Computer Fundamentals & Types
Computer Fundamentals & Types
Processing
Computers and Types of Computers
Information Technology is the use of computers to store, retrieve, manipulate and send
information. It is a computer based system of accessing information. Here is some very fun
vocabulary to know because CXC said so.
● Computer - an electronic device that manipulates information or data and outputs
the results, and operates under the control of instructions stored in its memory
● Computer system - a collection of hardware & software that is designed to receive,
process and manage the instructions/data given by the user and return output in the
form of readable information.
● Hardware - tangible parts of computer system, categorised into CPU, input devices,
output devices, memory, and storage devices. They include devices inside the CPU
and peripheral devices.
● Software - intangible parts of computer system. They tell the computer hardware
what to do
Hardware
Hardware is, quote “the bits you can touch.” Do with that what you will. Some examples
are speaker, keyboard, mouse, scanner, disk drives, power supply and motherboard. Some
are in the system unit, and some are outside. The ones outside are called peripheral devices,
and while the computer can technically work without them you won’t get much done
without, say, a monitor.
The basic functions of every computer system are input, processing, output and storage
(IPOS.) The IPOS cycle basically goes like:
● The Control Unit (CU) fetches the instructions from the RAM.
● The CU decodes it into binary so the Arithmetic Logic Unit (ALU) can understand
it.
● This is the Instruction Cycle (I-Cycle)
● The ALU executes the instruction. The information needed to execute the
instruction is stored in the registers.
● The CU sends the output to the RAM to be stored for future use.
● This is the Execution Cycle (E-Cycle)
Output
Output devices are used to get processed information out of a computer. There are two
types: soft copy which is not permanent (e.g. audio, output from a computer monitor,
electrical signals) and hard copy which is permanent (e.g. printed reports, printed images).
Display Devices
Computers usually display output on a screen or monitor, whether built in or separate.
Other examples include smartboards. The most common types of display devices are
Liquid Crystal Display (LCD) and Light-Emitting Diode (LED) screens. A monitor
contains a matrix of bright red, green and blue dots which are blended to display millions of
colours. Screens vary in size, resolution, and number of colours displayed.
Printing Devices
Printers output a hard copy of your work. There are two main categories: impact and non
impact.
Impact printers strike through a carbon or inked ribbon, like a typewriter. They are noisy,
obsolete, and their graphics quality is bad. However they are useful for printing multiple
copies with carbon paper, and continuous periodically perforated paper. A dot matrix
printer uses pins to print a pattern of dots onto a paper.
Non-impact printers do not actually strike the paper. Instead, they use ink spray or toner
powder, then the characters are fixed on the paper by e.g. heating. The printers are
inexpensive, fast and quiet. Some examples are inkjet printers, laser printers (much faster
than inkjets and very high quality), thermal printers (use heat on chemically treated paper),
3D printers (create 3d models layer by layer from the bottom up with melted plastic), and
plotters (uses coloured pens or toner to draw an image on a paper).
Audio Devices
Most computers include a sound card, which allows both the recording and playback of
sound. Loudspeakers can be used for playback but headphones are more popular since they
do not disturb others. Earphones are small headphones that fit inside the ear, and a headset
is a set of headphones with a microphone attached.
Processing
CPU
This contains much circuitry and components and is connected to the motherboard. It
processes the information at a speed measured in megahertz (MHz) or gigahertz (GHz).
Factors that affect the speed of the computer are:
● RAM - it determines the speed of information transfer, and dictates how many
applications can be open before the computer crashes (like a clown)
● Bus width - determines the number of binary units that can be transferred at once
● Bus speed - determines how much data can be transferred in a given time
● Cache memory - more easily accessible than RAM so the more of it is the more data
that can be quickly accessed.
Storage
There are 2 types of storage: Primary and Secondary. Primary is divided into volatile and
non-volatile, while secondary is divided into local devices (e.g. magnetic, optical & flash
memory) and cloud storage.
Primary Storage
This is accessed directly by the CPU. The 2 main types are Random Access Memory
(RAM) and Read Only Memory (ROM).
RAM is also called main memory. It is located directly on the circuit board for fast access. It
holds the temporary operating instructions for the computer, programs and data. This is
where the CPU receives its instructions and data. It is volatile, meaning it is lost when
power is lost.
ROM is non-volatile, and cannot be edited. It is available every time the computer is turned
on. It stores the Basic Input/Output System (BIOS)
Hybrid memory has features of both RAM and ROM. They can be read and written as
desired (like RAM) but are non-volatile, like ROM
Secondary Storage
This refers to the media and methods used to keep programs, data and information
available for later use. It is nonvolatile and long term. They usually have a large storage
capacity and they store data permanently. They can be inside or outside the computer.
Some more vocab ..yay.
● Media - the material storing the data
● Storage devices - what manages the media
● Magnetic devices - uses a magnet
● Optical devices - use lasers
Storage devices read and write to the storage media. Some examples are: read/write head,
flash drive, and cassette reader. On the other hand, the media is the material that stores the
content. Some examples are:
● hard disks - these store large amounts of data (700 GB to 1 TB) and are popular
with computers because of this
● floppy disks
● optical disks - these store much more data than magnetic media. They include CDs
(compact disk, used to store audio, ~700 MB), CD-ROMs (CD read only memory,
used to store data rather than audio, 650 MB), DVDs (digital versatile disk, used for
storing digital data and gaming software, 4.7 GB), BDs (Blu-ray disk, used for
distribution of video games and feature films in HD resolution, 100GB)
● magnetic tape - narrow strip of plastic coated with ferrous oxide. The data is
recorded along the length of the tape and each symbol is in binary across the width
of the tape. “Fun” fact: Magnetic tape is sequential/serial access (so you have to go
through all the ones before it before getting to a given file) and is mainly used for
backup. It has a storage capacity of 10 TB
● magnetic disk - a storage device that uses a magnetisation process to write, rewrite
and access data. It is direct/random access so you can *gasp* directly access all files. It
has a storage capacity of at least 1 TB
● flash memory cards - cards which store things that are inserted into cameras, video
game consoles, laptops, phones and other devices. E.g. the subscriber identity
module (SIM) card of a phone which stores the phone number, contacts and text
messages. The storage ranges from 2 GB to 1 TB.
Cloud
Advantages Disadvantages
Easier access to files If you use the files stored there a lot, the
cost of up/downloading adds up quickly
Doesn’t depend on whether hardware is If you don’t understand it, sucks to be you
working or not
Able to sync instantly If security does fail, it’s your fault not the
storage provider
Local
Advantages Disadvantages
Less risk of someone tampering with your If your hardware breaks, sucks to be you
files and sucks to be your data
Files can be accessed as much as needed If you need to update something ‘twill be
without an attached cost quite the hassle
System Specs
● Memory - how much primary & secondary storage
● Processor type
● Hard disk capacity
● Processor speed
● Word size (32 or 64 bit)
● Display resolution (1080p or 1024*768px)
● Gaming vs Web browsing vs Graphic design vs Video Editing (i think this means
what the computer is meant to be used for???)
