Learning Guide ICT - Level 6
Learning Guide ICT - Level 6
LEARNING GUIDE
FOR
LEVEL 6
TVET CDACC
P.O. BOX 15745-00100
NAIROBI
First published 2019
Copyright TVET CDACC
All rights reserved. No part of this learning guide may be reproduced, distributed, or
transmitted in any form or by any means, including photocopying, recording, or other
electronic or mechanical methods without the prior written permission of the TVET CDACC,
except in the case of brief quotations embodied in critical reviews and certain other non-
commercial uses permitted by copyright law. For permission requests, write to the Council
Secretary/CEO, at the address below:
Council Secretary/CEO
TVET Curriculum Development, Assessment and Certification Council
P.O. Box 15745–00100
Nairobi, Kenya
Email: [email protected]
i
FOREWORD
The provision of quality education and training is fundamental to the Government’s overall
strategy for social economic development. Quality education and training will contribute to
achievement of Kenya’s development blueprint and sustainable development goals. This can
only be addressed if the current skill gap in the world of work is critically taken into
consideration.
Reforms in the education sector are necessary for the achievement of Kenya Vision 2030 and
meeting the provisions of the Constitution of Kenya 2010. The education sector has to be
aligned to the Constitution and this has triggered the formulation of the Policy Framework for
Reforming Education and Training (Sessional Paper No. 4 of 2016). A key provision of this
policy is the radical change in the design and delivery of the TVET training, which is the key
to unlocking the country’s potential in industrialization. This policy document requires that
training in TVET be Competency Based, Curriculum development be industry led,
certification be based on demonstration and mastery of competence and mode of delivery
allows for multiple entry and exit in TVET programs.
These reforms demand that industry takes a leading role in TVET curriculum development to
ensure the curriculum addresses and responds to its competence needs. The learning guide in
Information Communication Technology (ICT) enhances a harmonized delivery of the
competency-based curriculum for ICT Level 6.
It is my conviction that this learning guide will play a critical role towards supporting the
development of competent human resource for the Information Communication Technology
(ICT) sector’s growth and sustainable development.
ii
PREFACE
Kenya Vision 2030 is anticipated to transform the country into a newly industrializing,
“middle-income country providing a high-quality life to all its citizens by the year 2030”. The
Sustainable Development Goals (SDGs) further affirm that the manufacturing sector is an
important driver to economic development. The SDG nine that focuses on Building resilient
infrastructures, promoting sustainable industrialization and innovation can only be attained if
the curriculum focuses on skill acquisition and mastery. Kenya intends to create a globally
competitive and adaptive human resource base to meet the requirements of a rapidly
industrializing economy through life-long education and training. TVET has a responsibility
of facilitating the process of inculcating knowledge, skills and attitudes necessary for
catapulting the nation to a globally competitive country, hence the paradigm shift to embrace
Competency Based Education and Training (CBET). The Technical and Vocational
Education and Training Act No. 29 of 2013 and the Sessional Paper No. 4 of 2016 on
Reforming Education and Training in Kenya, emphasized the need to reform curriculum
development, assessment and certification to respond to the unique needs of the industry.
This called for shift to CBET to address the mismatch between skills acquired through
training and skills needed by industry as well as increase the global competitiveness of
Kenyan labor force.
The learning guide is designed and organized with clear and interactive learning activities for
each learning outcome of a unit of competency. The guide further provides information sheet,
self-assessment, tools, equipment’s, supplies, and materials and references.
I am grateful to the Council Members, Council Secretariat, ICT experts and all those who
participated in the development of this learning guide.
iii
ACKNOWLEDGEMENT
This learning guide has been designed to support and enhance uniformity, standardization and
coherence in implementing TVET Competency Based Education and training in Kenya. In
developing the learning guide, significant involvement and support was received from
various organizations.
I recognize with appreciation the critical role of the participants drawn from technical training
institutes, universities and private sector in ensuring that this learning guide is in-line with the
competencies required by the industry as stipulated in the occupational standards and
curriculum. I also thank all stakeholders in the ICT sector for their valuable input and all
those who participated in the process of developing this learning guide.
I am convinced that this learning guide will go a long way in ensuring that workers in ICT
sector acquire competencies that will enable them to perform their work more efficiently and
make them enjoy competitive advantage in the world of work
iv
ACRONYMS
v
Table of Contents
FOREWORD ........................................................................................................................... ii
PREFACE ............................................................................................................................... iii
ACKNOWLEDGEMENT ..................................................................................................... iv
ACRONYMS............................................................................................................................ v
LIST OF TABLES AND FIGURE ........................................................................................ x
CHAPTER 1: INTRODUCTION .......................................................................................... 1
1.1 Background Information .............................................................................................. 1
1.2 The Purpose of Developing the Learning Guide ........................................................ 1
1.3 Layout of the Learning Guide ...................................................................................... 1
COMMON UNITS OF COMPETENCY .............................................................................. 4
CHAPTER 2: APPLY BASIC ELECTRONICS.................................................................. 5
2.1 Introduction ................................................................................................................... 5
2.2 Performance Standard .................................................................................................. 5
2.3 Learning Outcome ......................................................................................................... 5
2.3.1 List of the Learning Outcomes ................................................................................. 5
2.3.2 Learning Outcome 1: Identify electric circuits ....................................................... 6
2.3.3 Learning Outcome 2: Identify electronic components ......................................... 16
2.3.4 Learning Outcome 3: Understand semi-conductor theory ................................... 23
2.3.5 Learning Outcome 4: Identify and classify memory activities ............................ 34
2.3.6 Learning Outcome 5: Apply Number Systems ................................................... 39
2.3.7 Learning Outcome 6: Emerging trends in electronics ........................................ 46
CORE UNITS OF COMPETENCY .................................................................................... 51
CHAPTER3: NETWORKING ............................................................................................ 52
3.1 Introduction ................................................................................................................. 52
3.2 Performance Standard ................................................................................................ 52
3.3 Learning Outcome ....................................................................................................... 52
3.3.1 List of the Learning Outcomes ............................................................................... 52
3.3.2 Learning Outcome 1: Identify network type and components ............................. 52
3.3.3 Learning Outcome 2: Connection network devices ............................................. 64
3.3.4 Learning Outcome 3: Configuration of network devices ..................................... 67
3.3.5 Learning Outcome 4: Network testing ................................................................... 74
3.3.6 Learning Outcome 5: Configuration of Network types ........................................ 77
3.3.7 Learning Outcome 6: Perform network security .................................................. 78
3.3.8 Learning Outcome 7: Monitor Network connectivity and performance .............. 80
3.3.9 Learning Outcome 8: Maintain Network ............................................................. 82
CHAPTER 4: SOFTWARE INSTALLATION .................................................................. 84
4.1 Introduction ................................................................................................................. 84
4.2 Performance Standard ................................................................................................ 84
vi
4.3 Learning Outcome ....................................................................................................... 84
4.3.1 List of the Learning Outcomes ............................................................................... 84
4.3.2 Learning Outcome 1: Identify software to be installed .......................................... 84
4.3.3 Learning Outcome 2: Install the software ............................................................ 92
4.3.4 Learning Outcome 3: Configure the software ..................................................... 95
4.3.5 Learning Outcome 4: Test software functionality ................................................ 97
4.3.6 Learning Outcome 5: Perform user training ......................................................... 100
4.3.7 Learning Outcome 6: Perform Software Maintenance ....................................... 102
CHAPTER 5: ICT SECURITY THREATS ..................................................................... 104
5.1 Introduction ............................................................................................................... 104
5.1 Performance Standard .............................................................................................. 104
5.3 Learning Outcome ..................................................................................................... 104
5.3.1 List of the Learning Outcomes ............................................................................. 104
5.3.2 Learning Outcome 1: Identify security threats ................................................... 104
5.3.3 Learning Outcome 2: Establish and install security measures .......................... 110
5.3.4 Learning Outcome 3: Deploy security measures.................................................. 114
5.3.5 Learning Outcome 4: Test system vulnerability .................................................. 115
5.3.6 Learning Outcome 5: Monitor security system .................................................... 117
CHAPTER 6: ICT SYSTEM SUPPORT .......................................................................... 120
6.1 Introduction ............................................................................................................... 120
6.2 Performance Standard .............................................................................................. 120
6.3 Learning Outcome ..................................................................................................... 120
6.3.1 List of the Learning Outcomes ............................................................................. 120
6.3.2 Learning Outcome 1: Identify and Document ICT infrastructure ...................... 120
6.3.3 Learning Outcome 2: Evaluate the state of performance and possible causes of
failures ......................................................................................................................... 124
6.3.4 Learning Outcome 3: Diagnose and fix problems .............................................. 129
6.3.5 Learning Outcome 4: Test component performance ......................................... 132
6.3.6 Learning Outcome 5: Perform user training ....................................................... 136
CHAPTER 7: WEBSITE DESIGN ................................................................................... 138
