Second Semester Note
Second Semester Note
DATA REPRESENTATION
What is a data type?
A data type has several definitions. Let me give you a few of them:
A data type is an attribute of a piece of data that tells a device how the end-user
might interact with the data.
A data type is a type of value a variable has and what type of mathematical, relational
or logical operations can be applied without causing an error.
A data type is an attribute associated with a piece of data that tells a computer
system how to interpret its value.
A data type is a classification of data which tells the compiler or interpreter how the
programmer intends to use the data.
You can also think of data types as categorizations that different coding programs
might combine in order to execute certain functions.
Our interactions (inputs and outputs) with computer programs are treated in many
languages as a stream of bytes. These bytes represent data that can be interpreted as
representing values that we understand. Additionally, within a program, we process this
data in various ways such as adding them up or sorting them. This data comes in different
forms. Examples include:
single letter, symbols, etc. – a character
• your name – a string of characters
• your age – usually an integer
• the amount of money in your pocket – usually a value measured in cedis or pesewas
(something with a fractional part)
Understanding data types will help you ensure that the data you collect is always in the
right format and the value is as expected.
1
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Character (char)
It is used to store a single letter, digit, punctuation mark, symbol, or blank space.
2
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Integer (int)
It is the most common numeric data type used to store numbers without a fractional
component (-707, 0, 707).
Boolean (bool)
It represents the values true and false. When working with the boolean data type, it is
helpful to keep in mind that sometimes a boolean value is also represented as 0 (for false)
and 1 (for true).
Array
Also known as a list, an array is a data type that stores a number of elements in a specific
order, typically all of the same type.
Since an array stores multiple elements or values, the structure of data stored by an array
is referred to as an array data structure.
Each element of an array can be retrieved using an integer index (0, 1, 2,…), and the total
number of elements in an array represents the length of an array.
For example, an array variable genre can store one or more of the elements rock, jazz, and
blues. The indices of the three values are 0 (rock), 1 (jazz), and 2 (blues), and the length of
the array is 3 (since it contains three elements).
3
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Continuing on the example of the music app, if you are asked to choose one or more of the
three genres and you happen to like all three (cheers to that), the variable genre will store
all three elements (rock, jazz, blues).
Date
Needs no explanation; typically stores a date in the YYYY-MM-DD format (ISO 8601
syntax).
Time
Stores a time in the hh:mm:ss format. Besides the time of the day, it can also be used to
store the time elapsed or the time interval between two events which could be more than
24 hours. For example, the time elapsed since an event took place could be 72+ hours
(72:00:59).
Datetime
Stores a value containing both date and time together in the YYYY-MM-DD hh:mm:ss
format.
Timestamp
Typically represented in Unix time, a timestamp represents the number of seconds that
have elapsed since midnight (00:00:00 UTC), 1st January 1970.
It is typically used by computer systems to log the precise date and time of an event, down
to the number of seconds, in a format that is unaffected by time zones. Therefore unlike
datetime, timestamp remains the same irrespective of your geographical location.
Conclusion
Different programming languages offer various other data types for a variety of purposes,
however, the most commonly used data types that you need to know to become data-led
have been covered.
A good way to think about data types is when you come across any form or survey.
Looking at a standard registration form, you should keep in mind that each field accepts
values of a particular data type.
A text field stores the input as a string while a number field typically accepts an integer.
Names and email addresses are always of the type string, while numbers can be stored as a
numerical type or as string since a string is a set of characters including digits.
In single option or multiple option fields, where one has to select from predefined options,
data types enumerated type and arrays come into play.
4
Elective ICT Notes Compiled by Yaw Preko AMASTECH
What’s a bit?
The smallest unit of information is a bit. Even the largest mountains of data start there,
since a bit is the smallest possible distinction that a computer can make: 1 or 0. In
programming, this is called a “Boolean”. There’s nothing smaller than a bit – the state 1 or 0
for digital applications, and since computers communicate in binary, data sets are
calculated in ones and zeros.
The word “bit” is an abbreviation for “binary information digit” and was used for the first
time by American mathematician John W. Turkey in a Bells Lab memo. The term started
5
Elective ICT Notes Compiled by Yaw Preko AMASTECH
being more widely used after Claude E. Shannon used it in his 1948 treatise “A
Mathematical Theory of Communication”.
What is a byte?
The word “byte” (B) was coined in 1956 by IBM engineer Werner Buchholz to describe a
group of bits. Data quantities and thus also storage units in computers are always
given in bytes.
One byte consists of 8 bits and is abbreviated by a “B”. Since one bit can convey one of two
states (i.e., 1 or 0), a byte can convey 256 (28) different states. That’s because each of the
8 bits in a byte presents 8 chances for a bit to be set to 1:
10000000
01000000
00100000
00010000
00001000
00000100
00000010
00000001
Binary prefixes, also referred to as IEC prefixes, define data quantities in powers of two
(i.e., 2x). Decimal prefixes, also called SI prefixes, stand for powers of ten (i.e., 10x).
