CSEC INFORMATION
TECHNOLOGY
12 HOUR
CRASH COURSE
Agenda
1. Section 1 + past papers questions
2. Section 2 + past papers questions
3. Section 3 + past papers questions
4. Section 4 past papers questions
5. Section 5 past papers questions
6. Section 6 + past papers questions
7. Section 7&8 + past papers questions
Section 1:
Computer Fundamentals &
Information processing 1. Desktop systems e.g Dell OptiPlex 390 Desktop PC
2. Supercomputers e.g Cray 1
3. Mainframes e.g IBM zEnterprise System
4. Mobile devices e.g laptops
5. Embedded devices e.g GPS tracker, dishwasher
9/3/20XX Presentation Title 3
Types of Computer Systems
Hardware Components of a Computer
1. Input
2. Processing: CPU
3. Primary memory: RAM & ROM
4. Secondary storage
5. Output
9/3/20XX Presentation Title 4
Input Devices
Input devices function to communicate information to a computer or other information
processing devices. Input devices are types of peripheral devices that communicate with
processing units.
E.g Keyboard, Mouse, Joystick, Light pen, TrackBall, Scanner, Graphic Tablet,
Microphone, Magnetic Ink Card Reader(MICR), Optical Character Reader(OCR),
Barcode Reader, Optical Mark Reader(OMR)
9/3/20XX Presentation Title 5
The CPU is considered as the 'brain' of the computer system because it performs all types of data
processing operations.
The CPU stores data, intermediate results, and instructions (programs). The CPU controls all the
operations of all other parts of the computer systems.
The CPU has three components:
- Memory/Storage Unit
- Control Unit
- ALU: Arithmetic Logic Unit
9/3/20XX Presentation Title 6
CPU
Memory/ Storage
- stores all the data & instructions required for processing.
Control Unit
- it is responsible for controlling the transfer of data & instructions among
other units of a computer
- it manages and coordinates all units of
the computer
ALU
- consists of two sections: arithmetic section & logic section
- they perform arithmetic(+, -, /, x) and logical operations (comparing, selecting,
& merging data)
9/3/20XX Presentation Title 7
Units of Storage
A unit of storage/memory is the amount of data that can be stored in the storage unit. This storage capacity is
expressed in terms of Bytes.
Bit: A binary digit (a bit) is logical 0 or 1 representing a passive or an active (on/off) state of a component in an
electric circuit.
Bytes: A group of 8 bits is called byte. A byte is the smallest unit, which can represent a data item or a character.
- Kilobytes: (KB) 1 KB = 1024 Bytes
- Megabytes: 1 MB = 1024 KB
- Gigabytes: 1 GB = 1024 MB
- Terabytes: 1 TB = 1024 GB
9/3/20XX Presentation Title 8
Important Definitions
Hardware:
this is the term used to refer to all the physical parts of a computer.
Peripheral devices:
are those devices located outside of the CPU but are controlled by it. They are devices that are attached to the
computer system.
9/3/20XX Presentation Title 9
Important Definitions
Software: refers to computer programs that instruct the computer on how to work.
Application software: this is what instructs a computer to do a certain task/application. E.g Word processors &
spreadsheets.
System software: aka OS , operating system. It controls the hardware and how other systems work. E.g
Windows, Ios
9/3/20XX Presentation Title 10
IPOS Cycle
Computers are electronic devices that operate under the control of instructions (programs)
stored in its memory. Computers do four basic tasks:
● Accept data - input
● Manipulate data - processing
● Produce results after processing - output
● Store the data and results for future use - storage
These four tasks represent the IPOS cycle.
The IPOS cycle has that specific order: Input -> Processing -> Output -> Storage.
9/3/20XX Presentation Title 11
IPOS
The IPOS shows how the major hardware components work together within a computer system to make a
computer work:
1. Input
2. Output
3. CPU
4. Primary Memory: Ram & ROM
5. Secondary Storage
9/3/20XX Presentation Title 12
CLOUD & LOCAL STORAGE
Cloud Storage is:
A software application, owned by a 3rd party, that allows users to upload their data using the internet.
A service that allows users to store their data on remote storage servers, called “the cloud”.
On the cloud, users’ data is maintained, managed, backed up and made available to the users over a network such as the internet.
Local Storage:
Includes physical hardware. As its name suggests, local storage is kept nearby. In other words, storage is not remote. You are
responsible for your data storage & protection.
9/3/20XX Presentation Title 13
CLOUD & LOCAL STORAGE
Examples of Cloud Storage:
● Dropbox
● Google Drive
● Onedrive (Microsoft)
● iCloud (Apple)
Examples of Cloud Storage:
● Flash drives
● Hard disk drives
● CDs
9/3/20XX Presentation Title 14
Pros and Cons of Cloud Storage
- It’s inexpensive for the user
- Reduces the chance of data loss due to its backup system
- High usability & accessibility
- Greater storage capacity
- Easy data sharing
- Offers malware protection
*Vulnerable to hackers
*Vulnerable to hardware failure from the 3rd party
* Requires internet connection to access your data
9/3/20XX Presentation Title 15
Pros and Cons of Local Storage
- Your data is under your control; no 3rd parties involved
- Easy to use
- Inexpensive when storing limited amounts of data
*Need the hardware in order to access your data
*Hardware devices can be stolen or misplaced/lost
* Risk of damage from natural disasters
9/3/20XX Presentation Title 16
I/O
9/3/20XX Presentation Title 17
I/O
9/3/20XX Presentation Title 18
I/O
9/3/20XX Presentation Title 19
I/O
9/3/20XX Presentation Title 20
I/O
9/3/20XX Presentation Title 21
An output device is
a hardware device used to provide or display information from a computer system in a
human-readable form. This can be as text, images, videos or audio.
It’s basically a hardware device that we use to get information from the computer system.
E.g Monitors, printers
Types of Software
1. System Software
Aka Operating System (OS) because it controls the hardware and how the other software functions. System
software also includes UTILITY SOFTWARE which works to protect & maintain the system software.
2. Application Software
This is software that tells the computer to execute a specific task or application/job.
There are many types of application software:
- General Purpose Application Software
- Customized Software
- Custom-written Software / Bespoke / Tailor Made
- Specialized Software
- Integrated Software
9/3/20XX Presentation Title 22
9/3/20XX Presentation Title 23
USER INTERFACES
A user interface is what allows you, the user, to interact or communicate with the computer system.
SOFTWARE INTERFACES
There are four (4) main types of software interfaces:
• GUI (graphical user interface)
• Menu- driven
• Command-line or Command-driven
• Touch
9/3/20XX Presentation Title 24
USER INTERFACES
HARDWARE INTERFACES
Include touch screens, sensors, digital cameras and special keyboards.