7.1 Introduction ............................................................................................................... 138
7.2 Performance Standard .............................................................................................. 138
7.3 Learning Outcome ..................................................................................................... 138
7.3.1 List of the Learning Outcomes ............................................................................. 138
7.3.2 Learning Outcome 1: Gather data required ........................................................ 138
7.3.3 Learning Outcome 2: Determine website design tool ........................................ 144
7.3.4 Learning Outcome 3: Develop functional website ............................................. 148
7.3.5 Learning Outcome 4: Host website developed ................................................... 154
7.3.6 Learning Outcome 5: Perform website routine maintenance ............................. 156
CHAPTER 8: COMPUTER REPAIR AND MAINTENANCE ..................................... 159
8.1 Introduction ............................................................................................................... 159
8.2 Performance Standard .............................................................................................. 159
vii
8.3 Learning Outcome ..................................................................................................... 159
8.3.1 List of the Learning Outcomes ............................................................................. 159
8.3.2 Learning Outcome 1: Perform troubleshooting .................................................. 159
8.3.3 Learning Outcome 2: Disassemble faulty components ........................................ 163
8.3.4 Learning Outcome 3: Repair/Replace and reassemble faulty components .......... 174
8.3.5 Learning Outcome 4: Test computer functionality .............................................. 175
8.3.6 Learning Outcome 5: Upgrade computer software/hardware ............................ 177
CHAPTER 9: DATABASE MANAGEMENT SYSTEM ................................................ 181
9.1 Introduction ............................................................................................................... 181
9.2 Performance Report .................................................................................................. 181
9.3 Learning Outcome ..................................................................................................... 181
9.3.1 List of the Learning Outcomes ............................................................................. 181
9.3.2 Learning Outcome 1: Identify database management system ............................. 182
9.3.3 Learning Outcome 2: Design database ................................................................ 184
9.3.4 Learning Outcome 3: Create and manipulate database ........................................ 191
9.3.5 Learning Outcome 4: Perform database testing ................................................... 196
9.3.6 Learning Outcome 5: Implement designed database............................................ 199
9.3.7 Learning Outcome 6: Establish transaction and concurrency mechanism ........... 201
9.3.8 Learning Outcome 7: Manage database security.................................................. 204
CHAPTER 10: MANAGE INFORMATION SYSTEM .................................................. 208
10.1 Introduction ............................................................................................................. 208
10.2 Performance Report ................................................................................................ 208
10.3 Learning Outcome ................................................................................................... 208
10.3.1 List of the Learning Outcomes ........................................................................... 208
10.3.2 Learning Outcome 1: Identify information system concepts ............................. 208
10.3.3 Learning Outcome 2: Classify information systems .......................................... 210
10.3.4 Learning Outcome 3: Manage information resources ........................................ 212
10.3.5 Learning Outcome 4: Information system planning ........................................... 214
10.3.6 Learning Outcome 5: Impact of information system in organization ................ 216
CHAPTER 11: GRAPHIC DESIGN ................................................................................. 219
11.1 Introduction ............................................................................................................. 219
11.2 Performance Report ................................................................................................ 219
11.3 Learning Outcome ................................................................................................... 219
11.3.1 List of the Learning Outcomes ........................................................................... 219
11.3.2 Learning Outcome 1: Identify Graphic Design Concepts .................................. 219
11.3.3 Learning Outcome 2: Identify elements and principles of graphic design ......... 222
11.3.4 Learning Outcome 3: Apply typography techniques.......................................... 224
11.3.5 Learning Outcome 4: Create and edit images .................................................... 225
11.3.6 Learning Outcome 5: Perform Layout Design ................................................... 230
CHAPTER 12: COMPUTER PROGRAMMING ........................................................... 235
12.1 Introduction ............................................................................................................. 235
12.2 Performance Report ................................................................................................ 235
viii
12.3 Learning Outcome ................................................................................................... 235
12.3.1 List of the Learning Outcomes ........................................................................... 235
12.3.2 Learning Outcome 1: Identify program and programming concepts ................ 236
12.3.3 Learning Outcome 2: Identify phases of program development ........................ 241
12.3.4 Learning Outcome 3: Perform program design and analysis ............................. 243
12.3.5 Learning Outcome 4: Develop a Computer program ........................................ 246
12.3.6 Learning Outcome 5: Perform Program testing and debugging ......................... 251
12.3.7 Learning Outcome 6: Perform User training and Program Maintenance ........... 255
CHAPTER 13: MOBILE APPLICATION DEVELOPMENT ...................................... 258
13.1 Introduction ............................................................................................................. 258
13.2 Performance Report ................................................................................................ 258
13.3 Learning Outcome ................................................................................................... 258
13.3.1 List of the Learning Outcomes ........................................................................... 258
13.3.2 Learning Outcome 1: Identify mobile application concepts .............................. 258
13.3.3 Learning Outcome 2: Identify mobile application development environment . 260
13.3.4 Learning Outcome 3: Identify application design issues ................................... 263
13.3.5 Learning Outcome 4: Develop mobile application ............................................ 264
13.3.6 Learning Outcome 5: Test and developed mobile application ........................... 267
13.3.7 Learning Outcome 6: Publish and commercialize the developed application.... 271
CHAPTER 14: SYSTEM ANALYSIS AND DESIGN..................................................... 274
14.1 Introduction ............................................................................................................. 274
14.2 Performance Report ................................................................................................ 274
14.3 Learning Outcome ................................................................................................... 274
14.3.1 List of the Learning Outcomes ........................................................................... 274
14.3.2 Learning Outcome 1: Understand system analysis and design fundamentals .... 274
14.3.3 Learning Outcome 2: Understand approaches to system development and project
planning environment .................................................................................................... 277
14.3.4 Learning Outcome 3: Perform system analysis .................................................. 279
14.3.5 Learning Outcome 4: Identify essentials of system design ................................ 282
14.3.6 Learning Outcome 5: Understand advanced design concepts ............................ 285
14.3.7 Learning Outcome 6: Perform system implementation...................................... 288
14.3.8 Learning Outcome 7: Understand current trends in system development.......... 289
ix
LIST OF TABLES AND FIGURE
x
Figure 30: Star typology .......................................................................................................... 53
Figure 31: Ring typology......................................................................................................... 54
Figure 32: Mesh typology ....................................................................................................... 54
Figure 33: Hybrid typology ..................................................................................................... 55
Figure 34: Point-to-point typology .......................................................................................... 55
Figure 35: Classification of network types .............................................................................. 56
Figure 36: LAN ....................................................................................................................... 56
Figure 37: PAN........................................................................................................................ 57
Figure 38: MAN ...................................................................................................................... 57
Figure 39: WAN ...................................................................................................................... 58
Figure 40: Switch .................................................................................................................... 59
Figure 41: Hub ......................................................................................................................... 59
Figure 42: Router ..................................................................................................................... 60
Figure 43: Port ......................................................................................................................... 60
Figure 44: Types of computer network ................................................................................... 61
Figure 45: Peer-to-peer network .............................................................................................. 61
Figure 46: Client or server network......................................................................................... 62
Figure 47: Open Systems Interconnection (OSI) Model ......................................................... 68
Figure 48: TCP/IP.................................................................................................................... 69
Figure 49: Network protocols .................................................................................................. 70
Figure 50: Active and passive FTP ......................................................................................... 71
Figure 51: Clamp meter ........................................................................................................... 74
Figure 52: Signal tester ............................................................................................................ 75
Figure 53: Overview of software ............................................................................................. 85
Figure 54: Interface of application software, system software and hardware ......................... 86
Figure 55: Activities of operating system ............................................................................... 88
Figure 56: Operating System interfaces .................................................................................. 89
Figure 57: Menu ...................................................................................................................... 90
Figure 58: Approach for Graphical User Interface (GUI) ....................................................... 90