Calculating Units of Storage
Computers allow data to be stored on secondary storage for future use. This storage is
finite, as most things are. The device indicates the storage capacity, such as 5 GB, 16 GB,
etc.
● 1 bit = 1 tiny tiny unit of storage
● 1 byte = 8 bits (1 character)
● 1 kilobyte (kb) = 2¹⁰ bytes (1,024)
● 1 megabyte (mb) = 2²⁰ bytes (1,048,576) and 1,024 kb
● 1 gigabyte (gb) = 2³⁰ bytes (1,075,741,824) and 1,024 mb
● 1 terabyte (tb) = 2⁴⁰ bytes (1,099,511,627,776) and 1,024 gb
Computers express storage in bytes, but they convert them to larger units for easier
viewing.
Calculations
1. Jane has a 1tb hard drive and Jackie has a 2gb flash drive. Jackie’s flash drive is full
and she wants to put her stuff on Jane’s hard drive. How many times can Jackie’s
flash drive fit onto Jane’s.
Step 1: ensure everything is in the same unit
1tb = 1,024 gb
2gb = 2gb
Step 2: divide. Without a calculator because apparently this is math class and not IT
class
1,024/2 = 512
Jackie’s flash drive can fit onto Jane’s hard drive 512 times.
2. Rena has a 15mb flash drive. Her classmates each have 28kb files that they want her
to store. How many files can fit?
15mb = 1024*15kb = 15,360kb
28 kb = 28kb
15,360/28 = 548.57
NB. decimals are irrelevant because you can’t have part of a file, and you cannot
round up. Therefore 548.57 changes to 548.
548 of her classmates’ files can fit on her flash drive.
Software
Software is, quote, “the bits you can’t touch.” Again, do with that what you will. There are
2 types, system and application software.
System Software
This is the set of software programs that run the computer and coordinate instructions
between application software and hardware devices. It consists of the operating systems
(OS) and utility programs. The OS provides an interface and basically controls how the
computer functions. Utility programs perform general housekeeping tasks like system
maintenance and file compression.
The responsibilities of the system software are booting, utilities, hardware control and
software control.
When one starts one’s computer, it *gasp* boots. This consists of:
● BIOS is activated when the CPU turns on
● In the POST check, the BIOS verifies that what is supposed to be attached is
attached (peripheral devices)
● OS is loaded into RAM
● Configuration and customisation settings are checked.
Application Software
● General Purpose - not specific to any organisation and can be used for many tasks.
E.g. word processor, database manager, spreadsheet program, presentation software
● Specialised - made solely for a specific task. E.g. camera app, autoCAD
● Integrated - a package containing a combination of popular general purpose
software. E.g. MS Office, LibreOffice, Adobe Creative Suite.
● Custom Written - written for a specific organisation to perform very specific stuff
needed in that particular organisation (e.g. Jonathan Monkeywarts hires someone to
make a budgeting software for him)
● Customised - a general purpose software that is modified to be more specific to a
task/company. (e.g. Jonathan Monkeywarts hires someone to make his word
processor software do mail merge more easily because of the amount of letters he
sends)
User Interface
(Let it be known for eternity that the powerpoint for this topic was posted 3 weeks late)
A user interface (UI) is a function of the operating system that provides a junction which
allows the user to interact with the computer program. It is a set of
commands/menus/icons through which a user can communicate with a computer
program.
There are 3 types: command line, menu driven and graphical.
Command Line
This allows the user to interact with the computer by typing very specific commands onto a
screen. An example of this is Microsoft Disk Operating System (MS-DOS) which is still a
mystery to me.
Advantages Disadvantages
If the user knows the commands, ‘tis It is very confusing for your average
speedy beginner
Needs much less RAM and CPU power If you make a mistake you have to start all
over which depending on what you are
doing could waste hours of your time
You can use a cheap, lower quality monitor You need to learn many many many
commands
Menu Driven
This lets you interact with a device by working through a series of menus, which can be
pop-up or drop-down. An example of this is an ATM.
Advantages Disadvantages
You can easily guess your way around It can be irritating if there are too many
menus
They don’t have to be visual which is good Even if you know exactly where you want
for phone calls or the visually impaired to go, you have to work through all the
menu screens first to get to it
Very easy to use for beginners Requires more hard disk space
UI Design
A good UI should:
● Be pretty
● Be easy to use
● Be consistent
● Have clear options shown
● Have clear warning messages when someone makes a mistake
● Have online help/support
Data/Information Processing
Data vs. Information
The difference between data and information is that data is unprocessed while information
is processed. Data is defined as raw, unprocessed facts and can be meaningless or
ambiguous. E.g. 26, 29, 30. Information is data that has been given structure put into a
meaningful & useful context. E.g. if the 3 numbers represented temperature in degrees
Celsius, it could be an indication of what type of clothes to wear.
The term information system is a term given to any record-keeping system where data is
collected, processed and displayed as useful information. Some examples of manual
information systems are dictionaries and telephone directories.
Characteristics of Data
Raw data can be inputted into a computer program or used in manual analysis procedures,
like gathering statistics from a survey. It can refer to the binary data on electronic storage
devices e.g. hard disk drives. Once captured, it may be processed and stored in a single
format. It can have the following attributes:
● Possibly having errors
● Unvalidated
● In several different formats or not formatted at all
● Requiring confirmation or citation.
Characteristics of Information
● Relevant - up to date and what the user needs to know to solve the problem
● Accurate - correct and complete
● Reliable - consistently accurate
● Timely - provided before opportunities to use it are lost
● Comprehensible - can be absorbed and made useful
● Interpretable - can be given different meaning by different users
● Secure - can only be accessed by authorised users
● Confidential - only available to a restricted set of people
● Valuable - aids in problem solving, decision making, and provides an advantage
● Distortion - can be presented to induce a particular view
● In an appropriate medium
● Cost effective - value of information > collection costs
Information Sources
Many things can be sources of data or information:
● Measurements - sales, productivity output, receipts
● Communication - word of mouth, meetings, announcements, interviews
● Publications - newspapers, media reports, research papers, bulletins
● Questionnaires - opinion polls, market research
● Products - labels containing ingredients, dosage, quantity, origin, etc.
The source can affect the characteristics of the information.
Written by respected people like scientists Written by regular people e.g. social media
posts
.gov and .edu websites or academic .com, .org and .net websites (let it be
databases known that the source for this slide is a
.com website)
Information Commodities
An information commodity is an item of information that can be bought or sold. Some
examples include:
● Databases - banking and financial information
● Information retrieval systems - abstracting and indexing services
● Reference materials - textbooks and encyclopaedias
● Less formal publications - bulletin boards
Data Capture
Data is captured in many forms:
● Human-readable, written in a language that humans can understand. Data entry
personnel manually enter the responses written on the forms, so the instructions
must leave no doubt. This method is prone to transcription errors, which are
combated by double entry.
