Professional Documents
Culture Documents
Computer Studies
Computer Studies
By
George Affainie
January 2021
1
First Day in Class
Table of Content
1 Introduction to the World of Computers .............................................................. 1
1.1 Objectives................................................................................................................... 1
1.2 Computers in the Home .............................................................................................. 1
1.3 Computers in Education ............................................................................................. 2
1.4 Computers on the Go ................................................................................................. 2
1.5 Computers on the Job ................................................................................................ 3
1.6 What is a Computer and What Does it Do? ................................................................ 4
1.7 Computers Then and Now .......................................................................................... 4
1.8 Data vs. Information.................................................................................................... 9
1.9 Hardware .................................................................................................................... 9
1.10 Software ....................................................................................................................10
1.11 Computer Users ........................................................................................................11
1.12 Computers to Fit Every Need.....................................................................................12
1.13 Computer Networks and the Internet .........................................................................18
1.14 Computers and Society .............................................................................................19
1.15 Summary ...................................................................................................................20
2 System and Program Development .................................................................... 21
2.1 Objectives..................................................................................................................21
2.2 System ......................................................................................................................22
2.3 Information system ....................................................................................................22
2.4 System Development Life Cycle (SDLC) ...................................................................23
2.5 Program Development Life Cycle (PDLC)..................................................................25
2.6 Flow Chart and Algorithms Development ...................................................................26
2.7 Flow Chart .................................................................................................................28
2.8 Number Line ..............................................................................................................28
2.9 Summary ...................................................................................................................33
3 Computer Hardware and Software ..................................................................... 34
3.1 Objectives..................................................................................................................34
3.2 Machine Language, Assembly Language and High-Level Language ........................34
3.3 Number Systems .......................................................................................................35
3.4 Examples of Number Systems ...................................................................................38
3.5 Exercises: Number Systems ......................................................................................39
i
Table of Content
ii
Table of Content
iii
First Day in Class
⚫ Teaching Resources
▪ My Recorded Videos
▪ Videos from Youtube
▪ Our Digital Library
▪ Main Text Book
Recommended Book
⚫ Understanding Computers, Today and Tomorrow by Deborah Morley, Charles
S. Parker, 16th Editions
George Affainie
iv
Computer Studies I Chapter 1
1.1 Objectives
⚫ Computers in your life
⚫ What computers are, how they work, and how they are used
⚫ Computer terminology
⚫ An overview of the history of computers
⚫ The basic types of computers in use today
⚫ An overview of networks and the Internet
⚫ Societal impacts of computers
– Exchanging e-mail
– Playing games
– Telecommuting
• Wireless networking
• Smart appliances
• Smart homes
• Distance learning
– ATM transactions
– Self-checkout systems
– M-commerce systems
• Basic operations
– Input: Entering data into the computer
– Processing: Performing operations on the data
– Output: Presenting the results
– Storage: Saving data, programs, or output for future use
– Communications: Sending or receiving data
– Example
• Abacus
• Mechanical machine with gears and levers
• Electromechanical device using both electricity and
gears
• Abacus, slide rules, mechanical calculators and
Dr. Herman Hollerith’s Punch Card Tabulating Machine
and Sorter
– Input
• Punched card
– Output
• Punched card and paper
– Examples:
• ENIAC (Electronic Numerical Integrator and Computer)
• UNIVAC (UNIVersal Automatic Computer 1)
– Input
• Punch card and magnetic tape
– Output
• Punch card and paper
– Storage
• Magnetic tape and disk
– Language
• High-level programming
– Input
• Keyboard
– Output
• Monitor
– Storage
• Magnetic disk
– Example
• IBM PC, Apple Macintosh
– Input
• Use keyboards, mice, Other devices are now available
– Output
• Monitor and printers, Other devices are now available
– Storage
• Magnetic disks, memory chip, flash memory and optical
discs
– Infancy stage
– No precise classification
• Data
• Information
• Information processing
1.9 Hardware
Parts of Computer
– Internal hardware
– External hardware
Input devices
Processing devices
Output devices
Storage devices
Communication devices
1.10 Software
• Application Software
• Editing photographs
• Scheduling appointments
• Recording/playing CDs/DVDs
• Designing homes
• Playing games
– Home user
– Mobile users
– Power users
– Embedded computers
– Mobile devices
– Personal computers
– Midrange servers
– Mainframe computers
– Supercomputers
– Household appliances
– Thermostats
– Sewing machines
– Cars
• Examples:
– Smartphones
Smartphones
Midrange Servers
Mainframe Computers
1.12.9 Supercomputers
Supercomputers
• The vast improvements in technology over the past decade have had
a distinct impact on daily life, both at home and at work
• Information Integrity
– Check your source, not all information on the Internet is accurate
1.15 Summary
⚫ Computers in your life
⚫ What computers are, how they work, and how they are used
⚫ Computer terminology
⚫ An overview of the history of computers
⚫ The basic types of computers in use today
⚫ An overview of networks and the Internet
⚫ Societal impacts of computers
2.1 Objectives
⚫ Overview of systems and its elements
⚫ System Development Life Cycle (SDLC)
⚫ Program Development Life Cycle (PDLC)
2.2 System
• Information system
• Each phase of the system development life cycle produces some type of
documentation to pass on to the next phase
• System design: The systems analyst develops a model of the new system
and prepares a detailed list of benefits and costs
• Program Development Life Cycle (PDLC): The steps involved when a new
program needs to be created or modifying an existing program
• Program development often begins with the system specifications that are
developed during the analysis and design phases of the SDLC
• Each step of the PDLC produces some type of documentation to pass on to the
next step. The documentation consists of details about what the program does and
how it works
• Problem analysis: In this phase the problem is carefully considered and the
program specification are developed
• Program coding: In this phase the program code is written using a programming
language
• Program debugging and testing: This phase ensures the program is correct and
works as intended
Algorithms
• Algorithms
o The actions to execute
o The order in which these actions execute
• Program control
o Specifies the order in which actions execute in a program
o Performed in programming with control statements
4.3 Pseudocode
• Pseudocode
o Artificial, informal language used to develop algorithms
▪ Used to think out program before coding
• Easy to convert into Computer program
o Similar to everyday English
▪ Only executable statements
• No need to declare variables
o Not executed on computers
• Pseudocode for the addition program of two integers
https://cloud.smartdraw.com/
if ( x 3)
f ( x) = x 2 + sin 2 x
else if ( x == 3)
f ( x) = 10.3 x
else
f ( x) = x 3 − cos 3x
Control Structures
• Sequential execution
o Statements executed in sequential order
• Transfer of control
o Next statement executed is not the next one in sequence
• Structured programming
o Eliminated goto statements
• Only three control structures needed
o No goto statements
o Three control structures
▪ Sequence structure
• Programs executed sequentially by default
▪ Selection structures
• if, if…else, switch
▪ Repetition structures
• while, do…while, for
if Selection Statement
• Selection statements
o Choose among alternative courses of action
o Pseudocode example
▪ If student’s grade is greater than or equal to 60, print “Passed”
• Hence
• if selection statement
o Performs action if condition is true
• Pseudocode
o If student’s grade is greater than or equal to 60
print “Passed”
Pseudocode algorithm that uses counter-controlled repetition to solve the class average problem.