Figure 59: Basic program installation steps ............................................................................ 98
Figure 60: Training module development and delivery steps ............................................... 100
Figure 61: Cyber crime in Kenya .......................................................................................... 108
Figure 62: Risk Management Process ................................................................................... 111
Figure 63: Multi-factor authentication (MFA) ...................................................................... 112
Figure 64: Malware infection symptoms ............................................................................... 112
Figure 65: Sitting ergonomic ................................................................................................. 123
Figure 66: Performance Testing Process ............................................................................... 133
Figure 67: Windows Systeminternals suite ........................................................................... 134
Figure 68: System explorer ................................................................................................... 135
Figure 69: PHP variable code ................................................................................................ 150
Figure 70: Control structure .................................................................................................. 151
Figure 71: HTML handling process ...................................................................................... 152
Figure 72: Digital multimeter ................................................................................................ 165
Figure 73: Toner probe .......................................................................................................... 166
xi
Figure 74: User database operations...................................................................................... 185
Figure 75: Data Model........................................................................................................... 186
Figure 76: Entity-relationship model..................................................................................... 187
Figure 77: Relation model ..................................................................................................... 188
Figure 78: Hierarchical model ............................................................................................... 189
Figure 79: Network model..................................................................................................... 190
Figure 80: Database table ...................................................................................................... 192
Figure 81: Table linkages ...................................................................................................... 192
Figure 82: Integration of database ......................................................................................... 193
Figure 83: Types of database testing ..................................................................................... 200
Figure 84: Concurrency mechanism ...................................................................................... 202
Figure 85: Transaction management ..................................................................................... 202
Figure 86: Management System ............................................................................................ 211
Figure 87: Letterform ............................................................................................................ 228
Figure 88: Paper size and printing formats............................................................................ 232
Figure 89: Program structure ................................................................................................. 236
Figure 90: Loops.................................................................................................................... 237
Figure 91: Control structure .................................................................................................. 238
Figure 92: Waterfall model ................................................................................................... 239
Figure 93: Data flow .............................................................................................................. 244
Figure 94: Loop statement ..................................................................................................... 248
Figure 95: Dynamic testing and debugging........................................................................... 252
Figure 96: Flow of unit testing .............................................................................................. 253
Figure 97: Software System Development Lifecycle ............................................................ 278
Figure 98: System analysis .................................................................................................... 280
Figure 99: Structured analysis tools ...................................................................................... 281
Figure 100: Components of system design ........................................................................... 283
xii
CHAPTER 1: INTRODUCTION
This learning guide consists of interactive learning activities, content, self-assessment and
relevant and related references that enhances implementing of Information Communication
Technology (ICT) Level 6 qualification. It enables the trainee to acquire the competencies
that enable him/her to undertake the various processes in ICT. The Guide further provides
illustration, web links, case studies, examples and resources on how to implement all the
learning outcomes/elements described in the Curriculum and Occupational Standards with a
focus to a trainee.
• Learning Activities
For each learning outcome, the learning activities are presented covering the performance
criteria statements and trainee’s demonstration of knowledge in relation to the range in the
occupational standard and content in the curriculum.
1
• Information Sheet
The information sheet is section under each learning outcome that provides the subject
matter in relation to definition of key terms, method, processes/procedures/guidelines,
content, illustrations (photographs, pictures, video, charts, plans, digital content, and
simulation) and case studies.
• Self-Assessment
Self-assessment is to the performance criteria, required knowledge, skills and the range as
stated in the occupational standards. The section further provides questions and assignments
in which trainees demonstrate that they have acquired the required competences and an
opportunity to reflect on what they have acquired. It is expected that the trainer keeps a
record of their plans, their progress and the problems they encountered which will go in
trainee’s portfolio. A portfolio assessment consists of a selection of evidence that meets the
pre-defined requirements of complexity, authenticity and reliability. The portfolio starts at
the beginning of the training and will be the evidence for the development and acquisition of
the competence (summative and formative) by the student. It is important to note that
Portfolio assessment is highly emphasized in the learning guide
Finally, the guide presents tools, equipment’s, supplies and materials for each learning
outcome as guided by the performance criteria in occupational standards and content in
curriculum. References, relevant links and addendums are provided for further reading. The
units of competency comprising this qualification include the following common and core
unit of learning:
2
Core Units of Learning
Table 2: Core Units of Learning
The total duration of the course is 3330 hours including 480 hours of industrial attachment.
3
COMMON UNITS OF COMPETENCY
4
CHAPTER 2: APPLY BASIC ELECTRONICS
2.1 Introduction
This unit specifies the competencies required to demonstrate basic skills of electronics. It
involves identification of electric circuits, electronic components, understand semi-conductor
theory, identify and classify memories, apply number systems and identify emerging trends
in electronics.
These are the key learning outcomes, which make up workplace function:
o Identify electric circuits
o Identify Electronic components
o Understand Semi-conductor theory
o Identify and classify memory
o Apply Number Systems
o Emerging trends in Electronics
5
2.3.2 Learning Outcome 1: Identify electric circuits
An electric circuit is a path in which electrons from a voltage or current source flow. The
point where those electrons enter an electrical circuit is called the “source” of electrons. The
point where the electrons leave an electrical circuit is called the "return" or "earth ground".
The exit point is called the "return" because electrons always end up at the source when they
complete the path of an electrical circuit. The part of an electrical circuit that is between the
electrons' starting point and the point where they return to the source is called an electrical
circuit's "load". A load of an electrical circuit may be as simple as those that power home
appliances like refrigerators, televisions, or lamps or more complicated, such as the load on
the output of a hydroelectric power generating station. A simple, well-designed circuit, has a
cell providing current along a path (wire), to a load (resistor) and back to the other end of the
cell as shown in diagram.
Cell
Conductor (wire)
Load (bulb)
6
An electrical circuit is a path or line through which an electrical current flows. The path may
be closed (joined at both ends), making it a loop. A closed circuit makes electrical current
flow possible. It may also be an open circuit where the electron flow is cut short because the
path is broken. An open circuit does not allow electrical current to flow.
Below is a basic set of symbols that you may find on circuit diagrams:
Source: http://victorysportstraining.com
Figure 2: Symbols of circuit diagrams
It is very important to know the basic parts of a simple circuit and the symbols that relate to
them. A simple circuit has conductors, a switch, a load and a power source.
Conductors:
These are usually copper wires with no insulation. They make the path through which the
electricity flows. One piece of the wire connects the current from the power source (cell) to
the load. The other piece connects the load back to the power source.
Switch:
The switch is simply a small gap in the conductor where you can close or open the circuit.
When the switch is closed, the circuit is closed and electricity flows.
The Load:
The load is a small light bulb or buzzer that lights when the circuit is turned on. The load is
also known as a resistor.
Cell:
The power source is a cell. (Note that more than one cell put together is known as a battery).
7
The diagram below shows how a basic circuit looks like.
Source: eschooltoday.com
Figure 3: Basic circuit
It is important to draw circuits with clean straight lines, as shown in diagram B. Avoid
realistic sketches. It is important to know that a circuit can have more than the basic
components in the diagram. It can have two or more batteries or two or more bulbs.
Electrical and electronic circuits can be complicated. Making a drawing of the connections to
all the component parts in the circuit's load makes it easier to understand how circuit
components are connected. Drawings for electronic circuits are called "circuit diagrams".
Drawings for electrical circuits are called "wiring diagrams". A schematic is a diagram of an
electrical circuit. Schematics are graphical representations of the essential connections in a
circuit, but they are not life-like depictions of a circuit. Schematics use symbols to represent
components in the circuit. Conventions are used in a schematic to represent the way
electricity flows. The common convention we use is from the positive to the negative
terminal. The realistic way electricity flows is from the negative to the positive terminal.
Circuit diagrams utilise special symbols recognised by everyone who uses the drawings. The
symbols on the drawings show how components like resistors, capacitors, insulators, motors,
outlet boxes, lights, switches, and other electrical and electronic components are connected
together. The diagrams are a big help when workers try to find out why a circuit does not
work correctly.
8
flow to the other end of the cell. When this happens the high voltage causes the wires to heat
up and catch fire.
Source: eschooltoday.com
Figure 6: Short circuit
A fuse is simply a strip of alloy wire (made of bismuth and tin), which is connected to the
circuit. The fuse is usually designed to take specific volumes of electricity (voltage). For
example is a 3amp fuse is fixed into a circuit it cannot take any more than 3amps of
electricity. If for any reason, there is a surge or increase in the voltage, the fuse will melt
immediately and break. This will stop the flow of high voltage and prevent any potential
damage to the circuit or device.
