Escolar Documentos
Profissional Documentos
Cultura Documentos
C NGWENYA
COMPUTER STUDIES CRUSH NOTES
WHAT IS HARDWARE?
Hardware is the physical parts of the computer system the parts that you can touch and see.
A motherboard, a CPU, a keyboard and a monitor are all items of hardware.
WHAT IS SOFTWARE?
Software is a collection of instructions that can be run on a computer. These instructions tell
the computer what to do.
Software is not a physical thing (but it can of course be stored on a physical medium such as a
CD-ROM), it is just a bunch of codes. An operating system such as Windows XP or Mac OS X,
applications such as Microsoft Word, and the instructions that control a robot are all examples of
software.
THE DIFFERENCE BETWEEN HARDWARE AND SOFTWARE
Computer hardware is the physical components that make up the computer system. Hardware
is useless without software to run on it.
Software is instructions that tell computer hardware what to do. Software is useless unless there
is hardware to run it on.
MAIN COMPONENTS OF A COMPUTER
Central Processing Unit (CPU)
The CPU is the 'brain' of the computer. It is the device that carries out software instructions.
The processor comprises of: Arithmetic and Logic Unit (ALU) and the Control Unit (CU)
(a) Arithmetic and Logic Unit (ALU) Functions
- Carries out arithmetic operations like add, subtract, divide, etc
- Performs logic operations, like AND, OR, etc
(b) Control Unit (CU)
- It coordinates and controls all hardware operations, It carries out the Fetch-Execute Cycle. ALU
operations on data are first loaded into the accumulator register, which store instructions, data
being processed and results of an operation.
Main Memory
Any data or instructions that are to be processed by the CPU must be placed into main
memory (sometimes known as primary storage).
MSH@2016
MSH@2016
MSH@2016
MSH@2016
It manages applications that are running on the computer, starting them when the user
requests, and stopping them when they are no longer needed
It manages files, helping us save our work, organise our files, find files that we have
saved and load files
It manages the computers memory, deciding what should be loaded into memory and
what should be removed
It manages the computers input and output hardware such as printers, etc.
MSH@2016
MSH@2016
Multi-user - they allow several users (sometimes hundreds) to use the computer at the
same time, connected via remote terminals (screens and keyboards)
MSH@2016
Washing machines
Microwave cookers
Dishwashers
Electric kettles
Fridges
DVD players
Hairdryers
Electric toothbrushes
Here are some examples of devices in the workplace that contain microprocessors:
Lifts
Automatic doors
Factory robots
Photocopiers
Barcode readers
Here are some examples of devices in everyday life which contain microprocessors:
Mobile phones
Digital cameras
MSH@2016
Cars
TYPES OF SYSTEMS
1. Real Time Processing System: - An online system in which individual, discrete transactions
are processed as they occur to influence the activity currently taking place, as in airline
reservation. Results of the process are produced immediately. The system response quickly and
give feedback of a request. Thus the system is interactive in nature. Such systems include airline
reservation systems, hotel reservations, stock control, etc.
2. Transaction Processing System: A mode of processing whereby only individual items of data
need immediate processing e.g., processing of salary of one worker only in an organisation,
airline reservation, balance enquiry at an ATM, etc. Transaction processings requirements
include:
- A large quantity of hardware support. Large and fast main storage, over 1 GB. Large and fast
backing storage like hard drives of about 300 GB. Efficient communication equipment like fibre
optics, satellites, etc. Efficient, secure and reliable operating systems. However, transaction
processing systems are very expensive to run.
3. On-Line System: A system that is directly linked to the host computer for real-time
communication and provides interaction between the user and the job, as in POS terminals in
supermarkets. In networked computers, the terminals must be directly linked to the host
computer. Examples include ATM systems in banks, airline reservation systems. Online systems
can just be for information retrieval. Information retrieval systems are there for users to access
certain information promptly as on the internet. In contrast, offline systems are computer
systems that work without being directly connected to the host computer.
4. Network Systems: - A system in which processing is carried out independently in more than
one location but with shared and controlled access to some common facilities like file storage.
5. Control System: - A system in which one or more computers are used to monitor the
operations of some non-computer equipment like in oil refineries. Control systems involve
monitoring and logging of physical quantities, provide an analysis of performance and allows
some user interaction. Feedback is an essential element as well as timing. Most control systems
are real-time systems, e.g. oil refining, chemical processing, traffic control, etc.
6. Automated Systems: - These are control systems that are dedicated to one particular task and
lack the ability to collect and analyse data as in digital cameras. They do not allow for or act on
user interaction, e.g. washing machines, cameras, watches. Most control systems have embedded
computers systems inside them.
7. Multimedia Systems: - Are systems that enable presentation of data in a number of formats
like sound, pictures, films, video, etc
DIFFERENT DATA TYPES
Before we enter data into a computer system, we usually need to tell the computer what type of
data it is. This is because the computer stores and processes different types of data in different
ways
MSH@2016
MSH@2016
gate
symbol
AND gates
An AND gate will give a high output only if all of the inputs are high. For example, in a
simple lighting circuit with two switches in series the lamp will light only if both switches are
pressed.
