Computer Science Note For Form 1
Computer Science Note For Form 1
Lesson 10: Entering marks and performing calculations CHAPTER 11 : POCESSING DATA USING THE
with marks COMPUTER
Evaluation N°2
2.2.1 In Schools
We can use computers in our schools to calculate the averages of students, type exams,
sort lists of students in order of merit or in alphabetical order, type administrative
documents, send and receive messages through the Internet, and do research for classes using
the Internet.
2.2.2 In Business
The management of stores, other businesses, banks, money transfers, the payment of
salaries, and record keeping can all be done using computers.
2.2.3 In Industry
2.2.4 In Medicine
Computers are also used to help make medical diagnoses, give long distance medical
assistance, and assist in surgical procedures.
2.2.5 In Communications
2.2.6 In Offices
Office applications, such as word processors and spreadsheets, are the most widespread
uses of computers. It is difficult to find a single neighbourhood in most towns without seeing
someone in the middle of typing or printing documents using a computer.
Scientists use computers to perform complicated calculations, store and process data,
and resolve complex problems.
Computers are used by many militaries to perform such functions as encoding and decoding
messages, designing weapons, managing communications, guiding drones (pilot less
airplanes), and aiming missiles.
2.2.9. Robotics
Robotics is the branch of technology that deals with the design, construction, operation and
application of robots. A robot is a machine that is designed to repeatedly do what humans
can do with speed and precision.
2.2.10 Advertising
Artists use the Internet to advertise new CD releases, tour dates, merchandise, and bonus
tracks. Samples of new songs are released to entice the listener to buy the album.
INTRODUCTION
For a computer to work, we need a power supply, a central processing unit, and input
and output devices. A computer is a fragile device made of many small and delicate
components, such as integrated circuits. To protect a computer, we can:
Connect it with an uninterruptible power source (UPS) that will regulate and maintain
electrical power in the event of power outages;
Use a surge protector that can protect it and other computers in the lab or office from
lightning;
A computer can be represented into two mains parts: the software and the hardware.
- Hardware includes all of the components of a computer that we can physically
touch.
- Software is a group of programs or instructions that tell the computer how to
perform specific tasks.
THE HARDWARE is the physical part of computer which are assembled together to build the computer
system. IT includes the cpu and the devices.
- The CPU contains the ALU which represents the brain of the computer.
- A device is a hardware part which allows users to communicate with computer.
We distinguish the following types of devices:
Utilities: additional programs that ensure maintenance and the proper functioning of the
computer resources (such as Disk defragmenters, PCtools, Norton, and Avast).
Utility software is used to enhance the operating system, or in some other way
improve the usefulness of the system. They help analyse, configure, optimize and m
Disk defragmenters detect computer files whose contents are broken across
several locations on a disk, and move the fragments to one location to increase
efficiency.
Disk cleaners find and delete files that are unnecessary to computer operation,
or take up considerable amounts of space. They help users decide what to delete when
their hard disk is full.
Backup utilities make copies of all information stored on a disk, and restore
either the entire disk (e.g. in an event of disk failure) or selected files (e.g. in an event
of accidental deletion).
Disk compression utilities reduce the space that a file takes up on disk,
increasing the capacity of the disk.
Device Driver
A device driver is software that allows interaction between the operating system and
a hardware device. It is an interface for communicating with the device through the
specific computer bus that the hardware is connected to. Without an appropriate
device driver the system cannot communicate with a device, rendering the device
useless. Installation of device drivers usually happens automatically when hardware is
connected (plug n play), or from a CD provided with the device. Sometimes a device
driver needs to be updated to stay functional.
3.4 THE BIOS: Basic Input Output System
Basic input output system (BIOS) is software that contains hundreds of programs that allow for
communication between the CPU and devices. It is stored on ROM, which is a permanent chip on
the motherboard.
There are three kinds of BIOS for hardware devices:
Permanent never changing BIOS for never changing hardware like the keyboard
BIOS for hardware that changes occasionally. It requires extra volatile information so
it is stored on a separate chip called CMOS (Complementary Metal Oxide Semiconductor).
To buy a computer, we must first know what it will be used for. The criteria people often
look for when deciding whether or not to buy a computer can include:
Computers function using binary data. Binary data is data that is composed of a series of the
numbers 1 and 0. All information stored or processed in a computer is ultimately reduced to a
series of 0s and 1s in different combinations. A bit is one instance of either the number 0 or 1 in
a group of binary data. A byte is a group of 8 bits linked together. A kilobyte (kb) of data
corresponds to 1024 bytes. A Megabyte (Mb) corresponds to 1024 kilobytes, and a Gigabyte
(Gb) corresponds to 1024 Megabytes( ).
