Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
302 views90 pages

Grade 9 Computer Science Notes

The document discusses computer systems and software copyright. It defines software copyright and piracy, explaining that copyright protects software owners from illegal use. Effects of piracy include viruses, lack of support, fines and jail time. Strategies to reduce piracy include educating the public and enforcing copyright laws.

Uploaded by

not.meant.4them
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
302 views90 pages

Grade 9 Computer Science Notes

The document discusses computer systems and software copyright. It defines software copyright and piracy, explaining that copyright protects software owners from illegal use. Effects of piracy include viruses, lack of support, fines and jail time. Strategies to reduce piracy include educating the public and enforcing copyright laws.

Uploaded by

not.meant.4them
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 90

::

GRADE 9

COMPUTER STUDIES

::

1
Table of Contents
CHAPTER 1: COMPUTER SYSTEMS .............................................................................. 4
Software copyright.................................................................................................................. 4
Software Piracy ....................................................................................................................... 5

CHAPTER 2: SPREADSHEETS ....................................................................................... 8


Structure of a spreadsheet ..................................................................................................... 8
Types of data used in a spreadsheet ....................................................................................12
FUNCTION ..............................................................................................................................14
Cell References ......................................................................................................................16
Formatting data in a spreadsheet .........................................................................................17
Data validation .......................................................................................................................18
Sorting Data in a spreadsheet ...............................................................................................19
Data filtering ...........................................................................................................................19
Charts .....................................................................................................................................20

CHAPTER 3: DATA COMMUNICATION ........................................................................ 25


Data communication ..............................................................................................................25
How data is transmitted and received ...................................................................................25
Errors that may can occur during the transmission of data ...................................................26
Data transmission .................................................................................................................28
Transmission media .............................................................................................................30
NETWORKING ........................................................................................................................34
Communications protocol .....................................................................................................34
Types of networks ................................................................................................................34
Network topologies ...............................................................................................................35
Network architecture .............................................................................................................39

CHAPTER 4: INTERNET AND E-MAIL .......................................................................... 44


The Internet ..........................................................................................................................44
Video conferencing ...............................................................................................................46
E-MAIL .................................................................................................................................48

2
Netiquette .............................................................................................................................52

CHAPTER 5: SOCIAL & ECONOMIC IMPLICATIONS .................................................. 54


GENERAL USES OF COMPUTERS .......................................................................................54
Computer Technology in Education ......................................................................................54
Computer Technology in Medicine........................................................................................54
ECONOMIC IMPLICATIONS ...................................................................................................56
Malware (Malicious Software) ...............................................................................................57
DATA SECURITY ....................................................................................................................61
Computer Security Risk ........................................................................................................61

CHAPTER 6: COMPUTER PROGRAMMING ................................................................. 67


Decision making/Selection structures..................................................................................70
Case structure ......................................................................................................................73
Repetition or Looping or Iteration structures ......................................................................75
For... Do loop ........................................................................................................................76
Repeat …… Until Loop .........................................................................................................77
While …… Do Loop ..............................................................................................................79
MOD ........................................................................................................................................81
DIV...........................................................................................................................................82
Trace tables ............................................................................................................................84

3
CHAPTER 1: COMPUTER SYSTEMS
- Define software copyright
- Explain the importance of a software copyright act (i.e. Digital Millennium Copyright Act of
1998)
- discuss the consequences of a software copyright act in today’s society
- discuss the effects of software piracy locally and world wide, develop a strategy to reduce
software piracy within the community

Software copyright
Software copyright is a legal right that prohibits the copying of programs for either personal use or
selling purposes; without the owner’s permission.
It is the legal control of the copying of software to protect the authors of software from illegal use
of their software.

Software Copyright acts


 These are rules which protect owners of software from people who want to use their
software for free.
 This is done to make sure that the owner of the software doesn’t make a loss, and they
are paid for their work.
 It is a criminal offence to use software which you did not purchase unless it is for free.
 You may be fined and in some cases you may even be put in jail
 The illegal use of software is called piracy.

Importance of software copyright acts


1. The Copyright Act of 1980 states that both the individual and organizations can be held
liable for unauthorized duplication and use of copyrighted software.
2. The Digital Millennium Copyright Act of 1998 makes it illegal to promote piracy schemes in
commercial software; outlaws sale of devices that copy software illegally.

4
3. The No Electronic Theft (NET) Act of 1997 restricts on giving away copyrighted material
on the internet without legal repercussions.

Software Piracy
This is the illegal copying of software either for personal use or for sale.

 Users must buy software and get a valid license to use the software. Buying a license
does not make you an owner; it just authorizes you to use the software.

Effects of software piracy

 Pirated software may contain viruses, which can harm your computer
 You will not get any help from the software developer if you have any problems with the
software.
 You can be taken to court and if found guilty you will be jailed or fined.
 Developers lose revenue from pirated software, which holds back development of new
software and suppresses the growth of the software company
 Companies cannot invest in new jobs and new technologies
 It lowers government tax revenues

ACTIVITY MARKS: 15
1. Define the following terms:
Software copyright
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………[2]
Freeware
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………[2]
Open source software
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………[2]

5
Software piracy
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………[2]

2. Explain the importance of a software copyright acts


……..……………………………………………………………………………………………………….…
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………[2]

3. What are the consequences of a software copyright acts in today’s society


……..………………………………………………………………………………………………………
………………………………………………………………………………………………………………
……………………………………………………………………………………………………………[2]
4. What are the effects of software piracy locally and world wide
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………….. [3]

6
 compare and contrast the following:
o open source software
o freeware and shareware
o public domain software

Freeware
This is copyrighted software which you can download and use for free.
 You should be careful when downloading freeware because it may contain viruses
 You should only download Freeware from trusted websites

Shareware
This is copyrighted software which is distributed for free of charge for a trial period.
 After the trial period is over; normally 30 or 60 days, or even a year, you will be required to
buy it in order to keep using it.

Open source software


This is software whose license gives the user the freedom to run the program for any purpose, to
study and modify the program, and to redistribute copies of either the original or the modified
program for free.
This software’s source code is available to the public and they are allowed to make some
changes and distribute it without paying anything.

Public domain software


Public domain software is not copyrighted and has been donated to the public by its creators.
This means anyone can copy or redistribute it to others at no cost.

7
CHAPTER 2: SPREADSHEETS
- define a spreadsheet
- name the characteristics of spreadsheets
- state the purpose of spreadsheets (e.g. accounting, forecasting)
- apply page setup features - margins - orientation
- describe the screen layout and effectively use the elements thereof

Spreadsheet is a program used to perform financial and statistical calculations.

Uses of a spreadsheet:
Calculations using formulae in accounting
Forecasting or What if analysis- a spreadsheet can answer the question what if? For
example what if we increase the price of sugar by 10%, what profit are we going to get?
Producing graphs for data analysis e.g. pie chart, bar graph, line graph etc. Graphs are
easier to read than number

Examples of spreadsheet program are Microsoft office excel, Open office. Calc and Lotus
123.

Structure of a spreadsheet
A spreadsheet is made up of a grid of rows and columns. The columns have letters and rows
have numbers.

Cells

A cell is the intersection of a row and a column. A cell is formed when a row and a column meet.
Data items are entered and stored in cell. Each cell has a cell address or cell reference or cell
name. A cell address is made up of the column letter followed by the row number e.g. A1 B7, and
F12 etc

Active cell

This is the current cell where the cursor is. Anything you type will be entered in the active cell.

8
Formula bar-this displays the contents of the active cell and it displays the formula that was used
to calculate a value.

9
Reference area:

This displays the address of the active cell.

Grid or working area

This is a table of columns and rows. It is a collection of cells where data is entered.

The columns are labeled with letters and rows are labeled with numbers.

Cell range- this is a selected group of cells which come one after the other e.g. B5 to B11 or C1
to C7. A cell range is defined using the colon e.g. B5:B11 or C1:C7

Worksheet

A worksheet is a single page in a spreadsheet.

A workbook is a group of worksheets in a spreadsheet.

A spreadsheet program automatically gives a name to a worksheet. Worksheets are named


sheet1, sheet 2, sheet 3, sheet 4, etc, by default, but the name can be changed.

Template

This is a worksheet that is already designed for particular purpose and it can be used over and
over.

Page Setup

This is the section which allows a user to change how a page will look like when it is printed.
Margins and orientation can be changed in the page setup.

Margins

Margins are the blanks areas of space around the edge of your worksheet.

Orientation

This is the way in which a rectangular page can be viewed when reading the information on it.

There are two types of page orientation, which are portrait and landscape.

Portrait is when a page is taller than it is wide.

Landscape means a page is wider than it is tall.

Wrap text

10
Wrap text allows a user to display long text on multiple lines in a single cell.

11
 Distinguish between:
 Value
 Label
 Formulae
 Function
 adjust column width and row height

Types of data used in a spreadsheet


Value- This is a numeric data that contain numbers from 0-9 and can be used in calculations.