Electromotive force, also called EMF (and measured in volts), refers to voltage generated
by a battery or by the magnetic force according to Faraday’s Law, which states that a time
varying magnetic field will induce an electric current.
Ampere or Amp (symbol: A) is the unit of electrical current. The Ampere unit is named after
Andre-Marie Ampere from France. One Ampere is defined as the current that flows with
electric charge of one Coulomb per second. 1 A = 1 C/s
The electric Power, P is equal to the energy consumption E divided by the consumption
time t:
!
P=
!
P is the electric power in Watt (W).
E is the energy consumption in Joule (J).
t is the time in seconds (s).
11
Joule, unit of work or energy in the International System of Units (SI), is equal to the work
done by a force of one newton acting through one metre.
Ohm’s Law allows you to determine characteristics of a circuit, such as how much current is
flowing through it, if you know the voltage of the battery in the circuit and how much
resistance is in the circuit.
Source: https://www.online-sciences.com
Figure 7: Ohm's Law
In a Direct Current (DC) the electrons flow in one direction. Batteries create a direct current
because the electrons always flow from the ‘negative’ side to the ‘positive’ side. A DC
Circuit uses steady current components like resistors and resistor combinations; transient
components like inductors and capacitors; indicating meters like moving coil voltmeters and
ammeters; power supply battery sources, and so on. For analyzing these circuits, different
tools like ohms law, voltage and current laws like KCL, KVL, and network theorems like
Thevinens, Nortons, Mesh analysis, etc. are used.
In a simple DC circuit, a resistive load as a bulb is connected between the positive and
negative terminals of the battery. The battery supplies the required power to the bulb and
allows a user to place a switch to turn on or off according to the requirement.
12
Resistive loads represent the lighting loads that are connected in various configurations to
analyze the DC circuits. The way of connecting loads certainly changes the circuit
characteristics.
Source: http://lmsshule.cloudapp.net
Figure 8: DC circuit
Alternating Current (AC) pushes the electrons back and forth, changing the direction of the
flow several times per second. Unlike DC current, AC voltage or current changes its direction
periodically as it increases from zero to maximum, and decreases back to zero, then
negatively continue to maximum, and then again back to zero.
Source: https://circuitdigest.com
Figure 9: AC Circuit
13
Watch: Understand electric circuits:
https://youtu.be/VnnpLaKsqGU
https://youtu.be/8RJ6Kdk8KDo
2.3.2.3 Self-Assessment
i. What is electric circuit?
ii. What is Ohm?
iii. What is the difference between Ampere and Ohm?
iv. Current is:
A. The flow of charged particles through a conducting medium
B. The flow of a conductor through charged particles
C. The random movement of electrons from atom to atom
14
D. Only present when there is no voltage
E. Faster than the speed of light
v. The two types of current are:
A. Direct and Alternating
B. Indirect and Alternating
C. Direct and Attenuating
D. None of the above
vi. Prepare a circuit using 2 bulbs and 2 AA batteries.
vii. Identify different equipment in the workshop or classroom and categorize if they are
AC or DC devices.
viii. True or False: An electric circuit is a closed loop or pathway that allows electric
charges to flow.
ix. If additional resistor is connected in an existing parallel circuit, the total resistance
A. Remains the same
B. Decreases by the value of the added resistor
C. Increases by the value of the added resistor
D. Decreases (Answer)
x. Calculate resistance of an electrical circuit with 10 Volts and current of 5mA.
xi. A 4 Ω and a 6 Ω resistor are connected in series, the current is measured to be 4 A.
A. Draw a diagram of this circuit.
B. What is the voltage drop across the 4 Ω resistor?
C. What is the voltage drop across the 6 Ω resistor?
D. What is the total voltage of the power source?
E. What is the total power dissipated by the circuit?
xii. In the circuit shown, what is the current through the 2-ohm resistor?
Source: https://www.nutsvolts.com
xiii. Which Power Condition Occurs When The Voltage Level Drops Below 120 Volts
And Stays Below For An Extended Period Of Time?
2.3.2.5 References
• https://www.eolss.net/Sample-Chapters/C05/E6-08-29.pdf
• https://study.com/academy/lesson/what-is-electric-current-definition-unit-types.html
15
• https://phys.libretexts.org/Bookshelves/University_Physics/Book%3A_University_Physic
s_(OpenStax)/Map%3A_University_Physics_II_-
_Thermodynamics%2C_Electricity%2C_and_Magnetism_(OpenStax)/15%3A_Alternati
ng-Current_Circuits/15.2%3A_Simple_AC_Circuits
• https://www.rapidtables.com/electric/electric_power.html
• https://eschooltoday.com/science/electricity
• Digital Electronics authored by Roger L. Tokheim published by McGraw-Hill Education
– Europe
• Basic Digital Electronics: Explains digital systems functions and how digital circuits are
used to build them, authored by Alvis J. Evans, published by Master Publishing (1996)
Resistor: The resistor is an inevitable part of a circuit. It is meant for reducing the current
and voltage in the circuit parts. In electronic circuits, resistors are used to reduce current flow,
adjust signal levels, to divide voltages, bias active elements, and terminate transmission lines,
among other uses. High-power resistors that can dissipate many watts of electrical power as
heat, may be used as part of motor controls, in power distribution systems, or as test loads for
generators. Fixed resistors have resistances that only change slightly with temperature, time
or operating voltage. Variable resistors can be used to adjust circuit elements (such as a
volume control or a lamp dimmer), or as sensing devices for heat, light, humidity, force, or
chemical activity.
Resistors are common elements of electrical networks and electronic circuits and are
ubiquitous in electronic equipment. Practical resistors as discrete components can be
composed of various compounds and forms. Resistors are also implemented within integrated
circuits.
16
Source: http://nye6b4.holzdingens.de
Figure 10: Resistors standard colour code chart
A capacitor is a body that can store an electrical charge. It consists of two conducting plates
facing each other and separated by an insulating material. This insulating material is also
called dielectric material. When a charge is stored in one plate, an equal and opposite charge
is inducted on the other plate and thus a potential difference is set up between the plates.
The effect of a capacitor is known as capacitance. While some capacitance exists between
any two electrical conductors in proximity in a circuit, a capacitor is a component designed to
add capacitance to a circuit. The capacitor was originally known as a condenser or
condensator.
The unit of measurement for capacitance is Farad but this unit is much too large for practical
work. It is usually measured in microfarads (uF) or picofarads (pF). The formula of
calculating capacitance is
C = capacitance in pF
17
K = dielectric constant of material between plates
A = area of one side of the plates square inches
d = separation of plate in inches
n = number of plates
The potential difference V developed when a charge Q is stored depends directly on the value
of Q and inversely with the capacitance C of the cap.
V = Q/C
They are used in timing circuits as it takes time for a cap. to be charged up. They are used to
smooth varying DC power supplies by acting as a reservoir of charge. They are also used in
filter circuits because they easily pass AC signals but they block DC signals.
Source: https://honestversion.com
Figure 11: Capacitors
18
Source: https://technologyspace.online
There are many different types of cap. that are used for different types of applications. They
are electrolytic cap, ceramic cap., tantalum cap., polyester cap., polystyrene cap. and safety
cap.
Diode in small signal application of which the current requirement is less than 100mA;
1N4148 is a typical choice. It has a forward voltage drop of 0.7V and is made from Silicon
type.
19
Source: https://www.electrical4u.com
Figure 13: Diode
An inductor: Like capacitors, inductors also store energy in one part of AC cycle and return
it during the next part of the cycle.
Source: https://www.tutorialspoint.com
Figure 14: Inductor
Passive electronic components are those that do not have gain or directionality. They are
also called Electrical elements or electrical components. Examples include resistors,
capacitors, diodes, and inductors.
Active components are those that have gain or directionality. Examples include transistors,
20
integrated circuits or ICs, logic gates.
Source: http://www.chipsetc.com
Figure 15: Electrical components in computers
Source: http://wapvd.co
Figure 16 : Motherboard of a desktop
21
2.3.3.3 Self-Assessment
i. What are electronic components and their application in a computer?
ii. Explain briefly electronic components.
iii. Capacitors are electronic components capable of storing and delivering electrical
charges. They are classified accordingly to the material used on their manufacturing
process. From the options below, which one ISN’T a type of capacitor:
A. Electrolytic
B. Tantalum
C. Polyester
D. Ceramic
E. None of the above
iv. A 50 000 µF capacitor is charged by a constant current of 100 mA to a potential
difference of 12 volts.
o What is the charge on the capacitor?
o How long did it take to charge up the capacitor?
o What is the energy in the capacitor?
o What is the energy supplied by the source?
o How does this compare with the energy held by the capacitor?
vi. What are the electronic components found in a motherboard of a desktop? Identify
them and list their use.
vii. Take a desktop motherboard and identify the various components and label the parts
such as capacitor, resistors etc.
viii. Made from a variety of materials, such as carbon, this inhibits the flow of current.