However, these are also input devices. A game controller is an example of a hardware user interface.
The layout and design of the buttons, touch pad, joystick, and hand grips on the game controller all form the user interface
on the controller.
9/3/20XX Presentation Title 25
Data vs Information
• Data - is the raw facts and results/readings you get after conducting some activity or experiment.
E.g raw number readings obtained after taking the temperature of countries during the
month of July 32, 29, 33
• Information - is processed data. We take the data and give it meaning. After data is processed, it becomes
useful information. E.g the raw temperature reading can be useful to us when we give it meaning by using
the data to list the hottest countries in July and then use that info to pick your travel destination.
9/3/20XX Presentation Title 26
Data - all the reviews on / for a certain restaurant
Information - the average review on this restaurant.
Having this information, you can now use it to help
decide if you’ll give the restaurant a try or not.
9/3/20XX Presentation Title 27
Types of Documents
9/3/20XX Presentation Title 28
Machine-readable
Human-readable
Turn-around
Hardcopy
Softcopy
Validation vs Verification of Data
Validation of data is checking the input data for errors by using the computer and ensuring that the input data
conforms to the data rules or requirements of the system. So it is a computerized method of checking data for
errors...
Whereas
Verification of data is a way of ensuring that the user inputs what they intended to. That’s why some systems
require you to enter your password twice. They are performing a data verification check to test if the data
matches the both times you entered your password.
9/3/20XX Presentation Title 29
Validation vs Verification of Data
Valid: as in it matches a certain format/ data type. E.g the input data is a number when it should be a number.
Verified: as in the data is correct, accurate and free from errors. The email you entered the second time matches the one you
entered the first time. Verifying your email address.
9/3/20XX Presentation Title 30
Methods of Validation:
- The Range Check
- Reasonableness Check
- Data Type Check
- Consistency Check
- Presence Check
- Format Check
- Length Check
Methods of Verification:
- Proofreading (to identify & correct
typographical and transposition errors)
- Double Entry
FILE ORGANIZATION TYPES
● Payroll system
Includes files that store all the information on an employee’s paycheck such as their gross salary, deductions and net pay, etc
Sequential access method is best here.
● Real Time Systems
Such as air traffic-control systems and networked multimedia systems are systems in which correct functioning depends on the timely feedback.
Direct file access method is ideal for real time systems.
● Archiving
Is the process of moving data that is not longer in active use and moving it into long term storage.
Archived files may be accessed serially or directly.
9/3/20XX Presentation Title 31
Jan 2020 P2
9/3/20XX Presentation Title 32
RAM stores the instructions or the programs that are currently
being used on the system or by the user
permanently stores files using some type of secondary storage
media
9/3/20XX Presentation Title 33
Permanently stores the start-up instructions of the system. This is
non-volatile memory
34
9/3/20XX Presentation Title 35
Secondary
Direct
Secondary
Serial
Secondary
Random/Direct
9/3/20XX 36
Real-time processing involves receiving instantaneous feedback from the
information systems whereas batch processing involves
doing multiple jobs or copies in one go
Software user interfaces are those interfaces that are primarily programs or
software such as GUI or menu-driven whereas hardware
user interfaces are tangible such as peripheral devices for example a mouse
or special keyboard
9/3/20XX Presentation Title 37
9/3/20XX Presentation Title 38
Kilobyte -> Megabyte -> Gigabyte -> Terabyte
9/3/20XX Presentation Title 39
Jan 2021
9/3/20XX Presentation Title 40
9/3/20XX Presentation Title 41
Pharmaceutical industry and oil and gas exploration industry
9/3/20XX Presentation Title 42
9/3/20XX Presentation Title 43
Input
Input
Jan 2022
9/3/20XX Presentation Title 44
Ensures that data is free of errors and is what the user intended to
enter by methods such as double entry and proofreading
Ensures that data is correct in that it adheres to the rules and
specifications of the system eg it is in the correct format
9/3/20XX Presentation Title 45
Checks to see if the the input data is within the specified
range
months of the year being a
number between 1 and 12 inclusive so the range is 1-12
Checks to see if the the input data is consistent or free
from discrepancies
the entered age matches with
the calculated age using the inputted date of birth
Jan 2023
9/3/20XX Presentation Title 46
9/3/20XX Presentation Title 47
9/3/20XX Presentation Title 48
9/3/20XX Presentation Title 49
Sequential the files are most likely ordered
Serial the master file can be a form of a
records
Direct speed is important for this task
Jan 2024
9/3/20XX Presentation Title 50
9/3/20XX Presentation Title 51
9/3/20XX Presentation Title 52
9/3/20XX Presentation Title 53
June 2023
9/3/20XX Presentation Title 54
9/3/20XX Presentation Title 55
9/3/20XX Presentation Title 56
9/3/20XX Presentation Title 57
9/3/20XX Presentation Title 58
9/3/20XX Presentation Title 59
9/3/20XX Presentation Title 60
June 2021
9/3/20XX Presentation Title 61
9/3/20XX Presentation Title 62
9/3/20XX Presentation Title 63
9/3/20XX Presentation Title 64
9/3/20XX Presentation Title 65
9/3/20XX Presentation Title 66
9/3/20XX Presentation Title 67
9/3/20XX Presentation Title 68
9/3/20XX Presentation Title 69
June 2022
9/3/20XX Presentation Title 70
9/3/20XX Presentation Title 71
9/3/20XX Presentation Title 72
Section 2:
Computer Networks &
Web Technologies
A computer network is basically the term used to
describe connection of several computers and
devices together.
Networks connect computers to each other so they
can share resources such as peripheral devices like
printers and information.
Networks can have various sizes, connecting
thousands or just a few devices together.
9/3/20XX Presentation Title 73
Types of Networks
1. LAN
2. MAN
3. WAN
4. Mobile Networks
9/3/20XX Presentation Title 74
Wireless Network Technologies
Some common wireless network technologies are WI-FI, bluetooth, and hotspots.
Bluetooth replaces cables, and WiFi provides high speed wireless access to networks.
Bluetooth allows data exchange over short distances among wireless and wired devices.
A hotspot on the other hand, is a public area usually as small as a room or a public park and it allows internet
access via WLAN. WIFI hotspots are is usually set up at cafes, restaurants and other public places & you have
to be within a certain range to stay connected.
9/3/20XX Presentation Title 75
Privacy levels of Networks
Privacy levels of Networks
Intranet - very private
Extranet - private but gives access to authorized vendors etc
Internet - public network
9/3/20XX Presentation Title 76
Transmission media
This can be thought the same as communication channels because transmission
media are ways or media used to transmit data among computers.
You can use a cabled/wired method or a wireless method to transmit data.
However, wireless media comprise microwaves, satellite, and infrared waves.
