Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
21 views69 pages

Second Semester Note

1) The document discusses various common data types including character, string, integer, floating point, boolean, enumerated type, array, date, time, datetime, and timestamp. 2) It provides definitions and examples for each data type. For example, it states that a character data type is used to store a single letter, digit, or symbol, while a string stores a sequence of characters like text. 3) The document also discusses units of digital storage from bytes up to zettabytes, and how these units are used to measure the large and growing amounts of data stored on computers and in the cloud.

Uploaded by

papacywesley
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views69 pages

Second Semester Note

1) The document discusses various common data types including character, string, integer, floating point, boolean, enumerated type, array, date, time, datetime, and timestamp. 2) It provides definitions and examples for each data type. For example, it states that a character data type is used to store a single letter, digit, or symbol, while a string stores a sequence of characters like text. 3) The document also discusses units of digital storage from bytes up to zettabytes, and how these units are used to measure the large and growing amounts of data stored on computers and in the cloud.

Uploaded by

papacywesley
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 69

Elective ICT Notes Compiled by Yaw Preko AMASTECH

DATA REPRESENTATION
What is a data type?
A data type has several definitions. Let me give you a few of them:
A data type is an attribute of a piece of data that tells a device how the end-user
might interact with the data.
A data type is a type of value a variable has and what type of mathematical, relational
or logical operations can be applied without causing an error.
A data type is an attribute associated with a piece of data that tells a computer
system how to interpret its value.
A data type is a classification of data which tells the compiler or interpreter how the
programmer intends to use the data.
You can also think of data types as categorizations that different coding programs
might combine in order to execute certain functions.
Our interactions (inputs and outputs) with computer programs are treated in many
languages as a stream of bytes. These bytes represent data that can be interpreted as
representing values that we understand. Additionally, within a program, we process this
data in various ways such as adding them up or sorting them. This data comes in different
forms. Examples include:
 single letter, symbols, etc. – a character
• your name – a string of characters
• your age – usually an integer
• the amount of money in your pocket – usually a value measured in cedis or pesewas
(something with a fractional part)
Understanding data types will help you ensure that the data you collect is always in the
right format and the value is as expected.

Common Data Types


Data type Definition Examples
Character (char) Single letter, digit, a, 1, !, $
punctuation mark, symbol,
or blank space

1
Elective ICT Notes Compiled by Yaw Preko AMASTECH

String (str or text) Sequence of characters, hello, Emmanuel, +233-


digits, or symbols—always 548-331-613
treated as text
Integer (int) Numeric data type for -707, 0, 707
numbers without fractions
Floating Point (float) Numeric data type for 707.07, 0.7, 55.8, 62.17
numbers with fractions
Boolean (bool) True or false values 0 (false), 1 (true)
Enumerated type (enum) Small set of predefined rock (0), jazz (1)
unique values (elements or
enumerators) that can be
text-based or numerical
Array List with a number of rock (0), jazz (1), blues (2),
elements in a specific pop (3)
order—typically of the
same type
Date Date in the YYYY-MM-DD 2021-09-28
format (ISO 8601 syntax)
Time Time in the hh:mm:ss 12:00:59
format for the time of day,
time since an event, or time
interval between events
Datetime Date and time together in 2021-09-28 12:00:59
the YYYY-MM-DD hh:mm:ss
format
Timestamp Number of seconds that 1632855600
have elapsed since midnight
(00:00:00 UTC), 1st January
1970 (Unix time)

Let’s discuss them a bit:

Character (char)
It is used to store a single letter, digit, punctuation mark, symbol, or blank space.

String (str or text)


It is a sequence of characters and the most commonly used data type to store text.
Additionally, a string can also include digits and symbols, however, it is always treated as
text.
A phone number is usually stored as a string (+233-548-331-613) but can also be stored as
an integer (548331613).

2
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Integer (int)
It is the most common numeric data type used to store numbers without a fractional
component (-707, 0, 707).

Floating Point (float)


It is also a numeric data type used to store numbers that may have a fractional component
like monetary values do (707.07, 0.7, 707.00).
Please note that number is often used as a data type that includes both int and float types.

Boolean (bool)
It represents the values true and false. When working with the boolean data type, it is
helpful to keep in mind that sometimes a boolean value is also represented as 0 (for false)
and 1 (for true).

Enumerated type (enum)


It contains a small set of predefined unique values (also known as elements or
enumerators) that can be compared and assigned to a variable of enumerated data type.
The values of an enumerated type can be text-based or numerical. In fact, the boolean data
type is a pre-defined enumeration of the values true and false.
For example, if rock and jazz are the enumerators, an enumerated type variable genre can
be assigned either of the two values, but not both.
Assuming that you are asked to fill in your preferences on a music app and are asked to
choose either one of the two genres via a dropdown menu, the variable genre will store
either rock or jazz.
With enumerated type, values can be stored and retrieved as numeric indices (0, 1, 2) or
strings.

Array
Also known as a list, an array is a data type that stores a number of elements in a specific
order, typically all of the same type.
Since an array stores multiple elements or values, the structure of data stored by an array
is referred to as an array data structure.
Each element of an array can be retrieved using an integer index (0, 1, 2,…), and the total
number of elements in an array represents the length of an array.
For example, an array variable genre can store one or more of the elements rock, jazz, and
blues. The indices of the three values are 0 (rock), 1 (jazz), and 2 (blues), and the length of
the array is 3 (since it contains three elements).

3
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Continuing on the example of the music app, if you are asked to choose one or more of the
three genres and you happen to like all three (cheers to that), the variable genre will store
all three elements (rock, jazz, blues).

Date
Needs no explanation; typically stores a date in the YYYY-MM-DD format (ISO 8601
syntax).

Time
Stores a time in the hh:mm:ss format. Besides the time of the day, it can also be used to
store the time elapsed or the time interval between two events which could be more than
24 hours. For example, the time elapsed since an event took place could be 72+ hours
(72:00:59).

Datetime
Stores a value containing both date and time together in the YYYY-MM-DD hh:mm:ss
format.

Timestamp
Typically represented in Unix time, a timestamp represents the number of seconds that
have elapsed since midnight (00:00:00 UTC), 1st January 1970.
It is typically used by computer systems to log the precise date and time of an event, down
to the number of seconds, in a format that is unaffected by time zones. Therefore unlike
datetime, timestamp remains the same irrespective of your geographical location.

Conclusion
Different programming languages offer various other data types for a variety of purposes,
however, the most commonly used data types that you need to know to become data-led
have been covered.
A good way to think about data types is when you come across any form or survey.
Looking at a standard registration form, you should keep in mind that each field accepts
values of a particular data type.
A text field stores the input as a string while a number field typically accepts an integer.
Names and email addresses are always of the type string, while numbers can be stored as a
numerical type or as string since a string is a set of characters including digits.
In single option or multiple option fields, where one has to select from predefined options,
data types enumerated type and arrays come into play.

4
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Units of storage in computers: What are digital


units of measurement?
How much internal storage should a good smartphone have? How much RAM is
recommended? How many gigabytes does a terabyte hard drive contain and what are
kilobytes and megabytes anyway? We use feet to measure the world’s highest mountains,
and bytes to measure the ever-growing mountains of data. If you want to be able to
understand different storage capacities and the proportions of different groups of data,
you’ll need to be familiar with the units of storage in computers, starting with the smallest
one – the byte – and going all the way up to zetta-, yotta-, and brontobytes.

What are units of storage in computers?


Few people are aware that we now live in the era of the zettabyte. In 2016, the amount of
data generated annually reached the size of one zettabyte. It’s estimated that by the year
2025 there will exist 175 zettabytes of data worldwide. How does that translate? One
zettabyte contains one billion terabytes. Hard drives that are considered to have large
storage capacity have at least one terabyte of memory. One terabyte is enough space for
250 two-hour long HD movies. One zettabyte thus corresponds to 250,000,000,000 HD
films!
Since digital applications, smart technologies, and the Internet itself have become a fixed
part of our lives, data quantities have exploded. Businesses and private individuals produce
so much data that it can no longer be clearly expressed in bits and bytes. Every day, about
2.5 quintillion bytes are produced worldwide. Humanity’s digital footprint is thus
barely comprehensible. However, knowing the storage units for computers goes a long way
to helping one understand how big a set of data actually is.

What’s a bit?
The smallest unit of information is a bit. Even the largest mountains of data start there,
since a bit is the smallest possible distinction that a computer can make: 1 or 0. In
programming, this is called a “Boolean”. There’s nothing smaller than a bit – the state 1 or 0
for digital applications, and since computers communicate in binary, data sets are
calculated in ones and zeros.

Try imagining storage units in computers as containers. A bit is the smallest


container and holds just one piece of information. It is not yet a data set, as data sets
consist of many containers with many pieces of information.

The word “bit” is an abbreviation for “binary information digit” and was used for the first
time by American mathematician John W. Turkey in a Bells Lab memo. The term started

5
Elective ICT Notes Compiled by Yaw Preko AMASTECH

being more widely used after Claude E. Shannon used it in his 1948 treatise “A
Mathematical Theory of Communication”.

What is a byte?
The word “byte” (B) was coined in 1956 by IBM engineer Werner Buchholz to describe a
group of bits. Data quantities and thus also storage units in computers are always
given in bytes.