A. Resistor
B. Capacitor
C. Inductor
D. Choke
ix. This is a type of semiconductor that only allows current to flow in one direction. It is
usually used to rectify AC signals (conversion to DC).
A. Univac
B. Diode
C. Transformer
D. Inductor
x. The capacitor capacitance is measured thru a unit called:
A. Ohm
B. Farad
C. Hertz
D. Watt
E. None of the above
22
2.3.3.5 References
• https://www.electroschematics.com/8247/electronic-components-an-easy-to-use-guide/
• http://www.rajswasthya.nic.in/RHSDP%20Training%20Modules/CSIO%20Modules/Rad
iographers/ELCTRONIC%20COMPONENTS.pdf
• http://www.electronicsandyou.com/blog/electronic-components-parts-and-their-
function.html
• https://www.electronics-project-design.com/Capacitors.html
• Digital Electronics authored by Roger L. Tokheim published by McGraw-Hill Education
– Europe
• Electronics, Principles and Applications, authored by Charles A Schuler, published by
McGraw-Hill/Glencoe
A semiconductor is a physical substance that is designed to manage and control the flow of
current in electronic devices and equipment. It neither allows freely flowing electric current
nor repels it completely. A semiconductor is in between a conductor and insulator and is
commonly used in the development of electronic chips, computing components and devices.
It is generally created using silicon, germanium or other pure elements.
Atoms are composed of subatomic particles among which are the charged particles known as
electrons and protons.
23
Source: https://learn.sparkfun.com
Figure 17: Parts of an atom
Matter can be defined as physical substance that has mass; occupies space; is composed of
atoms; and is ultimately convertible to energy. A significant conversion of matter to energy,
however, occurs only at speeds approaching that of the speed of light, a fact encompassed in
the famous statement formulated by Albert Einstein (1879-1955), E = mc2.
24
Figure 18: Classification of matter
Metals such as copper typify conductors, while most non-metallic solids are said to be good
insulators, having extremely high resistance to the flow of charge through them.
“Conductor” implies that the outer electrons of the atoms are loosely bound and free to
move through the material.
The Semiconductors, such as Germanium, Silicon, Carbon, Selenium, etc. are the materials,
which are neither conductors nor insulators. Their conductivity lies in between or middle of
the conductivity of conductors and insulators. Semiconductors have some useful properties
and are being extensively used for the preparation of solid-state devices like the diode,
transistor, etc. Silicon and Germanium, which belong to the fourth group element, behave
like a semiconductor. Each atom of silicon and germanium share an electron with their
neighbours. A Silicon atom and its neighbours share a pair of electrons in covalent bonding.
Whenever a covalent bond breaks, an electron-hole pair is formed. To remove the valence
electrons from the outer shells, a semiconductor atom needs the energy of the other.
Germanium was discovered in 1886. It is an earth element recovered from the ash of certain
coaks or from the flue dust of zinc smelters. The recovered germanium is in the form of
Germanium dioxide powder. It is then converted into pure Germanium.
25
The atomic structure of Germanium is shown below:
Source: https://circuitglobe.com
Figure 19: Atomic structure of Germanium
Its atomic number is 32. It has 32 protons in the nucleus and 32 electrons distributed in the
four orbits around the nucleus. The number of electrons in the first, second, third and fourth
orbit are 2, 8, 18 and 4 respectively. It is clear that the Germanium has four valence electrons.
The various Germanium atoms are held together through covalent bonds as shown in the
figure below.
Source: https://circuitglobe.com
Figure 20: Germanium atomic bond
26
The energy band diagram of Germanium is shown below.
Source: https://circuitglobe.com
Figure 21: Energy bond for Germanium
The forbidden energy gap (i.e. Gap between the valence band and conduction band) in this
material is very small. Hence, a very small energy is sufficient to lift the electrons from the
valence band to the conduction band.
Silicon is the element available in most of the common rocks. Actually, sand is silicon
dioxide. It is treated chemically and reduced to pure silicon, which can be used for the
preparation of electronic devices.
27
The figure below shows the atomic structure of silicon.
Source: https://circuitglobe.com
Figure 22: Atomic structure of Silicon
Its atomic number is 14. Therefore, it has 14 protons in the nucleus and 14 electrons
distributed in the three orbits around the nucleus. The number of electrons in the first, second
and third orbit are 2, 8 and 4 respectively. The various silicon atoms are held together
through covalent bonds as shown in the figure below.
Source: https://circuitglobe.com
Figure 23: Silicon atomic bond
28
The energy band diagram of the silicon material is shown below.
Source: https://circuitglobe.com
Figure 24: Energy bond of Silicon
The forbidden energy gap in this material is quite small. It also needs a small energy to lift
the electrons from the valence band to the conduction band.
Therefore, even at room temperature, a minute quantity of valence electrons is lifted to the
conduction band and constitute current conduction if a high electric field is applied.
However, at room temperature, the number of electrons lifted to the conduction band in the
case of silicon is quite less than germanium.
This is the reason why silicon semiconductor devices are preferred over germanium devices.
An extrinsic semiconductor is one that has been doped; during manufacture of the
semiconductor crystal a trace element or chemical called a doping agent has been
incorporated chemically into the crystal, for the purpose of giving it different electrical
properties than the pure semiconductor crystal, which is called an intrinsic semiconductor. In
an extrinsic semiconductor it is these foreign dopant atoms in the crystal lattice that mainly
provide the charge carriers which carry electric current through the crystal. The doping agents
used are of two types, resulting in two types of extrinsic semiconductor. An electron donor
dopant is an atom which, when incorporated in the crystal, releases a mobile conduction
electron into the crystal lattice. An extrinsic semiconductor which has been doped with
electron donor atoms is called an n-type semiconductor, because the majority of charge
carriers in the crystal are negative electrons. An electron acceptor dopant is an atom which
29
accepts an electron from the lattice, creating a vacancy where an electron should be called a
hole which can move through the crystal like a positively charged particle. An extrinsic
semiconductor which has been doped with electron acceptor atoms is called a p-type
semiconductor, because the majority of charge carriers in the crystal are positive holes.
Source: http://semiconductordevice.net
Figure 25: N-type and C-type semiconductors
The N-type semiconductor has a large number of electrons in the conduction band and less
number of holes in the valence band, so electrons are called majority carriers and holes are
called minority carriers.
The P-type semiconductor has a large number of holes in the conduction band and less
number of electrons in the valence band, so holes are called majority carriers and electrons
are called minority carriers.
Doping is the key to the extraordinarily wide range of electrical behavior that semiconductors
can exhibit, and extrinsic semiconductors are used to make semiconductor electronic devices
such as diodes, transistors, integrated circuits, semiconductor lasers, LEDs, and photovoltaic
cells. Sophisticated semiconductor fabrication processes like photolithography can implant
different dopant elements in different regions of the same semiconductor crystal wafer,
creating semiconductor devices on the wafer's surface. For example a common type of
transistor, the n-p-n bipolar transistor, consists of an extrinsic semiconductor crystal with two
regions of n-type semiconductor, separated by a region of p-type semiconductor, with metal
contacts attached to each part.
30
Table 4: Table for semiconductor - donor and acceptor atoms
Source: https://www.electronics-tutorials.ws/diode/diode_3.html
Figure 26: PN-junction diode
Forward Bias: The voltage potential is connected positive (+ve) to the P-type material and
negative (-ve) to the N-type material across the diode that has the effect of decreasing the PN
junction diode’s width.
Reverse Bias: The voltage potential is connected negative, (-ve) to the P-type material and
positive, (+ve) to the N-type material across the diode that has the effect of increasing the
PN junction diode’s width.
31
Why does computers use semi-conductors?
Computer chips, both for CPU and memory, are composed of semiconductor materials.
Semiconductors make it possible to miniaturize electronic components, such as transistors.
Not only does miniaturization mean that the components take up less space, it also means that
they are faster and require less energy.
2.3.4.3 Self-Assessment
i. Differentiate between forward bias and reverse bias.
ii. Define PN-junction diode.
iii. A semiconductor is formed by _____________ bonds.