Wireless media transmits the data through the air rather than through physical
cables as with wired (cabled) media.
Wired - Coaxial, Twisted pair, Fibre optics
9/3/20XX Presentation Title 77
Network components
These devices (components of a computer network) are used to connect to the internet.
Switch - used to increase the number of devices that can be connected to a router.
Router - this is needed if you are using more than one computer with a modem. A router is the component that directs the signal traffic in
a network.
Modem - modulator/demodulator is provided to you by your internet service provider or ISP. A modem functions to convert analogue
and digital signals between a landline and the internet.
NIC - network interface card- A NIC is a hardware component that provides a computer with a dedicated connection to a network and
can be used for cabled or wireless connections.
9/3/20XX Presentation Title 78
Web Technology Concepts
● WWW
● HTML
● HTTP
● Hyperlinks
● Web browser
● Web Servers
● Web Pages
● FTP
● URL
● Uploading & Downloading
9/3/20XX Presentation Title 79
June 2022
9/3/20XX Presentation Title 80
9/3/20XX Presentation Title 81
9/3/20XX Presentation Title 82
June 2023
9/3/20XX Presentation Title 83
9/3/20XX Presentation Title 84
June 2021
9/3/20XX Presentation Title 85
Jan 2024
9/3/20XX Presentation Title 86
9/3/20XX Presentation Title 87
Modem
Router
Cables/wires
Switch
The internet is the place where all the resources
are shared whereas the www gives us access to
those resources on the internet
9/3/20XX Presentation Title 88
Uniform resource locator
Protocol
domain name
webpage
Jan 2023
9/3/20XX Presentation Title 89
9/3/20XX Presentation Title 90
4
1
2
3
9/3/20XX Presentation Title 91
Private - Public
Limited users - Unlimited users
Requires authorization - Doesn’t require authorization
Costly to build - Not costly
Secure - Not secure
Jan 2022
9/3/20XX Presentation Title 92
LAN
MAN
WAN
LAN
9/3/20XX Presentation Title 93
An intranet is a private network that only allows the employees of
an organization access whereas an extranet allows access to outside
parties such as vendors, customers and stakeholder
Jan 2021
9/3/20XX Presentation Title 94
Fibre optics , coaxial,
twisted pair
fibre optics
Jan 2020
9/3/20XX Presentation Title 95
Simplex is when data can be transmitted in one direction only whereas half duplex
involves data being transferred in both directions but one direction at a time
Section 3:
Social & Economic
Impact of ICT
Computer security is very important in today’s
world. Businesses invest lots of capital to ensure
that their information is secure against threats,
hackers, and just any disaster (man-made or
natural) that might occur and cause them to lose
their valuable information.
The fear of losing their data and resulting
frustration and havok, is why organizations hold
securing their computer systems, data, and
networks in such a high regard.
9/3/20XX Presentation Title 96
Important Terms
• Vulnerability - a weakness in a computer system that can be exploited
• Threat - a potentially harmful action to the computer system
• Attack- any harmful or offensive action to a computer system or its
data
• Countermeasure - an action or step taken to prevent another action,
usually to prevent danger or an attack
9/3/20XX Presentation Title 97
Internal & External Vulnerabilities
Vulnerabilities of a computer system include:
1. Its hardware & software
2. Its users & data communications (methods of transmitting data e.g cables)
Vulnerabilities of a computer system and its data can be categorized as internal
weakness and external weakness.
Sources of External vulnerabilities:
3. Little to no protection of the systems and its data (from natural disasters or power
surges & spikes)
4. Terrorists’ activity that destroy buildings with computer systems
9/3/20XX Presentation Title 98
1. Sources of Internal vulnerabilities:
2. Failure to backup files/data
3. Human error (employees’ mistakes, erase data)
4. No protection from viruses (lack of anti-virus software)
5. Fraudulent behaviour by employees
6. Lack of passwords and ID authentication that grants only authorized access to the system.
9/3/20XX Presentation Title 99
Computer misuse by people/organizations
Certain people intentionally try to cause damage to others’ system and corrupt
or try to gain unauthorized access to them systems or network.
Some examples of intentional threats caused by people are:
• Hacking - Electronic Eavesdropping
• Phishing - Software and Music Piracy
• Industrial Espionage - Propaganda
• Identity theft
• DOS attack
• Financial abuse
• Cyberbullying
9/3/20XX Presentation Title 100
Countermeasures against computer threats
A countermeasure is an action or procedure that eliminates or prevents some danger or threat. In the computing
scope, it is something that mitigates the effects of the computer threats we discussed earlier.
There are physical measures such as backing up files and implementing other recovery systems or procedures,
setting up hardware firewalls, implementing intrusion detection systems on your devices, and using biometrics
to access the computer systems.
There are software measures such as having effective passwords and authentication/validation systems,
encrypting your data, establishing firewalls, and installing anti-virus and malware detection software.
There are also personal security practices such as verifying the authenticity of emails from companies or
unfamiliar persons, actually looking over and assessing website URLs for authenticity, restricting access to open
Wi-Fi networks, and securing mobile devices.
9/3/20XX Presentation Title 101
Health Concerns of IT in the workplace
I.T has impacted persons in the workplace in relation to their health and safety. There are some common issues
that working with computers have caused:
~ Repetitive strain injury (RSI) ~ Back problems
~ Eye problems ~ Stress
9/3/20XX Presentation Title 102
The Roles of Personnel in Computer-related
professions
The computer-related professions we’ll be looking at are:
- Networks engineers
- Computer Programmers
- Computer support specialists
- Computer system Analysts
- Software Developers
- Database Administrators, Network and System Administrators
- Web Developers
- Social media specialists
9/3/20XX Presentation Title 103
Jan 2020
9/3/20XX Presentation Title 104
A
B
C
D
Jan 2021
9/3/20XX Presentation Title 105
Jan 2022
9/3/20XX Presentation Title 106
Jan 2023
9/3/20XX Presentation Title 107
108
June 2023
9/3/20XX Presentation Title 109
9/3/20XX Presentation Title 110
9/3/20XX Presentation Title 111
June 2021
9/3/20XX Presentation Title 112
9/3/20XX Presentation Title 113
9/3/20XX Presentation Title 114
Section 4:
Web Page Design
What’s a webpage
A web page is a document that users can view by
using a web browser. Web pages contain text,
images, videos, and hyperlinks to other web pages
and files.
Web pages are usually written in a language called
HyperText Markup Language ( HTML). HTML is
not a programming language but it is a universal
language that was made specifically to design the
layout of web pages through the use of tags to
present text and images on the page.
9/3/20XX Presentation Title 115
HTML ?
HTML helps users share documents on the internet because using this
standard language, any web browser can read a basic HTML document.