One byte consists of 8 bits and is abbreviated by a “B”. Since one bit can convey one of two
states (i.e., 1 or 0), a byte can convey 256 (28) different states. That’s because each of the
8 bits in a byte presents 8 chances for a bit to be set to 1:

10000000

01000000

00100000

00010000

00001000

00000100

00000010

00000001

What are various data quantities called?


Various prefixes come in handy for differentiating among quantities of data that are larger
than just a few bytes: for example, kilobyte, megabyte, and gigabyte. In establishing these
prefixes, the decimal system that humans commonly use and the binary system used by
computers come head to head. That’s why there are two systems for labelling data
quantities: binary prefixes and decimal prefixes.

Binary prefixes, also referred to as IEC prefixes, define data quantities in powers of two
(i.e., 2x). Decimal prefixes, also called SI prefixes, stand for powers of ten (i.e., 10x).

Binary prefixes (IEC prefixes) Decimal prefixes (SI prefixes)

Kibibyte (KiB) = 210 bytes Kilobyte (KB) = 103 bytes

6
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Binary prefixes (IEC prefixes) Decimal prefixes (SI prefixes)

Mebibyte (MiB) = 220 B Megabyte (MB) = 106 B

Gibibyte (GiB) = 230 B Gigabyte (GB) = 109 B

Tebibyte (TiB) = 240 B Terabyte (TB) = 1012 B

Pebibyte (PiB) = 250 B Petabyte (PB) = 1015 B

Exbibyte (EiB) = 260 B Exabyte (EB) = 1018 B

Zebibyte (ZiB) = 270 B Zettabyte (ZB) = 1021 B

Yobibyte (YiB) = 280 B Yottabyte (YB) = 1024 B

You might have already noticed that commercial indications of storage units (e.g. KB, GB, or
TB) are not always accurate. That’s because binary prefixes can more accurately represent
storage units in computers but aren’t the official unit for describing quantities of data. For
example, 1 kilobyte is supposedly 1,000 bytes in the decimal system. But 1 KB is 1,024
bytes. The International Electronic Commission (IEC), which is responsible for setting
standards for electronics, officially recommends using binary prefixes. However, aside from
Linux systems, binary prefixes have yet to gain widespread use.

How are data quantities calculated?


A computer needs 1 byte to store one character. This gives us the following:

1 byte = 1 character (e.g., A, Z, ?, 5, 0, #)

1 kilobyte corresponds to 1,024 bytes, or 1,024 different characters.

One page of text with 1,800 characters including spaces thus corresponds to about 1,800
bytes or 1-2 kilobytes. In programs like Word, formatting and graphics can quickly bring
that number up to 10-12 KB. But these are still very small units of storage for computers.

In contrast, a smartphone with a 12-megapixel camera takes photos that are 2-4.5 MG per
picture. Commercially available laptops have 8, 12 or 16 GB in RAM. And hard drives have
long been available in the terabyte range.

7
Elective ICT Notes Compiled by Yaw Preko AMASTECH

The following chart might help you understand the conversions between storage units:

Decimal (based on 10) Binary (based on 2)

Kilobyte = 1,000 B Kibibyte = 1,024 B

Megabyte = 1,000 KB Mebibyte = 1,024 KiB

Gigabyte = 1,000 MB Gibibyte = 1,024 MiB

Terabyte = 1,000 GB Tebibyte = 1,024 GiB

Petabyte = 1,000 TB Pebibyte = 1,024 TiB

Exabyte = 1,000 PB Exbibyte = 1,024 PiB

Zettabyte = 1,000 EB Zebibyte = 1,024 EiB

Yottabyte = 1,000 ZB Yobibyte = 1,024 ZiB

This next chart provides an overview of how many bytes each data quantity contains when using
decimal prefixes for binary units (as is standard practice):

Data quantity In bytes

Kilobyte 1,024

Megabyte 1,048,576

Gigabyte 1,073,741,824

Terabyte 1,099,511,627,776

Petabyte 1,125,899,906,842,624

8
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Data quantity In bytes

Exabyte 1,152,921,504,606,846,976

Zettabyte 1,180,591,620,717,411,303,424

Yottabyte 1,208,925,819,614,629,174,706,176

What comes after terabytes?


The standard unit for large storage volumes is currently terabytes. External hard drives
typically offer 1-5 terabytes of memory. Considering that 44 trillion gigabytes are produced
annually, that’s actually not very much.
Peta- and exabytes

The next biggest units of storage in computers are petabytes and exabytes, which are
mostly relevant in the everyday business of tech giants like Google and Apple. Google
reports that it has a data volume between 10 and 15 exabytes. That amounts to around 30
million computers put together.
Zetta- and yottabytes

Exabytes are followed by zettabytes, the unit used to describe the amount of data
generated annually. It’s estimated that humanity produced up to 59 zettabytes of data in
2020 alone. Zettabytes are followed by yottabytes, and this is where things begin to get a
bit theoretical. The yottabyte is the biggest storage capacity currently accepted by the
International System of Units. Yottabytes are mostly relevant in the context of the personal
data intelligence agencies have stored worldwide - very big data.

Bronto- and gegobytes


But of course, that’s not where it ends. Mass data like brontobytes and gegobytes are such
large, purely theoretical quantities of data that they’re not officially recognized by the
International System of Units. It’s predicted that in 2030, the amount of data generated
annually will reach 1 brontobyte for the first time. To put it in physical terms: Given the
size of today’s hard drives, a one-gegobyte hard drive would be 23,000,000 times larger
than the surface area of the earth.

Concrete examples of units of storage in computers

9
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Whereas storage units in terabytes are still comprehensible, dimensions like 175
zettabytes are abstract and near impossible to grasp. These simple, concrete examples
make it a bit clearer:

1 nibble = 4 bits

1 byte = 1 letter/character

1 kilobyte = 1 standard page (1,800 characters)

1 megabyte = approx. 1 book with 200 pages

2–5 megabyte = 1 HD movie

1 gigabyte = approx. 1,000–2,000 books

1 terabyte = approx. 250,000 MP3 songs

1 petabyte = approx. 223,000 HD movies or 745 million floppy disks

1 exabyte = approx. 12 billion DVDs or 16 trillion MP3 songs

1 zettabyte = all of the data generated worldwide in 2016

1 yottabyte = approx. 45 quintillion Blu-ray Discs with 25 GB each

According to scientists, the storage capacity of the human brain is estimated to be around
2.5 petabytes. That’s 1,024 external hard drives with 1 terabyte storage volume each. Why
we still can’t seem to remember our email passwords or friends’ birthdays remains a
mystery!

How characters are represented.


Characters are represented in computer storage using a system of encoding, most
commonly based on binary code. The most common encoding system used to represent
characters is the ASCII (American Standard Code for Information Interchange) code,
though there are other character encoding schemes like Unicode used for handling a
broader range of characters, including non-Latin scripts.
Here's how characters are represented in computer storage:
1. ASCII Code:
ASCII is a widely used character encoding system that represents characters using 7 or 8
bits. In ASCII, each character (letter, number, symbol) is assigned a unique numerical value.

10
Elective ICT Notes Compiled by Yaw Preko AMASTECH

For example, the capital letter "A" is represented by the ASCII code 65, and the lowercase
letter "a" is represented by the ASCII code 97.

2. Binary Representation:
In computer storage, these numerical ASCII values are stored as sequences of 0s and 1s,
which are the binary digits (bits).
The ASCII value 65 for "A" is represented as 01000001 in binary (using 8 bits).
The ASCII value 97 for "a" is represented as 01100001 in binary (using 8 bits).

3. Bit Patterns:
These sequences of 0s and 1s are known as bit patterns. Each character has its unique bit
pattern based on its corresponding ASCII code.
A group of 8 bits is often referred to as a "byte," and this is a common storage unit for
characters in computer memory.

4. Text Files:
When you create or save a text file on a computer, the characters within the file are stored
as their respective ASCII or Unicode values in binary format.

5. Character Sets:
Different languages and regions have their own character sets and encodings. ASCII is
suitable for the English language, but languages with non-Latin scripts (e.g., Chinese,
Arabic, Russian) require extended character sets like Unicode to represent their characters.

6. Unicode:
Unicode is a character encoding standard that can represent characters from nearly all
writing systems around the world. It uses a wider range of bits (usually 16 bits or 32 bits
per character) to represent a vast array of characters and symbols.

7. Variable-Length Encodings:
Some character encoding schemes, like UTF-8 (a variable-length encoding of Unicode),
allow characters to be represented using different numbers of bits based on their
complexity. This makes it efficient for representing a wide range of characters while
keeping file sizes smaller.
11
Elective ICT Notes Compiled by Yaw Preko AMASTECH

In summary, characters are represented in computer storage as binary bit patterns using
encoding schemes like ASCII or Unicode. These encodings allow computers to store and
process text and characters, providing a standardized way to represent and exchange
textual information in a digital format.

