Professional Documents
Culture Documents
Computer Studies 10 Notes
Computer Studies 10 Notes
GRADE 10
SENIOR SECONDARY
SUMMARISED NOTES
TABLE OF CONTENT
Page
Chapter 1: COMPUTER CAREER OPPORTUNITIES
1.1 Careers in Information and Communication Technology……………………...2
1.2 Opportunities for further Education in ICT…………………………………....2
Chapter 2: SOFTWARE
2.1 Application and System Software……..………………………………….....…2
2.2 Customise Software…….……………………………………………………...4
2.3 Software for people with Special Needs…………………………………….…6
2.4 Classification of Software……………………………………………………...6
Chapter 3: PROGRAMMING
3.1 Programming Languages...…………………………………………………….9
3.2 Program Structure……………………….……………………………………10
3.3 Code Simple Programs in Programming Languages (Pascal and C++)……...14
Chapter 4: DATA REPRESENTATION AND PROCESSING
4.1 Data and Information…………………………………………………………15
4.2 Data Collection and Preparation……………………………………………...16
4.3 Data Representation…………………………………………………………..18
4.4 Binary Arithmetic Operations…………………………………………...……21
4.5 Data Processing Cycle………………………………………………………..24
Chapter 5: HARDWARE OF COMPUTER SYSTEM
5.1 Hardware……………………………………………………………………..25
Chapter 6: OPERATING SYSTEM AND FILE MANAGEMENT
6.1 Operating System…………………………………………………………….37
6.2 File Management……………………………………………………………..38
Chapter 7: PRESENTATION PACKAGES
7.1 Introduction to Presentation Packages………………………………………..41
7.2 Creating Slides………………………………………………………………..42
7.3 Add Animation to Slides………...……………………………………………43
7.4 Formatting Slides……………………………………………………………..43
Chapter 8: GENERAL COMPUTER APPLICATIONS
8.1 Home Application…………………………………………………………….44
8.2 Office Application…………………………………………………………….44
8.3 Commercial Application……………………………………………………...45
8.4 Information System…………………………………………………………..46
Chapter 9: COMPUTER SECURITY
9.1 Computer Security Assets……………………………………………………46
9.2 Security Policies and Terminology…….……………………………………..46
9.3 Security Concerns and Threats……………………………………………….47
9.4 Computer Security Professionals……………………………………………..49
9.5 Computer Security Systems…………………………………………………..50
Chapter 2: SOFTWARE
Software is a set of instructions or programs that can be run on a computer.
Software can be divided into two types namely; application software and system
software.
Application software perform a specific set of tasks.
System software controls the operations of the computer and its devices.
- Application software are developed to make the more effective and efficient in
his or her job while system software serves as an interface between the user, the
application software and the computer hardware.
Examples of:
Application software System software
• Accounting software • Operating System (Windows and Linux)
• Spreadsheet software • Utility software (Antivirus)
• Word Processing software • Programming languages (C++)
• Photo editing software • Device drivers
• Scientific software • File management tools
Basic Programs which are bundled with the Windows Operating System are: Paint,
Snipping Tool and Calculator.
Application Software
Generic and Baspoke Software
Generic (also called General-purpose) software: is designed to do many different
tasks. It provides a great deal of flexibility. It is content free or little. The user develops
the content.
Examples:
• Word Processing • Spreadsheet • Database • Desktop Publishing
Advantages of Generic software
- It is cheaper as the cost is shared amongst many users.
- It is commonly available in shops.
- It can be bought and installed straight away.
- It is tried and tested.
- Training and support may be available from different service providers.
Disadvantages of Generic software
- It has high initial developing cost.
- It is less efficient.
- Revisions to the software can only be done by developers.
Customise Software
Customising a Word Processing and Desktop Publishing program using Macros
- A macro is a series of Commands that you can use to automate repeated task,
which can be run when you have to perform the task.
Functions of a Macro
• Adding the address and current date into a business letter.
• Routine editing and formatting.
• Creating a table of specific size with a specific number of rows and
columns.
To run a Macro
1. Click on the View tab and from the Macro options Click on View Macros.
Select the macro that you want to apply and click on the Run button.
A logical function allows you to produce different results depending on the outcome of
a condition.
Examples of logical functions:
1. IF Function:
=IF(test condition, value_if_true, value_if_false)
E.g. =IF(C3 > 40, "Pass", "Fail") or =IF(A1="Win","Gold","Silver")
2. SUMIF Function: to add only the values that meet a criteria condition.
E.g. people who are older than 15.
=SUMIF(range, criteria, [sum_range])
- Range refers to the cells that must be evaluated using the criteria.
- Criteria refers to a number, expression, or segment of text that defines which
cells will be added.