2.9 Summary
⚫ Overview of systems and its elements
⚫ System Development Life Cycle (SDLC)
⚫ Program Development Life Cycle (PDLC)
⚫ Basic problem-solving techniques
⚫ Control Structures
⚫ Sequence Structure
⚫ Selection Structure
▪ if Selection Statement
▪ if...else Double-Selection Statement
⚫ Repetition Structure
▪ while Repetition Statement
3.1 Objectives
⚫ Computer languages
⚫ Number systems used by the computers
⚫ Overview of information unit and file storage
⚫ Making computers faster and better
– Machine language
• Only language computer directly understands
– “Natural language” of computer
– Defined by hardware design
• Generally, consist of strings of numbers
– Ultimately 0s and 1s
• Instruct computers to perform elementary operations
• Cumbersome for humans
• Example
– +1300042774
+1400593419
+1200274027
– Assembly language
• English-like abbreviations representing elementary
computer operations
• Clearer to humans
• Incomprehensible to computers
– Convert to machine language by translator
programs (assemblers)
• Example
– Load basepay
add overpay
store grosspay
– High-level language
• Similar to everyday English
– Uses common mathematical notations
• Single statements accomplish substantial tasks
• Converted to machine language by translator programs
(compilers)
• Interpreter programs
– Directly execute high-level language programs
– Execute more slowly than the compiled
program
• Example
– grossPay = basePay + overTimePay
3.4.1 Question 1
Show that these equivalent exits.
Binary number Octal equivalent Hexadecimal equivalent
100011010001 4321 8D1
Solution
Octal equivalent
100 011 010 001
4 3 2 1
Hexadecimal equivalent
1000 1101 0001
8 D 1
3.4.2 Question 2
Convert binary number below to decimal
110101
Solution
Positional values: 32 16 8 4 2 1
Symbol values: 1 1 0 1 0 1
Products: 1*32 = 32 1*16 = 16 0*8 = 1*4 = 4 0*2 = 0 1*1=1
0
Sum of Products: = 32 + 16 + 0 + 4 + 0 + 1 = 53
3.4.3 Question 3
Convert octal number below to decimal
7614
Solution
3.4.4 Question 4
Convert hexadecimal number below to decimal
AD3B
Solution
Questions 2
Convert binary 110101011000 to octal and to
hexadecimal
Questions 3
Convert hexadecimal FACE to binary
Questions 4
Convert octal 7316 to binary
Questions 5
Convert hexadecimal 4FEC to octal
Hint: First convert 4FEC to binary and then convert
that binary number to octal
Questions 6
Convert binary 1101110 to decimal
Questions 7
Convert octal 317 to decimal
Questions 8
Convert hexadecimal EFD4 to decimal
Questions 9
Convert decimal 177 to binary, to octal and to
hexadecimal
3.7.1 Question 1
Convert binary 110101011000 to octal and to
hexadecimal
Solution
Octal equivalent
6 5 3 0
Hexadecimal equivalent
D 5 8
3.7.2 Question 2
Convert hexadecimal FACE to binary
Solution
Hexadecimal
F A C E
Binary equivalent
F A C E
= 1111101011001110
3.7.3 Question 3
Convert octal 7316 to Binary
Solution
Binary Equivalent
7 3 1 6
3.7.4 Question 4
Convert hexadecimal 4FEC to octal
Hexadecimal
4FEC
Binary equivalent
4 F E C
Octal equivalent
4 7 7 5 4
3.7.5 Question 5
Convert binary 1101110 to decimal
Solution
Position values: 64 32 16 8 4 2 1
Symbol value: 1 1 0 1 1 1 0
= 64 + 32 + 8 + 4 + 2 = 110
3.7.6 Question 6
Convert octal 317 to decimal
Solution
Positional Values: 64 8 1
Symbol Value: 3 1 7
= 192 + 8 + 7 = 207
3.7.7 Question 7
Convert hexadecimal EFD4 to decimal
Solution
Symbol Value: E F D 4
3.7.8
3.7.9 Question 8
Convert decimal 177 to binary, to octal and
hexadecimal
Solution
Decimal
177
Binary equivalent
177 R
2 88 1
2 44 0
2 22 0
2 11 0
2 5 1
2 2 1
1 0
Octal equivalent
2 6 1
Hexadecimal equivalent
1011 0001
B 1
0 0 0 0 0 0 0 0
… … … … … … … …
1 1 1 1 1 1 1 1
• 1 byte = 8 bits
• 1 byte = 256 decimal value ( 28 = 256 )
– Stores a binary number from 0 to 255
• Byte terminology
– Used to express the size of documents and other files,
programs, etc.