12
Elective ICT Notes Compiled by Yaw Preko AMASTECH

BINARY ARITHMETIC
Decimal to Binary
Decimal to binary conversion is done through various methods. One of the
methods to convert decimal to binary is by dividing the given decimal number
recursively by 2. Then, the remainders are noted down till we get 0 as the final
quotient. After this step, these remainders are written in reverse order to get
the binary value of the given decimal number. A number system is a
mathematical way of representing numbers using a set of digits or symbols.
There are different number systems like the decimal number system, the
binary number system, the octal, and the hexadecimal number system. These
are identified with the help of the base that they have. Numbers can be easily
converted from one base to another using some defined rules.

Decimal to Binary Conversion


Decimal to binary conversion means when we convert a number from the
decimal number system to the binary number system. All number systems have
a base which is determined by the total number of digits that are used in the
number system. For example, the binary number system has a base of 2 since it
uses only two digits to represent a number. Similarly, the decimal number
system has a base of 10, because it has 10 digits to represent a number. Let
us understand the decimal number system and the binary number system and
then move on to the conversion of decimal to binary.

Decimal Number System Definition


The decimal number system is a number system that represents a number with
a base of 10 and uses 10 symbols - 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. It is also
known as the Hindu-Arabic number system in which each digit has a position
and it is ten times more significant than the previous digit. It also uses a
decimal point to represent decimal fractions. For example, if we take 36 as
a decimal number, here, 3 is ten times more than 6. Decimal numbers are
written as 4510, 11810, and so on. It is the most commonly known number
system in which the numbers can be identified easily even if the base is not
written. In other words, if the base of a number is not written, it is considered
to be a decimal number.

Binary Number System Definition


13
Elective ICT Notes Compiled by Yaw Preko AMASTECH

The binary number system is a number system with base 2 in which numbers
are represented only by two digits, 0 and 1. The smallest unit of data in a
computer is called a bit, which is the abbreviated form of 'binary digit'. A bit
has a single binary value which is either 1 or 0. Binary numbers are written as
1102, 102 and are mostly used in computers for programming or coding since
the computer understands the language of only the binary digits, that is, 0 and
1. It should be noted that in a binary number, the bit to the extreme left is
called the Most Significant Bit (MSB), and the bit to the extreme right end is
known as the Least Significant Bit (LSB). The remaining part shows the
magnitude of the number.

How to Convert Decimal to Binary?


To convert numbers from decimal to binary, the given decimal number is
divided repeatedly by 2 and the remainders are noted down till we get 0 as the
final quotient. The following steps is considered as the decimal to binary
formula that shows the procedure of conversion.

 Step 1: Divide the given decimal number by 2 and note down the remainder.
 Step 2: Now, divide the obtained quotient by 2, and note the remainder again.
 Step 3: Repeat the above steps until you get 0 as the quotient.
 Step 4: Now, write the remainders in such a way that the last remainder is written first,
followed by the rest in the reverse order.
 Step 5: This can also be understood in another way which states that the Least Significant
Bit (LSB) of the binary number is at the top and the Most Significant Bit (MSB) is at the
bottom. This number is the binary value of the given decimal number.

Let us understand this with an example.

Example: Convert the decimal number 1310 to binary.

Solution: We will start dividing the given number (13) repeatedly by 2 until we
get the quotient as 0. We will note the remainders in order.

14
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Division by 2 Quotient Remainder

13 ÷ 2 6 1 (LSB)

6÷2 3 0

3÷2 1 1

1÷2 0 1 (MSB)

After noting the remainders, we will write them in such a way that the Most
Significant Bit (MSB) of the binary number is written first, followed by the rest.
Therefore, the binary equivalent for the given decimal number 1310 is 11012.
This means that 1310 = 11012.
15
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Decimal to Binary Table


There are different methods of converting numbers from decimal to binary.
When we convert numbers from decimal to binary, the base of the number
changes from 10 to 2. It should be noted that all decimal numbers have their
equivalent binary numbers. The following table shows the decimal to binary
chart of the first 20 whole numbers.

Decimal Numbers Binary Numbers

0 0

1 1

2 10

3 11

4 100

5 101

6 110

7 111

8 1000

9 1001

10 1010

11 1011

12 1100

13 1101

16
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Decimal Numbers Binary Numbers

14 1110

15 1111

16 10000

17 10001

18 10010

19 10011

20 10100

Decimal to Binary Conversion Examples


 Example 1: Convert 17410 to binary.

Solution: For decimal to binary conversion, let us first divide the given number by 2 and
note down the remainders as shown in the following table.

Division by 2 Quotient Remainder

174 ÷ 2 87 0 (LSB)

87 ÷ 2 43 1

43 ÷ 2 21 1

21 ÷ 2 10 1

10 ÷ 2 5 0

17
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Division by 2 Quotient Remainder

5÷2 2 1

2÷2 1 0

1÷2 0 1 (MSB)

After noting the remainders, we write them in the reverse order such that the Most
Significant Bit (MSB) is written first, and the Least Significant Bit is written in the end.
Hence, the binary equivalent for the given decimal number 17410 is 101011102.

 Example 2: Convert the following decimal number into binary number: 156

Solution: To convert 15610 to the binary number system, let us divide it repeatedly
by 2 and note the remainders as shown below.

Division by 2 Quotient Remainder

156 ÷ 2 78 0 (LSB)

78 ÷ 2 39 0

39 ÷ 2 19 1

19 ÷ 2 9 1

9÷2 4 1

4÷2 2 0

2÷2 1 0

1÷2 0 1 (MSB)

18
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Octal to Binary
In mathematics, there are different number systems to write numbers, say
binary number system (base 2), octal number system (base 8), decimal (base
10), and hexadecimal number system (base 16). Octal to binary conversion is
defined as converting a number from base-8 to base-2. It can be done in two
ways that you will learn in this article. Let us move ahead and learn the
conversion of octal to binary.

What is Octal to Binary Conversion?


Before learning about octal to binary conversion, let us quickly go through the
meanings of the octal number system and binary number system. The binary
number system uses only two digits 0 and 1 to represent numbers. It is also
known as the base-2 system. It is used with the computer system in which 0
and 1 digits are used to write various scripts. Each digit i.e. either 0 or 1 is
referred to as a bit in the binary system. For example, (01101)2, (01000010)2,
(11000101)2 are a few binary numbers. On the other hand, the octal number
system includes digits from 0 to 7. Other digits like 8 and 9 are not included in
this system. It is also known as the base-8 system. Just as the binary, the
octal number system is used in minicomputers. For example, (73)8, (151)8,
(35)8 are a few octal numbers.

Conversion of octal to binary is defined as converting a number from base-8


to base-2 by using either direct or indirect methods. All the digits in an octal
number are from the range of 0 to 7, while all the digits in a binary number
include only 0 and 1. Let us observe the octal to binary table given in the next
section.

Octal to Binary Table


Observe the octal to binary table given below which will help you to convert
octal numbers to binary numbers. The octal to binary table shows the
equivalent number of each octal digit to binary, for example, 0 in octal is
equivalent to 000 in binary, 1 in octal is equivalent to 001 in binary, 28 is the
same as 0102, and so on.

19
Elective ICT Notes Compiled by Yaw Preko AMASTECH

How to Convert Octal to Binary?


There are two ways to convert octal to binary, which are explained below:

 Convert octal to decimal and then decimal to binary


 The direct method of octal to binary conversion

Let us understand each method in detail one by one.

Method 1: Octal to decimal and then decimal to binary

In this method, we will first convert a number from octal to decimal (base 10),
and then we will convert that decimal number to binary. To convert a number
from octal to decimal, we multiply its digits starting from the right with 8 raised
to exponents starting from 0 and then add the values. So, the first digit from the
right will be multiplied by 80, which is equal to 1, the second digit will be
multiplied by 81 = 8, and so on.

20
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Let us take an example of the number 568. The 8 written as the base
represents that this is a base-8 number. 568 can be converted to base 10 as,

568 = 6 × 80 + 5 × 81

568 = 6 × 1 + 5 × 8

= 6 + 40

= 46

Hence, 568 = 4610. Now, we will convert 46 which is a base 10 number to its
binary equivalent. To convert decimal to binary, divide the given number by 2
and note down the quotient and reminder. Again divide the quotient obtained
by 2, and note down the remainder. Repeat this process till you get 0 as the
quotient. Write the remainders in order from right to left. Let us convert 46 10 to
binary.

Divide 46 by 2 ⇒ 46 ÷ 2 = Quotient - 23, remainder - 0

23 ÷ 2 = Quotient - 11, remainder - 1

11 ÷ 2 = Quotient - 5, remainder - 1

5 ÷ 2 = Q - 2, R - 1

2 ÷ 2 = Q - 1, R - 0

1 ÷ 2 = Q - 0, R - 1

Arrange all the remainders from right to left. We will get,

4610 = 1011102

Therefore, we have converted an octal number 568 to its binary equivalent


1011102.

Method 2: Direct Method of Octal to Binary Conversion

Another method, surely an easier and less complicated one, is to directly


convert a number from octal to binary by referring to the octal to binary table
given above. In this method, we convert every digit of the given octal number

21
Elective ICT Notes Compiled by Yaw Preko AMASTECH

to its binary equivalent by referring to the above chart. For example, using this
method we can directly write 38 as 0112, 58 as 1012, etc.

