Grade 9 Computer Science Notes
Grade 9 Computer Science Notes
GRADE 9
COMPUTER STUDIES
::
1
Table of Contents
CHAPTER 1: COMPUTER SYSTEMS .............................................................................. 4
Software copyright.................................................................................................................. 4
Software Piracy ....................................................................................................................... 5
2
Netiquette .............................................................................................................................52
3
CHAPTER 1: COMPUTER SYSTEMS
- Define software copyright
- Explain the importance of a software copyright act (i.e. Digital Millennium Copyright Act of
1998)
- discuss the consequences of a software copyright act in today’s society
- discuss the effects of software piracy locally and world wide, develop a strategy to reduce
software piracy within the community
Software copyright
Software copyright is a legal right that prohibits the copying of programs for either personal use or
selling purposes; without the owner’s permission.
It is the legal control of the copying of software to protect the authors of software from illegal use
of their software.
4
3. The No Electronic Theft (NET) Act of 1997 restricts on giving away copyrighted material
on the internet without legal repercussions.
Software Piracy
This is the illegal copying of software either for personal use or for sale.
Users must buy software and get a valid license to use the software. Buying a license
does not make you an owner; it just authorizes you to use the software.
Pirated software may contain viruses, which can harm your computer
You will not get any help from the software developer if you have any problems with the
software.
You can be taken to court and if found guilty you will be jailed or fined.
Developers lose revenue from pirated software, which holds back development of new
software and suppresses the growth of the software company
Companies cannot invest in new jobs and new technologies
It lowers government tax revenues
ACTIVITY MARKS: 15
1. Define the following terms:
Software copyright
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………[2]
Freeware
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………[2]
Open source software
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………[2]
5
Software piracy
…………………………………………………………………………………………………………………
………………………………………………………………………………………………………………[2]
6
compare and contrast the following:
o open source software
o freeware and shareware
o public domain software
Freeware
This is copyrighted software which you can download and use for free.
You should be careful when downloading freeware because it may contain viruses
You should only download Freeware from trusted websites
Shareware
This is copyrighted software which is distributed for free of charge for a trial period.
After the trial period is over; normally 30 or 60 days, or even a year, you will be required to
buy it in order to keep using it.
7
CHAPTER 2: SPREADSHEETS
- define a spreadsheet
- name the characteristics of spreadsheets
- state the purpose of spreadsheets (e.g. accounting, forecasting)
- apply page setup features - margins - orientation
- describe the screen layout and effectively use the elements thereof
Uses of a spreadsheet:
Calculations using formulae in accounting
Forecasting or What if analysis- a spreadsheet can answer the question what if? For
example what if we increase the price of sugar by 10%, what profit are we going to get?
Producing graphs for data analysis e.g. pie chart, bar graph, line graph etc. Graphs are
easier to read than number
Examples of spreadsheet program are Microsoft office excel, Open office. Calc and Lotus
123.
Structure of a spreadsheet
A spreadsheet is made up of a grid of rows and columns. The columns have letters and rows
have numbers.
Cells
A cell is the intersection of a row and a column. A cell is formed when a row and a column meet.
Data items are entered and stored in cell. Each cell has a cell address or cell reference or cell
name. A cell address is made up of the column letter followed by the row number e.g. A1 B7, and
F12 etc
Active cell
This is the current cell where the cursor is. Anything you type will be entered in the active cell.
8
Formula bar-this displays the contents of the active cell and it displays the formula that was used
to calculate a value.
9
Reference area:
This is a table of columns and rows. It is a collection of cells where data is entered.
The columns are labeled with letters and rows are labeled with numbers.
Cell range- this is a selected group of cells which come one after the other e.g. B5 to B11 or C1
to C7. A cell range is defined using the colon e.g. B5:B11 or C1:C7
Worksheet
Template
This is a worksheet that is already designed for particular purpose and it can be used over and
over.
Page Setup
This is the section which allows a user to change how a page will look like when it is printed.
Margins and orientation can be changed in the page setup.
Margins
Margins are the blanks areas of space around the edge of your worksheet.
Orientation
This is the way in which a rectangular page can be viewed when reading the information on it.
There are two types of page orientation, which are portrait and landscape.
Wrap text
10
Wrap text allows a user to display long text on multiple lines in a single cell.
11
Distinguish between:
Value
Label
Formulae
Function
adjust column width and row height
When a value is entered in a spread sheet it is right aligned by default which means a number
goes to right of the cell unless you format it to be at the center or left. If you enter a value that is
too long for the cell you will see ##### to show that the value cannot fit in the cell and you must
increase the column width.
Telephone numbers and pin numbers are not values because they are not used in calculations.
This is data, which contain letters, characters, symbol, or a mixture of letter symbol and numbers.
Examples of labels are total, test1, test2, telephone numbers and all other numbers which are not
used in calculations. Labels are left aligned by default
Formulas- This is data that contain values, cell addresses, functions and mathematical operators
and a formula always starts with an equal sign e.g. =B1 + A8 + C5. A formula always calculates
and displays a value. If you want to see the formula you can get it on the formula bar.
There are two types of formulae which are user defined formula and pre-defined formula
This is a formula which is created by the user and it only contains values, cell address and
mathematical operators e.g. = 5*(C1+E8)
Pre-defined formula
12
This is a formula which contain functions such as sum, average, min, max, etc. for example
=SUM(B1:B8) or =AVERAGE(B1:B8). Functions are sets of instructions, which perform a specific
task.
13
use pre-defined functions
- SUM, AVERAGE, MAX & MIN, COUNT, COUNTA, COUNTIF, SUMIF, simple IF,
compound IF
Apply
- cell addressing
- absolute referencing
- relative referencing
- data validation
- sort
- filter
- cell referencing
- insert graphics
- change text direction
- data formatting
- freeze panes
- hide or unhide rows/columns
FUNCTION
SUM function
AVERAGE Function
MIN Function
MAX Function
This used to find the largest value from value in a range of cells
COUNT FUNCTION
It counts the number of cells containing either values or formulas in a cell range.