• Prefixes are often used to express larger quantities of bytes
– Kilobyte (KB), megabyte (MB), gigabyte (GB), terabyte (TB),
etc.
• For comparison
– Tightly written A4 page
• Contains about 3,000 – 4,000 characters
– Book manuscript of about 300 pages stored on a PC
• Will amount 1 – 2 MB
– A song on normal music CD
• Usually takes up about 40 - 50 MB
3.13 Summary
⚫ Computer languages
⚫ Number systems used by the computers
⚫ Overview of information unit and file storage
⚫ Making computers faster and better
4.1 Objectives
• Internet searching
• While Internet has become a household word only during the past
two decades, it has operated in one form or another for much
longer than that
• Most members of the Internet community fall into one or more of the
following groups:
– Music/movie downloads
• e.g. FTP
– Consists of:
• Protocol or standard being used
• Identification of the Web server
• Protocols:
– The @ symbol
• Search site: Web page that helps you find Web pages containing
the information you are seeking
• Selecting an ISP
⚫ Office 365 includes online versions of the Office applications: Word, Excel,
PowerPoint, Outlook, Publisher, Access and OneNote
⚫ Office 365 exists in the cloud, allowing you to access your Office
applications and files from anywhere. Because they exist in the cloud; the
software always automatically stays up to date
⚫ Office 365 includes options for accessing and managing the following
items: Outlook, Calendar, People, Newsfeed, OneDrive, Sites and Tasks
⚫ OneDrive is a file hosting service that allows you to upload and sync your
Office files to Office 365’s cloud storage
⚫ To edit a document opened in the cloud, you can use the online versions
of the Office app, or the desktop version
⚫ When working with the online version of the Office apps, files are
automatically saved to the cloud
Product Categories
⚫ Applications
⚫ Search
⚫ Advertising
⚫ Enterprise
⚫ Mobile
4.18.2 Applications
• Google’s Application includes Google Apps for Non-Profits, Google Docs,
Google Calendar, Google Contacts, Google Talk, Google Friend Connect,
Google Webmaster Central, Blogger, Google Checkout, Google Groups,
Google Reader, Google Site, Google Translate, Google Voice, Picasa 3,
YouTube - Nonprofit Program, Google Health, Google Profile, Google Latitude,
iGoogle Start Page, Google Web Elements, Google Chrome and Google Gears
4.18.4 Advertising
• Google’s Advertising include Google Analytics and Google Adwords
4.18.5 Enterprise
• Google’s Enterprise include Google Earth Pro, Google SketchUp Pro, Google
Appliances and Google Mini
– Used by families
– Precautions:
• Be sure all e-commerce activities are performed via a
secure Web server (https://)
• Online auctions: Bids are placed for items, and the highest
bidder purchases the item
– Online portfolios
– Avoid brokers
– Advantages
• News sites
• Reference sites
• Online writing
– Wikipedia is largest
• Carefully evaluate content, as
irresponsible individuals can enter
erroneous information
4.26 E–Health
– Maintain list of doctors and dentists to help you find the one
that fit your needs
• Be polite
4.28 Summary
• Internet searching
5.1 Objectives
⚫ Why Be Concerned about Network and Internet Security?
⚫ Unauthorized Access and Unauthorized Use
⚫ Protecting Against Unauthorized Access & Unauthorized Use
⚫ Computer Sabotage
⚫ Protecting Against Computer Sabotage
⚫ Online Theft, Online Fraud, and Other Dot Cons
⚫ Protecting Against Online Theft, Online Fraud, and Other Dot Cons
⚫ Personal Safety Issues
⚫ Protecting Against Cyberbullying, Cyberstalking, and Other Personal
Safety Concerns
– Facilities
– Computer networks
– Databases
• Can be:
– Usernames
– Passwords
– Smart cards
– RFID-encoded badges
– Magnetic cards
• Often used:
5.5 Encryption
• Look for a locked padlock on the status bar and https:// in the
URL
• Only transmit credit card numbers and other sensitive data via
a secure Web server
• Malware
• Types of Malware
– Work-at-home cons
– Pornographic sites
– Watch your bills and credit report to detect identity theft early
– Antiphishing tools built into Web browsers can help warn you
of potential phishing sites
– Are also used with secure Web sites to guarantee that the
site is secure and actually belongs to the stated individual or
organization
• Online pornography
5.11 Censorship
• Censorship issues
5.15 Summary
⚫ Why Be Concerned about Network and Internet Security?
⚫ Unauthorized Access and Unauthorized Use
⚫ Protecting Against Unauthorized Access & Unauthorized Use
⚫ Computer Sabotage
⚫ Protecting Against Computer Sabotage
⚫ Online Theft, Online Fraud, and Other Dot Cons
⚫ Protecting Against Online Theft, Online Fraud, and Other Dot Cons
⚫ Personal Safety Issues
6.1 Objectives
⚫ Ethics
⚫ Computers and Health
6.2 Ethics
• DeQuervain’s tendonitis
(mobile device keyboard and thumbpad use)
– Backaches
6.7.1 Ergonomics
– Many jobs require computer use now than didn’t in the past
– Information overload
6.8 Summary
⚫ Ethics
⚫ Computers and Health
Chapter 7 Keywords
Chapter 1 Introduction to the World of Computer
Application Software: The programs that enable users to perform specific task on a
computer such as writing a letter or playing a game.
