Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

SECOND TERM SCHEME OF WORK FOR SS3

WEEK 1 TOPIC / CONTENTS


1 HIGH LEVEL LANGUAGES ( H.L.L )
- DEFINE HIGH LEVEL LANGUAGES
- STATE EXAMPLES OF HIGH LEVEL LANGUAGES
- CLSSIFY GINHLSED O SUITABLE APPLICATION
- CLASSIFY HLL AS INTERPRETED OR COMPILED
LANGUAGES
- IDENTIFY THE FEATURES OF SOME HLLS
- STATE ADVANTAGES OF HLLS OVER ML AND LLL
WEEK 2.OVER VIEW OF NUMBER BASES
- LIST DIGITS IN THE NUMBER BASES
- CONVERT FROM ONE NUMBER BASE TO ANOTHER
- ADD AND SUBTRACT IN THE NUMBER BASE
WEEK 3 DATA REPRESENTATION
- DEFINE DATA REPRESENTATION
- LIST METHODS OF DATA REPRESENTATION
- REPRESENT DATA IN DIFFERENT CHARACTER SETS.
WEEK4.SECURITY AND ETHICS
- SOURCES OF SECURITY BREACHES IN COMPUTER
NETWORK.
VIRUS, WORMS, CARELESSNESS, HACKERS.
- STATE PREVENTIVE MEASURE AGAINST SECURITY
BREACHES
USE OF ANTI VIRUS,FIRE WALL,ENCRYPTION E.T.C.

1|Page
- STATE ISSUES OF LEGAL IMPORTANCE TO CONSIDER
WHEN USING ICT.
(COPY RIGHT, OWNERSHIP RIGHTS,WEB CONTENT,
PIRACY SOFWARE,CYBER CRIMES)
WEEK 5. REVISION
WEEK 6. EXAMINATION.

2|Page
DEFINITION OF PROGRAMMING LANGUAGE
Programming Language can be defined as an artificial language that can
be used to control the behavior of a machine.

DEFINITION OF HIGH LEVEL LANGUAGE


A high-level language is any programming language that enables
development of a program in a much more user-friendly programming
context and is generally independent of the computer's hardware
architecture.
A high-level language is programming language that, in Comparison to
low level
Programming languages may be more abstract, easier to use or more
portable across platforms.
EXAMPLES OF HIGH LEVEL LANGUAGES
COBOL ------------------- Common Business oriented Language
FORTRAN---------------- Formula Translation
PASCAL
C+++
PROLOG Program in Logic.
JAVA
ALGOL Algorithm Language
BASIC Beginners All Purpose Symbolic Instruction
Code.
SNOBOL String –Oriented Symbolic Language

3|Page
Visual Basic
Visual C
LISP List Processing.
APL A programming Language.
RPG Report Program Generator
CLASSIFICATION OF HIGH LEVEL LANGUAGES BASE ON
SUITABLE APPLICATION
(1) Scientific Algebraic Formula Type Processing: for solving
mathematical and statistical problem.
Examples are; BASIC, FORTRAN, ALGOL, APL.
(2) Business Data Processing: For maintaining data processing
procedures and files handling problems.
Examples are: COBOL, RPG.
(3) Artificial Intelligence (AI) String and List Processing: they
are used for String manipulation.
Examples are: LISP, PROLOG.
(4) Object Oriented Programming Language
Examples are: C++, JAVA.
(5) Special Purpose Programming Language:
Examples are: SNOBOL.
(6) General purpose programming language: they are used for
general purpose programming.
Examples are: C, PASCAL, PL/I (programming Language Version 1).
(7) Visual Programming Language: they are design for building
Windows based applications.
Examples are: Visual Basic, Visual Java, and Visual C.

4|Page
CLASSIFICATION OF HIGH LEVEL LANGUAGE INTO
INTERPRETED AND COMPILED
Interpreted: Interpreted languages are read and then executed directly,
with no compilation stage.
Examples are: BASIC, ASP, LISP, and LOGO.
Compiled Languages are transformed into an executable form before
running.
Examples are PASCAL, COBOL, C and FORTRAN.
FEATURES OF SOME HIGH LEVEL LANGUAGES
HIGH LEVEL LANGUAGES FEATURES
FORTRAN Uses mathematical notation
Ideal for Scientific applications.
COBOL Ideal for business applications.
It is English - like.
Easily handles disk and tape features.
BASIC Interactive.
Easy to learn.
Uses mathematical notation.
It can use for business and scientific
problems.
PASCAL Scientifically oriented.
Focuses on structured programming
techniques.
C General Purpose
Structured programming language.
Procedural language.
Designed for implementing system
software.