COUNTA FUNCTION
It counts the number of cells containing data. Any cell containing any kind of data will be counted.
COUNTIF Function
14
It counts the number of cells that have data that matches a given condition. e.g
=COUNTIF(A1:A10, “>20”)
This is a function which gives you an answer if the condition specified is true and another answer
if the condition is false.
Example
=IF(G3<40,"U",IF(AND(G3>=40,G3<50),"E",IF(AND(G3>=50,G3<60),"D",IF(AND(G3>=60,G3<70
),"C",IF(AND(G3>=70,G3<80),"B",IF(AND(G3>=80,G3<=100),"A","ERROR"))))))
Copying a formula
There is no need to type similar formulae in all the cells one by one. Formulae can be copied from
one cell to another.
There are basically 3 methods of copying formula, which are dragging, copy and paste, and using
the fill command.
The following spreadsheet will be used to explain the 3 methods to copy the formula in C2 to cells
C3, C4, and C5.
15
A B C D E
2 15 20 =a2+b2
3 31 42
4 33 45
5 71 80
Highlight C2
Click copy from the tool bar
Highlight C3-C5
Click paste from the tool bar
Fill command
Highlight C2-C5
Click edit
Click fill
Click down
NB: If the cells are up then you fill up, if the cells are on the right, then you fill right and if the cells
are on the left, then you fill left.
Dragging
Highlight C2
Point to the bottom right corner of C2 until a black cross appears
Drag the left mouse bottom down until C5
Release the mouse bottom and remove the highlight.
Cell References
A cell reference is a cell address or a cell name. It starts with the column letter followed by the
row number e.g. Z5, B3, etc.
16
There are 2 types of cell reference, which are relative cell reference, and absolute cell reference.
This is an address in a formula, which changes when the formula is copied from one cell to other
cells. A relative cell address changes to suit the new position.
This is an address which does not change when a formula is copied from one cell to another.
Some addresses must not change even when they are copied from one cell to another for
example percentages and rates. Absolute addresses are indicated by putting a $ sign on the
address.
Formatting values
Cells can be formatted to hold values of a specific type such as currency or decimal places.
A B C D
2 45.23 $20.00
3 15.63 $30.00
4 16.98 $27.00
5 30.12 $38.00
17
Formatting the amount paid column to currency
Highlight B2-B5
Click format
Click cells
Click ok.
Highlight A2-A5
Click format
Click cells
Data validation
Validation is making sure that only sensible data is entered in the spread sheet. For example if
you are entering marks, only numbers from 0 to 100 should be entered and the computers should
print an error message if a wrong number such as 150 is entered. There can not be a mark which
is above 100 or below 0 and if such numbers are entered, the computer should be able to display
an error message.
18
How to validate data
-Click validation
-Click setting
-Click ok
Sorting is done to make it easier to search for a particular item of data. Sorting is done using a
specific criteria e.g. sort by name, surname, average etc.
-Select sort
-Click ok
Data filtering
This is a way of displaying only certain data while the rest of the data are hidden.
E.g. if the spread sheet contains male and female then you may want to look at male only while
female are hidden.
Conditions are used and only data which match the condition will be displayed while the rest are
hidden.
19
Filtering will temporarily hide the data which you do not want to see.
Select filter
Charts
A chart is a picture which represents the data in a spreadsheet. E.g. pie chart, bar graph, etc
A chart is much easier to read and understand than a set of numbers in a spreadsheet.
Select the type of chart e.g. pie chart, bar graph etc.
Follow the steps from the chart wizard and click finish
20
Activity Marks: 8
21
This is applying a background color to a cell.
.......................................................................................................................................................[2]
22
=COUNTIF(A1:A10, “20”)
>
1. DeterminetheformulawhichmustbeincellD3,
1. Determine the formula which must to becalculate
in cell D3, the tosubtotal
calculate the subtotal
.............................................................................................
………………………………………………………………………………… [2] [2]
2. What formula must be in cell F3, total cost?
2. What formula must be in cell F3, total cost?
………………………………………………………………………………… [2]
3. .............................................................................................
What formula must be in cell F8, total cost of Gifts? [2]
…………………………………………………………………………………
3. What formula must be in cell F8, total cost of Gifts? [2]
The formula =COUNTIF(B3:B6,"<50") is placed in[2]
4. ............................................................................................. the cell B11, what will the
output be?
4. The formula =COUNTIF(B3:B6,"<50") is placed in the cell B11, what will the output [1]
……………………………………………………………………………….. be?
............................................................................................ [1]
5. In what order should the data be sorted, using which column in order to have the
Guitar Amplifier first on the list?
5. In what order should the data be sorted, using which column in order to have the Guitar
………………………………………………………………………………
Amplifier first on the list? [2]
6. Write the formula to determine the gift that will cost you less.
………………………………………………………………………………
.......................................................................................... [2] [1]
6. Write the formula to determine the gift that will cost you less.
.......................................................................................... [1]
23
Activity Marks: 10
1. A builder needs to finds out the cost of tiling floors of a new building. The building consists of a
number of rooms of different sizes. The owner could choose between two different tiles.
A B C D E F G H
1 QUOTE OF TILES TO BE LAID IN NEW BUILDING
2
per
3 Cost of tile Tile 1 15.00
square meter
per
4 Tile 2 20.00
square meter
5
6 Length breadth Area Tile Option Prize
7 Room 1 5 3 15 1 225.00
8 Room 2 7 4 28 1 420.00
9 Room 3 2 2 4 2 80.00
10 Room 4 5 3 15 2 300.00
11 Room 5 4 7 28 1 420.00
12 Total 1445.00
(d) How can the formula of cell E7 be copied into cells E8 to E11. [1]
24
CHAPTER 3: DATA COMMUNICATION
Define the term data communication
Distinguish between receiving and sending devices
List the hardware and software needed for communication:
Describe how data is transmitted and received
Describe how errors can occur during the transmission of data
Describe how data can be checked for errors
Data communication
The electronic transfer of data, instructions and information from one location to another.