Computer Network: A collection of computers and devices that are connected together
to share hardware, software and data as well as to communicate electronically with one
another.
Hardware: The physical part of a computer system such as the keyboard, monitors,
printer and so forth.
Input: The process of entering data into a computer can also referred to the data itself.
Internet Appliance: A device designed only for viewing web pages and/or exchanging
e–mail.
Internet: The largest and the most well know computer network, linking millions of
computers all over the world.
Midrange Server: A medium-sized computer used to host programs and data for a small
network.
Mobile Device: A very small device usually based on a wireless phone or pager, that
has some type of computing or Internet capability built in.
Network Computer (NC): A PC designed to access a network for processing and data
storage, instead of performing those tasks locally.
Notebook: A fully functioning portable PC that opens to reveal a screen and keyboard.
Output: The process of presenting the results of processing, can also referred to the
result themselves.
Processing: Performing operation on data that has been input into a computer to convert
that input to output.
Programmer: A person who primary job responsibility is to write, maintain and test
computer programs.
Software: The instruction, also called computer programs that is used to tell a
computer what it should do.
Storage: The operation of saving data, programs, or output for future use.
Super Computers: The fastest, most expensive and most powerful type of computer.
System Software: Programs, such as the operation system, that control the operation
of a computer and its devices as well as enable application software to run on the PC.
Tablet PC: A portable PC about the size of a notebook that is designed to be used with
an electronic pen.
Chat room: An Internet service that allows multiple users to exchange written
messages in real time.
Desktop: The background work area displayed on the screen when using Microsoft
Windows or another operating system with a graphical user interface.
Dialog box: A window that requires the user to supply information to the computer about
the task being requested.
Electronic mail (e-mail): Electronic messages sent from one user to another over the
internet or other network.
Graphical User Interface (GUI): A graphical based interface that allows a user to
communicate instructions to the computer easily.
Hyperlink: Text or an image located on a web page or other document that is linked to
the web page or other type of document.
Icon: A small picture or other type of graphical images that represents a program,
command, or document and invokes some action when selected.
Instant messaging (IM): A form of private chat set up to allow users to easily and
quickly exchange real-time typed messages with the individuals they specify.
Internet telephony: The process of placing telephone calls over the Internet.
Menu: A set of options (usually text-based) that can be displayed on the screen to enable
the user to issue commands to the computer.
Microsoft Windows: The most common Operating System for IBM and IBM-Compatible
PC.
Operating system: A type of system software that enables a computer to operate and
manage its resources and activities.
Scroll bar: A horizontal or vertical bar that appears along an edge of a window not large
enough to display its entire content; scroll bars are used to view the rest of the information
in the window.
Search site: A Web site designed to help users search for Web pages that matches
specified keyword or selected categories.
Start menu: The main Windows menu that is used to start programs.
Task button: A button displaced on the taskbar to present an open window, using this
button, the window can be minimized, restored or closed.
Taskbar: The bar located at the bottom of the Windows desktop that contains the start
button and the system tray.
Utility Program: A type of software that performs a specific task, usually relate to
management and maintaining the Computer System.
Video Conferencing: The use of computers, video cameras, microphone and other
communication technology to conduct face to face meeting over the Internet.
Web Server: A computer that is continually connected to the Internet and hosts web
pages that are accessible through the Internet
Windows: A rectangular area in which programs, documents and other contents are
displayed.
World Wide Web: The collection of Web pages available through the ssInternet.
Bandwidth: The amount of data that can be transferred in a given period of time; also
referred to as throughput.
Byte: A group of 8 bits; in ASCII and EBCDIC, it holds a single character of data.
Central processing unit (CPU): The chip located inside the system unit of a computer
that perform the processing of a computer.
Decimal numbering system: The numbering system that represents all numbers
using ten symbols.
Flash memory: A type of non-volatile memory that can be erased and reprogrammed,
commonly implemented in the form of sticks or cards.
Motherboard: The main circuit board of a computer, located inside the system unit, to
which all computer system components connect.
Multi-core CPU: A CPU that contains the processing components or core of more
than one processor in a single CPU.
Optical computer: A computer that uses light, such as from laser beams or infrared
beams, to perform digital computations.
Port: A connector on the exterior of a PC's system unit to which a device may be attach.
Random Access Memory (RAM): Chips located on the motherboard that provide a
temporary location for the computer to hold data and programs instruction while they are
needed.
ROM (Read Only Memory): Non-erasable chips located on the motherboard into which
data or programs have been permanently stored.
System unit: The main box of a computer that houses the CPU, motherboard, memory,
and other devices.
Unicode: A coding system for text-based system using any written language.
USB (Universal Serial Bus): A universal bus used to connect up to 127 peripheral
devices to a computer without requiring the use of additional expansion cards.
Chapter 4 Storage
BD (BIu-ray Disc): A high-capacity (typically 25 MB or 50 MB) that is often used to
deliver high definition movies, as well as to store user data.
BD-ROM disc: A Blu-ray Disc that can be read from, but not written to, by the user.
CD (compact disc): A low capacity (typically 650 MB) optical disc that is often used
to deliver music and software, as well as to store user data.
CD-ROM disc: An optical disc, usually holding about 650 MB that can be read but not
written to by the user.
DVD disc: A medium capacity (typically 4.7 MB or 8.5 MB) optical disc that is often
used to deliver software and movies, as well as to store user data.
DVD-ROM disc: An optical disc, usually holding 4.7 GB that can be read, but not written
to by the user.
Filename: A name given to a file by the user that is used to retrieve the file at a later
time.
Flash memory card: A small, rectangular type of flash memory media, such as a
compactFlash or Secure Digital Card.
Flash memory drive: A small drive that usually plugs into a PC's USB port and
contains flash memory medium.