A. Covalent
B. Electrovalent
C. Co-ordinate
D. None of the above
iv. Differentiate between P-type and N-type semiconductors.
v. Identify the use of semi-conductors in computer.
vi. What are the alternatives for silicon semi-conductor in electronic devices like
computers?
vii. Demonstrate the difference between conductor, semi-conductors and insulator using
appropriate workshop equipment.
viii. A semiconductor has ___________temperature coefficient of resistance.
A. Positive
32
B. Zero
C. Negative
D. None of the above
ix. The most commonly used semiconductor is.
A. Germanium
B. Silicon
C. Carbon
D. Sulphur
x. When a pure semiconductor is heated, its resistance.
A. Goes up
B. Goes down
C. Remains the same
D. Can’t say
2.3.4.5 References
• https://www.encyclopedia.com/science/news-wires-white-papers-and-books/structure-
matter
• https://byjus.com/physics/semiconductors-and-insulators/
• https://www.electronics-tutorials.ws/diode/diode_3.html
• https://circuitglobe.com/semiconductors.html
• Semiconductor Devices: Physics and Technology 3rd Edition authored by by Simon M.
Sze , Ming-Kwei Lee, published by Wiley; 3 edition 2012
• Circuit Engineering: The Beginner's Guide to Electronic Circuits, Semi-Conductors,
Circuit Boards, and Basic Electronics, authored by Solis Tech published by Solis Tech
2016
33
2.3.5 Learning Outcome 4: Identify and classify memory activities
In computing, memory refers to the computer hardware integrated circuits that store
information for immediate use in a computer; it is synonymous with the term “primary
storage.”
Watch: How to computer memory works? Volatile and non- volatile memory:
https://youtu.be/TQCr9RV7twk
In computer architecture, the memory hierarchy separates computer storage into a hierarchy
based on response time. Since response time, complexity, and capacity are related, the levels
may also be distinguished by their performance and controlling technologies. Memory
hierarchy affects performance in computer architectural design, algorithm predictions, and
lower level programming constructs involving locality of reference.
Designing for high performance requires considering the restrictions of the memory
hierarchy, i.e. the size and capabilities of each component. Each of the various components
can be viewed as part of a hierarchy of memories (m1,m2,...,mn) in which each member mi is
typically smaller and faster than the next highest member mi+1 of the hierarchy. To limit
waiting by higher levels, a lower level will respond by filling a buffer and then signaling for
activating the transfer.
34
Computer memory or storage can be classified in three ways: primary, secondary an offline:
Source: https://www.slideshare.net
Figure 27: Classification of computer memory storage
Primary memory is the computer’s main memory, which is directly accessible by the CPU
and often much faster than secondary storage. RAM will hold the loaded operating system,
plus all running applications and files. Examples of primary memory / storage:
o Random Access Memory (RAM) – solid state
o Read Only Memory (ROM) – solid state
Secondary storage is a non-volatile medium that holds data until it is deleted or overwritten.
It is sometimes referred to as external memory and auxiliary storage. Secondary storage is
where programs and data are kept on a long-term basis. Examples of secondary memory /
storage:
o Hard Disk Drive (HDD) – magnetic storage
o Solid State Drive (SSD) – solid state
Off-line refers to non-volatile storage that can be easily removed from the computer. This is
often used to transport data and keep backups for protection. Examples of off-line memory /
storage:
o CD, DVD, Blu-ray – optical storage
o USB Flash Drive – solid state
o Removable HDD / SSD
RAM is an acronym for Random Access Memory, a type of computer memory that can be
accessed randomly; that is, any byte of memory can be accessed without touching the
preceding bytes.
35
Source: https://www.archmemory.com
Figure 28: Random Access Memory (RAM)
The larger the RAM size of a computer, the faster it runs since it is faster to carry out orders
and operations. In reality the RAM never runs out of memory, but it gets slower and slower
when too much memory is stored until the computer freezes or restart (restarting your
computer means that the data stored in the RAM will disappear).
There are 2 types of RAM, the dynamic RAM (DRAM) and the static RAM (SRAM).
Dynamic RAM: Dynamic RAM chips consist of a number of transistors and capacitors,
which have different functions:
o Transistor- this acts like a switch, it allows the chip to control circuitry to read the
capacitor or change the capacitor’s value.
o Capacitors- this holds the bits of the information.
Static RAM: This type of RAM doesn’t need to be constantly refreshed. SRAM is faster than
DRAM when it comes to data access. Static RAM costs more than DRAM, consumes more
power than DRAM, lower storage capacity than DRAM.
SRAM DRAM
• SRAM has lower access time, so it is • DRAM has higher access time, so it is
faster compared to DRAM. slower than SRAM.
• SRAM is costlier than DRAM. • DRAM cost less compared to SRAM.
• SRAM requires constant power supply, • DRAM offers reduced power
which means this type of memory consumption, due to the fact that the
36
consumes more power. information is stored in the capacitor.
• Due to complex internal circuitry, less • Dues to the small internal circuitry in the
storage capacity is available compared to one-bit memory cell of DRAM, the
the same physical size as DRAM storage capacity is available.
memory chip.
• SRAM has low packaging density. • DRAM has high packaging density.
Short for Read Only Memory, ROM is a storage medium that is used with computers and
other electronic devices. As the name indicates, data stored in ROM may only be read.
Source: https://tiktokmedias.blogspot.com
Figure 29: Read Only Memory (ROM)
RAM ROM
• Used in the computer’s regular • Used mostly in a computer’s start-up
operations, after loading the OS. process.
• With RAM, writing data is a fast • Writing data to ROM is very slow.
process.
• RAM is a type of volatile memory, • ROM is a type of non-volatile memory,
meaning the stored data is lost when meaning that the data will not be lost when
powering off. power is removed.
• A RAM chip can store quite a lot of • ROM chips usually store only a few
data, up to 16 GB. megabytes of information, around 4 MB per
37
chip.
• There are two main types of RAM: • ROM types include EPROM, EEPROM,
dynamic (DRAM) and static PROM and Mask ROM.
(SRAM).
Digital Asset Management (DAM) is a business process for organizing, storing and
retrieving rich media and managing digital rights and permissions. Rich media assets include
photos, music, videos, animations, podcasts and other multimedia content.
Semiconductor memory is a type of semiconductor device tasked with storing data.
2.3.5.3 Self-Assessment
i. Define semiconductor memory.
ii. What is DAM?
iii. Differentiate between ROM and RAM.
iv. Review a RAM and identify its components
v. Review a ROM and identify its components
vi. In your workshop, differentiate between – CD, DVD and a blue – ray memory device
for offline storage.
vii. Why is a hard drive and pen drive known as 'secondary storage'?
viii. What does the word 'volatile' mean when used in computing?
ix. All of following are non-volatile memory except
A. ROM
B. PROM
C. Flash memory
D. RAM
x. Computer memory is measured in terms of:
A. Bits
B. Bytes
C. Cells
D. Units
xi. Identify the RAM and the ROM component of a CPU.
xii. Review the market on the various sizes of RAM and ROM available for desktop
computers. Evaluate their advantages and disadvantages.
xiii. You are an IT Technician, a user’s computer turns on but there is no display. How
will you fix the issue?
xiv. Storage, which stores or retains data after power off is called-
38
A. Volatile storage
B. Non-volatile storage
C. Sequential storage
D. Direct storage
E. None of these
xv. Which of the following memories must be refreshed many times per second?
A. EPROM
B. ROM
C. Static RAM
D. Dynamic RAM
2.3.5.5 References
• https://searchcontentmanagement.techtarget.com/definition/What-is-digital-asset-
management
• Computer Fundamentals, authored by Anita Goel published by Pearson 2010
• Computer System Architecture 3rd Edition, Authored by M. Morris Mano, published
Pearson 2007
Number systems are the technique to represent numbers in the computer system architecture;
39
every value that you are saving or getting into/from computer memory has a defined number
system. Computer architecture supports following number systems: The types are:
1. Decimal System
2. Binary System
3. The Octal System
4. The Hexadecimal System.
In decimal system the base (or radix) is 10, since any position can contain one of ten digits.
The system therefore has a carrying factor of 10 and each digit indicates a value, which
depends on the position it occupies, for example;
The decimal system uses ten digits to record the number. The ten digits are 0, 1, 2, 3, 4, 5, 6,
7, 8 and 9 and any number (used) is based upon power of 10.