When a value is entered in a spread sheet it is right aligned by default which means a number
goes to right of the cell unless you format it to be at the center or left. If you enter a value that is
too long for the cell you will see ##### to show that the value cannot fit in the cell and you must
increase the column width.

Value can be formatted into decimal place currency etc.

Telephone numbers and pin numbers are not values because they are not used in calculations.

Absolute value: there are values without a sign.

Labels or Text data

This is data, which contain letters, characters, symbol, or a mixture of letter symbol and numbers.

Examples of labels are total, test1, test2, telephone numbers and all other numbers which are not
used in calculations. Labels are left aligned by default

Formulas- This is data that contain values, cell addresses, functions and mathematical operators
and a formula always starts with an equal sign e.g. =B1 + A8 + C5. A formula always calculates
and displays a value. If you want to see the formula you can get it on the formula bar.

There are two types of formulae which are user defined formula and pre-defined formula

User defined formula

This is a formula which is created by the user and it only contains values, cell address and
mathematical operators e.g. = 5*(C1+E8)

Pre-defined formula

12
This is a formula which contain functions such as sum, average, min, max, etc. for example
=SUM(B1:B8) or =AVERAGE(B1:B8). Functions are sets of instructions, which perform a specific
task.

 Adjust column width


Bring the mouse pointer in the column - heading row; where two columns are divided, the pointer
changes to then double click to automatically fit the longest text in the column or
you can drag to resize.

 Adjust row height


Bring the mouse pointer on the line dividing the rows are divided, the pointer changes to
then you can drag to the required size

13
 use pre-defined functions
- SUM, AVERAGE, MAX & MIN, COUNT, COUNTA, COUNTIF, SUMIF, simple IF,
compound IF
 Apply
- cell addressing
- absolute referencing
- relative referencing

 apply the following features in spreadsheets:

- data validation
- sort
- filter
- cell referencing
- insert graphics
- change text direction
- data formatting
- freeze panes
- hide or unhide rows/columns

FUNCTION
SUM function

This is used to find the total of value in a range of cells.

AVERAGE Function

This is used to find the average of value in a range of cells.

MIN Function

This is used to find the smallest value in a range of cells

MAX Function

This used to find the largest value from value in a range of cells

COUNT FUNCTION

It counts the number of cells containing either values or formulas in a cell range.

COUNTA FUNCTION

It counts the number of cells containing data. Any cell containing any kind of data will be counted.

COUNTIF Function

14
It counts the number of cells that have data that matches a given condition. e.g
=COUNTIF(A1:A10, “>20”)

The Simple IF function

This is a function which gives you an answer if the condition specified is true and another answer
if the condition is false.

IF( condition, value_if_true, value_if_false )

The Compound IF Function

This is when there is more than 1 IF statement.

IF( condition1, value_if_true1, IF( condition2, value_if_true2, value_if_false2 ))

Example

=IF(G3<40,"U",IF(AND(G3>=40,G3<50),"E",IF(AND(G3>=50,G3<60),"D",IF(AND(G3>=60,G3<70
),"C",IF(AND(G3>=70,G3<80),"B",IF(AND(G3>=80,G3<=100),"A","ERROR"))))))

Copying a formula

There is no need to type similar formulae in all the cells one by one. Formulae can be copied from
one cell to another.

There are basically 3 methods of copying formula, which are dragging, copy and paste, and using
the fill command.

The following spreadsheet will be used to explain the 3 methods to copy the formula in C2 to cells
C3, C4, and C5.

15
A B C D E

1 Test1 Test2 total

2 15 20 =a2+b2

3 31 42

4 33 45

5 71 80

Copy and paste method

 Highlight C2
 Click copy from the tool bar
 Highlight C3-C5
 Click paste from the tool bar

Fill command

 Highlight C2-C5
 Click edit
 Click fill
 Click down

NB: If the cells are up then you fill up, if the cells are on the right, then you fill right and if the cells
are on the left, then you fill left.

Dragging

 Highlight C2
 Point to the bottom right corner of C2 until a black cross appears
 Drag the left mouse bottom down until C5
 Release the mouse bottom and remove the highlight.

Cell References
A cell reference is a cell address or a cell name. It starts with the column letter followed by the
row number e.g. Z5, B3, etc.

Types of cell references/Types of cell addresses

16
There are 2 types of cell reference, which are relative cell reference, and absolute cell reference.

Relative cell reference /relative cell address

This is an address in a formula, which changes when the formula is copied from one cell to other
cells. A relative cell address changes to suit the new position.

Absolute cell reference /absolute address

This is an address which does not change when a formula is copied from one cell to another.
Some addresses must not change even when they are copied from one cell to another for
example percentages and rates. Absolute addresses are indicated by putting a $ sign on the
address.

Formatting data in a spreadsheet


Data in a spreadsheet can be formatted by

 Changing the alignment


 Underlining
 Italics
 Bolding
 Changing font size, font style, font color
 Boarders etc

Formatting values

Cells can be formatted to hold values of a specific type such as currency or decimal places.

The following spread sheet will be used to demonstrate formatting of values.

A B C D

1 PERCENTAGE AMOUNT PAID

2 45.23 $20.00

3 15.63 $30.00

4 16.98 $27.00

5 30.12 $38.00

17
Formatting the amount paid column to currency

Highlight B2-B5

Click format

Click cells

Under category click currency

Select currency symbol ($)

Click ok.

Formatting percentage column to decimal place

Highlight A2-A5

Click format

Click cells

Under category click number

Enter number of decimal places (2) and click ok.

Data validation
Validation is making sure that only sensible data is entered in the spread sheet. For example if
you are entering marks, only numbers from 0 to 100 should be entered and the computers should
print an error message if a wrong number such as 150 is entered. There can not be a mark which
is above 100 or below 0 and if such numbers are entered, the computer should be able to display
an error message.

Validation is done to reduce errors when entering data in a spreadsheet.

18
How to validate data

-Highlight the range of cells you want to validate e.g. b2to b5

-Go to data menu

-Click validation

-Click setting

-Under allow choose the data types you want

-Type the message error to be displayed if wrong data is entered

-Click ok

Sorting Data in a spreadsheet


This is arranging data in a specific order e.g. descending order is Z to A and ascending order is A
to Z. Alphabet order is ascending order.

Sorting is done to make it easier to search for a particular item of data. Sorting is done using a
specific criteria e.g. sort by name, surname, average etc.

How to sort data

-Highlight the cell you want to use for sort.

-Click data menu

-Select sort

-Select criteria for sorting

-Click ok

Data filtering
This is a way of displaying only certain data while the rest of the data are hidden.

E.g. if the spread sheet contains male and female then you may want to look at male only while
female are hidden.

Conditions are used and only data which match the condition will be displayed while the rest are
hidden.

19
Filtering will temporarily hide the data which you do not want to see.

How to filter data

Highlight the column you want to use for filtering

Click data menu

Select filter

Select auto filter

Charts
A chart is a picture which represents the data in a spreadsheet. E.g. pie chart, bar graph, etc

A chart is much easier to read and understand than a set of numbers in a spreadsheet.

How to insert a chart

Highlight the range of the cells you want to use

Click insert from the menu bar

Select the type of chart e.g. pie chart, bar graph etc.

Follow the steps from the chart wizard and click finish

20
Activity Marks: 8

21
This is applying a background color to a cell.

3.1.2 ACTIVITY - Spreadsheets …


Name: ………………………………… Marks: 8
1. Using the
spreadsheet shown
above, list the text
formatting used on
(a) The
table heading
(C7:E7)
……………….. [2]
(b) Row
B8:D8
……………….. [1]
(c) Cell C9
1. Using the spreadsheet shown above, list the text formatting used on
……………………………….. [1]
(a) The table heading(C7:E7) ................................. [2]
(b)(d)Row
Cell C10
B8:D8 ………………….................... [1]
(c) ………………………………..
Cell C9 [1]
.................................................... [1]
(d)(e)Cell
CellC10
C11 and…..............................................
C12 [1]
(e) Cell C11 and C12 ….......................................
……………………………….. [1] [1]
2. The name in cell B9 is Hausiku Kolman and the letter “n” seems to have been cut off by
2. e Kolman and the letter “n” s ems to have
The name in cell B9 is Hausiku
the table border. What text formatting should be done to fix the problem in that cell?

.......................................................................................................................................................[2]

22
=COUNTIF(A1:A10, “20”)

3.1.2.2. ACTIVITY - Spreadsheets


Name:…………………………………… Marks: 10
Activity
The table shows four different gifts I want to give as birthday presents. Marks: 10
The table shows four different gifts I want to give as birthday presents.