6
Elective ICT Notes Compiled by Yaw Preko AMASTECH
You might have already noticed that commercial indications of storage units (e.g. KB, GB, or
TB) are not always accurate. That’s because binary prefixes can more accurately represent
storage units in computers but aren’t the official unit for describing quantities of data. For
example, 1 kilobyte is supposedly 1,000 bytes in the decimal system. But 1 KB is 1,024
bytes. The International Electronic Commission (IEC), which is responsible for setting
standards for electronics, officially recommends using binary prefixes. However, aside from
Linux systems, binary prefixes have yet to gain widespread use.
One page of text with 1,800 characters including spaces thus corresponds to about 1,800
bytes or 1-2 kilobytes. In programs like Word, formatting and graphics can quickly bring
that number up to 10-12 KB. But these are still very small units of storage for computers.
In contrast, a smartphone with a 12-megapixel camera takes photos that are 2-4.5 MG per
picture. Commercially available laptops have 8, 12 or 16 GB in RAM. And hard drives have
long been available in the terabyte range.
7
Elective ICT Notes Compiled by Yaw Preko AMASTECH
The following chart might help you understand the conversions between storage units:
This next chart provides an overview of how many bytes each data quantity contains when using
decimal prefixes for binary units (as is standard practice):
Kilobyte 1,024
Megabyte 1,048,576
Gigabyte 1,073,741,824
Terabyte 1,099,511,627,776
Petabyte 1,125,899,906,842,624
8
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Exabyte 1,152,921,504,606,846,976
Zettabyte 1,180,591,620,717,411,303,424
Yottabyte 1,208,925,819,614,629,174,706,176
The next biggest units of storage in computers are petabytes and exabytes, which are
mostly relevant in the everyday business of tech giants like Google and Apple. Google
reports that it has a data volume between 10 and 15 exabytes. That amounts to around 30
million computers put together.
Zetta- and yottabytes
Exabytes are followed by zettabytes, the unit used to describe the amount of data
generated annually. It’s estimated that humanity produced up to 59 zettabytes of data in
2020 alone. Zettabytes are followed by yottabytes, and this is where things begin to get a
bit theoretical. The yottabyte is the biggest storage capacity currently accepted by the
International System of Units. Yottabytes are mostly relevant in the context of the personal
data intelligence agencies have stored worldwide - very big data.
9
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Whereas storage units in terabytes are still comprehensible, dimensions like 175
zettabytes are abstract and near impossible to grasp. These simple, concrete examples
make it a bit clearer:
1 nibble = 4 bits
1 byte = 1 letter/character
According to scientists, the storage capacity of the human brain is estimated to be around
2.5 petabytes. That’s 1,024 external hard drives with 1 terabyte storage volume each. Why
we still can’t seem to remember our email passwords or friends’ birthdays remains a
mystery!
10
Elective ICT Notes Compiled by Yaw Preko AMASTECH
For example, the capital letter "A" is represented by the ASCII code 65, and the lowercase
letter "a" is represented by the ASCII code 97.
2. Binary Representation:
In computer storage, these numerical ASCII values are stored as sequences of 0s and 1s,
which are the binary digits (bits).
The ASCII value 65 for "A" is represented as 01000001 in binary (using 8 bits).
The ASCII value 97 for "a" is represented as 01100001 in binary (using 8 bits).
3. Bit Patterns:
These sequences of 0s and 1s are known as bit patterns. Each character has its unique bit
pattern based on its corresponding ASCII code.
A group of 8 bits is often referred to as a "byte," and this is a common storage unit for
characters in computer memory.
4. Text Files:
When you create or save a text file on a computer, the characters within the file are stored
as their respective ASCII or Unicode values in binary format.
5. Character Sets:
Different languages and regions have their own character sets and encodings. ASCII is
suitable for the English language, but languages with non-Latin scripts (e.g., Chinese,
Arabic, Russian) require extended character sets like Unicode to represent their characters.
6. Unicode:
Unicode is a character encoding standard that can represent characters from nearly all
writing systems around the world. It uses a wider range of bits (usually 16 bits or 32 bits
per character) to represent a vast array of characters and symbols.
7. Variable-Length Encodings:
Some character encoding schemes, like UTF-8 (a variable-length encoding of Unicode),
allow characters to be represented using different numbers of bits based on their
complexity. This makes it efficient for representing a wide range of characters while
keeping file sizes smaller.
11
Elective ICT Notes Compiled by Yaw Preko AMASTECH
In summary, characters are represented in computer storage as binary bit patterns using
encoding schemes like ASCII or Unicode. These encodings allow computers to store and
process text and characters, providing a standardized way to represent and exchange
textual information in a digital format.