Flash memory stick: A type of flash memory media about the size of a stick of gum.
Flash memory: Non-volatile memory chips that can be used for storage by the
computer or user; can be built into a computer or a storage medium.
Storage 100
Computer Studies I Keywords
Floppy disk drive: A storage device that reads from and writes to floppy disks.
Floppy disk: A low-capacity, removable magnetic disk made of flexible plastic inside a
hard-plastic cover.
Hard disk drive: A storage system consisting of one or more metal magnetic disks
permanently sealed with an access mechanism inside its drive.
Hard drive: The primary storage system for most computers; used to store most
programs and data used with a computer.
Magnetic disk: A storage medium that record data using magnetic spots on disk made
of flexible plastic or rigid metal.
Magnetic hard drive: A hard drive consisting of one or more metal magnetic disks
permanently sealed, with an access mechanism and read/write heads, inside its drive.
Magnetic tape: A plastic tape with a magnetizable surface that stores data as a series
of magnetic spots; typically comes in a cartridge.
Non-volatile: Describes a storage medium that retains its contents when the power is
shut off.
Online storage: Remote storage devices accessed via the Internet; also called
cloud storage.
Optical disc: A type of storage medium read from and written to using a laser beam.
Optical drive: A drive used with optical discs, such as CD or DVD discs.
Remote storage: A storage device that is not directly a part of the PC being used, such
as Network storage or online storage.
Smart card: A credit-card-sized piece of plastic containing a chip and other circuitry into
which data can be stored.
SSD (solid-state drive): A hard drive that uses flash memory media instead of metal
magnetic hard disks.
Storage device: A piece of hardware, such as a floppy drive or CD drive, into which a
storage medium is inserted to be read from or written to.
Storage medium: The part of a storage system where data is stored, such as a floppy
disk or CD disc.
USB flash drive: A small storage device that plugs into a USB port and contains
flash memory media.
Volatile: Describes a medium whose contents are erased when the power is shut off.
Storage 101
Computer Studies I Keywords
Bar code: A machine readable code that represents data as a set of bars.
Cathode Ray Tube (CRT) monitors: A display device that projects images onto a
display screen using a technology similar to the one used with conventional TVs.
Data projector: A display device that projects all computer output to a wall or projection
screen.
Digital camera: An input device that takes pictures and records them as digital data
(instead of film or videotaped) images.
Display screen: A display device built into a notebook computer, netbook, UMPC, or
another device.
Ink-jet printer: An output device that sprays droplets of ink to produce images on paper.
Joystick: An input device that resembles a car’s gear shift and is often used for gaming.
Laser printer: An output device that uses toner powder and technology similar to that
of a photocopier produce images on paper.
LCD (Liquid Crystal Display): A type of flat panel display that uses charged liquid
crystals to display images.
Output device: A piece of hardware that accepts output from the computer and present
it in a form the user can understand.
Pixel: The smallest colourable area in an electronic image, such as a scanned document
digital photograph, or image displayed on a display screen.
Pointing device: An input device that moves on onscreen pointer, such as an arrow or
insertion point, to allow the user to select objects on the screen.
Pointing stick: An input device shaped like a pencil eraser that appears in the middle
of some notebook computer keyboards and is used as a pointing device.
Portable printer: A small, lightweight printer designed to be used while on the go.
RFID (Radio Frequency Identification): A technology used to store and transmit data
located in RFID tags.
RFID tag: A device containing a tiny chip and a radio antenna that is attached to an
object so it can be identified using RFID technology.
Scanner: An input device that reads printed text and graphics and transfers them to a
computer in a digital form.
Trackball: An input device, similar to an upside-down mouse that can be used to control
an onscreen pointer and make selection.
Voice-input system: A system that enables a computer to recognize the human voice.
Voice-output system: A system that enables a computer to play back or imitate the
human voice.
Backup: A duplicate copy of data or other computer contents for use in the event that
the original version is destroyed.
Command line interface: A user interface that requires the user to communicate
instructions to the computer via typed commands.
DOS (Disk Operating System): The operating System designed for a widely use in
early IBM and IBM-compatible PCs.
File compression program: A program that reduces the size of files, typically to be
stored or transmitted more efficiently.
File management programs: A utility program that enables the user to perform file
management task, such as copying and deleting files.
GUI (Graphical User Interface): A graphically based interface that allows a user to
communicate instructions to the computer easily.
iPhone as (Apple): The operating system designed for Apple mobile phones and
mobile devices.
Linux: A version of UNIX that is available without charge over the Internet and is
increasing being used with PCs, servers, mainframes, and supercomputers.
Mac OS: The operating system for Apple's Macintosh line of computers.
Mac: The operating system used on Apple computers; the most recent version as of
this printing is Mac OS.
Mobile operating system: A type of operating system used with mobile phones and
other mobile devices.
Palm web OS: The newest operating system designed for Palm devices.
Palm OS: The operating system designed for Palm handheld PCs.
Search tool: A utility program designed to search for files on the user's hard drive.
System software: Programs, such as the operating system that controls the operation
of a computer and its devices, as well as enables application software to run on the PC.
UNIX: A multiuser, multitasking operating system developed in the 1970s for midrange
servers and mainframes.
Utility Program: A type of software that performs a specific task, usually related to
managing and maintaining the computer system.
Windows Explorer: The file management program built into the Windows operating
systems.
Windows Mobile: A family of operating systems based on Windows and designed for
handheld PC, smart phones and other mobile devices.
Database software: Application software that allows the creation and manipulation of
an electronic database.
Function: A named formula that can be entered into a worksheet cell to perform some
type of calculation or to extract information from other cells in the worksheet.
Insertion point: An onscreen character that indicates the current location in a document,
which is where the next change will be made to the document.
Label: A text-based entry in a worksheet cell that identifies data on the worksheet.
