Professional Documents
Culture Documents
Information Technology Notes
Information Technology Notes
Computer Fundamentals
Definition of a Computer
Central Processing Unit - process data that is input into it and produces an output
Hardware Categories
Storage in Computers
• Primary storage/ main memory/ immediate access storage- fast
- Random access memory (RAM)- the first memory storage the central
processing unit reacts with. Has volatile (soon as electricity is turned off data
is lost) storage memory. Too many programs slow down the Ram. It can
- Read only memory (ROM)- holds data necessary for starting up computer.
Hardware Devices
• Input Devices
- Manual input devices- users enter data by themselves
• Keyboard
• Mouse
• Joystick
• Microphone
• Touch pad
• Webcam
Impact Printers
à dot matrix - crates characters by striking ribbon with a print head containing
pins. Uses a multi form sheet like receipts
Non-impact
à Inkjet - shooting ink
à Laser- has magnetically charged powder that is pressed on the paper by a
heated drum (toner)
à Thermal - use heat applied to chemically treated
Other Printers
à Plotters- provides accurate and precise drawings on large sheets of paper.
E.g. Housing Plants
à Microfilm- outputs a small film that has to be read by a special machine.
E.g., libraries, newspapers, archives.
à 3d Printer- allows creation of a physical object from a three- dimensional
digital model.
Software Categories
¶ System software- software that controls how the hardware and software of
the whole computer works. Enable computer to run smoothly.
¶ Application software- instructs computer to do a specific task. Depends on
System software to run.
Application Software
Five types of application software are:
General Purpose Software- software that is used to perform basic tasks and
can be used by all users. Comes with operating software. E.g., Pdf reader,
notepad.
à Operating System- a set or programs that controls all the hardware and
application programs that make up the computer system. All programs
depend on it. E.g., windows, Linux, Mac Os, iOS, Android, Windows
mobile
The functions include:
o Process Management
o Memory Management- Virtual memory
o File Management
o Security Management
Types of Computers
¶ Super Computer- highest operational rate
¶ Mainframe Computer- high processing power and high level of reliability.
¶ Desktop/ personal Computer- Regular tasks
¶ Mobile Computer- portable desktop computer
¶ Embedded Systems- performs specific functions and has its own processor.
Cloud Storage
This is storing data on remote servers and is accessed from the internet.
Concept
Companies create a location with a lot of main frame computers or large servers
with fast internet people will then pay the companies to access it whenever they
have internet. (iCloud, drop box, one drive, google photos)
Local Storage
This is any physical storage device directly connected internally or externally to
the computer system hardware. Examples include USB drives, memory cards,
hard disk drives and optical disks
Difference
The difference between the two is that local storage is physically connected to your
computer while cloud storage can be accessed anywhere in the world via a
computer network.
Cloud Local
Capacity Can be extremely high Can be extremely high
but you pay monthly or also but you have to pay
yearly. upfront for the hardware
Sources of Information
Documents
Data Entry
This is where someone manually enters data from a form into a screen using a
digital data entry form.
Data Integrity
In order for data to be useful it must be correct, when data is input into a system it
must be verified and validated.
à Data Verification- these are procedures followed to ensure that data inputted
is the actual reflection of the original data.
Two types of errors are:
- Transcription- occurs when document is hard to understand which
results in spelling errors. Can be avoided by document being written
in Block.
- Transposition- occurs when numbers are mixed up. It is very hard to
avoid.
Types of Verification
Visual Checks- Checking data to ensure it has been entered correctly into the
system. Avoids typological errors
Double entry verification- double checking data before it goes into the
system.
à Data Validation- checks carried out by the software to ensure that it meets a
criterion.
The five types of data validation are:
Range Check- checking if someone put correct information using a set
range. Age 16-25
Data Type Check- checking if correct data type is in the required
field. E.g., if someone put letters in a field that requires numbers
Inconsistency Check- checking one piece of data against another
Presence Check- ensure data is actually entered into a field. Usually
denoted by an “ * ”
Reasonableness Check- checking to see if data is within a reasonable
standard. E.g., checking to see if someone put their number of siblings
as 100
Format and Length- checking to see if data is formatted according to a
set standard.