12
Elective ICT Notes Compiled by Yaw Preko AMASTECH
BINARY ARITHMETIC
Decimal to Binary
Decimal to binary conversion is done through various methods. One of the
methods to convert decimal to binary is by dividing the given decimal number
recursively by 2. Then, the remainders are noted down till we get 0 as the final
quotient. After this step, these remainders are written in reverse order to get
the binary value of the given decimal number. A number system is a
mathematical way of representing numbers using a set of digits or symbols.
There are different number systems like the decimal number system, the
binary number system, the octal, and the hexadecimal number system. These
are identified with the help of the base that they have. Numbers can be easily
converted from one base to another using some defined rules.
The binary number system is a number system with base 2 in which numbers
are represented only by two digits, 0 and 1. The smallest unit of data in a
computer is called a bit, which is the abbreviated form of 'binary digit'. A bit
has a single binary value which is either 1 or 0. Binary numbers are written as
1102, 102 and are mostly used in computers for programming or coding since
the computer understands the language of only the binary digits, that is, 0 and
1. It should be noted that in a binary number, the bit to the extreme left is
called the Most Significant Bit (MSB), and the bit to the extreme right end is
known as the Least Significant Bit (LSB). The remaining part shows the
magnitude of the number.
Step 1: Divide the given decimal number by 2 and note down the remainder.
Step 2: Now, divide the obtained quotient by 2, and note the remainder again.
Step 3: Repeat the above steps until you get 0 as the quotient.
Step 4: Now, write the remainders in such a way that the last remainder is written first,
followed by the rest in the reverse order.
Step 5: This can also be understood in another way which states that the Least Significant
Bit (LSB) of the binary number is at the top and the Most Significant Bit (MSB) is at the
bottom. This number is the binary value of the given decimal number.
Solution: We will start dividing the given number (13) repeatedly by 2 until we
get the quotient as 0. We will note the remainders in order.
14
Elective ICT Notes Compiled by Yaw Preko AMASTECH
13 ÷ 2 6 1 (LSB)
6÷2 3 0
3÷2 1 1
1÷2 0 1 (MSB)
After noting the remainders, we will write them in such a way that the Most
Significant Bit (MSB) of the binary number is written first, followed by the rest.
Therefore, the binary equivalent for the given decimal number 1310 is 11012.
This means that 1310 = 11012.
15
Elective ICT Notes Compiled by Yaw Preko AMASTECH
0 0
1 1
2 10
3 11
4 100
5 101
6 110
7 111
8 1000
9 1001
10 1010
11 1011
12 1100
13 1101
16
Elective ICT Notes Compiled by Yaw Preko AMASTECH
14 1110
15 1111
16 10000
17 10001
18 10010
19 10011
20 10100
Solution: For decimal to binary conversion, let us first divide the given number by 2 and
note down the remainders as shown in the following table.
174 ÷ 2 87 0 (LSB)
87 ÷ 2 43 1
43 ÷ 2 21 1
21 ÷ 2 10 1
10 ÷ 2 5 0
17
Elective ICT Notes Compiled by Yaw Preko AMASTECH
5÷2 2 1
2÷2 1 0
1÷2 0 1 (MSB)
After noting the remainders, we write them in the reverse order such that the Most
Significant Bit (MSB) is written first, and the Least Significant Bit is written in the end.
Hence, the binary equivalent for the given decimal number 17410 is 101011102.
Example 2: Convert the following decimal number into binary number: 156
Solution: To convert 15610 to the binary number system, let us divide it repeatedly
by 2 and note the remainders as shown below.
156 ÷ 2 78 0 (LSB)
78 ÷ 2 39 0
39 ÷ 2 19 1
19 ÷ 2 9 1
9÷2 4 1
4÷2 2 0
2÷2 1 0
1÷2 0 1 (MSB)
18
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Octal to Binary
In mathematics, there are different number systems to write numbers, say
binary number system (base 2), octal number system (base 8), decimal (base
10), and hexadecimal number system (base 16). Octal to binary conversion is
defined as converting a number from base-8 to base-2. It can be done in two
ways that you will learn in this article. Let us move ahead and learn the
conversion of octal to binary.
19
Elective ICT Notes Compiled by Yaw Preko AMASTECH
In this method, we will first convert a number from octal to decimal (base 10),
and then we will convert that decimal number to binary. To convert a number
from octal to decimal, we multiply its digits starting from the right with 8 raised
to exponents starting from 0 and then add the values. So, the first digit from the
right will be multiplied by 80, which is equal to 1, the second digit will be
multiplied by 81 = 8, and so on.
20
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Let us take an example of the number 568. The 8 written as the base
represents that this is a base-8 number. 568 can be converted to base 10 as,
568 = 6 × 80 + 5 × 81
568 = 6 × 1 + 5 × 8
= 6 + 40
= 46
Hence, 568 = 4610. Now, we will convert 46 which is a base 10 number to its
binary equivalent. To convert decimal to binary, divide the given number by 2
and note down the quotient and reminder. Again divide the quotient obtained
by 2, and note down the remainder. Repeat this process till you get 0 as the
quotient. Write the remainders in order from right to left. Let us convert 46 10 to
binary.
