.” The words “independence” and
“Cameroon” are the key words. Criteria for well-defined keywords are:
o Eliminate articles and prepositions such as “at, of, for, the, a, and”
o Type words in all lowercase (capitalization doesn’t matter in search)
o Verify the spelling of your keywords
o Use synonyms (such as rich and wealthy or big and large)
After typing the keywords into the search field, press “enter/return” or click on the “search” button.
When Google has conducted the search, the results page will appear which contains links to
web pages that match the keywords entered, and a brief excerpt from that page:
To view one of the web pages in the search results, simply click on the link (usually bold and
underlined).

13.7 Communication and electronic messaging: Creating an email account

FORM 1 NOTES 28 DORIANE FOUOLONG


Two of principle uses of the internet are research and communication. Communication on the internet
can be carried out with electronic mail (email), instant messaging, social networking, online telephone
communication, etc…
To communicate with email, one must first create an email account with which one can send
and receive messages as well as send attached electronic files.
Definition : an Email is an electronic address that allow you to send and receive messages and files
on the web
Many sites (yahoo.com, yahoo.fr, gmail.com, hotmail.com, laposte.net, etc) offer free
email accounts. For our purposes we’ll be using G mail, but there are many other free email services
available to you such as Hotmail and Yahoo mail..
To create a Google email account, using your web browser, enter mail.google.com into the
address bar. In doing this, we have the following:

Then simply click on “Sign Up.” You will need to respond to the questions on the sign-
up form and choose an ID and a password. If the ID you want is already taken (remember, there are
millions of people using Yahoo mail), Yahoo will help you select an alternative name. A good
password is something that is easy for you to remember, but hard for others to guess.

When the sign-up process is complete. Yahoo will display a message of congratulations and connect
you to your new email inbox.

13.7 Sending and receiving email : Attaching files to an email


To send an email, click on the button “Compose/New” Clicking on this will bring you
to the compose message view. You will notice that your Gmail address appears automatically in the
“From” field. Enter the recipient’s email address in the “To” field, enter the subject of your email in
the “Subject’ field, and type your message in the “message” field. Once the message has been
composed, click on the button “Send” to send the message. After a moment, Yahoo mail will inform
you that your message has been sent.
To respond to a message in the inbox, click on the message and click on the button
“Reply.” The recipient’s email address will already be entered in the “to” field. Simply write the new
message and click on the “send” button.
One can attach a file to an email such as an image, a word document, or a scanned
document. To attach a file to an email, click on the “Attach File” button. Choose the file you wish to
attach, and click “Attach” or “Open” depending on your computer, and the file will be uploaded and
attached to your email. Click on “Send” to send the email along with the attached file.

CHAPTER 7: RECOGNITION OF I/O PERIPHERALS


 Objectives:

- Enumerate types of peripherals (Input, Output, Input and Output combination devices)
- Enumerate types of printers
- Enumerate magnetic, laser, optical, wireless devices
- Enumerate flash-based devices
FORM 1 NOTES 29 DORIANE FOUOLONG
- Start and Close a peripheral

 Domain life situation:

- Using peripherals (Input and Output devices)


- Using appropriate hobbyist and productivity software packages

Lesson 14: Types of printers

14 .1 PRINTERS
A printer is a device that produces computer-generated information on paper. Such
output is referred to as printout or hardcopy. Based on the technology used, printers can be
classified into impact and non-impact printers.
Impact printers have mechanical contact between paper and printing head (e.g. daisy wheel,
dot matrix and line printers).
Non-impact printers have no mechanical contact between paper and printing head (e.g. ink-jet,
desk- jet, laser printers).
14.2 TYPE OF PRINTERS
A printer is a device capable of printing the information in a computer on paper.
Differing in function and cost, printers can be organized into several different types:
Laser Printer. These printers produce the best quality printing, but they are also the most
expensive and most do not print in color.
Ink Jet Printer. This is the most widespread type of printer. Cheaper than the laser printer, it
can print both in color and in black in white.
Dot Matrix Printers. These are not as common as Ink Jet or Laser printers. They are often used
in schools, large businesses, and in offices for printing forms.
Daisy Wheel printers are very old and are not very widely used today.