They also help users link to other documents through the use of
hyperlinks.
Websites can be a standalone web page or be multiple web pages linked
together. So in the lesson, when I say ‘website’, I can mean either a
singular web page or multiple pages.
9/3/20XX Presentation Title 116
Jan 2023
9/3/20XX Presentation Title 117
Specimen P32
9/3/20XX Presentation Title 118
Productivity Tools
9/3/20XX Presentation Title 119
1. Word processing
2. Spreadsheets
3. Database management
4. Programming
Section 4:
Word Processing
JAN 2020 120
9/3/20XX Presentation Title 121
JAN 2021 Presentation Title 122
9/3/20XX Presentation Title 123
JAN 2023 Presentation Title 124
9/3/20XX Presentation Title 125
JAN 2024 Presentation Title 126
9/3/20XX Presentation Title 127
JUNE 2021 Presentation Title 128
9/3/20XX Presentation Title 129
JUNE 2022 Presentation Title 130
9/3/20XX Presentation Title 131
Section 5:
Spreadsheets
JUNE 2022 Presentation Title 132
9/3/20XX Presentation Title 133
9/3/20XX Presentation Title 134
JUNE 2023 Presentation Title 135
9/3/20XX Presentation Title 136
9/3/20XX Presentation Title 137
9/3/20XX Presentation Title 138
9/3/20XX Presentation Title 139
JAN 2024 Presentation Title 140
9/3/20XX Presentation Title 141
JAN 2023 Presentation Title 142
9/3/20XX Presentation Title 143
9/3/20XX Presentation Title 144
JAN 2022 Presentation Title 145
9/3/20XX Presentation Title 146
9/3/20XX Presentation Title 147
JAN 2021 Presentation Title 148
9/3/20XX Presentation Title 149
Section 6:
Database Management
Database Terminology
Table/relation - the files in which data is stored;
consist of records
Record/row/tuple - a line of data that includes info
from each
field
Field/column - an attribute of the entity on which
data is
stored (e.g name field) or column in the table
9/3/20XX Presentation Title 150
More database Terminology
When creating your db tables and linking them together, you’ll come across the following terms:
Primary key - a unique identifier (field) that is used to find records e.g student ID field. No null
Secondary key - a key that is considered a candidate key for the primary key
Candidate key - can also be a primary key if it is unique. These keys are optional and can be excluded from a db table. They
can have null values and a table can have multiple of these. (Just another field(s) that can be used as the primary key).
Composite key - is a primary key that consists more than one field.
Foreign key - is the key field that needs to be present in two tables, to link them. This field enables the linking
tables/relations together.
9/3/20XX Presentation Title 151
Data types found in db tables
Numeric
This type deals with numbers e.g 25, 36, 40
Text
Allows long or short text- alphanumeric & special characters
Logical/Boolean = Yes/No
Can select only one of two values, either Yes or No, T/F
9/3/20XX Presentation Title 152
Data types found in db tables
Date/time
Date: dd/mm/yy and time information
Currency
Different money currencies - dollar, pound, euro
Data types tell what kind of data can be allowed or entered in the table and what operation the db can carry out
on or using the data.
9/3/20XX Presentation Title 153
Relationships in a Database
● one-to-one
Denoted by 1:1
This relationship occurs when the primary key or one record from one table links to one and only one
record of another table.
E.g one clerk links to only one employee record
9/3/20XX Presentation Title 154
Relationships in a Database
● one-to-many
Denoted by 1:M or 1:∞
This relationship occurs when one record from a table links to many records in another table. E.g one
student links to many courses because they are registered to many
9/3/20XX Presentation Title 155
MANIPULATING DATA IN A DATABASE
Here we’ll learn to create forms, reports and make queries.
FOR FORMS WE’LL LEARN TO:
(i) Use form wizard
(ii) select suitable fields
(iii) use subforms.
FOR QUERIES, WE’LL LEARN TO:
(i) use more than one criterion;
(ii) use select;
(iii) use a calculated field
(iv) two or more fields involving the use of relational and logical operators.
FOR REPORTS, LEARN TO:
(i) use report wizard;
(ii) sort, group,use statistical & summary features e.g count,sum,& average;
(iii) generate a report to screen, printer & file;
(iv) rename the report title.
9/3/20XX Presentation Title 156
JUNE 2021 Presentation Title 157
9/3/20XX Presentation Title 158
JUNE 2022 Presentation Title 159
9/3/20XX Presentation Title 160
JUNE 2023 Presentation Title 161
JAN 2024 Presentation Title 162
9/3/20XX Presentation Title 163
Section 7&8:
Problem solving &
Programming
9/3/20XX Presentation Title 164
The program implementation process
1. Create source code by transforming your pseudocode algorithm using a programing
language e.d JAVA, Pascal
2. Identify errors & debug source code
3. Execute/run the program to test that the code is working properly i.e displaying error
messages when needed and producing the correct results
4. Maintain the program
9/3/20XX Presentation Title 165
Program errors
1. Syntax errors
2. Logic errors
3. Runtime errors
9/3/20XX Presentation Title 166
Data Tyes
Data types:
- Integer = a whole number e.gs 36, 25, 1
- Real/Double/ Float = a real number incl. decimal form e.g 30.9994
- Character = a singular keyboard character e.g A or 4 or ;
- String = a word or list of characters
- Boolean/Logical = True or False
9/3/20XX Presentation Title 167
A constant is a variable whose value does not change throughout the life of the program.
Its value remains constant.
E.g const
max = 100;
A variable then, is a ‘container’ used in the program to hold values. The values of variables
may change and be updated during the runtime of the program. Variables are used in the
calculations in the program.
9/3/20XX Presentation Title 168
Conditional Statements
E.g of IF THEN
if age < 18 then
print (“This person is a child”)
E.g of IF...THEN...ELSE
if age < 18 then
print (“This person is a child”)
else
print(“This person is an adult”)
9/3/20XX Presentation Title 169
Conditional Statements
E.g of IF...THEN...ELSE If
if age < 18 then
print (“This person is a child”)
else if age == 18
print(“This person is a young adult”)
else if age > 30 then
Print (“This person is an adult”)
9/3/20XX Presentation Title 170
Loops /Iterations
Looping Statements
These are aka iteration (Loops). We’ll be looking at these three types of iteration:
- For
For loops use a specified range, from start to stop, and carry out an action.
E.g: for num = 1 to 10 do
write (“I’m passing I.T with a grade 1”)
End for
Notice the range of the variable ‘num’. The loop will run 10 times, then break.
