Escolar Documentos
Profissional Documentos
Cultura Documentos
Form 5
Syllabus 2013
Form 5 Computer Studies Notes
TABLE OF CONTENTS
2.4.1 Higher Level Languages, Translators, Source and Executable Code .........6
2.3.14 Typical machine code instructions - load, store and process (e.g. Add,
sub etc.) instructions. ......................................................................................................................16
Moving of Data.................................................................................................................................17
Computing ..........................................................................................................................................18
Affecting the Program Flow .....................................................................................................19
Mr.A.Gatt Page 2 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 3 of 88
Form 5 Computer Studies Notes
5.3.2 Backups (the generations of files: grandfather, father, son files), .........62
Mr.A.Gatt Page 4 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 5 of 88
Form 5 Computer Studies Notes
0 0 0 1 0 0 0 0 1 0 0 0
In this case the first four bits of the statement are op-codes (which
determine the function that must be worked out), and the second part
the operand reflects the data which is passed on to the function; or
in certain cases an operand might be replaced by a memory location
(address).
Mr.A.Gatt Page 6 of 88
Form 5 Computer Studies Notes
The task is to add two numbers (6 and 9) and display their total.
Assembly
Pascal
Language
MOV AX, #6
MOV BX, #9
ADD AX, BX
PUSH AX WRITE(6+9);
CALL WRITE
Mr.A.Gatt Page 7 of 88
Form 5 Computer Studies Notes
Source Translator
Code Executable
However, there is the need for more than one type of translator:
Assembler: This is used to convert assembly language into
machine code.
Compiler & Interpreter: These are both used to convert higher
generation languages into machine code.
Assembler
Mr.A.Gatt Page 9 of 88
Form 5 Computer Studies Notes
Compiler
After the program is thoroughly checked, all libraries used (such as the
CRT library in Pascal) are linked, and the program is converted into
machine code, which in turn is passed on to the control unit so that
the program is executed.
Mr.A.Gatt Page 10 of 88
Form 5 Computer Studies Notes
Interpreter
Mr.A.Gatt Page 11 of 88
Form 5 Computer Studies Notes
PASCAL
Function AddNums(n1 : integer, n2: integer):integer;
Begin
AddNums:=n1+n2;
End;
C++
int AddNums (int n1, int n2)
{
return n1+n2;
}
As you can see from the above code statements, in order to carry out
the same thing, different structures are used for different languages. A
computer does not understand any of these languages unless it uses a
translator (interpreter or compiler). So, all these English-like
statements must be converted into machine code (1s and 0s) so that it
can be understood by the computer. Once these have been compiled,
these applications can run without the need for these translators, so in
turn we have the executable file, which under the Windows operating
system has an EXE extension.
Mr.A.Gatt Page 12 of 88
Form 5 Computer Studies Notes
If one tries to open the EXE files using the same programming
languages editor, one will find that the program is not the same (and
it is unreadable). This happens because after the source code has been
compiled into an executable, the executable file is in the computers
language (machine code).
4.6.4 4GL
Mr.A.Gatt Page 13 of 88
Form 5 Computer Studies Notes
1
Source: http://www.answers.com/topic/fourth-generation-programming-language
Mr.A.Gatt Page 14 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 15 of 88
Form 5 Computer Studies Notes
2
Instructions in assembly language are generally very simple, unlike in
a high-level language. Any instruction that references memory (either
for to store or retrieve data, or as a jump target) will also have an
addressing mode to determine how to calculate the required memory
address. More complex operations are then built on the concept of
these simple operations.
2
Source: http://en.wikipedia.org/wiki/Assembly_language#Machine_instructions
Mr.A.Gatt Page 16 of 88
Form 5 Computer Studies Notes
Moving of Data
Set a register (a
temporary STO 10
This will store a result (found in
location in the CPU itself) to a
the accumulator) to a memory
fixed constant value.
location, which in this case is 10.
Move data from a
memory mov ah, 09
location to a register, or vice This will move the constant
versa. This is done to obtain the number 9 to the register ah.
data to perform a computation on
it later, or to store the result of a
computation.
Read and write data from INP ah, 145
Receives input from the input
hardware devices
device with the code 145 and
stores it into register ah.