ADVANTAGES OF HIGH LEVEL LANGUAGE


 They are easier to maintain.
5|Page
 They are user friendly.
 They are easier to learn.
 They require less time to write.
 They are problem oriented.
 Program written can be translated into many machine languages.
 It is Independent of the machine on which it is used.

ASSIGNMENTS / EXERCISES
1. Classify High Level Language into Seven (7) with two example
each.
2. Write the full meaning of the following Languages:
BASIC,COBOL.FORTRAN,LISP, PROLOG
3. What is High Level Language?
NUMBER SYSTEMS
Definition for Number Systems
Number system is the collection of numbers together with operations,
properties of the operations, and a system of representing these numbers.
TYPES OF NUMBER SYSTEMS
(1) BINARY NUMBER SYSTEMS (BASE 2).
Base 2 has two digits, 0 and 1.
(2) OCTAL NUMBER SYSTEMS (BASE 8).
Base 8 has eight digits, 0- 7.
(3) DECIMAL NUMBER SYSTEMS (BASE 10).
Base 10 has ten digits, 0-9.
(4) HEXADECIMAL NUMBER SYSTEMS (BASE 16).
Base 16 has 16 digits, 0-15.

6|Page
CONVERSION FROM ONE NUMBER BASE TO
ANOTHER
(A) USING THIS TABLE
BINARY OCTAL
000 0
001 1
010 2
011 3
100 4
101 5
110 6
111 7

Example 1: Convert 11100101 to base 8. Group binary digits into


sets of three, starting with the rightmost digits and pad the most
significant digits with zero to complete.
Solution: Binary 11100101 = 011 100 1012
Octal = 3 4 5 = 3458
CONVERSION FROM BINARY TO DECIMAL NUMBER SYSTEMS.

CONVERSION FROM BINARY TO HEXADECIMAL NUMBER SYSTEMS.

USE THIS TABLE


BINARY HEXADECIMAL
0000 0
0001 1
0010 2
0011 3
0100 4
0101 5
0110 6
0111 7
1000 8

7|Page
1001 9
1010 A
1011 B
1100 C
1101 D
1110 E
1111 F

Example 1: Convert 11100101 to hexadecimal. Group binary digits


into sets of four, starting with the rightmost digits and pad the most
significant digits with zero to complete.
SOLUTION:
Binary 11100101 = 1110 01012
Hexadecimal = E 5 = E516

CONVERSION FROM DECIMAL TO BINARY, OCTAL, and HEXADECIMALNUMBER SYSTEMS.

Step1: divide number by the desired target radix. (2,8,16)

Step 2: Append the remainder as the next most significant digit.


Step 3: Repeat until the decimal number has reached zero.
The remainder is the result from bottom to the top.
CONVERSION FROM DECIMAL TO HEXADECIMAL
Example 1: Convert 1792 to Hex.
DECIMA OPERATIO QUOTIEN REMAINDE HEXADECIMA
L N T R L RESULT
NUMBE
R
1792 ÷16 = 112 0 0

8|Page
112 ÷ 16= 7 0 00
7 ÷16= 0 7 700
0 Done

Example 2: Convert 48879 to Hexadecimal.


DECIMA OPERATIO QUOTIEN REMAINDE HEXADECIMA
L N T R L
NUMBE
R
48879 ÷16 = 3054 15 F
3054 ÷16 = 190 14 EF
190 ÷16 = 11 14 EEF
11 ÷16 = 0 11 BEEF
Done
Answer 4887910 =BEEF16
CONVERSION FROM HEXADECIMAL TO DECIMAL.
EXAMPLE 1: A2DE = ((A) *163) + (2 *162) + (D * 161) +(E *160))
= (10 *4096) + (2 *256)+ 13*16) + 14 *1)
= 40960 + 512 + 208 + 14
.: A2DE16 =4169410

ADDITION IN BINARY NUMBER SYSTEM

EXAMPLE 1: 101

+101

1010

ADDITION IN OCTAL NUMBER BASE


EXAMPLE 1: 456

+ 123

9|Page
601

ADDITION IN HEXADECIMAL NUMBER BASE


EXAMPLE 1: 784

+ BDA

135E

EXAMPLE 2: 456

+784

BDA

EXERCISES / ASSIGNMENTS
1. Add 10011

+ 1010

2. Add 13255

+7031.