Lesson 15&16 : The mouse &&The Keyboard (SEE lesson 8)

CHAPTER 8 : DOING BASIC COMPUTER MAINTENANCE

 Objectives:
- Clean a computer (keyboard, system unit, screen, mouse, printer, CD-ROM, …),
- Conserve storage devices (CDROM, tapes, …), Enumerate materials used to protect
computers.

FORM 1 NOTES 30 DORIANE FOUOLONG


 Domain life situation:
- Doing basic computer maintenance

Lesson 17 : Cleaning a computer and conserve Storage devices


17 .1 Protecting the computer : hardware maintenance
A computer is a fragile device made of many small and delicate components, such as integrated
circuits. To protect a computer, we can:
 Connect it with an uninterruptible power source (UPS) that will regulate and maintain
electrical power in the event of power outages;
 Use a surge protector that can protect it and other computers in the lab or office from
lightning;
 Place a voltage regulator in the computer lab that will suppress surges in electrical
voltage;
 Have an air conditioner or ventilator in the computer lab, especially where the
temperature is normally high. If no air conditioner is available, choose a site for the
computer lab that is protected by shade and well ventilated. Curtains can also be used
to block sunlight and keep the lab cool;
 Avoid bringing any liquids into the computer lab. Spilling liquids onto a keyboard or
other parts of the computer can quickly damage the machine;
 Avoid letting dust build up in the computer lab as much as possible. Dust can get inside
computers and damage their internal parts;
 Avoid infecting computers with computer viruses. .

Lesson 18 : using an antivirus

FORM 1 NOTES 31 DORIANE FOUOLONG


18.1 Computer virus
A computer virus is a malicious program written by people to damage computers files. A virus
can destroy the contents of a file, block the execution of software, and cause other problems for
the system. To avoid viruses, install an anti-virus program on the computer and update it
regularly.
18.2 Antivirus
An Antivirus is a software program that detects and fights viruses, infected files by deleting
them or quarantining them.
Some examples of antivirus are : Avast, Kapersky, Norton, Nod 32 , smadav, ….
In order to increase the performance of your antivirus, you have to frequently update it. This
because everyday, new viruses are created by malicious persons.
18.3 Firewall
A firewall is a system designed to prevent unauthorized access to or from a private network.
Firewalls are implemented in either hardware or software form, or a combination of both. They
prevent unauthorized Internet users from accessing private networks connected to the Internet.
All messages entering or leaving the network must pass through the firewall which examines
each message and blocks those that do not meet the specified security criteria. Some Operating
Systems like Windows XP, 7 and Mac OS X, have built-in firewalls.

CHAPTER 9 : USING BASIC ELEMENTS OF AN OPERATING SYSTEM


 Objectives:
- Enumerate system software,

-State functions of a system software,

-Identify the major parts of a graphical systems software (windows, icons, dialogue boxes,…),

-State the various execution processes of commands working with mouse or keyboard

-Start and Quit a named software,

- Modify date and clock settings,

- Open and quit a session,

- Check and use help facilities in software applications.

 Domain life situation:


- Discovery with an operating system
- Storage of data , Written communication

Lesson 19 : What is an OS?

FORM 1 NOTES 32 DORIANE FOUOLONG


Introduction
The operating system is the essential software that is required for a computer to become
operational. It is the software layer that is on top of the hardware to provide functionality to computer
components, manage the hardware and serve as interface between the computer user and the
computer. An operating system is called such because it controls the functions of the computer’s
hardware (processor, memory, disks, internal clock, and peripherals) and serves as an intermediary
between application software and the user. The operating system is the master program that runs
the computer behind the scenes while you work.

DEFINITION
Operating system is the set of instruction that manage both the hardware and
software resources of the computer.