Data are going into a computer through input devices. After being processed by the CPU, The
result of processing is sending out through Output devices and stored into storage devices.
NB : When one buys a computer, for example, one should know the references of the BIOS (Basic Input
Output System), verify the CMOS (Complementary Metal Oxide Semiconductor) properties.
The BIOS contains the programs and drivers that allow the computer to boot up. Its role is to
verify the presence of the principle components of the computer (keyboard, mouse, hard disk…) and
store the information of the computer’s configuration in the CMOS memory.
Objectives:
- Writing basic solution procedure to problems
- Ordering solution steps
INTRODUCTION
Algorithm is a part of our daily life. We accomplish any task by following an algorithm. For example making a
cake, Computing rectangle surface.
Computer science is based in programs or applications whose execution can be summarized as: problem posed
– analysis – algorithm – program – compilation – execution.
6.1 DEFINITION
An algorithm is a well-defined set of step-by-step instructions for solving a problem in a finite amount of time.
A set of instructions is not an algorithm if there is no definite stopping place, or if the instructions are too vague
to be followed clearly. An algorithm cannot be directly executed by a computer, but it has to be translated into
a program using a programming language.
A good algorithm:
- should be unambiguous (i.e. no doubts about what to do/ only one way of interpreting the instructions)
1. PROBLEM TO SOLVE OR TASK TO PERFORM: state the step by step instructions to follow in order to obtain
at the end the pineapple juice. Specify the input elements, the result or the output of your algorithm.
2. SOLUTION
Solution:
Set of instructions:
- The name of the algorithm which has to be clear and explicit. It should clearly present the problem
to be solve.
- The inputs that represents data we need to solve the problem.
- The set of instructions : that explains how to solve the problem
- The Output: That represents the final result we should obtain.
SOLUTION:
Algorithm : Surface_of_a_Rectangle;
INPUTS: Width: W;
Height: H;
SET OF INSTRUCTIONS:
Objectives:
- Describe the basic parts of keyboard, mouse, printer, and screen,
- Use productivity software in the discovery of Input and Output peripherals,
INTRODUCTION
People control computers using input devices such as the keyboard and mouse… Input devices send
information to the central processing unit. There are many input devices: keyboard, mouse, joystick,
drawing tablet, scanner, microphone, digital camera …
Drag and drop can be used to move files or documents from one place to another.
A mouse connects to a computer through PS/2 cable (PS/2 mouse), USB cable (USB mouse), or wireless (optical mouse).
The monitor’s principal role is to display data on its screen. We can distinguish between two types of
monitors: the cathode ray tube, and liquid crystal display.
Lesson 9 & 10: Modifying Text and Graphics && Entering marks and performing calculations with marks
When Windows is started, the computer displays the «Windows Desktop». As its name indicates, the desktop
is a space on the screen where the user can work. It is comparable to a physical desktop: a space or surface
where we can arrange books, papers, etc. The desktop is built around several key concepts: the taskbar, the
start button, and the icons.
Taskbar
Start Button
Icon
Slide the pointer horizontally over the icon for the program and single-click on the icon with
the mouse, or, if the icon is not listed in « All Programs », find the folder in the list that
contains the icon (for example, programs in the Microsoft Office suite of applications such as
Microsoft Word or Microsoft Excel are often found in a folder called « Microsoft Office »),
Finally, we can find the icon for a program or document using any of the means listed above,
and then:
Right-click on the icon for the program or document with the mouse
PRACTICALS EXERCISES:
- Open Microsoft Office Word and type any text of your choice. Example a greeting card
- Open pain application and draw any graphic of your choice. Modify it , delete it , save it
- Open the calculator, then enter marks and effectuate multiplication, addition and subtraction.
Objectives:
The fundamental principles of computer ethics formulated by the Computer Ethics Institute (CEI) as the“ten
commandments” of computer ethics are:
1. Thou shall not use a computer to harm other people.
2. Thou shall not interfere with other people’s computer work.
3. Thou shall not snoop around in other people’s files.
4. Thou shall not use a computer to steal.
5. Thou shall not use a computer to bear false witness.
6. Thou shall not copy or use proprietary software for which you have not paid.
7. Thou shall not use other people’s computer resources without authorization or proper compensation.
Copyright, Design and Patent Act : Act designed to protect all types of intellectual property and
ensure that authors or creators of a piece of work receive both credit and compensation.
Copyright is a statutory grant that protects original work. Something that is copyrighted is not
to be reproduced, published or copied without permission from the copyright holder. Ideas
are not protected by copyright; only the specific presentation of the idea is copyrightable.
A Patent is a grant to inventors that give them exclusive monopoly over their invention. It gives
them the right to stop others from producing, selling or using their invention. Unlike
copyrights, patents protect the ideas or design of the invention rather than any tangible form
of the invention.