- Sum_range refers to the actual cells to add if their corresponding cells in the
range match the criteria.
• =SUMIF(B2:B6,">100") returns 596 (because it adds 124, 320 and 152 in the
range B2 to B6).
• =SUMIF(B2:B6,">110",C2:C6) returns 160 (because it adds 45, 70 and 45 in
the range C2 to C6 based on the values in column B that match the condition).
• =SUMIF(A2:A6,"Apples",B2:B6) returns 124 (because it adds the values in
column B when the item in column A is "Apples").
develop plans for new products and test their product design.
• Manufacturing software: assist with controlling and monitoring the
manufacturing process and manages the scheduling and control inventory.
• Sales software: enables salespersons to schedule appointments, manage
product information, take orders and manage contracts.
• Distribution software: tracks the distribution of inventory.
• Customer service software: manages the day-to-day functioning and
Communication with customers, such as phone calls, e-mail messages, web
interaction and instant messaging.
• Information and Communication Technology (ICT): staff use various
software procedures to maintain and secure the hardware and software.
7. Graphics software: it is used for the editing, creating, manipulating and viewing of
graphic files. Examples of image-editing programs are Paint and Illustrator and
photo-editing software, such as PhotoShop.
Examples:
• The creation of animated movies.
• Educational software and Interactive e-learning training courses.
• Multimedia artwork installations.
• Computer Simulation that help train people.
9. Web applications: they run on the Internet or an intranet using a web interface in a
web browser.
Examples of Web applications:
• Online games, such as World of Warcraft.
• Social networking applications, such as Facebook and Twitter.
• VoIP applications, such as Skype.
• Online storage, such as Google Drive.
• Blog facilities, such as Tumblr or Blogspot.
• Wikis, such as Wikipedia.
• Learning management systems, such as Moodle.
Advantages of Web applications:
- Create and share your work online.
- Collaboration on projects and documents online.
- It is used anywhere anytime.
- It is often free to use.
- No need of software updates.
- No need of using disk space.
Disadvantages of Web applications:
- You can not access your applications and documents if you don't have Internet
access.
- High security risks or threats.
- You have no control over software updates.
- It could be different to source custom software that is unique to a certain business
or organization.
- It is easy for the company secrets to be shared with people outside the company in
an online collaboration.
10. Mobile applications: they run on mobile phones, such as smartphones and tablet
computers, such as Apple iPad.
Device drivers: any device, such as a scanner, printer or mouse must have its drivers
Installed before you can use it. A driver (short for device driver) is a small program that
indicates to the Operating System (OS) how to communicate with a particular device.
The OS itself already has drivers for many devices. If the OS does not have a driver for
the device, then you have to install it from the CD that you received when you bought
the device.
Chapter 3: PROGRAMMING
Programming Languages (PL)
Programming languages is a set of grammatical rules for instructing a computer to
perform specific tasks. It is how people talk to computers.
Examples of PL: C++, Pascal, COBOL, Fortran, Java, Python, etc.
Program Structure
Program structure include:
1. Program header: it consists of a program name.
DAKAZ©2019 Grade10 COMPUTER STUDIES NOTES by: Daka Shadreck.
Contacts: 0978000816 / 0966256340 Email: shadreckthedakaz@gmail.com
P a g e | 11
2. Comments: are messages the programmer place in the source code to explain what a
section of code does. They are used to make program notes and to temporarily
exclude code that has a mistake.
E.g. Pascal ( * program to print Hello World * )
Data Types
The two forms of Data type are Pre-defined and User-defined data types.
Pre-defined data type is data type that is already defined internally while
User-defined data type is data type that is created by the user.
Reasons for defining your own Data Types:
• You find the pre-defined data type too long to type and you want to redefine
it with a shorter name.
• You want to use an easy-to-remember reference to the data type.
// declaration of variables
CH c1 ;
UNINT number1 ;
word mytext ;
C1 will store a character, number1 will store an unsigned integer, and
mytext will store a string of text up to 20 characters long.
Types of Variables
A variable is used as a placeholder in the computer memory in which certain values
can be stored.
• Real variables: are used to store real numbers.
• Character variables (char): are used to store characters, such as letters,
punctuation marks and other symbols.
• Integer variables (int): are used to store negative and positive numbers
including zero.
• Boolean variables: are variables that can only contain two values; TRUE or
FALSE . These variables are used for answering questions whose answer is yes
or no.
• Constants (const): A variable can also be declared constant using keyword const
so that its value can never be changed during program execution.
E.g. Const int a=500;
Declaration of Variables
Declaration is the process of creating a variable, stating what type of data it will store,
and giving it a name.
Variables need to be given a unique identifier name as follows:
- No spaces are allowed.
- They may contain letters, digits or the underscore character (_).
