Sie sind auf Seite 1von 108

COMPUTER EDUCATION

YEAR 11

2017

Technology and Employment Skills Training

Ministry of Education, Heritage and Arts,

Republic of Fiji.

30th November 2016

Year 11 Computer Education Page 1


Preface

This text book has been written to cater for the revised Year 11 Computer Education syllabus in Fiji Secondary
Schools for the year 2017. It is a revised text book and written locally.

It is hoped that this book will be useful in implementing the syllabus but it should be understood that it is not
the syllabus. The syllabus is the framework for the teacher to follow while this text book is a resource for the
students. Therefore departure to other resource materials for more information will be acceptable.

The text book is not the perfect piece of work as it has been prepared in a very short time, therefore
suggestions for amendments will be welcomed. It is anticipated that this book will minimize the amount of
time for teachers in lesson preparation and more time will be devoted to actual classroom teaching and
learning.

There may be a variety of opinions about the content. For the beginner it is the best which gives the time and
opportunity to become familiar with the basics of computing before pursuing further into the field of study in
greater detail at the upper secondary level.

Ministry of Education, Heritage and Arts


Suva
Republic of Fiji
30th November 2016.

Year 11 Computer Education Page 2


Acknowledgement
This textbook for Year 11 Computer Education has been produced by the Computer Education Section of the
Technology and Employment Skills Training (TEST) Section of the Ministry of Education, Heritage and Arts
(MOEHA).

In 2014, it was written, compiled and edited by a writer‘s panel comprising of Computer Studies officers and
USP lecturers:
1. Dr. Bibya Sharma (USP)
2. Mr. Shaveen Singh (USP)
3. Mr. Vijay Singh (USP)
4. Mr. Paula Sovakiwai (SGS)
5. Ms. Rihana Hussain (SGS)

In 2016, it has been revised by:


1. Mrs. Rihana Hussain (HOD - Computer, Suva Grammar School, Suva, Fiji)
2. Mr. Mohammed Arshad Al-Habib (HOD Computer/OT, Nasinu Muslim College, Nausori, Fiji)
3. Mrs. Sharika Kumar (HOD Computer/OT , Jai Narayan College, Suva, Fiji)
4. Mr. Jesoni Bainivalu (HOD Computer , Queen Victoria School, Tailevu, Fiji)
5. Mrs. Georgina Batisaresare (Teacher in Charge - Computer/OT, Lami High School, Suva, Fiji)
6. Mr. Apisalome Tamani (TEST Section, MOEHA, Suva, Fiji)

Cover page design:


1. Mr. Mohammed Arshad Al-Habib

This publication has been made possible through the support and assistance provided by Mrs. Makelesi Driu
(Principal Education Officer - TEST), Ms. Alumeci Tuisawau (Director -TEST) and other Senior Staff of the
Ministry of Education.

Above all, the TEST staff and the family members of the writers, editors and graphic designers are thanked for
their patience and wholehearted support.

Every effort has been made to acknowledge all copyright.

Copyright© 28th October, 2016

All rights reserved.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or
means, electronic, mechanical, photocopying, recording or otherwise, without the permission of the
Technology and Employments Skills Training of the Ministry of Education, Heritage and Arts, Republic of
Fiji.

Year 11 Computer Education Page 3


TABLE OF CONTENT

Chapter Content Page

Preface 2

Acknowledgement 3

1 Structure and Functions of the Computer 6

1.1 Major Parts and Function 7

1.2 Hardware Components 9

1.3 Categories of Computer 35

Summary 38

2 Health and Safety Issues 40

2.1 Ergonomics 41

2.2 Workplace Safety Rules 43

3 Green Computing 49

3.1 What is Green Computing? 50

3.2 Why Green Computing? 50

3.3 Ways to reduce Energy Consumption 52

3.4 Conservation of Resources (The 4R‘s) – Reduce, Reuse, Recycle and Replace 53

Summary 55

4 Software 57

4.1 System Software 59

4.2 Application Software 66

4.3 Advanced Application 72

4.4 Summary 74

5 Programming 79

5.1 What is Programming? 80

5.2 System Development 81

5.3 Generations of Programming Languages 86

6 Computers and Information Processing 89

6.1 Data and Information 91

6.2 Role of Information Processing in Decision Making 94

Year 11 Computer Education Page 4


6.3 Information Retrieval 97

6.4 DBMS 100

6.5 Database Security 102

6.6 Creating a Database 102

6.7 Summary 103

References 105

Year 11 Computer Education Page 5


Chapter 1

Structure and Functions of a Computer

"Hardware: the parts of a computer that can be kicked." ~ Jeff Pesis

After completing this chapter, you will be able to:

1. Explain the importance of computer literacy.

2. Define the term computer.

3. Identify the components of a computer system.

4. Compare the uses of various types of: input devices, output devices, and storage devices.

5. Describe the different categories of computers and their uses.

Year 11 Computer Education Page 6


1.0 Introduction

A computer is an electronic device that manipulates information, or data. It has the ability to store,
retrieve, and process data. The machinery is called hardware, and this highly sophisticated equipment
needs equally sophisticated programs (called software) to become a working computer system.

Modern society has come to depend very heavily on the use of computer systems. Banks, businesses,
government departments, industries, shops, people at home and school all rely on computer to play a vital role
in their daily activities. These activities are centered on information.

In businesses, the computer system has been used a lot and has replaced filing cabinets as means of storing
information, and clerical workers as a means of processing it. By storing and processing information on a
computer system, these businesses can function more quickly and efficiently, because information can be
identified and collated much faster.

Discovery Learning:

What are the different types of computer?

1.1 Major Parts and Functions

A Computer is an electronic device that accepts input data, processes data, stores data and produces output as
useful information. Data is a collection of raw unprocessed facts, figures and symbols. Computers process
data to create information. Information is processed facts that is organized, is meaningful, and useful. Whereas
a system would be described as a set of interrelated parts that performs different functions to achieve the same
desired results.

A computer system is composed of Hardware and Software. Hardware refers to the physical equipment, which
makes up a computer system such as monitor, keyboard, processor, printer etc. Hardware works under the
control of software. Software, refers to computer program, a program is set of instructions, example:
Spreadsheet (Excel), Word processing (Word), Database (Access) etc. The specific software needed depends
on the tasks that have to be performed.

Discovery Learning:

Give examples of data and information you use or generate


every day.

Year 11 Computer Education Page 7


A computer system consists of three main components or parts and each part is responsible for the three major
functions that constitute a computer. The parts are:
1. Input Unit
2. Processing Unit
3. Output Unit

Figure 1.1a below shows how information flows in a computer.

Figure 1.1a Flow of information

Components Function
Input device Inputs the instructions from the user and pass to the processing unit for
the process of instruction.
Processor Process the instructions, prepare result instantly and pass to output unit.

Output device To get the information out


Storage device To file information for future use

Table 1.1 Components and Function

Year 11 Computer Education Page 8


https://www.google.com/search?q=parts+of+a+computer+system

Figure 1.1b Parts of a Computer System

Discovery Learning:

What does it mean to be computer literate?

1.2 Hardware Components

1.2.1 Input Devices

The input function involves accepting data in machine-readable form and sending it to the Central Processing
Unit (CPU) for processing. Input can be supplied by a person, by the environment or by another computer,
devices or storage. Some examples of the kinds of input a computer can process are words and symbols in a
document, numbers for a calculation, instructions for completing a process, pictures, audio signals from a
microphones and etc. An input device gathers and translates input into machine language (a form that the
computers can process).

Year 11 Computer Education Page 9


Device Name Description
Used for typing commands, messages and instructions and transmitting
Keyboard
them to CPU for interpretation and action.
Used for pointing at items displayed on the screen (selecting) and
Mouse
activating them by clicking the buttons or icons.
Can read data off other common medium like paper for input into CPU
Scanners
for processing.
Can read data from magnetic tape, floppy and hard disks and other
Readers
storage devices for input to the CPU for processing.

Table 1.2a Input Devices

Additional input devices include light pen, stylus, sensors, digital cameras and graphics tablets which are
handy for working with graphical input. Microphones and electronic instruments provide input capabilities for
sound and music.

Input devices are of two kinds Keyboard Entry and Direct Entry.

Keyboard Entry

Keyboard Entry is when data is entered through a keyboard. A standard keyboard is called a QWERTY
keyboard because of the layout of its keys. That is, the first six leftmost letters on the top alphabetic line of the
keyboard spell QWERTY.

a. Escape key – cancels a selection or a procedure


b. Typewriter keys
c. Function keys – (F1 – F12)
d. Numeric keypad – (enters numbers/arithmetic symbols/ control cursors or insertion point)
e. Windows key – displays the start menu
f. Space bar – enters blank spaces between characters
g. Navigation keys – control the cursor or insertion point on the screen
h. Multimedia control keys – controls the media player
i. Toggle keys – switches a feature on or off
j. Ctrl and Alt keys – provide additional and shortcut functions

Year 11 Computer Education Page 10


Figure 2.

a c h i d

f
g
j b e
Figure 1.2a Traditional keyboard

There are a wide variety of different keyboard designs. The most common type is Traditional Keyboards
which are full-sized, rigid, rectangular keyboards that include function, navigational, and numeric keys. Some
keys, such as the Caps Lock key, are toggle keys. These keys turn a feature on or off. Others, such as the Ctrl
key, are combination keys, which perform an action when held down in combination with another key. Some
newer keyboard designs include the following:
Flexible Keyboards fold or roll up for easy packing or storage. They are designed to provide mobile users with
a full-sized keyboard with minimal storage requirements.
Ergonomic Keyboards are similar to traditional keyboards. The keyboard arrangement, however, is not
rectangular and a palm rest is provided. They are designed specifically to alleviate wrist strain associated with
the repetitive movement of typing.
Wireless Keyboards transmit input to the system unit through the air. By eliminating connecting wires to the
system unit, these keyboards provide greater flexibility and convenience.
Personal Digital Assistance (PDA) Keyboards are miniature keyboards for PDA used to send e-mail, create
documents, and play games.

Figure 1.2b Ergonomic keyboard (left) &Flexible keyboard (right)

Year 11 Computer Education Page 11


Direct Entry
A Direct Entry does not require data to be keyed by someone. Instead the direct entry devices create machine-
readable data and feed it directly into the CPU. This reduces the possibility of human error and is an
economical means of data entry. Direct entry devices may be categorized into these categories.
a. Pointing devices
b. Scanning devices
c. Image capturing devices
d. Audio-input devices

Pointing Devices
Pointing device is a device with which you can control the movement of the pointer to select items on a display
screen. There is a wide variety of different pointing devices, including the mouse, joystick, touch screen, light
pen, stylus, digitizer and pen-based computing.

Mice

A mouse is used for pointing at items displayed on the screen (selecting) and activating them by clicking on the
buttons. The mouse pointer usually appears in the shape of an arrow. It frequently changes shape, however,
depending on the application.

Although there are several different mouse types, there are three basic designs.

Mechanical mouse – has a ball on the bottom and is attached with a cord to the system unit.
Optical mouse – it emits and senses light to detect mouse movement,

Cordless or wireless mouse – is a battery powered device that typically used radio waves or infrared light
waves to communicate with the system unit.

Figure 1.2c from left to right – optical, wireless and mechanical mouse

Joystick
A joystick is the most popular input device for computer games. You control game actions by varying the
pressure, speed, and direction of the joystick

Year 11 Computer Education Page 12


Touch Screen
A touch screen is particular kind of monitor screen covered with plastic layer. Behind this layer are
crisscrossed invisible beams of infrared light allowing someone to select actions and or commands by touching
the screen with a finger.

Figure 1.2d (from left to right) Joystick, Touch screen, gamepad, dance pad, motion sensing device

Game Controllers

Game controllers are devices that provide input to computer games. The four most popular and specialized
game controllers are joysticks, dance pads, gamepads, and motion-sensing devices.
Joysticks control game actions by users varying the pressure, speed, and direction of a control stick.
Dance pads provide input for dance games by applying pressure on a sensitive mat.
Gamepads are designed to be held by both hands and provides a wide array of inputs including motions,
turning, stopping, and firing.
Motion sensing devices control games by user movements. For example Xbox 360.

Light Pens
A light pen is a light sensitive pen like device. The light pen is placed against the monitor. This closes a
photoelectric circuit and identifies the spot for entering or modifying data. Engineers use light pens, for
example, designing anything from microprocessor chips to airplane parts.

Stylus
A stylus is a pen-like device commonly used with tablet PCs and PDAs. A stylus uses pressure to draw images
on a screen. A stylus interacts with the computer through handwritten recognition software. Handwritten
recognition software translates handwritten notes into a form that the system unit can process.

Year 11 Computer Education Page 13


Digitizer
A digitizer is a device that can be used to trace or copy a drawing or photograph. The shape is converted to
digital data. A computer can then represent the data on the screen or print it out on paper.

Figure 1.2e left to right – light pen, stylus, and tablet digitizer

Pen-based Computing
A pen-based computing is a pen-based small computer that lets you use a stylus to write directly on the display
screen, these devices contain software that can recognize a person‘s handwriting.

Scanning Devices
Scanners move across text and images. Scanning Devices are devices that use a magnetic or photo-electric
source to scan and convert images into electric signals that can be processed by an electronic apparatus, such
as a computer. Images that can be scanned and converted include colored or black and white texts, graphics,
and pictures. Scanning device includes the following:

Optical Scanner
An optical scanner also known simply as a scanner accepts documents consisting of text and images and
converts them into machine-readable form. The two types of optical scanners are flatbed and portable scanner.

Bar Code Reader


Bar code readers are photo electric scanners that read the bar codes or vertical zebra stripped marks printed on
a product container. Supermarkets use a bar code called the Universal Product Code (UPC), which identifies
the product to the supermarket computer. The computer has a description and the latest price of the product. It
automatically tells the Point of Sale (POS) terminals the price and prints the price and product name on the
receipt.

Figure 1.2f left to right – flat bed scanner, barcode reader

Year 11 Computer Education Page 14


RFID Readers
RFID (radio-frequency identification) tags are tiny chips that can be embedded on most of the things. These
chips contain electronically stored information that can be read using an RFID reader located several yards
away. They can be found in consumer products, driver‘s licenses, passports and any other items.

Character and Mark Recognition Devices


Character and mark recognition devices are scanners that are able to recognize special characters and marks.
They are specialty devices that are essential tools for certain applications.

Figure 1.2g MICR in ATM

Three types are:

Magnetic ink character recognition (MICR) direct entry method used in banks. This technology is used to
automatically read those futuristic looking numbers at the bottom of cheques. Special purpose machines known
as reader/sorter reads characters made up of ink containing magnetized particles.

Optical character recognition (OCR) uses special pre-printed characters which are read by a light source and
changed into machine readable code. A common OCR device is the hand-held wand reader.

Optical mark recognition (OMR) also known as mark sensing. An OMR device senses the presence or
absence of marks such as pencil marks. Multiple answer sheet used in exam can be read using optical mark
reader. The position of the marks is compared with the stored set making marking a very quick and accurate
process.

Image Capturing Devices

Image capturing devices are devices that create or capture original images.

Digital camera is similar to traditional cameras except that images are recorded digitally on a disk or in the
camera‘s memory.

Digital video camera unlike traditional video cameras, digital video cameras recorded digitally on a disk or in
the camera‘s memory. Most have the capability to take still images as well. Webcam‘s (Web Cameras) are
specialized digital video cameras that capture images and send them to a computer for broadcast over the
internet.

Year 11 Computer Education Page 15


Audio Input Devices

Audio – input devices allow a user to send audio signals to a computer for processing, recording, or carrying
out commands.

Voice input device converts person‘s speech into digital codes. Such systems must be trained to the particular
user‘s voice. Spoken words are matched to patterns previously stored in a computer. Voice input systems
enable users to keep hands free for other tasks. They are becoming an office advantage for physically
challenged people. This system is also known as speech recognition device or voice recognition system device.
The most commonly used voice input device is the microphone.

Musical instrument digital interface (MIDI) is a standard that allows musical instruments to connect to the
system unit using a special MIDI port. MIDI devices are specialized musical instruments that provide input in
the form of encoded digital signals representing musical sounds. MIDI devices can be used create, record, and
play back musical compositions.