Mr.A.Gatt Page 17 of 88
Form 5 Computer Studies Notes
Computing
Mr.A.Gatt Page 18 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 19 of 88
Form 5 Computer Studies Notes
Op.code
(binary) Mnemonic Function
LoaD Accumulator with contents of specified
0000 LDA address.
0001 STA STore Accumulator contents in specified address.
ADD contents of the specified address to the
0010 ADD accumulator.
SUBtract contents of specified address from the
0010 SUB accumulator.
0110 JPU JumP Unconditionally to the specified address
Jumps to the specified address if Accumulator is
0111 JAZ Zero.
1001 JAL Jumps to specified address if Accumulator < zero.
Jumps to the specified address if the Accumulator
1010 JAG > zero.
1111 HLT Stop the program
Mr.A.Gatt Page 20 of 88
Form 5 Computer Studies Notes
In Assembly language, there are two ways in which the computer can
find locations from memory; these are Absolute Addressing and
Relative Addressing.
9
10 11 12 13
LDA 10
Mr.A.Gatt Page 21 of 88
Form 5 Computer Studies Notes
Bx
Bx+ Bx+ Bx+ Bx+
1 2 3 4
Mr.A.Gatt Page 22 of 88
Form 5 Computer Studies Notes
NUM1
LDA NUM1
The program counter (PC) found in the CPU always points to the next
instruction which must be fetched. By changing the program counter,
instructions can be executed in a different order rather than in a
sequential manner.
3
In order to jump instructions, labels must be used; labels are
essential for branching. Labels can be created by simply specifying a
label name and adding a colon at the end of the label. For example:
3
Adapted from: http://www.geocities.com/SiliconValley/Park/3230/x86asm/asml1006.html
Mr.A.Gatt Page 23 of 88
Form 5 Computer Studies Notes
Unconditional Jump
mov ax, 5
When the JMP command is
encountered, the flow of the jmp lab1
program will resume from the
specified label; in this case lab1. add ax, 4
lda 10
lab1: sub ax, 3
Conditional Branching
Mr.A.Gatt Page 24 of 88
Form 5 Computer Studies Notes
Assembly PASCAL
cmp ax, bx if ax > bx then
jg isgreater begin
: ; block 1 (else part) {block 2}
jmp after end else
isgreater: begin
: ; block 2 (then part) {block 1}
after: end
: ; after if {after if}
Instruction Meaning
jg Jump if greater
jge Jump if greater or equal
jl Jump if less
jle Jump if less or equal
je Jump if equal
jne Jump if not equal
jc Jump if carry flag is set
Mr.A.Gatt Page 25 of 88
Form 5 Computer Studies Notes
A A
Print i Print i Print i
y
Print Goto A
i<
Done 10
n
Print
Done
Print
Done
Mr.A.Gatt Page 26 of 88
Form 5 Computer Studies Notes
Process
Management
GUI
Memory
(Graphical
Management
User Interface)
Operating
System
Disk
Device Management
Drivers (File Systems)
Security Networking
Mr.A.Gatt Page 27 of 88
Form 5 Computer Studies Notes
Multitasking allows the CPU to run more than one process at the same
time by giving each process attention for a very brief period of time
(timeshare), before moving on to the next process. However, if there
are many concurrent processes problems may arise because since the
CPU has to cater for many processes, some processes might not get
the attention they require, and the application will not work correctly.
So, process management involves the computation and distribution of
"timeshares".
Memory Management
The computer has different type of memories which it can use, and
these are arranged in a hierarchical manner, starting from the fastest
being the memory registers, cache, RAM and ending in disk storage.
Mr.A.Gatt Page 28 of 88
Form 5 Computer Studies Notes
For most of the above file systems there are two ways it can be
allocated. Each system can be journaled or non-journaled. Journaled is
the safer alternative under the circumstances of a system recovery, if
a system comes to an abrupt stop (a system crash), the non-journaled
system will need to undergo an examination from the system check
utilities where as the journaled file systems recovery is automatic.
Microsoft's NTFS is journaled along with most Linux file systems,
except ext2, but including ext3, ReiserFS.
Networking
4
Adapted from http://en.wikipedia.org/wiki/Operating_system#Disk_and_file_systems
Mr.A.Gatt Page 29 of 88
Form 5 Computer Studies Notes
Most of the operating systems nowadays are capable of using the now
universal TCP/IP (Transmission Control Protocol/Internet Protocol)
protocol. This allows computers to communicate with each other and
be able to share resources such as files and hardware devices.5
Security
Level access limits the things a particular user can perform on the
operating system; these levels are usually implemented by the system
administrator and are called system policies.
5
Adapted from http://en.wikipedia.org/wiki/Operating_systems#Networking
Mr.A.Gatt Page 30 of 88
Form 5 Computer Studies Notes
Each operating system uses different GUIs, for example Windows uses
a different GUI than MacOS or Linux.