MSH@2016
NOT gates
A NOT gate is slightly different because it has just one input. It will give a high output if the
input is low.
NAND gate
This is a NOT-AND gate which is equal to an AND gate followed by a NOT gate. The outputs
of all NAND gates are high if any of the inputs are low. The symbol is an AND gate with a small
circle on the output. The small circle represents inversion.
NOR gate
This is a NOT-OR gate which is equal to an OR gate followed by a NOT gate. The outputs of all
NOR gates are low if any of the inputs are high. The symbol is an OR gate with a small circle on
the output. The small circle represents inversion.
MSH@2016
WHAT IS A NETWORK?
A network is two or more computers, or other electronic devices, connected together so that
they can exchange data.
Why Use Networks?
MSH@2016
Store data centrally (using a file server) for ease of access and back-up
MSH@2016
We have to be aware that information found on The Internet is not always accurate or
reliable
Types of Network
Local Area Network (LAN)
A Local Area Network is a network confined to one building
Often a LAN is a private network belonging to an organisation or business.
or
site.
MSH@2016
Can be quite slow since all computers share the same cable when communicating
Ring Network
In this type of network each computer is connected to a loop of cable, the ring. (If you took a
bus network and connected the ends of the bus cable together, you would have a ring network.)
A ring network
Can cope with a break in the ring cable since all computers are still joined together (it is
now a bus network)
Star Network
In this type of network every computer is connected to a central device. The device passes
messages between computers. At the centre of a star network you might use a hub (cheap, but
slower) or a switch (more expensive, but faster).
A star network
Is quite expensive to install (you have to buy lots of cable and the central device)
Is very fast since each computer has its own cable which it doesnt need to share
Can cope with a broken cable (only one computer will be affected)
Will stop working if the central device breaks
Is the most common network topology
Hybrid Network
A hybrid network is simply one that combines two or more of the above basic topologies.
MSH@2016
Sharing files
An INTRANET is the name given to a private network that provides similar services to The
Internet: e-mail, messaging, web pages, etc. However, these services are only for the users of the
intranet they are private, not public (unlike Internet services which are generally public).
Businesses and other organizations often have intranets for use by their employees.
Typical uses of an intranet would be:
MSH@2016
It is important to check data when it is entered to make sure that it is both sensible and
correct.
If data is not checked before it is processed any errors could cause the final output to be
nonsense.
There are two methods that can be used to check data when it is input.
Verification
Verification is checking to make sure that data has been entered correctly.
Verification is often carried out by getting two users to enter the same set of data at
different computers.
MSH@2016
Once both users have entered the data the two sets of data are compared to check that
they match up.
Verification can also be carried out by software which might, for example, ask for the
same data to be entered twice.
Validation
Validation checks are carried out by software to make sure that data which has been
entered is allowable and sensible.
There are many different types of validation check that software can make on data.
COMPUTER CRIME
Businesses rely on data stored on computer systems. Lost or damaged data is usually due to
human error. Sometimes data is deliberately damaged or stolen. Businesses must protect their
data and ensure they can get it back if anything does happen.
Criminal misuse of data
It is often easy to misuse data stored on a computer because:
Data can be instantly transferred to other locations using e-mail and the Internet;
Programs can be designed to deliberately cause damage to computer systems. Viruses and
logic bombs are examples of such programs
Hackers
MSH@2016
People who use their knowledge of computers to break into computer systems.
Viruses
A program that can make copies of itself in order to infect other computers.
Viruses can spread from one computer to another via infected disks, downloaded files and
e-mail.
This software can be set up to scan files when they are opened, downloaded from the
Internet or copied.
Logic bombs
A set of instructions written in computer code that can be hidden inside other software
and set to activate at a particular date and time.
Software piracy
MSH@2016
Backup copies
Backups should always be kept in a secure, airtight and heatproof container at a remote
location.
Some password systems are hierarchical (i.e. different passwords give different levels of
access).
Log files
Used to help track down people who have stolen or damaged computer data.
Encryption
Data is coded in such a way that it cant be read unless special decoding or decryption
software is used
Malware
is
short
for
malicious
software.
Malware is the name given to any software that could harm a computer system, interfere with a
user's data, or make the computer perform actions without the owner's knowledge or
permission.
MSH@2016
The rules that data controllers (people who store and process personal data) must follow;
The rights of data subjects (the individuals that the data is about);
MSH@2016
kept secure ;
The right to see certain health and social work details may also be limited
withdraw cash;
Banks can keep their operating costs down because fewer employees are needed to work
behind the counter inside branches;
MSH@2016
Theres no need to carry large amounts of cash around as the large number of ATMs
means that it is readily available.
Monitoring Of Patients
When a patient is in hospital, they often require close monitoring. It is not possible for a doctor
or nurse to monitor patients continuously, 24 hours a day, so computerised monitors are used
instead.