1.2.2 Output Devices

An output device is any peripheral device that converts machine-readable information into people-readable
form such as a monitor, printer, plotter and voice output device. Output is either in Soft copy stored on any
storage device and Hard copy is printed on a paper.

Monitors
A monitor or a display is an electronic visual display for computers. The monitor comprises the display device,
circuitry and an enclosure. The display device in modern monitors is typically a thin film transistor liquid
crystal display (LCD) thin panel, while older monitors used a cathode ray tube (CRT) about as deep as the
screen size.

Cathode Ray Tube (CRT) is the most common type of monitor for the office and the home. The monitors are
typically placed directly on the system unit or on the desktop. CRT offers an inexpensive and dependable
computer display. They are bulky, however, and consume a fair amount of power.

Liquid Crystal Display (LCD) produces an image by manipulating light within a layer of liquid crystal cells.
Modern LCD technology is compact in size and lightweight, and provides an easy-to-read display. LCDs are
standard equipment on notebook computers. The advantages of LCD monitors include display clarity, low
radiation emission, portability, and compactness. They are, however, more expensive than CRT monitors.
Plasma screen technology creates an on-screen image by illuminating miniature colored fluorescent lights
arrayed in a panel-like screen. The name plasma comes from the type of gas that fills fluorescent lights and

Year 11 Computer Education Page 16


gives them their luminescence. Like LCD screens, plasma screens are compact, lightweight and more
expensive that CRT monitors.

Figure 1.2h LCD flat panel monitor (left) & CRT monitor (right)

Other Monitors
There are several other types of monitors. Some are used for more specialized applications, such as making
presentations and watching televisions.

Digital and Interactive whiteboards are specialized devices with a large display connected to a computer or
projector. The computers desktop is displayed on the digital whiteboard and controlled using a special pen, a
finger, or some other device.
High-definition television (HDTV) delivers a much clearer and more detailed wide-screen picture than regular
television. Because the output is digital, users can readily freeze video sequences to create high-quality still
images.

E-book Readers
E-books (electronic books) are traditional printed books in electronic format. E-book readers (e-readers) are
dedicated mobile devices for storing and displaying e-books and other electronic media including electronic
newspaper and magazines.

Printers
A printer is an essential peripheral device in any computer system. It provides the output in paper form which
people can take away to read, analyze or store. There are many different types of printers available:

Impact printer’s forms characters by some mechanical means of hitting the paper through an inked
ribbon. Impact printers can produce carbon copies and are fairly loud, although covers are available
to muffle the noise. Impact printers can produce a document, line or a character at a time.

Year 11 Computer Education Page 17


Printer Category Description
Line printers Can produce only text, no graphics. E.g. Daisy Wheel
Printers. Used by large computers.
Usually small printers, they can produce graphics as well as
Characters printers
text. There are many type, the most common one is a Dot
Matrix printer: this creates images using a dot pattern.
Mechanism is same as other printers. Prints a page at a time.
Page printer

Table 1.2b Categories of impact printers


Non-impact printers are quiet because nothing presses on the page, a non-impact printer cannot produce
carbon copies. These printers use latest technology and have gained popularity as with time, the prices are
decreasing and nowadays, average people are able to afford them. Description of non-impact printers are given
in Table 1.2c

Printer Type Description


Work in the same manner as copy machines; a laser
Laser
beam creates electrical charges that attract toner to
printers
form an image and transfer it to paper. These printers
come in a variety of sizes. The best printers around
yet.
Also known as additive manufacturing, create three-
3-D printers
dimensional shapes by adding very thin layer after
layer of material until the final shape is fully formed.
Are less expensive than laser printers, quiet popular
Inkjet
with microcomputers. Inkjets produce higher
printers
resolution output than dot-matrix printers. They also
come in colors. More finely as the toner is sprayed
onto the paper.
Uses heat and electricity to form characters and to
Thermal
produce images on heat-sensitive paper. Uses heated
printers
dot-matrix wires to print output on specially treated
paper. As the hot pins in a thermal print head press the
ribbon against the paper, the wax melts and the ink is
transferred to the paper.
Are connected to the internet that provides printing
Cloud
services to others on the internet. Google cloud print
printers
is a service that supports cloud printing.

Table 1.2c Type of non-impact printers

Discovery Learning:

In relation to monitors and printers, Find what the following mean:


refresh rate, dpi, pixel, dot pitch, resolution, TFT and HD.

Year 11 Computer Education Page 18


Figure 1.2i left to right – Dot matrix printer, mini dot matrix printer for printing receipts for POS, dot matrix
paper.

Figure 1.2j Top: ink jet printer (left) & laser printer (center) Thermal printers (both right)

Plotters

A plotter uses pens to draw an image on paper. Architects and engineers who produce multicolor line drawings
often use plotters. It is ideally suited for Computer Aided Design (CAD) application.

Pen Plotter creates plots by moving a pen or pencil over a drafting paper. These plotters are the least expensive
and easiest to maintain. The major limitation is speed and the inability to produce solid fills and shadings. The
Richter scale uses pen plotting technology to draw seismic activity.

Ink-jet plotter they form images like ink jet printer by spraying droplets of ink onto the paper. They can
produce good quality solid-color output and are quicker than pen plotters. The major disadvantage of ink-jet
plotter is that the spray jets can become clogged and require more maintenance.

Figure 1.2k Inkjet plotter

Year 11 Computer Education Page 19


Electrostatic plotters use electrostatic charges to create images made up of tiny dots on specially printed paper.
The image is produced when the paper is run through the developer. They produce high-resolution images at a
much faster rate than pen or ink jet plotters.

Direct image plotters or thermal plotters creates images using heat sensitive paper and electrically heated pins,
is quite reliable and good for high volume work. It requires expensive specially treated paper.

Voice-Output Device

This device produces sound like human speech, but is actually prerecorded vocalized sounds. Voice output is
used in the telephone information system, where the requested number is reported using a voice output system.
For example, when a student enrolls courses using a telephone registration system, he or she hears voice output
upon your request. Voice output is becoming common in voice messaging systems.

Figure 1.2l Speakers

Year 11 Computer Education Page 20


Review Exercise 1.2

True/False

a) Input devices translate symbols that people understand into symbols that computer can process.

b) A plotter is a device that can be used to trace or copy a drawing or photograph.

c) Banks use a method called magnetic-ink character recognition (MICR) to automatically read and sort
checks.

d) Laser printers are highly reliable, but the quality of their output limits their use to rough drafts and in-
house communications.

e) Plotters are special-purpose drawing device.

Fill in the blank

a) ____________ machines are popular office machines that can scan the image of a document to be sent.
b) The ____________ printer is a reliable, inexpensive printer that forms letters by a series of small pins on a
print head.
c) The ___________ printer is the most widely used.
d) ____________ a device makes sounds that resemble human speech.
e) The number of dots that form an image on a monitor or printer is referred to as ______________

Short Answer Questions

a) What is the difference between keyboard entry and direct entry as a form of input?

b) What is a POS terminal? What are two input devices on it that represent the two methods of keying data?

c) What is a bar code? How are bar code read?

d) What are the differences between personal and shared lasers?

Year 11 Computer Education Page 21


1.2.3 The System Unit

The main part, processing unit and devices, of a microcomputer is a system unit. A system unit, also known as
the system cabinet or chassis, includes a board called a motherboard Electronic circuitry is printed on the board
and it connects between all components of the computer system. The motherboard is housed within the system
cabinet.

Figure 1.2m System cabinet

A system unit is made up of the following parts.

 Motherboard
 Microprocessor
 Memory Chips
 System Clock
 Buses
 Ports/Sockets
 Expansion Slots and Cards

Discovery Learning:

Observe the system cabinet in your computer lab and notice that
at least one side cover is grid like. Explain why?

Motherboard

A Motherboard or system board is the main printed, flat circuit board in an electronic device such as
microcomputers. The board contains expansion slots (sockets) that accept additional boards (expansion Cards).
In a microcomputer, the motherboard contains the microprocessor, the primary storage chips (or main memory
cards), the buses, and all the chips used for controlling the peripherals.

Year 11 Computer Education Page 22


Figure 1.2n Motherboard

Figure 1.2o Components on the motherboard

Microprocessor

A silicon chip contains a Central Processing Unit (CPU). In the world of


personal computers, the terms microprocessor and CPU are used
interchangeably. At the heart of all personal computers and most workstations
sits a microprocessor. Microprocessors also control the logic of almost all
digital devices, from clock radios to fuel-injection systems for automobiles.

Figure 1.2p Microprocessor

Several important lines of microcomputers use some families of


microprocessor chips. Intel and AMD are the major companies that produce important microprocessors for
IBM compatible and Macintosh computers.

Microprocessor Capacity is the capacity of a microprocessor chip and is represented in word sizes. A word
size is the number of bits (e.g. 8, 16, 32 or 64 bits) that a CPU can process at a time.
If a word has more bits, the CPU is more powerful and faster. For example, a 16-bit-word computer can access
2 bytes (1 byte = 8 bits) at a time, while a 64-bit-word computer can access 8 bytes at a time. Therefore, the
64-bit computer is faster than the 32-bit computer.

Year 11 Computer Education Page 23


The central processing unit (CPU) is the computing part of the computer that interprets and executes program
instructions. It is also known as the processor or the brain of the computer. In a microcomputer, the CPU is
contained on a single microprocessor chip within the system unit. The CPU has two parts: the control unit and
the arithmetic-logic unit. Additional storage units called registers within control unit and arithmetic logic unit
help make processing more efficient.

Control Unit is the functional unit of the CPU that is responsible for retrieving instructions from memory,
determining their type and breaking each instruction into a series of simple, small steps or actions. It tells the
computer system how to carry out the program instructions by directing the movement of electronic signal
between memory (which temporarily holds data, and processed information) and the ALU. It also directs this
control signals between CPU, input, output and communication devices.

The Arithmetic Logic Unit (ALU) is the component of the CPU that is responsible for performing arithmetic
(+,-, /,*) and logic (comparisons such as <,>, =) operations.

Memory

A memory chip is a chip that holds programs and data either temporarily or permanently. Three major types of
memory chips are RAM, ROM and CMOS.

Random Access Memory (RAM)

Random access memory holds the data or instructions that the CPU is presently processing. RAM is called
temporary or volatile storage because everything in most types of RAM is lost as soon as the microcomputer
is turned off or the power disrupted.

Whenever a CPU writes data or instructions to RAM, it wipes out the previous contents of RAM replacing it
with the current content it is processing or processed but needs to be saved.

Year 11 Computer Education Page 24


Types of RAM Description
Cache memory or Improves processing by acting as a temporary high-
RAM cache speed holding area between the memory and the CPU.

Flash RAM or flash Chips can retain data even if power is disrupted. This
memory type of RAM is the most expensive and used primarily
for special devices such as for cell phones, digital
video cameras and portable computers.

Virtual memory Is storage space on your computer's hard disk that


Windows uses in conjunction with random access
memory (RAM).If your computer lacks the random
access memory (RAM) needed to run a program or
operation, Windows uses virtual memory to
compensate.
Table 1.2d Common types of RAM

Other types of RAM include DRAM, SDRAM, DDR, SDRAM and Direct RDRAM.

Read only memory (ROM)

A ROM chip is a memory chip that stores instructions and data permanently. Its contents are placed into the
ROM chip at the time of manufacture and cannot be modified by the user. A CPU can read and retrieve the
instructions and data from the ROM chip, but it cannot change the contents in ROM. ROM chips usually
contain special instructions for computer operations such as ROM BIOS. ROMs are also called firmware. The
variations on the ROM chip include PROM, EPROM and EEPROM.

Complementary Metal Oxide Semiconductor (CMOS)


CMOS chip provides flexibility and expandability for a computer system. It contains essential information that
is required every time the computer system is turned on. The chip supplies such information as the current date
and time, amount of RAM, type of keyboard, mouse, monitor, CPU and disk drives used.

Primary Storage (Memory)

Primary storage (internal storage, main memory, RAM or memory) is the computer's working storage space
that holds data, instructions for processing, and processed data (information) waiting to be sent to secondary
storage. Physically, primary storage is a collection of RAM chips. The contents are held in primary storage
only temporarily.

Year 11 Computer Education Page 25


Figure 1.2q left to right – RAM, ROM & CMOS chips

System Clock

The clock is a device that generates periodic, accurately spaced signals used for several purposes such as
regulation of the operations of a processor or generation of interrupts. The clock circuit uses the fixed
vibrations generated from a quartz crystal to deliver a steady stream of pulses to the processor. The system
clock controls the speed of all the operations within a computer. The clock speed is the internal speed of a
computer and is expressed in Hertz. 33 MHz means approximately 33 million cycles per second can be
processed. A computer processor's speed is faster if it has higher clock speed. For example, a 2.5 GHz
processor is capable of processing approximately 2.5 billion instructions per second.

Buses

A bus is a data pathway between several hardware components inside or outside a computer. It not only
connects the parts of the CPU to each other, but also links the CPU with other important hardware. The other
important hardware includes memory, a disk control unit, a terminal control unit, a printer control unit, and a
communications control unit. The capacity of a bus is expressed as bits. A larger capacity bus is faster in data
transfer. For example, a 32-bit bus is faster than an 8-bit bus.
Measurement of Memory

Memory is measured in Bit or Byte.

1. Bit means binary digit. It is either 0 or 1. A nibble is combination of 4 bits.

2. A byte consists of 8 bits.

One byte is the smallest unit which represents a data item or character. Other units of memory are KB, MB,
GB, and TB.

1. One Kilobyte (1 KB) = 210 bytes, i.e., 1024 bytes

2. One Megabyte (1 MB) = 210 KB, i.e., 1024 x 1024 bytes or 1024 KB

3. One Gigabyte (1 GB) = 210 KB, i.e., 1024 x 1024 x 1024 bytes or 1024 MB

4. One Terabyte (1 TB) = 210 KB, i.e., 1024 x 1024 x 1024 x 1024 bytes or 1024 GB

Year 11 Computer Education Page 26


Discovery Learning:

Identify how storage capacity is determined and the difference between capacities like KB,
MB GB, TB, and so on…

Identify the difference between the microprocessor speeds like MHz, GHz, THz and so on…

Ports

A port is an external connecting socket on the outside the computer. This is a pathway into and out of the
computer. A port lets users plug in outside peripherals, such as monitors, keyboards, mouse, scanners and
printers.

Standard Ports

Serial ports are external I/O connectors used to attach modems, scanners or other serial interface devices to the
computer. The typical serial ports use a 9-pin DB-9 or a 25-pin DB-25 connector. Serial ports transmit bits one
after another on a single communications line. Serial lines frequently are used to link equipment that is not
located close by.

Parallel ports are external I/O connectors on a computer used to hook up printers or other parallel interface
devices. The parallel port uses a DB-25 connector. This port transmits several bits simultaneously. Parallel
lines move information faster than serial lines do.

Universal serial bus (USB) ports are gradually replacing serial and parallel ports. They are faster, and one USB
port can be used to connect several devices to the system unit.

FireWire ports also known as high performance serial bus (HPSB), are as fast as USB 2.0 ports and provide
connections to specialized FireWire devices such as camcorders.

Figure 1.2r System Unit back panel with port

Specialized Ports
There are numerous specialty ports including MIDI, SCSI, and IrDA
ports.

Musical instrument digital interface (MIDI) ports are a special type of


serial port for connecting musical instruments like an electronic
keyboard to a sound card. The sound card converts the music into a
series of digital instructions. The instructions are converted to music by a
synthesizer either located on a chip on the system board or on an
external device.

Year 11 Computer Education Page 27


Small computer system interface (SCSI) ports are a special type of high speed parallel port for connecting a
series of input and/or output SCSI devices to a single SCSI controller card. This arrangement allows several
devices to communicate with the system unit through a single slot on the system board.

Infrared Data Association (IrDA) ports are also known as fast infrared (FIR) ports. IrDA ports provide a
wireless mechanism for transferring data between devices. Instead of cables, the IrDA ports from each device
are directly aligned and infrared light waves are used to transmit data.

Expansion Slots

Expansion slots are receptacles inside a system unit on which printed circuit boards (expansion boards) are
plugged into. Computer buyers need to look at the number of expansion slots when they buy a computer,
because the number of expansion slots decides future expansion. In microcomputers, the expansion slots are
directly connected to the bus.