Let us convert the same number 568 from octal to binary using the direct
method. There are two digits in this number, 5 and 6. Referring to the above
octal to binary chart:

58 → 1012

68 → 1102

By combining these two, we will get, 568 = 1011102. Observe the image given
below for your reference.

Octal to Binary Examples

 Example 1: Convert the octal number 728 to a binary number using the decimal conversion
method.

22
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Solution: Given octal number 728. To convert it to a binary number using the decimal
conversion method, we will first convert it to a decimal number.

⇒ 728 = 2 × 80 + 7 × 81

⇒ 728 = 2 × 1 + 7 × 8

= 2 + 56

= 5810

Now, we have to convert 5810 to a binary number by repeatedly dividing it by 2.

⇒ 58 ÷ 2 = Q - 29, R - 0

29 ÷ 2 = Q - 14, R - 1

14 ÷ 2 = Q - 7, R - 0

7 ÷ 2 = Q - 3, R - 1

3 ÷ 2 = Q - 1, R - 1

1 ÷ 2 = Q - 0, R - 1

We get, 5810 = 1110102. Therefore, the octal to binary conversion of the number 728 results
in 1110102.

 Example 2: Change the octal number 358 to its binary equivalent using the direct conversion
method.

Solution: To convert an octal number to binary, we can use the octal to binary table with
each of the given digits. The given number is 358. Referring to the table, we have,

38 = 0112

58 = 1012

By combining these binary bits, we get 358 = 0111012.

 Example 3: How to convert 2358 octal to binary?

Solution: Let us convert the given number from octal to binary using the direct conversion
method. The given number is 2358.

28 = 0102

23
Elective ICT Notes Compiled by Yaw Preko AMASTECH

38 = 0112

58 = 1012

By combining these binary bits, we get 2358 = 0100111012.

24
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Hexadecimal to Binary
Hexadecimal to binary conversion is done to obtain the equivalent binary number of the
hexadecimal. The number system is of four types namely, binary number system, octal number
system, decimal number system, and hexadecimal number system. Each of these number systems
has its own base number that helps in the process of conversion. Hexadecimal to binary is done
on their respective base numbers. Let us learn more about how to convert hexadecimal numbers
to binary numbers.

What is Hexadecimal to Binary Conversion?


Hexadecimal to binary conversion is the process of converting a hexadecimal number with
a base of 16 to a binary number with a base of 2. Converting hexadecimal numbers to binary
numbers is important as computers only understand the binary language. Hence, all the other
types of number systems are also converted to binary numbers. Converting hexadecimal to
binary cannot be done directly. The hexadecimal number has to be converted to a decimal
number then converted to a binary number. Before we get to the steps of converting, let us look
at what are hexadecimal and binary numbers.

Hexadecimal Number System


The hexadecimal number system has its base number as 16 and uses sixteen digits/alphabets: 0,
1, 2, 3, 4, 5, 6, 7, 8, 9 and A, B, C, D, E, F. Here, A-F of the hexadecimal system means the
numbers 10-15 of the decimal number system respectively. This system is used in computers to
reduce the large-sized strings of the binary system. The largest single digit is F (1 less than the
base 16). Each digit in the hexadecimal number system represents the power of the base (16). For
example: 7B416,9F16,3B1A16 are some examples of numbers in the hexadecimal number
system.

25
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Binary Number System


The binary number system uses only two digits: 0 and 1 with the base number as 2. Digits 0 and
1 are called bits and 8 bits together make a byte. The data in computers is stored in terms of bits
and bytes. The binary number system does not deal with other numbers such as 2,3,4,5 and so
on. For example: 100012,1111012,10101012 are some examples of numbers in the binary
number system.

Steps to Convert Hexadecimal to Binary


To convert hexadecimal to a binary number we need to first convert the hexadecimal number to a
decimal number to finally convert it to a binary number. One of the most important aspects to
remember here is every hexadecimal number will produce 4 binary digits. The hexadecimal to
binary conversion can occur in two methods - First, after the hexadecimal is converted to a
decimal number, we convert the decimal number by using the division process to obtain the
binary number. Second, we can directly use the hexadecimal to decimal to binary conversion
table. Let us look at the steps of both methods.

Method 1: Convert Hexadecimal to Decimal to Binary (without


conversion table)
This method requires both multiplication and division of numbers using the respective base
numbers. The hexadecimal base number is 16, the base number of a decimal number is 10, and
the base of a binary number is 2. Let us look at the steps:

 Step 1: Write the hexadecimal number and find its equivalent decimal number.

26
Elective ICT Notes Compiled by Yaw Preko AMASTECH

 Step 2: To find the decimal equivalent, we multiply each digit with 16n-1, where the digit is in
its nth position.
 Step 3: After multiplying the numbers, add the product of those numbers to obtain the
decimal number.
 Step 4: To convert decimal to binary, we divide the decimal number by 2 by keeping the
remainder aside and dividing the quotient by 2 until we arrive at zero.
 Step 5: Once the quotient is zero, we arrange the remainder from bottom to top i.e. reverse
order to obtain the binary number.

Let us look at an example for a better understanding. Convert hexadecimal (100)16 to


binary.

Step 1 + 2: Convert (100)16 to decimal by multiplying each digit with 16n-1.


Multiply it

(100)16 = 1 × 16(3-1) + 0 × 16(2-1) + 0 × 16(1-1)

(100)16 = 1 × 162 + 0 × 161 + 0 × 160

Step 3: Multiply the numbers and add the product to obtain the decimal
number.

(100)16(100)16 = 1 × 256 + 0 × 16 + 0 × 1

(100)16(100)16 = 256 + 0 + 0

(100)16(100)16 = 256

Therefore, (100)16 = (256)10

Step 4: Convert the decimal number (256)10 to a binary number by dividing the
number by 2 until the quotient is zero.

27
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Therefore, (256)10 = (100000000)2

Step 5: Once the binary is obtained, the conversion is done.

Hence, (100)16 = (100000000)2.

Method 2: Convert Hexadecimal to Decimal to Binary (with


conversion table)

28
Elective ICT Notes Compiled by Yaw Preko AMASTECH

This method is a direct procedure by just looking at the conversation table we


can convert hexadecimal to binary. The steps are fairly simple, lets look at
them:

 Step 1: Write the hexadecimal


 Step 2: Find the equivalent decimal of each of the digits by looking at the
conversion table.
 Step 2: Once the decimal number is obtained, looking at the same table we can
convert it to a binary.
 Step 3: Combine all the binary numbers together to obtain the final binary
number.

Let us look at an example for a better understanding. Convert


hexadecimal (E5B)16 to binary.

Step 1: We have the hexadecimal as (E5B)16.

Step 2: Looking at the conversion table, find the equivalent of each digit.

E = (14)10, 5 = (5)10, B = (11)10

Step 3: Once the decimal of each digit is obtained, looking at the conversion
table convert each decimal number to binary.

(14)10 = (1110)2

(5)10 = (0101)2

(11)10 = (1011)2

Step 4: Combine all the binary numbers together to obtain the final one.

Therefore, (E5B)16 = (111001011011)2.

29
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Convert Hexadecimal to Binary With Decimal Point

30
Elective ICT Notes Compiled by Yaw Preko AMASTECH

To convert the hexadecimal digit to binary, we use a similar method as used


in the previous section. We use the conversion table to convert hexadecimal
to binary. While converting with the decimal point, we use the same steps but
do not take into consideration the zero placed on the rightmost side since they
are called trailing zeros. Let us look at an example, convert (0.C48)16 to binary.

Step 1: We have the hexadecimal as (0.C48)16.

Step 2: Looking at the conversion table, find the equivalent of each digit. We
do not take the zero into consideration.

C = (12)10, 4 = (4)10, 8 = (8)10

Step 3: Once the decimal of each digit is obtained, looking at the conversion
table convert each decimal number to binary.

(12)10 = (1100)2

(4)10 = (0100)2

(8)10 = (1000)2

Step 4: Combine all the binary numbers together to obtain the final one. The
zero before the decimal will be written along with the final binary number.

Therefore, (0.C48)16 = (110001001000)2.

Examples on Hexadecimal to Binary

 Example 1: Convert hexadecimal DE816 to binary using the conversion table.

Solution: Given, DE816

The decimal equivalent of the hexadecimal digits by using the conversion table are:

D = 1310, E = 1410, 8 = 810

The binary equivalent of these decimal numbers by using the conversion table are:

1310 = 11012

31
Elective ICT Notes Compiled by Yaw Preko AMASTECH

1410 = 11102

810 = 10002

Combining the binary numbers together,

Therefore, DE816 = 1101111010002.

 Example 2: Convert hexadecimal 0.A1216 to binary.

Solution: Given, 0.A1216

The decimal equivalent of the hexadecimal digits,by using the conversion table and keeping
the decimal point aside, are:

A = 1010, 1 = 110, 2 = 210

The binary equivalent of these decimal numbers by using the conversion table are:

1010 = 10102

110 = 00012

210 = 00102

Combining the binary numbers together along with the decimal point,

Therefore, 0.A1216 = 1010000100102.

 Example 3: Convert hexadecimal 3516 to binary without using the conversion table.