3. List Four types of Number Systems.

4. what is Number System.

5. 79DF

+A4AE

7. Convert DEED, BEAD to Decimal.

DATA REPRESENTATION

DEFINITION OF DATA REPRESENTATION

Data Representation refers to the methods used internally to represent information stored in computer.
Computers store lots of different types of information like numbers, text, graphics of many varieties (stills, video, and
animation), sound.

METHODS OF DATA REPRESENTATION


1. Binary Coded decimal (BCD)
2. Extended Binary Coded Decimal Interchange Code (EBCDIC)
3. American Standard Code for Information Interchange.(ASCII)
10 | P a g e
Others includes: Bits, Bytes, Kilobytes, Megabytes, Gigabytes,
Petabytes, and Yottabytes.
Binary Coded decimal (BCD) is a method of using binary digits to
represent the decimal digits 0 through 9.
Using this table
BCD Decimal
0000 = 0
0001 = 1
0010 = 2
0011 = 3
0100 = 4
0110 = 5
0110 = 6
0111 = 7
1000 = 8
1001 = 9
Example 1
Convert 4910 in binary to BCD
Solution
4910 = 0100100100010000
4. Extended Binary Coded Decimal Interchange Code (EBCDIC)
In recent years, EBCDIC has expanded to 16 and 32 bit
variants to allow for representation of large, non-Latin character
sets. EBCDIC variant is known as a code page, identified by its
coded Character Set Identifier, or CCSID, EBCDIC code pages
have been created for a number of major writing scripts such as
complex ones as Chinese, Korean and Japanese.
Digits EBCDIC
0 0000
1 0001
2 0010

11 | P a g e
3 0011
4 0100
5 0101
6 0110
7 0111
8 1000
9 1001
American Standard Code for Information Interchange
(ASCII).Computers can only understand number, so an ASCII code is
the numerical representation of a character such as ‘a’ or ‘@’ or an
action of some sort.
ASCII include definitions for 128 characters; 33 are non-
printing control characters (now mostly obsolete) that affect
how text and space is processed; 94 are printable characters, and
the space is considered an invisible graphic.
ASCII was developed a long time ago and the non-printable
characters, are rarely used for their original purpose .Below is
the ASCII character table and this includes description of the
first 32 non-printing characters. ASCII was actually designed
for use with teletypes and so the descriptions are somewhat
obscure. If someone says they want your CV however in ASCII
format, all this means is they want ‘plain’ text with no
formatting such as tabs, bold or underscoring ---the raw format
that any computer can understand. This is usually so they can
easily import the file into their own applications without issues.
Notepad. Exe create ASCII text, or in MS word you can save a
files as ‘text only’

12 | P a g e
ASCII code table consist of 128 binary values (0 to 127), each
associated with a character or command. The non-printing
characters are used to control peripherals such as printer.
Assignment / Exercise
1. Define Data Representation.
2. Convert 456 to BCD.
3. What is EBCDIC,BCD,ASCII.