Receiving Device-is a device that accepts the data, instructions or information e.g.
desktop computer, smartphone etc.
o Hardware
Internal modem
External modem
Asymmetric Digital Subscriber Line (ADSL) adaptor
Telephone link
Integrated Services Digital Network (ISDN) adaptor
o Software
E-mail program
Communication software e.g. Skype, SMS, MMS
Instant Messaging (IM)
Internet Relay Chat (IRC)
Receiving Device
Sending Device
Communication Digital Signals
Digital Signals channels
25
A computer understands digital signals, while communication channels carry analog signals, so
for them to understand each other they need a modem in-between them. The modem Modulates
(changes digital signals to analog signals) for the telephone link to transmit. On the receiving end,
the modem demodulates (changes analog signals to digital signals) the received signals from the
telephone line into digital signals for the receiving computer to understand the sent message.
Parity Bit: an extra bit is attached to check whether the transmitted message has an error. The
parity bit is always added at the end of the bits.
100000000
Even Parity: Number of ones (1) should always be even, if not then an error would
have occurred.
Odd Parity: Number of ones (1) should always be odd, if not then an error would have
occurred.
Mark Parity: The parity bit should always be a 1. If at the destination it reaches as 0 then
an error must have occurred.
Space Parity: The parity bit should always be a 0. If at the destination it reaches as 1 then
an error must have occurred.
26
Cyclic Redundancy Check (CRC) is an error-detecting code or algorithm used to verify the
accuracy of data contained in a data block. When the sending device transmits the data, it
performs a CRC calculation to generate a unique 4-byte number called the frame check
sequence (FCS). This check value, FCS is attached to the data frame/block being transmitted.
The receiving device will decode the FCS by repeating the same CRC algorithm and making sure
that the frame is exactly as the original. In the event that the frame’s field does not match, the
receiving device assumes the data has been damaged during transmission, so it will notify the
sending device to re-transmit the data.
Activity Marks: 14
1. In order for information to reach its intended destination, there are certain components that
need to be in place. Name any two and describe them? [4]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
2. Name and explain any software needed for communication to take place? [2]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
3. Clearly explain how data is transmitted? [4]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
4. A computer uses parity checking method to detect errors that can occur during transmission.
i. List any two causes of these errors [2]
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
ii. Using the odd parity checking method, what would be the parity bit for the following
bits of data?
a) 10010101 01010110 ……………………… [1]
b) 11001100 11000110 ……………………… [1]
27
Explain what is meant by rate of data transmission
Describe various transmission modes and give examples of applications for each
Differentiate between the following transmission media:
o Wireless and cables
Data transmission
This is the measure of how much data is transmitted during a given period of time. It is expressed
at quantity of bits per second. E.g. 1 kilobit per second (1 Kbps).
Signal Directions
Simplex Duplex
Simplex duplex transmission is when communication is only one way between two devices. One
device only sends and the other only receives, information is not sent back to the sender.
A B
Sending Device Receiving Device
Data goes to B from A
Example: A keyboard only sends to the CPU, there is no way the CPU sends back to the
keyboard. The CPU also sends to a speaker and there is no way that a speaker communicated
back to the CPU.
Half-Duplex
A B
Sending Device Receiving Device
Data goes to B from A
A B
Receiving Device Sending Device
Data goes to A from B
Example: Automated Teller machines (ATMs) where a user inserts a card, the system prompts for
a pin number, users enter the pin, the machine verifies the pin and returns the appropriate
28
response, if correct, the user is prompted to enter amount to be withdrawn, the machine gives the
card, the money and the receipt if required.
Full duplex
Serial transmission
When data is transmitted one bit after another over a single wire
1 1
Parallel transmission
When bits are transmitted as a group, usually eight (8) bits simultaneously on separate wires
within the same cable.
0
1
0
1
1
Sending Device Receiving Device
1
1
0
0
0
29
Synchronous and asynchronous
Synchronous transmission
Groups of bits are combined into blocks of characters which are sent continuously; the
transmission of the characters is synchronized by an external clock.
Sending Device Char1 Char2 Char3 Char4 Char5 Char6 Receiving Device
Asynchronous transmission
A group of bits are transmitted as independent units with start/stop bits. This transmission is used
when the rate at which characters are generated is unknown or the transmission rate is too slow.
For example, the transmission of characters from the keyboard and a computer.
Transmission media
Wireless
This is the transmission of data from one device to another through the air. There are no cables
or wires.
Infrared
Transmits data using infrared-light waves, for the devices to communicate both must have an
infrared port and their ports must be in line-of-sight. There must be no obstruction of the path of
the infrared light waves and transmission is within a short-range.
30
Bluetooth
A mobile wireless networking standard that uses short range radio wanes to transmit data
between two devices.
e.g. When transferring music between cellphones, both devices have to enable Bluetooth in order
for data to be transferred.
Communication Satellite
This is a space station that links with microwave earth-based stations to broadcast the microwave
signals to a wide area.
-It sends signals on earth to other devices and also receive signals from devices on earth.
Microwave relay
It has sending and receiving antennae mounted on a tower e.g. the MTC cellphone towers.
Microwave radio transmits voice and data through the atmosphere as super high-frequency radio
waves called microwaves.
Physical media/Cables
Coaxial
This is a type of cable that has an inner wire surrounded by a tubular insulated layer, surrounded
by a tubular conducting shield.
31
fiber-optic
This is a network cable that contains a number of glass threads inside an insulated casing. Fiber
optic cables carry data signals in the form of light.
-The cables were designed to transmit data over long distances and carry a lot of data (very high
bandwidth).
-They are very expensive but very reliable. They are use for long distance telecommunications.
twisted pair
Also called Ethernet cables consists of color coded pairs of insulated copper wires twisted
together. Each pair of wires is twisted around each other and all the pairs are enclosed in a
plastic sheath. The pairs are twisted together to reduce noise. Telephone lines and Internet use
twisted pair cables.