- Identifiers must always begin with a letter or underscore character but no a digit.
- They may not be a reserved word or a keyword.
Example of Valid Variable declaration
VAR no_days : INTEGER ;
price : REAL ;
name : STRING [10] ;
flag : BOOLEAN ;
Initialising Variables
Initialisation is the process of assigning a value to a variable.
Examples of initialised variables
Pascal BEGIN C++ int number ;
name : = ' Peter ' ; number = 10 ;
no_days : true ; OR
flag : = true ; int number = 10 ;
answer : = ' Y ' ;
END .
DAKAZ©2019 Grade10 COMPUTER STUDIES NOTES by: Daka Shadreck.
Contacts: 0978000816 / 0966256340 Email: shadreckthedakaz@gmail.com
P a g e | 14
C++ Code
You need a computer, Turbo C++ compiler. Compiler provides space in which to type
the programming source code and to create the executable program file.
How to write a Simple C++ program
• You must type with 100% accuracy.
• C++ is case sensitive and the use of upper-case and lower-case characters can
have very different meanings in the code.
• C++ ignores blank lines.
int main ( )
{
count<<"Hello World!" ;
return 0 ;
}
2. Save your program with a suitable filename.
3. Choose the Compile option from the Turbo C++ menu.
4. Choose the Run option to execute your program.
Data Errors
Data processing errors occur during data collection, when data is being captured for
processing and during processing.
Examples of Processing Data Errors
• Routing errors: e.g. the interviewer asks the wrong questions or asks questions
in a wrong order.
• Consistency errors: e.g. contradictory responses, such as a respondent
identifying himself as a male but indicating that he has given birth to two
children.
• Range errors: e.g. responses outside the range of reasonable answers, such as
an age of 190.
• Transpositions: e.g. 19 becomes 91 during data entry.
• Copying errors: e.g. 0 (zero) becomes the letter O during data entry.
• Coding errors: e.g. a gender is incorrectly coded because of changes to the
coding scheme.
2. Proofreading data: the second person checks the data entered against the
original document.
Data validation is the process of comparing data against a set of rules or values to
determine whether the data is valid.
Methods of Data Validation
1. Validation rules 3. Input masks 5. Combo boxes
2. Required fields 4. Specific file sizes 6. Default values
Sources of Data
• People • Barcodes
• Internet • Optical Mark Recognition (OMR)
• Ink Character Recognition (ICR) • Optical Character Recognition (OCR)
Data Representation
Data representation refers to the form in which data is stored, processed and
transmitted. Data can be represented using analogue and digital signals.
- The computer uses millions of electronic switches to represent data in only one of
two distinct states either OFF (0) or ON (1).
- Data is also stored in digital form on CDs, DVDs and flash memory Representing
data as 0s and 1s is known as the binary system.
- Computers use a sequence of unique 0s and 1s to represent each character as
defined by a coding scheme.
- A character is any letter, number, symbol or punctuation mark that you type onto
the computer.
Coding scheme is a Standard which tells the user’s machine which character represents
which set of bytes.
Examples of Coding Schemes that can represent 65 000 characters
• American Standard Code for Information Interchange (ASCII, pronounced
'ass-kee'): is sufficient for English and Western European languages, but is not
large enough for Asian languages and other languages that use different
alphabets.
• Unicode: is capable of representing almost all the world's current written
languages. It has 30 000 reserved codes for future expansion.
Units of Measurement
1024 bytes = 1 Kb (Kilobyte)
1024 Kb = 1 Mb (Megabyte)
1024 Mb = 1 Gb (Gigabyte)
1024 Gb = 1 Tb (Terabyte)
Expanded Notation
Steps: 1. Indicate the power of each digit in the number.
2. Write any expression by multiplying each digit by the base raised to the power
of the same digit.
Example: Write each of the following numbers in expanded notation:
(a) 100 (c) 1011.12 (e) 2AF.B16
(b) 5432.910 (d) 417.238
Solution:
(a) 12 01 0010 = 1×102 + 0×101 + 0×100
Solution:
(a) 13 02 11 10.1-12 = 1×23 + 0×22 + 1×21 + 1×20 + 1×2-1
= 1×8 + 0×4 + 1×2 + 1×1 + 1×0.5
= 8 + 0 + 2 + 1 + 0.5
= 11.5 or 11.510
2510 = 110012
(c)
Base Number Remainder
16 3 456
16 216 0
16 13 8
0 13 (D)
3 45610 = D8016
Solution:
(a) 128 64 32 16 8 4 2 1
9810 = 0 1 1 0 0 0 1 0
+ 7410 = +0 1 0 0 1 0 1 0
17210 = 1 0 1 0 1 1 0 0
1 1
9810 + 7410 = 10101100
An overflow has occurred.