9/3/20XX Presentation Title 171
Loops /Iterations
- While
While loops do not use a specified range or does not have a predetermined number of times to
iterate. They are used when you only know the condition that stops the loop. E.g in C++:
x=10
while x > 0
print (“TSH for the win”)
x = x-1 // this will alter the value of x
End while
9/3/20XX Presentation Title 172
Loops /Iterations
Repeat...Until loops follow the syntax below:
repeat
Cost = cost + num
num = num - 2
until num = 0
So we are repeating the statements above, until the value of ‘num’ is 0.
9/3/20XX Presentation Title 173
Program Documentation
Documenting your code really is describing or explaining what the code does, how it functions.
This documentation commonly includes:
- The date the program was created/modified & author names
- An overview of the tasks and processes involved
Features of external documentation (user manual)
There is also user documentation which is written for the users.
User documentation should explain to the user how the program works and how to use it.
It includes instructions on how to input data into the program, format output, access the program features,
and how to understand system messages that may pop up.
9/3/20XX Presentation Title 174
Program Documentation
Features of internal documentation (program documentation)
- use of mnemonic, variable names,
- use of comments, indentation,
- effective use of white space
It is recommended that you write comments in your code as you are coding and not wait until the end
when the program is working, as you may forget certains things.
9/3/20XX Presentation Title 175
JUNE 2022 Presentation Title 176
9/3/20XX Presentation Title 177
9/3/20XX Presentation Title 178
9/3/20XX Presentation Title 179
JAN 2024 Presentation Title 180
9/3/20XX Presentation Title 181
9/3/20XX Presentation Title 182
JAN 2021 Presentation Title 183
9/3/20XX Presentation Title 184
JAN 2022 Presentation Title 185
9/3/20XX Presentation Title 186
9/3/20XX Presentation Title 187
JAN 2023 Presentation Title 188
9/3/20XX Presentation Title 189
9/3/20XX Presentation Title 190
JUNE 2023 Presentation Title 191
9/3/20XX Presentation Title 192
Thank you, guys, for attending
And wishing you all the very best in all your
exams !
Questions?
Miss Ariel

736749821-CSEC-INFORMATION-TECHNOLOGY-12-HOUR-CC-MAY-2024.pdf

  • 1.
  • 2.
    Agenda 1. Section 1+ past papers questions 2. Section 2 + past papers questions 3. Section 3 + past papers questions 4. Section 4 past papers questions 5. Section 5 past papers questions 6. Section 6 + past papers questions 7. Section 7&8 + past papers questions
  • 3.
    Section 1: Computer Fundamentals& Information processing 1. Desktop systems e.g Dell OptiPlex 390 Desktop PC 2. Supercomputers e.g Cray 1 3. Mainframes e.g IBM zEnterprise System 4. Mobile devices e.g laptops 5. Embedded devices e.g GPS tracker, dishwasher 9/3/20XX Presentation Title 3 Types of Computer Systems
  • 4.
    Hardware Components ofa Computer 1. Input 2. Processing: CPU 3. Primary memory: RAM & ROM 4. Secondary storage 5. Output 9/3/20XX Presentation Title 4
  • 5.
    Input Devices Input devicesfunction to communicate information to a computer or other information processing devices. Input devices are types of peripheral devices that communicate with processing units. E.g Keyboard, Mouse, Joystick, Light pen, TrackBall, Scanner, Graphic Tablet, Microphone, Magnetic Ink Card Reader(MICR), Optical Character Reader(OCR), Barcode Reader, Optical Mark Reader(OMR) 9/3/20XX Presentation Title 5
  • 6.
    The CPU isconsidered as the 'brain' of the computer system because it performs all types of data processing operations. The CPU stores data, intermediate results, and instructions (programs). The CPU controls all the operations of all other parts of the computer systems. The CPU has three components: - Memory/Storage Unit - Control Unit - ALU: Arithmetic Logic Unit 9/3/20XX Presentation Title 6
  • 7.
    CPU Memory/ Storage - storesall the data & instructions required for processing. Control Unit - it is responsible for controlling the transfer of data & instructions among other units of a computer - it manages and coordinates all units of the computer ALU - consists of two sections: arithmetic section & logic section - they perform arithmetic(+, -, /, x) and logical operations (comparing, selecting, & merging data) 9/3/20XX Presentation Title 7
  • 8.
    Units of Storage Aunit of storage/memory is the amount of data that can be stored in the storage unit. This storage capacity is expressed in terms of Bytes. Bit: A binary digit (a bit) is logical 0 or 1 representing a passive or an active (on/off) state of a component in an electric circuit. Bytes: A group of 8 bits is called byte. A byte is the smallest unit, which can represent a data item or a character. - Kilobytes: (KB) 1 KB = 1024 Bytes - Megabytes: 1 MB = 1024 KB - Gigabytes: 1 GB = 1024 MB - Terabytes: 1 TB = 1024 GB 9/3/20XX Presentation Title 8
  • 9.
    Important Definitions Hardware: this isthe term used to refer to all the physical parts of a computer. Peripheral devices: are those devices located outside of the CPU but are controlled by it. They are devices that are attached to the computer system. 9/3/20XX Presentation Title 9
  • 10.
    Important Definitions Software: refersto computer programs that instruct the computer on how to work. Application software: this is what instructs a computer to do a certain task/application. E.g Word processors & spreadsheets. System software: aka OS , operating system. It controls the hardware and how other systems work. E.g Windows, Ios 9/3/20XX Presentation Title 10
  • 11.
    IPOS Cycle Computers areelectronic devices that operate under the control of instructions (programs) stored in its memory. Computers do four basic tasks: ● Accept data - input ● Manipulate data - processing ● Produce results after processing - output ● Store the data and results for future use - storage These four tasks represent the IPOS cycle. The IPOS cycle has that specific order: Input -> Processing -> Output -> Storage. 9/3/20XX Presentation Title 11
  • 12.
    IPOS The IPOS showshow the major hardware components work together within a computer system to make a computer work: 1. Input 2. Output 3. CPU 4. Primary Memory: Ram & ROM 5. Secondary Storage 9/3/20XX Presentation Title 12
  • 13.
    CLOUD & LOCALSTORAGE Cloud Storage is: A software application, owned by a 3rd party, that allows users to upload their data using the internet. A service that allows users to store their data on remote storage servers, called “the cloud”. On the cloud, users’ data is maintained, managed, backed up and made available to the users over a network such as the internet. Local Storage: Includes physical hardware. As its name suggests, local storage is kept nearby. In other words, storage is not remote. You are responsible for your data storage & protection. 9/3/20XX Presentation Title 13
  • 14.
    CLOUD & LOCALSTORAGE Examples of Cloud Storage: ● Dropbox ● Google Drive ● Onedrive (Microsoft) ● iCloud (Apple) Examples of Cloud Storage: ● Flash drives ● Hard disk drives ● CDs 9/3/20XX Presentation Title 14
  • 15.