11 ÷ 2 = Quotient - 5, remainder - 1
5 ÷ 2 = Q - 2, R - 1
2 ÷ 2 = Q - 1, R - 0
1 ÷ 2 = Q - 0, R - 1
4610 = 1011102
21
Elective ICT Notes Compiled by Yaw Preko AMASTECH
to its binary equivalent by referring to the above chart. For example, using this
method we can directly write 38 as 0112, 58 as 1012, etc.
Let us convert the same number 568 from octal to binary using the direct
method. There are two digits in this number, 5 and 6. Referring to the above
octal to binary chart:
58 → 1012
68 → 1102
By combining these two, we will get, 568 = 1011102. Observe the image given
below for your reference.
Example 1: Convert the octal number 728 to a binary number using the decimal conversion
method.
22
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Solution: Given octal number 728. To convert it to a binary number using the decimal
conversion method, we will first convert it to a decimal number.
⇒ 728 = 2 × 80 + 7 × 81
⇒ 728 = 2 × 1 + 7 × 8
= 2 + 56
= 5810
⇒ 58 ÷ 2 = Q - 29, R - 0
29 ÷ 2 = Q - 14, R - 1
14 ÷ 2 = Q - 7, R - 0
7 ÷ 2 = Q - 3, R - 1
3 ÷ 2 = Q - 1, R - 1
1 ÷ 2 = Q - 0, R - 1
We get, 5810 = 1110102. Therefore, the octal to binary conversion of the number 728 results
in 1110102.
Example 2: Change the octal number 358 to its binary equivalent using the direct conversion
method.
Solution: To convert an octal number to binary, we can use the octal to binary table with
each of the given digits. The given number is 358. Referring to the table, we have,
38 = 0112
58 = 1012
Solution: Let us convert the given number from octal to binary using the direct conversion
method. The given number is 2358.
28 = 0102
23
Elective ICT Notes Compiled by Yaw Preko AMASTECH
38 = 0112
58 = 1012
24
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Hexadecimal to Binary
Hexadecimal to binary conversion is done to obtain the equivalent binary number of the
hexadecimal. The number system is of four types namely, binary number system, octal number
system, decimal number system, and hexadecimal number system. Each of these number systems
has its own base number that helps in the process of conversion. Hexadecimal to binary is done
on their respective base numbers. Let us learn more about how to convert hexadecimal numbers
to binary numbers.
25
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Step 1: Write the hexadecimal number and find its equivalent decimal number.
26
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Step 2: To find the decimal equivalent, we multiply each digit with 16n-1, where the digit is in
its nth position.
Step 3: After multiplying the numbers, add the product of those numbers to obtain the
decimal number.
Step 4: To convert decimal to binary, we divide the decimal number by 2 by keeping the
remainder aside and dividing the quotient by 2 until we arrive at zero.
Step 5: Once the quotient is zero, we arrange the remainder from bottom to top i.e. reverse
order to obtain the binary number.
Step 3: Multiply the numbers and add the product to obtain the decimal
number.
(100)16(100)16 = 1 × 256 + 0 × 16 + 0 × 1
(100)16(100)16 = 256 + 0 + 0
(100)16(100)16 = 256
Step 4: Convert the decimal number (256)10 to a binary number by dividing the
number by 2 until the quotient is zero.
27
Elective ICT Notes Compiled by Yaw Preko AMASTECH
28
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Step 2: Looking at the conversion table, find the equivalent of each digit.
Step 3: Once the decimal of each digit is obtained, looking at the conversion
table convert each decimal number to binary.
(14)10 = (1110)2
(5)10 = (0101)2
(11)10 = (1011)2
Step 4: Combine all the binary numbers together to obtain the final one.
29
Elective ICT Notes Compiled by Yaw Preko AMASTECH
30
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Step 2: Looking at the conversion table, find the equivalent of each digit. We
do not take the zero into consideration.
Step 3: Once the decimal of each digit is obtained, looking at the conversion
table convert each decimal number to binary.
(12)10 = (1100)2
(4)10 = (0100)2
(8)10 = (1000)2
Step 4: Combine all the binary numbers together to obtain the final one. The
zero before the decimal will be written along with the final binary number.
The decimal equivalent of the hexadecimal digits by using the conversion table are:
The binary equivalent of these decimal numbers by using the conversion table are:
1310 = 11012
31
Elective ICT Notes Compiled by Yaw Preko AMASTECH
1410 = 11102
810 = 10002
The decimal equivalent of the hexadecimal digits,by using the conversion table and keeping
the decimal point aside, are:
The binary equivalent of these decimal numbers by using the conversion table are:
1010 = 10102
110 = 00012
210 = 00102
Combining the binary numbers together along with the decimal point,
Example 3: Convert hexadecimal 3516 to binary without using the conversion table.