Activity Marks: 15
…………………………………………………………………………………………………………………
32
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
3. Data is transmitted in what units? [1]
…………………………………………………………………………………………………………………
4. Name and explain any two types of cables. [4]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
33
Define networking
Define communications protocol
Explain why communications protocol is necessary
Distinguish between and evaluate different networks according to size
Understand various types and topologies of networks
Distinguish between and evaluate different networks according to network architecture
Describe the types of servers
Explain the purpose of different networking devices
NETWORKING
A networking is a group of computers and devices connected together using communications
devices and transmission media.
It can also be defined as a connection of two or more computers for the purpose pf sharing
resources such as hardware, software and information.
Communications protocol
These are the rules, which define how data is exchanges between hardware and/or software
components in a communication network.
It can also be defined as a set of rules that must be followed by two devices in order for them to
communicate with as little error as possible E.g. How to connect to the WIFI, how to transfer files
via Bluetooth etc.
To ensure that data is transferred in a sequence and without errors between network
devices. They define thing like data format, error checking methods and sequencing techniques.
Types of networks
Local Area Network (LAN)
This is a connection of computers in a small physical area such as a home, office, a small group
of buildings such as a school or airport. A LAN is usually formed by using cables or wireless
devices.
34
Metropolitan Network (MAN)
Connects LANs in a metropolitan area such as a city or town. MAN was designed to handle data
communication for multiple organizations in a city and sometimes nearby cities, too.
Network topologies
Star
This is a network in which all devices are connected to a central computer called a server.
Computer 1
Server
Printer
Switch/Hub
Computer 3 Computer 2
Modem
Advantages
Disadvantages
35
Bus
This is a network in which all the devices are all connected to a single line of cable called a bus.
Computer 1
Printer Server
Terminator Terminator
Data path/bus
Computer 3 Modem Computer 2
Advantages
Disadvantages
Ring
It is a topology in which each device is connected to exactly 2 other devices and thereby forming
a circle.
36
Computer
1
Computer
Modem
2
Server Printer
Advantages
-data flows in one direction, so there is no way data smash together (collide)
Disadvantages
Hybrid
Computer 1
Computer 1 Server
Server
Printer
Switch/Hub
Switch/Hub
Computer 2
Modem
Computer
Printer 1 Server
Terminator Terminator
Data path/bus 37
Computer Modem Computer
3 2
A topology which combines two or more topologies together. For example; a star-wired Bus
combines a star and bus formations.
38
Advantages
Disadvantages
-It is expensive to set-up, since, many cables and communication devices are required.
Network architecture
Client-server architecture
This is a network which contains one or more servers providing services to a number of clients.
Servers supply an clients consume
Advantages
-if any client fails it will not affect the rest of the network
Disadvantages
-if the servers fail, then the whole network goes down
-it’s expensive to set up because there is need for special server hardware and software
Peer-to-peer architecture
This is a network in which there is no server and all nodes have equal access to network
resources. Every node is both a supplier and a consumer of resources.
39
Advantages
-it is cheaper to set up because there is no need for special hardware and server software.
Disadvantages
-It can not accommodate a large number of computers. Problems are experienced if the
computers are above 15.
-it needs every user to be trained on how to be a network administrator so that they can be able
to use and share network resources.
Types of servers
File server a computer that works as a disk drive, storing the programs and data files.
Web server contains web pages that can be viewed using a web browser.
Proxy server is a typical component of a firewall which is a server outside the company’s
network.
40
Other network devices
A node: any computer (client or server) that is able to send or receive data.
Workstation: A personal computer (such as a desktop or laptop), which may or may not be
connected to a network.
Hub: is a connectivity device that provides a common connection point in a network. It receives
data from one or more nodes which is forwarded out to one or more other nodes.
Switch: A connectivity device that connects computers to a network. Unlike a hub, which sends
messages out to one or more other nodes a switch only sends to the intended recipient.
Router: is a communication device that connects multiple computers or other routers together and
transmits data to its correct destination using the best route/path at that particular time.
Wireless devices: these are devices that connects to a network or link a network wirelessly
(without connection of cables)
NIC (Network Interface Card): is a device that enables a workstation to connect to the network
and communicate with other computers.
Gateway: Hardware, software or a combination or both, that connects two different kinds of
networks together. e.g. connecting a LAN and a WAN
Bridge: Is a connectivity device that connects the same type of networks. E.g. similar LANs
41
Activity Marks: 40
42
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
9. Name two benefits that star topologies have over ring topologies? [2]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
10. A company would like to make use of the bus topology to set up its network. Advise the
company why this would be a bad topology to implement. [2]
…………………………………………………………………………………………………………………
……………………………………………………………………………………………………………
5. Why is a firewall necessary in a network? [2]
………………………………………………………………………………………………………………
………………………….……………………………………………………………………………………
43
CHAPTER 4: INTERNET AND E-MAIL
Define and explain the following terms:
Internet
world wide web (WWW)
e-mail
e-commerce
e-learning
search engine
File Transfer Protocol
Newsgroups
website
web page
Uniform Resource Locator (URL)
Hyperlink
download and upload
video conferencing
The Internet
The Internet-this is a global network of computer networks which is public and does not belong to
any particular organization or person. It consists of a lot of servers and clients. Anyone can use
the internet at any time.
It can also be fined as a collection of networks connected to each other through various
communication channels over the whole world.
An example: WAN
This is a huge electronic database where documents and other web resources are identified by
Uniform Resource Locators (URLs), interlinked by hypertext links, and accessible via the Internet .
Email or E-mail
44
This is the transmission of messages and files over a computer networks.
Besides text-based messages, photos, videos and any other file can be attached to e-mail
messages.
Email has proved to be one of the most convenient means of communication.
E-commerce
E-learning
Search engine
A program that is used to find a web site, web page, image, news or map related to a specific
topic without using a specific web address or look at a specific website e.g. Google, Yahoo!, Ask,
Answer and MSN
Software that allows uploading and downloading of files between computers over the
Internet.
o Downloading: the process of transferring documents from the server on the internet
to a user’s computer.
Newsgroups
Online area that allows users to have written discussions about a specific subject.
o They cover any topic
o People get together for fun or for business reasons
o An article is posted and other group members read and reply to it
45
Website and Web Page
Website
Web Page
Electronic document containing content such as text, images, video, audio and animation.