Mr.A.Gatt Page 31 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 32 of 88
Form 5 Computer Studies Notes
Device Drivers
6
Adapted from http://en.wikipedia.org/wiki/Operating_systems#Device_drivers
Mr.A.Gatt Page 33 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 34 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 35 of 88
Form 5 Computer Studies Notes
3.5.2 Batch OS
Mr.A.Gatt Page 36 of 88
Form 5 Computer Studies Notes
@ECHO OFF
ECHO.
IF "%1" == "" XCOPY B:\*.*
IF NOT "%1" == "" XCOPY B:\%1
ECHO.
C:\BATCH\DR
Mr.A.Gatt Page 37 of 88
Form 5 Computer Studies Notes
This concept is applied both to multi-user (when more than one user
uses the same computer) or single-user (when only one user uses the
computer).
Multi-user: In this case, since more than one user will be using
the same CPU, the CPU will allot a time-slice to each user.
Hence, it will go around all the users, one after each other
servicing their computing needs before going on to the next
user. Usually the time-slice is very small and it is measured in
milliseconds. If there are many users, each having a fair amount
of work being carried out, the CPU response time might be
degraded due to the high load of work.
Single-user: When a CPU is being used by a single user, the
idle time of the CPU is used to run multiple applications at the
same time. So, each application is assigned a time-slice, and the
CPU will go round the applications executing their requirements
in their alloted time-slice. Also, in this case if there are many
applications running, each with its requirements, the response
time for each application will degrade, resulting in overall
sluggishness.
Mr.A.Gatt Page 38 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 39 of 88
Form 5 Computer Studies Notes
Single-User: This allows one user at a time to use the computer. This
means that the computer will be exclusively used by one user at a
given point in time; therefore no other user can use the computer at
that time. Once the first user is finished with the computer, another
user can then use it.
Multi-User: This setup allows more than one user to use a computer
at a time. Usually, a mainframe (or minicomputer) is used for this
setup, and various input (and output) devices are connected to the
mainframe so that more than one user can use the system. Each user
would then have his/her own terminal along with his/her directories.
Usually, a password is required to access ones account.
Mr.A.Gatt Page 40 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 41 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 42 of 88
Form 5 Computer Studies Notes
7
Source: A Glossary of Computer Terms 10th Edition Pg59
Mr.A.Gatt Page 43 of 88
Form 5 Computer Studies Notes
One must also keep in mind that there are various forms of Input and
Output devices, not just the general ones such as keyboards, mice,
monitors, printers, etc Some input/output devices are in the form
that suits the machine they were created for.
Mr.A.Gatt Page 44 of 88
Form 5 Computer Studies Notes
Sensors
Buttons
Mr.A.Gatt Page 45 of 88
Form 5 Computer Studies Notes
LCD
LED
Mr.A.Gatt Page 46 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 47 of 88
Form 5 Computer Studies Notes
3.4 Networks
8
Source: A Glossary of Computing Terms 10th Edition Pg67
Mr.A.Gatt Page 48 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 49 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 50 of 88
Form 5 Computer Studies Notes
The main task of the modem is to convert sound signals into electronic
signals. The telephone-lines used by modems, use analogue
technology which is not compatible with computers. The modem is
therefore used to convert those analogue signals into digital signals.
When information is being sent, the digital data sent by the computer
is delivered to the modem, which converts it to analogue data which in
turn is transferred to the telephone line. When information is being
received by the PC, information from the telephone line is converted
from analogue to digital by the modem, which in turn delivers it to the
computer.
9
PSTN: Public Switched Telephone Network the network used for normal telephony
10
ADSL: Asymmetric Digital Subscriber Line based on PSTN but uses different technologies which
allow two-way communication
Mr.A.Gatt Page 51 of 88
Form 5 Computer Studies Notes
1010101 1010101
1110101 1110101
0000. 0000.
Data is converted
The modem converts it into back into digital
analogue, since the telephone format.
line is analogue.
Mr.A.Gatt Page 52 of 88
Form 5 Computer Studies Notes
An e-mail message is basically a short text file, although from its early
days it has evolved, and so users can attach files, and even include
HTML in their messages.
james@hotmail.com
Mr.A.Gatt Page 53 of 88
Form 5 Computer Studies Notes
anne@yahoo.com john@hotmail.com
Mr.A.Gatt Page 54 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 55 of 88
Form 5 Computer Studies Notes
Web pages are permanently available to any user of the Internet. Each
organisation (and many individuals) providing information, organise
their information as a web-site, often consisting of many pages. Web
sites are an effective way of distributing information such as
advertisements, technical information, comments and ideas.