Solution: Given, 3516

Let us convert 3516 to decimal,

3516 = 3 × 16(2-1) + 5 × 16(1-1)

3516 = 3 × 161 + 5 × 160

3516 = 3 × 16 + 5 × 1

3516 = 48 + 5

3516 = 53

32
Elective ICT Notes Compiled by Yaw Preko AMASTECH

3516 = 5310.

Let us convert this decimal number to binary by dividing the number by 2.

Division by 2 Quotient Remainder

53/2 26 1

26/2 13 0

13/2 6 1

6/2 3 0

3/2 1 1

½ 0 1

Therefore, 5310 = 1101012

Hence, 3516 = 1101012.

33
Elective ICT Notes Compiled by Yaw Preko AMASTECH

COMPUTER SOFTWARE
Introduction to Computer Software
Computer software refers to a set of instructions, data, or programs that
enable a computer to perform specific tasks. It's a crucial component that
allows hardware to function and provides a user interface for interaction.
Types of Software
There are several types of software, and they can be broadly categorized into
three main types:
1. System Software:
- Operating System (OS): This is the core software that manages hardware
resources and provides essential services for other software applications.
Examples include Windows, macOS, and Linux.
- Device Drivers: These are specific types of system software that allow the
operating system to communicate with and control hardware components like
printers, graphics cards, and more.

2. Application Software:
- Productivity Software: Includes tools like word processors (Microsoft
Word, Google Docs), spreadsheets (Microsoft Excel, Google Sheets), and
presentation software (Microsoft PowerPoint, Google Slides).
- Media Players: Software designed for playing audio and video files, such as
VLC Media Player or Windows Media Player.
- Web Browsers: Enable users to access and interact with websites,
examples include Google Chrome, Mozilla Firefox, and Safari.

3. Utility Software:
- Antivirus Programs: Protect the computer from malicious software and
viruses.

34
Elective ICT Notes Compiled by Yaw Preko AMASTECH

- Backup Software: Facilitates the creation and restoration of backups to


prevent data loss.
- Disk Cleanup Tools: Optimizes disk space usage by removing unnecessary
files.

A. OPERATING SYSTEMS
Operating systems (OS) are software programs that act as an intermediary
between computer hardware and the user. They provide a set of essential
services and manage the computer's resources to ensure efficient and secure
operation.
Types of Operating Systems
There are several types of operating systems, and they can be categorized
based on their use and functionality. Here are some common types:
1. Single-User, Single-Tasking OS:
This type of OS allows only one user to execute one task at a time. It's a simple
system designed for personal use, often found in early personal computers.
2. Single-User, Multi-Tasking OS:
In this type, a single user can perform multiple tasks simultaneously. Modern
desktop and laptop operating systems like Windows, macOS, and various
Linux distributions fall into this category.
3. Multi-User OS:
Multi-user operating systems allow multiple users to access a computer
system simultaneously. These are commonly used in server environments,
where multiple users need access to resources. Unix and Linux servers often
use multi-user operating systems.
4. Real-Time OS:
Real-time operating systems are designed to process data and events as they
occur. They are critical in systems where timing and responsiveness are
crucial, such as in embedded systems, industrial control systems, and some
scientific applications.

35
Elective ICT Notes Compiled by Yaw Preko AMASTECH

5. Network OS:
These operating systems are optimized for network functions. They facilitate
communication between different computers and devices in a network.
Examples include Novell NetWare and Windows Server.
6. Distributed OS:
Distributed operating systems manage a group of independent computers and
make them appear to be a single computer. They enable users to share
resources and coordinate tasks across a network. Examples include Amoeba
and Google's Fuchsia.
7. Mobile OS:
Designed for mobile devices like smartphones and tablets, mobile operating
systems are tailored to the constraints and features of these devices. Examples
include Android, iOS, and HarmonyOS.
8. Embedded OS:
Embedded operating systems are built into and optimized for specific
hardware. They are commonly found in devices like ATMs, digital cameras,
and appliances. Examples include VxWorks and FreeRTOS.
9. Multi-Processor OS:
These operating systems are designed to work with multiple processors. They
manage the coordination and communication between multiple processors to
execute tasks efficiently. Examples include Windows NT and Unix.
Each type of operating system serves specific needs and requirements,
reflecting the diversity of computing environments and devices.

Functions of Operating System


Here are some key functions and components of operating systems:
1. Hardware Abstraction:
Operating systems abstract the underlying hardware, providing a consistent
interface for applications. This abstraction shields application programs from
the details of the hardware, making it easier to develop software.

36
Elective ICT Notes Compiled by Yaw Preko AMASTECH

2. Process Management:
OS manages processes, which are instances of executing programs. It allocates
resources, such as CPU time and memory, to different processes and ensures
their orderly execution.
3. Memory Management:
Operating systems handle the allocation and deallocation of memory for
programs and data. They also manage virtual memory, allowing programs to
use more memory than physically available by swapping data between RAM
and disk.
4. File System Management:
OS provides a file system that organizes and stores data on storage devices. It
manages files, directories, and access permissions, ensuring efficient storage
and retrieval of data.
5. Device Management:
Operating systems communicate with and control peripheral devices such as
printers, disks, and network interfaces. Device drivers are specific software
components that facilitate this communication.
6. Security and Access Control:
OS enforces security measures, controlling access to the system and its
resources. This includes user authentication, file permissions, and encryption
to protect data and ensure the integrity of the system.
7. User Interface:
Operating systems provide a user interface through which users interact with
the computer. This can be a command-line interface (CLI) or a graphical user
interface (GUI), depending on the OS.
8. Networking:
Many operating systems include networking capabilities, allowing computers
to communicate with each other over local or wide-area networks. This is
crucial for sharing resources and accessing services.
9. Error Handling:

37
Elective ICT Notes Compiled by Yaw Preko AMASTECH

OS detects and handles errors that may occur during the operation of the
computer system. It may provide error messages, log events, and take
corrective actions to maintain system stability.

B. UTILITY PROGRAMS
Utility programs are software tools designed to perform various maintenance,
management, and optimization tasks on a computer system. They serve
essential functions to keep a computer running efficiently and securely.
Examples of Utility Programs:
1. Antivirus Software: Protects your system from malware, viruses, and
other threats.
2. Disk Cleanup: Helps you free up space on your hard drive by deleting
temporary and unnecessary files.
3. Disk Defragmenter: Optimizes the layout of files on a hard disk to improve
access times.
4. Backup Software: Creates copies of your data for recovery in case of data
loss.
5. File Compression Tools: Compresses files to save storage space and
facilitate data transfer.
6. System Monitoring Tools: Monitors system performance, providing
insights into resource usage.
7. Registry Cleaners: Cleans and optimizes the Windows registry to improve
system performance.
8. Password Managers: Store and manage passwords securely.
9. Uninstaller Software: Safely removes unwanted programs and their
associated files.
10. File Recovery Tools: Helps recover deleted or lost files.

Common Uses of Utility Programs:

38
Elective ICT Notes Compiled by Yaw Preko AMASTECH

1. System Maintenance: Utility programs help maintain system health by


removing clutter, fixing errors, and optimizing performance.
2. Security: They enhance system security by detecting and removing
malware, as well as managing firewall settings.
3. Data Backup: Utility programs automate data backup to prevent data loss
due to hardware failures or user errors.
4. File Management: They assist in managing and organizing files, including
compression, encryption, and deletion.
5. Optimizing Performance: Utility tools like disk defragmenters and system
optimizers enhance system speed.
6. Resource Monitoring: Users can keep an eye on system resources such as
CPU, memory, and network usage.
7. Troubleshooting: These programs help diagnose and fix system issues,
such as registry errors.
8. Password Management: Utility programs for managing passwords
securely store and generate complex passwords for various accounts.
These utility programs play a crucial role in maintaining and optimizing
computer systems, ensuring they run smoothly and securely.

C. APPLICATION SOFTWARE
Application software, often referred to as "apps," is a type of computer
program designed to perform specific tasks or functions for the user. It is a
broad category of software that covers a wide range of applications and
programs used on computers, smartphones, tablets, and other digital devices.
Application software is distinct from system software, which manages the
hardware and provides the basic functions needed to operate the computer.
Here are some key characteristics and examples of application software:
1. Specific Functionality: Application software is created to perform
particular tasks or provide specific features. For instance, word processing
software (like Microsoft Word) is designed for creating documents, while web
browsers (like Google Chrome) are used for accessing the internet.
39
Elective ICT Notes Compiled by Yaw Preko AMASTECH

2. User Interaction: It is meant to be interacted with directly by the user.


Users open and use application software to complete various tasks, from
writing emails and playing games to editing photos and managing finances.
3. Diversity: Application software encompasses a wide variety of categories,
including productivity apps, entertainment apps, communication apps, design
and multimedia software, and much more.
4. Platform-Specific: Applications are often developed for specific operating
systems or platforms. For example, there are applications designed for
Windows, macOS, iOS, Android, and more.
5. Regular Updates: Many application software receive regular updates to
add new features, improve performance, and fix any issues.