3516 = 3 × 16 + 5 × 1
3516 = 48 + 5
3516 = 53
32
Elective ICT Notes Compiled by Yaw Preko AMASTECH
3516 = 5310.
53/2 26 1
26/2 13 0
13/2 6 1
6/2 3 0
3/2 1 1
½ 0 1
33
Elective ICT Notes Compiled by Yaw Preko AMASTECH
COMPUTER SOFTWARE
Introduction to Computer Software
Computer software refers to a set of instructions, data, or programs that
enable a computer to perform specific tasks. It's a crucial component that
allows hardware to function and provides a user interface for interaction.
Types of Software
There are several types of software, and they can be broadly categorized into
three main types:
1. System Software:
- Operating System (OS): This is the core software that manages hardware
resources and provides essential services for other software applications.
Examples include Windows, macOS, and Linux.
- Device Drivers: These are specific types of system software that allow the
operating system to communicate with and control hardware components like
printers, graphics cards, and more.
2. Application Software:
- Productivity Software: Includes tools like word processors (Microsoft
Word, Google Docs), spreadsheets (Microsoft Excel, Google Sheets), and
presentation software (Microsoft PowerPoint, Google Slides).
- Media Players: Software designed for playing audio and video files, such as
VLC Media Player or Windows Media Player.
- Web Browsers: Enable users to access and interact with websites,
examples include Google Chrome, Mozilla Firefox, and Safari.
3. Utility Software:
- Antivirus Programs: Protect the computer from malicious software and
viruses.
34
Elective ICT Notes Compiled by Yaw Preko AMASTECH
A. OPERATING SYSTEMS
Operating systems (OS) are software programs that act as an intermediary
between computer hardware and the user. They provide a set of essential
services and manage the computer's resources to ensure efficient and secure
operation.
Types of Operating Systems
There are several types of operating systems, and they can be categorized
based on their use and functionality. Here are some common types:
1. Single-User, Single-Tasking OS:
This type of OS allows only one user to execute one task at a time. It's a simple
system designed for personal use, often found in early personal computers.
2. Single-User, Multi-Tasking OS:
In this type, a single user can perform multiple tasks simultaneously. Modern
desktop and laptop operating systems like Windows, macOS, and various
Linux distributions fall into this category.
3. Multi-User OS:
Multi-user operating systems allow multiple users to access a computer
system simultaneously. These are commonly used in server environments,
where multiple users need access to resources. Unix and Linux servers often
use multi-user operating systems.
4. Real-Time OS:
Real-time operating systems are designed to process data and events as they
occur. They are critical in systems where timing and responsiveness are
crucial, such as in embedded systems, industrial control systems, and some
scientific applications.
35
Elective ICT Notes Compiled by Yaw Preko AMASTECH
5. Network OS:
These operating systems are optimized for network functions. They facilitate
communication between different computers and devices in a network.
Examples include Novell NetWare and Windows Server.
6. Distributed OS:
Distributed operating systems manage a group of independent computers and
make them appear to be a single computer. They enable users to share
resources and coordinate tasks across a network. Examples include Amoeba
and Google's Fuchsia.
7. Mobile OS:
Designed for mobile devices like smartphones and tablets, mobile operating
systems are tailored to the constraints and features of these devices. Examples
include Android, iOS, and HarmonyOS.
8. Embedded OS:
Embedded operating systems are built into and optimized for specific
hardware. They are commonly found in devices like ATMs, digital cameras,
and appliances. Examples include VxWorks and FreeRTOS.
9. Multi-Processor OS:
These operating systems are designed to work with multiple processors. They
manage the coordination and communication between multiple processors to
execute tasks efficiently. Examples include Windows NT and Unix.
Each type of operating system serves specific needs and requirements,
reflecting the diversity of computing environments and devices.
36
Elective ICT Notes Compiled by Yaw Preko AMASTECH
2. Process Management:
OS manages processes, which are instances of executing programs. It allocates
resources, such as CPU time and memory, to different processes and ensures
their orderly execution.
3. Memory Management:
Operating systems handle the allocation and deallocation of memory for
programs and data. They also manage virtual memory, allowing programs to
use more memory than physically available by swapping data between RAM
and disk.
4. File System Management:
OS provides a file system that organizes and stores data on storage devices. It
manages files, directories, and access permissions, ensuring efficient storage
and retrieval of data.
5. Device Management:
Operating systems communicate with and control peripheral devices such as
printers, disks, and network interfaces. Device drivers are specific software
components that facilitate this communication.
6. Security and Access Control:
OS enforces security measures, controlling access to the system and its
resources. This includes user authentication, file permissions, and encryption
to protect data and ensure the integrity of the system.