File Access
Direct/ Random- can get the file directly, without going through others
Sequential – to access a file you would need to go through all the before it.
File Organization
Serial- records are arranged one after another, they are not sorted in any
particular order. Used for storing data for backup purposes.
Sequential- files are stored in order using data of one of the fields. This
method is often used in magnetic tape
Index Sequential- use of an index file to speed up searches on sequential 📂.
Can only be used where data is stored and retrieved directly
Troubleshooting
Data Communication
Computer Networks
Set of computers that are linked together by cables or wirelessly that share
information with each other.
à LAN- made up of two or more computers connected to each other within the
same geographical area via cables or wirelessly. Doesn’t have to be in the
same building. WLAN- allows laptops or remote computers to connect to
LAN.
à MAN- a medium sized network build across a whole town or city. Connects
many LANs together and is usually run by one company. E.g., used in
universities
à WAN- a network that connects computers over a wide area across different
geographical locations. Uses satellite connections other than cables because
of its distance. Wan can share information across organizations so that files
can be accessed from anywhere. E.g., internet
Internet
An intranet is a private network contained within an enterprise that is used to
securely share company information and computing resources among employees.
Extranet
An extranet is a part of the intranet that is accessible by third parties. Stock
Mangers, suppliers, vendors, partners, customers and other businesses.
Network Topologies
Peer-to-peer
Star
Bus
Ring
Servers
¶ File servers- stores files that will be accessed by the whole network in one
central location
¶ Print server- connects a printer to one central location so everyone can print
to it.
1. Twisted-Pair Cable
• Each twisted pair wire consists of two separate insulated copper wires that are
twisted together
• Inexpensive
Twisted-pair cables have been used for telephones and computer networks for
over a long period, although they are gradually being replaced by fibre-optic.
2. Coaxial Cable
• Higher bandwidth
• It has a twisted-pair with a shiels
Coaxial cables carry electronic current at radio frequencies. It is used for cable
television and broadband internet connections.
3. Fibre-Optic Cables
• Less expensive
• More secure
Fibre-Optic cable is a fast and reliable form of data transmission. Although light
travels in straight lines, a beam bounces off the sides of the fibre along its length.
à Radio waves- wireless signal sent over long distances from one tower to
another.
à Microwave- a wireless signal sent over short distances from one device to
another. Commonly used by WIFI routers and small wireless devices.
à Satellite Communication- communication between two locations on earth
via a satellite in the sky.
– Uploading: Uploading occurs when data from a storage device (e.g., disk) from
your computer is sent to another computer via communication channel.
Protocol- a set of rules that govern the transfer of data over a network.
Modulation
When digital data is sent over an analog form, the digital signal must be converted
to an analog form. Modulation is the name of this process. And the inverse is
known as demodulation.
Modem
This is a device that converts digital signals to analog and vice versa
It is measured in bits per second (bps)
Router
Hub
Network cards are hardware devices that connect a computer with the
network.
Computer data is translated into electrical signals sent to the network via
Network Interface Cards
Every network has a unique identifier called a Media Access Control
Communication Terms
Computer Security
Protection of computer systems and information from harm, theft and unauthorized
use.
Cybersecurity
Computer Misuse
Vulnerability
Threat
Attack
An information security threat that involves an attempt to obtain, alter, destroy,
remove information.
Countermeasure
à
Database Management
Definitions
à Database- consists of a number of related files or tables
Primary Key
à A field that cannot be duplicated. It is usually anything that holds the
customer ID or anything with a unique ID. Examples could be Student ID,
National ID.
Candidate Key
à Also, a primary key if it is unique. They are optional so some tables may
have several, none or one.
Composite Key
A primary key made up of two or more fields.
Foreign Key
à A normal key in one table and in another a Primary Key.
Forming a Relationship
Since tables have a field called a form, they can be linked in a relationship. The
linking of a table can occur in two ways.