● Machine-readable, can only be interpreted by a machine (e.g. barcode)
● Turnaround - it has some information that is human-readable and some that is
machine-readable. The information is printed on it by a computer, has more
information added by a human, then is put back into the computer. They are used
to verify accuracy and completeness and update information already entered with
additional data. (e.g. lotto ticket, multiple choice bubble sheet)
● Data logging - automatic data capture, usually from sensors at regular intervals. This
data is then processed to provide analysis of the environment. A data logging system
consists of sensors and data logging software which records the data. Results can be
displayed on a graph or table. (e.g. unattended weather instruments)
Validation is the computerised checking of input data for errors before it is processed. It
does NOT confirm accuracy. Some types of validation checks are:
● Range check - it ensures that data is within an acceptable range (e.g. months of the
year must be within the range of 1-12)
● Reasonableness check - it checks whether the data obeys specified criteria (e.g. the
age of a preschooler could be 4 years but not 34 years)
● Data type check - aka character check/alphanumeric check. This checks that the
type of data is correct. It is not the best method but it is very important if a fixed
length is required (e.g if the ID# field requires 4 numbers, you could not put letters
in it)
● Consistency check - identifies errors and discrepancies by comparing new data with
previously entered data (e.g. age entered must correspond with age calculated from
date of birth)
● Presence check - ensures that data is actually entered (e.g. making sure every
employee in a database is assigned to a department)
● Format check - verifies that data has been entered in the right format (e.g. a phone
number has the format (XXX)XXX-XXXX where X = numeric character)
● Length check - verifies that the data is the correct length (e.g. if the ID# field requires
4 numeric characters, you could not put a 3 digit number or a 5 digit number.)
● Check digit - an extra digit added to the end of a code, used to detect errors from
transcription and ensure correct re-entry of code. It is calculated from the other
digits in a code. It is used in barcodes
Verification is checking for errors when data is copied from one medium/device to
another. It doesn’t guarantee that the data is correct, only that it matches the first set. Some
examples are:
● Double entry - when you reset your password, you have to enter it twice
● Visual checks - on-screen prompts are used after data is entered to re-display the data
for checking, although this depends on the user bothering to read it. They also ask
for confirmations of instructions like deletion.
● Proofreading - reading things over before you submit to check for errors
Research:
The difference between transactional and online processing is that in transactional, data is
transferred between 2 or more devices, while in online processing that is not necessarily so.
The difference between online and real time processing is that online processing does not
have to be attended to at that specific moment in time while real time does, hence the name.
Control Systems
They use computers to (shocker) control machinery. There are two types:
● Automatic - (e.g. washing machine). They do straightforward stuff with no human
involvement. Once it has been switched on, it follows a set of predetermined actions
from beginning to end.
● Process control - (e.g. thermostat). They are used for more complex operations, as
they constantly check what’s going on and change the action in response, usually
with sensors.
File Access
● Field - a single data item; many fields make a record. Each field has a name and one is
~unique~ and used to identify the record.
● Record - a collection of related data fields, possibly different types, and is treated as a
single item for processing
● Data file - a collection of records holding the same type of info about different
people/animals/things.
File Organisation
It involves how information is stored on various media.
● Serial Access - records are stored one after another in the order in which they came.
It is called an unordered file. To access any record, the computer must analyse them
all from beginning to end.
● Sequential Access - stored in ascending/descending order based on one or more
fields (e.g. alphabetical order based on surname). To access any record you must go
through all the ones before it.
● Index Sequential Access - stored in a given order, but there’s an index file with an
ID for the record and location for quick retrieval. (e.g. hard disk). One can use the
index file to jump to the location.
● Direct/Random Access - files are stored in any order and can be accessed
immediately, (e.g. flash drive). They are accessed irrespective of order.
Master vs Transaction File
A master file is a permanent file updated on a regular basis. It stores permanent info like
name and TRN. It also stores temporary info like account balance, hours worked, and
taxes.
The transaction file stores all updates and summarises and updates the master file at the end
of a period (usually a week). This is why transactions take 3-5 business days. Transaction
files can put new records into the master file, change the contents of an existing record, or
remove a record.
Troubleshooting
The basic basics
Troubleshooting is the process of tracing and correcting faults in a mechanical or electronic
system. It is always a process of trial and error, but there are four general tips to follow:
● Write down the steps - write down each step you take to remember what you have
done and avoid repeating mistakes. This will also make it easier for others trying to
help
● Take notes about error messages - this helps during research so you can see if others
have had the same error before and how they fixed it
● Check the cables - this is an easy first step to check if the hardware isn’t giving what
it’s supposed to give
● Restart the computer - this is an even easier first step.
Vocabulary
● Firewall - a network security device that monitors incoming and outgoing network
traffic and permits or blocks data packets based on a set of security rules
● Switch - a hardware device that connects nodes and enables them to transfer data
back and forth over cables
● Modem - stands for modulator/demodulator. It is a hardware component that
allows a computer or other device to connect to the internet by converting analogue
signals to binary.
● Router - a device that guides network data through the best routes using
information like data type, size and Internet Protocol Address (IP Address)
contained in packets
● Protocol - a set of rules and procedures that govern transmission between
components in a network
● Web browser - an application software which sends and retrieves data to and from
web pages allowing the user to access websites
● URL - uniform resource locator, it specifies the file or data and the location where it
is stored. It includes the transfer protocol, the domain name, path and the resource
name. e.g.http://www.bcs.org.application_forms.html
Types of Networks
A computer network connects computers so that files and peripherals can be shared. They
come in different sizes.
● Local Area Network (LAN) - this is the smallest network; it can link a few
computers, printers and hard disks, usually on one site.
● Metropolitan Area Network (MAN) - large enough to extend to an area like a city
or campus. It can therefore be owned and operated by a single organisation like a
university. They are also useful in connecting LANs to WANs.
● Wide Area Network (WAN) - very large network; can connect many small and large
computers over a very large geographical area. An example is the internet.
Computers that are not networked are called standalone computers. Data on a stand-alone
system has to be transferred with a secondary storage device.
Not all networks are connected with cabling, some are wireless. A Wireless Local Area
Network (LAN) is good for allowing laptops and remote computers to connect to the
LAN. They are also beneficial in old buildings where cables cannot be installed. However,
they are relatively slow, have poor security and are susceptible to light and electronic
interference.
To connect a computer to a LAN with cabling, plug the network cable into the network
adaptor, then set up the system software. Profit. You will need:
● Network cabling (shock)
● A network card in each computer
● A hub - a central device that connects all the computers by cable. It is then
connected to a…
● file server - a high-performance computer containing large capacity hard disk drives
that are available to all network users. This file server is not used as a normal
computer terminal. When one powerful computer controls others, it is called a
hierarchical network.