A web page connects to other web pages or website
http://www.divundu.com
Hyperlink
Can be a picture or word that is used to connect to other documents, web pages that
contain related information.
Video conferencing
This is a facility which allows people in different locations to meet via the internet in real time,
while they are able to see and hear each other. General uses for video conferencing include
business meetings, educational training or instruction and collaboration among health officials or
other representatives.
In addition to the basic requirements of a computer system, the following hardware components
are needed for one to be able to do video conferencing.
46
1. Web camera- it will capture your video and send it to the other user.
2. Soundcard to connect the speakers and microphone
3. Speakers to hear the other users as you are communicating
4. Microphone- it will record your voice and send it to the other user.
Technology can fail or systems may crash/go off-line. Remote connections are sometimes
known to be disturbed by environmental changes.
Have to give extra training to use the Equipment. On some occasions, the absence of
technicians creates difficulty for participants who are unfamiliar with the videoconferencing
technological concepts.
Need to employ somebody to set up and maintain Equipment.
Time zones may be different if conferencing in different parts of the world
Activity Marks: 18
1. Define the following terms:
Internet
E-Commerce
E-Learning
World Wide Web (WWW)
File Transfer Protocol
Uploading
Video Conferencing
2. Explain why employees at a firm might benefit from using video conferencing.
47
Explain why we use e-mail and Internet
Specify the hardware and software needed for Internet connection evaluate different
technologies to connect to the internet
Explain the term service provider and its functions
describe the advantages and disadvantages of using e-mail and the Internet
explain proper netiquette
E-MAIL
Why we use email
News: keeps you informed on politics, weather, entertainment, sports and financial
views
Distance learning: attend lectures, sending assignments and writing examinations online
48
Requirements for Internet connection
Modem: for those using telephone line connection use an analog modem. Cable
modems such as Digital Subscriber Line (DSL) are commonly used today
Web browser: software that allows one to view and explore the web pages
Internet Service Provider (ISP): organisation or individuals that connect you to the
Internet for a fee. Examples: MTC, Telecom, I-way and Africa on-line
Advantages
- Email is faster to reach the recipient because the message is delivered almost instantly
depending on the connectivity.
- One can send an e-mail anytime. It is available 24/7 unlike the post office which closes
at end of day.
- One can send attachments with email. This reduces the costs and effort of sending
files such as photos, videos, music files etc.
- Email is more secure because one needs a password to access an email account.
- The sender is assured of the arrival of the email. It won’t get lost as long as the
address is correct.
49
Disadvantages
o A lot of mail is difficult to manage, such as that some of the important mail may
not be read or deleted
Inbox – stores messages which have been received. If the message is not yet read, it will be
bold.
Drafts – stores the messages which have been typed and saved by the user so that they can
send them later.
Trash – temporarily stores the messages which have been deleted for a short time before they
are permanently deleted. This is done to allow the user to recover the messages in the case of
accidental deletion.
You can also create your own folders in your email account so that you can use them to keep
your email in an organized way.
Compose - opens the compose window for the user to create a new message and send it.
Attach files – allows the user to attach files to the message e.g. sound, picture, and video.
Save draft – allows the user to save the unfinished message as a draft to be completed later.
50
Delete – allows the user to remove unwanted received messages. These messages are
temporarily kept in the trash folder, then they will be permanently deleted after some time. If
you accidentally delete your email, you can get it from the trash folder but you need to be
quick.
1. Address area – where the user enters the e-mail address where the message is to go.
2. Subject area – where the user enters the subject or topic of the message.
3. CC area – where you type addresses of other people to whom you want to send the same
message. Cc stands for Carbon Copy
4. Message area –where the users types the message to be sent.
5. Attachments area – This is where the users clicks to get the option of attaching files to the
email.
The internet offers a lot of good facilities but people are still afraid of using it. This is because of
some of the following reasons.
There are high chances of losing confidential information such as credit card numbers to
hackers on the Internet.
There are a lot of bogus sites. Bogus sites are web sites which pretend to belong to a
certain company when they do not. Such sites pretend to belong to a certain bank or
shop.
There are a lot of viruses on the internet. Viruses can come to your computer by
downloading files which you are unsure of. They can also be sent to you via e-mail.
51
Netiquette
Short for Network Etiquette (good manners)
Proper netiquette
Always treat other users online as you would like them to treat you.
Behave online as you would offline.
Respect other people’s time and bandwidth.
Share your knowledge.
Do not abuse your power. Administrators should not read other people’s private emails.
Forgive other people’s mistakes. Excursion
Activity Marks: 10
1. Read the following extract about a young lady from India and then answer the
questions that follow.
“Most people of my age today in India literally live online,” says Seeya Malhotra as she
unwraps a box that has been delivered to her desk at work.
The box contains a set of desk speakers which she had ordered on the internet a
few days before.
Buying items at the click of a button is the way Seeya shops these days - she says
almost half of her wardrobe has been purchased online, as well as her lunch and
many other things.
(a) What does this article mean when referring to ‘purchasing online’? [1]
(b) Define the word internet. [1]
(c) How would Seeya pay for the products she had purchased ‘online’? [1]
(e) One of the problems associated with the internet is security. It is very easy to
download viruses from the internet.
Explain how this can be prevented. Not using the internet is NOT an option.
52
Information is needed concerning accommodation in that region. Someone suggests
to use the internet to find the information.
(a) They will search for information on the geomorphology of the Spitzkoppe, suggest proper
(b) Learners need to send an email to book for accormodation during their excursion.
Mention two advantages of using E-mail over ordinary post services and
one disadvantage of using E-mail.