    Pros and Consof Cloud Storage - It’s inexpensive for the user - Reduces the chance of data loss due to its backup system - High usability & accessibility - Greater storage capacity - Easy data sharing - Offers malware protection *Vulnerable to hackers *Vulnerable to hardware failure from the 3rd party * Requires internet connection to access your data 9/3/20XX Presentation Title 15
  • 16.
    Pros and Consof Local Storage - Your data is under your control; no 3rd parties involved - Easy to use - Inexpensive when storing limited amounts of data *Need the hardware in order to access your data *Hardware devices can be stolen or misplaced/lost * Risk of damage from natural disasters 9/3/20XX Presentation Title 16
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
    I/O 9/3/20XX Presentation Title21 An output device is a hardware device used to provide or display information from a computer system in a human-readable form. This can be as text, images, videos or audio. It’s basically a hardware device that we use to get information from the computer system. E.g Monitors, printers
  • 22.
    Types of Software 1.System Software Aka Operating System (OS) because it controls the hardware and how the other software functions. System software also includes UTILITY SOFTWARE which works to protect & maintain the system software. 2. Application Software This is software that tells the computer to execute a specific task or application/job. There are many types of application software: - General Purpose Application Software - Customized Software - Custom-written Software / Bespoke / Tailor Made - Specialized Software - Integrated Software 9/3/20XX Presentation Title 22
  • 23.
  • 24.
    USER INTERFACES A userinterface is what allows you, the user, to interact or communicate with the computer system. SOFTWARE INTERFACES There are four (4) main types of software interfaces: • GUI (graphical user interface) • Menu- driven • Command-line or Command-driven • Touch 9/3/20XX Presentation Title 24
  • 25.
    USER INTERFACES HARDWARE INTERFACES Includetouch screens, sensors, digital cameras and special keyboards. However, these are also input devices. A game controller is an example of a hardware user interface. The layout and design of the buttons, touch pad, joystick, and hand grips on the game controller all form the user interface on the controller. 9/3/20XX Presentation Title 25
  • 26.
    Data vs Information •Data - is the raw facts and results/readings you get after conducting some activity or experiment. E.g raw number readings obtained after taking the temperature of countries during the month of July 32, 29, 33 • Information - is processed data. We take the data and give it meaning. After data is processed, it becomes useful information. E.g the raw temperature reading can be useful to us when we give it meaning by using the data to list the hottest countries in July and then use that info to pick your travel destination. 9/3/20XX Presentation Title 26
  • 27.
    Data - allthe reviews on / for a certain restaurant Information - the average review on this restaurant. Having this information, you can now use it to help decide if you’ll give the restaurant a try or not. 9/3/20XX Presentation Title 27
  • 28.
    Types of Documents 9/3/20XXPresentation Title 28 Machine-readable Human-readable Turn-around Hardcopy Softcopy
  • 29.
    Validation vs Verificationof Data Validation of data is checking the input data for errors by using the computer and ensuring that the input data conforms to the data rules or requirements of the system. So it is a computerized method of checking data for errors... Whereas Verification of data is a way of ensuring that the user inputs what they intended to. That’s why some systems require you to enter your password twice. They are performing a data verification check to test if the data matches the both times you entered your password. 9/3/20XX Presentation Title 29
  • 30.
    Validation vs Verificationof Data Valid: as in it matches a certain format/ data type. E.g the input data is a number when it should be a number. Verified: as in the data is correct, accurate and free from errors. The email you entered the second time matches the one you entered the first time. Verifying your email address. 9/3/20XX Presentation Title 30 Methods of Validation: - The Range Check - Reasonableness Check - Data Type Check - Consistency Check - Presence Check - Format Check - Length Check Methods of Verification: - Proofreading (to identify & correct typographical and transposition errors) - Double Entry
  • 31.
    FILE ORGANIZATION TYPES ●Payroll system Includes files that store all the information on an employee’s paycheck such as their gross salary, deductions and net pay, etc Sequential access method is best here. ● Real Time Systems Such as air traffic-control systems and networked multimedia systems are systems in which correct functioning depends on the timely feedback. Direct file access method is ideal for real time systems. ● Archiving Is the process of moving data that is not longer in active use and moving it into long term storage. Archived files may be accessed serially or directly. 9/3/20XX Presentation Title 31
  • 32.
    Jan 2020 P2 9/3/20XXPresentation Title 32 RAM stores the instructions or the programs that are currently being used on the system or by the user permanently stores files using some type of secondary storage media
  • 33.
    9/3/20XX Presentation Title33 Permanently stores the start-up instructions of the system. This is non-volatile memory
  • 34.
  • 35.
    9/3/20XX Presentation Title35 Secondary Direct Secondary Serial Secondary Random/Direct
  • 36.
    9/3/20XX 36 Real-time processinginvolves receiving instantaneous feedback from the information systems whereas batch processing involves doing multiple jobs or copies in one go Software user interfaces are those interfaces that are primarily programs or software such as GUI or menu-driven whereas hardware user interfaces are tangible such as peripheral devices for example a mouse or special keyboard
  • 37.
  • 38.
    9/3/20XX Presentation Title38 Kilobyte -> Megabyte -> Gigabyte -> Terabyte
  • 39.
  • 40.
  • 41.
    9/3/20XX Presentation Title41 Pharmaceutical industry and oil and gas exploration industry
  • 42.
  • 43.
  • 44.
    Jan 2022 9/3/20XX PresentationTitle 44 Ensures that data is free of errors and is what the user intended to enter by methods such as double entry and proofreading Ensures that data is correct in that it adheres to the rules and specifications of the system eg it is in the correct format
  • 45.
    9/3/20XX Presentation Title45 Checks to see if the the input data is within the specified range months of the year being a number between 1 and 12 inclusive so the range is 1-12 Checks to see if the the input data is consistent or free from discrepancies the entered age matches with the calculated age using the inputted date of birth
  • 46.
  • 47.
  • 48.
  • 49.
    9/3/20XX Presentation Title49 Sequential the files are most likely ordered Serial the master file can be a form of a records Direct speed is important for this task
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
    Section 2: Computer Networks& Web Technologies A computer network is basically the term used to describe connection of several computers and devices together. Networks connect computers to each other so they can share resources such as peripheral devices like printers and information. Networks can have various sizes, connecting thousands or just a few devices together. 9/3/20XX Presentation Title 73
  • 74.
    Types of Networks 1.LAN 2. MAN 3. WAN 4. Mobile Networks 9/3/20XX Presentation Title 74
  • 75.