Whereas decimal system uses ten digits to record the number, the binary system uses only
two digits (for recording the number) that is 0 and 1, and its base is 2 (whereas that of
decimal system is 10). Although in everyday life, people generally use the decimal number
system for counting, it is more convenient to use the binary number system in a computer
because electronic components are usually in one of two states, which can be used to
represent 0 and 1, the two digits used in the binary system.
The computer does not have a large number of symbols for representing data. It has only
two, 0 and 1 (called binary digits or bits). These correspond to the two electronic or
magnetic states used in computer circuits and storage.
For example if a punched paper tape is used in the computer, a hole in a tape may allow
electrical contact to be made (ON) and the absence of a hole in the tape does not allow
electrical contact to be made (OFF). Therefore a hole can represent 1 and no hole can
represent 0. Binary system is more compact than the decimal system of coding as the latter
will need large size of the storage medium and relative complexity of the reading device.
40
Table 7: Binary numbers
41
Start binary number with last digit. Therefore the binary equivalent of 217 is 11011001.
The octal system (base 8) and hexadecimal system (base 16) are of importance because they
can be used as shorthand for binary numbers. This is because three binary digits can be
represented by the numbers 0 to 7 i.e., the octal range, while four binary digits can be
represented by the numbers 0 to 9 and A to F.
Source: http://www.businessmanagementideas.com
42
Table 8: Octal binary conversion table
Octal Binary
0 000
1 001
2 010
3 011
4 100
5 101
6 110
7 111
Source: http://www.businessmanagementideas.com
The hexadecimal system has a base 16 and the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 and letters A,
B, C, D, E, F are used. The letters A, B, C, D, E and F represent the decimal numbers 10, 11,
12, 13, 14 and 15 respectively.
When hexadecimal is used to represent a binary number, the individual hexadecimal digits
represent successive groups of four binary digits starting at the point. This is similar to the
conversion from binary to octal, in which each set of three bits is translated to an octal digit.
43
Read: Types of number systems: http://www.businessmanagementideas.com/information-
technology/computers/4-main-types-of-number-system-computer/10285
Watch: Base conversion: https://youtu.be/Fpm-E5v6ddc
Read: Base conversion:
https://www.tutorialspoint.com/computer_logical_organization/number_system_conversion.h
tm
A binary code represents text, computer processor instructions, or any other data using a
two-symbol system. The two-symbol system used is “0” and “1” from the binary number
system.
8421 code: A weighted code in which each decimal digit 0 through 9 is represented by a
four-bit codeword. The bit positions in each codeword are assigned weights, from left to
right, of 8, 4, 2, and 1.
Excess-3 code: An 8421 code for which the weighted sum of the four bits in each codeword
is three greater than the decimal digit represented by that codeword. For example, 9 is
represented by 1100, the weighted sum of which is 8×1 + 4×1 + 2×0 + 1×0 = 12
To represent the sign of a number in binary-coded decimal (BCD), the number 0000 is used
to represent a positive number, and 1001 is used to represent a negative number. The
remaining 14 combinations are invalid signs.
2.3.6.3 Self-Assessment
i. What is BCD? Explain.
ii. What is the difference between binary and BCD?
iii. Why is BCD called 8421 code?
iv. What is binary code?
v. Convert the binary number 1011010 to hexadecimal.
A. 5C
B. 5A
C. 5F
D. 5B
44
vi. What is the result when a decimal 5238 is converted to base 16?
A. 1388
B. 1476
C. 327.375
D. 12166
vii. An Excess-3 code to BCD (Binary-coded decimal) code converter is a device which
converts an exceess-3 code input, represented by a, b, c and d
A. Follow the same rule and create a truth table for “excess-3” code to BCD
B. Derive each input a, b, c, and d as a function of the inputs w, x, y and z (see
following truth table)
C. Model the converter circuit at gate level in structural style.
w x y z a b c d
0 0 1 1 0 0 0 0
0 1 0 0 0 0 0 1
0 1 0 1 0 0 1 0
0 1 1 0 0 0 1 1
0 1 1 1 0 1 0 0
1 0 0 0 0 1 0 1
1 0 0 1 0 1 1 0
1 0 1 0 0 1 1 1
1 0 1 1 1 0 0 0
1 1 0 0 1 0 0 1
2.3.6.5 References
• https://www.encyclopedia.com/computing/dictionaries-thesauruses-pictures-and-press-
releases/excess-3-code
• Electronics, Principles and Applications, authored by Charles A Schuler, published by
McGraw-Hill/Glencoe
45
• Computer System Architecture 3rd Edition, Authored by M. Morris Mano, published
Pearson
The performance of silicon-based devices has improved rapidly in the past few decades,
mostly due to novel processing and patterning technologies, while nanotechnology has
allowed for miniaturization and cost reduction.
For many years silicon remained the only option in electronics. But recent developments in
materials-engineering and nanotechnology have introduced new pathways for electronics.
While traditional silicon electronics will remain the main focus, alternative trends are
emerging. These include:
2-D electronics: Interest in the field started with the discovery of graphene, a structural
variant of carbon. Carbon atoms in graphene form a hexagonal two-dimensional lattice, and
this atom-thick layer has attracted attention due to its high electrical and thermal
conductivity, mechanical flexibility and very high tensile strength. Graphene is the strongest
material ever tested.
In 2010, the Royal Swedish Academy of Sciences decided to award the Nobel Prize in
Physics to Andre Geim and Konstantin Novoselov for their “groundbreaking experiments” in
graphene research.
Graphnene may have started this 2D revolution in electronics, but silicene, phosphorene and
stanene, atom-thick allotropes of silicon, phosphorus and tin, respectively, have a similar
honeycomb structure with different properties, resulting in different applications.
46
All four have the potential to change electronics as we know it, allowing for miniaturization,
higher performance and cost reduction. Several companies around the globe, including
Samsung and Apple, are developing applications based on grapheme.
Organic electronics: The development of conducting polymers and their applications
resulted in another Nobel prize in 2000, this time in chemistry. Alan J. Heeger, Alan G.
MacDiarmid and Hideki Shirakawa proved that plastic can conduct electricity.
In terms of performance and industrial development, organic molecules and polymers cannot
yet compete with their inorganic counterparts. However, organic electronics have some
advantages over conventional electronic materials. Low material and production costs,
mechanical flexibility, adaptability of synthesis processes and biocompatibility make organic
electronics a desirable choice for certain applications.
Memristors: In 1971 Leon Chua reasoned from symmetry arguments that there should be a
fourth fundamental electronic circuit-board element (in addition to the resistor, capacitor and
inductor), which he called memristor, a portmanteau of the words memory and resistor.
Although Chua showed that memristors have many interesting and valuable properties, it
wasn’t until 2007 that a group of researchers from Hewlett Packard Labs found that the
memristance effect can be present in nanoscale systems under certain conditions. Many
researchers believe that memristors could end electronics as we know it and begin a new era
of “ionics”.
While commonly available transistor functions use a flow of electrons, the memristor couples
the electrons with ions, or electrically charged atoms. In transistors, once the flow of
electrons is interrupted (for example by switching off the power) all information is lost.
Memristors “memorize” and store information about the amount of charge that has flowed
through them, even when the power is off.
The discovery of memristors paves the way to better information storage, making novel
memory devices faster, safer and more efficient. There will be no information loss, even if
47
the power is off. Memristor-based circuits will allow us to switch computers on and off
instantly, and start work straight away.
For the past several years, Hewlett Packard has been working on a new type of computer
based on memristor technology. HP plans to launch the product by 2020.
Spintronics: Spintronics, a portmanteau word meaning “spin transport electronics”, is the use
of a fundamental property of particles known as “electron spin” for information processing.
Electron spin can be detected as a magnetic field with one of two orientations: up and down.
This provides an additional two binary states to the conventional low and high logic values,
which are represented by simple currents. Carrying information in both the charge and spin of
an electron potentially offers devices with a greater diversity of functionality.
So far, spintronic technology has been tested in information-storage devices, such as hard
drives and spin-based transistors. Spintronics technology also shows promise for digital
electronics in general. The ability to manipulate four, rather than only two, defined logic
states may result in greater information-processing power, higher data transfer speed, and
higher information-storage capacity.
It is expected that spin transport electronic devices will be smaller, more versatile and more
robust compared with their silicon counterparts. So far this technology is in the early
development stage and, irrespective of intense research, we have to wait a couple of years to
see the first commercial spin-based electronic chip.