A network without a file server is called a peer-to-peer network. Each computer acts as a
server to its peers on the network. It also allows users to access each other’s hard disks and
peripherals.
Network Layout/Topologies
There are 4 main types of network layouts:
The Internet is a vast collection of computer networks spread throughout the world,
involving all these topologies. The most common way to link to computers is with cables,
but wireless networks are linked by infrared waves, microwaves or radio waves.
WLANs use radio signals, infrared beams or lasers to communicate between workstations
and hubs/file servers. Each workstation and server has a transceiver or antenna to send and
receive data.
Stand-alone computer Ideal for home users Cannot easily share data
No network card needed with others
Can be dedicated to a Data can only be transferred
specific task via disk or modem, which
No network software needs an external hard drive
licences needed or online storage which can
No one can hack you if be time consuming and
you’re cut off from the unreliable
world like Elsa
Transmission media
Data can be transmitted through cabled(wired) or wireless media.
Cabled:
● Twisted pair - common in telephone cables. They have pairs of insulated copper
wires twisted around each other to help eliminate interference. This is the most
popular form of data transmission, at 300 bits per second (bps) to 9600 bps.
● Ethernet cable - most popular form of network cable. It resembles a bigger version of
a phone cable. It is differently coloured which differentiates it from phone cables.
The longer the cable, the weaker the signal
● Coaxial cable - found on cable TV and videos. They use thickly insulated copper
wire and are capable of high-speed transmissions, but they are too rigid to install
easily. They are used in broadband channels which can transmit data at thousands of
characters per second.
● Fibre optic cables - used by large telephone and telecommunications companies.
They consist of clear glass fibres and data is transmitted as pulses of light, which
eliminates electronic interference. It is also not affected by moisture or lightning so it
is used for connecting networks between buildings. It also is used for broadband,
but it is faster and covers longer distances than coaxial cables.
Wireless:
● Microwave transmission - These are high-frequency radio signals that travel through
the atmosphere. They are used for high-volume, long distance and point-to-point
communication. Microwave signals travel only in straight lines, i.e. in a line of sight.
For long distances, the waves must be related by means of “dishes” or antennas.
These can be installed on towers and tall buildings. However, they cannot penetrate
buildings or travel around corners.
● Satellite transmission - A communication satellite is a space station that receives
microwave signals from an earth-based station, amplifies (strengthens) the signals
and broadcasts these signals back over a wide area to any number of earth-based
stations. The earth-based stations often are microwave stations. Transmission from
an earth-based station to a satellite is called an uplink. Transmission from a satellite
to an earth based station is called a downlink.
Internet Protocols
Many different networks are linked together on the internet, so there must be a standard
way to link them.
● File transfer protocol (FTP) - each network has a set standard for transmitting
information so that computers from different countries can understand each other.
FTP is the transfer of files across the internet. It is the equivalent of a giant file
server. It can be used to upload and download files.
● Transmission Control Protocol (TCP) - the protocol for sending and receiving data
on the internet
● Hypertext Transfer Protocol (HTTP) - the protocol for fetching resources on the
internet. The data being communicated between website and browser is sent in
plain text so it is insecure
● Hypertext Transfer Protocol Secure (HTTPS) - a substitute to HTTP but it’s
encrypted and sexier
● Voice over Internet Protocol (VoIP) - a form of communication that allows phone
calls to be made over a broadband internet connection instead of telephone lines.
● User Datagram Protocol (UTP) - a substitute to TCP that is used for time-sensitive
applications like computer games or video players
● Simple mail transport Protocol (SMTP) - designed to send and distribute outgoing
email
● Telnet - a protocol for connecting one system to another.
● Gopher - a protocol for searching, retrieving and displaying documents from
isolated sites.
Telecommuting
● It is easier to keep in touch with coworkers but at the same time, there is less social
contact due to the lack of face-to-face interaction
● People are sitting for long hours on the computer which can cause problems if the
environment is not ergonomic (like eye problems, wrist problems, life problems)
Business
● ecommerce - makes organisations more efficient, cost-effective and responses, used
in research and development and marketing
● Research and development - computers analyse sales data and markets, using PCs to
process images, scanners to input designs and printers and plotters to print ads and
designs
● Stock management - monitors stock levels and gives notice of what and when to
replenish
● Electronic point of sale (EPOS) - computerised system for recording sales, taking
payments, and generating reports
● e-mail
Education
● Student information is stored on databases
● Computer Aided Instruction (CAI) and Computer Aided Learning (CAD)
software can be purchased
● Students can study at their own pace and do group work without physically meeting
● Multiple choice assignments can be graded automatically
● People can cheat and/or get entire pieces of work done by others for the low low
price of $99.99, in three easy instalments!
● Apparently, who knew, people can also leak exam papers across entire regions and
waste almost 3 hours of people’s lives (plus the time they spent studying) that they
will never get back. Yes, I am still salty.
Banking
● Credit and debit cards
● ATMs
● Online banking allows you to transfer money, check your balance and do many
other things without going to the bank.
Recreation
● VR is used in computer games to provide a more *sparkles* immersive experience
*sparkles*
Law Enforcement
● E-surveillance - data from security cameras and CCTV (e.g. Jamaica Eye) can be
posted on networks and viewed by all law enforcement people in the area
● Crime statistics and criminal records can be stored on computers
● Fingerprints can be compared against all others in the database much more easily
● Driving licences and vehicle registration documents can be easily issued and quickly
retrieved
Medicine
● Medical information systems - patient information can be stored on a database,
prescriptions can be sent to the pharmacy automatically, and imaging and
ultrasound services can be connected to a network to aid doctors in diagnosis
● Expert Systems - AI designed to store a vast amount of data and draw on it to make
predictions and diagnoses. data about a patient's body can be processed with special
software to make a virtual 3D model, which can provide precise locations for stuff
like tumours.
● Virtual reality - VR can both be used to teach surgery without any danger involved,
and perform very complex and precise surgeries such as brain surgery.
Jobs In ICT
● Applications programmer - translates specifications from software made by an
analyst into application programs. They write, test and maintain the software.
● Computer engineer - designs computer hardware and is responsible for its
installation, repair and maintenance
● Computer support specialist - provides direct tech support to users
● Computer programmer - translates software specifications into algorithms which
are converted into applications, and also maintains the software
● Computer trainer - sets up training sessions to educate users on the use of specific
programs or systems
● Database administrator - designs, creates, maintains, and ensures the integrity and
security of databases
● Data communications specialist - designs and maintains communication systems
used within computers, is responsible for ensuring that all aspects of
communication (intranets, videoconferencing) work
● Data control clerk - monitors all work coming in and out of the computer centre
● Data entry operator - receives a set of work tasks to enter into the computer
● Data preparation operator - is responsible for preparation of data on special forms
before submitting the data for input into a computer
● Data processing manager - runs the entire data processing document, oversees data
processing operations and development of new application software for the
department
● Electronic database processing auditor - certifies the information and information
processing systems within the organisations so that they meet certain standards.