Multimedia: The integration of a variety of media such as text, graphic, video, animation
and sound.
Open source software: Software programs whose source code is made available to
the public.
Public domain software: Copyrighted software that is distributed on the honour system;
should be either paid for or to be uninstalled after the trial period.
Shareware: Software that is not copyrighted and may be used without restriction.
Slide: One-page presentation graphic that can be displayed in a group with others to
form an online slide show.
Spreadsheet: A group of values and other data organized into rows and columns.
Web-based software: Software that is delivered on demand via the Web; also
referred to as Software as a Service (SaaS) and cloudware.
Web-Based Training (WBT): Instruction delivered on an individual basis via the World
Wide Web.
Word processing software: Application software used to create, edit, save, and print
written documents.
Word processing: Using a computer and word processing software to create edit, save
and print written documents such as letters, contracts and manuscripts.
Word wrap: The feature found in a word processing program that automatically return
the insertion point to the next line when the end of the screen line is reached.
Antenna: A device used for receiving or sending radio signals; often used to
increase the range of a network.
Biometric device: A device that uses the recognition of some unique physical
characteristic (such as a person's fingerprint, face, or voice) to grant access to a computer
network or physical facility.
Cellular phone: A mobile phone that communicates via a cellular network; also
called a cell phone.
Computer Network: A collection of computers and other hardware devices that are
connected together to share hardware, software, and data, as well as to communicate
electronically with one another.
Digital signal: A type of signal where the data is represented by 0s and 1s.
Dual-mode phone: A mobile phone that can be used with more than one
communications network, such as with both a cellular and Wi-Fi network.
Global Positioning System (GPS): A system that uses satellites and a receiver to
determine exact geographic location of the receiver.
Intranet: A private network that is set up similar to the World Wide Web.
Local Area Network (LAN): A network that connects devices located in a small
geographical area, such as within a building.
Mobile phone: A phone, such as a cellular or satellite phone that uses a wireless
network.
Network Adapter: A network interface, such as and expansion card or external network
adapter.
Online Conferencing: A real-time meeting that takes place between people in different
locations via computers and communications media.
Router: A device on a network that sends data via the most efficient route to travel to
a specific location.
Serial Transmission: Data transmission in which every bit in a byte must travel down
the same path in succession.
TCP/IP: The communications protocol that uses packet switching to facilitate the
transmission of messages; the protocol used with the Internet.
Telecommuting: The use of computer and electronic devices to enable and individual
to work from him or her home.
Virtual Private Network (VPN): A group of secure paths over the Internet that provide
authorized users a secure means of accessing a private network via the Internet.
Wide Area Network (WAN): A network that connects devices located in a large
geographical area.
WiMAX: An emerging wireless networking standard that is faster and has a greater
range than Wi-Fi.
Wired Network: A network in which a computer and other devices are connected to the
network via physical cables.
Wireless network: A network in which computers and other devices are connected to
the network without physical cables.
ARPANET: The predecessor of the Internet, named after the Advanced Research
Projects Agency (ARPA), which sponsored its development.
Blog: A web page that contains short, frequently updated entries in chronological order,
typically by just one individual, also called a web log.
BoF (broadband over fiber) Internet access: Very fast, direct Internet access via
fiber-optic networks; also referred to as fiber-to-the-premises (FTTP) Internet access.
Cable Internet access: Fast, direct Internet access via cable TV lines.
Conventional dial-up Internet access: Dial-up Internet access via a conventional dial-
up modem and standard telephone line.
Cookie: A small file stored on a user's hard drive by a Web server; commonly used to
identify personal preferences and settings for that user.
DSL Internet access: Fast, direct Internet access via standard telephone lines.
Fixed wireless Internet access: Fast, direct Internet access available in large
metropolitan area via the airwave and a radio transceiver.
Internet Service Provider (ISP): A business or other organization that provides Internet
access to others, typically for a fee.
Internet: The largest and most well-known computer network, linking millions of
computers over the world.
ISDN Internet access: Dial-up internet access that is faster than conventional dial-up,
but still uses standard telephone lines.
Keyword: A word typed in a search box on a search site or other Web page to locate
information related to that keyword.
Online auction: An online activity for which bids are placed on items and the highest
bidder purchases the item.
Podcast: A recorded audio or video file that can be played or downloaded via the
Web.
Portal Web page: A Web page designed to be designated as a browser home page;
typically, can be customized to display personalized content.
Portal: A web site that supplies timely or useful content in hopes of enticing visitors to
use the site several times a day.
Satellite Internet access: Fast, direct Internet access via airwaves using a satellite dish
and satellite modem.
Search engine: A software program used by a search site to retrieve matching Web
pages from a search database.
Search site: A Website designed to help users search for Web pages that match
specified keyword or selected categories.
Twittering: Sending short status updates about your current activities via the
Twitter service.
VoIP (Voice over Internet Protocol): The process of placing telephone calls via the
Internet.
Web conference: A face-to-face meeting taking place via the Web, typically uses
video cameras and microphones to enable participants to see and hear each other.
Web service: A self-contained business application that operates over the Internet.
Wi-Fi hotspot: A location that provides wireless Internet access to the public.
World Wide Web: The collection of Web pages available through the Internet.
Compiler: A language translator that converts an entire program into machine language
before immediately executing it.
Logic error: A programming error that occurs when running a program produces
incorrect result.
Low-level language: A class of programming languages that are highly detailed and
machine dependent.
Object code: The machine-language version of a computer program generated after the
program's source code is compiled.
Programmer: A person whose job it is to write, tests, and maintain computer programs.
Programming language: A set of rules, words, symbols and codes used to write
computer programs.
Syntax error: A programming error that occurs when the programmer has not followed
the rules of the programming language.