(c) How would the students benefit from using the internet. Name 3 ways. [2] [1] [2
53
CHAPTER 5: SOCIAL & ECONOMIC IMPLICATIONS
- education
- medical field
- social interaction
- business, employment and the economy as a whole
- communication
- information access and storage
- environment (e.g. disposal of certain computer components)
54
Addiction: makes people keep away from other essential activities
E-waste
Social isolation; many people do not physically interact
Pornography: children are now exposed to inappropriate sexual material
Activity Marks: 10
1. Give a brief description of the impact of computer technology on education and in the medical
field
2. How are computers negatively impacting the society
55
ECONOMIC IMPLICATIONS
define a computer virus
explain the causes and effects of computer viruses
explain the prevention of infection of computer viruses
explain how to remove computer viruses
classify various types of viruses
explain the effects of these various types of viruses
Mass production; the final product is better designed and manufactured much faster and
with better quality
Disadvantages
Loss of jobs promoting poverty, people with ‘older skills’ do not benefit so much, since IT
knowledge has become a necessity for most jobs.
Malware, software piracy, hacking and equipment theft have become a major economic
concern
If the system fails, then no production goes on and results in huge losses
56
Malware (Malicious Software)
Is software that attacks computer systems; they include:
Computer Virus
Worm
Trojan Horse
Rootkit
Computer Virus
Potentially damaging computer program designed to alter the way the computer work
without user’s knowledge or permission.
Once the virus infects the computer, it can spread throughout and may damage files and
system software including the operating system.
Example: Michelangelo and I Love You which comes in an email with the subject I Love
You.
Worm
A program that copies itself repeatedly, for example in memory or on a network, using up
resources and possibly shutting down the computer or network.
Trojan horse
Program that pretends to be an essential program, yet it contains code that is intended to
disrupt a computer, network or a website.
Rootkit
Program that hides in a computer and someone from a remote location is allowed to fully
control the computer.
Once installed, the writer can execute programs, change settings, monitor activities and
files on the remote computer
57
Other types of Malware
Affects the start-up instructions by replacing some of the boot sector instructions with its
own, creating a modified, infected version of the boot sector program.
Is a type of virus that is triggered or does its destructive functions when a certain condition
is met.
Macro Virus
o Once an application containing the macro virus is opened, the virus loads into
memory.
Email-hoax
An email message not a virus that warns people of a non-existing “new” virus. These false
hoax messages require one to send the message to all one knows which causes internet
traffic and unnecessary worry.
Backdoor
A program that allows users to bypass security controls when accessing a program,
computer or network.
Adware
Spyware
58
Effects of computer viruses
Through network
Prevention measures
59
Activity Marks: 10
1 Access to so much information and variety of applications from different sites has not only
given us an advantage to learn a lot of things online, but has also exposed our computers
to different threats.
(a) What is malicious software and except the virus name and explain two other forms of
malware? [5]
Malicious software is
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
Form 1:
…………………………………………………………………………………………………………
Explanation………………………………………………………………………………………
…………………………………………………………………………………………………………
Form 2:
…………………………………………………………………………………………………………
Explanation………………………………………………………………………………………
…………………………………………………………………………………………………………
……………………………………………………………………………………..……………..…
(c) What is a virus and an anti-virus? [2]
……..………………………………………………………,,…………………………………..……
……………………………………………………………………………………………………….
……………………………………………………………………………………………………….
60
DATA SECURITY
explain the following security concepts:
- password
- physical security
- other control measures, e.g. biometric passwords, back-ups, mirror systems, levels
of authorization, encryption, firewalls, log files
demonstrate good password principles
explain the following:
- hacking
- cracking
- piracy
- phishing
- other computer crimes
propose how one could protect devices and computer systems in a variety of
environments against digital threats
Ensuring - guaranteeing
Computer Security Risk - is any action or event that leads to loss or damage to computer
hardware, software, data information or processing capability.
Unauthorised access
Software theft
System failure
Natural disaster
61
Internet and Network attacks – includes virus attacks, cybercrime
o Cracker – Is a malicious hacker, who breaks into computers for malicious reasons
such as getting information for financial gain.
o Phishing – is when trusted company names are used to attract/trap users to provide
their confidential information.
o Hardware theft and destruction – stealing of computer equipment and destroying the
equipment intentionally.
o Cyber Crime: any online or internet – based illegal act. Includes botnet, denial of
service attack (DoS attack) backdoors and spoofing.
Aging hardware
Fire
Flood
62
Power problems
Prevention Measures
Physical Security: this prevents unauthorised access and hardware theft and includes
Anti-virus software: this can protect a computer from Denial of Service attack and other
malware
o Facial recognition
o Finger prints
Back-up: a copy of the original used to provide back the lost information in the event that
the original information is lost or damaged.
63
Firewall: is a system of hardware and/or software that protects a computer or a network
from intruders.
o Examines data passing into or out of a private network and decides whether to
accept or deny transmission of the data.
Mirror systems: facilitates writing data onto two disks at the same time to enhance
storage reliability.
Levels of authorization: Users must have different levels of authorization to keep some
of the information confidential and secure.
Data privacy
Data privacy: it refers to the right to individuals to determine what information is stored about
them and how that information will be used.
Data protection
Data Protection: this is a measure which insures that information is kept private.
There re so any ways that can be employed to keep your information private. This includes
limiting the mount of information which you provide to websites, turning off file and printer sharing
facility on your internet connection, clearing your history file when you are finished browsing, and
privacy laws ensure that information collected and stored about individuals should be used only
for the purpose it was collected for unless the owner gives permission for other purposes.
64
65
Activity Marks: 12
................................................................................................................................................
…………………………………………………………………………………………………… [1]...............
(b) State two ways that users can protect their computer systems from
hacking.
1 .............................................................................................................................................
2 .............................................................................................................................................
2. The computer system at the Ministry of Home Affairs was down for two weeks and no
services were being offered. Clearly explain how it might have economically affected both
the ministry and the public.
(a) Ministry of Home
Affairs……………………………………………………………………………………………
……………………………………………………………………………………………………
Public……………………………………………………………………………………………
……………………………………………………………………………………………………
(b) Explain what Computer Security Risk is?
……..……………………………………………………………………………………………
……………………………………………………………………………………………………
(c) Name any two ways/categories how computers are exposed to security risks and
explain them?
Threat 1:
……………………………………………………………………………………………………
Explanation:..……………………………………………………………………………………
…………………………………………………………………………………………………..