>

1. DeterminetheformulawhichmustbeincellD3,
1. Determine the formula which must to becalculate
in cell D3, the tosubtotal
calculate the subtotal
.............................................................................................
………………………………………………………………………………… [2] [2]
2. What formula must be in cell F3, total cost?
2. What formula must be in cell F3, total cost?
………………………………………………………………………………… [2]
3. .............................................................................................
What formula must be in cell F8, total cost of Gifts? [2]
…………………………………………………………………………………
3. What formula must be in cell F8, total cost of Gifts? [2]
The formula =COUNTIF(B3:B6,"<50") is placed in[2]
4. ............................................................................................. the cell B11, what will the
output be?
4. The formula =COUNTIF(B3:B6,"<50") is placed in the cell B11, what will the output [1]
……………………………………………………………………………….. be?
............................................................................................ [1]
5. In what order should the data be sorted, using which column in order to have the
Guitar Amplifier first on the list?
5. In what order should the data be sorted, using which column in order to have the Guitar
………………………………………………………………………………
Amplifier first on the list? [2]
6. Write the formula to determine the gift that will cost you less.
………………………………………………………………………………
.......................................................................................... [2] [1]

6. Write the formula to determine the gift that will cost you less.
.......................................................................................... [1]

23
Activity Marks: 10
1. A builder needs to finds out the cost of tiling floors of a new building. The building consists of a
number of rooms of different sizes. The owner could choose between two different tiles.
A B C D E F G H
1 QUOTE OF TILES TO BE LAID IN NEW BUILDING
2
per
3 Cost of tile Tile 1 15.00
square meter
per
4 Tile 2 20.00
square meter
5
6 Length breadth Area Tile Option Prize
7 Room 1 5 3 15 1 225.00
8 Room 2 7 4 28 1 420.00
9 Room 3 2 2 4 2 80.00
10 Room 4 5 3 15 2 300.00
11 Room 5 4 7 28 1 420.00
12 Total 1445.00

(a) Write down a cell which consists of a value. [1]


(b) Write down a cell which consists of a label. [1]
(c) Write down the formula of the following cells.
(I) E7
(II) G7
(III) G12 [6]

(d) How can the formula of cell E7 be copied into cells E8 to E11. [1]

(e) What editing has been done to column G? [1]

24
CHAPTER 3: DATA COMMUNICATION
 Define the term data communication
 Distinguish between receiving and sending devices
 List the hardware and software needed for communication:
 Describe how data is transmitted and received
 Describe how errors can occur during the transmission of data
 Describe how data can be checked for errors

Data communication
The electronic transfer of data, instructions and information from one location to another.

Sending Device- is a device that gives an instruction to transmit data, instructions or


information to another device, e.g. a laptop etc.

Receiving Device-is a device that accepts the data, instructions or information e.g.
desktop computer, smartphone etc.

These are hardware and software needed for transmission:

o Hardware
 Internal modem
 External modem
 Asymmetric Digital Subscriber Line (ADSL) adaptor
 Telephone link
 Integrated Services Digital Network (ISDN) adaptor
o Software
 E-mail program
 Communication software e.g. Skype, SMS, MMS
 Instant Messaging (IM)
 Internet Relay Chat (IRC)

How data is transmitted and received

Receiving Device
Sending Device
Communication Digital Signals
Digital Signals channels

Communication Devices e.g.


Modem

25
A computer understands digital signals, while communication channels carry analog signals, so
for them to understand each other they need a modem in-between them. The modem Modulates
(changes digital signals to analog signals) for the telephone link to transmit. On the receiving end,
the modem demodulates (changes analog signals to digital signals) the received signals from the
telephone line into digital signals for the receiving computer to understand the sent message.

Errors that may can occur during the transmission of data


 Electromagnetic inferences or Noise; this can be caused by interferences coming
from electric devices or cables carrying electricity such as televisions, power lines,
thunderstorms and manufacturing machinery. Noise can also be caused by
environmental influence such as heat.
 Attenuation; is a loss of signal strength as it travels to the destination.
 Lack of memory; happens when there is no enough storage space which results in
loss of some of the bits.
 Power failure; results in los of bits affecting the transmission
 Physically damaged transmission channel breaks the transmission and data will
not reach the intended destination.

Error checking methods

Parity Bit: an extra bit is attached to check whether the transmitted message has an error. The
parity bit is always added at the end of the bits.

100000000

Four types of Parity Checking methods:

Even Parity: Number of ones (1) should always be even, if not then an error would
have occurred.

Odd Parity: Number of ones (1) should always be odd, if not then an error would have
occurred.

Mark Parity: The parity bit should always be a 1. If at the destination it reaches as 0 then
an error must have occurred.

Space Parity: The parity bit should always be a 0. If at the destination it reaches as 1 then
an error must have occurred.

26
Cyclic Redundancy Check (CRC) is an error-detecting code or algorithm used to verify the
accuracy of data contained in a data block. When the sending device transmits the data, it
performs a CRC calculation to generate a unique 4-byte number called the frame check
sequence (FCS). This check value, FCS is attached to the data frame/block being transmitted.
The receiving device will decode the FCS by repeating the same CRC algorithm and making sure
that the frame is exactly as the original. In the event that the frame’s field does not match, the
receiving device assumes the data has been damaged during transmission, so it will notify the
sending device to re-transmit the data.

Activity Marks: 14

1. In order for information to reach its intended destination, there are certain components that
need to be in place. Name any two and describe them? [4]

………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
2. Name and explain any software needed for communication to take place? [2]

………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
3. Clearly explain how data is transmitted? [4]

………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
4. A computer uses parity checking method to detect errors that can occur during transmission.
i. List any two causes of these errors [2]

……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
ii. Using the odd parity checking method, what would be the parity bit for the following
bits of data?
a) 10010101 01010110 ……………………… [1]
b) 11001100 11000110 ……………………… [1]

27

 Explain what is meant by rate of data transmission
 Describe various transmission modes and give examples of applications for each
 Differentiate between the following transmission media:
o Wireless and cables

Data transmission
This is the measure of how much data is transmitted during a given period of time. It is expressed
at quantity of bits per second. E.g. 1 kilobit per second (1 Kbps).

Data transmission modes

Signal Directions

Simplex Duplex

Simplex duplex transmission is when communication is only one way between two devices. One
device only sends and the other only receives, information is not sent back to the sender.
A B
Sending Device Receiving Device
Data goes to B from A

Example: A keyboard only sends to the CPU, there is no way the CPU sends back to the
keyboard. The CPU also sends to a speaker and there is no way that a speaker communicated
back to the CPU.

Half-Duplex

Transits data in both directions but only in one direction at a time.

A B
Sending Device Receiving Device
Data goes to B from A
A B
Receiving Device Sending Device
Data goes to A from B

NOT AT THE SAME TIME

Example: Automated Teller machines (ATMs) where a user inserts a card, the system prompts for
a pin number, users enter the pin, the machine verifies the pin and returns the appropriate

28
response, if correct, the user is prompted to enter amount to be withdrawn, the machine gives the
card, the money and the receipt if required.

Full duplex

Transmits data simultaneously in both directions. It is therefore bi-directional.

AT THE SAME TIME

A Data goes to A from B B


Receiving Device Sending Device

Data goes to B from A

Number of bits transmitted simultaneously

Remember: Data is transmitted in bits of 0s and 1s.

Serial transmission

When data is transmitted one bit after another over a single wire

Sending Device Receiving Device


0 1 0 1 1 0 0 0

1 1

Parallel transmission

When bits are transmitted as a group, usually eight (8) bits simultaneously on separate wires
within the same cable.

0
1
0
1
1
Sending Device Receiving Device
1
1
0
0
0
29
Synchronous and asynchronous

Synchronous transmission

Groups of bits are combined into blocks of characters which are sent continuously; the
transmission of the characters is synchronized by an external clock.

Sending Device Char1 Char2 Char3 Char4 Char5 Char6 Receiving Device

Asynchronous transmission

A group of bits are transmitted as independent units with start/stop bits. This transmission is used
when the rate at which characters are generated is unknown or the transmission rate is too slow.
For example, the transmission of characters from the keyboard and a computer.

Sending Device Start Characters Stop Receiving Device

Transmission media
Wireless

This is the transmission of data from one device to another through the air. There are no cables
or wires.

Infrared

Transmits data using infrared-light waves, for the devices to communicate both must have an
infrared port and their ports must be in line-of-sight. There must be no obstruction of the path of
the infrared light waves and transmission is within a short-range.

30
Bluetooth

A mobile wireless networking standard that uses short range radio wanes to transmit data
between two devices.

e.g. When transferring music between cellphones, both devices have to enable Bluetooth in order
for data to be transferred.

Communication Satellite

This is a space station that links with microwave earth-based stations to broadcast the microwave
signals to a wide area.

-It is put in space to rotate around the earth.

-It sends signals on earth to other devices and also receive signals from devices on earth.

-It is commonly used in satellite television. E.g. DSTV

Microwave relay

It has sending and receiving antennae mounted on a tower e.g. the MTC cellphone towers.

Microwave radio transmits voice and data through the atmosphere as super high-frequency radio
waves called microwaves.

Physical media/Cables

Coaxial

This is a type of cable that has an inner wire surrounded by a tubular insulated layer, surrounded
by a tubular conducting shield.

It is used in television systems to connect the TV to the antenna.