E-mail filter: A tool that automatically sorts your incoming e-mail messages based on
specific criteria.
E-mail spoofing: The forgery of an e-mail header so that the message appears to
have originated from someone or somewhere other than the actual source.
Employee monitoring: Observing or reviewing employees’ action while they are on the
job.
Identity theft: Using someone else's identity to purchase goods or services, obtain
new credit cards or bank loans, or otherwise illegally masquerade as that individual.
Information privacy: The rights of individuals and companies to control how information
about them is collected and used.
Opt out: To request that you be removed from marketing activities or that your
information should not be shared with other companies.
Phishing: The use of spoofed e-mail messages to gain credit card numbers and
other personal data to be used for fraudulent purposes.
Secure Web page: A Web page that uses encryption to protect information
transmitted via that Web page.
Spam filter: An e-mail filter used to redirect spam from a user's Inbox.
Surge suppressor: A device that protects a computer system from damage due to
electrical fluctuation.
Throw-away e-mail address: An e-mail address used only for non-essential purposes
and activities that may result in spam; the address can be disposed and replaced if spam
becomes a problem.
VPN (virtual private network): A private, secure path over the Internet that provides
authorized users a secure means of accessing a private network via the Internet.
War driving: Driving around an area with a Wi-Fi-enabled computer or mobile device
to find a Wi-Fi network to access and use without authorization.
Code of conduct: A policy, often for a school or business that specifies allowable use
of resources such as a computers and other equipment.
Code of ethic: A policy, often for an organization or industry that specify overall moral
guidelines adapted by that organization or industry.
Computer hoax: An inaccurate statement or story spread through the use of computers.
Copyright: The legal right to sell, publish, or distribute an original artistic or literary
work; is held by the creator of a work as soon as it exists in physical form.
CTS (carpal tunnel syndrome): A painful and crippling condition affecting the hands
and wrist that can be caused by computer use.
Cybersquatting: The act of registering a domain name with the intent to profit from
the goodwill of a trademark belonging to someone else.
DeQuervain's tendonitis: A condition in which the tendons on the thumb side of the
wrist are swollen and irritated.
Digital divide: The gap between those who have access to technology and those who
don't.
Digital watermark: A subtle alteration of digital content that isn't noticeable under
normal use, but that identifies the copyright holder.
Ergonomic hardware: Hardware typically input and output devices, that is designed
to be more ergonomically correct than its non-ergonomic counterparts.
Ergonomics: The science of fitting a work environment to the people who work there.
Intellectual property rights: The rights to which creators of original creative works
(such as artistic or literary work, inventions, corporate logos, and more) are entitled.
Internet addiction: The problem of overusing, or being unable to stop using, the
Internet.
Repetitive stress injury (RSI): A type of injury, such as carpal tunnel syndrome, that
is caused by performing the same physical movements over and over again.
B. Sc (ELECTRICAL ENGINEERING)
B. Sc (COMPUTER ENGINEERING)
B. Sc (MARINE ENGINEERING)
B. Sc (NAUTICAL SCIENCE)
BCE 103
END OF SEMESTER EXAMINATION
COMPUTER STUDIES 1
QUESTION 1
Explain in your own words what the following terms mean: [2 Marks Each]
a) Backup
b) Information
c) Internet Service Provider (ISP)
d) Operating System
e) Unauthorized access
f) Central Processing Unit (CPU)
g) Domain name
h) Uniform Resource Locator (URL)
i) Unauthorized use
j) Spam
QUESTION 2
a) Convert the binary number 11101101111011to its decimal equivalent: [5 marks]
b) Convert the decimal number 1278 to its binary equivalent: [5 marks]
c) Convert the binary number 10101101011011 to its octal equivalent: [5 marks]
d) Convert the hexadecimal number D2AE to its binary equivalent: [5 marks]
QUESTION 3
a) Name the two organizations that created the network now called the internet.
[4 marks]
b) Explain how computer data travels over telephone lines. [6 marks]
c) If you need to download a 350 KB file and have a 56 kbps conventional dial-up
modem, how long should it take to download the file? What real-world conditions might
affect this download times? [6 marks]
d) List the two services the internet provides its users. [4 marks]
QUESTION 4
a) Give three examples of internet security risks? [6marks]
b) How do we secure our business transactions? [5marks]
c) How do we secure our email messages? [5marks]
d) How do we obtain a digital signature? [4 marks]
QUESTION 5
a) To secure files on your PC, so they are unreadable to a hacker, who might gain
access to your PC, what type of encryption (public or private key) would be most
appropriate? Explain. [6 marks]
b) List two precautions that individuals can take when purchasing items via an online
auction to avoid loss due to online auction fraud. [4 marks]
c) Briefly describe the safeguards a company could use for each of the following
threats to its computer system.
(i) Power failure of on-line systems [5 marks]
(ii) Disk corruption [5 marks]
QUESTION 6
a) When you have finished using a computer for the day, is it Ok to just turn it off by
pressing the power button. Why or why not? [6 marks]
b) If your Personal Computer seems sluggish, list two things you could do to try to
speed it up without resorting to purchasing an entirely new system. [4 marks]
c) Explain the purpose of an Uninterruptible Power Supply (UPS) and how it differs in
function from a surge suppressor. [4 marks]
d) Name three computer related activities that result in a threat to personal privacy.