19.1 FUNCTIONS OF AN OS
System software control and coordinate computer resources (hardware and
operations) so that the computer user and applications can smoothly interact. It performs the
following functions:
 Controls and manages all hardware(disk, microprocessor, RAM) and
software(execution of commands) in the computer,
 Manages files, folders and directories (organize, create, modify, copy, optimize and
search),
 Manages input and output: The drivers are thus called peripheral managers or
managers of input and output
 Sharing resources: Sharing resources allows several users to access the same files,
folders, printers, hard drives, CD-ROM drives
When the operating system is running, it uses both the hard disk and the computer’s
RAM (Random Access Memory).
The operating system provides the ability to start the other software on the
computer. In the absence of an operating system, the computer would not function.
Some examples of OS are: MS DOS (Microsoft Disk Operating System), MS
Windows, Linux, Unix, Macintosh

19.2 TYPE OF OS
- Single User OS
A single user operating system is an operating system which allows only one user to work on the system at a time. No
two or multiple users can work on the system simultaneously.
Examples are Control Program for Microcomputers (CP/M) and Microsoft Disk Operating System (MS DOS).
WINDOWS95, WINDOWS2000

- Single-task operating systems


An operating system is called single-task when it can only run one program at a time.
In this type of operating system, it is necessary to refresh the RAM regularly, because a program
that exists in the RAM is entirely deleted before the introduction of another program.
CP/M and MS-DOS are examples of single user single task operating systems.

FORM 1 NOTES 33 DORIANE FOUOLONG


- Multi-task operating systems
An operating system is called multi-task when several programs can operate at the same time.
For example, one can print a document and do word processing at the same time. In a multi-
task operating system, one can open many windows at a time, as long as the RAM is capable
of loading and manipulating the data of the application. Windows Me, Windows-XP, Macintosh
operating system, OS/2 are examples of single user, multitasking operating systems
- Multi-user operating systems
An operating system is called multi-user or multi-station when several users can launch
programs at the same time. In this type of operating system, a single central unit can manage
all terminals (a system including only a mouse, a keyboard, a screen) thus allowing many users
to work at the same time. Examples of multi-user operating systems are Linux, Unix and
Virtual Machine System (VMS).
- Graphical User Interface (GUI) operating system
An operating system is called a graphical user interface operating system when it uses small
images (icons) and a mouse. Here, one generally uses a mouse to click on the icons. Examples
of operating systems with a graphical user interface are Windows, Macintosh operating
systems, some versions of Linux and UNIX.
- Command-line operating system
An operating system is called a command-line operating system when the user must type
commands using the keyboard. With this type of operating system, there are not icons or a
mouse. Examples of operating systems that provide a command line interface are MS DOS,
early versions of UNIX and Linux.
- Multi-processor operating system
An operating system is called multi-processor when it can function under several
microprocessors at the same time. In this case, the execution instructions are distributed
between the microprocessors.
- Embedded OS
An embedded operating system is an operating system that is used in an embedded system.
An embedded system is a small computing device that is built into a larger equipment often as
a single chip and dedicated to a given task. Embedded systems control many devices in use
today such as digital watches, mobile phones, microwave ovens, washing machines, vehicles,
photocopiers, cameras and process controllers. Embedded OS are ROM based. That is, they
cannot be modified as ROM is read only.
- Network OS
A network operating system is an operating system which includes networking features. It
contains special functions, protocols and device drivers that enable the computer to be
connected to a network. Examples of network operating systems are Windows-NT, Windows-
2000 server, Windows server 3000, Novell Netware and Artisoft LANstatic.

FORM 1 NOTES 34 DORIANE FOUOLONG


19.3 System software and application software
Finally, the operating system is a program that manages at the core, the hardware but
does not permit the user to carry out a specific task (type text, manage a business, calculate student
averages…).
Application software is the most known to students because it allows one to do specific tasks
(type text with MS Word, calculate an average with Excel…).