● End user support - represents and advocates for the personnel who use the
application software and hardware necessary to perform their jobs
● IT manager - plan, administer and review the acquisition, development and
maintenance of computer and telecommunications systems of an organisation.
They are often the most senior person in the IT department.
● Librarian - manages data files and programs stored offline, manages program and
system documentation, manuals and journals. Also does general librarian things like
managing borrowed books
● Multimedia artist - creates images and special effects for movies, shows and games.
Also, the entirety of animation.
● Network administrator - designs, develops, and maintains LANs and WANs, sets up
security (like usernames and firewalls), and ensures that shared resources work
● Social media specialist - creates and shares content on social media, builds the online
reputation of the brand, and manages employees’ accounts
● Software developer - develops the apps that allow users to complete tasks on a
computer or other device
● Systems administrator - monitors and maintains the system security, determines the
needs of the organisation’s systems, adds users to a network, and assigns and updates
security permissions on said network
● Systems analyst/Consultant - analyses current computer systems to assess their
suitability for computerisation or recommend upgrades to existing systems
● Web developer - builds websites, which involves writing the necessary code. They
oversee the development of the website from idea to final product
● Software tester - sees if the software works
● Web designer - checks the visual appeal and accessibility of web pages
● Webmaster - maintains an existing website by editing or updating texts, graphics and
links
Computer Security and Information Misuse
Computer security is protecting hardware and software against accidental or deliberate
damage, theft, unauthorised use and corruption. There are different types of computer
security: information security, application security, physical computer security, network
security, and cyber security.
There are also different elements to computer security:
● Threat - a potential negative action or event
● Vulnerability - a weakness that can be exploited
● Risk - the consequences of exploitation of a vulnerability
● Countermeasure - an action, device, procedure or technique that reduces the risk or
eliminates the vulnerability
● Attack - an attempt to exploit a vulnerability in order to expose, alter, disable,
destroy, steal or gain information
Vocabulary
● Worm - malware that reproduces itself and spreads over network connections
● Trojan - a type of malicious code/software that looks legitimate but can take control
of your computer
● Malware - collective name for a number of malicious software variants (e.g. virus,
spyware, ransomware)
● Adware - software that displays unwanted and sometimes irritating pop-up ads
● Spam - unsolicited communications sent in bulk over the internet or any electronic
messaging system
● Virus - a type of malicious code/program written to alter the way a computer
operates and designed to spread from one computer to another
Propaganda
These are messages containing false or incomplete information that can influence the views
of the public. It can be transmitted more easily through social media.
Identity Theft
Criminals use computers to steal personal information that is used to verify your identity,
such as date of birth and phone number. They can then make large purchases or transfers.
It can be prevented by:
● Checking for unusual purchases
● Making online purchases on secure websites
● Not making purchases with your main source of funds
● Not entering your information on public computer systems
Financial Abuse
People make websites for fake companies to accept people’s payments. They gain access to
financial accounts and change the details.
Phishing
These attacks involve the use of websites and emails to trick you into entering your personal
information by masquerading as organisations like NCB or Netflix.
They also include emails, e.g. from Nigerian princes, asking for money.
Industrial Espionage
Some organisations try to gain an advantage over competitors by finding their secrets,
which can be done by hacking into their databases.
Electronic Eavesdropping
This is the use of electronic devices to monitor electronic communications between 2 or
more persons without their knowledge or permission. Avoid transmitting sensitive data
electronically without encryption, but sometimes this isn’t enough.
Unauthorised Access
This is referred to as hacking. It involves trying to break into a system that you shouldn’t
access. Some hackers do it for funsies, but others are more destructive and commit
electronic vandalism.
HTML Syntaxes
NB. a / in the tag indicates that it is a closing tag.
● <html> </html> - you need these tags to start and end the document
● <head>insert various headings, like titles and such</head>
● <title>insert title here</title>
● <body>insert body</body>
● <h1>first type of heading, there is also h2, h3 and so on</h1>
● <p>p stands for paragraph, or possibility, e.g. the possibility of me committing
arson</p>
● <img src= “filename.bmp”/> this is how to include an image
● <a href= “link URl goes here”>text that you want to show</a> this is how to make
a hyperlink
● <b>the b stands for bold, just like the IT department for giving this much
content</b>
● <i>the i stands for italic</i>
● <u>the u stands for underline</u>
● style= “font-family:insertfont” this is how to change the font
● style= “background-color:insertcolourhere;” this is how to change the background
colour
An example of table syntax because I cannot explain that with words
Word Processing
Word processing can be done using software including but not limited to Microsoft Word,
Google Docs, and LibreOffice Writer.
Features of MS Word
● Title bar - indicates the application being used at the moment and the name of the
documents. New documents are usually called Document 1, but if there is already a
Document 1 it will be called Document 2, and so on and so forth until the world
ends
● Ribbon - this replaces the menu bar found on earlier versions of word. It contains all
the commands that could be used to format the document. It has multiple tabs with
groups of similar commands.
● Quick Access Tool - shows commonly used commands like Save, Undo and Redo
● Input screen - the part of the screen where you actually type
● Status bar - displays info like document’s page and word count
● Scroll bar - used to scroll up, down, left, right, I’m gonna move my feet tonight, et al.
● Ruler - displays the measurements, indents and tabs of the document. It can be
shown by going to the View tab and checking the box next to Ruler.
Document Formatting
Headers and Footers
A header is text which appears at the top of each page above the top margin. It can be used
for things like headers and logos. A footer is text which appears at the bottom of each page
below the top margin. It can be used for things like page numbers.
To add a header/footer, go to the insert tab and click header/footer, select the type that you
want, then type the text that you want to appear.
A page break is a feature that allows you to choose where in the document the computer
will display a new page. To insert it, either go to the insert tab and click page break, or go to
the layout tab, click breaks, and click page break.
Margins
A margin is a small gap between the text on a page and the edge. They are typically 1 inch.
They are important for binding documents together, adding page numbers and headers.
To change the margins, go to the layout tab and click Margins. You can either select preset
margin sizes or click custom margins at the bottom of the menu and type the exact
distances you want.
Alignment/Justification
This is the position at which text appears on a line on the page. Text can be left aligned,
right aligned, centre aligned or fully justified.
You can use the tabs to have different alignments within the same document. To do this, go
to the View tab, check the ruler box, select the text, and (bear with me) drag the white
triangle that is on the ruler to the right/left depending on where you want the text to be
aligned.
Fonts
A font is a style of writing. Modern word processors have a wide range of them. Different
fonts are appropriate for different purposes. For example, plain fonts (like Times New
Roman size 12 cough cough) are good for letters and reports.
You can change the size of fonts in the Home tab. Each number is 1/72nd of an inch.