Expansion Boards

Expansion boards are also called expansion cards, controller cards, plug-in boards, adapter cards, or interface
cards. Expansion boards are printed circuit boards that have many electronic components including chips.
They are plugged into expansion slots. Expansion boards are connected to peripherals through ports located on
the edge of expansion boards. Expansion boards include memory expansion cards (e.g., SIMM), I/O controller
cards (e.g., SCSI Card), video display card, sound cards, communications cards, etc. Look back at Figure 1.2o.

Review Exercise1.2.3

True/False
a) Hardware consists of monitor, a keyboard, and software.
b) In a microcomputer, the CPU is located on a single chip called the microprocessor.
c) RAM temporarily stores data and a hard disk permanently stores data.
d) Another name for the system board is the processor board.
e) Memory is also known as primary storage.

Fill in the blank

a) Data and instruction are stored in memory at locations known as _______________.

b) _______________ memory is directly accessible above 1MB.

c) The system clock controls the ____________ of operations within a computer.

d) The system clock speed is expressed in _________________.

Year 11 Computer Education Page 28


Short Answer

a) What does random access mean?

b) What does volatile mean?

c) What is the purpose of the CPU?

d) Describe the two basic components of the CPU?

e) What is the difference between open and closed architecture? Give some examples of devices that have

open and closed architecture.

1.2.4 Secondary Storage

Secondary storage, sometimes called auxiliary storage, is all data storage that is not currently in a computer's
primary storage or memory. An additional synonym is external storage.

Secondary storage also holds data and programs permanently. That is, the data or programs remain even after
the electricity power is turned off. Secondary storage devices are located outside of the central processing unit,
although they may still be built into the system unit cabinet. This storage device includes a hard disk, optical
disk, magnetic tape and other portable drives.

A hard disk is a magnetic disk made of metal and covered with a magnetic recording surface. Hard disks come
in removable and fixed forms that holds from several hundred megabytes to several gigabytes. They are tightly
sealed to prevent any foreign matter from getting inside which can cause head crash. A head crash happen
when the surface of the read/write head or particle on its surface contact the magnetic disk surface destroying
some or all of the data on the disk.

Hard Disk Drive

Figure 1.2s Hard Disk Drive

Year 11 Computer Education Page 29


Types of Hard Disks
Internal Hard Disk (Figure 1.2s) is made up of several metallic platters, a motor, an access arm and read-write
heads sealed inside a metal container. Internal hard disks have advantages over other disks. They have high
capacity, speed and are protected inside a metal casing. The disadvantage of internal hard disks is that they
have only a fixed amount of storage and cannot be easily removed.

External Hard-Disk Drives is not built into the system cabinet of microcomputers. External hard disk drives
are treated as peripherals. Using external hard disk drives, we can expand the hard disk capacity when all
available drive bays are occupied.

Hard Disk Cartridges have advantage being as easy to remove as a cassette from a video cassette recorder.
They give micro-computer system fast access to very large quantities of data.

Removable Drives with Cartridges allows a new form of removable storage. This technology combines the
function of the hard disk drive and the convenience of the hard disk cartridge. This form consists of a
removable drive and several cartridges.

Hard disk packs are removable storage devices to store massive amounts of information. Hard-disk packs
have multiple recording platters aligned one above the other. Their capacity far exceeds the other types of hard
disks.

Figure 1.2t from left to right – hard disk pack, hard disk cartridge and external hard drive

Optical Disks
Optical disk is a disk written and read by laser beam. This optical disk has a great impact on today's
storage technology. Optical disk does not need to move access arms and read/write heads, because a
laser beam can be moved electronically.
Figure 1.2u Optical disk drive

The capacity of the storage is considerably greater than their magnetic disk
counterparts, and optical disk storage may eventually replace all magnetic tape and
disk storage. To write data, a laser beam burns tiny cavities into the surface of a
disk to mark bits for data. To read the data, a laser beam scans these areas. One
important characteristic of optical disc drives is their rotational speed. This speed
is important because it determines how fast data can be transferred to and from the

Year 11 Computer Education Page 30


CD. The two most commonly used optical discs are CD and DVD with the Blu-ray disc slowly emerging in the
market.

Discovery Learning:

Compare and contrast the storage capacities of the CD, DVD and the Blu-ray
Disc.
Compact Disc (CD)

A CD is the one of the most widely used optical discs which is available in a variety of formats such as: CD-
ROMs, WORMs or CD-R and CD-RW.

Read-only optical disks also known as CD-ROMs or Compact Disk Read-Only Memory and cannot be written
on. The most common applications of CDROM are in the storage and retrieval of multimedia images and
sound along with text. It can store up to 650MB on a single side and up to 72minutes of VHS-quality video.

Write-once and read many optical disks also called WORMs or CD-R (CD-Recordable) and are blank disks
that are recorded by the user. To write data, a powerful beam of laser light burns tiny spots into the coating that
covers the surface of these disks. Once burned in, the spots are not erasable. To retrieve the data, a less
powerful laser is used to read the pattern of spots.

Erasable optical disk also known as CD-RW (Compact Disk rewritable) use lasers to read and write
information to and from the disk but also use a magnetic material on the surface of the disk and a magnetic
write head to achieve eraser ability. Up to 20MB can be stored n this type of disk.

Digital Versatile Disc (DVD)

DVD discs and DVD disc drives are very similar to CDs except that more data can be packed into the same
amount of space. The DVD drives can store 4.7 gigabytes on one side of a DVD disk – more than seven times
the capacity of a CD. Many DVD drives can store data on both sides of the disk, thereby doubling the
capacity.

Digital Versatile Disk- Read Only Memory can provide over two hours of very high quality video and sound
comparable to that found in motion picture theaters.

Year 11 Computer Education Page 31


Blu-ray Disc (BD)

Blu-ray Disc is an optical disc storage medium designed to supersede the DVD format. The plastic disc is
120 mm in diameter and 1.2 mm thick, the same size as DVDs and CDs. Blu-ray discs contain 25 GB per
layer, with dual layer discs (50 GB) being the norm for feature-length video discs.

Figure 1.2v High Density Optical Discs

Other types of Storage Devices


Solid State Storage
Solid state storage is portable, provides fast access to data, and uses very little power, so it is an ideal solution
for storing data on mobile devices and transporting data from one device to another. It is widely used in
consumer devices, such as digital cameras, MP3 music players, notebook computers, PDAs and cell phones.
There are several types of solid state storage devices.
USB flash drive is a portable storage device featuring a built-in connector that plugs directly into a computer‘s
USB port. A USB flash drive requires no card reader, making it easily transportable from one computer to
another.

Flash memory cards are credit card-sized solid-state storage devices widely used in notebook computers. Flash
memory also is used in a variety of specialized input devices to capture and transfer data to desktop computers.
Flash memory is also used to record MP3/4 music files and to transfer those files to computers and other
devices.

Key chain flash memory devices are so compact that they can be transported on a key ring or necklace. Key
chain hard drives conveniently connect directly to a computer‘s USB port to transfer files.

Compact Flash (CF) cards are about the size of a matchbook and provide high storage capabilities and access
speeds. Compact Flash cards include a built-in controller that reads and writes data within the solid state grid.

Year 11 Computer Education Page 32


Multimedia cards (MMC) offer solid state storage in a package about the size of a postage stamp. Initially used
in mobile phones, use of Multimedia cards has spread to digital cameras and MP3 players.

Figure 1.2w Solid State


Drives

Magnetic Tape

A magnetic tape is a tape coated with a magnetic material on which data can be stored. This is a sequential
storage device that is usually used for a backup purpose. A magnetic tape is slower than direct access storage
such as disk, because it is sequential access storage. The biggest advantage of magnetic tape is the cost. It is
much cheaper than magnetic disk and optical disk. An advanced tape backup technology (DAT) is available
these days.

Figure 1.2x Magnetic tape inside a tape drive

Cache (Cache memory)

A cache is a specially designed buffer storage used to improve computer performance by reducing access time.
It holds instructions and data that are likely to be needed for next operation by the processor. The cache copies
frequently accessed data and instructions from primary storage (main memory) or secondary storage (disks).

Year 11 Computer Education Page 33


Review Exercise 1.2.4

True/False

a) The most inexpensive storage medium for the microcomputer is the hard disk.
b) Secondary storage holds information within the CPU.
c) CD-R disks can be erased and used over and over again.
d) Hard disk packs are inside the computer system.
e) Magnetic tapes are mostly used for backup.

Fill in the blank


a) Secondary storage is also known as ______________ memory.
b) The amount of time it takes the device to locate an item on a disk is called ___________ time.
c) A type of storage that is volatile is called ______________.
d) A ___________ is an extremely high capacity compact disc capable of storing 4.7GB to 17GB of data,
instruction and information.
e) Data on an optical storage medium, such as a DVD is stored as a pits and ______________.

Short Answer Questions


a) What is a head crash?
b) Describe the three types of hard disks?
c) Describe three ways to improve hard disk performance?
d) Give two reasons why the use of USB is becoming more popular than CD ROMs.
e) What is the impact of using DVDs as storage device?

Year 11 Computer Education Page 34


1.3 Categories of Computer

There are different categories of computer in the market today. Different types are designed for different
purposes.

Microcomputer

A microcomputer is also known as personal computer or PC, are computers mostly used in homes and for
small business. A microcomputer usually costs about $1,000 and its processor performs about 1 billion
operations per second. Microcomputers generally carry out their own processing tasks and come in many sizes
and shapes. These are as follows:

Desktop PCs it‘s on a desk like the ones in schools today. The display screen is usually placed on the top of the
horizontal desktop case. Of the desktop micros, the most common ones in Fiji today are the IBM (international
Business machines) compatible.

Figure 1.3a Desktop computer

Notebook computers also known as laptops, are portable, lightweight, size of a large reference book, usually
have their own carrying bags.

Figure 1.3b (from left to right) Notebook computers, ultrabooks, tablet

Ultrabooks, also known as ultraportable or mini notebooks, are a type of very portable laptop. They are lighter
and thinner and have a longer battery life than other laptops.

Tablets, also known as tablet computers, are the newest and one of the most popular types of computer. They
are smaller, lighter, and generally less powerful than laptop computers.

Year 11 Computer Education Page 35


A mobile device is a general term for any type of handheld computer. Handheld computers are the smallest
and are designed to fit into the palm of one hand. It is also known as palmtop computer.

Personal digital assistants (PDA) are the most widely used handheld computer. Some mobile devices like
tablet, e-readers, and smartphones are powerful devices that can perform the same functions as the desktop and
laptop.

Discovery Learning:

Can notebook computers be connected to the network? If yes, explain how?

Figure 1.3c PDA

Server
A server is a hardware system dedicated to running one or more such services as a host, to serve the needs of
users of the other computers on the network.

Servers are important components of networks. They provide shared access to services on the network. A
server is a software and hardware package that provides access to particular services. Depending on the
computing service that it offers it could be a database server, file server, mail server, print server, web server,
or other. These servers may be dedicated computers or one computer may provide a number of these services.
Some of the server software is specialized.

Figure 1.3d Facebook datacenter server in Prineville Oregon, USA

Year 11 Computer Education Page 36


Supercomputers

Supercomputers (Figure 1.3f) are the largest, fastest and most expensive types of computer. Unlike
microcomputers and servers, supercomputers are not designed to optimize processing for multiple users.
Instead supercomputers use their significant processing power to solve a few very difficult problems such as
predicting the weather, modeling nuclear reactions and oil/space exploration. The speed of a supercomputer
has reached one quadrillion instructions per second. Supercomputers are mostly used by researchers and
scientists.
Discovery Learning:

Find out the types of servers used by organizations like USP, FINTEL, Telecom, ANZ, FMF
and some other big companies in Fiji. Also find out the storage capacities and speed of these
servers.

Figure 1.3eK Computer is currently world’s fastest Supercomputer

Note: the supercomputers are continuously upgraded in the race to be the fastest supercomputer by competing
nations like USA, Japan, China and the European Union. The Top list changes every six months at the time of
the writing of this book, the world‘s fastest supercomputer was Sunway TaihuLight Computer shown in
Figure 1.3f. You can now check these websites for the latest fastest supercomputer.

1. http://www.top500.org/

2. https://en.wikipedia.org/wiki/Supercomputer

Year Supercomputer Peak speed (Rmax) Location


2016 Sunway TaihuLight 93.01 PFLOPS Wuxi, China
2013 NUDT Tianhe-2 33.86 PFLOPS Guangzhou, China
2012 Cray Titan 17.59 PFLOPS Oak Ridge, U.S.
2012 IBM Sequoia 17.17 PFLOPS Livermore, U.S.
2011 Fujitsu K computer 10.51 PFLOPS Kobe, Japan
2010 Tianhe-IA 2.566 PFLOPS Tianjin, China
Table 1.3f. List of Supercomputers and their speed.

Year 11 Computer Education Page 37


Review Exercise 1.3

True/False
a) The term microprocessor is a synonym for the term microprocessor.
b) Most computer included a network card designed to connect a computer to the internet using standard
telephone line
c) Supercomputer is the fastest type of computer in the world.

Short Answer Questions


a) List two ways computers are used in special education in Fiji.
b) There are three types of computer and one of which is supercomputer. What is a supercomputer?
c) Name the categories of computer which is mostly used by businesses to centralize storage, process and
manage large amount of data.

1.5 Summary

1. A computer is an electronic machine that operates under the control of


instructions stored in its own memory.

2. Computer accepts data (input), manipulate the data according to specific


rules (process), produce results (output), and store the results for future use
(storage).

3. Data is a collection of unorganized facts, figures, and symbols.

4. Computers process data to create information. Information is data that is


organized, meaningful, and useful.

5. Data entered into a computer is called input. The processed results are called output.

6. The cycle of input, process, output, and storage is called the information cycle.

7. Hardware is the physical part of the computer system.

8. Supercomputer, mainframe, server and microcomputer are categories of


computers. Microcomputers can be desktop, notebook (laptop), tablet Pc,
or handheld (palm). PDAs are the most widely used handheld computer.

9. The system unit, sometimes called a chassis contains the electronic


circuitry, including the microprocessor and memory (primary storage,
random access memory [RAM], temporary storage).

Year 11 Computer Education Page 38


10. Input/output devices are translators for humans and computers. Input
devices include the keyboard and mouse. Output devices include monitors
and printers.

11. Secondary storage holds data and programs. A storage device records and
retrieves data, information, and instructions to and from storage medium.
Common storage devices are a hard disks, optical disks (CD, DVD), USB
flash dive and tapes.

Key Terms

 adapter
 firmware
 adapter card
 gigahertz
 data-processor
 graphics card
 arithmetic operation
 integrated circuit
 binary system
 interface card
 bit
 laptop computer
 bus
 main board
 bus line
 memory
 byte
 microprocessor
 cache memory
 motherboard
 chassis
 MIDI
 chip
 nonvolatile memory
 clock speed

 control unit

 desktop

 expansion card

 supercomputer

 fireWire port

Year 11 Computer Education Page 39


Chapter 2
Health and Safety Issues
“Bringing communication solutions to the world comes with a responsibility to make safe choices” Anonymous

After completing this chapter, you will be able to:

1. Define Ergonomics.
2. Describe the importance of Ergonomics.
3. Discuss the significant concerns created by frequent computer use.
4. Describe the ergonomic factors which need to be taken into account when setting up a computer.
5. Discuss the significant Health and Safety Issues in computer labs.

Year 11 Computer Education Page 40


2.1 Ergonomics

Ergonomics is the study of the relationship between people and their working
environment. While working with computers, factors have to be considered which
may impact on the health of those who operate these machines.

To assess the fit between a person and their workplace, Ergonomists have to consider
the following aspects:
a. The work that is to be done and the demand on the person doing the work.
b. The equipment used (it‘s size, shape and it‘s appropriateness to the task)
c. The information used (how it is presented, accessed and changed)
d. The physical environment ( temperature, humidity, lighting, noise, vibration)
e. Social environment
Ergonomists must also consider all the physical aspects of the person such as:
a. Body size and shape
b. Fitness and strength
c. Posture
d. The senses, especially vision, hearing and touch
e. The stresses and strains on muscles, joints, nerves
By assessing these aspects Ergonomists should be able to design safe, effective and
productive work systems.
Figure 2.1a Ergonomic Workstation Figure 2.1b Non-ergonomic
workstation

source: www.google.com source: www.google.com


Major factors concerned with Physical and Mental Health Matters.