Examples of application software include:


- Word processors (e.g., Microsoft Word, Google Docs)
- Spreadsheets (e.g., Microsoft Excel, Google Sheets)
- Web browsers (e.g., Google Chrome, Mozilla Firefox)
- Email clients (e.g., Microsoft Outlook, Gmail)
- Photo and video editing software (e.g., Adobe Photoshop, iMovie)
- Social media apps (e.g., Facebook, Instagram)
- Messaging apps (e.g., WhatsApp, Telegram)
- Gaming apps (e.g., Minecraft, Candy Crush)
- Financial management software (e.g., Quicken, QuickBooks)
In essence, application software is what allows users to perform specific tasks
and customize their digital devices to suit their needs and preferences. It plays
a crucial role in making computers and mobile devices useful and versatile for
a wide range of purposes.
Types, Examples and Functions of Application Software
Application software comes in various types, each tailored to perform specific
tasks or functions. These types of application software cover a wide range of

40
Elective ICT Notes Compiled by Yaw Preko AMASTECH

activities and are designed to meet diverse user needs. Here are some
common types of application software:

1. Word Processing Software:


- Examples: Microsoft Word, Google Docs
- Function: Allows users to create, edit, format, and print documents, such as
letters, reports, and essays.

2. Spreadsheet Software:
- Examples: Microsoft Excel, Google Sheets
- Function: Used for creating, analyzing, and managing data in tabular form.
It's especially useful for financial calculations and data organization.

3. Presentation Software:
- Examples: Microsoft PowerPoint, Google Slides
- Function: Enables users to create slideshows and presentations with text,
images, and multimedia elements.

4. Web Browsers:
- Examples: Google Chrome, Mozilla Firefox
- Function: Provides access to the internet and allows users to browse
websites, search for information, and interact online.

5. Email Clients:
- Examples: Microsoft Outlook, Mozilla Thunderbird, Google Mail (Gmail)
- Function: Manages email accounts, sending, receiving, and organizing
emails.

41
Elective ICT Notes Compiled by Yaw Preko AMASTECH

6. Media Players:
- Examples: VLC Media Player, Windows Media Player
- Function: Plays audio and video files, providing a multimedia experience on
the computer.

7. Graphics and Design Software:


- Examples: Adobe Photoshop, CorelDRAW
- Function: Used for graphic design, image editing, and creating visual
content.

8. Gaming Software:
- Examples: Minecraft, Fortnite
- Function: Provides a platform for playing video games on a computer.

9. Accounting and Financial Software:


- Examples: QuickBooks, Quicken
- Function: Assists in financial management, budgeting, and tracking
expenses.

10. Communication and Messaging Apps:


- Examples: WhatsApp, Skype, Zoom,
- Function: Facilitates real-time communication through text, voice, or video
chats.

11. Project Management Software

42
Elective ICT Notes Compiled by Yaw Preko AMASTECH

- Examples: Trello, Asana


- Function: Helps users plan, organize, and track projects, tasks, and
deadlines.

12. Educational Software:


- Examples: Khan Academy, Duolingo
- Function: Provides educational content and interactive lessons to support
learning in various subjects.

13. Web Development Tools:


- Examples: Adobe Dreamweaver, Visual Studio Code
- Function: Assists in creating and editing websites, web applications, and
coding projects.

14. Database Software:


- Examples: Microsoft Access, MySQL
- Function: Allows for the creation, management, and retrieval of structured
data in databases.

15. Utilities and System Tools:


- Examples: Antivirus software, disk cleanup tools
- Function: Perform system maintenance, optimization, and security tasks,
such as virus scanning and disk cleanup.

16. Personalization Apps:


- Examples: Wallpaper changers, theme customizers

43
Elective ICT Notes Compiled by Yaw Preko AMASTECH

- Function: Enable users to personalize their computer's appearance and


settings.

17. Assistive Technology Software:


- Examples: Screen readers, speech recognition software
- Function: Supports individuals with disabilities by enhancing accessibility
and usability.

These are just some of the many types of application software available, and
new ones are continually being developed to cater to evolving user needs and
technological advancements. Users can choose from this wide variety of
software to enhance their productivity, creativity, communication, and
entertainment on their computers and digital devices.

Functions of Application Software


The role of application software in performing specific tasks on a computer is
pivotal, as it enables users to accomplish a wide range of functions and
activities. Application software plays a crucial role in enhancing the
functionality and versatility of computers by providing specialized tools and
features tailored to different needs. Here are key aspects of its role:

1. Task-Specific Functionality: Application software is designed to perform


particular tasks or functions, making it possible for users to complete a
variety of activities. For example, word processing software helps users create
and edit documents, while image editing software allows for image
manipulation and enhancement.

2. Enhanced User Experience: Application software contributes to a user-


friendly and intuitive computing experience. These applications often feature
user interfaces designed for ease of use and efficiency, allowing individuals to
interact with the software without requiring extensive technical knowledge.
44
Elective ICT Notes Compiled by Yaw Preko AMASTECH

3. Customization and Personalization: Application software offers


customization options that cater to users' specific needs and preferences. For
instance, users can select from a range of web browsers or email clients to
personalize their online experience.

4. Productivity and Efficiency: Many productivity applications, such as


spreadsheet software, project management tools, and scheduling apps, help
users work more efficiently and manage tasks effectively. They streamline
complex processes and help with organization and time management.

5. Entertainment and Leisure: Application software provides a platform for


entertainment and leisure activities. This includes gaming apps, multimedia
players, streaming services, and social media platforms that allow users to
relax and enjoy their digital experiences.

6. Communication and Collaboration: Communication and collaboration


software, such as email clients, messaging apps, and video conferencing tools,
facilitate effective communication and teamwork, whether for personal or
professional purposes.

7. Creativity and Innovation: Creative software applications, like graphic


design and video editing tools, empower users to express their creativity,
produce artistic content, and contribute to innovation in various fields.

8. Accessibility and Inclusivity: Certain applications are designed to


improve accessibility and inclusivity. For example, assistive technology
applications help individuals with disabilities interact with and use computers
effectively.

45
Elective ICT Notes Compiled by Yaw Preko AMASTECH

9. Security and Privacy: Security software applications, including antivirus


and firewall programs, play a vital role in safeguarding the computer and its
data from threats and vulnerabilities.

10. Updating and Maintenance: Many application software receive regular


updates to enhance features, fix bugs, and improve performance. This
maintenance ensures that the software remains reliable and secure.

In summary, application software empowers users to harness the capabilities


of their computers for specific tasks and functions. Whether for work, play,
communication, or creativity, these software applications are essential in
shaping the computing experience and making computers versatile and
adaptable to an array of individual needs and objectives.

46
Elective ICT Notes Compiled by Yaw Preko AMASTECH

PERSONAL COMPUTERS (PC) HARDWARE


MAINTENANCE AND SOFTWARE
INSTALLATION
Proper personal computer maintenance is crucial for ensuring optimal
performance and longevity. Regular maintenance, such as software updates,
virus scans, and disk cleanup, helps prevent issues like slow performance,
system crashes, and data loss. It also enhances security by keeping the system
up-to-date with the latest patches. Taking care of hardware components, like
cleaning dust from fans and ensuring proper ventilation, contributes to the
overall reliability of your computer. In essence, maintenance preserves your
computer's efficiency and protects your data.

Common Problems Associated with Personal Computers and their Possible


Causes and Suggested Solutions.

1. Slow performance:
- Insufficient RAM or storage space.
- Too many background processes.
- Fragmented hard drive.
Suggested Solution:
- Upgrade RAM or storage space.
- Close unnecessary background processes.
- Defragment the hard drive.

2. Freezing or crashing:
- Incompatible or outdated drivers.
- Software conflicts.

47
Elective ICT Notes Compiled by Yaw Preko AMASTECH

- Hardware issues like faulty RAM or overheating.


Suggested Solution:
- Update drivers to the latest versions.
- Resolve software conflicts.
- Check and address hardware issues, such as faulty RAM or overheating.

3. Blue screen of death (BSOD):


- Hardware or driver issues.
- System file corruption.
- Incompatible hardware.
Suggested Solution:
- Update or roll back hardware drivers.
- Use system tools to repair corrupted system files.
- Ensure hardware compatibility.

4. Software errors and glitches:


- Bugs in the software.
- Incompatible software versions.
- Operating system conflicts.
Suggested Solution:
- Install software updates and patches.
- Check for and resolve software incompatibility issues.
- Reinstall or repair the affected software.

5. Virus and malware issues:

48
Elective ICT Notes Compiled by Yaw Preko AMASTECH

- Downloading infected files.


- Visiting malicious websites.
- Opening infected email attachments.
Suggested Solution:
- Use reliable antivirus and anti-malware software.
- Be cautious when downloading files and visiting websites.
- Regularly scan and clean the system.

6. Internet connectivity issues:


- Network configuration problems.
- Router issues.
- Signal interference.
Suggested Solution:
- Check and configure network settings.
- Reboot the router and address any issues.
- Minimize signal interference and ensure a stable connection.

7. Hardware failures:
- Aging or faulty components.
- Overheating.
- Power surges.
Suggested Solution:
- Replace aging or faulty components.
- Improve cooling mechanisms to prevent overheating.
- Use surge protectors to guard against power surges.