Therefore,
Font size 72 is
one inch tall. Font size 18
Fonts can have extra styles applied to them, like Bold (Ctrl + B), Italic (Ctrl + I),
Underlined (Ctrl + U), (or all three at once). Also, they can be superscripted or subscripted. (Go to
the home tab and click the X with the superscript/subscript 2).
Editing Text
When one is typing, one can correct one’s mistakes easily by editing. There are 3 main ways
of editing text:
● Adding, deleting and retyping
● Cutting, copying, and pasting - select the text, use Ctrl + X to cut, Ctrl + C to copy,
then place your cursor where you want the text to go and use Ctrl + V to paste.
● Searching for and replacing - go the home tab, click Replace, type the word or
phrase you want to replace in the Find field, and type what you want to replace it
with in the Replace field
If you are creating a new document and you click save, the processor asks you for a filename
and a place to save the document in. If you are working in a previously saved document, it
will save the newer version to replace the older one without warning, rhyme nor reason.
If you select save as, you can give the document a new filename and/or location, and you
will have both versions.
Format Painter
This allows you to copy the same formatting of one block of text and put it on another. For
what reason, I have no idea.
To use this, select the text, click the paintbrush button, and then drag the pointer across the
text that you want to apply the format to.
Tables
A table is a convenient and organised way of grouping text. It is made of cells grouped in
rows and columns, the height, width and borders of which can be edited. You can also join
or split cells.
There are 2 ways to create a table.
● Go into the insert tab, click table, and select the number of rows and columns you
want, then type the text you want in the cells.
● Type the text you want in the table, select the text, go into the insert tab, click table,
and click convert text to table, then specify the number of rows and columns you
want and how you want the text to be separated.
Columns
Pages can be divided into parallel columns. This is commonly used in newspapers,
newsletters, brochures and leaflets.
To divide a page into columns, go into the layout tab, click columns, and select the number
of columns that you want.
Reviewing Text
Reviewing text allows you to proofread your document for errors before you share it with
others. A word processor can perform these functions more easily, efficiently, accurately and
comprehensively.
Spellcheck
Spell-check examines your text and identifies spelling mistakes. It also makes suggestions of
what the correct word should be and you can either select one of the suggestions or change
the word yourself. It checks words based on a large dictionary. Words, such as people’s
names, can be added to this dictionary. However, it cannot spot if you have typed the
wrong word.
To use spell check, go to the Review tab and click Spelling and Grammar
Thesaurus
A thesaurus suggests synonyms for a word that you have typed in so you can *sparkle*
diversify your vocabulary *sparkle*.
To use it, select the word you want a synonym for, go to the Review tab and click
Thesaurus. The synonyms will be displayed on the right.
Word count
The status bar at the lower left of the document shows the number of words in the
document. For a more detailed summary of random information like number of characters
and number of lines, select the text you want to know about, go to the review tab and click
word count.
Tracking Changes
This is a way to monitor the changes made to a document. When it is used, every edit is
highlighted. E.g. when you delete text it changes to red and is crossed out. You can then
accept or reject these changes. To turn on this feature, go to the Review tab and click
tracking changes.
Comments
This is an alternative to directly editing a document or using the track changes feature. It is
also useful to review a document for someone where the content will not be changed.
To create a comment, right click on the text you want to comment on and select New
Comment in the menu. Or, go to the Review tab and click New Comment.
Language Settings
Changing the language settings lets the word processor use a different language’s dictionary
so that the spelling and grammar checks are based on the language you are actually typing
in.
To change the language setting, either click the language in the status bar and change it
from there or go to the Review tab, click Language and click Set Proofing Language.
Mail Merge
Mail merge is a way to write customised letters without writing tens or hundreds of
individual letters. You can do it in Microsoft Word with the mail merge wizard.
● Write the letter, leaving space for the parts that you need to customise, such as name,
address, etc.
● Make a database with the information of the people that you want to include, such
as name, title, address, place of work, etc. This can be done in Access, Excel or even
Word
● Go to the mailings tab, open the mail merge wizard and choose the database that
you want to use
● Put the different fields on the database in their corresponding positions in the letter
● Do the thing and profit
Protecting a Document
Save vs Save As
The save feature replaces a document with its updated version. You will not have any access
to any previous versions of the document because they don’t exist. To save, either click File
and click Save, or use Ctrl + S.
On the other hand, Save As creates a new file with the updated version of the document,
where you can access the older versions. To use this, click File and click Save As.
Section 5: Spreadsheets
Vocab:
● A spreadsheet is a program that displays data in a table known as a worksheet. They
are used for budgets, financial statements, inventory management and charts
● A worksheet is a grid with columns and rows.
● A cell is the intersection of a row and a column
● Words or letters that are typed into a cell are called labels.
● Numbers that are typed into a cell are called values.
● A formula is a statement that performs a calculation
● A cell range is a group of consecutive cells.
● Columns are vertical arrangements of cells, identified by letters
● Rows are horizontal arrangements of cells, identified by numbers
● A worksheet tab is a tab that identifies each open worksheet in a spreadsheet
program, located in the lower left corner of the screen
● A cell address/cell reference is a combination of column letter and row number, e.g.
A1 or B2
● The name box displays the name of the active cell or range.
● The formula bar displays the data or formula stored in the active cell
● The active cell is the cell in which one is currently working in, usually surrounded by
a black border
● A function is a built-in formula that is a shortcut for common calculations, like
SUM(addition) or AVERAGE(mean)
● Operation symbols instruct the computer as to what mathematical operations to
perform. + for addition, - for subtraction, * for multiplication and / for division.
Parentheses are used the same way as in math.
● A column width tool changes the width of the columns on a spreadsheet.
● A row height tool changes the height of rows on a spreadsheet
● The fill handle tool is used to copy data/formulas to another cell(s) and create a
series.
How to Spreadsheet
Common Functions
NB. Start all functions with an =
● =SUM(number 1;number 2;...)
This adds up a range of cells or just any number of cells
● =AVG(cell range)
Finds the mean of a collection of cells
● =PMT(rate; nper; pv)
Calculates the payment for a loan with a constant image rate and constant
payments. Rate = interest rate, nper = number of payments, pv = principal
● =VLOOKUP(lookup_value; table_array; col_index_num; [range_lookup])
Looks for a value in a table column then returns a value in the same row from the
column that you specify. Lookup_value = the value you are looking for in the table,
table_array = the table you will be searching in, col_index_num = the number of the
column for the value that you want returns (e.g. 3rd from the left would be 3);
range_lookup = true or false, false is an exact value while true is an approximation
● =IF(logical_test; value_if_true; value_if_false)
Checks whether a condition is met, returns one value of true and another if false
● =COUNTA(value1, [value2],...)
This counts the number of cells that are not empty in a range.
● =COUNTIF(range; criteria)
This counts the number of cells within a range that have values that meet a certain
logical criterion.
● =MAX(number1;[number2];...)