Threat 2:
……………………………………………………………………………………………………
Explanation:..……………………………………………………………………………………
…………………………………………………………………………………………………..
66
CHAPTER 6: COMPUTER PROGRAMMING
define an algorithm
distinguish between
- pseudo code
- flowchart
define a variable and a constant
initialise variables
write algorithms using variables
use operators:
- mathematical ( +, -, /, *, mod, div)
- logical (AND, OR)
- comparison (=, <, >, >=, <=, <>)
Pseudocode is an algorithm in the form of words and sentences while flowchart is an algorithm in
the form of symbols.
Process
Decision
Start/stop
Direction of flow
Input/output
67
Solve problems in a structured way, using logic and reason.
Decision Making
This is when conditions are given for the computer to decide whether it is true or false.
Conditions
A condition is an expression that can be evaluated by either true or false
Symbols used in conditions are
> greater than
< less than
>= greater than or equal to
<= less than or equal to
<> Not equal to
68
Examples
Give decisions (True or False) for the following conditions:
Assume: x = 10 y=0 z = -5
1. x > y * 2 ___True__
2. z^2 = x _________________________
4. y >=0 __________________________
5. x <> 10 _________________________
69
• use program control structures for sequencing:
• use program control structures for selection (if statements, case statements
Example
A learner can only pass if they get a minimum mark of 50 in an examination. Write an algorithm
which accepts a mark for a learner and display a suitable message.
Solution
Enter mark
If mark <= 50 then
Output “passed”
Else
Output “failed”
End if
Activity
1. Ask the user for a number. Check whether it’s negative or positive and display a suitable
message.
2. Ask the user for a number. Check whether it’s odd or even and display a suitable message.
70
71
Nested IF … then … else structure
Example
1. Students at a university are graded according to the following scale:
80-100 Distinction
70-79 Merit
0-69 Fail
Write and algorithm to enter a mark and display a suitable message given that students are:
Solution
Enter mark
If mark >=80 and mark <= 100 then
Print “Distinction”
Else
If mark >= 70 and mark <=79 then
Print “Merit”
else
If mark >= 0 and mark <=69 then
Print “Fail”
End if
End if
End if
72
Activity
The body mass index (BMI) of a person is calculated as:
𝐰𝐞𝐢𝐠𝐡𝐭 𝐢𝐧 𝐤𝐢𝐥𝐨𝐠𝐫𝐚𝐦𝐬
𝐁𝐌𝐈 =
(𝐡𝐞𝐢𝐠𝐡𝐭 𝐢𝐧 𝐦𝐞𝐭𝐫𝐞𝐬)𝐱 (𝐡𝐞𝐢𝐠𝐡𝐭 𝐢𝐧 𝐦𝐞𝐭𝐫𝐞𝐬)
Using Pseudocode or otherwise, write an algorithm that will input the ID, weight (kg) and height
(m) of 30 students, calculate their body mass index (BMI) and output their ID,
A BMI greater than 25 will get the comment ‘OVER WEIGHT’, a BMI between 25 and 19
(inclusive) will get ‘NORMAL’ and a BMI less than 19 will get ‘UNDER WEIGHT’.
Case structure
A case structure is a decision structure that is used when there are more than two options to
choose from. It can be used in place of the nested if structure to make the algorithm shorter.
Example
If Sunday is day one of the week and Saturday is day seven of the week, write an algorithm which
asks a user to enter a number and display the day of the week as a word.
Solution
Enter number
Case number of
1: output “Sunday”
2: output “Monday”
3: output “Tuesday”
4: output “Wednesday”
5: output “Thursday”
6: output “Friday”
7: output “Saturday”
Else
Output “Not a valid number”
End case
73
Activity
The computer studies teacher has given a test to her learners. Write an algorithm which allows
the teacher to enter a mark and display a suitable message given that learners are graded
according to the following scale:
80-100 A
70-79 B
60-69 C
50-59 D
40-49 E
30-39 F
0-29 U
74
• use program control structures for iteration (looping):
- for.. do
- while.. do
• repeat.. until (define a sentinel value, use a sentinel value in an algorithm)
• draw trace tables to test algorithms with suitable test data
Looping or iteration means repetition of one or more statements in an algorithm. For example you
may need to enter marks for 20 learners. In this case it means that the entering of marks has to
be repeated 20 times.
A variable is a place holder for values which may change anytime during program execution,
while a constant is a value that remains the same through out program execution.
Some variables need to be initialized before they are used. Variables that increase or decrease in
value need to be initialized.
Initialize Variables
Most repetition problems come with a need to initialize variables for several reasons.
To initialize a variable is to give a starting value to a variable. We initialize variables when
Totaling
Counting
Finding the highest value
Finding the lowest value
75
For... Do loop
A for... Do loop is used when we know how many times some statements have to be repeated.
General syntax
Example:
Mrs. Kapisi bought 50 items from a grocery store. Write an algorithm to enter the prices of all
the prices and get the total price.
Solution
Approach: The problem demands the use of a For..Do loop because it is asking for input of 50
prices. The problem is also asking for a total price there we need to initialize the variable total
price to zero, then we will increase it inside the loop each time a price is entered. The for do
loop always has to be ended i.e. end for. Output will only be displayed at the end of the
algorithm when all prices have been entered and the total has been obtained.
TotalPrice = 0
For i = 1 to 50 do
Enter price
TotalPrice = TotalPrice + price
End for
Output “The total price is “, TotalPrice
Activity
Enter weights and ages for 11 babies and find the average weight and average age.
76
Repeat …… Until Loop
The repeat … until loop is used when we do not know how many times to repeat. It uses a
condition at the end of the loop and the loop is terminated when the condition becomes true.
General syntax
Repeat
Statements
Until condition True
Example
Mrs. Kapisi gave a test to her grade 11 learners. Write an algorithm to enter the marks of all the
learners and get the total mark. Assume input is terminated by entering a -1 for the mark.
Solution
We do not know how many learners are in the class but we are sure that they are more than 1.
In this case we can use a repeat … until loop which will be terminated by entering a -1. The
situation is also asking us to get the total mark, therefore we should initialize the variable
TotalMark.