11.4 Software Distribution Licenses
Software are distributed under different licenses. They include public domain, freeware, shareware, open source and
all rights reserved.
Public Domain
Public domain software has no owner and is not protected by copyright law. It was either created with public funds or
the ownership was forfeited by the creator. Public domain software can be copied, sold and/or modified. It is often of
poor quality.
Shareware
Shareware is copyrighted software that allows you to use it for a trial period but you must pay a registration fee to the
owner for permanent use. Purchasing the right to use the software may also get you a version with more powerful
features and published documentation.
Freeware
Freeware is copyrighted software that is licensed to be copied and distributed without charge. Freeware is free but it
is still under the owner’s control. Examples are Eudora and Netscape.
Commercial Software
All rights reserved software is software that must be used by the purchaser according to the exact details spelt out in
the license agreement.
Open Source Software
Open source software is software whose source code is published so that a variety of people can add contribution.
Examples are Linux OS, MySQL, Mozilla and OpenOffice.
11.5 Measures to Combat Computer Crimes
The following measures can be used to combat computer crimes:
Install strong doors and locks to computer rooms to prevent computer equipment theft.
Use access control mechanisms that will ensure confidentiality, integrity and availability.
Encrypt confidential data stored in computers or transmitted over communication networks.
- Use passwords and login to secure your data. A password is a group of alphabetic or alphanumeric characters
that must be typed in order to allow the computer to open a file or folder.
Install antivirus software and update it regularly
Install intrusion detection systems to help detect any unauthorized access to the system.
Install firewalls to prevent unauthorized access to local networks
Objectives:
Example 1: http://www.bgsmolyko.edu/Ls3,4/ict796/intenet.pdf
http is the protocol used (hypertext transfer protocol)
www.bgsmolyko.edu is the domain name (the machine at BGS Molyko that hosts the
website)
Ls3,4/ict796/internet.pdf is the path of the document (resource) on the host computer.
Ls3,4 is the folder, ict796 is the subfolder and internet.pdf is the file(resource).
Example 2: www.minsup.gov.cm
gov is the top level domain which specifies that the URL is for a government institution.
cm specifies the country in which the URL is hosted or the country in which the
institution is found.
FORM 1 NOTES 26 DORIANE FOUOLONG
- The E-mail : to receive and send messages.
Electronic mail or e-mail (email) is a means of sending messages, text, and computer files
between computers via the Internet. To send and receive e-mails, you need an Internet connection
and an e-mail account which can be created within a webmail service such as Yahoo, Hotmail or
Gmail. When you create an e-mail account, you are given a unique email address that gives you
access to your mail box. An email address is made up of two parts separated by the symbol @
pronounced “at”. For example bgsmolyko@yahoo.com.
In the above address,
bgsmolyko is the user ID, user name or login
yahoo.com is the domain name. The domain specifies the mail server (computer) on
which the mail box is located.
To conduct a web search, we must first open a web browser and type the URL (web
address) of the search engine, such as www.google.com into the address bar and press return/enter on
the keyboard (*note: in a bilingual country such as Cameroon, you must verify the language in which
you are searching).
The welcome page of google looks like the following:
To conduct an effective web search, it is necessary to first, define the keywords for the search.
“Key words” are the words necessary that allow a search engine to effectively find relevant
documents on the internet.
For example, if an instructor asks a student to research the independence of Cameroon, an
example of bad, ineffective keywords would be “I want to research the independence of Cameroon.”
In this example there are words that do not serve any purpose such as “I” and “to” and “the.” A more
effective request would be simply “independence Cameroon.” The words “independence” and
“Cameroon” are the key words. Criteria for well-defined keywords are:
o Eliminate articles and prepositions such as “at, of, for, the, a, and”
o Type words in all lowercase (capitalization doesn’t matter in search)
o Verify the spelling of your keywords
o Use synonyms (such as rich and wealthy or big and large)
After typing the keywords into the search field, press “enter/return” or click on the “search” button.
When Google has conducted the search, the results page will appear which contains links to
web pages that match the keywords entered, and a brief excerpt from that page:
To view one of the web pages in the search results, simply click on the link (usually bold and
underlined).
Then simply click on “Sign Up.” You will need to respond to the questions on the sign-
up form and choose an ID and a password. If the ID you want is already taken (remember, there are
millions of people using Yahoo mail), Yahoo will help you select an alternative name. A good
password is something that is easy for you to remember, but hard for others to guess.
When the sign-up process is complete. Yahoo will display a message of congratulations and connect
you to your new email inbox.