ASCII TABLE AND CODES

Dec Hx Oct char Dec Hx Oct Html char Dec Hx Oct Html char Dec Hx Oct Html char

0 00 000 NUL 32 20 040   space 64 40 100 @ @ 96 60 140 ` `

1 1 001 SOH 33 21 041 ! ! 65 41 101 A A 97 61 141 a a

2 2 002 STX 34 22 042 " ‘’ 66 42 102 B B 98 62 142 b b

3 3 003 ETX 35 23 043 # # 67 43 103 C C 99 63 143 c c

4 4 004 EOT 36 24 044 $ $ 68 44 104 D D 100 64 144 d d

5 5 005 ENQ 37 25 045 % % 69 45 105 E E 101 65 145 e e

13 | P a g e
6 6 006 ACK 38 26 046 & & 70 46 106 F F 102 66 146 f f

7 7 007 BEL 39 27 047 ' ' 71 47 107 G G 103 67 147 g g

8 8 010 BS 40 28 050 ( [ 72 48 110 H H 104 68 150 h h

9 9 011 TAB 41 29 051 ) ] 73 49 111 I I 105 69 151 i i

10 A 012 LF 42 2A 052 * * 74 4A 112 J J 106 6A 152 j j

11 B 013 VT 43 2B 053 + + 75 4B 113K K 107 6B 153 k k

12 C 014 FF 44 2C 054 , ‘ 76 4C 114 L L 108 6C 154 l l

13 D 015 CR 45 2D 055 - - 77 4D 115 M M 109 6D 155 m m

14 E 016 SO 46 2E 056 . . 78 4E 116N N 110 6E 156 n n

15 F 017 SI 47 2F 057 / / 79 4F 117 O O 1116f 157 o o

16 10 020 DLE 48 30 060 0 0 80 50 120 P P 112 70 160 p p

17 11 021 DC1 49 31 061 1 1 81 51 121 Q Q 113 71 161 q q

18 12 022 DC2 50 32 062 2 2 82 52 122 R R 114 72 162 r r

19 13 023 DC3 51 33 063 3 3 83 53 123 S S 115 73 163 s s

20 14 024 DC4 52 34 064 4 4 84 54 124 T T 116 74 164 t t

21 15 025 NAK 53 35 065 5 5 85 55 125 U U 117 75 165 u u

22 16 026 SYN 54 36 066 6 6 86 56 126 V V 118 76 166 v v

23 17 027 ETB 55 37 067 7 7 87 57 127 W W 119 77 167 w w

24 18 030 CAN 56 38 070 8 8 88 58 130 X X 120 78 170 x x

25 19 031 EM 57 39 071 9 9 89 59 131 Y Y 121 79 171 y y

26 1A 032 SUB 58 3A 072 : : 90 5A 132 Z Z 122 7A 172 z z

27 1B 033 ESC 59 3B 073 &#59; ; 91 5B 133[ [ 123 7B 173 { {

28 1C 034 FS 60 3C 074 &#60; < 92 5C 134 &#92; \ 124 7C 174 &#124; |

29 1D 035 GS 61 3D 075 &#61; = 93 5D 135 &#93; ] 1257D 175 &#125; }

30 1E 036 RS 62 3E 076 &#62; > 94 5E 136&#94; ^ 126 7E 176 &#126; ~


31 1F 037 US 63 3F 077 &#63; ? 95 5F 137 &#95; _ 127 7F 177 &#127; DEL

SECURITY AND ETHICS


SOURCES OF SECURITY BREACHES IN COMPUTER NETWORK

1. Virus is a programming code that replicates by being copied or


initiating its copying to another program, computer boot sector or
document.

14 | P a g e
2. Malware: is programming or files that are developed for the
purpose of doing harm.
3. E-mail Virus is a computer codes sent to you as an e-mail note
attachment which, if activated, will cause some unexpected and
usually harmful effect causing the attachment to be remailed to
every in your address book.
4. Worms seek to infect and replicate without targeting and affecting
specified files already present on a computer.
5. Trojan Horses is a program in which malicious or harmful code is
contained inside apparently harmless programming in such a way
that it can get control and do its chosen form of damage on your
hard disk.
6. Spyware is anything that takes up residence on a computer usually
uninvited that can report on the activities and preferences of the
computer users or disclose information stored on a computer.
7. Hacker someone who tries to break into computer system.
8. Carelessness
9. ICT policy deficiency
10. Poorly implemented network
PREVENTIVE MEASURE AGAINST SECURITY BREACHES
1. Antivirus: Anti-virus is a software used to prevent, detect and
remove from infecting your Computer.
2. Firewall: Firewall is simply a program or hardware device that
filters the information coming from through the internet connection
into your private network or Computer system.
3. Encryption: encryption is the process of transforming information
using algorithm to make it unreadable to anyone except those
possessing special knowledge.

15 | P a g e
4. Web Certificate: web certificate is an electronic document which
uses a digital signature to bind a public key with an identity.

LEGAL ISSUES IMPORTANCE TO CONSIDER WHEN USING ICT.


o Copy right,
o Ownership rights,
o Web content,
o Piracy software,
o Cyber crimes

16 | P a g e

You might also like