This finds the maximum value in a range of cells.
● =MIN(number1;[number2];...)
This finds the minimum value in a range of cells
NB. if a formula or function requires you to use a different worksheet, type the worksheet
name, an exclamation mark, and the cell. E.g. Qualifying_Income!A2
Copying Formulae
There are 2 types of cell referencing: relative (B3) and absolute ($B$3). These types matter
when you’re copying formulae from one cell to another. Example: Cell B3 is used in a
formula where the result is shown in D6. If this formula is copied to D7, the formula will
use cell B4 because you’re moving 1 space down. However, if you use $B$3 in the formula,
the formula will use cell B3 no matter where you copy it to.
Charts
There are many types of charts, such as bar charts, line charts, pie charts and histograms.
Each type of chart is best suited for displaying a different type of data or information. Line
charts are best for displaying changes over time, bar charts are better for comparing
quantities, pie charts are good for depicting different portions of a whole, and
histograms…..i don’t really know.
To insert a chart, first you have to create a table of data. Select the table, go to the Insert tab
and select the type of chart you want, or click recommended charts if you don’t know what
type to use. Then, make sure that the axes are labelled correctly and the chart is properly
titled.
How to Database
Tables
Go to the Create tab and click Table Design. Then, add the field names, data types (such as
number, currency, auto-number, date/time, yes/no, etc.), field sizes and descriptions to suit
your liking. Then, right click on the tab, click Save, and name the table based on the data in
it.
Relationships
Tables can be joined in MS Access so that information can be coordinated between tables so
you won’t have to enter the same information twice, preventing some errors. It also allows
you to create reports, forms and queries from the related tables.
Tables can be linked either one-to-one (the primary key in 1 table matches that of another
table) or one-to-many (the primary key in 1 table is linked to a foreign key or composite key
in another table).
To make relationships, go to the Database Tools tab, click Relationships, and add the tables
that you want to link. Go to the Relationships Design tab and click Edit Relationships, and
add the fields you want to link. Always tick Enforce Referential Integrity because it prevents
you from accidentally (or purposefully) creating discrepancies.
Queries
When creating a query, ask yourself what specific question you want to ask, what fields you
need displayed, and what order these should be sorted in.
Go to the Create tab and click Query Design. Add the tables that you need fields from. Add
the necessary fields from these tables into the query by double-clicking. Tick or untick the
boxes depending on if you want the fields to show when the query is run. In the Criteria
row, add any criteria you want the data displayed based on.
If you have numerical values that you want to analyse, go to the Query Design tab and click
Totals, which will create a new row in the query, where you can choose between Min, Max,
Avg, Sum, etc.
If you want to create a new field based on mathematically operating on old fields, that’s a
calculated field. Put the field name, then a colon, then the fields you want to mathematically
calculate in square brackets. E.g. if you want to multiply APPLES and ORANGES to
create BANANAS, you would do: BANANAS: [APPLES]*[ORANGES].
Forms
To make a form, go to the Create tab and use the form wizard.
● Select the fields you want to add in your form
● Select the layout, whether tabular or columnar or datasheet or justified.
● Select a title for your form
● Check “modify the form’s design” and make sure there are no errors such as boxes
being too small for the words that are supposed to be in it causing #### (railroad
error)
● Finish the form and profit
Reports
To make a report, go to the Create tab and use the report wizard.
● Select the fields you want in your report
● Decide what fields you want it to be sorted by and in what order
● Choose the layout (tabular, columnar or justified)
● Choose the orientation (portrait or landscape)
● Choose a title for your report
● Check “modify the report’s design” and make sure there are no errors such as boxes
being too small for the words that are supposed to be in it causing #### (railroad
error)
● Finish the report and profit
Implementation Phase
● Translate your algorithm into a programming language (e.g. Pascal, Python, BASIC)
and execute it
● Test and Debug the program
● Document the program (with user manuals etc.) and maintain it
Defining the Problem
First, specify the output. Is it numbers, text or graphics? Is it readable or will it be used for
another program? Will it be a hard or soft copy?
Then, specify the input using the output.
What calculations will be needed? Is it real time or batch processing?
Determine how the data collected will be stored.
The problem statement helps to take a complex problem and break it down into
manageable parts. You can also use an input, processing, output (IPO) table.
Developing an Algorithm
There are many different types of algorithms:
● Narrative - step by step instructions in plain English that explain the program
● Flowchart - visual representation of the steps of an algorithm
● Pseudocode - uses words and symbols that closely resemble programming language
instructions
● top down design approach - irrelevant
● bottom up design approach - irrelevant
● etc.
Implement
Translate the algorithm into a programming language. Because CXC said so, we will be
using Pascal, the oldest most outdated language I have ever had the displeasure of vaguely
knowing about.
And then run the code.
Test and Debug
Even though you already tested the algorithm, you also have to test the program because
there may have been an error in translation. This is called debugging.
Pseudocode
A pseudocode is an imitation computer program written using mathematical notations and
English-like statements to describe the logic used to solve a problem or carry out a
procedure. It is made up of:
● Input statements - get data from outside the computer via an input device
● assignment statements - assign value to a variable or change the value
● control statements - determine the way in which the pseudocode is executed.
● Output statements - get information to the user, whether displaying or prompting
We use BEGIN and END or START and STOP to indicate the beginning and end of the
algorithm.
Vocab :)
variable - a storage location in memory for data/information which may change during
execution
constant - a storage location in memory for data/information that will not change value
during execution
Data Types
All data is stored in a series of binary digits which the computer needs to interpret. Hence,
data types exist. They are
● Integer - whole numbers
● Real/float - decimals
● Character - a single letter/number/symbol
● String - multiple letters/numbers/symbols
● Boolean - true or false
These types must be declared directly after BEGIN, before you start using the variables.
Declare the variables before the constant.
e.g. DECLARE sum AS integer
DECLARE hourly_rate AS real
Mathematical Operators
● + is addition
● - is subtraction
● * is multiplication
● / is division
● ^ is exponential shenanigans
● MOD is modulus (the remainder left when doing division, e.g. 10 MOD 3 = 1)
● DIV is integer division (the value before the decimal point of the quotient, e.g. 10
DIV 3 = 3)
Control Structures
These determine the way in which the pseudocode is executed. There are 3 types:
● Sequence statements - these are written one after the other in the order in which
they are to be followed
● Selection/conditional statements - choose between 2 courses of action based on a
given criteria (if, then, else, endif)
● Repetition/loops/iterations - specify that an action is to be repeated while a
condition remains true. Some loops test the condition before performing the action
(WHILE-DO) but others do it after (REPEAT-UNTIL)
Arrays
An array is a collection of variables made up of many variables of the same data type
grouped together and given a single name. `
You must state the maximum number of elements you want in [these brackets]. Arrays
always have a fixed, predetermined capacity which can never be exceeded or else Mr Soutar
will come to your house and shoot you.