19.4 PARTS OF AN OS
The OS can be broken down into 4 mains parts:
- Kernel: it has the task of loading applications into memory
- Device driver: it is a computer program that generates or controls a particular type of device
attached to a computer.
- The user interface: This part of OS is directly what you see on the screen. It is also
represented by a graphical user interface which contains the following elements: Desktop,
icons, start button, Quick launch toolbar, task manager, and system tray
- System utility: This part of the OS provides. all the basics facilities that run in background
without the user interaction. For examples print services, file management services.

19.5 Windows graphical interface


1. Desktop
It is the first screen that appears on the monitor after booting the system with windows.
2. Icons: Graphical pictures that represent objects like files, folders, programs, …
3. Start button: It is the starting point of windows menu system.
4. Quick launch toolbar: It comprises of many buttons. Each button represents a program.
5. Task manager: Initially, it appears as a lank area, but when you execute any program, a
button for that program gets created in this area.
6. System tray: Each icons of the system tray represents a program which is invisibly running
in the background.
7. Background: It is the wallpaper where the desktop icons are based.

19.6 Notion of work session and password


Nowadays, OS are multiuser. This allows the use of same machine by different persons Identified by a
name or a user name. This allows them to share computer resources while preserving each own files
and settings. Now when you start a computer you just have to click to the icon,( enter your password if
you have one) of your account to access to your workspace.

Lesson 21: Execution process of command working


INTRODUCTION
To better interact with man, the operating system is based on commands, and style of organizing
data. To better interact with man, the operating system is based on commands, and style of
organizing data

FORM 1 NOTES 35 DORIANE FOUOLONG


21.1 FILES
A file is a collection of data created by the user. The file is characterized by a name
often followed by its extension. The extension can indicate the software application that created
the file or the file type.
In the file “Millenium.doc,” “Millennium” is the name of the file, whereas “doc” is the extension
for Microsoft Word documents, for example.
In the file “turbo.exe,” “turbo” is the name of the file whereas the extension “exe” indicates that
the file in an executable program file, for example.
Here are some type of files recognizable by their extension:
- Text files: . txt
- Executable files: .exe
- Image files: . jpg, . bmp, .gif, .tiff
- Music files: .mp3
- Video files: .mp4
21.2 Folders
The folder or directory is a grouping of files or sub-folders that allows better
organization of information in the mass memory. Thus, all files of the same type can be grouped
in a data folder. In a folder, the filenames and sub-folders can be organized by type, date of
creation, size, or alphabetically. In Windows, folders and files do not have the same appearance;

21.3 Instructions
An instruction is simply a basic action interpreted and executed by the microprocessor. These
actions can be a mathematical operation (addition, subtraction, multiplication, division), a
logic test, a data transfer, deactivation test…
21.4 Command
A command is an instruction or a program sent by the user to allow the computer to process
data. One distinguishes between internal and external commands. The internal commands
reside in the RAM while the operating system loads.
The external commands in Windows can be made through the interface (icons) or by
command-line.
21.5 GUI Commands
Interface commands are generally user requests sent to the computer to execute their work. In
Windows, interface commands are generally made by a simple click of the mouse and the user
only sees the result without seeing the intermediate steps made by the computer to give that result.
The interface commands allow one for example, to create, rename, copy, delete, move a file
or folder, secure, compress or decompress data…

1- Creating a file or folder


FORM 1 NOTES 36 DORIANE FOUOLONG
To create a folder on the Windows desktop:
Double-click on the icon “My Computer” or click on the “Start” button and then on “My
Computer”;
Next, select the volume where you want to create the folder (by double-clicking)
Click on the menu “File”;
Move the cursor over the command “New”;
Click on “Folder” and type the name of the folder.
One can also open the desired directory, right-click and move the cursor over “New” and
click on “Folder”, then type the name of the folder.
In general, software applications also allow for the creation of a file. However, one can first
create the file before double-clicking to open the application. In this case, right-click on an
empty space that doesn’t contain a folder or file, move the cursor over “New” and click on the
appropriate application, then type the filename.