(b) 128 64 32 16 8 4 2 1
910 = 0 0 0 0 1 0 0 1
- 510 = 0 0 0 0 0 1 0 1
= 1 1 1 1 1 0 1 0 {complement of -510}
Solution:
(a) 128 64 32 16 8 4 2 1
-8710 = 0 1 0 1 0 1 1 0
= 1 0 1 0 1 0 0 1 {complement of -87)
-7210 = 0 1 0 0 0 1 1 1
= 1 0 1 1 1 0 0 0 {complement of -72}
(b) 128 64 32 16 8 4 2 1
1910 = 0 0 0 1 0 0 1 1
- 6110 = 0 0 1 1 1 1 0 0
= 1 1 0 0 0 0 1 1 {complement of -61}
Therefore: 1910 = 0 0 0 1 0 0 1 1
- 6110 = + 1 1 0 0 0 0 1 1 1910 - 6110 = 11010110
- 4210 = 1 1 0 1 0 1 1 0 There is no overflow
DAKAZ©2019 Grade10 COMPUTER STUDIES NOTES by: Daka Shadreck.
Contacts: 0978000816 / 0966256340 Email: shadreckthedakaz@gmail.com
P a g e | 24
Exercise:
Work out the following in two's complement using 8 bits. Determine whether an
overflow has occurred.
1. 9910 + 2910 2. - 6310 - (- 3410)
Storage
• Input: acquiring or gathering data and entering it into the computer system using an
input device, such as keyboard, mouse, microphone, etc.
Examples of data input:
- Capturing the prices of items in a supermarket using a barcode reader.
- Gathering information using a form on a website.
- Typing recipes using your word processing program.
• Processing: manipulation of data into information by the Central Processing Unit
(CPU). All data that is currently being processed by the CPU is stored temporarily in
Random Access Memory (RAM) to speed up data processing and access.
• Storage: saving data or output for future use. Data and information can be stored on
internal hard drives, CDs, DVDs, Blu-ray, external hard drives (fixed and portable)
and USB flash.
• Output: presenting the information in the required format for the user. Output can be
in form of hardcopy, softcopy, audio or video.
• Communication: computers are able to send and receive information among
themselves. This information can be in form of e-mails, instant messaging (IM),
short text messaging (SMS), multi-media service (MMS), videoconferencing, blogs
and social networking.
Data Integrity
Data Integrity is the accuracy and consistency of data.
Factors that ensures Data Integrity
• Data validity • Data accuracy • Data consistency
• Data completeness • Data timelines
Factors that reduces Data Integrity
• Data errors • Data invalidity • Data inaccuracy
• Data incompleteness • Data inconsistency
Types of Mice:
Cable Right button
Keyboard
- A keyboard is an input device that contains keys (buttons) that the user presses to
enter data and information into a computer.
Uses of a Keyboard
- Entering (typing) data and information into a computer.
Advantages of a keyboard
- They are inexpensive.
- They come standard when buying a computer.
- Specialised keyboards are available.
Disadvantages of a keyboard
- User must learn how to type, or may not be accurate typists.
- Prolonged frequent use can cause Repetitive Strain Injuries (RSIs).
- They are difficult for people with paralysis or muscular disorders to use.
Scanners
Disadvantages of Scanners
- Images can take up a lot of memory space.
- Images lose some quality in the scanning process.
- The quality of the final image is dependent on the quality of the original image.
1 0 5 4 2
E O E O E
Even positions = 1, 5 and 2 Odd positions = 0 and 2
Step 2: Add together the digits in the odd positions and multiply them by 3.
Step 3: Add together the digits in the even positions.
Step 4: Add the two results (from step 2 and 3) together.
Step 5: Identify the next multiple of 10 after the result (sum) in step 4.
Step 6: Subtract the result in step 4 from the next multiple.
Example:
Calculate the check digit for the code 51043112017.
DAKAZ©2019 Grade10 COMPUTER STUDIES NOTES by: Daka Shadreck.
Contacts: 0978000816 / 0966256340 Email: shadreckthedakaz@gmail.com
P a g e | 29
Solution:
Step 1: Even position = 5, 0, 3, 1, 0, 7
Odd position = 1, 4, 1, 2, 1
Step 2: 1 + 4 + 1 + 2 + 1 = 9 then 9 × 3 = 27
Step 3: 5 + 0 + 3 + 1 + 0 + 7 = 16
Step 4: 27 + 16 = 43
Step 5: The next multiple of 10 after 43 is 50.
Step 6: Check digit = 50 – 4 = 7
NOTE: The check digit should be one of the digits in the code.
Exercise:
Calculate the check digit for each of the following codes:
1. 036000291452 2. 919867993567
Answers: 1. Check digit = 2
2. Check digit = 7
Touchpad
The touchpad is an input device which is used in a laptop. Its
function is to work as the mouse.