2.1.1 Physical Health


Sitting in front of a screen in awkward positions for long periods may lead to physical
problems. These include eyestrain, headaches and back pain. Users can alleviate these
problems by taking frequent rest breaks and by using well-designed computer
furniture.

The health matters related to computers that have received the most attention recently are the following:
Avoiding eyestrain and headache:
Our eyes were made for most efficient seeing at a distance. However, monitors require using the eyes at closer
range for a long time, which can create eyestrain, headaches, and double vision.

Year 11 Computer Education Page 41


Recommendation:
 To make the computer easier for the eyes, take a 15 minutes break every hour
or two. Avoid computers screens that flicker.
 Keep computer screens away from windows and other sources of bright light
to minimize reflected glare on the screen.
 Special antiglare screen coating and glare shields could be used.
 Keep everything you are focusing on about the same distance.
 Clean screen of dust from time to time.
Avoiding back and neck pain:
Work at monitors and keyboards that are in improper position can result in the pains in the back and neck. To
avoid these problems, make sure equipment is adjustable and flexible.

Avoiding repetitive strain injury:


Repetitive strain injury (RSI) also called repetitive motion injury and cumulative trauma disorder is
the name given to a number of injuries. These result from fast, repetitive work that can cause neck,
wrist, hand, and arm pain. One particular type of RSI, carpal tunnel syndrome, found among heavy
computer users, consists of damage to nerves and tendons in the hands.

Figure 2.1c Correct sitting


posture when using a computer

source: www.google.com

Avoid effects of electromagnetic fields


Very simply put, EMFs are electromagnetic fields—invisible lines of force that emanate from any
electrical or wireless device. There are basically two types of EMFs: low frequency and high
frequency. Low frequency EMFs are emitted by our electricity and appliances. The strongest fields
are emitted from the sides and the backs of computer terminals.

Recommendation

Computer users should follow a policy of ―prudent avoidance‖ in reducing their exposure to EMF emissions.
They should try to sit about 2 feet or more from the computer screen and 3 feet from neighboring terminals.
Pregnant women should be particularly cautious and are encouraged to consult with their physician.

2.1.2 Mental Health


Avoiding noise:
Computing can be quite noisy. Voice input and output can be distracting for co-workers. Working
next to a printer for several hours can leave one with ringing ears. Also, users may develop headaches
and tension from continual exposure to the high frequency, barely audible squeal produced by cooling

Year 11 Computer Education Page 42


fans and vibrating parts inside the system unit. This is particularly true for women who hear high-
frequency sounds better than men do.
Recommendation
 Head-mounted microphones and earphones greatly reduce the effect of voice input and
output.
 Acoustical tile and sound muffling covers are available for reducing noise from co-workers
and impact printers.
 Tightening loose system unit components will reduce high frequency noise.

Avoiding stress from excessive monitoring:


Research shows that workers whose performance is monitored electronically suffer more health problems than
do those watched by human supervisors. One study found that electronically monitored employees reported
more boredom, tension, extreme anxiety, depression, anger and severe fatigue (weakness, tiredness) than those
who were not electronically monitored. Techno stress is the tension that arises when we have to unnaturally
adapt to computers rather than having computers adapt to us.

Review Exercise 2.1

Fill in the blank


a) The new word ____________ is used to describe harmful stress associated with computer use.
b) Computer ____________ are guidelines for the morally acceptable use of computer in our society.
c) Keep computer screens away from windows and other sources of bright light to minimize reflected
_________ on the screen.
d) ________________ emissions can travel through
e) A repetitive strain injury that causes damage to nerves and tendons in the hands is due to __________.
Short Answer Questions
a) What is ergonomics?
b) Why is ergonomics important?
c) State three things a computer user could do to avoid eyestrain and headache.
d) Define the phrase ―Repetitive strain injury‖.
e) Discuss some of the most significant physical concerns created by frequent computer use and how they
can be avoided.

2.2 Workplace Safety Rules


2.2.1 General Safety

Safe working conditions help prevent injury to people and damage to computer
equipment. A safe workspace is clean, organized, and properly lighted. Everyone
must understand and follow safety procedures.

source: www.google.com
Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and damage to eyesight. As a best
practice, make sure that a fire extinguisher and first-aid kit are available in case of fire or injury. Poorly placed
or unsecured cables can cause tripping hazards in a network installation. Cables should be installed in conduit
or cable trays to prevent hazards.

Year 11 Computer Education Page 43


This is a partial list of basic safety precautions to use when working on a computer:

 Remove your watch and jewellery and secure loose clothing.


 Turn off the power and unplug equipment before performing service.
 Cover sharp edges inside the computer case with tape.
 Never open a power supply or a CRT monitor.
 Do not touch areas in printers that are hot or that use high voltage.
 Know where the fire extinguisher is located and how to use it.
 Keep food and drinks out of your workspace.
 Keep your workspace clean and free of clutter.
 Bend your knees when lifting heavy objects to avoid injuring your back.

2.2.2 Electrical Safety

Follow electrical safety guidelines to prevent electrical fires, injuries, and fatalities in the home and the
workplace. Power supplies and CRT monitors contain high voltage.

source: www.google.com

Figure 2.2a Electrical Safety

CAUTION 1

Do not wear the antistatic wrist strap when repairing power supplies or CRT monitors. Only experienced
technicians should attempt to repair power supplies and CRT monitors.

Some printer parts become hot during use, and other parts might contain high voltage. Check the printer manual
for the location of high-voltage components. Some components retain a high voltage even after the printer is
turned off. Make sure that the printer has had time to cool before making the repair.

Electrical devices have certain power requirements. For example, AC adapters are manufactured for specific
laptops. Exchanging power cords with a different type of laptop or device may cause damage to both the AC
adapter and the laptop.

Year 11 Computer Education Page 44


source: www.google.com

Figure 2.2b Safe work practice.

Fire Safety

Follow fire safety guidelines to protect lives, structures, and equipment. To avoid an electrical shock and to
prevent damage to the computer, turn off and unplug the computer before beginning a repair.

Fire can spread rapidly and be very costly. Proper use of a fire extinguisher can prevent a small fire from
getting out of control. When working with computer components, be aware of the possibility of an accidental
fire and know how to react. Be alert for odors emitting from computers and electronic devices. When electronic
components overheat or short out, they emit a burning odor. If there is a fire, follow these safety procedures:

 Never fight a fire that is out of control or not contained.


 Always have a planned fire escape route before beginning any work.
 Get out of the building quickly.
 Contact emergency services for help.
 Locate and read the instructions on the fire extinguishers in your workplace before you have to use
them.

Be familiar with the types of fire extinguishers use in your country or region. Each type of fire extinguisher has
specific chemicals to fight different types of fires:

 Paper, wood, plastics, cardboard


 Gasoline, kerosene, organic solvents
 Electrical equipment
 Combustible metals

Year 11 Computer Education Page 45


It is important to know how to use a fire extinguisher. Use the memory aid P-A-S-S to remember the basic rules
of fire extinguisher operation:

 P: Pull the pin.


 A: Aim at the base of the fire, not at the flames.
 S: Squeeze the lever.
 S: Sweep the nozzle from side to side.

source: www.google.com

Figure 2.2c Operation of Extinguisher

Power Fluctuation Types


Voltage is the force that moves electrons through a circuit. The movement of electrons is called current.
Computer circuits need voltage and current to operate electronic components. When the voltage in a computer
is not accurate or steady, computer components might not operate correctly. Unsteady voltages are called power
fluctuations.

The following types of AC power fluctuations can cause data loss or hardware failure:

 Blackout: Complete loss of AC power. A blown fuse, damaged transformer, or downed power line can
cause a blackout.
 Brownout: Reduced voltage level of AC power that lasts for a period of time. Brownouts occur when
the power line voltage drops below 80 percent of the normal voltage level. Overloading electrical
circuits can cause a brownout.
 Noise: Interference from generators and lightning. Noise results in poor quality power, which can cause
errors in a computer system.
 Spike: Sudden increase in voltage that lasts for a short period and exceeds 100 percent of the normal
voltage on a line. Spikes can be caused by lightning strikes, but can also occur when the electrical
system comes back on after a blackout.
 Power surge: Dramatic increase in voltage above the normal flow of electrical current. A power surge
lasts for a few nanoseconds, or one-billionth of a second.

Power Protection Devices


To help shield against power fluctuation problems, use power protection devices to protect the data and
computer equipment:

 Surge suppressor: Helps protect against damage from surges and spikes. A surge suppressor diverts
extra electrical voltage that is on the line to the ground.
 Uninterruptible Power Supply (UPS): Helps protect against potential electrical power problems by
supplying a consistent level of electrical power to a computer or other device. The battery is constantly
recharging while the UPS is in use. The UPS provides a consistent quality of power when brownouts
and blackouts occur. Many UPS devices can communicate directly with the computer operating system.
This communication allows the UPS to safely shut down the computer and save data prior to the UPS
losing all electrical power.

Year 11 Computer Education Page 46


 Standby PowerSupply (SPS): Helps protect against potential electrical power problems by providing a
backup battery to supply power when the incoming voltage drops below the normal level. The battery
is on standby during normal operation. When the voltage decreases, the battery provides DC power to a
power inverter, which converts it to AC power for the computer. This device is not as reliable as a UPS
because of the time it takes to switch over to the battery. If the switching device fails, the battery cannot
supply power to the computer.

CAUTION 2

UPS manufacturers suggest never plugging in a laser printer to a UPS because the printer could overload the
UPS.

Equipment Disposal

The proper disposal or recycling of hazardous computer components is a global issue. Make sure to follow
regulations that govern how to dispose of specific items. Organizations that violate these regulations can be
fined or face expensive legal battles.

Batteries

Batteries often contain rare earth metals that can be harmful to the environment. Batteries from portable
computer systems can contain lead, cadmium, lithium, alkaline manganese, and mercury. These metals do not
decay and remain in the environment for many years. Mercury is commonly used in the manufacturing of
batteries and is extremely toxic and harmful to humans.

Recycling batteries should be a standard practice for a technician. All batteries, including lithium-ion, nickel-
cadmium, nickel-metal hydride, and lead-acid, are subject to disposal procedures that comply with local
environmental regulations.

Monitors

Monitors contain glass, metal, plastics, lead, barium, and rare earth metals. According to the U.S.
Environmental Protection Agency (EPA), monitors can contain approximately 4 pounds (1.8 kg) of lead.
Monitors must be disposed of in compliance with environmental regulations.

Handle CRT monitors with care. Extremely high voltage can be stored in CRT monitors, even after being
disconnected from a power source.

Toner Kits, Cartridges, and Developers

Used printer toner kits and printer cartridges must be disposed of properly or recycled. Some toner cartridge
suppliers and manufacturers take empty cartridges for refilling. Some companies specialize in refilling empty
cartridges. Kits to refill inkjet printer cartridges are available but are not recommended, because the ink might
leak into the printer, causing irreparable damage. Using refilled inkjet cartridges might also void the inkjet
printer warranty.

Chemical Solvents and Aerosol Cans

Contact the local sanitation company to learn how and where to dispose of the chemicals and solvents used to
clean computers. Never dump chemicals or solvents down a sink or dispose of them in a drain that connects to
public sewers.

Year 11 Computer Education Page 47


The cans or bottles that contain solvents and other cleaning supplies must be handled carefully. Make sure that
they are identified and treated as special hazardous waste. For example, some aerosol cans explode when
exposed to heat if the contents are not completely used.

Class Activity 1
1. Carry out a Fire Drill in the computer lab.
2. Demonstrate the proper use of electrical equipment in the computer lab.
3. Demonstrate the procedures to be followed if a student is electrocuted in the lab.

Year 11 Computer Education Page 48


Chapter 3
Green Computing
“Humankind most urgent task is to preserve nature for future generations’ - Anonymous

After completing this chapter, you will be able to:


1. Define Green Computing.
2. Explain the importance of Green Computing.
3. Study and describe ways to reduce energy consumption.
4. Identify and explain the 4R‘s to conserve available resources.

Year 11 Computer Education Page 49


3.1 What is Green Computing?
Green computing, also called green technology, is the environmentally
responsible use of computers and related resources. Such practices include the
implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced
resource consumption and proper disposal of electronic waste (e-waste). Greening of Computing deals with
developing energy efficient hardware/software systems.
As computing becomes increasingly widespread, the energy consumption as a result of computing is climbing,
despite the blaring calls to action to reduce consumption and reverse greenhouse effects.
Greenhouse gases keep the Earth warm through a process called the greenhouse effect. The Greenhouse effect
is a warming of the Earth‘s surface and troposphere (the lowest layer of the atmosphere), caused by the
presence of water vapour, carbon dioxide, methane, and certain other gases in the air.

3.2 Why Green Computing?


So there is no waste and no computer parts that would end up in a landfill or rubbish dumps. Computers are
made of poisonous materials like lead, chromium, cadmium and mercury. If computers are buried in landfill,
they can leach harmful chemicals into waterways and the environment and if burned release toxic contaminants
into the air we breathe.
Landfills can be controlled by making best use of the device by upgrading and repairing in time with a need to
make such processes easier and cheaper.
Green computing saves energy during idle operation, reduce harmful effects of computing resources thereby
reducing computing waste.
Contributing Factors
a. Increase in Data centers.
b. Widespread use of Desktops/Laptops.
A green data center will
a. Reduce the cost of running servers.
b. Cut cooling costs.
c. Use green design and green energy.
Reducing server energy cost
a. Buy/design energy-efficient servers.
b. Better hardware, better power supplies.
c. Turn off servers when not in use.

The goals of Green Computing:


 Reduce the use of hazardous materials, maximize energy efficiency during the product‘s lifetime, and
promote the recyclability or biodegradability of defunct products and factory waste.

 Research continues into key areas such as making the use of computers as energy- efficient as possible,
and designing algorithms and systems for efficiency- related computer technologies.

Year 11 Computer Education Page 50


Pathways to Green Computing: To comprehensively and effectively address the environmental impacts of
computing/IT, we must adopt a holistic approach and make the entire IT lifecycle greener by addressing
environmental sustainability along the following four complementary paths:
 Green Use: Intelligent use of energy and information systems. Reducing the energy consumption of
computers and other information systems as well as using them in an environmentally sound manner.

 Green Disposal: Reduction of waste, reuse and refurbishment of hardware and recycling of out of use
peripherals and other items. Refurbishing and reusing old computers and properly recycling unwanted
computers and other electronic equipment.

 Green Design: Efficient design of data centres and workstations. Designing energy – efficient and
environmentally sound components, computers, servers, cooling equipment, and data centres.

 Green Manufacturing: Informed purchasing of components, peripherals and equipment manufactured


with the environment in mind. Manufacturing electronic components, computers, and other associated
subsystems with minimal impact on the environment.

Recent Implementation of “Green Computing”


1. Blackle
Blackle is a search-engine site powered by Google Custom Search. Blackle came into being based on the
concept that when a computer screen is white, presenting an empty word page or the Google home page, your
computer consumes 74W. When the screen is black it consumes only 59W.

Figure 3.1a Blackle search engine


https://googleblog.blogspot.com/2007/08/is-black-new-green.html

Figure 3.1b Google search engine


Blackle can be used instead of Google search engine.

Year 11 Computer Education Page 51


2. Fit-PC

Fit-PC is the size of a paperback and absolutely silent, yet fit enough to run Windows XP or Linux. Fit-PC is
designed to fit where a standard PC is too bulky, noisy and power hungry. Fit-PC draws only 5 Watts,
consuming in a day less power than a traditional PC consumes in 1 hour.

Figure 3.1d Fit PC - low power PC


http://www.fit-pc.com/index.htm
3. Sun Ray thin Client

Thin clients like the Sun Ray consume far less electricity than conventional desktops. A Sun Ray on a desktop
consumes 4 to 8 watts of power, because most of the heavy computation is performed by a server. Sunrays are
particularly well suited for cost-sensitive environments such as call centers, education, healthcare, service
providers and finance.
Advantage and Disadvantage of the three recent Implementation of ―Green Computing‖
Advantages
 Energy saving
 Environmentally Friendly
 Cost-effective (pays over time), Save more money per year.
Disadvantages
 High startup cost
 Not readily available
 Still in experimental stages

3.3 Ways to reduce Energy Consumption


Energy consumption can be reduced by making small changes to the way we use computers.
Most personal desktop computers run even when they aren‘t being used, because users needlessly leave them
on, wasting electricity. Furthermore, computers generate heat and require additional cooling, which adds to the
total power consumption and cost for the enterprise. While the savings in energy costs per PC may not seem
like much, the combined savings for hundreds of computers in an enterprise is considerable. We can reduce PC
energy consumption by adopting several measures.