7. User Interface:
Operating systems provide a user interface through which users interact with
the computer. This can be a command-line interface (CLI) or a graphical user
interface (GUI), depending on the OS.
8. Networking:
Many operating systems include networking capabilities, allowing computers
to communicate with each other over local or wide-area networks. This is
crucial for sharing resources and accessing services.
9. Error Handling:
37
Elective ICT Notes Compiled by Yaw Preko AMASTECH
OS detects and handles errors that may occur during the operation of the
computer system. It may provide error messages, log events, and take
corrective actions to maintain system stability.
B. UTILITY PROGRAMS
Utility programs are software tools designed to perform various maintenance,
management, and optimization tasks on a computer system. They serve
essential functions to keep a computer running efficiently and securely.
Examples of Utility Programs:
1. Antivirus Software: Protects your system from malware, viruses, and
other threats.
2. Disk Cleanup: Helps you free up space on your hard drive by deleting
temporary and unnecessary files.
3. Disk Defragmenter: Optimizes the layout of files on a hard disk to improve
access times.
4. Backup Software: Creates copies of your data for recovery in case of data
loss.
5. File Compression Tools: Compresses files to save storage space and
facilitate data transfer.
6. System Monitoring Tools: Monitors system performance, providing
insights into resource usage.
7. Registry Cleaners: Cleans and optimizes the Windows registry to improve
system performance.
8. Password Managers: Store and manage passwords securely.
9. Uninstaller Software: Safely removes unwanted programs and their
associated files.
10. File Recovery Tools: Helps recover deleted or lost files.
38
Elective ICT Notes Compiled by Yaw Preko AMASTECH
C. APPLICATION SOFTWARE
Application software, often referred to as "apps," is a type of computer
program designed to perform specific tasks or functions for the user. It is a
broad category of software that covers a wide range of applications and
programs used on computers, smartphones, tablets, and other digital devices.
Application software is distinct from system software, which manages the
hardware and provides the basic functions needed to operate the computer.
Here are some key characteristics and examples of application software:
1. Specific Functionality: Application software is created to perform
particular tasks or provide specific features. For instance, word processing
software (like Microsoft Word) is designed for creating documents, while web
browsers (like Google Chrome) are used for accessing the internet.
39
Elective ICT Notes Compiled by Yaw Preko AMASTECH
40
Elective ICT Notes Compiled by Yaw Preko AMASTECH
activities and are designed to meet diverse user needs. Here are some
common types of application software:
2. Spreadsheet Software:
- Examples: Microsoft Excel, Google Sheets
- Function: Used for creating, analyzing, and managing data in tabular form.
It's especially useful for financial calculations and data organization.
3. Presentation Software:
- Examples: Microsoft PowerPoint, Google Slides
- Function: Enables users to create slideshows and presentations with text,
images, and multimedia elements.
4. Web Browsers:
- Examples: Google Chrome, Mozilla Firefox
- Function: Provides access to the internet and allows users to browse
websites, search for information, and interact online.
5. Email Clients:
- Examples: Microsoft Outlook, Mozilla Thunderbird, Google Mail (Gmail)
- Function: Manages email accounts, sending, receiving, and organizing
emails.
41
Elective ICT Notes Compiled by Yaw Preko AMASTECH
6. Media Players:
- Examples: VLC Media Player, Windows Media Player
- Function: Plays audio and video files, providing a multimedia experience on
the computer.
8. Gaming Software:
- Examples: Minecraft, Fortnite
- Function: Provides a platform for playing video games on a computer.
42
Elective ICT Notes Compiled by Yaw Preko AMASTECH
43
Elective ICT Notes Compiled by Yaw Preko AMASTECH
These are just some of the many types of application software available, and
new ones are continually being developed to cater to evolving user needs and
technological advancements. Users can choose from this wide variety of
software to enhance their productivity, creativity, communication, and
entertainment on their computers and digital devices.
45
Elective ICT Notes Compiled by Yaw Preko AMASTECH
46
Elective ICT Notes Compiled by Yaw Preko AMASTECH
1. Slow performance:
- Insufficient RAM or storage space.
- Too many background processes.
- Fragmented hard drive.
Suggested Solution:
- Upgrade RAM or storage space.
- Close unnecessary background processes.
- Defragment the hard drive.
2. Freezing or crashing:
- Incompatible or outdated drivers.
- Software conflicts.
47
Elective ICT Notes Compiled by Yaw Preko AMASTECH
48
Elective ICT Notes Compiled by Yaw Preko AMASTECH
7. Hardware failures:
- Aging or faulty components.
- Overheating.
- Power surges.
Suggested Solution:
- Replace aging or faulty components.
- Improve cooling mechanisms to prevent overheating.
- Use surge protectors to guard against power surges.
49
Elective ICT Notes Compiled by Yaw Preko AMASTECH
8. Noise or overheating:
- Dust accumulation in fans.