Braille Keyboard
A Braille Keyboard is a substitute for a normal keyboard, as blind people can't see
what they are typing, instead of having a printed letters on each button there are the
embossed system of Braille which the user can 'read' by touch.
Microphone
A microphone can be useful for people who find it difficult to use a keyboard or
mouse. People can say their input out loud and specialist software can be used to
DAKAZ©2019 Grade10 COMPUTER STUDIES NOTES by: Daka Shadreck.
Contacts: 0978000816 / 0966256340 Email: shadreckthedakaz@gmail.com
P a g e | 30
Eye Typer
This can be used by people who cannot use a hand or foot operated mouse and a
conventional keyboard. A webcam is mounted onto the computer and it is set to focus
on the user's eye. The camera determines where the user is looking and monitors
movements made by the eye. Mouse clicks are done with a slow eye blink.
Trackball
Trackballs that are similar to a computer mouse let’s you move the cursor on the
screen and click. You get a basic and an advanced trackball. These both reduce the need
to move your hands.
RAM ROM
Random Access Memory (RAM) also known as Main Memory or Primary Memory
or Temporary memory: It is volatile memory, meaning that its contents are lost when
the computer is switched off. RAM holds operating system instructions that control the
basic functions of the computer system.
Read Only Memory (ROM): It is non-volatile, meaning it doesn't lose its contents. It
stores data and information permanently, and has a small set of instructions called the
ROM BIOS (Basic Input/Output System). The ROM BIOS includes the start-up (boot)
instructions and data used when the computer is first switched on.
Cache Memory
Cache memory is a high-speed memory that is either stored as a block of RAM or
appears as memory on its own. It speeds up processing time. It is usually measured in
megabytes (MB). When a processor requires an instruction or data it first searches
cache memory. If they are not found in the cache memory, it searches the RAM. If is
not found, it searches the slower storage media, such as hard disks, CD or DVD.
Types of Registers
A register is a small high-speed locations that temporarily store data and information.
Registers are used when an instruction is fetched from memory, decided and then
executed.
• Memory address register (MAR) - holds the memory address of either the data
or instruction to be fetched from memory to the CPU, or the address to which
data will be sent and stored in memory.
• Instruction register (IR) - holds the current instruction to be executed.
• Program counter (PC) - keeps track of the memory address of the next
instruction in memory to be executed after the current instruction.
• Accumulator register (AR) - used for storing the results produced by the CPU
during processing.
• Memory data register (MDR) or Memory buffer register (MBR) - found in
the CU and used to store:
- The data or instruction fetched from memory.
- The data to be stored to memory.
DAKAZ©2019 Grade10 COMPUTER STUDIES NOTES by: Daka Shadreck.
Contacts: 0978000816 / 0966256340 Email: shadreckthedakaz@gmail.com
P a g e | 32
Step 1:
Fetch
Step 4: Step 2:
Store Decode
Step 3:
Execute
Step 1: Fetch. The instruction or data is fetched (collected) from memory by the CU.
Instruction address is copied from PC to MAR to MBR and then to IR.
Step 2: Decode. The CU can interpret the instruction stored in the AR, gather the
specified data or instruct the ALU to begin processing.
Step 3: Execute. Instruction is given out or executed. The ALU performs logical and
arithmetic calculations on the data and the results are stored in the AR. Results
to be stored in memory are moved from the AR to the MBR.
Step 4: Store. The content of the MBR is copied to memory if necessary.
In some computers, the processor fetches, decodes, executes and stores
one instruction at a time. The next instruction is processed only once the
current instruction's fetch-execute cycle is completed.
Today's personal computers support pipelining. Pipelining is when the
processor begins fetching a second instruction before it completes the fetching
cycle for the first instruction.
Output Devices
Output devices are used to communicate the results of data processing to the user (or
outside world).
- Softcopy output refers to electronic information that is displayed on screen.
- Hardcopy output refers to physically printed copy of information from your
computer.
Types of Output Devices
• Monitors • Headsets • Projector • Speakers
• Printers • Fax machine • Fax modems
Printers
A printer produces a hardcopy or physical copy of text and graphics.
DAKAZ©2019 Grade10 COMPUTER STUDIES NOTES by: Daka Shadreck.
Contacts: 0978000816 / 0966256340 Email: shadreckthedakaz@gmail.com
P a g e | 33
An impact printer produces a copy using a mechanism that hits against an inked
ribbon, which in turn strikes the paper. A non-impact printer produces a copy without
physically striking the paper. Non-impact printers are faster and quieter than impact
printers.