They consist of 2 main parts: the elements, the actual content of the array, and the index,
which is the address of the element. NB indices start at 0 so if you want the 4th position,
the index would be 3.
Trace Tables
This is a logical tool that shows the state of the algorithm at each step in the instruction
with a given set of data. A column represents each variable used and each row stores the
values of the variable as it passes through the pseudocode.
It is used to check and determine if the results are correct, test for logical errors, and test
understanding of how control structures work.
I would welcome some additional information given by someone who perhaps got over 50%
on the classwork, as I can unfortunately not say the same. RIP my IT grade.
(But like seriously someone please explain trace tables to me, this is a cry for help)
(As of May 27, 2023, at 2:08 a.m., this cry for help still stands, I don’t even understand the
textbook ha ha)
N.B. The little circle on the not gate is called an inverter circle. If you add it to an OR gate
or an AND gate then you will get a NOR gate or NAND gate respectively. This is literally
just the opposite. Like for a NAND gate, if both inputs are 1, you’ll get 0.
WHILE LOOP
WHILE <condition> DO
<action>
ENDWHILE
FOR LOOP
FOR counter ← start value TO end value
<actions>
ENDFOR
DECLARING AN ARRAY
ARRAY array_name[max_elements] AS datatype
E.g. ARRAY numbers[5] AS integer
Flowcharts
A graphical representation of the workflow using certain symbols connected with flow lines
(arrows with a fancy name). It can test for bugs and help with translation from pseudocode
into a programming language.
Symbols:
● Ellipse - start/end
● Parallelogram - input/output
● Diamond - condition (like IF or in a loop)
● Rectangle - process and assignment statements
● Circle with a letter in it - connector on the same page (if the chart can't fit)
● Upside down pentagon with a number in it - off page connector
● Rectangle with vertical lines near the edges - subroutine process, kinda irrelevant
Section 8: Programming Implementation
A computer program is a set of instructions that tell a computer what to do and how to
perform a task. For the computer to understand the instructions, they are written in
programming languages, which have grammar and syntax (a set of rules that governs how
elements of the grammar combine). The syntax must be strictly followed for the
instructions to work.
Advantages:
It is the fastest to execute because the computer already understands the language. It also
uses the processor and memory most efficiently.
Disadvantages:
It is difficult to decipher, machine dependent, and time consuming to write.
Second Generation (2GL)
Aka Assembly Language, it is written using mnemonic codes (short codes that suggest their
meaning). These codes represent operations and storage locations. E.g. STO, ADD, LDA,
etc.
Advantages:
It is easier to write than 1GL.
Disadvantages:
It requires translation into 1’s and 0’s and it is machine dependent.
BASIC
C
COBOL
FORTRAN
Pascal
Fourth Generation (4GL)
These use statements similar to those used in human language. Some examples include
database query languages (SQL), report generators (Oracle Report) and GUI creators
(Visual Basic)
Translator Programs
This converts source code into object code. Examples of translator programs are:
● Compiler - this translates high level programming languages to machine languages.
It converts the entire source code to an object code, which is then saved as a separate
copy. It is used with languages like C, C++, and pascal.
● Interpreter - it converts source code into object code line by line. The object code is
not stored, hence the need for constant translation. It is used with languages like
JavaScript and BASIC.
● Assembler - this converts assembly language to object code (machine language).
Syntax Errors
Syntax errors happen when the grammatical rules and structural patterns of a programming
language are disobeyed. They are the most common errors because they are usually caused
by simple mistakes.
Examples:
● Missing a semicolon at the end of a line in Pascal
● Misspelling variable names in a program
● Failing to declare your variables
Logical Errors
These occur when errors are made by a programmer which cause incorrect outputs to be
displayed. Most of these occur in mathematical operations.
Examples:
● Using a / sign where you were supposed to multiply
● Adding 3 variables where you were supposed to find their average
Runtime Errors
These occur while a program is being executed. They are sometimes caused by the input
received by the user or lack of memory space on the computer. These are the hardest errors
to trace because the exact cause may not be visible.
● Entering a value in the variable that does not correspond with its datatype
● Trying to divide a number by 0
Finding Errors
NB. The difference between debugging and testing is that debugging finds errors that
already exist and corrects them, while testing uses data to find out whether or not errors
exist.
Debugging
Debugging has 3 steps:
● Detection - finding the errors in the source code
● Diagnosis - determining the cause of the errors
● Correction - fixing your mistakes, like me fixing the mistake of choosing a school
where IT would be mandatory.
Testing
Testing is using data within a program to ascertain whether or not the correct results will be
received. It uses either test cases or dry running.
● Test cases - these are documents used to store information like input data, expected
results, actual results and comments. It must be written to test all the modules of a
program.
● Dry run testing - this is checking of a program for errors without using a computer
or compiler. It involves trace tables and pseudocodes which allow the programmer
to run through the program on paper and note down the results. It is done before
the code is translated into a programming language.
Program Documentation
This is adding comments to describe what the code is doing. It is useful if the program
needs to be debugged or updated. Comments should be typed while the program is being
created in case you forget anything after. Comments should include:
● An overview of the process and tasks
● The author(s) of the program
● The date that the program was created or reviewed/updated
● Any solutions to problems that arose
User documentation also falls under the umbrella of program documentation. It shows the
end user how to operate the program. It should be structured so that it is not necessary to
read the whole thing before starting to use the program. It should include:
● Overview which explains what the system can and can’t do
● Explanation of how to install the system on different hardware and how to recover
from basic errors
● Introductory manual
● Reference manual which describes in detail all the facilities available to the user,
using terminology that would be understood by a familiar user
● System administrator’s guide which explains how to react to situations which arise
while using the system.
Pascal Syntaxes
INITIALISATION
Storage location := value;
ASSIGNMENT STATEMENT
variable_name := mathematical operation;
DECLARING VARIABLES
VAR
variable_name : datatype;
DECLARING CONSTANT
CONST
constant_name = value;
INPUT
BEGIN
READLN(variable);
END.
OUTPUT
BEGIN
WRITELN(‘direct quote’);
END.
BEGIN
WRITELN(variable);
END.
FOR LOOP
BEGIN
FOR counter := minimum TO maximum DO
technological shenanigans;
END.
Or
BEGIN
FOR counter := minimum TO maximum DO
BEGIN
technological shenanigans line 1;
technological shenanigans line 2;
END;
END.
WHILE LOOP
BEGIN
WHILE condition DO
technological shenanigans;
END.
Or
BEGIN
WHILE condition DO
BEGIN
technological shenanigans line 1;
technological shenanigans line 2;
END;
END.
REPEAT UNTIL
BEGIN
REPEAT
technological shenanigans;
UNTIL condition;
END.
IF THEN
BEGIN
IF condition THEN
technological shenanigans;
END.
IF THEN ELSE
BEGIN
IF condition THEN
true technological shenanigans;
ELSE
false technological shenanigans;
END.