- Enumerate types of peripherals (Input, Output, Input and Output combination devices)
- Enumerate types of printers
- Enumerate magnetic, laser, optical, wireless devices
- Enumerate flash-based devices
FORM 1 NOTES 29 DORIANE FOUOLONG
- Start and Close a peripheral
14 .1 PRINTERS
A printer is a device that produces computer-generated information on paper. Such
output is referred to as printout or hardcopy. Based on the technology used, printers can be
classified into impact and non-impact printers.
Impact printers have mechanical contact between paper and printing head (e.g. daisy wheel,
dot matrix and line printers).
Non-impact printers have no mechanical contact between paper and printing head (e.g. ink-jet,
desk- jet, laser printers).
14.2 TYPE OF PRINTERS
A printer is a device capable of printing the information in a computer on paper.
Differing in function and cost, printers can be organized into several different types:
Laser Printer. These printers produce the best quality printing, but they are also the most
expensive and most do not print in color.
Ink Jet Printer. This is the most widespread type of printer. Cheaper than the laser printer, it
can print both in color and in black in white.
Dot Matrix Printers. These are not as common as Ink Jet or Laser printers. They are often used
in schools, large businesses, and in offices for printing forms.
Daisy Wheel printers are very old and are not very widely used today.
Objectives:
- Clean a computer (keyboard, system unit, screen, mouse, printer, CD-ROM, …),
- Conserve storage devices (CDROM, tapes, …), Enumerate materials used to protect
computers.
-Identify the major parts of a graphical systems software (windows, icons, dialogue boxes,…),
-State the various execution processes of commands working with mouse or keyboard
DEFINITION
Operating system is the set of instruction that manage both the hardware and
software resources of the computer.
19.1 FUNCTIONS OF AN OS
System software control and coordinate computer resources (hardware and
operations) so that the computer user and applications can smoothly interact. It performs the
following functions:
Controls and manages all hardware(disk, microprocessor, RAM) and
software(execution of commands) in the computer,
Manages files, folders and directories (organize, create, modify, copy, optimize and
search),
Manages input and output: The drivers are thus called peripheral managers or
managers of input and output
Sharing resources: Sharing resources allows several users to access the same files,
folders, printers, hard drives, CD-ROM drives
When the operating system is running, it uses both the hard disk and the computer’s
RAM (Random Access Memory).
The operating system provides the ability to start the other software on the
computer. In the absence of an operating system, the computer would not function.
Some examples of OS are: MS DOS (Microsoft Disk Operating System), MS
Windows, Linux, Unix, Macintosh
19.2 TYPE OF OS
- Single User OS
A single user operating system is an operating system which allows only one user to work on the system at a time. No
two or multiple users can work on the system simultaneously.
Examples are Control Program for Microcomputers (CP/M) and Microsoft Disk Operating System (MS DOS).
WINDOWS95, WINDOWS2000
19.4 PARTS OF AN OS
The OS can be broken down into 4 mains parts:
- Kernel: it has the task of loading applications into memory
- Device driver: it is a computer program that generates or controls a particular type of device
attached to a computer.
- The user interface: This part of OS is directly what you see on the screen. It is also
represented by a graphical user interface which contains the following elements: Desktop,
icons, start button, Quick launch toolbar, task manager, and system tray
- System utility: This part of the OS provides. all the basics facilities that run in background
without the user interaction. For examples print services, file management services.
21.3 Instructions
An instruction is simply a basic action interpreted and executed by the microprocessor. These
actions can be a mathematical operation (addition, subtraction, multiplication, division), a
logic test, a data transfer, deactivation test…
21.4 Command
A command is an instruction or a program sent by the user to allow the computer to process
data. One distinguishes between internal and external commands. The internal commands
reside in the RAM while the operating system loads.
The external commands in Windows can be made through the interface (icons) or by
command-line.
21.5 GUI Commands
Interface commands are generally user requests sent to the computer to execute their work. In
Windows, interface commands are generally made by a simple click of the mouse and the user
only sees the result without seeing the intermediate steps made by the computer to give that result.
The interface commands allow one for example, to create, rename, copy, delete, move a file
or folder, secure, compress or decompress data…
External commands allow a user to enter with the keyboard, executable operations such
as sorting files, converting files in NTFS, and classification of files by alphabetical order.
External commands do not reside in the RAM, because the programs are stored in the mass
memory.
Commands Meaning
convert /fs:ntfs converts FAT or FAT32 files into NTFS system files
Rename Give a new name to a file or folder
Copy Copy a file from one folder to another
Dir *. List the data in a directory
Chkdsk Search and repair errors on the hard disk
Dxdiag Identify the properties of the computer
Cd Open a folder
cd.. Close a folder
Del Delete one or several files
Quit a sub-folder and return directly to command prompt c:\
Cd\
Md Create a folder