Types of Printers
Laser Printer
A laser printer is a non-impact printer that operates by shining a laser beam to produce
an image on a drum. The drum is then rolled in tonner (powdered ink). Using a
combination of heat and pressure, the ink is transferred to the paper. A laser printer is a
high-speed, high-quality printer. It is expensive to buy, but cheaper than Inkjet per
printed page. Colour laser printers combine tonner colours to produce an image, but are
expensive to run.
Monitors
A monitor is a device that displays text, graphics and videos, and is a visual window
for the user.
Two types of Monitors
Cathode Ray Tube (CRT) monitors - are yesterday's technology for ordinary PC
users. They are popular amongst graphic artists and typesetters because of their crisp
Images.
Liquid Crystal Display (LCD) monitors - are flat-panel displays that use liquid
crystal technology. They are popular amongst PC users because they are flicker-free,
take up less space and are available in larger sizes. Their screen sizes are measured
diagonally from the bottom left corner to the right corner of the screen. The quality of
the monitor depends on its resolution.
Pixels
A pixel is the smallest unit of a digital image. A monitor with a resolution of 800×600
displays 800 pixels per horizontal inch and 600 pixels per vertical inch to create an
image on the screen.
Factors that determine the quality of a Monitor
• Resolution - is the degree of fineness. The more the pixels in a monitor the
better the resolution.
• Screen size - screen must match its resolution.
• Refresh quality - is the speed with which a CRT monitor redraws an image on
the screen. It is measured in hertz (Hz).
• Pixel response time - is a measure of how long it takes for a pixel change
colour, measured in milliseconds (ms). Ghosting occurs when an image is
etched permanently on a monitor's screen.
Projectors
A projector displays information from a computer onto any large flat surface.
Types of Projectors
Data projector receives signals from a computer and project them as images onto a
screen, a wall or any flat surface. It is used for presentations, lectures, interactive
learning and demonstrations for a large audience due to its clear images.
LCD projector uses its own light source to display the information shown on the
computer screen. It produces low-quality images.
Digital light processing (DLP) projectors use tiny mirrors to reflect light, which
produces sharper, brighter and more colourful images. Their displays can be seen
clearly in a well-lit room.
Plotter
Plotters is an output device and a kind of printer which is used to print the vector
graphics. It uses mostly pencil, pen or marker instead of the
toner.
Headsets Speakers
Headsets and Speakers can be useful for visually impaired people. Text is converted
into speech and can be output via the headset or speaker in a sound format.
Storage Devices
Storage medium is the physical material on which to store data, Instructions and
information. E.g. Internal and External hard disks, CDs, DVDs and USB flash drives.
Storage device is a hardware component that records and/or retrieves items to and from
a storage medium. E.g. CD/DVD writer records and retrieves information to and from a
CD or DVD.
• Internal hard disks: store different types of data, information and programs.
Capacity ranges from 350 GB to 2 TB. They can also be used for Backups.
• Portable (External) hard disks: are used by mobile users and for backups. Capacity
ranges from 350 GB to 4 TB. They need to be handled with care because they have
moving parts.
• USB flash drives: are small, fast, able to store a large amount of data, and reliable
because they don't have moving parts. Capacity ranges from 1 GB to 128 GB.
• Compact disc (CD): is an optical storage medium that uses laser technology to read
and record data. Capacity is about 700 MB. CDs have a lifespan of 50 years.
- A CD-ROM is a read-only format that can be read by any number of times.
- A CD-R (CD recorder) allows the user to write to a section of the disc and later
write to another section of the disc.
- A CD-RW (CD rewriteable) allows the user to write and erase multiple times.
- A CD-ROM drive can only CDs.
- A CD-RW drive can read from and write to CDs.
- LightScribe burns a title to a CD or DVD that has been specially treated.
• Digital Versatile discs or Digital Video discs (DVDs): are optical storage media
that use laser technology to read and record data. DVDs stores images with higher
quality and greater speed than CDs. They also have a lifespan of 50 years. Capacity
ranges from 4.7 GB to 17 GB.
- A DVD-RW disk drive can read from and write to DVD.
- A Blu-ray player is required for high-definition DVDs. In Blu-ray format you
can record, rewrite and play back high-definition video.
• Memory cards: are found in digital devices, such as cameras, cellphones,
MP3/MP4 players. Capacity ranges from 8 MB to 32 GB.
Magnetic storage devices are magnetic disks that uses different patterns of
magnetisation to store data. Information is accessed using one or more read/write
heads.
Examples: - Hard disks/drive - Floppy disks - Magnetic tapes are
Solid state storage device have no moving parts and separate media not necessary to
read or write heads.
Examples: - Memory sticks (such as Flash/USB/Jump drives and memory cards or
SD cards)
GUI CLI
Graphical User Interface (GUI): lt uses windows, icons, menus and mouse pointers
and mouse clicking (selecting, dragging or opening icons).