31
fiber-optic

This is a network cable that contains a number of glass threads inside an insulated casing. Fiber
optic cables carry data signals in the form of light.

-Light travels very fast so fiber optic cables are fast.

-The cables were designed to transmit data over long distances and carry a lot of data (very high
bandwidth).

-They are very expensive but very reliable. They are use for long distance telecommunications.

twisted pair

Also called Ethernet cables consists of color coded pairs of insulated copper wires twisted
together. Each pair of wires is twisted around each other and all the pairs are enclosed in a
plastic sheath. The pairs are twisted together to reduce noise. Telephone lines and Internet use
twisted pair cables.

Activity Marks: 15

1. Define the following terms:


Asynchronous transmission [2]
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
Synchronous transmission [2]
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
Simplex [2]
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
Full duplex [2]
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
2. What is the difference between serial and parallel transmission [2]

…………………………………………………………………………………………………………………

32
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
3. Data is transmitted in what units? [1]
…………………………………………………………………………………………………………………
4. Name and explain any two types of cables. [4]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………

33
 Define networking
 Define communications protocol
 Explain why communications protocol is necessary
 Distinguish between and evaluate different networks according to size
 Understand various types and topologies of networks
 Distinguish between and evaluate different networks according to network architecture
 Describe the types of servers
 Explain the purpose of different networking devices

NETWORKING
A networking is a group of computers and devices connected together using communications
devices and transmission media.

It can also be defined as a connection of two or more computers for the purpose pf sharing
resources such as hardware, software and information.

Communications protocol
These are the rules, which define how data is exchanges between hardware and/or software
components in a communication network.

It can also be defined as a set of rules that must be followed by two devices in order for them to
communicate with as little error as possible E.g. How to connect to the WIFI, how to transfer files
via Bluetooth etc.

Why communications protocol is necessary

 To ensure that data is transferred in a sequence and without errors between network
devices. They define thing like data format, error checking methods and sequencing techniques.

Types of networks
 Local Area Network (LAN)
This is a connection of computers in a small physical area such as a home, office, a small group
of buildings such as a school or airport. A LAN is usually formed by using cables or wireless
devices.

34
 Metropolitan Network (MAN)
Connects LANs in a metropolitan area such as a city or town. MAN was designed to handle data
communication for multiple organizations in a city and sometimes nearby cities, too.

 Wide Area Network (WAN)


This is a connection of Local Area Networks in a large geographical area. It links LANs and MANs
across regional and national boundaries. WANs are built using telephone lines, cables, satellites
and microwaves. The largest WAN is the internet. A WAN can be built for one particular
organization and are private for example the standard bank or FNB network.

Network topologies
 Star
This is a network in which all devices are connected to a central computer called a server.

Computer 1

Server
Printer

Switch/Hub

Computer 3 Computer 2

Modem

Advantages

-easy to set-up and maintain

-can add nodes to the network easily

-can easily remove nodes from the network

-if a node fails, it does not affect the other nodes

Disadvantages

-if the server fails then the whole network fails

-needs too much cabling

35
 Bus
This is a network in which all the devices are all connected to a single line of cable called a bus.

Computer 1
Printer Server

Terminator Terminator

Data path/bus
Computer 3 Modem Computer 2

Advantages

-cheap and easy to set-up

-can add and remove nodes easily without disrupting

-if a node fails, it does not affect the other nodes

Disadvantages

-If it the bus fails the whole network fails

-The bus cannot easily handle heavy network traffic

-it is difficult to trace a fault

 Ring
It is a topology in which each device is connected to exactly 2 other devices and thereby forming
a circle.

36
Computer
1

Computer
Modem
2

Server Printer

Advantages

-data flows in one direction, so there is no way data smash together (collide)

-It is cheap to setup, since it needs fewer cables

Disadvantages

-It is not easy to diagnose faults

-It is difficult to add or remove a node

-if a node fails it affects the whole network

 Hybrid

Computer 1

Computer 1 Server
Server
Printer
Switch/Hub
Switch/Hub
Computer 2

Modem

Computer
Printer 1 Server

Terminator Terminator

Data path/bus 37
Computer Modem Computer
3 2
A topology which combines two or more topologies together. For example; a star-wired Bus
combines a star and bus formations.

38
Advantages

-it covers long distances

-it is easy to connect or separate network segments

Disadvantages

-It is expensive to set-up, since, many cables and communication devices are required.

Network architecture
Client-server architecture

This is a network which contains one or more servers providing services to a number of clients.
Servers supply an clients consume

Advantages

-security is easy to implement

-it is easier to backup and archive data

-if any client fails it will not affect the rest of the network

-it is easier to expand the network (add new clients)

-it can accommodate many computer (up to thousands)

Disadvantages

-if the servers fail, then the whole network goes down

-it’s expensive to set up because there is need for special server hardware and software

Peer-to-peer architecture

This is a network in which there is no server and all nodes have equal access to network
resources. Every node is both a supplier and a consumer of resources.

39
Advantages

-it is cheaper to set up because there is no need for special hardware and server software.

Disadvantages

-It can not accommodate a large number of computers. Problems are experienced if the
computers are above 15.

-it needs every user to be trained on how to be a network administrator so that they can be able
to use and share network resources.

Types of servers

File server a computer that works as a disk drive, storing the programs and data files.

Application server controls all application programs on a network

Printer server controls one or more printers in a network

Web server contains web pages that can be viewed using a web browser.

Proxy server is a typical component of a firewall which is a server outside the company’s
network.

40
Other network devices

A node: any computer (client or server) that is able to send or receive data.

Workstation: A personal computer (such as a desktop or laptop), which may or may not be
connected to a network.

Hub: is a connectivity device that provides a common connection point in a network. It receives
data from one or more nodes which is forwarded out to one or more other nodes.

Switch: A connectivity device that connects computers to a network. Unlike a hub, which sends
messages out to one or more other nodes a switch only sends to the intended recipient.

Router: is a communication device that connects multiple computers or other routers together and
transmits data to its correct destination using the best route/path at that particular time.

Wireless devices: these are devices that connects to a network or link a network wirelessly
(without connection of cables)

NIC (Network Interface Card): is a device that enables a workstation to connect to the network
and communicate with other computers.

Gateway: Hardware, software or a combination or both, that connects two different kinds of
networks together. e.g. connecting a LAN and a WAN

Bridge: Is a connectivity device that connects the same type of networks. E.g. similar LANs

41
Activity Marks: 40

1. Define the following terms, use examples where necessary [10]


Network
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
Computer protocol
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
Hub
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
Firewall
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
Gateway
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………

2. What is the difference between a peer-to-peer and client-server architecture?


[4]
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………

3. What is the difference between a LAN and WAN? [4]


…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………

4. What is the difference between a star and ring topology?


[4]
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………

5. Why are network protocols important?


[2]
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………

6. Describe a file server [2]

42
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………

7. Clearly explain how networking has reduced operating costs in businesses?


[2]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
8. Clearly draw and label a ring network. [6]

9. Name two benefits that star topologies have over ring topologies? [2]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………

10. A company would like to make use of the bus topology to set up its network. Advise the
company why this would be a bad topology to implement. [2]
…………………………………………………………………………………………………………………
……………………………………………………………………………………………………………
5. Why is a firewall necessary in a network? [2]
………………………………………………………………………………………………………………
………………………….……………………………………………………………………………………

43
CHAPTER 4: INTERNET AND E-MAIL
Define and explain the following terms:

 Internet
 world wide web (WWW)
 e-mail
 e-commerce
 e-learning
 search engine
 File Transfer Protocol
 Newsgroups
 website
 web page
 Uniform Resource Locator (URL)
 Hyperlink
 download and upload
 video conferencing

The Internet
The Internet-this is a global network of computer networks which is public and does not belong to
any particular organization or person. It consists of a lot of servers and clients. Anyone can use
the internet at any time.

Internet is an acronym for INTERnational NETwork.

It can also be fined as a collection of networks connected to each other through various
communication channels over the whole world.

An example: WAN

World Wide Web (WWW)

This is a huge electronic database where documents and other web resources are identified by
Uniform Resource Locators (URLs), interlinked by hypertext links, and accessible via the Internet .

Email or E-mail

 Stands for electronic mail

44
 This is the transmission of messages and files over a computer networks.
 Besides text-based messages, photos, videos and any other file can be attached to e-mail
messages.
 Email has proved to be one of the most convenient means of communication.

E-commerce

 Short for electronic commerce


 Is a business transaction that occurs over an electronic network such as the Internet.
 With ecommerce
o Users can purchase any product or services on the Web, including groceries,
flowers, books, computers, games, movies, songs etc.

E-learning

 Stands for Electronic Learning


 This is when teaching and learning takes place through electronic means.
o Involves the use of internet, computer, Smartphone, television or a radio
 This kind of learning takes place anywhere and anytime
 Provides enhanced learning that has images, moving objects, sound and text files
(multimedia)

Search engine

A program that is used to find a web site, web page, image, news or map related to a specific
topic without using a specific web address or look at a specific website e.g. Google, Yahoo!, Ask,
Answer and MSN

File Transfer Protocol (FTP)

 Software that allows uploading and downloading of files between computers over the
Internet.

o Uploading: the process of transferring documents to the server on the Internet.

o Downloading: the process of transferring documents from the server on the internet
to a user’s computer.