- Inadequate cooling.
- Malfunctioning hardware components.
Suggested Solution:
- Clean dust from fans and ensure proper ventilation.
- Upgrade cooling systems if necessary.
- Replace malfunctioning hardware components.
9. Power issues:
- Fluctuations in power supply.
- Faulty power cables or adapters.
- Power surges or outages.
Suggested Solution:
- Use a stable power supply.
- Replace faulty power cables or adapters.
- Invest in a surge protector or uninterruptible power supply (UPS).
TROUBLESHOOTING
Troubleshooting is the process of systematically identifying, analyzing, and
solving problems in a system or device. In the context of computers or
technology, troubleshooting is often used to diagnose and fix issues that affect
the normal functioning of hardware, software, or the overall system. It
involves a logical and methodical approach to identify the root cause of a
problem and implement solutions to resolve it.
50
Elective ICT Notes Compiled by Yaw Preko AMASTECH
51
Elective ICT Notes Compiled by Yaw Preko AMASTECH
1. Check connections:
- Ensure all cables are properly connected.
- Verify power supply and peripheral connections.
2. Restart the computer:
- Rebooting can resolve many issues by clearing temporary glitches.
3. Update software:
- Install the latest operating system and software updates.
4. Check for malware:
- Run a thorough antivirus and anti-malware scan.
5. Review error messages:
- Examine any error messages for clues to the problem.
6. Monitor system resources:
- Check Task Manager (Windows) or Activity Monitor (Mac) for high
resource usage.
7. Verify hardware connections:
- Ensure components like RAM, GPU, and storage are properly seated.
8. Update drivers:
- Make sure all device drivers are up-to-date.
9. Check for overheating:
- Monitor temperatures and clean dust from fans and vents.
10. Test in safe mode:
- Boot the system in safe mode to identify software-related issues.
11. Restore to a previous state:
52
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Remember, the specific steps may vary based on the operating system and the
nature of the problem.
Hardware Setup:
1. Unpack Components:
- Unbox the computer case, monitor, keyboard, mouse, and any other
peripherals.
2. Connect Power Supply:
- Connect the power cable to the computer case and plug it into a power
outlet.
3. Connect Monitor:
53
Elective ICT Notes Compiled by Yaw Preko AMASTECH
- Attach the monitor cable (HDMI, VGA, DisplayPort) to both the monitor and
the computer.
4. Connect Peripherals:
- Connect the keyboard and mouse to available USB ports.
5. Connect Speakers or Headphones:
- If using external audio devices, connect them to the appropriate ports.
6. Connect Network Cable:
- If not using Wi-Fi, connect an Ethernet cable for internet access.
7. Power On:
- Press the power button on the computer case to turn it on.
Software Setup
1. Operating System Installation:
- If the computer doesn't have an operating system installed, follow on-
screen prompts to install one.
2. Driver Installation:
- Install drivers for essential components such as graphics, sound, and
network adapters. You can use the drivers provided with your hardware or
download the latest versions from the manufacturers' websites.
3. Update Operating System:
- After installation, ensure the operating system is up-to-date by installing
any available updates.
4. Install Antivirus Software:
- Install antivirus software to protect your computer from malware.
5. Create User Accounts:
- Set up user accounts with passwords for security.
6. Customize Settings:
54
Elective ICT Notes Compiled by Yaw Preko AMASTECH
Once you've completed these steps, your computer should be set up and ready
for use. However, you can adjust any additional settings based on your
preferences and needs.
55
Elective ICT Notes Compiled by Yaw Preko AMASTECH
56
Elective ICT Notes Compiled by Yaw Preko AMASTECH
2. Back Up Data:
- Before upgrading, back up any important data associated with the software
to prevent data loss in case of issues.
3. Check for Updates:
- If upgrading within the same version, ensure that you have installed all
available updates. For major upgrades, visit the software's official website to
download the latest version.
4. Uninstall Previous Version (if necessary):
- Some software requires uninstalling the previous version before
upgrading. Follow the software's documentation for guidance.
5. Run the Installer for the New Version:
- Execute the installer for the new version and follow the same steps as in
the installation process.
6. Customize Installation (if applicable):
- If the upgrade allows customization, review and select your preferences.
7. Install Updates (if prompted):
- During the installation, allow the software to check for and install any
updates.
8. Complete Upgrade:
- Once the upgrade is finished, review any post-upgrade instructions and
launch the updated software.
9. Test the Upgraded Software:
- Perform basic functions to ensure the upgraded software is working as
expected.
10. Update Settings (if necessary):
- Review and update any settings or preferences that may have changed
with the new version.
57
Elective ICT Notes Compiled by Yaw Preko AMASTECH
2. E-learning:
- The use of electronic technologies for educational delivery, including online
courses, digital resources, and interactive multimedia.