    Wireless Network Technologies Somecommon wireless network technologies are WI-FI, bluetooth, and hotspots. Bluetooth replaces cables, and WiFi provides high speed wireless access to networks. Bluetooth allows data exchange over short distances among wireless and wired devices. A hotspot on the other hand, is a public area usually as small as a room or a public park and it allows internet access via WLAN. WIFI hotspots are is usually set up at cafes, restaurants and other public places & you have to be within a certain range to stay connected. 9/3/20XX Presentation Title 75
  • 76.
    Privacy levels ofNetworks Privacy levels of Networks Intranet - very private Extranet - private but gives access to authorized vendors etc Internet - public network 9/3/20XX Presentation Title 76
  • 77.
    Transmission media This canbe thought the same as communication channels because transmission media are ways or media used to transmit data among computers. You can use a cabled/wired method or a wireless method to transmit data. However, wireless media comprise microwaves, satellite, and infrared waves. Wireless media transmits the data through the air rather than through physical cables as with wired (cabled) media. Wired - Coaxial, Twisted pair, Fibre optics 9/3/20XX Presentation Title 77
  • 78.
    Network components These devices(components of a computer network) are used to connect to the internet. Switch - used to increase the number of devices that can be connected to a router. Router - this is needed if you are using more than one computer with a modem. A router is the component that directs the signal traffic in a network. Modem - modulator/demodulator is provided to you by your internet service provider or ISP. A modem functions to convert analogue and digital signals between a landline and the internet. NIC - network interface card- A NIC is a hardware component that provides a computer with a dedicated connection to a network and can be used for cabled or wireless connections. 9/3/20XX Presentation Title 78
  • 79.
    Web Technology Concepts ●WWW ● HTML ● HTTP ● Hyperlinks ● Web browser ● Web Servers ● Web Pages ● FTP ● URL ● Uploading & Downloading 9/3/20XX Presentation Title 79
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
    9/3/20XX Presentation Title87 Modem Router Cables/wires Switch The internet is the place where all the resources are shared whereas the www gives us access to those resources on the internet
  • 88.
    9/3/20XX Presentation Title88 Uniform resource locator Protocol domain name webpage
  • 89.
  • 90.
  • 91.
    9/3/20XX Presentation Title91 Private - Public Limited users - Unlimited users Requires authorization - Doesn’t require authorization Costly to build - Not costly Secure - Not secure
  • 92.
    Jan 2022 9/3/20XX PresentationTitle 92 LAN MAN WAN LAN
  • 93.
    9/3/20XX Presentation Title93 An intranet is a private network that only allows the employees of an organization access whereas an extranet allows access to outside parties such as vendors, customers and stakeholder
  • 94.
    Jan 2021 9/3/20XX PresentationTitle 94 Fibre optics , coaxial, twisted pair fibre optics
  • 95.
    Jan 2020 9/3/20XX PresentationTitle 95 Simplex is when data can be transmitted in one direction only whereas half duplex involves data being transferred in both directions but one direction at a time
  • 96.
    Section 3: Social &Economic Impact of ICT Computer security is very important in today’s world. Businesses invest lots of capital to ensure that their information is secure against threats, hackers, and just any disaster (man-made or natural) that might occur and cause them to lose their valuable information. The fear of losing their data and resulting frustration and havok, is why organizations hold securing their computer systems, data, and networks in such a high regard. 9/3/20XX Presentation Title 96
  • 97.
    Important Terms • Vulnerability- a weakness in a computer system that can be exploited • Threat - a potentially harmful action to the computer system • Attack- any harmful or offensive action to a computer system or its data • Countermeasure - an action or step taken to prevent another action, usually to prevent danger or an attack 9/3/20XX Presentation Title 97
  • 98.
    Internal & ExternalVulnerabilities Vulnerabilities of a computer system include: 1. Its hardware & software 2. Its users & data communications (methods of transmitting data e.g cables) Vulnerabilities of a computer system and its data can be categorized as internal weakness and external weakness. Sources of External vulnerabilities: 3. Little to no protection of the systems and its data (from natural disasters or power surges & spikes) 4. Terrorists’ activity that destroy buildings with computer systems 9/3/20XX Presentation Title 98
  • 99.
    1. Sources ofInternal vulnerabilities: 2. Failure to backup files/data 3. Human error (employees’ mistakes, erase data) 4. No protection from viruses (lack of anti-virus software) 5. Fraudulent behaviour by employees 6. Lack of passwords and ID authentication that grants only authorized access to the system. 9/3/20XX Presentation Title 99
  • 100.
    Computer misuse bypeople/organizations Certain people intentionally try to cause damage to others’ system and corrupt or try to gain unauthorized access to them systems or network. Some examples of intentional threats caused by people are: • Hacking - Electronic Eavesdropping • Phishing - Software and Music Piracy • Industrial Espionage - Propaganda • Identity theft • DOS attack • Financial abuse • Cyberbullying 9/3/20XX Presentation Title 100
  • 101.
    Countermeasures against computerthreats A countermeasure is an action or procedure that eliminates or prevents some danger or threat. In the computing scope, it is something that mitigates the effects of the computer threats we discussed earlier. There are physical measures such as backing up files and implementing other recovery systems or procedures, setting up hardware firewalls, implementing intrusion detection systems on your devices, and using biometrics to access the computer systems. There are software measures such as having effective passwords and authentication/validation systems, encrypting your data, establishing firewalls, and installing anti-virus and malware detection software. There are also personal security practices such as verifying the authenticity of emails from companies or unfamiliar persons, actually looking over and assessing website URLs for authenticity, restricting access to open Wi-Fi networks, and securing mobile devices. 9/3/20XX Presentation Title 101
  • 102.
    Health Concerns ofIT in the workplace I.T has impacted persons in the workplace in relation to their health and safety. There are some common issues that working with computers have caused: ~ Repetitive strain injury (RSI) ~ Back problems ~ Eye problems ~ Stress 9/3/20XX Presentation Title 102
  • 103.
    The Roles ofPersonnel in Computer-related professions The computer-related professions we’ll be looking at are: - Networks engineers - Computer Programmers - Computer support specialists - Computer system Analysts - Software Developers - Database Administrators, Network and System Administrators - Web Developers - Social media specialists 9/3/20XX Presentation Title 103
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
    Section 4: Web PageDesign What’s a webpage A web page is a document that users can view by using a web browser. Web pages contain text, images, videos, and hyperlinks to other web pages and files. Web pages are usually written in a language called HyperText Markup Language ( HTML). HTML is not a programming language but it is a universal language that was made specifically to design the layout of web pages through the use of tags to present text and images on the page. 9/3/20XX Presentation Title 115
  • 116.
    HTML ? HTML helpsusers share documents on the internet because using this standard language, any web browser can read a basic HTML document. They also help users link to other documents through the use of hyperlinks. Websites can be a standalone web page or be multiple web pages linked together. So in the lesson, when I say ‘website’, I can mean either a singular web page or multiple pages. 9/3/20XX Presentation Title 116
  • 117.