Any web page can be accessed directly if its full address is knows, but
to make locating information easier each web site has a home page
(welcome page) which provides a starting point for a user to search
the site. Any web site can provide links to other related web sites.
Since browsers and search engines can quickly find pages of interest,
users are provided with the tools to surf the Internet. Surfing means
to search for useful information, following whatever routes may seem
interesting.
11
Source: A Glossary of Computing Terms 10th Edition Pg42
Mr.A.Gatt Page 56 of 88
Form 5 Computer Studies Notes
Video Conferencing
Mr.A.Gatt Page 57 of 88
Form 5 Computer Studies Notes
12
Source: A Glossary of Computing Terms 10th Edition Pg72
13
Source: A Glossary of Computing Terms 10th Edition Pg73
Mr.A.Gatt Page 58 of 88
Form 5 Computer Studies Notes
Network Topology
This refers to the layout of the network; i.e. how the computers are
connected to the network. This usually depends on the need of the
network and is heavily determined by the building that will host the
network. The following will illustrate the main types of setups.
Bus Network
Each computer has the network cable going into its network interface and
another cable going out from the network interface to another computer.
COMPUTER COMPUTER
Mr.A.Gatt Page 59 of 88
Form 5 Computer Studies Notes
Ring Network
COMPUTER COMPUTER
COMPUTER COMPUTER
COMPUTER COMPUTER
Each computer has the network cable going into its network interface and
another cable going out from the network interface to another computer.
COMPUTER
COMPUTER
COMPUTER COMPUTER
COMPUTER
COMPUTER
Mr.A.Gatt Page 60 of 88
Form 5 Computer Studies Notes
Star Network
COMPUTER COMPUTER
COMPUTER
SERVER
COMPUTER
(HUB)
COMPUTER
COMPUTER
COMPUTER
COMPUTER
Mr.A.Gatt Page 61 of 88
Form 5 Computer Studies Notes
Data integrity describes the correctness of data both during and after
processing. Data may be changed by the processing but will still have
integrity. Safeguards are needed to make sure that the data has
integrity by detecting any accidental or malicious change to the data.
Data security involves the user of various methods to make sure that
data is correct, is kept confidential and is safe. Data security includes
ensuring the integrity and the privacy of data, as well as preventing
the loss or destruction of data.14
A master file is used to store the data found on the database. Usually
it stores data which is mostly static and does not change frequently.
However, data can be changed or added as necessary through
updating during processing.
The transaction file is used to keep track of all the changes made to
the database throughout the day. These changes are not immediately
entered into the master file; instead they are stored in the transaction
14
Source: A Glossary of Computing Terms 10th Edition Pg111
Mr.A.Gatt Page 62 of 88
Form 5 Computer Studies Notes
file. At the end of the day, all the contents stored in the transaction file
are transferred (merged) to the master file to obtain a new and
updated master file.
Update
Update
As you can see from the above diagram, in the Grandfather section we
started with a master file and a transaction file which when combined
together created a new Master File (Father). This in turn was combined
with another Transaction File to obtain the last Master File (Son).
Mr.A.Gatt Page 63 of 88
Form 5 Computer Studies Notes
combining the father Master File with the respective Transaction File to
obtain the son file once again.
Physical Security
Mr.A.Gatt Page 64 of 88
Form 5 Computer Studies Notes
Software Security
There are many software measures which can protect data. The
following highlights some of the most common approaches.
IDS monitors the operation of the network to detect and warn when
illegal operations are being carried out. The system may be server-
based, detecting attacks on the operation of the file-server, or they
may be a network based, watching the pattern of traffic across the
network.
Mr.A.Gatt Page 65 of 88
Form 5 Computer Studies Notes
Biometric
Encryption
Mr.A.Gatt Page 66 of 88
Form 5 Computer Studies Notes
Digital Signature
This is the special encryption of data, used to indicate that the data is
genuine. If the recipient of the data can correctly decipher the digital
signature then the data should be correct (and forged data is unlikely
to have been substituted).