Year 11 Computer Education Page 52


 Enabling power management features - Without sacrificing performance, we can program computers
to automatically power down to an energy-saving state when we aren‘t using them. Some features are:
 Monitor/display sleep: Turn off after 15 minutes or less.
 Turn off hard drives/hard disk sleep: 15 minutes or less.
 System standby/sleep: After 30 minutes or less.

 Turning off the system when not in use. This is the most basic energy conservation strategy for most
systems. Many people believe the misconception that a computer‘s life is shortened by turning it on and
off, so they leave their computers on all the time. The electronic equipment‘s life span depends on its
cumulative operational time and its temperature. Turning it off reduces both of these factors, increasing
the life of the equipment.

 Think twice about that screen saver. Screen savers are not necessary on modern monitors, and
studies show they actually consume more energy than allowing the monitor to dim when it's not in use.

 Turn down the brightness setting on your monitor. The brightest monitor setting consumes twice
the power used by the dimmest setting.

 Go on standby. Switching to standby can also be a major power saver: a typical monitor consumes 30
watts to 140 watts while on, but less than 3 watts while on standby. The recommended setting is for
your computer to go to standby after no more than 30 minutes of inactivity.

 Turn off peripherals such as printers, scanners and speakers when not in use. Fight "phantom" or
invisible power use by plugging all your electronics into one power strip and turning the strip off when
you are finished using your computer.

 If it's not being used, shut it off. Keeping multiple applications open slows down your computer and
sucks up the battery life. If you no longer need that application, tell it goodbye - for now.

 Watch for program compatibility. Many popular computer games and other third party software
packages that run in the background will not allow the computer to go to sleep - even if they are paused
or the active window is minimized. Ditto for Web sites or pages with active banners or animated
advertisements that will not allow the computer to sleep on its own and must be closed, or the computer
put manually into a sleep state.

3.4 Conservation of Resources -The 4R’s: REDUCE, REUSE, RECYCLE and REPLACE
The order of the ‗4 R‘s is quite deliberate. Sometimes this is referred to as the ‗waste hierarchy‘.
Reduce
To reduce the amount of waste created in the first place is probably the best way of
reducing the waste footprint. Reducing waste saves energy, reduces the waste that
ends up in landfill or incinerators and saves valuable resources and raw materials.
Use or buy only what we really need - there is no waste to treat when there is no waste to begin with.
Reuse / Refurbish
By reconditioning and replacing IT hardware parts user can prolong its utilization. Old equipment can be
restored in order to maintain its functions; it also can be up graded for obtaining new serviceability. Reasons of
such actions can be motivated by lower cost of refurbished equipment.

Year 11 Computer Education Page 53


Recycle
Finally, there are many resources that can be recycled. Materials like glass, metal, plastics and
paper can all be processed into new materials or products. Recycling reduces pollution and saves
energy while slowing down the rate at which non-renewable resources are depleted. Give items you don't need
to persons in need; recycle broken but recyclable items so that the resources can be recycled into usable items.
This principle allows protecting both: the raw materials necessary for manufacturing as well as those required
in the further processing. Recycling takes place in two areas: the production of products and the subsequent
wastes formation of these goods. Recycling assumptions involve forcing appropriate attitudes among goods
manufacturers, favouring the production with the most recoverable materials and creating the appropriate
behaviour of the recipients of these goods. By dismantling and providing reuse possibilities, intact natural
resources are conserved and air and water pollution caused by hazardous disposal is avoided. Additionally,
recycling reduces the amount of greenhouse gas emissions caused by the manufacturing of new products.

Unused CRT screens can be used to make house for the pets.

source: www.google.com

Year 11 Computer Education Page 54


Replace
Replace older Cathode Ray Tube (CRT) monitors with Liquid Crystal Display (LCD)/ Light-Emitting Diode
(LED) monitors.

CRT Display LCD Display LED Display

source: www.google.com

CRT monitors use more power than LCD monitors and contain significant amounts of lead. Fluorescent back-
lights have mercury, whereas LED back-lights do not have mercury. Hazardous chemicals like lead, mercury,
cadmium, beryllium, Brominated Flame Retardants (BFRs) and Poly Vinyl Chloride (PVC) are used to make
computers. Reductions in their use could prevent people being exposed to them and safely recycle electronic
waste. Less polluting manufacturing processes need to be undertaken by.
SUMMARY
Green IT is continuously interesting people and organizations all over the world, the main reason being larger
financial returns on the investment made on green data centre. Green computing has got a lot of importance due
to rising energy costs and its impact on the environment and need to manufacture and store energy has
increased mainly due to the volume of systems that the companies generally rely on. The power used by
companies is a critical issue. The concept of using green computing is beneficial as it helps the organizations
dispose their electronic waste in an effective way so that the environment is not hampered. This is also done to
help reduce the CO2 emissions from data centres that are responsible for global damage. The concept Green
Computing with respect to data centres leads a lot of cost savings over time. Reduction in energy expense from
servers, cooling and lightning helps any industry saves a lot on their budget on power.
REVIEW EXERCISE
Multiple Choice
1. Lead-acid batteries are most commonly a component of which piece of IT equipment?
A. Pc Motherboard
B. LCD monitor
C. Uninterruptible power supply
D. Surge protector

2. Energy efficiency readings should be taken:


A. At the same time of day each day
B. On the same day each week
C. One week each month
D. At varying times of day and days of the week
Short Answer Questions
1. Explain how could one contribute to energy conservation
Answer the above from the viewpoint of a
a. User of computers
b. A spectator providing advice to the industry.

Year 11 Computer Education Page 55


2. Research on the relevance of Green Computing in Virtualization and Telecommuting.
3. Explain what do you understand by green technology in your own words?
4. What is sustainable IT manufacturing?

5. CASE STUDY

In the past decade, a lot of research has been carried out aiming at providing better battery life to the mobile
devices like PDAs, mobile phones and Laptops. However with the advent of data centers, Greening of
Computing also deals with energy efficient designs for servers and to lower costs and carbon emissions
produced by Data centers. A recent survey shows that quite a lot of power used in buildings and colleges are
spent on Computing.
a. From the above case study identify two areas of study that can contribute to Green Computing.
Better battery life to the mobile devices like PDAs, mobile phones and Laptops and energy efficient designs for
servers

Year 11 Computer Education Page 56


Chapter 4
Software
“Education should not be about building more schools and maintaining a system that dates back to
the Industrial Revolution. We can achieve so much more, at unmatched scale with software and
interactive learning.” ~ Naveen Jain

After completing this chapter, you will be able to:


1. Describe the difference between system software and application software.
2. Discuss the various type of system software.
3. Understand how system software interacts with application software.

Year 11 Computer Education Page 57


4.1 Introduction to Software

The software is a series of instructions or a special program that performs a particular task and is recorded in
some form on a computer disk. Simply, the software is an abstract collection of instructions for computers to
perform specific tasks. It is also referred to as a program or software program. Computer software has two
major categories. It is typically classified into system software and application software as shown in Figure
2.0 below.

Software

System Application
Software Software

Operating System General Purpose

Device Driver Special Purpose

Utility

Language
Translator

Figure 4.0 Categories of Software

Year 11 Computer Education Page 58


4.1 System Software

System software is a set of programs that manage or control a computer‘s resources. System software acts as
the interface between the user, the application software, and the computer‘s hardware. System software is made
up of four control programs which include the following:
Operating systems – coordinate computer resources, provide an interface between the users and the computer
and run applications.
Utilities – also known as service program, perform specific tasks related to managing computer resources.
Device drivers – are specialized programs that allow particular input, output or communication devices to
communicate with the rest of the computer system.
Language translators – convert the programming instructions written by programmers into a language that
computers understand and process.

Figure 4.1a Using Software (Adobe Photoshop CS5 Extended)

Year 11 Computer Education Page 59


4.1.1 Operating System
An OS manages the overall operation of the computer system. It is a set of programs that instructs and controls
the hardware functions of the computer system. Operating system software interacts between applications
software and the computer hardware.
The three main functions of an OS include:
 The provision of the user interface that allows users to interact with the computer systems for example
Microsoft Windows provides menus, toolbars, dialog boxes and icons that are used for a variety of
tasks.
 Running applications. In a multitasking operating system where multiple programs can be running at
the same time, the operating system determines which applications should run in what order and how
much time should be allowed for each application before giving another application a turn.
 Managing internal resources. It manages the sharing of internal memory among multiple applications.
It handles and monitors input and output to and from attached hardware devices, such as hard disks,
printers, and dial-up ports. It sends messages to each application or interactive user (or to a system
operator) about the status of operation and any errors that may have occurred. It can offload the
management of what are called batch jobs (for example, printing) so that the initiating application is
freed from this work. On computers that can provide parallel processing, an operating system can
manage how to divide the program so that it runs on more than one processor at a time. File
management including the creation, deletion, copying, naming and storing of files. Navigation through
disks, folders and files and switching between applications. Printing and installing printers. Font
management and use. Control the display of the monitor, including the resolution and size and starting,
restarting and shutting down the computer and networking.
Operating System Features
Booting the Operating System means turning on the Computer and having the Operating System loaded. There
are two types of booting.
1. Cold Booting
2. Warm Booting
Cold Booting is switching the computer on from the power source.
Warm Booting is restarting the computer either by pressing the reset button on the system unit or by pressing
Ctrl + Alt + Delete or by selecting restart option from the start menu.
Users interact with the operating systems through either a command line interface (CLI) or graphical user
interface (GUI). Most provide a place, called the desktop, which provides mean of access to computer
resources. Operating systems interfaces have several features in common with application programs as shown
in the table below.

Year 11 Computer Education Page 60


Features Function
Icons Graphics representations for a program or function.
Pointer Controlled by a mouse and changes shape depending upon its current
function.
Windows Rectangular areas for displaying information and running programs.

Menus Provide a list of options or commands.


Dialog boxes Provide information or request input.
Help Provides online assistance for operating system functions and
procedures.
Command line Prompts users to enter command to perform an action.

Table 4.1.1a Operating System Features

Menus

Icons

File

Folder
Desktop

Figure 4.1.1a Desktop GUI

Year 11 Computer Education Page 61


Categories of Operating System
The three basic categories of operating system are stand-alone, network and embedded.
Categories Function Examples
Stand-alone It is a complete operating system that Windows 3.x, Windows 95, Windows
operating works on desktop or notebook computer. NT, Windows 98, Windows 2000
systems Some stand-alone operating systems, Professional, Windows XP , Windows
called client operating systems, also Vista, Window 7, Window 8, Window
work in conjunction with a network 8.1, Window 10, Mac OS X, UNIX,
operating system. Linux etc.

Network Are used to control and coordinate Netware, Windows NT Server, Windows
operating computer that are networked or linked 2000 Server, Windows 2008 Server,
systems together. Windows 2012 Server, Windows NET
(NOS) Server, UNIX, Linux, Solaris, Cisco
IOS, JuNOS etc.

Embedded Are used for handheld computers and Windows CE, Pocket PC 2002, Palm
operating small devices like PDAs and Mobile OS, Symbian, Android, Apple iphone
systems phones. and Blackberry.

Table 4.1.1b OS categories

Discovery Learning:
Compare and contrast Windows and Macintosh operating system? Find different
versions of Mac OS and Linux OS and show the evolution of Windows.

4.1.2 Utilities
A utility program is a type of system software that performs a specific task, usually related to managing a
computer, its devices, or its program. In simple terms it performs the house keeping functions of the computer
system. There are many types of utilities available and some common ones are shown in Table 4.1.2b below.

Utility Program Function


Troubleshooting or A program that recognizes and correct problems, ideally before they
diagnostic program become serious.
Antivirus program Is a program that guard your computer system against viruses or other
damaging programs that can invade your computer system.

Uninstall program A program that allow you to safely and completely remove unneeded
programs and related files from your hard disk.

Backup program A program that make copies of files to be used in case the originals are
lost or damage.

Year 11 Computer Education Page 62


File compression programs A program that reduces the size of files so they require less storage
space and can be sent more efficiently over the internet.

Disk defragmenter A utility program that locates and eliminates unnecessary fragments and
rearranges files and unused disk space to optimize operations.

Table 4.1.2a Utility programs

Windows Utilities
The windows operating systems are accompanied by several utility programs as shown in Figure
4.1.2a step number 4.

2 4

Figure 4.1.2c Accessing Window 10 utilities


1
Utility Suites
Utility suites combine several programs into one package. Buying the packages is less expensive than buying
the programs separately. The three best-known utility suites are McAfee Office, Norton System-Works, and V
Communications System Suite. These suites provide a variety of utilities, including programs that will protect
your system from dangerous programs called computer viruses.

Discovery Learning:
Describe how to keep the anti-virus software up-to-date.

Year 11 Computer Education Page 63


4.1.3 Device Drivers
On installing components like sound cards, modem, mouse or printer, special software called device driver is
needed. Device driver is a program that provides the interface between the application software, operating
system and hardware device. Each time the computer started, the operating system loads all of the device
drivers into the computer‘s memory.
Whenever a new device is added or installed into the computer system, a new device driver must be installed
before the device can be used. However, the latest operating systems come with most device drivers
preinstalled so all you have to do is plug in the device and use it. These devices are now called plug n play
devices for example mouse, keyboard, digital cameras, flash drives and some printers.

Figure 4.1.3 Device Drivers Installed in Window 10

Discovery Learning:
Name some plug n play devices that can be configured automatically with
either Window 7, 8 or 10 or any other OS you are using.

Year 11 Computer Education Page 64


4.1.3 Language Translators
Language translators are programs that convert programs written in high level programming
language into machine language. Since the CPU can process only 0‟s and 1‟s everything task that we
perform on the computer must be converted into machine language (0‟s and 1‟s). Some examples of
language translators are compilers, interpreters and assemblers.
Note: do not confuse yourself with the other language translator programs that are available which
simple changes one spoken language into another for example, English to Hindi.
Review Exercise 4.1
True or False
a) One computer can only run one kind of system software.
b) Virtual memory increases the amount of memory available to run application programs.
c) Macintosh computers are designed to use the Pentium microprocessor.
d) The operating system Linux is the most popular with graphic designers and those who work in
multimedia.
e) Application software allows computer to interact with the user, applications and hardware.
Short Answer Questions
a) Why is a graphical user interface described as user-friendly?
b) What is a network operating system?
c) Describe at least three utility programs?
d) What is meant by multitasking?
e) An operating system is software that manages the overall operation of a computer system.
Explain briefly four basic functions of an operating system.

Year 11 Computer Education Page 65


4.2 Application Software
Applications software is created to perform either specific or general task which is not related to the computer
system itself. Application software can be bought off-the-shelf. There are two broad categories of application
software: special-purpose and general-purpose (refer to Figure 4.0). Special-purpose programs are designed
to perform specific tasks for example inventory, payroll, accounting, point of sales, virtual reality, artificial
intelligence and games. This software is in most cases customized to suit a particular business need. General-
purpose programs are designed to be used by many people to do the most common kinds of tasks such as
typing, preparing budgets, presentations and small databases. This is why they are also known as basic
application. Word processors, spreadsheets, database management system and presentation graphics are
general-purpose applications.

Ribbons Ruler

Tabs
Title Bar

Text Area
Quick Access Dialog Box
Toolbar Launcher

Status Bar Document Zoom


Vertical and Views
Horizontal Scroll Slider
Bars

Figure 4.2a Features of application software

Common features of application software


Feature Description
Tabs Presents tools/buttons available for selection from the ribbon.

Shortcut keys Special-purpose keys for frequently used commands.

Ribbon Presents graphic objects/buttons for commands


Help Presents explanations of various commands.
Dialog Box Used to specify additional command options.
Insertion Shows where data can be entered.
Point

Year 11 Computer Education Page 66


Scroll Bars Used to display additional information.
Quick Access Tools that are frequently used can be set here. Eg Save, undo, print and print
preview.
Groups Provide categorized tools options under specific headings.