  • 118.
  • 119.
    Productivity Tools 9/3/20XX PresentationTitle 119 1. Word processing 2. Spreadsheets 3. Database management 4. Programming
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
    Section 5: Spreadsheets JUNE 2022Presentation Title 132
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.
  • 149.
  • 150.
    Section 6: Database Management DatabaseTerminology Table/relation - the files in which data is stored; consist of records Record/row/tuple - a line of data that includes info from each field Field/column - an attribute of the entity on which data is stored (e.g name field) or column in the table 9/3/20XX Presentation Title 150
  • 151.
    More database Terminology Whencreating your db tables and linking them together, you’ll come across the following terms: Primary key - a unique identifier (field) that is used to find records e.g student ID field. No null Secondary key - a key that is considered a candidate key for the primary key Candidate key - can also be a primary key if it is unique. These keys are optional and can be excluded from a db table. They can have null values and a table can have multiple of these. (Just another field(s) that can be used as the primary key). Composite key - is a primary key that consists more than one field. Foreign key - is the key field that needs to be present in two tables, to link them. This field enables the linking tables/relations together. 9/3/20XX Presentation Title 151
  • 152.
    Data types foundin db tables Numeric This type deals with numbers e.g 25, 36, 40 Text Allows long or short text- alphanumeric & special characters Logical/Boolean = Yes/No Can select only one of two values, either Yes or No, T/F 9/3/20XX Presentation Title 152
  • 153.
    Data types foundin db tables Date/time Date: dd/mm/yy and time information Currency Different money currencies - dollar, pound, euro Data types tell what kind of data can be allowed or entered in the table and what operation the db can carry out on or using the data. 9/3/20XX Presentation Title 153
  • 154.
    Relationships in aDatabase ● one-to-one Denoted by 1:1 This relationship occurs when the primary key or one record from one table links to one and only one record of another table. E.g one clerk links to only one employee record 9/3/20XX Presentation Title 154
  • 155.
    Relationships in aDatabase ● one-to-many Denoted by 1:M or 1:∞ This relationship occurs when one record from a table links to many records in another table. E.g one student links to many courses because they are registered to many 9/3/20XX Presentation Title 155
  • 156.
    MANIPULATING DATA INA DATABASE Here we’ll learn to create forms, reports and make queries. FOR FORMS WE’LL LEARN TO: (i) Use form wizard (ii) select suitable fields (iii) use subforms. FOR QUERIES, WE’LL LEARN TO: (i) use more than one criterion; (ii) use select; (iii) use a calculated field (iv) two or more fields involving the use of relational and logical operators. FOR REPORTS, LEARN TO: (i) use report wizard; (ii) sort, group,use statistical & summary features e.g count,sum,& average; (iii) generate a report to screen, printer & file; (iv) rename the report title. 9/3/20XX Presentation Title 156
  • 157.
  • 158.
  • 159.
  • 160.
  • 161.
  • 162.
  • 163.
  • 164.
    Section 7&8: Problem solving& Programming 9/3/20XX Presentation Title 164
  • 165.
    The program implementationprocess 1. Create source code by transforming your pseudocode algorithm using a programing language e.d JAVA, Pascal 2. Identify errors & debug source code 3. Execute/run the program to test that the code is working properly i.e displaying error messages when needed and producing the correct results 4. Maintain the program 9/3/20XX Presentation Title 165
  • 166.
    Program errors 1. Syntaxerrors 2. Logic errors 3. Runtime errors 9/3/20XX Presentation Title 166
  • 167.
    Data Tyes Data types: -Integer = a whole number e.gs 36, 25, 1 - Real/Double/ Float = a real number incl. decimal form e.g 30.9994 - Character = a singular keyboard character e.g A or 4 or ; - String = a word or list of characters - Boolean/Logical = True or False 9/3/20XX Presentation Title 167
  • 168.
    A constant isa variable whose value does not change throughout the life of the program. Its value remains constant. E.g const max = 100; A variable then, is a ‘container’ used in the program to hold values. The values of variables may change and be updated during the runtime of the program. Variables are used in the calculations in the program. 9/3/20XX Presentation Title 168
  • 169.
    Conditional Statements E.g ofIF THEN if age < 18 then print (“This person is a child”) E.g of IF...THEN...ELSE if age < 18 then print (“This person is a child”) else print(“This person is an adult”) 9/3/20XX Presentation Title 169
  • 170.
    Conditional Statements E.g ofIF...THEN...ELSE If if age < 18 then print (“This person is a child”) else if age == 18 print(“This person is a young adult”) else if age > 30 then Print (“This person is an adult”) 9/3/20XX Presentation Title 170
  • 171.
    Loops /Iterations Looping Statements Theseare aka iteration (Loops). We’ll be looking at these three types of iteration: - For For loops use a specified range, from start to stop, and carry out an action. E.g: for num = 1 to 10 do write (“I’m passing I.T with a grade 1”) End for Notice the range of the variable ‘num’. The loop will run 10 times, then break. 9/3/20XX Presentation Title 171
  • 172.
    Loops /Iterations - While Whileloops do not use a specified range or does not have a predetermined number of times to iterate. They are used when you only know the condition that stops the loop. E.g in C++: x=10 while x > 0 print (“TSH for the win”) x = x-1 // this will alter the value of x End while 9/3/20XX Presentation Title 172
  • 173.
    Loops /Iterations Repeat...Until loopsfollow the syntax below: repeat Cost = cost + num num = num - 2 until num = 0 So we are repeating the statements above, until the value of ‘num’ is 0. 9/3/20XX Presentation Title 173
  • 174.
    Program Documentation Documenting yourcode really is describing or explaining what the code does, how it functions. This documentation commonly includes: - The date the program was created/modified & author names - An overview of the tasks and processes involved Features of external documentation (user manual) There is also user documentation which is written for the users. User documentation should explain to the user how the program works and how to use it. It includes instructions on how to input data into the program, format output, access the program features, and how to understand system messages that may pop up. 9/3/20XX Presentation Title 174
  • 175.
    Program Documentation Features ofinternal documentation (program documentation) - use of mnemonic, variable names, - use of comments, indentation, - effective use of white space It is recommended that you write comments in your code as you are coding and not wait until the end when the program is working, as you may forget certains things. 9/3/20XX Presentation Title 175
  • 176.
  • 177.
  • 178.
  • 179.
  • 180.
  • 181.
  • 182.
  • 183.
  • 184.
  • 185.
  • 186.
  • 187.
  • 188.
  • 189.
  • 190.
  • 191.
  • 192.
  • 193.
    Thank you, guys,for attending And wishing you all the very best in all your exams ! Questions? Miss Ariel