2- Deleting a file or folder


Deleting a file or folder generally consists of sending it to the recycle bin. The recycle bin is
simply a window within Windows.
To delete a file or folder, one can click on its icon and press the “Del” key on the
keyboard, and respond with “Yes”.
3- Renaming a file or folder
To rename a file or folder, click two times without double-clicking on the icon, then retype the
new name of the file or folder. Or, right-click on the file or folder and choose “Rename” from
the contextual menu, then type the new name.
4- Restoring a deleted file or folder
To restore a deleted file or folder, open the “Recycle Bin” by double-clicking on its icon, then
right-click on the file and choose the option “Restore.”
5- Opening and closing a file or folder
To open a file or folder, simply double-click on its icon.
In clicking on the icon “Back” on the toolbar, one can close a folder that is open.
When a file is opened by a software application, one can click on the menu “File” and
then on “Close” to close the file without quitting the software application.
6- Copy cut and paste files and folders
- To copy and cut a file or a folder, Right click on the file or folder and choose copy or cut
from the drop down menu
- To paste a file or folder to a particular location, Right click on the location you want to paste
after you must have copied or cut it and choose paste from the contextual menu that appears.
7- Some commonly use shortcuts
- Ctrl+C for copy
- CTRL + X for cut
- CTRL + V for paste
21.5 Command-line commands

External commands allow a user to enter with the keyboard, executable operations such
as sorting files, converting files in NTFS, and classification of files by alphabetical order.
External commands do not reside in the RAM, because the programs are stored in the mass
memory.

FORM 1 NOTES 37 DORIANE FOUOLONG


Command-line operating systems use above all, external commands for all
communication between the user and the computer.
Because Windows has a graphical user interface, it uses a large number of commands,
(DOS included) executable using command prompt. To open command prompt, click on the
“Start” button, then on “All Programs” and then on “Accessories” and then on “Command
Prompt.” Commands are then typed using the keyboard and validated after each command. The
table below lists several external commands and their meaning:

Commands Meaning
convert /fs:ntfs converts FAT or FAT32 files into NTFS system files
Rename Give a new name to a file or folder
Copy Copy a file from one folder to another
Dir *. List the data in a directory
Chkdsk Search and repair errors on the hard disk
Dxdiag Identify the properties of the computer
Cd Open a folder
cd.. Close a folder
Del Delete one or several files
Quit a sub-folder and return directly to command prompt c:\
Cd\
Md Create a folder

Lesson 22 : Configuration of Date and clock setting


22.1 Organize the desktop elements
To reorganize the desktop icons according to a certain order, (name, type or date), follow these
steps:
- Right click the mouse in an empty space in the desktop
- Choose the option : Reorganize desktop elements on the menu that appears
- Make your choice: by name, by type or by date
22.2 Change the background image of the desktop
To do that, follow these steps:
- Right click in an empty space on the desktop
- Choose on the contextual menu the option: properties
- Choose desktop and select any wallpaper image of your choice
- Click on apply button
- Click on OK button

22.3 Configuration of Date and clock setting


- Go to the start menu
- Select Control panel or parameters
- Click on modify or update Date and hour
- After entering the right date and hour , click on apply and OK buttons
Another way to change its, it is just to click on the date and hour button present on the task bar then
modify its.

FORM 1 NOTES 38 DORIANE FOUOLONG


23.4 Installing a screen saver
Perform following steps to set the screen saver:
- Right click the mouse on any empty space of desktop
- On the new window, select properties option from this menu
- On the new dialog box, select the screen saver of your choice from screen saver drop down
list box
- Now make use of Wait spinner and specify the time after which the screen saver should get
activated if no input output activities takes place.

CHAPTER 10 : ORGANIZING DATA USING THE COMPUTER


 OBJECTIVES
- Perform file operations (save, save as and delete, …)
- Perform folder operations (create, name, list, delete,…),
- Open and Save a document in the default folder, Open a file from external storage devices,
- Save a document to an external storage device, Close a document or Exit an application,

Lesson 23 : perform files and folders operations (Done )

Lesson 24 : Open and save documents in the default or external folder

FORM 1 NOTES 39 DORIANE FOUOLONG

You might also like