Digital Certificate
Mr.A.Gatt Page 67 of 88
Form 5 Computer Studies Notes
15
Source: A Glossary of Computing Terms 10th Edition Pg113-117
Mr.A.Gatt Page 68 of 88
Form 5 Computer Studies Notes
Copyright
Mr.A.Gatt Page 69 of 88
Form 5 Computer Studies Notes
Ethical Issues
When you purchase software, you do not become the owner of the
copyright. Rather, you are purchasing the right to use the software
under certain restrictions imposed by the copyright owner, typically
the software publisher. The precise rules are described in the
documentation accompanying the software -- the license. Most often,
they state that you have the right to load the software onto a single
16
Source: http://www.whatiscopyright.org/
17
Source: A Glossary of Computing Terms 10th Edition Pg120
Mr.A.Gatt Page 70 of 88
Form 5 Computer Studies Notes
computer and make one backup copy. If you copy, distribute or install
the software in ways that the license prohibits, whether you are
swapping disks with friends and co-workers or participating in
widespread duplication, you are violating federal copyright law.
18
Source: www.bsa.org
Mr.A.Gatt Page 71 of 88
Form 5 Computer Studies Notes
Legal Issues
If the copyright owner brings a civil action against you, the owner can
seek to stop you from using its software immediately and can also
request monetary damages. The copyright owner may then choose
between actual damages, which include the amount it has lost because
of your infringement as well as any profits attributable to the
infringement, and statutory damages, which can be as much as
$150,000 for each program copied.
19
Source: www.bsa.org
Mr.A.Gatt Page 72 of 88
Form 5 Computer Studies Notes
Mr.A.Gatt Page 73 of 88
Form 5 Computer Studies Notes
Most software can be registered with the company that supplies the
software. The user fills in some personal details such as name, address
and e-mail. This will allow the company to serve better its customers:
Updates: The software company can inform its registered
members with news about the product. This may include news
about new program releases, new updates or new patches to the
program. Sometimes, when a surface address is supplied,
updates and patches are sent by post on a CD.
Bonus Features: Certain companies create bonus features to
the program (also called extensions, add-ons or expansion
packs) which might be free to registered users.
Discounts: Registered members usually benefit from discounts
on applications released by the same company.
Technical Support: Some companies offer technical support
(such as forums or live chatting) about their program only to
registered members.
Access rights control whether or not a particular user can use or edit a
program or a data file. Each user is assigned rights which determine
the files that can be accessed. A user may be allowed complete access
to a file (including altering the data), may be restricted only to read
the data (or part of the data) or have no access at all. Technical
personnel may have more substantial rights. Access rights can also
restrict the use of a file to a particular workstation or user.
Mr.A.Gatt Page 74 of 88
Form 5 Computer Studies Notes
20
Source: A Glossary of Computing Terms 10th Edition Pg116
Mr.A.Gatt Page 75 of 88
Form 5 Computer Studies Notes
Negative
Jobs are decreased, since computers are replacing humans in
such cases as ATM (automatic teller machine), telephone
operators, meter readers, film processors.
Positive
New jobs are created in the computing industry such as the
hardware industry, software industry and web-design industry.
Computers increase productivity and overall quality leading to
cheaper and better products.
Mr.A.Gatt Page 76 of 88
Form 5 Computer Studies Notes
Negative
Possible less face-to-face communication.
Very fast technology advances might lead to job disruption in
order to adopt (or adapt) to new technologies.
Employees might feel that constant monitoring can affect their
privacy and dignity.
Constant use of computers can lead to RSI (repetitive strain
injury) if the proper precautions are not adopted.
Positive
Employee has more information available which allows the
employee more decision-making freedom.
Various tools available on the computer can enhance the work
experience and reduce the overall work-load.
Negative
Reduced human contact, since people prefer chatting rather than
socialising.
Community groups attendance decreases, once again due to
lack of involvement.
Erodes family life and community values.
Positive
Facilitated communication with relatives, friends and other close
persons.
Mr.A.Gatt Page 77 of 88
Form 5 Computer Studies Notes
Routine tasks can be done quickly, hence leaving more free time
to spend with close relatives.
Negative
Addiction to the Internet.
Addiction to games; especially in youngsters which deter a
healthy lifestyle since they do not participate in outdoor games
Less socializing.
Being lazier; since Internet can be used as a source for ready-
made material.
Positive
More work can be done in less time with the adequate tools on
the PC.
Facilitates access to services by using websites for buying
products or paying bills.
More information at the users fingertips with interactive
encyclopaedias and the constantly updated Internet.