TotalMark = 0
Repeat
Input mark
TotalMark = TotalMark + mark
Until mark = -1
Output “The total mark is “,TotalMark
Activity
Enter weights and ages for an unknown number of babies and find the average weight and
average age. Assume input is terminated by entering a -1 for the weight
77
78
While …… Do Loop
This is looping structure that is also used when we do not know how many times to repeat some
statements. A condition is used at the beginning of the loop and the loop is terminated when the
condition becomes false.
General syntax
While condition true do
Statements
End while
NB: Algorithms that are written using a repeat loop can also be written using a while .. loop
If value is higher than the highest, then reassign highest to this value.
If value is lower than the lowest, then reassign lowest to this value.
Activity
1. Write an algorithm to enter marks for 100 learners and find the highest and the lowest.
2. Write an algorithm to enter ages for an unknown number of people and find the age of the
youngest and oldest people. Input is terminated by entering a 0.
3. Write an algorithm to enter prices of some items. Find the most expensive price and the
cheapest. Input will be terminated by a -1 for the price.
79
80
Problems that need counting
1. Write an algorithm to enter marks for the leaners in the grade 10 geography class and find
how many passed given that for a learner to pass, they must get 50 or more.
2. A survey was done at church to find out how many adults attended the church service.
Write an algorithm to enter ages for 500 church members and find out how many adults
were there given that adulthood starts at 18 years.
3. Write an algorithm to enter prices of a number of items. Find the most expensive price and
the cheapest price. Input will be terminated by a -1 for the price.
MOD
When MOD is used, you divide and give the remainder as your answer.
i.e. 7 MOD 2 = 1 - the remainder is 1 when we divide 7 by 2.
Activity 1
81
DIV
When DIV is used, you divide and take the whole number as your answer. Discard or ignore the
remainder.
i.e. 10 DIV 3 = 3
55 DIV 10 = 5
16 DIV 6 = 2
Activity 2
Write the answers for the following problems.
a) 95 DIV 6 = _______________
b) 25 DIV 3 = _______________
c) 15 DIV 6 = _______________
Activity 3
1. Write an algorithm to enter 200 numbers and find out how whether they are positive or
negative. Print a suitable message.
2. Write an algorithm to determine how many times a 20 liter bucket can be used to empty
a 100 liter tank full of water.
Design algorithms which relate clearly to the requirements of the system where the
problem has been observed
Activity 4
82
2. Write an algorithm, using Pseudocode or otherwise, which;
inputs 50 numbers
checks whether each number is in the range 1000 to 9999
Prints how many of the numbers were out of range.
Outputs the percentage of input numbers which were out of range.
3. Write an algorithm to read in ten numbers from the keyboard. Determine the highest and
lowest of the numbers entered, as well as the average of the positive numbers. The output
should must be as follows:
The highest number is
The lowest number is
The average of the positive numbers is
4. Write a program or give an algorithm (flowchart or pseudo code) to solve the following
problem:
You need to enter the names of the workers and their gross salary. If the gross salary is more
than N$2000, deduct (subtract) 10% tax. If the gross salary is less than N$2000, deduct 5% tax.
Print the name, gross salary, deduction and net salary of each worker.
6. You need to pack some books in cardboard boxes. Design an algorithm(pseudo code or
83
flowchart) which measures the volume of boxes by accepting as input
W (width), H (height) and B (breadth). The only boxes permissible are boxes with a volume of
100 to 600. Any box outside this range is rejected. The books you need to pack amount to 6 000
volume units in total.
Display a message for each box to be accepted or rejected.
Use a trace table to dry run an algorithm containing one loop/iteration and at least one
decision structure
Trace tables
Algorithms can be dry run by drawing Trace tables. A trace table is a table drawn to test
algorithms by tracking the values of variables as they change throughout the algorithm. A trace
table helps to locate logic errors that occur while the algorithm is running.
Keywords
Input / read / enter – this means enter a value from the values given under the mentioned
variable. NB: you cannot use the same value more than once.
Output / print / write / display – this means write the value of the variable under output.
“assigned”
84
FOR i = 1 to 9
OUTPUT i
End for
2. Construct a trace table to dry run the algorithm with the data
3. Trace the following algorithm using the data: 18, 11, 14, 19, 17, 11, 8
Total = 0
FOR counter = 1 TO 7 DO
ENTER number
total = total + number
END FOR
average = total / counter
print average
4. Construct a trace table of the following pseudo code using the data values.
[2, 3, 7, 5, 1, 6,]
L=0
read X
For i = 1 to 5 do
IF X > L THEN
L=X
ENDIF
read X
Next i
PRINT L
85
5. Use the following test data to dry run the following algorithm
Test data: 2, 3, 4, 1, 7, 8
For i = 5 to 10 do
Input N
if N MOD 2 = 0 then
N=N/2
else
N=3*N + 1
end if
output N
end for
7. Study the following algorithm. What will be the output of the algorithm if the following values
are entered in sequence?
4 6 2 0 0 8 3 5.
READ A
READ B
REPEAT
C = (A+B)/2
PRINT C
READ A
READ B
UNTIL A = 0
86
8. Use the following test data to dry run the following algorithm
Test data: 2, 3, 4, 1, 7, 8
Input N
while N<>1 Do
if N MOD 2 = 0 then
N = N/2
else
N = 3*N + 1
end if
output N
Input N
ENDWHILE
87
10. Trace the following flowchart and complete the trace table using the data
5, 9, 7, 7, 5, 2, 1, 2, 3
Input a, b, c
Yes Yes
Is a>b? Is a>c? Output a
No No
No
Is b>c? Output c
Yes
Output b
88
a B c Decision Output
89
Identify where there is an error.
Suggest ways of removing the errors.
Algorithm Study
1. The following algorithm contains an error. Trace the algorithm and explain what the error is.
1. SET X = 1
2. REPEAT
3. X = X + 2
4. Print X
5. UNTIL X = 10
b. FOR i = 1 to 9 step 2
OUTPUT i
Next i
90