Newsgroups

 Online area that allows users to have written discussions about a specific subject.
o They cover any topic
o People get together for fun or for business reasons
o An article is posted and other group members read and reply to it

45
Website and Web Page

Website

 A collection of related web pages

Web Page

 Electronic document containing content such as text, images, video, audio and animation.
 A web page connects to other web pages or website

Uniform Resource Locator (URL)

 A unique address for a web page.


 Users use a URL to access a website.
o Examples
 www.rvs.edu.na

 http://www.divundu.com

 HTTP stands for Hypertext Transfer Protocol

Hyperlink

 Can be a picture or word that is used to connect to other documents, web pages that
contain related information.

 Usually coloured, underlined

Video conferencing
This is a facility which allows people in different locations to meet via the internet in real time,
while they are able to see and hear each other. General uses for video conferencing include
business meetings, educational training or instruction and collaboration among health officials or
other representatives.

Hardware requirements for video conferencing

In addition to the basic requirements of a computer system, the following hardware components
are needed for one to be able to do video conferencing.

46
1. Web camera- it will capture your video and send it to the other user.
2. Soundcard to connect the speakers and microphone
3. Speakers to hear the other users as you are communicating
4. Microphone- it will record your voice and send it to the other user.

Advantages of video conferencing

1. No need to travel to the meeting venue.


2. No need to hire a special venue for the meeting. People can meet while they are
anywhere as long as the network is available.
3. Meetings can be held at short notice since all that is needed is to sit at the computer and
no traveling or making accommodation arrangements.

Disadvantages of video conferencing

 Technology can fail or systems may crash/go off-line. Remote connections are sometimes
known to be disturbed by environmental changes.
 Have to give extra training to use the Equipment. On some occasions, the absence of
technicians creates difficulty for participants who are unfamiliar with the videoconferencing
technological concepts.
 Need to employ somebody to set up and maintain Equipment.
 Time zones may be different if conferencing in different parts of the world

Activity Marks: 18
1. Define the following terms:
Internet
E-Commerce
E-Learning
World Wide Web (WWW)
File Transfer Protocol
Uploading
Video Conferencing
2. Explain why employees at a firm might benefit from using video conferencing.

47
 Explain why we use e-mail and Internet
 Specify the hardware and software needed for Internet connection evaluate different
technologies to connect to the internet
 Explain the term service provider and its functions
 describe the advantages and disadvantages of using e-mail and the Internet
 explain proper netiquette

E-MAIL
Why we use email

 Emailing: exchanging official and non-formal messages instantly

Facilities offered by the internet

 Forwarding/group forwarding - this is sending e received e-mail to one or more people


without having to retype it.
 Group mail – this is sending the same message to a group of people at the same time.
 Attachments- this is attaching some files to your e-mail. The attachments can be text
documents, pictures, sound or video.
 Reply- can set up automatic replies to assure the sender that the message has been
received.
 Mark an email as urgent.
 Mark an email as unread so that it can be read again later.
 deleting an email
 Saving an email to your hard disk.

Why we use the internet

 Research and Information: finding information of any specific subject

 Entertainment: provides music, internet games, videos and movies

 News: keeps you informed on politics, weather, entertainment, sports and financial
views

 E-shopping: buy things from anywhere online

 Distance learning: attend lectures, sending assignments and writing examinations online

48
Requirements for Internet connection

 Workstation: which can be a desktop computer, laptop, tablet, smart phone

 Modem: for those using telephone line connection use an analog modem. Cable
modems such as Digital Subscriber Line (DSL) are commonly used today

 Access point/router: added to a wired system to allow wireless connection

 Web browser: software that allows one to view and explore the web pages

 Internet Service Provider (ISP): organisation or individuals that connect you to the
Internet for a fee. Examples: MTC, Telecom, I-way and Africa on-line

Email Advantages and Disadvantages

Advantages

o An inexpensive way of sending messages to anywhere in the world

o A single message can be sent to many recipients at the same time

o Messages can be stored for reference sake.

o Messages are received instantly

o Very big files can be sent as attachments

o Allows communications at anytime

Advantages of using email over ordinary post

- Email is faster to reach the recipient because the message is delivered almost instantly
depending on the connectivity.
- One can send an e-mail anytime. It is available 24/7 unlike the post office which closes
at end of day.
- One can send attachments with email. This reduces the costs and effort of sending
files such as photos, videos, music files etc.
- Email is more secure because one needs a password to access an email account.
- The sender is assured of the arrival of the email. It won’t get lost as long as the
address is correct.

49
Disadvantages

o A lot of mail is difficult to manage, such as that some of the important mail may
not be read or deleted

o Promotes avoidance of personal contact – no meetings or telephone calls

o Computer viruses are carried in some mail.

o Requires regular checking of e-mail box otherwise there be communication


breakdown.

Folders on the e-mail window

Inbox – stores messages which have been received. If the message is not yet read, it will be
bold.

Sent – stores messages which have been sent to other users.

Drafts – stores the messages which have been typed and saved by the user so that they can
send them later.

Spam: stores messages that are suspected to contain viruses.

Trash – temporarily stores the messages which have been deleted for a short time before they
are permanently deleted. This is done to allow the user to recover the messages in the case of
accidental deletion.

You can also create your own folders in your email account so that you can use them to keep
your email in an organized way.

Commands found on the e-mail windows

Compose - opens the compose window for the user to create a new message and send it.

Send – sends the message to its destination.

Attach files – allows the user to attach files to the message e.g. sound, picture, and video.

Save draft – allows the user to save the unfinished message as a draft to be completed later.

Forward – allows the user to send a received message to another user.

Reply- Allows a user to respond to a message.

50
Delete – allows the user to remove unwanted received messages. These messages are
temporarily kept in the trash folder, then they will be permanently deleted after some time. If
you accidentally delete your email, you can get it from the trash folder but you need to be
quick.

The compose window

-it is divided into 4 areas

1. Address area – where the user enters the e-mail address where the message is to go.
2. Subject area – where the user enters the subject or topic of the message.
3. CC area – where you type addresses of other people to whom you want to send the same
message. Cc stands for Carbon Copy
4. Message area –where the users types the message to be sent.
5. Attachments area – This is where the users clicks to get the option of attaching files to the
email.

Advantages of the internet

 Access to a lot of information is available anytime 24/7


 People can work from anywhere at anytime, therefore, increases productivity
 Fast provision of services; a service is done in a split of a second ranging fro internet
banking to, advertising, reservations/bookings, online job applications, etc
 Services are available 24/7

Disadvantages of the internet

The internet offers a lot of good facilities but people are still afraid of using it. This is because of
some of the following reasons.
 There are high chances of losing confidential information such as credit card numbers to
hackers on the Internet.

 There are a lot of bogus sites. Bogus sites are web sites which pretend to belong to a
certain company when they do not. Such sites pretend to belong to a certain bank or
shop.

 There are a lot of viruses on the internet. Viruses can come to your computer by
downloading files which you are unsure of. They can also be sent to you via e-mail.

51
Netiquette
 Short for Network Etiquette (good manners)

 It is a set of rules for behaving properly online

Proper netiquette

 Always treat other users online as you would like them to treat you.
 Behave online as you would offline.
 Respect other people’s time and bandwidth.
 Share your knowledge.
 Do not abuse your power. Administrators should not read other people’s private emails.
 Forgive other people’s mistakes. Excursion

Activity Marks: 10

1. Read the following extract about a young lady from India and then answer the
questions that follow.

“Most people of my age today in India literally live online,” says Seeya Malhotra as she
unwraps a box that has been delivered to her desk at work.
The box contains a set of desk speakers which she had ordered on the internet a
few days before.
Buying items at the click of a button is the way Seeya shops these days - she says
almost half of her wardrobe has been purchased online, as well as her lunch and
many other things.

(a) What does this article mean when referring to ‘purchasing online’? [1]
(b) Define the word internet. [1]

(c) How would Seeya pay for the products she had purchased ‘online’? [1]

(d) Mention one drawback of online payments. [1]

(e) One of the problems associated with the internet is security. It is very easy to
download viruses from the internet.
Explain how this can be prevented. Not using the internet is NOT an option.

2. A Grade 10 class wants to go on a geography excursion to the Spitzkoppe area.

52
Information is needed concerning accommodation in that region. Someone suggests
to use the internet to find the information.
(a) They will search for information on the geomorphology of the Spitzkoppe, suggest proper

netiquettes when using the internet [2]

(b) Learners need to send an email to book for accormodation during their excursion.