¶ One-to-one (1:1)
This is a linking where the primary key in a table matches the primary in
another.
¶ One -to-many(1:M)
Occurs when one primary key in one table links with a foreign key or a
combined key in another table.
Structure of a Query
¶ Select: (the fields you want to look for)
¶ From: (The table you want to find the information)
¶ Where: (The criteria you are looking for in the fields)
Examples
¶ Select: Age, First name
¶ From: Employees
¶ Where: Age>18, first name=John
Problem Solving and Program Design
Algorithm
Keywords
These are instructions within a statement.
Conditional Statements
This allows decision to be made in programs. It includes deciding which
statements are to be executed and carry out.
Loops
This is useful for repeating parts of a program. This will be useful until the
condition is satisfied. Loops had conditions where it will decide if you will stay in
the loop or will leave it.
¶ Only characters, words or phrases that you want to appear on the screen
must be placed in a quotation mark.
Pseudocode Layout
Conditional Branching
This is used when there is a choice between two options. Two types of conditional
branching are:
à If then- which represents data that is true to the condition
à If else- represents data that is false to the condition.
IF-THEN Structure
If (the condition is true)
THEN (carry out one or more statements)
End if
IF-THEN-ELSE Structure
If (the condition is true)
Then (carry out one or more condition)
Else (carry out one or more condition)
ENDIF
Loop statements
There are two types
Indefinite- this is where you don’t know how many times the loop will run.
Examples are “while” and “repeats”
Definite- this is where you know in advance how many times it will repeat.
An example is “for loop”
While loop
This has a condition at beginning. The statements (body) are after. It will then
repeatedly execute one or more statement asking as the condition is true. Since
statement is after, there is a possibility where it will never run
Structure
while
end while
Repeat loop
This has conditions at the end. The statements (body) are before. It will execute
statement once condition its false. Since it’s at the end, the statement will always
be tested atleast once.
Structure
repeat
until
For loop
This is only used when the start value and end value are known
Flowcharts
Flowcharts Definition
There are algorithms that use symbols to display the output, input and processing
of data and information.
Rules for flowcharts
à Flowcharts must have a start and a stop symbol. These are called the
terminals or terminators.
à Use arrow heads or flow lines where the direction of flow may not be
obvious
à The flow sequence is the top of the page to the bottom.
à Processes only have one entry and one exit point.
Conditional Statements
If-Then Structure
If-Then-Else
While Loop
Repeat Loop
Arithmetic, Relational and Logical Operators
Arithmetic Operations
These perform basic mathematical operations such as addition, subtraction,
multiplication or division to produce a result.
Relational Operators
These compare two quantities with each other.
Logical Operators
There are 3 main logical operators: -AND, -OR, -NOT
¶ If the value of one condition is true, and the value of the other condition is
true, then the results of the condition is TRUE
¶ If the value of one condition is true, and the value of the other is false, then
the results will be FALSE
An example
Not operator explanation
¶ In this, the result of the condition has two options
¶ Examples:
If it is not True it is False
If it is not Yes, it is No
Or operator explanation
¶ If the value of one condition is true, the results is true
¶ However, if the value of all conditions is false, the value is false
Combined Operations
This is simply all the operators are combined, this if found in pseudocodes with
long expressions.
Programming Languages
à Low level Languages- These are machine dependent languages. This means
that the code or language written can only be understood by the processor or
computer.
à Assembly Language- This has the same structure and commands as machine
language but allows programmers to use abbreviated words, called
mnemonics, instead of binary.
à High Level Languages- These are not machine dependent. Therefore, they
use keywords similar to English and easier to write.
Programming Errors
à Syntax Errors- occurs when a mistake is made in the language rules or the
sentence structure of a program language. This can be caused by:
A word spelt incorrectly
Using wrong symbols as operators
Putting words in wrong order
à Run-time Errors- This occurs as the program complies or “runs” This can be
caused by:
Trying to divide by zero
Data type errors
Endless loop