Sensors are attached to the patient. Senors are used to monitor:
Temperature
Blood pressure
The sensors feed information back to a computer which processes the data:
Data is checked for any problems (e.g. pulse rate too low/high)
Several outputs from the computer system let hospital staff the patient's condition:
A loud buzzer / alarm can be sounded if there is a problem to attract the attention of a
nurse/doctor
MSH@2016
Medical staff inputs patient's symptoms (or answers questions about them)
The expert system's search engine searches the knowledge base (a collection of medical
knowledge) to find possible diagnoses
The system outputs a list of possible diagnoses, and treatments
Rather than use lots of different systems to manage this information, many schools use a School
Management System (sometimes called a School Information System, or SIS). This is a
system that manages all of a school's data in a single, integrated application.
Stock Control Systems
What is Stock Control?
Every business needs to keep track of the items that it manufactures or sells (the stock). The
system that monitors the items in stock is called the stock control system.
MSH@2016
Too dangerous to test with. Too large a time scale is required. It involves wastage of
materials. Takes much longer to build the real thing.
Simulation can also be used in Virtual Reality; which is the creation of simulated multidimensional representation of real things, e.g. armies fighting against each other, in chemical
plants. Virtual reality needs devices like goggles (headsets), gloves, special suits fitted in sensors,
motors that provide movement, etc. Virtual reality ensures safety other than using real objects,
can perform real tasks without risks, can be used in dangerous areas, and can store data and
results on the computer.
Simulation can be applied to games like chess, where the opponent s moves can be
analysed.
MSH@2016
A description of the existing system outlining what is being done and how it is being
done;
A set of problem statements describing exactly what the problems are with the existing
system;
A set of system objectives which describe what the new system must be able to do;
A description of the technical, economic, legal and social factors that have been
considered;
MSH@2016
Analysis
During the analysis stage systems analysts investigate the existing system to identify exactly
what the problems are with the existing system
Systems analysts will use a variety of fact-finding methods to gather information for example
Questionnaires
Interviews
Observation
Examining documents
Design
Input
Output
Data storage
User interface
Security procedures
Implementation
This stage involves:
Setting up the system so that it matches the design specification
MSH@2016
Normal test data is used to check that a system can handle the sort of data that would be
expected during day-to-day use
Extreme test data is used to check that a system can cope with data that lies on the
boundaries of what is acceptable
Erroneous (or exceptional) test data is used to check that a system can identify data that is
wrong and reject it
Producing documentation
Technical documentation
systems flowcharts;
a description of the various parts of the system and what each one does;
User documentation
MSH@2016
Where to get more help, such as telephone support lines and on-line tutorials.
Post-implementation review
Carried out after the new system has been running for a few weeks or months to identify any
modifications that may need to be made.
Maintenance
A new information system may need to be changed due to:
PROGRAMMING LANGUAGES
Algorithms
A set of instructions describing the steps followed in performing a specific task, for example,
calculating change. Algorithms can be illustrated using the following:
- Descriptions, Flowcharts, Pseudocodes, Structure diagrams
Pseudocodes: These are English-like statements, closer to programming language that indicate
steps followed in performing a specific task.
Top-Down Program Design
Refers to the splitting of a program into simpler subtasks called modules which will be easier to
solve. For example, a program can be split into modules to Accept Number, Add, Divide,
Subtract and to Display Results. Modules are also called procedures, routines, sub-routines or
functions. The splitting of a problem into a series of self-contained modules is called
modularisation (modular programming).
Advantages of modularisation (modular programming)
- Programmer can concentrate at one task at a time. Modules are simpler and easier to understand
and to solve. Modules are easier to test and to debug. Program modification is easier since
changes are isolated with specific modules. More experienced programmers can be assigned
complex modules. It saves programming time by sharing tasks. A large project will be easier to
monitor. It is easier to update (modify) modules
MSH@2016
Stress;
Eyestrain;
Wrist injuries;
Many people are afraid of computers and fear that they will be left behind or made
redundant if they are unable to learn new ICT skills quickly enough and keep up with the
younger more computer-literate generation;
MSH@2016
ICT systems make information instantly available wherever you are. Mobile phones,
pagers, portable computers and the Internet make it possible to work anywhere. This
means that some people find it virtually impossible to forget about work and relax.
The amount of information that ICT systems can produce is often far too much for
anyone to take in. This results in information overload, which causes workers to
become stressed by the feeling that they cant cope with the information that they are
receiving.
Workers can be monitored using ICT systems the feeling of being constantly
watched caused by this can be very stressful.
MSH@2016
Inspect workstations to make sure that they meet the required standards for health and
safety;
Provide regular eye tests for workstation users and pay for prescription glasses
Use workstations and equipment correctly in accordance with the training provided by
their employer;
Inform their employer of any problems relating to Health and Safety as soon as they arise
and co-operate with the correction of these problems.
Workspace design
When purchasing new equipment or designing a working ICT environment, employers must
consider:
Furniture Height-adjustable swivel chairs with backrests and desks large enough to hold
the computer and paperwork;
Hardware Screens must not flicker and should swivel and tilt. Keyboards must be
separate, moveable and fitted with wrist supports;
The working environment work space should be well ventilated and maintained at a
comfortable temperature
MSH@2016