Mention two advantages of using E-mail over ordinary post services and
one disadvantage of using E-mail.
(c) How would the students benefit from using the internet. Name 3 ways. [2] [1] [2

53
CHAPTER 5: SOCIAL & ECONOMIC IMPLICATIONS

GENERAL USES OF COMPUTERS


describe the impact of computer technology in society on:

- education
- medical field
- social interaction
- business, employment and the economy as a whole
- communication
- information access and storage
- environment (e.g. disposal of certain computer components)

Computer Technology in Education


 Computerize teaching aids which motivate learners because they see colored images and
hear sound
 Internet allows learners and teachers to do research
 Allows virtual learning where learners are using prepared material on CDs, DVDs or
Online

Computer Technology in Medicine


 Keeping records of staff, patients and medicine
 Intensive care monitoring
 Providing drug alerts
 Making prescriptions
 Medical research

Social Implications: Positive Impacts

 Work is done easily and workers are not strained anymore


 Communication with friends and family from different places is now easy
 Cloud storage has made it possible to have mobile offices
 Payments are now done in a more comfortable way e.g. EFTPOS
 People with disabilities can also interact now

Social Implications: Negative Impacts

 Data privacy is a major problem


 Loss of jobs promoting poverty
 Deskilling: people are losing skills

54
 Addiction: makes people keep away from other essential activities
 E-waste
 Social isolation; many people do not physically interact
 Pornography: children are now exposed to inappropriate sexual material

Activity Marks: 10
1. Give a brief description of the impact of computer technology on education and in the medical
field
2. How are computers negatively impacting the society

55
ECONOMIC IMPLICATIONS
 define a computer virus
 explain the causes and effects of computer viruses
 explain the prevention of infection of computer viruses
 explain how to remove computer viruses
 classify various types of viruses
 explain the effects of these various types of viruses

Advantages of computer use to the economy

 Work is done easily and workers are not strained anymore

 Social media is a fast way of marketing and providing information

 Surveillance systems promote security

 Simulations makes it easier to make discoveries and train people

 Payments are now done in a more comfortable way e.g EFTPOS

 Mass production; the final product is better designed and manufactured much faster and
with better quality

Disadvantages
 Loss of jobs promoting poverty, people with ‘older skills’ do not benefit so much, since IT
knowledge has become a necessity for most jobs.

 Malware, software piracy, hacking and equipment theft have become a major economic
concern

 If the system fails, then no production goes on and results in huge losses

 It is expensive to acquire new technology

 Deskilling: people are losing skills

56
Malware (Malicious Software)
Is software that attacks computer systems; they include:

 Computer Virus

 Worm

 Trojan Horse

 Rootkit

Computer Virus

 Potentially damaging computer program designed to alter the way the computer work
without user’s knowledge or permission.

 Once the virus infects the computer, it can spread throughout and may damage files and
system software including the operating system.

 Example: Michelangelo and I Love You which comes in an email with the subject I Love
You.

Types of computer virus

Worm

 A program that copies itself repeatedly, for example in memory or on a network, using up
resources and possibly shutting down the computer or network.

 Does not erase data but corrupts the data

 Example: Code Red, Melissa and Conficker

Trojan horse

 Program that pretends to be an essential program, yet it contains code that is intended to
disrupt a computer, network or a website.

 Hidden in computer games, screensaver.

 Can erase programs and cause chaos

Rootkit

 Program that hides in a computer and someone from a remote location is allowed to fully
control the computer.

 Once installed, the writer can execute programs, change settings, monitor activities and
files on the remote computer

57
Other types of Malware

Boot Sector Virus

 Affects the start-up instructions by replacing some of the boot sector instructions with its
own, creating a modified, infected version of the boot sector program.

Logic Bomb Virus

 Is a type of virus that is triggered or does its destructive functions when a certain condition
is met.

Macro Virus

 Uses the overall/macro language of an application, such as word processing or a


spreadsheet to hide virus code.

o Once an application containing the macro virus is opened, the virus loads into
memory.

Email-hoax

 An email message not a virus that warns people of a non-existing “new” virus. These false
hoax messages require one to send the message to all one knows which causes internet
traffic and unnecessary worry.

Backdoor

 A program that allows users to bypass security controls when accessing a program,
computer or network.

Adware

 A program that displays an online advertisement in a banner or pop-up window on web


pages without user’s request.

Spyware

 Program placed on a computer without user’s consent. It secretly collects information


about the user, mostly related to web browsing habits.

o Collects information about credit cards, passwords or any other confidential


information.

58
Effects of computer viruses

 The computer runs slower than usual

 Memory available will be very little

 Program and user files disappear or do not work properly

 Strange messages or images are displayed on the screen

 System properties change

 Operating system does not start or shuts down unexpectedly

 A blue blank window appears on the screen

How viruses spread

 Through infected removable storage devices

 Opening un-known email attachments that contain viruses

 Through network

 Through dodgy websites, e.g. pornographic sites or game sites

Prevention measures

 Install antivirus program which protects the computer against viruses

 Never open e-mail attachments unless it is from trusted source

 Do not start a computer with a storage device inserted in the drives

 Scan all removable storage devices before using them

 If a virus is detected, it must be deleted or quarantined immediately by the anti-virus

 Keep up to date with new viruses and virus hoaxes

59
Activity Marks: 10
1 Access to so much information and variety of applications from different sites has not only
given us an advantage to learn a lot of things online, but has also exposed our computers
to different threats.

(a) What is malicious software and except the virus name and explain two other forms of
malware? [5]
Malicious software is
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
Form 1:
…………………………………………………………………………………………………………
Explanation………………………………………………………………………………………
…………………………………………………………………………………………………………
Form 2:
…………………………………………………………………………………………………………
Explanation………………………………………………………………………………………
…………………………………………………………………………………………………………

(b) Which malware is capable of the following? [3]


i. Increasing the size of a file?
……….………………………………………………………………………………………………
ii. Allowing unauthorized person to monitor and control your computer remotely?
………………………………………………………………………………………………………
iii. Making unnecessary internet overload?

……………………………………………………………………………………..……………..…
(c) What is a virus and an anti-virus? [2]
……..………………………………………………………,,…………………………………..……
……………………………………………………………………………………………………….
……………………………………………………………………………………………………….

60
DATA SECURITY
 explain the following security concepts:
- password
- physical security
- other control measures, e.g. biometric passwords, back-ups, mirror systems, levels
of authorization, encryption, firewalls, log files
 demonstrate good password principles
 explain the following:
- hacking
- cracking
- piracy
- phishing
- other computer crimes
 propose how one could protect devices and computer systems in a variety of
environments against digital threats

Computer Security Risk


Definition: ensuring the security of resources in computing environment

Ensuring - guaranteeing

Resources - data network, hardware, applications

Computing environment - mix of hardware, software and people

Computer Security Risk - is any action or event that leads to loss or damage to computer
hardware, software, data information or processing capability.

Computer Security risk include

 Internet and Network attack

 Unauthorised access

 Hardware theft and destruction

 Software theft

 System failure

 Natural disaster

61
Internet and Network attacks – includes virus attacks, cybercrime

o Hacker – is a person who breaks codes to gain unauthorized access to computers or


networks with no intention of corrupting or stealing information.

o Cracker – Is a malicious hacker, who breaks into computers for malicious reasons
such as getting information for financial gain.

o Botnet – a group of compromised computers connected to a network such as Internet


and works as part of the network for the purpose of attacking other networks.

o Denial of Service Attack – overloads a computer system or network with repeated


requests preventing legitimate users access to the computer system or network.

o Spoofing – an attempt to gain access to a network by posing as an authorized user to


find sensitive information such as credit card information or passwords.

o Phishing – is when trusted company names are used to attract/trap users to provide
their confidential information.

o Unauthorized access – using a computer or network without permission and may


lead to illegal use of the computer and its data.

o Hardware theft and destruction – stealing of computer equipment and destroying the
equipment intentionally.

o Software theft – includes software piracy, intentional erasure of programs and


stealing the software media.

o Cyber Crime: any online or internet – based illegal act. Includes botnet, denial of
service attack (DoS attack) backdoors and spoofing.

o Information theft – when a person steals confidential or personal information. The


stolen information can then be used for illegal activities.

o System failure – breakdown of the system caused by variety of things such as

 Aging hardware

 Fire

 Flood

62
 Power problems

Prevention Measures

 Physical Security: this prevents unauthorised access and hardware theft and includes

o Locking doors and having identification badges

o Cables to lock the equipment to a desk, cabinet or floor

 Anti-virus software: this can protect a computer from Denial of Service attack and other
malware

 Password: combination of numbers, letters and symbols used to prevent unauthorized


access to a computer.

Good password principles


- Change passwords frequently
- Should at least be eight(8) characters long
- Combine small and capita letters, use numbers and symbols
- Avoid passwords which are associated with you such s birthday, pet names,
nicknames, etc.
- Void passwords following a certain order like abc or 123 etc.

 Biometric passwords: they use physiological features to verify an authorized user.


Features include

o Facial recognition

o Finger prints

o Iris and voice recognition

 Back-up: a copy of the original used to provide back the lost information in the event that
the original information is lost or damaged.