Table 4.2a Features of application software

WYSIWYG: stands for “What You See Is What You Get”. This means that the image on the screen display
looks the same as the final printed document. The WYSIWYG feature allows the user to preview the
document‘s appearance before it is printed out.

4.2.1 Word Processing


Word processing software is used to create, edit, save and print documents. Word processing software creates
text-based documents such as reports, letters and memos. Word processors are one of the most flexible and
widely used software tools. All types of people and organization use word processors to create personalized
Web pages. The three most widely used word processing programs are Microsoft Word, Corel WordPerfect and
Lotus Word Pro.
Some important features of word processing are given in Table 2.2.1b.

Feature Description
Word wrap Automatically moves the word to the next line once the current
line is full. To begin a new paragraph or leave a blank line, you
press the Enter key.
Spelling and Spelling can be checked by running a spelling checker program.
Grammar Incorrectly spelled words are identified and alternative spelling
suggested. In a similar manner, grammar checkers can be run
that will identify poor wording, excessive long sentences, and
Editing Features

incorrect grammar.
Thesaurus Enables you to quickly find the right word or an alternative
word with similar meaning.

Find and You can quickly locate any character, word, or phrase in your
Replace document using the search or find commands.
Merge Mails merge or form letter features allows you to merge
different names and addresses.
Reference Tables contents, footnotes, end notes, indexes, page numbers,
bulleted lists etc.
Clipboard Cut, delete, copy, undo, redo and paste options.
Table 4.2.1b Editing Features of word processing

Year 11 Computer Education Page 67


Feature Description
Paragraph Numbering, bullet points, indentation, alignment,
line/character spacing and borders & shading allows
better organization of the contents in a document.
Font Type, color, size, bold, italics, underline and change
case allow enhancing the appearance of the contents of
the document.
Formatting Features

Styles Allow contents to be organized according the heading,


sub headings and captions.
Tables Text documents often include both text and numbers,
this type of information can be displayed as a table in
row-and-column format.
Hypertext Link Can be created to cross-reference information within
the current document and between other files including
WWW.
Illustrations/Graphics Objects such as lines and shapes can be inserted and
modified.
Internet Publishing Many word processors are including features that allow
you to create and edit documents to be displayed on the
web.
Table 4.2.1b Formatting Features of word processing

4.2.2 Spreadsheet
A spreadsheet is an electronic worksheet used to organize and manipulate numbers and display options for
―What-if‖ analysis. It enables one to manipulate figures and texts in columns and rows and perform
calculations using formulas. The columns are identified by letters and rows are identified by numbers. The
intersection of row and column creates a cell. For example, the cell B10 is formed by the intersection of column
B and row 10. Thus spreadsheet programs organize, manipulate and graph numeric information. The three most
widely used spreadsheet programs are Microsoft Excel, Corel Quattro Pro and Lotus 1-2-3.
Some common features of spreadsheet programs include the following.
Formatting cells
The same font and paragraph formatting features can be applied to the contents of a cell as in a word processor.
Labels are often used to identify information in a worksheet. Usually a label is a word or symbol, such as hash
sign (#). A number in a cell is called a value. Labels and values can be displayed or formatted in different
ways. For example, a label can be centered in the cell or positioned to the left or right or indented. A value can
be displayed to show decimal places, dollars, or percent. The number of decimal positions (if any) can be
altered, and the width of columns can be adjusted.
Formulas and Functions (main attribute of a spreadsheet)
Formulas are instruction for calculations. It is defined by the user and usually comprises of arithmetic
operations (+,*,-,/) with cell references. For example: to add cells C7, D7,E7,F7 , G7 ,H7 ,I7 ,J7 & K7 as shown
in Figure 2.2.2a, the user defined formula written in cell M7 would be = C7 + D7 + E7 + F7 + G7 + H7 + I7 +
J7 + K7.

Year 11 Computer Education Page 68


Functions are prewritten formulas that perform calculations automatically. For example to perform the same
addition, the function to be used in cell M7 would be = SUM(C7:K7).

Name of the
Workbook

Formula Bar

Active Cell

Column
Letters
Row Numbers

Range of Cells
M7 to M18

Cell

Label
Value Calculated
Active using the Function
Worksheet =Average(K7:K18)

Figure 4.2.2a A Worksheet


A range is a series of continuous cells. For example the cell M7 contains the function =SUM(C7:K7), which
adds the values from cells C7, D7,E7,F7 , G7 ,H7 ,I7 ,J7 and K7. The sum of the values in this range is
displayed in cell M7.
Analytical graphs or charts are visual representations of data in a worksheet. You can easily create graphs in a
spreadsheet program by selecting the cells containing the data to be graphed and then selecting the type of chart
to display. If you change one or more numbers in your spreadsheet, all related formulas will automatically
recalculate and charts will be automatically adjusted. Recalculation is one of the most important features of
spreadsheet.

Year 11 Computer Education Page 69


B E N R Y AN C O L L E G E
T R I A L O N E E X AM I NAT I O N M AST E R R E SU L T SH E E T - 2 0 1 4
Y E AR 1 2 S - ANAL Y SI S
120%
100%

%AGE PASS
80%
60%
40%
20%
0%
MATH
ENG PHY BIO CHEM COMP TD AGR HEC
S
% PASSED 67% 25% 50% 44% 36% 100% 0% 100% 100%

Figure 4.2.2b Trial 1Examination Percentage Chart


What-if analysis lets you change one or more values in your spreadsheet, all related formulas will recalculate
automatically. Thus you can substitute one value for another in a cell and observe the effect on other related
cells in the spreadsheet.

4.2.3 Database
A database is a program, which is used for computerized record keeping. It provides a place to store
information and a way to organize data so that it can be accessed in an organized and timely manner. A
database manager or database management system (DBMS) is a software package used to set up, or structure a
database. It also used to retrieve information from a database.
Data is organized into tables. Each table is made up of rows called records and columns called fields. Each
record contains fields of information about some specific item. Some of the database programs include
Microsoft Access, Corel Paradox, Lotus Approach, dBase IV.
Some features of database are as follows:
Locate and Display
A basic feature of all database programs is the capability to quickly locate or find records in the database.
Easier way to locate information is to apply a filter to the database. A filter displays the subset of records that
meet certain conditions or criteria. The main method of locating specific kind of data for a data from a database
is to create a query. A query locates the specified records and displays only selected fields.

Sorting
Database administrators make it easy to change the order of records in a file. Normally, records are displayed in
the order they are entered or by key field such as social security number. Rearranging or sorting of records is
a common feature utilized by database administrators.

Year 11 Computer Education Page 70


Fields

Records

Figure
4.2.3a Sample Database [ Microsoft Access 2016].

4.2.4 Presentation Graphics

A presentation graphics program can display numeric data in a visual format for analysis and presentation
purposes. These programs are often used by marketing or sales people as well as many others. Most commonly
used presentation graphics programs are Microsoft PowerPoint, Corel Presentation and Lotus Freelance
Graphics.
Features that are common to most presentation graphics include the following:
Most programs include features that help you organize the content of your presentation such design layout and
schemes that includes preformatted text for many different types of presentations from selling a product to
reporting on progress.
Professionally designed templates or models are provided. They include selected combination of text layouts
with features such as title placement and size. Additionally, various bullet styles, background colors, patterns,
borders and other enhancements are provided.
Animations include special visual and sound effects. These effects include blinking text and transitions
between topics. You can insert audio and video clips that play automatically or when selected. You can even
record your own voice to provide a narration to accompany a slide show.

4.2.5 Integrated Packages and Software Suites


An integrated package is a single program, which combines two or more applications programs. An integrated
package provides the functionality of a word processor, spreadsheet, database and more. An integrated package
usually shares a common user interface and you can switch from one application to another and cut or copy
data from one to another.

Year 11 Computer Education Page 71


The primary disadvantage of an integrated package is that the capabilities of each function (such as word
processing) are not as extensive as in the specialized programs (such as Microsoft Word). The primary
advantage is that the cost of an integrated package is much less than the cost of purchasing a word processor,
spreadsheet and database. The most widely used integrated package is Microsoft Works.
A software suite is a collection of separate application programs bundle together and sold as a group. The most
popular software suite is Microsoft Office, which comes in different version.

Figure 4.25a example of an integrated package Figure 4.25b example of a software suite

Discovery Learning:
Give more examples of integrated packages and software suites.

4.3 Advanced Application


Advanced applications include graphics programs, audio and video, multimedia, Web authoring and artificial
intelligence and virtual reality.
Graphics programs
Advanced graphics programs are used by professionals in graphic arts. Three types are desktop publishers,
image editors, and illustration programs.
Desktop publishing programs allow one to mix text and graphics to create publications of professional quality.
While word processors focus on creating text and have the ability combine text and graphics, desktop
publishers focus on page design and layout and provide greater flexibility. Desktop publishing programs are
widely used by graphic artists to create brochures, newsletters, newspapers and textbooks. Popular desktop
publishing programs include Adobe Frame-Maker, Adobe PageMaker, Corel Ventura, and QuarkXPress.
Image editors, also known as paint programs, are used to create and to modify bitmap images files. In a
bitmap file, the image is made up of thousands of dots or pixels to represent images. Popular professional
image editor programs include Adobe Photoshop, Corel Photo-Paint, and Paint Shop Pro.

Illustration programs, also known as draw programs, are used to modify vector images. In a vector file, the
image is composed of a collection of objects such as lines, rectangles and ovals. A vector file contains all the
shapes, colors, and starting and ending points necessary to recreate the image.
Graphic suites
Graphics suites are the bundling of the separate graphics programs as a group. The advantage of the graphics
suites is that a large variety of graphics programs can be purchased at a lower cost.

Year 11 Computer Education Page 72


Audio and Video
Using audio and video editing software enables user to compile movies. Video editing software allows one to
reorganize, add effects and more to the digital video footage. Audio editing software allows user to create and
edit audio clips. Most audio editing software has features that allow you to add audio effects, like filters, to
your tracks.
Multimedia
Multimedia also called hypermedia is the integration of all sorts of media into one form of presentation. The
media may include video, music, voice, graphics, and text. An essential and unique feature of multimedia is
user participation or interactively.
Web Authoring
Web authoring programs are typically used to create sophisticated commercial sites. Also known as Web page
editors and HTML editors, these programs provide support for web sites design and HTML coding. Widely
used authoring programs include Macromedia, Dreamweaver, Net Objects Fusion and Microsoft FrontPage.

4.3a Example of a Graphic software 4.3b Example of a Video Editing software 4.3c Example of a Multimedia

4.3d Example of a Wed Authoring Software

Discovery Learning:
Give an example of each of the graphics programs.

Artificial intelligence (AI)


The field of computer science known as artificial intelligence attempts to develop computer systems that can
mimic or simulate human senses, thought processes and actions. These include reasoning, learning from past
actions and using senses such as vision and touch.
Three areas which human talents and abilities have been enhanced with computerized intelligence: robotics,
knowledge-based systems, and virtual reality.

Year 11 Computer Education Page 73


Robots are computer-controlled machines that mimic the motor activities of humans and some are used for
household activities, entertainment purposes, while most are used in factories and hazardous environment to
handle dangerous, repetitive tasks with high degree of precision.
Industrial Robots - are used in factories to perform assembly-line tasks and also capable of performing a variety
of tasks. This includes machines which are used in automobile plants to do welding, polishing, and painting.
Some types of robots have claws for picking up objects and handling dangerous materials.
Mobile Robots are those which act as transports and are widely used for a variety of tasks. For example, the
police and the military use them to locate and disarm explosive devices.
Humanoids are designed to look exactly like humans. It is programmed to mimic actual human behavior like
talking, walking and making gestures. Humanoids are becoming popular as ushers, waitresses and shop
attendants.

4.3e Industrial Robot 4.3f Mobile Robots 4.3g Humanoids


Knowledge-based systems, also known as expert systems, are computer programs that provide advice to
decision makers who would otherwise rely on human experts. These expert systems use knowledge bases that
contain specific facts, rules to relate these facts, and user input to formulate recommendations and decisions.
Expert systems have been developed in areas such as medicine, geology, architecture, military science,
financial analysis and nature.
Virtual reality incorporates interactive sensory equipment (headgear and gloves) allowing users to experience
alternative realities generated in 3-D by a computer, thus imitating the physical world. The headgear has
earphones and three-dimensional stereoscopic screens. The gloves have sensors that collect data about your
hand movement. Coupled with software, this interactive sensory equipment lets you immerse in a computer-
generated world.

4.3h Virtual Reality


4.4 Summary

1. Software, also called a computer program, is the series of instructions that tells the hardware of a
computer what to do.
2. System software controls the operations of the computer and its devices and serves as the interface
between a user and computer hardware.
3. System software consists of a variety of programs including: operating system which contains
instructions that coordinate the activities of hardware devices, utility program, which performs specific
tasks usually related to managing a computer, device drivers are specialized programs to allow input
and output devices to communicate with the rest of the computer system.

Year 11 Computer Education Page 74


4. Application software are program which are written for specific and general tasks which are not
related to the computer system itself. Contrast must be drawn between application software and
operating system software.
5. There are two broad categories of application software: and general-purpose programs and special-
purpose programs.
6. General-purpose applications are widely used in nearly all career areas. Programs include word
processing documents, spreadsheets, databases, or presentation graphics.
7. Specialized (special purpose) applications focus on specific disciplines and occupations. These
programs include graphics, audio, video, multimedia, web authoring and artificial intelligence
programs.

8.
Word processors Microsoft Word, Lotus Word Pro, Corel WordPerfect

Spreadsheets Microsoft Excel, Corel Quattro Pro, Lotus 1-2-3

Database Managers Microsoft Access, Corel Paradox, Lotus Approach

Presentation graphics Microsoft PowerPoint, Corel Presentations, Lotus Freehand

Integrated packages Microsoft Works, Lotus Works


Software suites Microsoft Office 2007/2010/2013/2016, Open Office

Key Terms

application software basic application


booting device driver
dialog box embedded operating system
general-purpose application help
icons language translator
Macintosh operating system menus
Multiprogramming multitasking
network operating system operating system
presentation file program
service program software
special-purpose application standalone operating system
systems system software
utility program virtual memory
warm boot windows

Year 11 Computer Education Page 75


Review Questions – Multiple Choice
1. The Operating system that is widely used in Fiji is
a. Windows 10
b. Windows 7
c. Windows 8
d. Windows 8.1
2. An embedded operating system usually resides on a
a. hard disk c. ROM chip
b. RAM chip d. removable disk
3. The ability to have a number of applications running at the same time:
a. GUI c. integrated
b. networking d. multitasking
4. A _______________ combines several utility programs into a single package.
a. utility service c. disk scanner
b. zipped file d. utility suite
5. When using a word processor, the command to reinsert text into a document is
a. cut c. copy
b. move d. paste
6. A program that enables you to quickly find the right word or an alternative word with a similar
meaning is
a. thesaurus
b. spelling checkers
c. grammar checkers
d. search and replace
7. One example of an expert system is
a. CAD/CAM c. Windows 10
b. the personal computer d. troubleshooting

8. In MS Word, which of the following buttons would align text evenly on both the left and right
margins?
a. centre button c. justify button
b. align left button d. align right button

Year 11 Computer Education Page 76


9. Database management system are c comprised of tables that are made up of rows called
_____________ and columns called ____________
a. records, fields c. address, fields
b. fields, records d. records, ranges
10. Security personnel use ____________ to locate and disarm explosive devices.
a. mobile robots c. system robots
b. industrial robots d. perception robots
11. These programs guard your computer against malicious programs that may invade your computer
system?
a. file compression program
b. backup program
c. antivirus program
d. troubleshooting program
12. Every time the computer system is started, the operating system loads these into memory
a. driver updates c. device managers
b. device drivers d. windows updates
13. The software that would be most suitable to include special visual, sound effects and audio as well
as video clips is
a. MS-Excel c. MS-Word
b. MS-Powerpoint d. Desktop Publishing
14. The multimedia component that required the least amount of storage is
a. graphics c. sound
b. video d. text

15. The background software that loads the current program (ie,MSWORD) is called
a. system software c. integrated software
b. application software d. communication software

16. Which of the following software would be used to draw the architecture of an automobile?
a. integrated c. communication
b. desktop publishing d. computer-aided design

Year 11 Computer Education Page 77


Review Questions – Short Answers
1. What is the difference between application and system software?
2. Discuss the role of device drivers.
3. Explain the difference between special-purpose programs and general-purpose
programs?
4. Explain what a spreadsheet is, what is used for and give an example of a spreadsheet program.
5. Explain what is meant by an integrated software and give an examples.
6. Define desktop publishing.
7. Explain what a spreadsheet is, what is used for and name examples that can be used on a PC.
8. Explain what is meant by integrated software and give examples?
9. What are the three areas of artificial intelligence?
10. Define desktop publishing?
Additional Readings
O‟Leary, T. J, O‟Leary, L. I. Computing Essentials 2012 Complete Edition. McGraw Hill, New York,
2011.
June Jamrich Parsons & Dan Oja, New Perspectives Introductory Computer Concepts 8th Edition,
Thomson Course Technology.

