Professional Documents
Culture Documents
Second Term Lesson Note
Second Term Lesson Note
1|Page
- STATE ISSUES OF LEGAL IMPORTANCE TO CONSIDER
WHEN USING ICT.
(COPY RIGHT, OWNERSHIP RIGHTS,WEB CONTENT,
PIRACY SOFWARE,CYBER CRIMES)
WEEK 5. REVISION
WEEK 6. EXAMINATION.
2|Page
DEFINITION OF PROGRAMMING LANGUAGE
Programming Language can be defined as an artificial language that can
be used to control the behavior of a machine.
3|Page
Visual Basic
Visual C
LISP List Processing.
APL A programming Language.
RPG Report Program Generator
CLASSIFICATION OF HIGH LEVEL LANGUAGES BASE ON
SUITABLE APPLICATION
(1) Scientific Algebraic Formula Type Processing: for solving
mathematical and statistical problem.
Examples are; BASIC, FORTRAN, ALGOL, APL.
(2) Business Data Processing: For maintaining data processing
procedures and files handling problems.
Examples are: COBOL, RPG.
(3) Artificial Intelligence (AI) String and List Processing: they
are used for String manipulation.
Examples are: LISP, PROLOG.
(4) Object Oriented Programming Language
Examples are: C++, JAVA.
(5) Special Purpose Programming Language:
Examples are: SNOBOL.
(6) General purpose programming language: they are used for
general purpose programming.
Examples are: C, PASCAL, PL/I (programming Language Version 1).
(7) Visual Programming Language: they are design for building
Windows based applications.
Examples are: Visual Basic, Visual Java, and Visual C.
4|Page
CLASSIFICATION OF HIGH LEVEL LANGUAGE INTO
INTERPRETED AND COMPILED
Interpreted: Interpreted languages are read and then executed directly,
with no compilation stage.
Examples are: BASIC, ASP, LISP, and LOGO.
Compiled Languages are transformed into an executable form before
running.
Examples are PASCAL, COBOL, C and FORTRAN.
FEATURES OF SOME HIGH LEVEL LANGUAGES
HIGH LEVEL LANGUAGES FEATURES
FORTRAN Uses mathematical notation
Ideal for Scientific applications.
COBOL Ideal for business applications.
It is English - like.
Easily handles disk and tape features.
BASIC Interactive.
Easy to learn.
Uses mathematical notation.
It can use for business and scientific
problems.
PASCAL Scientifically oriented.
Focuses on structured programming
techniques.
C General Purpose
Structured programming language.
Procedural language.
Designed for implementing system
software.
ASSIGNMENTS / EXERCISES
1. Classify High Level Language into Seven (7) with two example
each.
2. Write the full meaning of the following Languages:
BASIC,COBOL.FORTRAN,LISP, PROLOG
3. What is High Level Language?
NUMBER SYSTEMS
Definition for Number Systems
Number system is the collection of numbers together with operations,
properties of the operations, and a system of representing these numbers.
TYPES OF NUMBER SYSTEMS
(1) BINARY NUMBER SYSTEMS (BASE 2).
Base 2 has two digits, 0 and 1.
(2) OCTAL NUMBER SYSTEMS (BASE 8).
Base 8 has eight digits, 0- 7.
(3) DECIMAL NUMBER SYSTEMS (BASE 10).
Base 10 has ten digits, 0-9.
(4) HEXADECIMAL NUMBER SYSTEMS (BASE 16).
Base 16 has 16 digits, 0-15.
6|Page
CONVERSION FROM ONE NUMBER BASE TO
ANOTHER
(A) USING THIS TABLE
BINARY OCTAL
000 0
001 1
010 2
011 3
100 4
101 5
110 6
111 7
7|Page
1001 9
1010 A
1011 B
1100 C
1101 D
1110 E
1111 F
8|Page
112 ÷ 16= 7 0 00
7 ÷16= 0 7 700
0 Done
EXAMPLE 1: 101
+101
1010
+ 123
9|Page
601
+ BDA
135E
EXAMPLE 2: 456
+784
BDA
EXERCISES / ASSIGNMENTS
1. Add 10011
+ 1010
2. Add 13255
+7031.
5. 79DF
+A4AE
DATA REPRESENTATION
Data Representation refers to the methods used internally to represent information stored in computer.
Computers store lots of different types of information like numbers, text, graphics of many varieties (stills, video, and
animation), sound.
11 | P a g e
3 0011
4 0100
5 0101
6 0110
7 0111
8 1000
9 1001
American Standard Code for Information Interchange
(ASCII).Computers can only understand number, so an ASCII code is
the numerical representation of a character such as ‘a’ or ‘@’ or an
action of some sort.
ASCII include definitions for 128 characters; 33 are non-
printing control characters (now mostly obsolete) that affect
how text and space is processed; 94 are printable characters, and
the space is considered an invisible graphic.
ASCII was developed a long time ago and the non-printable
characters, are rarely used for their original purpose .Below is
the ASCII character table and this includes description of the
first 32 non-printing characters. ASCII was actually designed
for use with teletypes and so the descriptions are somewhat
obscure. If someone says they want your CV however in ASCII
format, all this means is they want ‘plain’ text with no
formatting such as tabs, bold or underscoring ---the raw format
that any computer can understand. This is usually so they can
easily import the file into their own applications without issues.
Notepad. Exe create ASCII text, or in MS word you can save a
files as ‘text only’
12 | P a g e
ASCII code table consist of 128 binary values (0 to 127), each
associated with a character or command. The non-printing
characters are used to control peripherals such as printer.
Assignment / Exercise
1. Define Data Representation.
2. Convert 456 to BCD.
3. What is EBCDIC,BCD,ASCII.
Dec Hx Oct char Dec Hx Oct Html char Dec Hx Oct Html char Dec Hx Oct Html char
13 | P a g e
6 6 006 ACK 38 26 046 & & 70 46 106 F F 102 66 146 f f
7 7 007 BEL 39 27 047 ' ' 71 47 107 G G 103 67 147 g g
14 | P a g e
2. Malware: is programming or files that are developed for the
purpose of doing harm.
3. E-mail Virus is a computer codes sent to you as an e-mail note
attachment which, if activated, will cause some unexpected and
usually harmful effect causing the attachment to be remailed to
every in your address book.
4. Worms seek to infect and replicate without targeting and affecting
specified files already present on a computer.
5. Trojan Horses is a program in which malicious or harmful code is
contained inside apparently harmless programming in such a way
that it can get control and do its chosen form of damage on your
hard disk.
6. Spyware is anything that takes up residence on a computer usually
uninvited that can report on the activities and preferences of the
computer users or disclose information stored on a computer.
7. Hacker someone who tries to break into computer system.
8. Carelessness
9. ICT policy deficiency
10. Poorly implemented network
PREVENTIVE MEASURE AGAINST SECURITY BREACHES
1. Antivirus: Anti-virus is a software used to prevent, detect and
remove from infecting your Computer.
2. Firewall: Firewall is simply a program or hardware device that
filters the information coming from through the internet connection
into your private network or Computer system.
3. Encryption: encryption is the process of transforming information
using algorithm to make it unreadable to anyone except those
possessing special knowledge.
15 | P a g e
4. Web Certificate: web certificate is an electronic document which
uses a digital signature to bind a public key with an identity.
16 | P a g e