 Data-encryption: the process of changing data called plaintext or cleartext into a


scrambled form which is unreadable, called ciphertext. Recipient uses a decrypt key to
change the data back into readable form. It prevents information theft over the networks
including internet.

63
 Firewall: is a system of hardware and/or software that protects a computer or a network
from intruders.

o Acts as a filter or wall between a private network and external computers or


network including the internet.

o Examines data passing into or out of a private network and decides whether to
accept or deny transmission of the data.

 Mirror systems: facilitates writing data onto two disks at the same time to enhance
storage reliability.

 Levels of authorization: Users must have different levels of authorization to keep some
of the information confidential and secure.

 Define and explain:


o Data privacy
o Data protection
 Discuss laws governing protection of information and communication technology systems

Data privacy

Data privacy: it refers to the right to individuals to determine what information is stored about
them and how that information will be used.

Data protection

Data Protection: this is a measure which insures that information is kept private.

There re so any ways that can be employed to keep your information private. This includes
limiting the mount of information which you provide to websites, turning off file and printer sharing
facility on your internet connection, clearing your history file when you are finished browsing, and
privacy laws ensure that information collected and stored about individuals should be used only
for the purpose it was collected for unless the owner gives permission for other purposes.

64
65
Activity Marks: 12

1. Hackers gain illegal access to computer systems.


(a) Name two effects of computer hacking.

................................................................................................................................................

…………………………………………………………………………………………………… [1]...............
(b) State two ways that users can protect their computer systems from
hacking.

1 .............................................................................................................................................
2 .............................................................................................................................................
2. The computer system at the Ministry of Home Affairs was down for two weeks and no
services were being offered. Clearly explain how it might have economically affected both
the ministry and the public.
(a) Ministry of Home
Affairs……………………………………………………………………………………………
……………………………………………………………………………………………………
Public……………………………………………………………………………………………
……………………………………………………………………………………………………
(b) Explain what Computer Security Risk is?
……..……………………………………………………………………………………………
……………………………………………………………………………………………………
(c) Name any two ways/categories how computers are exposed to security risks and
explain them?
Threat 1:
……………………………………………………………………………………………………
Explanation:..……………………………………………………………………………………
…………………………………………………………………………………………………..
Threat 2:
……………………………………………………………………………………………………
Explanation:..……………………………………………………………………………………
…………………………………………………………………………………………………..

66
CHAPTER 6: COMPUTER PROGRAMMING
 define an algorithm
 distinguish between
- pseudo code
- flowchart
 define a variable and a constant
 initialise variables
 write algorithms using variables
 use operators:
- mathematical ( +, -, /, *, mod, div)
- logical (AND, OR)
- comparison (=, <, >, >=, <=, <>)

An ALGORITHM is a set of steps that must be followed in order to solve a problem. It is a


step-by-step solution to a problem. There are two types of algorithms, which are Pseudocode and
flowcharts.

Pseudocode is an algorithm in the form of words and sentences while flowchart is an algorithm in
the form of symbols.

Symbols used in flowcharts

Process

Decision

Start/stop

Direction of flow
Input/output

67
Solve problems in a structured way, using logic and reason.

Steps when writing algorithms


1. What are my inputs?

2. What processing needs to be done?

3. What is the output?

Decision Making
This is when conditions are given for the computer to decide whether it is true or false.

Conditions
A condition is an expression that can be evaluated by either true or false
Symbols used in conditions are
> greater than
< less than
>= greater than or equal to
<= less than or equal to
<> Not equal to

Combining conditions with AND or OR


When AND is used, both conditions must be true for the decision to be true.
When OR is used, any one of the conditions must be true for the decision to be true.

68
Examples
Give decisions (True or False) for the following conditions:
Assume: x = 10 y=0 z = -5
1. x > y * 2 ___True__

2. z^2 = x _________________________

3. x > 3 OR y < z ____________________

4. y >=0 __________________________

5. x <> 10 _________________________

6. y <= 5 AND z >=0 _________________

69
• use program control structures for sequencing:

• use program control structures for selection (if statements, case statements

Decision making/Selection structures


There are 2 types of decision making structures which are IF … then …Else structure and the
CASE structure.

IF … then … else Structure – this is used when there is a decision to be made.

Example
A learner can only pass if they get a minimum mark of 50 in an examination. Write an algorithm
which accepts a mark for a learner and display a suitable message.
Solution
Enter mark
If mark <= 50 then
Output “passed”
Else
Output “failed”
End if

Activity

1. Ask the user for a number. Check whether it’s negative or positive and display a suitable
message.

2. Ask the user for a number. Check whether it’s odd or even and display a suitable message.

70
71
Nested IF … then … else structure
Example
1. Students at a university are graded according to the following scale:
80-100 Distinction
70-79 Merit
0-69 Fail

Write and algorithm to enter a mark and display a suitable message given that students are:

Solution
Enter mark
If mark >=80 and mark <= 100 then
Print “Distinction”
Else
If mark >= 70 and mark <=79 then
Print “Merit”
else
If mark >= 0 and mark <=69 then
Print “Fail”
End if
End if
End if

72
Activity
The body mass index (BMI) of a person is calculated as:
𝐰𝐞𝐢𝐠𝐡𝐭 𝐢𝐧 𝐤𝐢𝐥𝐨𝐠𝐫𝐚𝐦𝐬
𝐁𝐌𝐈 =
(𝐡𝐞𝐢𝐠𝐡𝐭 𝐢𝐧 𝐦𝐞𝐭𝐫𝐞𝐬)𝐱 (𝐡𝐞𝐢𝐠𝐡𝐭 𝐢𝐧 𝐦𝐞𝐭𝐫𝐞𝐬)
Using Pseudocode or otherwise, write an algorithm that will input the ID, weight (kg) and height
(m) of 30 students, calculate their body mass index (BMI) and output their ID,

BMI and a comment as follows:

A BMI greater than 25 will get the comment ‘OVER WEIGHT’, a BMI between 25 and 19
(inclusive) will get ‘NORMAL’ and a BMI less than 19 will get ‘UNDER WEIGHT’.

Case structure
A case structure is a decision structure that is used when there are more than two options to
choose from. It can be used in place of the nested if structure to make the algorithm shorter.
Example
If Sunday is day one of the week and Saturday is day seven of the week, write an algorithm which
asks a user to enter a number and display the day of the week as a word.
Solution
Enter number
Case number of
1: output “Sunday”
2: output “Monday”
3: output “Tuesday”
4: output “Wednesday”
5: output “Thursday”
6: output “Friday”
7: output “Saturday”
Else
Output “Not a valid number”
End case

73
Activity

The computer studies teacher has given a test to her learners. Write an algorithm which allows
the teacher to enter a mark and display a suitable message given that learners are graded
according to the following scale:
80-100 A
70-79 B
60-69 C
50-59 D
40-49 E
30-39 F
0-29 U

74
• use program control structures for iteration (looping):
- for.. do
- while.. do
• repeat.. until (define a sentinel value, use a sentinel value in an algorithm)
• draw trace tables to test algorithms with suitable test data

Repetition or Looping or Iteration structures

Looping or iteration means repetition of one or more statements in an algorithm. For example you
may need to enter marks for 20 learners. In this case it means that the entering of marks has to
be repeated 20 times.

There are three repetition structures, which are


 For .. do loop
 While … do loop
 Repeat … Until loop

Define a variable and a constant

A variable is a place holder for values which may change anytime during program execution,
while a constant is a value that remains the same through out program execution.

Some variables need to be initialized before they are used. Variables that increase or decrease in
value need to be initialized.

Initialize Variables
Most repetition problems come with a need to initialize variables for several reasons.
To initialize a variable is to give a starting value to a variable. We initialize variables when
 Totaling
 Counting
 Finding the highest value
 Finding the lowest value

75
For... Do loop
A for... Do loop is used when we know how many times some statements have to be repeated.
General syntax

For i = start_value to end_value do


Statements
End for

Example:
Mrs. Kapisi bought 50 items from a grocery store. Write an algorithm to enter the prices of all
the prices and get the total price.

Solution
Approach: The problem demands the use of a For..Do loop because it is asking for input of 50
prices. The problem is also asking for a total price there we need to initialize the variable total
price to zero, then we will increase it inside the loop each time a price is entered. The for do
loop always has to be ended i.e. end for. Output will only be displayed at the end of the
algorithm when all prices have been entered and the total has been obtained.

TotalPrice = 0
For i = 1 to 50 do
Enter price
TotalPrice = TotalPrice + price
End for
Output “The total price is “, TotalPrice

Activity

Enter weights and ages for 11 babies and find the average weight and average age.

76
Repeat …… Until Loop
The repeat … until loop is used when we do not know how many times to repeat. It uses a
condition at the end of the loop and the loop is terminated when the condition becomes true.

General syntax
Repeat
Statements
Until condition True

Example
Mrs. Kapisi gave a test to her grade 11 learners. Write an algorithm to enter the marks of all the
learners and get the total mark. Assume input is terminated by entering a -1 for the mark.