Examples of GUI System software
• Microsoft Windows 7, 8 or 10 • Chrome OS • Linux (like Ubuntu)
Advantages of GUI
- It is easy to use suitable for beginners.
- It has drag and drop features for folders.
- We can detect eyes and finger movement which is helpful for disabled.
Disadvantages of GUI
- It is difficult to develop and high cost. - It requires extra attention.
- It is lower than Command Line Interface. - It consumes a lot of space.
GUI Applications
- Web browser - Email messager - Music, games and video player
Command Line Interface (CLI): It is text based. It displays a prompt; the user types a
command on the keyboard and executes the command.
Examples of CLI Application software
• Shall displays the data on the screen.
• Console application used via a text only.
Advantages of CLI
- It is good for expert users. - It is very flexible with use of switches (options).
DAKAZ©2019 Grade10 COMPUTER STUDIES NOTES by: Daka Shadreck.
Contacts: 0978000816 / 0966256340 Email: shadreckthedakaz@gmail.com
P a g e | 38
File Management
A Folder is a logical representation of a location where you can store files or other
folders. Folders help people to organise their computer documents for quicker and
easier access. A folder within another folder is known as a subfolder.
A Directory is a system classification that contains a set of computer files and other
folders. Files and Folders are viewed in a hierarchical format.
• A root directory is the top of a directory hierarchy on a storage medium.
• A file path identifies the location of a file on a storage medium.
Example of a file path: C:\Users\ICT\Global.docx
Advantages
- Less access time.
- Transaction need not to be sorted.
- Existing records can be amended or modified.
- Very easy to handle random enquiries.
- Most suited to interactive Online applications.
Disadvantages
- Data may be accidentally erased or overwritten.
- Risks of loss of accuracy and breaches of security.
- Less efficient use of storage space.
- Expensive hardware and software are required.
- High complexity in programming.
Backup Utilities: enable users to make copies of certain files or the entire hard disk to
another disk or other storage medium. Backups must be kept in a different location
(off-site) or in fireproof safe.
How to make a Backup
(i) Click the Start button to open the backup utility, then select Control Panel.
Type
backup in the search box and then click Backup and Restore.
(ii) Select the appropriate action to perform.
Restoring Data
- Restoring data means the act of recovering data from a backup.
- A restore point is a snapshot of your computer settings; is a backup of the
Windows Registry.
How to use Restore Points
(i) Click on the Start button and type system restore in the search box.
(ii) Select the appropriate action to perform.
• Reading view - allows you to see the slide full screen as it would appear when
running the slide show.
• Slide show - it is used to run the show so that you see the slides without any of
the Ribbon or other Window elements showing.
• Previous - displays the previous viewed slide.
• Next - displays the next slide to be viewed.
Creating Slides
To create a Slide
1. Click inside the placeholder and type in the title and the subtitle.
To add Slides to a Presentation
1. Click on the New Slide menu on the Home tab and choose the layout you require
for the new slide. OR
2. Press Ctrl + M on the keyboard.
Slide Layouts
Formatting Slides
Slides are in landscape orientation by default.
To apply a Theme to a Slide
- A theme consists of a combination of backgrounds, colour set combinations and
font sets.
- Themes provide uniformity and help to make a presentation look colourful
and professional.
1. Select the Design tab and choose from the many themes available in the
Themes group.
2. Right-click on a theme to choose how to apply it.
Office Applications
Office Equipment
- Computer - Printers - Photocopier - Scanners
- Fax machine - LCD projectors - Telephone
Office automation, such as computer and telephone systems – improves employee
productivity and efficiency and assists with communication amongst employees.
Office Communication
• Office Information System (OIS) - enables employees to perform tasks using
computers and other electronic devices in organisations.
• Intranets - are internal or private networks that uses Internet technology to
facilitate communication between people or work-groups to improve data sharing
and the overall knowledge base of an organisation's employees.
Examples of Intranets: - Viewing company benefits.
- Policies
- Internal telephone directions.
- Calendar for the year.
DAKAZ©2019 Grade10 COMPUTER STUDIES NOTES by: Daka Shadreck.
Contacts: 0978000816 / 0966256340 Email: shadreckthedakaz@gmail.com
P a g e | 45
• The Internet is the world's largest computer network. It can also be used for
communication.
• Voice over Internet Protocol (VoIP) is the latest way of making phone calls.
Regular voice calls are sent via computer networks rather than ordinary
telephone networks. Businesses use VoIP because costs are low.
• The Mobile Office operates away from the office. Mobile users often have a
laptop computer and cellphone to talk to colleagues and clients, and access
e-mails and the Internet.