Mr.A.Gatt Page 78 of 88
Form 5 Computer Studies Notes
5.4 Multimedia
Interactive Video
Mr.A.Gatt Page 79 of 88
Form 5 Computer Studies Notes
Browse
Video Clip
This is the use of electronic methods to reduce the amount of data that
has to be included when video data, either for still or moving pictures,
is stored or transmitted. For moving pictures (video), the principles
involve identifying those parts of the picture which change from one
scan to the next, and sending data only about changes, which is
known as delta compression. This alone will save a significant amount
of transmission and storage capacity. The Joint Photographic Expert
Group (JPEG) had defined standards for still picture compression, and
this format for storage or transmission is called JPEG. These standards
Mr.A.Gatt Page 80 of 88
Form 5 Computer Studies Notes
21
Source: A Glossary of Computing Terms 10th Edition Pg85,86
Mr.A.Gatt Page 81 of 88
Form 5 Computer Studies Notes
22
Source: A Glossary of Computing Terms 10th Edition Pg86
Mr.A.Gatt Page 82 of 88
Form 5 Computer Studies Notes
The above items illustrate the basic requirements which must be used
for a multimedia experience. However, the better the quality and
intensity of multimedia such as immersive virtual reality, the better
the machine must be. For instance in VR, a video-card must be very
powerful in its 3D image processing since almost everything is shown
in 3D. In case of sound, if sound is to be delivered using Dolby
SurroundTM sound, a Dolby-capable sound card and speakers are
required. The type of multimedia dictates the hardware requirements,
and the better the hardware the steeper the costs will be.
Mr.A.Gatt Page 83 of 88
Form 5 Computer Studies Notes
The I.S. manager has the overall responsibility of the I.T. department
and sees that everything goes well and to plan. The I.S. manager
needs to monitor and encourage communication between different
roles to ensure project consistency. Some of the roles are:
Engage or disengage employees
Ensure that the department is satisfying the customers needs
Create new opportunities for the company which can result in
company profits; such as taking on new projects.
The system analyst plays a vital role in the system analysis lifecycle.
The main task of a system analyst is to determine the input and
output requirements of a new project, and conduct feasibility studies,
to determine whether a project should be done or not.
23
Adapted from: A Complete Computer Course by Ivan Buttigieg Pg344-348
Mr.A.Gatt Page 84 of 88
Form 5 Computer Studies Notes
In the case that the feasibility studies show that the project is not
feasible, the system analyst must propose whether to abandon it, or to
modify some of its aspects to make it feasible. If the project is
feasible, the main roles of the system analyst are:
Write down project details, including documentation manuals,
etc
Prepare test data in collaboration with the database
administrator
Provide instructions manuals (user and technical)
Supervising and maintaining the new system.
The role of the systems administrator is to ensure that all the software
required by the EDP is available and fully functional. This role is very
powerful because the systems administrator has got the rights to view
and/or modify all the files in the organisation. The main roles are:
Setting up the design of the database used by the organisation
Continuously maintaining the design of the database to reflect
changes and suit needs
Have extensive knowledge of the business rules
Testing database data integrity
Maintaining access rights of employees
Making sure to perform regular backups
Catalogue and index save files for future needs.
Mr.A.Gatt Page 85 of 88
Form 5 Computer Studies Notes
3.2.4 Programmer
Once the project has been given to go-ahead by the systems analyst,
the work is passed on to the programmers. But before handing the
programming task to the programmers, the system analyst splits the
project into various modules. The programmers will then start the
planning, writing and testing of these modules so that they meet the
systems designers requirements.
Programmers can be classified under two groups:
Senior programmers. There roles are to:
o Develop detailed plans (such as flowcharts) to be followed
by programming staff
o Schedule and co-ordinate junior programmers work
o Set up the technical and the user help.
Junior programmers. There roles are to:
o Write the program
o Test the program by using supplied test data
o Correct any mistakes
o Prepare inline documentation (comments).
The main role of the I.T. trainer is to guide computer users in the use
of organisations software products. The trainer:
Lectures new employees on how to use the current EDP system
(logging, downloading or uploading, accessing files)
Teaches non-I.T. oriented people how to operate the hardware
and software applications
Co-ordinates training courses.
Mr.A.Gatt Page 86 of 88
Form 5 Computer Studies Notes
3.2.6 Operator
The web master creates and maintains a web page and all the web site
links for the organisation. Usually the website will contain the products
/ improvements of the company, company vision and mission, support
information.
Mr.A.Gatt Page 87 of 88
Form 5 Computer Studies Notes
The role of the lab technician is to ensure that all computers (the
hardware) are in correct working order. This person needs to:
Replace or repair faulty equipment
Install new hardware
Maintain older hardware in working condition.
The End
Good Luck!
Mr.A.Gatt Page 88 of 88