3. Blended Learning:
- A mix of traditional face-to-face instruction and online learning, combining
the strengths of both approaches.
5. Digital Literacy:
- The ability to use, understand, and critically evaluate information from
various digital sources.
6. ICT Infrastructure:
58
Elective ICT Notes Compiled by Yaw Preko AMASTECH
- The hardware, software, and network components that support the use of
ICT in education.
7. Interactive Whiteboard:
- A touch-sensitive display connected to a computer, used for interactive
teaching and presentations.
8. Online Assessment:
- Evaluation of students' knowledge and skills conducted through digital
platforms.
9. Digital Citizenship:
- The responsible and ethical use of technology, including online behavior
and awareness of digital rights and responsibilities.
11. Webinar:
- A live, online educational presentation or seminar conducted over the
internet.
59
Elective ICT Notes Compiled by Yaw Preko AMASTECH
13. Gamification:
- Integrating game elements, such as points and rewards, into educational
activities to enhance engagement and motivation.
MULTIMEDIA IN EDUCATION
Multimedia refers to the integration of various forms of media, such as text,
graphics, audio, video, and animations, to convey information or tell a story.
The term "multimedia" is a combination of "multi" (meaning many) and
"media" (representing various forms of communication). In a multimedia
60
Elective ICT Notes Compiled by Yaw Preko AMASTECH
3. Audio: Recorded sounds, music, or spoken words that enhance the auditory
experience.
61
Elective ICT Notes Compiled by Yaw Preko AMASTECH
1. Educational Objectives:
- Clearly define the educational goals and learning outcomes that multimedia
content aims to achieve.
2. Audience Analysis:
- Understand the characteristics, preferences, and prior knowledge of the
target audience to tailor multimedia content accordingly.
3. Content Relevance:
- Ensure that multimedia elements align with the curriculum and contribute
meaningfully to the learning objectives.
4. Accessibility:
- Design content with accessibility in mind, considering diverse learning
needs, including those with disabilities.
5. Interactivity:
- Incorporate interactive elements that engage learners and encourage
active participation.
6. Media Integration:
62
Elective ICT Notes Compiled by Yaw Preko AMASTECH
7. Storyboarding:
- Create a detailed storyboard outlining the sequence of multimedia
elements and interactions.
9. Feedback Mechanism:
- Include mechanisms for providing feedback to learners, reinforcing
understanding and facilitating self-assessment.
3. Quality Standards:
- Adhere to quality standards for multimedia content, ensuring clear visuals,
crisp audio, and smooth interactions.
4. File Formats:
- Use compatible and widely supported file formats for multimedia elements
to ensure accessibility across devices.
5. Copyright Compliance:
- Respect copyright laws and use only licensed or open-access multimedia
elements in educational materials.
7. Scalability:
- Design multimedia content to be scalable for different screen sizes and
resolutions.
9. Collaboration:
64
Elective ICT Notes Compiled by Yaw Preko AMASTECH
1. Infrastructure:
- Ensure that the educational institution has the necessary infrastructure,
including devices and internet connectivity, to support multimedia use.
3. Technical Support:
- Establish a system for technical support to address any issues that may
arise during multimedia use.
4. Assessment Alignment:
- Align assessments with multimedia content to evaluate the impact on
learning outcomes.
5. Feedback Mechanism:
- Establish channels for collecting feedback from both educators and
learners to continuously improve multimedia materials.
65
Elective ICT Notes Compiled by Yaw Preko AMASTECH
7. Adaptability:
- Ensure that multimedia content is adaptable to diverse learning styles and
preferences.
8. Continuous Updates:
- Keep multimedia content updated with the latest information, technologies,
and educational standards.
9. Usage Policies:
- Establish and communicate clear policies regarding the appropriate use of
multimedia resources in an educational context.
66
Elective ICT Notes Compiled by Yaw Preko AMASTECH
1. Enhanced Engagement:
- Multimedia captures and maintains students' attention through a
combination of visuals, audio, and interactive elements, making learning more
engaging.
3. Improved Retention:
- The combination of text, images, and audio can enhance information
retention by appealing to multiple senses, reinforcing learning through
different channels.
5. Promotes Interactivity:
- Interactive elements, such as quizzes, games, or clickable content,
encourage active participation, fostering a deeper understanding of the
subject matter.
67
Elective ICT Notes Compiled by Yaw Preko AMASTECH
6. Flexible Learning:
- Multimedia allows for flexibility in learning, enabling students to access
materials at their own pace and revisit content as needed.
7. Real-world Applications:
- Multimedia can bring real-world scenarios into the classroom, providing
practical examples and applications that enhance the relevance of the
educational content.
9. Time Efficiency:
- Multimedia presentations can convey information more efficiently than
traditional methods, allowing for a more focused and time-effective learning
experience.
68
Elective ICT Notes Compiled by Yaw Preko AMASTECH
69