49
Elective ICT Notes Compiled by Yaw Preko AMASTECH

8. Noise or overheating:
- Dust accumulation in fans.
- Inadequate cooling.
- Malfunctioning hardware components.
Suggested Solution:
- Clean dust from fans and ensure proper ventilation.
- Upgrade cooling systems if necessary.
- Replace malfunctioning hardware components.

9. Power issues:
- Fluctuations in power supply.
- Faulty power cables or adapters.
- Power surges or outages.
Suggested Solution:
- Use a stable power supply.
- Replace faulty power cables or adapters.
- Invest in a surge protector or uninterruptible power supply (UPS).

TROUBLESHOOTING
Troubleshooting is the process of systematically identifying, analyzing, and
solving problems in a system or device. In the context of computers or
technology, troubleshooting is often used to diagnose and fix issues that affect
the normal functioning of hardware, software, or the overall system. It
involves a logical and methodical approach to identify the root cause of a
problem and implement solutions to resolve it.

50
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Key steps in troubleshooting include:


1. Identifying the Problem:
- Clearly defining and understanding the issue or symptoms.
2. Gathering Information:
- Collecting relevant data about the problem, such as error messages, recent
changes, or any specific conditions leading to the issue.
3. Isolating the Cause:
- Narrowing down possible causes through a process of elimination and
testing.
4. Developing Solutions:
- Creating potential solutions or workarounds based on the identified cause.
5. Implementing Solutions:
- Applying the solutions systematically to address the problem.
6. Testing:
- Verifying whether the implemented solutions resolve the issue.
7. Documenting:
- Recording the troubleshooting steps taken and their outcomes for future
reference.
8. Seeking Help:
- Consulting relevant resources, support documentation, or seeking
assistance from experts if needed.
Troubleshooting can be applied to various fields, including computer systems,
electronics, software, and mechanical systems. It requires a combination of
technical knowledge, critical thinking, and problem-solving skills. Efficient
troubleshooting helps maintain the functionality and reliability of systems,
reducing downtime and ensuring optimal performance.

51
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Some Popular Ways to Troubleshoot Computer Problems

1. Check connections:
- Ensure all cables are properly connected.
- Verify power supply and peripheral connections.
2. Restart the computer:
- Rebooting can resolve many issues by clearing temporary glitches.
3. Update software:
- Install the latest operating system and software updates.
4. Check for malware:
- Run a thorough antivirus and anti-malware scan.
5. Review error messages:
- Examine any error messages for clues to the problem.
6. Monitor system resources:
- Check Task Manager (Windows) or Activity Monitor (Mac) for high
resource usage.
7. Verify hardware connections:
- Ensure components like RAM, GPU, and storage are properly seated.
8. Update drivers:
- Make sure all device drivers are up-to-date.
9. Check for overheating:
- Monitor temperatures and clean dust from fans and vents.
10. Test in safe mode:
- Boot the system in safe mode to identify software-related issues.
11. Restore to a previous state:

52
Elective ICT Notes Compiled by Yaw Preko AMASTECH

- Use system restore points (Windows) or Time Machine (Mac) to revert to a


stable state.
12. Run diagnostic tools:
- Utilize built-in system diagnostic tools for hardware checks.
13. Check for conflicting software:
- Identify and uninstall conflicting or unnecessary programs.
14. Review recent changes:
- Consider any recent software or hardware changes that might be causing
issues.
15. Contact support:
- If troubleshooting fails, seek assistance from customer support or forums.

Remember, the specific steps may vary based on the operating system and the
nature of the problem.

HOW TO MOUNT AND SET UP A COMPUTER


Mounting and setting up a computer involves both hardware and software
components.

Hardware Setup:
1. Unpack Components:
- Unbox the computer case, monitor, keyboard, mouse, and any other
peripherals.
2. Connect Power Supply:
- Connect the power cable to the computer case and plug it into a power
outlet.
3. Connect Monitor:

53
Elective ICT Notes Compiled by Yaw Preko AMASTECH

- Attach the monitor cable (HDMI, VGA, DisplayPort) to both the monitor and
the computer.
4. Connect Peripherals:
- Connect the keyboard and mouse to available USB ports.
5. Connect Speakers or Headphones:
- If using external audio devices, connect them to the appropriate ports.
6. Connect Network Cable:
- If not using Wi-Fi, connect an Ethernet cable for internet access.
7. Power On:
- Press the power button on the computer case to turn it on.

Software Setup
1. Operating System Installation:
- If the computer doesn't have an operating system installed, follow on-
screen prompts to install one.
2. Driver Installation:
- Install drivers for essential components such as graphics, sound, and
network adapters. You can use the drivers provided with your hardware or
download the latest versions from the manufacturers' websites.
3. Update Operating System:
- After installation, ensure the operating system is up-to-date by installing
any available updates.
4. Install Antivirus Software:
- Install antivirus software to protect your computer from malware.
5. Create User Accounts:
- Set up user accounts with passwords for security.
6. Customize Settings:

54
Elective ICT Notes Compiled by Yaw Preko AMASTECH

- Adjust system settings, display preferences, and other configurations


according to your preferences.
7. Install Software:
- Install additional software applications you need for work or
entertainment.
8. Test Hardware:
- Confirm that all hardware components are functioning correctly by
checking sound, graphics, and network connectivity.
9. Create Backups:
- Set up a backup system for your important data to prevent loss in case of
hardware failure.
10. Connect to the Internet:
- Connect to Wi-Fi or configure network settings for internet access.

Once you've completed these steps, your computer should be set up and ready
for use. However, you can adjust any additional settings based on your
preferences and needs.

INSTALLATION AND UPGRADING OF COMPUTER SOFTWARE


The installation and upgrading of computer software involve specific steps to
ensure a smooth and successful process. Here are general guidelines for both
tasks:
Installation of Computer Software
1. Check System Requirements:
- Ensure that your computer meets the minimum hardware and software
requirements for the new software.
2. Download or Acquire the Software:
- Obtain the software from a reputable source, such as the official website or
a trusted distributor.

55
Elective ICT Notes Compiled by Yaw Preko AMASTECH

3. Close Other Applications:


- Before installation, close any unnecessary applications to prevent potential
conflicts.
4. Run the Installer:
- Double-click on the installer file to start the installation process.
5. Follow Installation Wizard:
- Most software comes with an installation wizard. Follow the on-screen
instructions, including choosing the installation location and accepting terms
and conditions.
6. Customize Installation (if applicable):
- Some software allows you to customize the installation. Choose options
such as installation type, language, or additional features.
7. Install Updates (if prompted):
- During the installation, the software may check for updates. It's advisable
to install the latest updates for security and performance.
8. Complete Installation:
- Once the installation is complete, review any post-installation instructions
and launch the software.
9. Activate/Register (if required):
- Some software may require activation or registration. Follow the provided
instructions to complete this process.
10. Test the Software:
- Open the software and perform basic functions to ensure it's working
correctly.

Upgrading Computer Software:


1. Check Compatibility:
- Verify that your system is compatible with the new version of the software.

56
Elective ICT Notes Compiled by Yaw Preko AMASTECH

2. Back Up Data:
- Before upgrading, back up any important data associated with the software
to prevent data loss in case of issues.
3. Check for Updates:
- If upgrading within the same version, ensure that you have installed all
available updates. For major upgrades, visit the software's official website to
download the latest version.
4. Uninstall Previous Version (if necessary):
- Some software requires uninstalling the previous version before
upgrading. Follow the software's documentation for guidance.
5. Run the Installer for the New Version:
- Execute the installer for the new version and follow the same steps as in
the installation process.
6. Customize Installation (if applicable):
- If the upgrade allows customization, review and select your preferences.
7. Install Updates (if prompted):
- During the installation, allow the software to check for and install any
updates.
8. Complete Upgrade:
- Once the upgrade is finished, review any post-upgrade instructions and
launch the updated software.
9. Test the Upgraded Software:
- Perform basic functions to ensure the upgraded software is working as
expected.
10. Update Settings (if necessary):
- Review and update any settings or preferences that may have changed
with the new version.

57
Elective ICT Notes Compiled by Yaw Preko AMASTECH

USING ICT TO LEARN


CONCEPTS AND TERMINOLOGIES IN INTEGRATING ICT IN EDUCATION
When integrating ICT (Information and Communication Technology) in
education, several concepts and terminologies are relevant. Here are some
key ones:

1. ICT (Information and Communication Technology):


- The umbrella term that encompasses technologies used for information
handling and communication.

2. E-learning:
- The use of electronic technologies for educational delivery, including online
courses, digital resources, and interactive multimedia.

3. Blended Learning:
- A mix of traditional face-to-face instruction and online learning, combining
the strengths of both approaches.

4. Learning Management System (LMS):


- Software or online platforms that facilitate the administration,
documentation, tracking, and delivery of educational content.

5. Digital Literacy:
- The ability to use, understand, and critically evaluate information from
various digital sources.

6. ICT Infrastructure:

58
Elective ICT Notes Compiled by Yaw Preko AMASTECH

- The hardware, software, and network components that support the use of
ICT in education.

7. Interactive Whiteboard:
- A touch-sensitive display connected to a computer, used for interactive
teaching and presentations.

8. Online Assessment:
- Evaluation of students' knowledge and skills conducted through digital
platforms.

9. Digital Citizenship:
- The responsible and ethical use of technology, including online behavior
and awareness of digital rights and responsibilities.