[6 marks]
QUESTION 1
Explain in your own words what the following terms mean: [2 Marks Each]
a) Backup ANS: A duplicate copy of data or other computer contents for use in the
event that the original version is destroyed.
b) Information ANS: Data that has been processed into a meaning form
c) Internet Service Provider (ISP) ANS: A business or other organization that
provides Internet access to others, typically for a fee
d) Operating System ANS: A type of system software that enables a computer to
operate and manage its resources and activities
e) Unauthorized access ANS: Gaining access to a computer, network, file, or other
resource without permission.
f) Central Processing Unit (CPU) ANS: The chip located inside the system unit of
a computer that perform the processing of a computer.
g) Domain name ANS: A text-based Internet address used to uniquely identify a
computer on the internet.
h) Uniform Resource Locator (URL) ANS: An Internet address, usually beginning
with http://, that uniquely identifies a web page.
i) Unauthorized use ANS: Using a computer resource for unapproved activities.
j) Spam ANS: Unsolicited, bulk e-mail sent over the Internet
QUESTION 2
a) Convert the binary number 11101101111011 to its decimal equivalent:
[5 marks]
ANS:
Conversion of 111011011110112 to base 10
Position 213 212 211 210 29 28 27 26 25 24 23 22 21 20
Value
Binary 1 1 1 0 1 1 0 1 1 1 1 0 1 1
3 Marks
Binary number:
10101101011011
Dividing them into groups of three: 10 101 101 011 011 1 marks
Converting each group to base 10: 2 5 5 3 3
Converting to base 8
11099 R
8 1387 3
1 Mark
8 172 3
8 21 5
8 2 5
Hexadecimal D 2 A E
Decimal 13 2 10 14
Binary 1101 0010 1010 1110
2
13 10 14
2 1 R0
2 6 R1 2 5 R0 2 7 R0
2 3 R0 2 2 R1 2 3 R1
2 1 R1 2 1 R0 2 1 R1
13 = 11012 2 = 00102 10 =
10102 10 = 11102
½ Mark ½ Mark ½ Mark ½ Mark
Hence
D2AE16 = 1101 0010 1010 11102 1 Mark
QUESTION 3
a) Name the two organizations that created the network now called the internet.
[4 marks]
ANS:
1. ARPANET (Advanced Research Projects Agency (ARPA)) 2 Marks
2. National Science Foundation (NSF) 2 Marks
c) If you need to download a 350 KB file and have a 56 kbps conventional dial-up
modem, how long should it take to download the file? What real-world conditions
might affect this download times?
[6 marks]
ANS:
56 kb -------- 1 second 2 Marks
350 kb -------- 1 * 350 / 56 = 6.25 seconds 2 Marks
Conventional dial-up bandwidth is shared by all the users in the area. As a result,
download time may increase during high usage periods. 2 Marks
d) List the two services the internet provides its users. [4 marks]
ANS:
1. Download Web pages 2 Marks
2. Send e-mail messages. 2 Marks
3. Transfer files
QUESTION 4
ANS:
We get digital signature if we encrypt a document with our private key. 4 marks
QUESTION 5
a) To secure files on your PC, so they are unreadable to a hacker, who might gain
access to your PC, what type of encryption (public or private key) would be most
appropriate? Explain. [6 marks]
ANS:
Public-Key encryption and Private Key encryption can be used in maintaining the
Confidentiality of data in your PC by encrypting the data.
In this situation Private key encryption is best for encrypting the data. 3 marks
It is faster and easier to implement. 3 marks
b) List two precautions that individuals can take when purchasing items via an
online auction to avoid loss due to online auction fraud. [4 marks]
ANS:
1. Read thoroughly to understand all the conditions about the purchase. 2 marks
2. Look for secure shipping by making sure that when you go to pay for your
purchase, are you taken to a URL that begins with "https 2 marks
3. Check seller's reviews
4. Research!
5. When you are ready to make a purchase from a regular vendor, just take the
time to do a quick search engine search and see what is being said about them
6. Save everything: When you purchase anything online, always keep any
correspondence that you have with the vendor. You may want to archive it in
your email or you may wish to print it. This is something that can make a huge
difference if you run into some kind of trouble.
7. Stay in contact
8. When you want to figure out if a vendor is reliable, don't hesitate to email them a
question about the product. Do they respond promptly and are they able to
answer your questions thoroughly?
c) Briefly describe the safeguards a company could use for each of the following
threats to its computer system.
QUESTION 6
a) When you have finished using a computer for the day, is it Ok to just turn it off
by pressing the power button. Why or why not?
[6 marks]
ANS:
It is not Ok to do that. 2 marks
This is because computer needs time to tidy up its work before shutting down.
1. This may include closing all files safely so that it does not loose information
2 marks
2. Running updates 2 marks
3. Putting itself into the most stable and secure state before shutting down so that it
can starts again normally when powered on later on.
b) If your Personal Computer seems sluggish, list two things you could do to try
to speed it up without resorting to purchasing an entirely new system.[4 marks]
ANS:
1. Get more RAM. 2 marks
2. Install and scan the computer with reliable antivirus software and make sure that
it is regularly updated. 2 marks
3. Use System Tools such as Disk Cleaner and Disk Defragmenter to put the disc in
best shape.
4. Use System Restore tool to put the computer to the previous best state.
c) Explain the purpose of an Uninterruptible Power Supply (UPS) and how it differs
in function from a surge suppressor. [4 marks]
ANS:
An Uninterruptible Power Supply (UPS) contains surge protection circuits and one or
more batteries that can:
1. Provide power during an under voltage.
2. Also to protect against accidental hardware damage
3. Provide a proper storage media care. 2 marks
A Surge Protector or Surge Suppressors uses special electrical components to:
1. Smooth out minor noise
2. Provide a stable current flow
3. Keep an over voltage from reaching the computer. 2 marks
Chapter 9 References
⚫ Understanding Computers, Today and Tomorrow by Deborah Morley, Charles S.
Parker, 16th Editions
⚫ http://www.individualsoftware.com/?product=professor-teaches-office-2016-
windows-10
⚫ Google Tools, presented by Tim Hite, Resource Coordinator, Info Line / 2-1-1
Summit, Akron, OH
References 131