Year 11 Computer Education Page 78


Chapter 5

Programming

Being a programmer means you never stop learning. The environment we

work in is constantly changing, evolving so we have to keep up with the


changes.- Anonymous

After completing this chapter, you will be able to:

1. Describe the six steps involved in programming.


2. Discuss design tools including algorithm, pseudo code, flowcharts and logic structures.
3. Differentiate between low level language and high level language.
4. Design programs using Visual Basic

Discovery Learning:

Who is a programmer?

Year 11 Computer Education Page 79


5.0 Introduction

What is a Program?

A program is a set of instructions for the computer to follow to accomplish the task of processing data into
information.

5.1 What is Programming?


Programming (also known as Software Development) is a six (6) step procedure for creating a list of
instructions for the computer to follow (program). Only one of those processes consists of typing (keying)
statements into the computer. The six steps are as follows:

Step 1 - Program
Specification

Step 6 - Program Step 2 - Program


maintenance Design

Step 5 - Program Step 3 - Program


documentation Code

Step 4 - Program
Test

Figure 5.1a Software Development Cycle

Year 11 Computer Education Page 80


5.2 Software Development

Step 1 Program Specification


Program Specification is also called Program Definition or Program Analysis. In this step, the programmer has
to determine the objectives, outputs, inputs, processing requirements and document them. It requires that the
programmer – or you, the end user – to complete these tasks procedures. They are:

1. Determining the programs objectives – the first step is to clearly define the problem to solve in the form of
program objectives.

2. Determining the desired output – next focus on the desired output considering the required inputs.

3. Determining the input data required – once the outputs are defined, determine the necessary input data and
the source of the data.

4. Determining the processing requirements – next, determine the steps necessary to use input to produce
output.

5. Documenting the program specifications – the final task is to create a specifications document to record this
step‘s program objectives, outputs, inputs, and processing requirements.

Step 2 Program Design


In the program design step, a solution is created preferably using structured programming techniques. These
techniques consist of the following:

Four structured programming techniques:

1. Top-down programming design – in top-down program design, major processing steps, called program
modules, are identified. Module is made up of logically related program statements.

Payroll

Obtain Input Calculate Pay Produce Output

Time Cards Employee Compute Compute Payroll Paycheque/


Records Pay Deduction Report Payslips

Figure 5.1b Example of Top Down Programming Design

Year 11 Computer Education Page 81


2. Pseudocode is an outline of the logic of the program you write.

An algorithm is a systematic logical approach used to solve problems in a computer

The importance of design

Before we make anything – a house, a dress or a computer


program – we should start with a design. Because there are two
important parts to most programs – the interface (how it looks)
and the code – we design these separately.

 The easiest way to design the interface is to sketch it out on paper.


 To design the code, write out a list of steps it will have to perform in English. This is known as an
algorithm and is just like the steps in a food recipe.

Solving problems like this is what programming is really about, rather than entering commands on the
computer.

All good programmers design algorithms before starting to code!

3. Flowcharts are the graphic representations of the steps necessary to solve a programming problem. The
action represented by each of these symbols has a direct relation to one of the functional parts of the
computer.
Flowchart Symbols

Symbol Name Description


Terminal An oval is used to depict the beginning
and ending steps of the sequence.

Input/Output A parallelogram is used to indicate the


input and output steps of the sequence.

Process A rectangle is used to represent arithmetic


and memory portion of the computer.

Decision A diamond is used to represent the use of


the computers logic and control unit which
must decide whether a statement is true or
false.

Year 11 Computer Education Page 82


Predefined process depicts a subroutine or
Process subprogram in a flowchart. It is used at the
ending point of the main program and at
the beginning of a subroutine.

Repetition/loop Preparation symbol indicates the starting


of a loop

Connector A connector indicates the ending of a loop;


it is also used to combine two flowlines

Flowline A flow line shows the sequence in which


direction to be flowed

Figure 5.3 Flowchart Symbols

START

Ask “Is it raining


today?”

NO YES
Is it raining?

Leave umbrella Take an


at home umbrella

END

Figure 5.4 Example of a flowchart

Year 11 Computer Education Page 83


4. Logic structures are the arrangements of programming statements. Three types are (sequence,
selection and loop).

Figure 5.5 Sequence, Selection and Iteration Structure

Sequence – one program statement followed by another.

Selection (if-then-else) – when a decision must be made.

Repetition/Iteration/loop – when a process is repeated until a condition is true.

STEP 3 PROGRAM CODE


Coding is the actual writing of the program by using a Programming language. Here, you use the logic that you
develop in the program design step to actually write the program i.e. you write the program using a pencil and
paper or you type it using a keyboard – forming the letters, numbers and symbols that make up the program.

A Good Program

Some qualities of a good program are:

 It should be reliable i.e. it should work under most conditions.


 It should catch obvious and common input errors.
 It should be well documented and understandable by programmers other than the person who wrote it.

The best way to code an effective program is to write a structured program using the different logic structures.

Language

Another important decision to make in this step is the selection of the programming language. There are many
programming languages for microcomputers – the more popular ones have been BASIC, Pascal, C# and the
more recent and currently the popular choice for programmers, C++, Java, JavaScript, Visual Basic, and
Python. It is usually the programmers‘ choice of what programming language he is going to use.

Year 11 Computer Education Page 84


STEP 4 PROGRAM TEST

In this step, the program is debugged – tested for syntax and logic errors and these errors corrected.

Bugs

A bug is an error that stops your code working as expected. There are two main types of bug that can occur in a
program:

 Syntax error
This happens when the rules of the language have been broken, eg by mis-spelling a command. Syntax
errors usually stop the code from running. Languages like Scratch provide code in ready-written blocks, so
you won‘t make many syntax errors.

 Logic error
This means your code runs, but doesn‘t do what you expect.
Unfortunately, it‘s still possible to make logic errors in Scratch.

Finding and fixing these errors in a program is known as debugging.

Testing Process

Several methods have been devised for finding and removing syntax and logical errors. They are as follows:

a. Desk Checking – a programmer proof reads a printout of the program, checking line by line for syntax and
logic errors and making the necessary corrections.
b. Manual Testing with Sample Data - Both correct and incorrect data is run through the program –
manually, not with a computer, to test for correct processing results.
c. Attempt at Translation – running a program using a translator program to identify syntax errors.
d. Testing Sample Data on the Computer - Sample data is used to test the correct execution of each
program statement to check if the correct outputs are delivered by the program.
e. Testing by a Select Group of Potential Users -This is sometimes called beta testing. This is usually the
final step in testing a program where potential users (skilled) try out the program and provide feedback.
These feedbacks are then used by the programmer to make those important and final changes to the
program.

STEP 5 PROGRAM DOCUMENTATION

Documentation consists of written descriptions and procedures about a program and how to use it. It not
something done just at the end of the programming process.

Documentation is important for all people who may be involved with the program in the future. These people
include the following.

 Users – those who need to know how to use the software. Some organisations may offer training courses to
guide users through the program. However, other organisations may expect users to learn a program from
the written documentation. Two examples of written documentation are manuals (User Guides) that
accompany software and the Help option within most microcomputer applications

Year 11 Computer Education Page 85


 Operators - Documentation must be provided for computer operators (in case of special purpose
programs). When the operators encounter error messages while using these programs, they need to be able
to refer to the appropriate documentation to encounter those error messages.
 Programmers - As time passes by, even the creator of the original program may not remember much about
it. Other programmers wishing to update or modify it i.e. perform maintenance, may find themselves stuck
without adequate documentation.

STEP 6 PROGRAM MAINTENANCE

The purpose of program maintenance is to ensure that the current programs are operating error-free, efficiently
and effectively. Activities in this area fall in two categories:

1. Operations - Concerns locating and correcting operational errors, making programs easier to use and
standardising software using structured programming techniques.

2. Changing Needs - This second category is unavoidable. All organisations change over time and their
programs must change with them. Programs need to be adjusted for a variety of reasons including new tax laws,
new information needs and new information policies etc.

5.3 Generations of Programming Languages

Source: https://www.google.com

Year 11 Computer Education Page 86


Five Generations of Programming Languages
Languages are described as occurring in "generations," from machine languages to natural languages.

Figure 5.6 Programming Language


Generations

Source: www.google.com

There are five generations of programming languages. These are:

1. Machine Languages: The First Generation


We mentioned earlier that a byte is made up of bits, consisting of 0‘s and 1‘s. These 0‘s and 1‘s may
correspond to electricity's being on or off in the computer. From this two-state system have been built coding
schemes that allow us to construct letters, numbers, punctuation marks, and other special characters. Examples
of these coding schemes, as we saw, are ASCII and EBCDIC.
Data represented in 0‘s and 1‘s is said to be written in machine language. To see how hard this is to understand,
imagine if you had to code this:
111100100111001111010010000100000111000000101011
Machine languages also vary according to make of computer-another characteristic that makes them hard to
work with.

2. Assembly Languages: The Second Generation

Assembly languages have a clear advantage over the 0‘s and 1‘s of machine language because they use
abbreviations or mnemonics. These are easier for human beings to remember. The machine language code we
gave above could be expressed in assembly language as

ADD 210 (8, 13), 028 (4, 7)

This is still pretty obscure, of course, and so assembly language is also considered low-level.

3. High-Level Procedural Languages: The Third Generation

People are able to understand languages that are more like their own (e.g., English) than machine languages or
assembly languages. These more English-like programming languages are called "high-level" languages.

Procedural languages are programming languages with names like BASIC, Pascal, C, COBOL, and
FORTRAN. They are called "procedural" because they are designed to express the logic - the procedures – that
can solve general problems.

Year 11 Computer Education Page 87


Compilers and Interpreters

For a procedural language to work on a computer, it must be translated into machine language so that the
computer understands it. Depending on the language, this translation is performed by either a compiler or an
interpreter.

A compiler converts the programmer's procedural language program, called the source code, into a machine
language code, called the object code. This object code can then be saved and run later.

An interpreter converts the procedural language one statement at a time into machine code just before it is to
be executed. No object code is saved. An example of a procedural language using an interpreter is the standard
version of BASIC.

4. Problem-Oriented Languages: The Fourth Generation


Problem-oriented languages, also known as very high level languages, require little special training on the part
of the user. Unlike general-purpose- languages, problem-oriented languages are designed to solve specific
problems. This group also includes query languages and application generators:
• Query languages: Query languages enable nonprogrammers to use certain easily understood commands to
search and generate reports from a database. An example is the commands used on an airline reservations
system by clerks needing flight information.
• Application generators: An application generator contains a number of modules-logically related program
statements - that have been pre-programmed to accomplish various tasks. An example would be a module that
calculates over-time pay.

5. Natural Languages: The Fifth Generation


Natural languages are still being developed. They are designed to give people a more human (―natural‖)
connection with computers. The languages are human languages: English, French, Japanese, or whatever.
The five generations of programming languages are summarized as follows:
PROGRAMMING GENERATIONS
GENERATION NAME SAMPLE STATEMENT

First Machine 10010001

Second Assembly ADD 210(8, 13),O2B(4, 7)

Third Procedural Overtime: = 0

Fourth Problem FIND NAME = JONES‖

Fifth Natural IF patient is dizzy, THEN check

temperature and blood pressure

Year 11 Computer Education Page 88


Chapter 6

Computers and Information Processing

“So, what you can do in Microsoft Word is what Bill Gates has decided. What
you can do in Oracle Database is what Larry Ellison and his crew have
decided.” ~ Ted Nelson

After completing this chapter, you will be


able to:

1. Distinguish between data and information

2. Recognize the role of information in decision making.

3. Learn about the importance of databases in data management

4. Explain the fundamental concepts in a database management system (DBMS).

5. Demonstrate how to create a basic database

Year 11 Computer Education Page 89


6.0 Introduction

There are seemingly endless amounts of information in our society. Each day, as scholars and
professionals ponder new ideas and ask questions, or as events unfold, more new information is
created. This information are described as processed or meaningful data, data context or any
collection of words,
numbers and symbols, organized so that it is meaningful to the person using it.

Have you performed any of the following tasks in the past few weeks?

Figure 6.0 Commonly used Web Applications

You definitely must have used the internet to do one of the following
tasks:

i. Checked your web email (Gmail, Ymail or Hotmail)?

ii. Searched the Library for a book, etc.

iii. Used the MOE exams website for information or your results.

iv. Searched for products on a website

v. Updated your profile details on Facebook or any other social networking site.

How do you think it is possible to meet the data requirements for each of the listed task?

All these efficient means of data access and data management has been made possible by a database.
Databases are designed to offer an organized mechanism for storing, managing and retrieving
information.

Year 11 Computer Education Page 90


Some databases store confidential and important information and hence require passwords and other
security features in order to access the information. Databases can operate on a standalone machine
or can be accessible in a network environment such as the Fiji Governments intranet and the internet.

6.1 Data and Information

Data is raw measurements and observations in the form of text, numbers, symbols, images, and
sounds which on their own have no meaning. Data may be made up of numbers called numeric
data, text called alpha data or a combination of both numeric and alpha data called alpha-
numeric data. Examples of data include

Height of a student, suppose 1.5m, is data;


His name, suppose Josaia, is a data;
His weight, suppose 67kg is a data;
His hair color, suppose brown is a data; and so on.
Number of hours worked, suppose 40hrs.
Number of units of electricity consumed, suppose 75kw.

Information is data organized and presented with context and meaning which can be evaluated,
that is, statements can be made about it, either true or false and coherent or incoherent. Examples
of Information include:
The average height or weight of Form 5 students, suppose 1.58m, is information;
The average weight of the class, suppose 61kg, is information.

Another example of Data vs Information:


Suppose Shameeta got 58 in Math, 76 in English, 69 in Physics and 82 in Computing Science in his
Short test 1.

Total Mark = 58 + 76 + 69 + 82 = 285(information).

Here, the individual marks are data but the total mark that calculated is information. Processing
helps transform data into information.

Figure 6.1a The Input/output Process

Year 11 Computer Education Page 91


Data Organization

To be processed by the computer data is typically classified into groups or categories as shown in Figure
6.1b. Each group is more complex than the one before.

Character Field Record File Database

Figure 6.1b Database construction

Character is a single letter, number or special character such as punctuation marks, the $ sign etc. These are the
smallest units of data representation.

A Field (column) contains a set of logically related characters. For example on a form, a person‟s first
name is a field, the last name is another field, street name is another field etc.

Record (row) is a collection of logically related fields represented together. All the contents of a
form concerning one particular itinerary can be called a record.
File (table) is a collection of logically related records. All forms (which are records) are kept in
one location that is a file.

Database integrates data. It is defined as the collection of integrated data. By integrated we mean
the data consists of logically related files (linked tables).

Characteristics of data and information


1) Data are the raw materials 1) Information is the resultant
(input) of information. (output) version of some data.
2) Data is a distinct piece 2) Information always be
of information. processed or organized.
3) Data is disorganized or 3) Information provides context
unprocessed. which gives meaning to data

Table 6.1c Difference between Data and Information

Year 11 Computer Education Page 92


Review Exercise 6.1

Short Answer Questions

1. If you are applying for an interview, give some examples of data and information you will
furnish to your potential employer. (Differentiate between what data and information you will
provide)
2. Suppose you are using Facebook. Give some examples of data and information displayed on the
social networking site.