Solution
We do not know how many learners are in the class but we are sure that they are more than 1.
In this case we can use a repeat … until loop which will be terminated by entering a -1. The
situation is also asking us to get the total mark, therefore we should initialize the variable
TotalMark.

TotalMark = 0
Repeat
Input mark
TotalMark = TotalMark + mark
Until mark = -1
Output “The total mark is “,TotalMark

Activity

Enter weights and ages for an unknown number of babies and find the average weight and
average age. Assume input is terminated by entering a -1 for the weight

77
78
While …… Do Loop
This is looping structure that is also used when we do not know how many times to repeat some
statements. A condition is used at the beginning of the loop and the loop is terminated when the
condition becomes false.

General syntax
While condition true do
Statements
End while

NB: Algorithms that are written using a repeat loop can also be written using a while .. loop

Problems that need getting the highest value


 Initialize the highest to the lowest possible value,

 Enter each value and compare it with the highest

 If value is higher than the highest, then reassign highest to this value.

Problems that need getting the lowest value


 Initialize the lowest to the highest possible value,

 Enter each value and compare it with the lowest

 If value is lower than the lowest, then reassign lowest to this value.

Activity
1. Write an algorithm to enter marks for 100 learners and find the highest and the lowest.
2. Write an algorithm to enter ages for an unknown number of people and find the age of the
youngest and oldest people. Input is terminated by entering a 0.
3. Write an algorithm to enter prices of some items. Find the most expensive price and the
cheapest. Input will be terminated by a -1 for the price.

79
80
Problems that need counting
1. Write an algorithm to enter marks for the leaners in the grade 10 geography class and find
how many passed given that for a learner to pass, they must get 50 or more.

2. A survey was done at church to find out how many adults attended the church service.
Write an algorithm to enter ages for 500 church members and find out how many adults
were there given that adulthood starts at 18 years.

3. Write an algorithm to enter prices of a number of items. Find the most expensive price and
the cheapest price. Input will be terminated by a -1 for the price.

Appropriately apply operators +, -, *, /, MOD and DIV to solve problems

MOD and DIV


These are special division operators.

MOD
When MOD is used, you divide and give the remainder as your answer.
i.e. 7 MOD 2 = 1 - the remainder is 1 when we divide 7 by 2.

50 MOD 4 = 2 - the remainder is 2 when we divide 50 by 4.

8 MOD 2 = 0 - the remainder is 0 when we divide 8 by 2.

Activity 1

Write the answers for the following problems.


a) 85 MOD 6 = _______________
b) 15 MOD 3 = _______________
c) 25 MOD 6 = _______________

81
DIV
When DIV is used, you divide and take the whole number as your answer. Discard or ignore the
remainder.
i.e. 10 DIV 3 = 3
55 DIV 10 = 5
16 DIV 6 = 2

Activity 2
Write the answers for the following problems.
a) 95 DIV 6 = _______________
b) 25 DIV 3 = _______________
c) 15 DIV 6 = _______________

Activity 3

1. Write an algorithm to enter 200 numbers and find out how whether they are positive or
negative. Print a suitable message.

2. Write an algorithm to determine how many times a 20 liter bucket can be used to empty
a 100 liter tank full of water.

Design algorithms which relate clearly to the requirements of the system where the
problem has been observed

Activity 4

1. Write an algorithm to enter 300 numbers and output the following


 The average number
 How many were positive
 How many were negative
 How many were odd
 How many were even

82
2. Write an algorithm, using Pseudocode or otherwise, which;
 inputs 50 numbers
 checks whether each number is in the range 1000 to 9999
 Prints how many of the numbers were out of range.
 Outputs the percentage of input numbers which were out of range.

3. Write an algorithm to read in ten numbers from the keyboard. Determine the highest and
lowest of the numbers entered, as well as the average of the positive numbers. The output
should must be as follows:
The highest number is
The lowest number is
The average of the positive numbers is

4. Write a program or give an algorithm (flowchart or pseudo code) to solve the following
problem:

Pupils are graded in a test, based on the following marks:


DISTINCTION 70 – 100
MERIT 55 – 69
PASS 40 – 54
FAIL 0 – 39
Any other mark displays an error message.
Write an algorithm to input the marks for grade 10 learners and for each learner output either a
grade or an error message. Assume that input is terminated by a -1.

5. Give an algorithm (flowchart or pseudo code) to solve the following problem:

You need to enter the names of the workers and their gross salary. If the gross salary is more
than N$2000, deduct (subtract) 10% tax. If the gross salary is less than N$2000, deduct 5% tax.
Print the name, gross salary, deduction and net salary of each worker.

6. You need to pack some books in cardboard boxes. Design an algorithm(pseudo code or

83
flowchart) which measures the volume of boxes by accepting as input

W (width), H (height) and B (breadth). The only boxes permissible are boxes with a volume of
100 to 600. Any box outside this range is rejected. The books you need to pack amount to 6 000
volume units in total.
Display a message for each box to be accepted or rejected.

7. Customers can withdraw cash from an Automatic Teller Machine (ATM).

• withdrawal is refused if amount entered > current balance


• withdrawal is refused if amount entered > daily limit
• if current balance < $100, then a charge of 2% is made
• if current balance $100, no charge is made
Write an algorithm which inputs a request for a sum of money, decides if a withdrawal can be
made and calculates any charges. Appropriate output messages should be included.

Use a trace table to dry run an algorithm containing one loop/iteration and at least one
decision structure

Trace tables
Algorithms can be dry run by drawing Trace tables. A trace table is a table drawn to test
algorithms by tracking the values of variables as they change throughout the algorithm. A trace
table helps to locate logic errors that occur while the algorithm is running.

Keywords
Input / read / enter – this means enter a value from the values given under the mentioned
variable. NB: you cannot use the same value more than once.
Output / print / write / display – this means write the value of the variable under output.
“assigned”

1. Trace the following algorithm and give the output.

84
FOR i = 1 to 9
OUTPUT i
End for

2. Construct a trace table to dry run the algorithm with the data

4, 40, 90, 60, 50, 70


READ Number
FOR count = 1 TO Number
READ Mark
IF Mark < 50 THEN
OUTPUT Count, “Fail”
ELSE
IF mark > 80 THEN
OUTPUT Count, “Merit”
ELSE
OUTPUT Count, “pass”
Endif
Endif
NEXT count

3. Trace the following algorithm using the data: 18, 11, 14, 19, 17, 11, 8
Total = 0
FOR counter = 1 TO 7 DO
ENTER number
total = total + number
END FOR
average = total / counter
print average

4. Construct a trace table of the following pseudo code using the data values.
[2, 3, 7, 5, 1, 6,]
L=0
read X
For i = 1 to 5 do
IF X > L THEN
L=X
ENDIF
read X
Next i
PRINT L

85
5. Use the following test data to dry run the following algorithm
Test data: 2, 3, 4, 1, 7, 8
For i = 5 to 10 do
Input N
if N MOD 2 = 0 then
N=N/2
else
N=3*N + 1
end if
output N
end for

6. What will be the output produced by the following algorithm if A = 1 and B = 2?


REPEAT
Read A
Read B
IF A>B THEN
PRINT ‘First’
ELSE
IF A<B THEN
PRINT ‘Second’
ELSE
PRINT ‘Equal’
ENDIF
ENDIF

Until A>0 AND B>0

7. Study the following algorithm. What will be the output of the algorithm if the following values
are entered in sequence?
4 6 2 0 0 8 3 5.

READ A
READ B
REPEAT
C = (A+B)/2
PRINT C
READ A
READ B
UNTIL A = 0

86
8. Use the following test data to dry run the following algorithm

Test data: 2, 3, 4, 1, 7, 8

Input N
while N<>1 Do
if N MOD 2 = 0 then
N = N/2
else
N = 3*N + 1
end if
output N
Input N
ENDWHILE

9. Work through the following algorithm and construct a trace table


Test data: 75.00, 30.00, 20.00, 0
Price = 0
Total = 0
while Price >= 0
input price
Total = Total + Price
End while
Total > 100?
Output Price – 10/100*Price

87
10. Trace the following flowchart and complete the trace table using the data
5, 9, 7, 7, 5, 2, 1, 2, 3

Input a, b, c

Yes Yes
Is a>b? Is a>c? Output a

No No

No
Is b>c? Output c

Yes

Output b

88
a B c Decision Output

89
Identify where there is an error.
Suggest ways of removing the errors.

Algorithm Study
1. The following algorithm contains an error. Trace the algorithm and explain what the error is.

1. SET X = 1
2. REPEAT
3. X = X + 2
4. Print X
5. UNTIL X = 10

2. Write down the output of the following algorithms


a. FOR i = 1 to 9
OUTPUT i
Next i

b. FOR i = 1 to 9 step 2
OUTPUT i
Next i

c. Re-write each of the above algorithms using:


i. a REPEAT loop
ii. a WHILE loop

90

You might also like