10. Flipped Classroom:


- A teaching approach where traditional instruction and homework
activities are reversed. Students engage with instructional content at home,
and class time is used for activities, discussions, and problem-solving.

11. Webinar:
- A live, online educational presentation or seminar conducted over the
internet.

12. Open Educational Resources (OER):


- Freely accessible educational materials available online for educators and
learners.

59
Elective ICT Notes Compiled by Yaw Preko AMASTECH

13. Gamification:
- Integrating game elements, such as points and rewards, into educational
activities to enhance engagement and motivation.

14. Cloud Computing:


- Storing and accessing data and programs over the internet instead of a
computer's hard drive.

15. ICT Policy:


- Guidelines and rules governing the use of ICT in educational institutions.

16. Augmented Reality (AR) and Virtual Reality (VR):


- Technologies that enhance the learning environment by overlaying digital
content (AR) or creating immersive experiences (VR).

17. Synchronous Learning:


- Real-time online learning where students and instructors interact
simultaneously.

18. Asynchronous Learning:


- Learning that occurs at different times, allowing students to access content
and participate in discussions at their own pace.

MULTIMEDIA IN EDUCATION
Multimedia refers to the integration of various forms of media, such as text,
graphics, audio, video, and animations, to convey information or tell a story.
The term "multimedia" is a combination of "multi" (meaning many) and
"media" (representing various forms of communication). In a multimedia

60
Elective ICT Notes Compiled by Yaw Preko AMASTECH

presentation or application, different types of content are combined to create


a richer and more engaging experience for the audience.

Here are key components commonly associated with multimedia:


1. Text: Written or displayed information that can include titles, captions, or
paragraphs.

2. Graphics: Visual elements such as images, illustrations, charts, and graphs.

3. Audio: Recorded sounds, music, or spoken words that enhance the auditory
experience.

4. Video: Moving images typically accompanied by audio, creating a dynamic


visual experience.

5. Animations: Sequential images or graphics that create the illusion of motion


or change.

6. Interactive Elements: Components that allow users to engage with and


control the content, such as hyperlinks, buttons, or quizzes.

Multimedia is widely used in various fields, including education,


entertainment, business presentations, web design, and more. In education,
for example, multimedia is often employed to create interactive learning
materials that cater to different learning styles and enhance overall
engagement. In entertainment, multimedia is evident in video games, movies,
and virtual reality experiences. The versatility of multimedia allows for
creative and dynamic ways of conveying information and storytelling across
different mediums and platforms.

61
Elective ICT Notes Compiled by Yaw Preko AMASTECH

Designing, creating, and using multimedia in education involves careful


consideration of various requirements to ensure effectiveness and
engagement. Here are key requirements for each phase:

Designing Multimedia in Education:

1. Educational Objectives:
- Clearly define the educational goals and learning outcomes that multimedia
content aims to achieve.

2. Audience Analysis:
- Understand the characteristics, preferences, and prior knowledge of the
target audience to tailor multimedia content accordingly.

3. Content Relevance:
- Ensure that multimedia elements align with the curriculum and contribute
meaningfully to the learning objectives.

4. Accessibility:
- Design content with accessibility in mind, considering diverse learning
needs, including those with disabilities.

5. Interactivity:
- Incorporate interactive elements that engage learners and encourage
active participation.

6. Media Integration:

62
Elective ICT Notes Compiled by Yaw Preko AMASTECH

- Integrate various multimedia elements such as text, images, audio, video,


and interactive simulations effectively.

7. Storyboarding:
- Create a detailed storyboard outlining the sequence of multimedia
elements and interactions.

8. User Interface (UI) Design:


- Design a user-friendly interface that allows easy navigation and interaction
with multimedia content.

9. Feedback Mechanism:
- Include mechanisms for providing feedback to learners, reinforcing
understanding and facilitating self-assessment.

10. Assessment Integration:


- Integrate assessments within multimedia content to gauge learner
progress and understanding.

Creating Multimedia in Education:

1. Software and Tools:


- Select appropriate software and tools for multimedia creation based on the
project requirements.

2. Media Production Skills:


- Possess skills in media production, including graphic design, video editing,
audio recording, and interactive content development.
63
Elective ICT Notes Compiled by Yaw Preko AMASTECH

3. Quality Standards:
- Adhere to quality standards for multimedia content, ensuring clear visuals,
crisp audio, and smooth interactions.

4. File Formats:
- Use compatible and widely supported file formats for multimedia elements
to ensure accessibility across devices.

5. Copyright Compliance:
- Respect copyright laws and use only licensed or open-access multimedia
elements in educational materials.

6. Optimization for Delivery:


- Optimize multimedia elements for various delivery platforms, such as web
browsers, learning management systems (LMS), or mobile devices.

7. Scalability:
- Design multimedia content to be scalable for different screen sizes and
resolutions.

8. Load Time Optimization:


- Ensure that multimedia content loads efficiently, minimizing waiting times
for learners.

9. Collaboration:

64
Elective ICT Notes Compiled by Yaw Preko AMASTECH

- Collaborate with subject matter experts, educators, and instructional


designers to ensure accuracy and relevance.

10. Pilot Testing:


- Conduct pilot tests with a sample audience to identify and address any
issues before full implementation.

Using Multimedia in Education:

1. Infrastructure:
- Ensure that the educational institution has the necessary infrastructure,
including devices and internet connectivity, to support multimedia use.

2. Training for Educators:


- Provide training for educators on how to effectively integrate multimedia
into their teaching methods.

3. Technical Support:
- Establish a system for technical support to address any issues that may
arise during multimedia use.

4. Assessment Alignment:
- Align assessments with multimedia content to evaluate the impact on
learning outcomes.

5. Feedback Mechanism:
- Establish channels for collecting feedback from both educators and
learners to continuously improve multimedia materials.
65
Elective ICT Notes Compiled by Yaw Preko AMASTECH

6. Monitoring and Evaluation:


- Regularly monitor the usage of multimedia in education and evaluate its
effectiveness in achieving educational goals.

7. Adaptability:
- Ensure that multimedia content is adaptable to diverse learning styles and
preferences.

8. Continuous Updates:
- Keep multimedia content updated with the latest information, technologies,
and educational standards.

9. Usage Policies:
- Establish and communicate clear policies regarding the appropriate use of
multimedia resources in an educational context.

10. Data Security and Privacy:


- Implement measures to ensure the security and privacy of data associated
with multimedia use in education.

By addressing these requirements at each stage, educators and instructional


designers can create and utilize multimedia in education more effectively,
enhancing the learning experience for students.

66
Elective ICT Notes Compiled by Yaw Preko AMASTECH

ADVANTAGES OF USING MULTIMEDIA IN EDUCATION


Using multimedia in education offers numerous advantages, enhancing the
learning experience for students and educators alike. Here are some key
benefits:

1. Enhanced Engagement:
- Multimedia captures and maintains students' attention through a
combination of visuals, audio, and interactive elements, making learning more
engaging.

2. Catering to Different Learning Styles:


- Multimedia allows for a diverse range of content, accommodating various
learning styles such as visual, auditory, and kinesthetic preferences.

3. Improved Retention:
- The combination of text, images, and audio can enhance information
retention by appealing to multiple senses, reinforcing learning through
different channels.

4. Facilitates Understanding of Complex Concepts:


- Visual aids, animations, and simulations can help clarify complex or
abstract concepts, making them more accessible and easier to understand.

5. Promotes Interactivity:
- Interactive elements, such as quizzes, games, or clickable content,
encourage active participation, fostering a deeper understanding of the
subject matter.

67
Elective ICT Notes Compiled by Yaw Preko AMASTECH

6. Flexible Learning:
- Multimedia allows for flexibility in learning, enabling students to access
materials at their own pace and revisit content as needed.

7. Real-world Applications:
- Multimedia can bring real-world scenarios into the classroom, providing
practical examples and applications that enhance the relevance of the
educational content.

8. Global Access to Information:


- Online multimedia resources offer students access to a vast array of
information, connecting them to global perspectives and resources beyond
traditional textbooks.

9. Time Efficiency:
- Multimedia presentations can convey information more efficiently than
traditional methods, allowing for a more focused and time-effective learning
experience.

10. Increased Motivation:


- Multimedia, particularly gamified elements, videos, and interactive
content, can motivate students by making the learning process more
enjoyable and rewarding.

11. Supports Differentiation:


- Multimedia materials can be adapted to accommodate different learning
levels, allowing for personalized learning experiences based on individual
student needs.

68
Elective ICT Notes Compiled by Yaw Preko AMASTECH

12. Preparation for the Digital Age:


- Integrating multimedia in education prepares students for the digital age,
equipping them with skills in navigating and creating digital content.

13. Accessible Anytime, Anywhere:


- Multimedia content can be accessed remotely, enabling students to learn
outside the traditional classroom setting and facilitating distance education.

14. Enhanced Communication:


- Multimedia allows for more dynamic communication between educators
and students, fostering collaborative learning environments.

15. Feedback Mechanism:


- Multimedia tools often incorporate instant feedback, allowing students to
assess their understanding and providing educators with insights into student
progress.

69

You might also like