Year 11 Computer Education Page 93


6.2 Role of information Processing in Decision Making

Data processing produces information which is required to form conclusions and make
decisions on plans of action. Good decisions are based on sufficient and timely information.
Insufficient information usually does not help in making good decisions. Because the computer
can handle large amounts of data efficiently and present summaries of information effecting
e.g. in the production of tables and graphs, it is considered to be essential for decision makers.

Data processing is the process of manipulating data in one or more of the following six
procedures:
Collect
ing
Data
Data may be collected from a number of sources. The most common form of data collection is
data entry from source documents. For example, collecting test marks for Form six students.
These marks are written on a sheet of paper and then can be entered into a database or
spreadsheet for manipulation

Organiz
ing Data
Data must be arranged into relevant categories so that the relationships between various
facts can be seen as shown in Table 6.2a.

Name Computer Mark


Anshu 78
Retasha 66
Ravneel 88

Table 6.2a Sample Student Dataset


Combining Data
This involves the combination of similar data to reduce the number of data items to be
processed. For example:

Name Computer Mathematics Total


Sc. Marks
Anshu 78 67 145
Retash 66 77 143
a
Ravnee 88 89 177
l Table 6.2b Combined Student Data

Year 11 Computer Education Page 94


Sorting Data
This involves the arrangement of data in the order that is needed e.g.
alphabetical, ascending/descending, chronological (SEQUENCIAL) etc.

Name Computer Sc.


Alphabetic order Anshu 78
Ravneel 88
Retasha 66

Table 6.2c Sorted Student Data

Manipulating Data
This involves performing calculations on the data e.g. finding the average of a set of
numbers, calculating the percentage of a quantity etc.
Summarizing
Data is summarized based on the contents of the relevant categories as shown in the tables below.

Name Computer Sc. Name Computer Sc. Position


Anshu 78 2
Anshu 78
Ravneel 88 1
Retasha 66
Retasha 66 3
Ravneel 88
Table 6.2d Student Data Table 6.2e Summarised Student Data

Traditionally data is processed in 2 ways:

Batch Processing
Data is collected over several hours, days or even weeks (period of time). It is then processed all at
once as a batch. Example a bank credit card account which is updated monthly or weekly or a
passbook savings account which is updated at the end of the day.

Real Time Processing


Occurs when data is processed at the same time the transaction occurs. For example, ATMs and
online bill payment systems. Real time processing is made possible by the availability direct access
storage.

Year 11 Computer Education Page 95


Review Exercise 6.2

Short Answer Questions

a) List three applications of databases in


 Business.
 Government.
 Home.

b) Briefly explain the following application areas of databases


 Inventory
 Accounting
 Mailing List Management
 Libraries
 Banking

c) What is the difference between an operational and a transactional database?

Year 11 Computer Education Page 96


6.3 Information Retrieval

This section will focus on databases which is the most widely used data storage, manipulation and
retrieval tool.

A database is a collection of related files that can be retrieved when needed. It is usually stored in a
secondary storage device e.g. hard disk or magnetic tape. The data in a database are accessed using
an application program called a database management system (DBMS). Students normally confuse
the definition of the two terms; database and Database management systems. A DBMS acts like a
custodian for all the information in a database.

A database is a store of organization that can be recalled if and when required. The information in
the database can be organized or manipulated to show specific patterns or to make selection of
specific pieces of information

A file is a collection of data stored in secondary devices. It is composed of a number of related


records each containing information about a particular subject e.g. a file of students‟ grade will
contain a record for each student.

A Record contains a number of fields which are related. A field is usually an important feature of
the subject whose data is stored in a record e.g. in the file of students‟ grade, a record may
contain the following fields:

 Students Name
 ID No.
 Form
 Subject
 Marks Gained
 Grade

A key field is a field that can be used to locate one particular record. In the above example, the
students‟ ID No. can be used as a key field because it uniquely identifies the record. Sometimes one
key field may not be enough identify a record e.g. in airline reservations, a passenger‟s name is not a
useful key field because there can be more than one passenger with the same name traveling on the
same flight. In the same way, a flight has so many passengers on it and the same flight number
goes up each day making the flight number alone and unsuitable key field. But combination of a
passenger‟s name, flight number
and date of the flight will be able to uniquely identify a record.

Year 11 Computer Education Page 97


Advantages of a Database

The four advantages of having


databases are
1. Sharing
2. Security
3. Fewer Files
4. Data Integrity

Sharing in organisations, information from various departments can be readily shared with other
departments and users.

Security enables user‟s proper and authorised access to only the kind of information they need to
know. For example the payroll department may have access to employees pay rate but other
departments may not. Access is restricted to authorized users only.

Fewer files mean less storage requirements. With several departments having access to one file,
there are fewer files in the information systems. Excess storage (extra copies of information) called
data redundancy is also reduced.

Data Integrity enables data to be updated instantaneously. Older filing systems did not have
data integrity i.e. a change made in a file in one department might not be made in another copy of
the file holding the same information in another department. This can cause serious problems
and conflicts when data is used for important decisions affecting both departments. Data integrity is
when changes made in one file to a particular data, updates are made in other files which contain the
same data as well.

The four disadvantages of having databases are

Disadvantages of Databases

1. Increased costs
2. Management complexity
3. Maintaining currency
4. Vendor dependence
5. Frequent upgrade/replacement cycles

The benefits and improvements database systems have brought about in data management is
unquestionable. Database systems have enabled more sophisticated use of the data. However, apart

Year 11 Computer Education Page 98


from the many advantages of a database system, there exist some significant disadvantages such as
the following.

Increased costs for maintaining database systems since it requires sophisticated hardware and
software. The cost of hardware maintenance, software licensing, upgrades and skilled DB
professional needed incur quite a significant cost.

Management complexity is the systems interfacing cost in terms of company's resources and culture
as well as the security issues prevalent must be assessed constantly.

Maintaining currency is keeping the system current, up-to-date and personnel training costs tend to
be significant.

Vendor dependence with the heavy investment related to DB systems, companies might be reluctant
to change vendors. This leads to limited choice of database system components.

Frequent upgrade/replacement cycles occur when vendors frequently upgrade their products which
companies have to keep par with. Some of these upgrades require hardware upgrades as
well as personnel training (users and administrators) incurring additional cost

Year 11 Computer Education Page 99


Review Exercise 6.3

Short Answer Questions

1. Identify three situations in your community or school where people are still keeping
data in traditional files systems.
a. List two reasons why you feel a database is better suited for storing information
than a traditional file system.
b. List two reasons why the organization would still prefer to use traditional files rather
than a database to store information.

6.4 Database Management System (DBMS)

A Database Management System (DBMS) is a program that manages the following five
functions.
Create records A DBMS provides a structure for the data and identifies the relationships
among the data.
Update records - A DBMS allows for the updating of files in the entry of new data and it sees that
new data conform to the defined structures already existing.
Maintain records - A DBMS corrects errors of misspelling, omission in content eg. File name or
data. It allows for changes in the structure of the database in cases where important information
may have been left out or useless information included.
Provide Access to records - Data may be accessed through the use of command languages
where the user types in the commands or prompting systems where the user selects commands
from menus. Depending on the user‟s needs, information can be retrieved on various forms. Notes
well the difference between the use of commands and the use of menu-driven or table-driven
systems, their advantages and disadvantages.
Control the integrity and security of data- Most systems perform the following to control the
integrity and security of files
a. Maintain conformity to the database definition eg. By comparing new entries to the
database definitions to see that no errors are made.
b. Control updating particularly when many users use the database simultaneously. Problems
may
arise when two users are trying to update the same data at the same time.
c. Assure the existence of data in the case of technical problems which may cause the loss of data.
This may require complicated techniques in restoring the data.
d. Control access to the data to ensure that users can only see data which they have legal
access to.
e. Resource locking refers to maintaining a database so that its data are accurately accessed
and problems which can rise from having two or more users working interactively with the
data can be prevented. For example, the double booking of a plane seat etc.

Year 11 Computer Education Page 100


Common Errors in a Database

Content Error refers to wrong input or misspelling.

Structural Error refers to error or flaws in the programming or definitions of the database.
Some common DBMS are MS Access, Oracle, MS SQL Server, MySQL and DB2.The key components of
DBMS software consists of the following.

Data
Dictionary

A data dictionary contains a description of the structure of data (fields) used in the database. For
each particular item of data (field), it defines the properties of that item for example the name of
that field, the data type, the length caption etc. It also specifies the character length of a field and
whether the field is a key field.

Query
Language

The access to most databases is accomplished through the use of query languages. A query is
simply a question that you can ask the database to provide relevant and specific information
only on demand. This is an easy way to use a language understandable to most users and uses
simple natural language structures like English words.

One of the most widely used query language is called the Structured Query Language (SQL). SQL
uses commands such as ADD, COMPARE, and DISPLAY, SELECT, JOIN, UPDATE, etc to
select relevant and specific information only.

Report
Generation
This part of the DBMS software enables a user to design and format reports for presentation
and decision making. Reports are normally generated from the results of the queries but organized
in a very neat and presentable way so that it is easily understood by everyone reading the report.

Review Exercise 6.4

Short Answer Questions

a) What is the purpose of a DBMS and how is it different from a database?


b) What are the drawbacks of using file systems to store data

Year 11 Computer Education Page 101


6.5 Database Security

Since databases are a valuable asset for all organizations, security is a vital issue. One concern is
that personal information about people stored in databases will be used for the wrong purpose. For
example a person‟s credit history, medical records maybe used for hiring and making promotional
decision.

Another concern is with preventing unauthorized users from gaining access to databases either
directly or through a network. Another serious concern is the prevention of the intrusion of a virus.
They may be introduced by end-users unknowingly or intentionally by unauthorized users. There
have been numerous cases where computer viruses have been launched into databases doing un-
repairable damages.

Computer viruses are hidden instructions that migrate through networks and operating systems and
become embedded in different programs and databases and do harm.

Security can require putting guards in a company‟s computer room and checking everybody‟s ID.
Some security systems automatically check for fingerprints. Security concerns are particularly
important to organizations using wide area networks. Violation of computer systems can occur both
physically and without entering secured areas. See chapter 6 for more details regarding types of
computer crimes.

6.6 Creating a Database

In this practical you will be introduced to the basic structure of building a database, entering and
saving data that will contain records of a Student database.
A database is like a huge electronic filing systems that contains large data collected from
employees, students, clients, inventory and others. Microsoft Access allows you to design and
create an electronic
filing system to keep all the records of individual and any other useful information for later
retrieval and editing of important data/information.

Terms to Learn Action/Meaning


Database Collection of tables with related information.
Table A Group of related data organized in fields (columns) and
record (rows).

Record A group of related fields.


Field Contain particular data that is being recognized by a unique
field name, such as ―Employee Id Number‖.

Table 6.6a Key terms to learn

Year 11 Computer Education Page 102


Before you start or launch Microsoft Access you need to create a new folder inside your My
Documents folder and name it Lab Manual Practical 6. You will save your database files inside
this folder.

You are now ready to start or launch the Microsoft Access application.

6.7 Summary

1. Databases are designed to offer an organized mechanism for storing, managing and
retrieving information.
2. Data is raw measurements and observations in the form of text, numbers, symbols,
images, and sounds which on their own have no meaning.
3. Information is data organised and presented with context and meaning which can be evaluated
4. Data processing produces information which is required to form conclusions and make
decisions on plans of action.
5. A database is a collection of related files that can be retrieved when needed.
6. Resource locking refers to maintaining a database so that its data are accurately accessed and
avoid problems which can arise from having two or more users working simultaneously with
the data.
7. Structured Query language (SQL) is used to select information or records from a relational
database.
8. Database security concerns the use of a broad range of information security controls to protect
databases against compromises of their confidentiality, integrity and availability

Key Terms

data
database
DBMS
SQL
record resource
locking data integrity
batch processing real-time processing
information
field data
dictionary

Year 11 Computer Education Page 103


Review Questions – Multiple Choice

1. Numbers, pictures or words without context are known as?


a. Data
b. Information
c. Knowledge
d. Communication

2. Which of the following is correct?


a. information leads to data, and data leads to knowledge
b. data leads to information, and information leads to knowledge.
c. knowledge leads to information, and information leads to data
d. data leads to knowledge and knowledge leads to information

3. In a database of a newspaper, journal or magazine articles, each record represents:


a. one magazine, journal or newspaper
b. one author
c. one article from a magazine, journal or newspaper
d. all of the above

4. You are making your own database so you can organize information about your „Top 100' movies.
You want to include information like Title, Actor(s), Director, Year, Genre, etc. Each record
in your database will represent:
a. an actor
b. a director
c. a year
d. a movie

5. A database program replaces what piece of office equipment


a. typewriter
b. photocopier
c. FAX machine
d. filing cabinet

6. Database Management System(DBMS) is/are

a. Computer Programming Language


b. Collection of interrelated data
c. Query Language to access a database.
d. DBMS provides an environment that is both convenient and efficient to use.

Year 11 Computer Education Page 104


7. John is working in the customer table and needs to know what customers are located in
Florida. To find the information he would _.
a. create a new table
b. create a new query
c. create a new form
d. utilize the Database Wizard.

References

Timothy J. O‟Leary & Linda I. O‟Leary, Computing Essentials 2007:Complete Edition, McGraw-Hill
Irwin, ISBN 978-0-07-351667-7

June Jamrich Parsons & Dan Oja, New Perspectives Introductory Computer Concepts 8th
Edition, Thomson Course Technology, ISBN: 0-619-26764-X

Peter Ware, Phillip Cooke, Dieter Opfer& June Wall, Information and Software
Technology 7-10, Jacaranda, ISBN: 0-7314-0168-9

Carole Wilson, Exploring Computing Studies, Second Edition, Cambridge University Press, ISBN: 0-
521-78714-9

Gary B. Shelly, Thomas J. Cashman, & Misty E. Vermaat, Discovering Computers 2003, Concepts for a
Digital World, Thomson Course Technology, ISBN:0-7895-6514-5

Donald D. Spencer. Introduction to Information Processing (3rd ed.). Prentice Hall PTR, Upper Saddle
River, NJ, USA.
O‟Leary, T. J, O‟Leary, L. I. Computing Essentials 2012 Complete Edition. McGraw Hill, New York,
2011.
Raghu R. and Johannes G., Database Management Systems, (3rd ed.), McGraw Hill, 2000, ISBN 0-07-
Timothy J. O‟Leary & Linda I. O‟Leary, Computing Essentials 2007: Complete Edition, McGraw-Hill Irwin,
ISBN 978-0-07-351667-7
June Jamrich Parsons & Dan Oja, New Perspectives Introductory Computer Concepts 8th Edition, Thomson
Course Technology, ISBN: 0-619-26764-X
Peter Ware, Phillip Cooke, Dieter Opfer & June Wall, Information and Software Technology 7-10, Jacaranda,
ISBN: 0-7314-0168-9
Carole Wilson, Exploring Computing Studies, Second Edition,Ca,bridge University Press, ISBN: 0-521-78714-
9
Gary B. Shelly, Thomas J. Cashman, & Misty E. Vermaat, Discoverign Computers 2003, Concepts for a
Digital World, Thomson Course Technology, ISBN:0-7895-6514-5.

Year 11 Computer Education Page 105


Other useful links:
a) http://research.microsoft.com/pubs/78813/AJ18_EN.pdf
b) http://www.epa.gov/climatestudents/basics/today/greenhouse-effect.html
c) http://www.britannica.com/science/greenhouse-effect
d) http://greenc0mputing.blogspot.com/2011/12/why-we-should-apply-green-computing-and.html
e) http://www.intel.com/content/dam/doc/best-practices/intel-it-ten-ways-to-reduce-your-computers-
energy-need-practices.pdf
f) http://www.globalfootprints.org/page/id/160/3
g) http://www.greenpower.org.hk/html/eng/classroom/glt_01.shtml
h) http://www.antitb.org.hk/en/booklet5-d.html
i) http://www2.epa.gov/recycle/electronics-donation-and-recycling
j) http://www.globalfootprints.org/page/id/160/3
k) http://www.academia.edu/6403222/Green_Computing_E-waste_management_through_recycling
l) http://www.toknowpress.net/ISBN/978-961-6914-13-0/papers/ML15-377.pdf
m) http://www.environmentalleader.com/category/green-technology/#ixzz4Naip61uy

Year 11 Computer Education Page 106

Das könnte Ihnen auch gefallen