Advantages: - Time flexibility - Decreased expenses
- Location flexibility - Improved productivity
Disadvantage: It may intrude on your personal time when communicating with
colleagues across time zones.
• The Virtual Office takes the mobile office a step further. Your business is run
using mobile technology without a formal office space. Computers needed for
virtual office are a laptop, a modem or router for Internet access, a cellphone and
a fax machine or fax-to-e-mail.
Decentralisation of Labour
Employees work from home (known as teleworking or telecommuting) or from a place
other than the traditional work-place, using Internet, e-mails, fax and phone services.
An employee log into the company network to access data over the Internet.
Advantages
- Employees can work more flexible hours.
- There is no wasted time traveling to work.
- Business save on Office space.
- Business benefit from a decrease in employee absenteeism.
Disadvantages
- Employees must own the required ICT devices.
- Meetings are dependent on video and teleconferencing technology.
- There is less direct and personal interaction among fellow employees and
clients.
Commercial Applications
• Point-of-Sale (POS) is a Computerised system that captures sales where the
transaction occurs. It is a combination of a cash register, a printer and a barcode
reader. Some POS systems are web-enabled allowing them to update stock at other
locations.
• Stock Control is a Computerised system which ensures that stock is ordered and
maintained in the correct quantities.
Importance of Stock Control
- It ensures there are enough raw materials to meet planned production.
- It allows a company to buy in bulk at lower prices.
- Holding stock is a safeguard against price increases.
- It helps to identify the cheapest and fastest suppliers.
DAKAZ©2019 Grade10 COMPUTER STUDIES NOTES by: Daka Shadreck.
Contacts: 0978000816 / 0966256340 Email: shadreckthedakaz@gmail.com
P a g e | 46
Information Systems
Industrial uses of Computers
• Improving the accuracy of the processes, such as designing clothing, creating
patterns or embroidering designs in textile industry.
• The use of automation and robotics in mining industry.
• For gaming, music composition, greeting cards and stimulations in entertainment
industry.
• For beverage, liming and cement production in manufacturing industry.
Technical uses of Computers
• For electronic transaction systems.
• For intelligent traffic systems.
• For data and telecommunication.
Scientific uses of Computers
• For carrying out scientific research.
• Scientists use computers to model data and make predictions, e.g. predicting
weather conditions.
• Scientists use computers for solving complex mathematical equations.
• Web access policy - specifies who may access the Internet and what may be
accessed on the Internet.
• Data encryption policy - states which, if any, documents or files must be
encrypted and how they will be encrypted. Encryption is the process of making
data unreadable.
• Privacy policy - specifies the protection of both employees and clients.
• Disaster recovery policy - specifies measures of recovering lost items.
• Data backup policy - specifies ways of backing up data.
• Workstation protection policy or Physical resources protection policy -
specifies ways of protecting physical resources at the workstation.
- Log out or Log off is the process by which the user end or stop the
access to the system.
Measures to prevent Unauthorised access
- Force all the users to change their passwords regularly.
- Educate all users on password security and correct password choice.
- Important and confidential data should be encrypted.
- The computer system or network must be protected by a firewall.
7. Theft of Data and Hardware
Prevention of Computer equipment theft
- Put burglar alarms and burglar bars.
- Security guards to search everyone entering and leaving venues containing
computer equipment.
- Access controlled areas that require PIN codes or biometric scans.
- Locks and cables that lock equipment to permanent fixtures.
Prevention of Computer data theft
- Encrypt important data.
- Use strong password on important data.
- Use firewall to prevent unauthorised access.
- Disabling DVD drives and USB ports so that data can not be copied on to
portable media.
- Limiting access to e-mails and Internet.
8. Cloud storage
• Cloud computing is the use of online software applications and storage on
the Internet.
Issues an organisation needs to consider when using Cloud storage
- Trust an external service provider with the security of your data.
- If you have no Internet access, you have no access to your data.
- If you have important data stored in the cloud, any employee with access to
this storage can access the data from anywhere in the world.
9. Loss of portable storage devices - such as memory sticks and external hard
disks, are very easy to lose and break.
Prevention of loss and breaking of portable devices
- Keep them away from fire and water or moisture.
- Store them in safe place to avoid breaking them.
10. Gaining unauthorised control of Surveillance system
• Surveillance is a close observation of an individual or group of people or
persons under suspicion.
• Computer hacker - tests for weak points in the system security in order to fix the
security problem.
• Other jobs related to computer system security include:
- Computer crime investigator.
- Ant-virus and ant-spyware software developer.
- Disaster recovery expert.
6. User Operation Prohibition (UOP) is a feature that prohibits the user from
performing certain functions parts of a DVD or Blu-ray disc. This is used to
protect one from skipping legal disclaimers or advertisements.