Molecular electronics and the organic electronics described above have a lot in common, and
these two fields overlap each other in some aspects. To clarify, organic electronics refers to
bulk applications, while molecular-scale electronics refers to nano-scale, single-molecule
applications.
Conventional electronics are traditionally made from bulk materials. However, the trend of
miniaturization in electronics has forced the feature sizes of the electronic components to
shrink accordingly. In single-molecule electronics, the bulk material is replaced by single
molecules. The smaller size of the electronic components decreases power consumption
while increasing the sensitivity (and sometimes performance) of the device. Another
advantage of some molecular systems is their tendency to self-assemble into functional
blocks. Self-assembly is a phenomenon in which the components of a system come together
spontaneously, due to an interaction or environmental factors, to form a larger functional
unit.
48
Several molecular electronic solutions have been developed, including molecular wires,
single-molecule transistors and rectifiers. However, molecular electronics is still in the early
research phase, and none of these devices has left the laboratory.
The world is quickly and constantly transforming as new technologies continue to enter the
market. This rapid pace of change is perhaps felt most heavily in the electronics industry
which brings in the biggest and newest innovations every year. Following, we’ll look at the
five foremost challenges electronic companies must look forward to:
Brief Product Life Cycles: Technology isn’t evolving for its own sake. It’s responding to
the wants and needs of consumers hungry for products that perfectly suit their day-to-day
lives. Thus, companies in Electronics Manufacturing Services and contract manufacturers are
required to have quality processes in place for new product introduction. To make sure
product launches hit set goals on quality, volume and release, it’s important to use closed-
loop communication concepts between engineering, sales and manufacturing.
Demand: The worst of the global economic crisis is fortunately in the rear view mirror, so it
is expected that the demand for electronics should continue to rise. While cyclical
fluctuations and economic dips are responsible for large shifts in demand, on a smaller level
technology is highly susceptible to changing local conditions because tech is now so heavily
tied to consumer demand. Consumer demand is an uncertain thing, determined by the
vagueness of perceived value and swiftly fleeting tastes. For that reason, production
capabilities must remain lean and able to shift quickly with uncertain demand.
Environmental Issues: This is no longer a world where companies’ margins are freely raised
above the concerns of the environment. New standards and regulations are pushing electronic
manufacturers to consider their ‘social responsibility’ when making decisions both small and
large. A manufacturing consultant says some Electrical Engineering Master’s programs are
now including sustainable engineering strategies in their curriculum to accommodate the
growing trend of environmental awareness. The entire life cycle of a product must be
considered; from manufacturing, with the use of harmful chemicals and human exposure; to
consumer use, with the consumption of energy; to the end of its life, with waste disposal and
complex disassembly.
Tighter Margins: Consumers have benefited from a global marketplace that has emphasized
competition to bring in the latest and greatest innovations and lower prices. On the supply
side, however, this has to lead to shrinking margins. Gains in efficiency and organization
49
have slowed and there is not enough differentiation between products to stave off this
growing trend of commoditization. Electronic manufacturers must deal with this downward
pressure on operating margins as lights continue to turn on across the world.
2.3.7.3 Self-Assessment
i. Describe emerging trends in the electronics from a consumer perspective.
ii. Discuss the challenges of implementing emerging trends in Kenya digital space.
iii. Keeping in mind the changing dynamics in the electronic sector, what are the changes
you envisage in computer hardware? Prepare a report, basis research on the latest
trend of using electronic components in computer desktops
iv. Select latest Internet generation technology
A. Edge
B. 3G
C. 5G
D. 4G LTE
E. 3.75G
v. IIoT stands for __________
A. Industrial Internet of Things
B. Internet Internet of Things
C. Intelligence Internet of Things
D. Internal Internet of Things
vi. Which possibility automatically communicates with other vehicles?
A. Transportation and logistics
B. Energy and utilities
C. Automotive
D. Connected supply chain
vii. Which possibility is the highest contributor to cost overhead for manufacturing
facilities?
A. Transportation and logistics
B. Energy and utilities
C. Plant control flow operation
D. Energy management and resource optimization
2.3.7.5 References
• http://www.ece.utexas.edu/events/emerging-trends-electronic-packaging-and-challenges-
modeling
• https://www.weforum.org/agenda/2015/08/5-next-trends-in-electronics/
• Emerging Trends in Electrical, Electronic and Communications Engineering by hardback
published by Springer International Publishing AG, 2017
50
CORE UNITS OF COMPETENCY
51
CHAPTER3: NETWORKING
3.1 Introduction
This unit specifies the competencies required to perform computer networking. It involves
identification of network types and Components, Connection of networking devices,
configuration of network devices, network testing, configuration of network types, perform
network security, monitor network connectivity and maintain network.
o Identified network components during the site survey such as network typology, network
components - router, switches, hubs etc.
o Tested the strength and connectivity of cables and equipment
o Identified network types as per the network design
o Installed and configured network software according to user manuals
o Implement the network security policy
o Identified and implemented network security measures
o Identified and deployed monitoring tools
52
o Network topologies: Star, Ring, Mesh, Hybrid, Point-to-Point
o Network types: WAN, LAN, PAN, MAN
o Components of a network: Switches/Hubs, Routers, Ports, Media, Computers
o Categories of computer network: Peer, Client Server
A star topology is a topology for a Local Area Network (LAN) in which all nodes are
individually connected to a central connection point, like a hub or a switch. A star takes more
cable than e.g. a bus, but the benefit is that if a cable fails, only one node will be brought
down.
Source: https://www.comparitech.com/net-admin/network-topologies-advantages-disadvantages/
Figure 30: Star typology
53
A ring network is a network topology in which each node connects to exactly two other
nodes, forming a single continuous pathway for signals through each node - a ring. Data
travels from node to node, with each node along the way handling every packet of
information between the components.
Source: https://www.comparitech.com/net-admin/network-topologies-advantages-disadvantages/
Figure 31: Ring typology
Mesh topology is a type of networking where all nodes cooperate to distribute data amongst
each other.
Source: https://www.comparitech.com/net-admin/network-topologies-advantages-disadvantages/
Figure 32: Mesh typology
54
Watch: Introduction to mesh topology: https://youtu.be/tYLU755T6_I
A hybrid topology is a type of network topology that uses two or more differing network
topologies. These topologies include a mix of bus topology; mesh topology, ring topology,
star topology, and tree topology.
Source: https://www.comparitech.com/net-admin/network-topologies-advantages-disadvantages/
Figure 33: Hybrid typology
Source: https://www.conceptdraw.com/How-To-Guide/point-to-point-network-topology
Figure 34: Point-to-point typology
55
A computer network can be categorized by their size. A computer network is mainly
of four types:
Type of
computer
network
Local Area Network (LAN) is a group of computers connected to each other in a small area
such as building, office. LAN is used for connecting two or more personal computers through
a communication medium such as twisted pair, coaxial cable, etc. It is less costly as it is built
with inexpensive hardware such as hubs, network adapters, and ethernet cables. The data is
transferred at an extremely faster rate in Local Area Network. Local Area Network provides
higher security.
Source: https://www.javatpoint.com
Figure 36: LAN
Personal Area Network (PAN) is a network arranged within an individual person, typically
within a range of 10 meters. Personal Area Network is used for connecting the computer
devices of personal use are known as Personal Area Network. Thomas Zimmerman was the
first research scientist to bring the idea of the Personal Area Network. Personal Area Network
covers an area of 30 feet. Personal computer devices that are used to develop the personal
area network are the laptop, mobile phones, and media player and play stations.
56
Source: https://www.javatpoint.com
Figure 37: PAN
Metropolitan Area Network (MAN) is a network that covers a larger geographic area by
interconnecting a different LAN to form a larger network. Government agencies use MAN to
connect to the citizens and private industries. In MAN, various LANs are connected to each
other through a telephone exchange line the most widely used protocols in MAN are RS-232,
Frame Relay, ATM, ISDN, OC-3, ADSL, etc. It has a higher range than Local Area Network
(LAN).
Source: https://www.javatpoint.com
Figure 38: MAN
57
Wide Area Network (WAN) is a network that extends over a large geographical area such
as states or countries. A Wide Area Network is quite bigger network than the LAN. A Wide
Area Network is not limited to a single location, but it spans over a large geographical area
through a telephone line, fibre optic cable or satellite links. The Internet is one of the biggest
WAN in the world. A Wide Area Network is widely used in the field of Business,
government, and education.
Source: https://www.javatpoint.com
Figure 39: WAN
Read: On different types of networks apart from WAN, PAN, LAN, MAN
https://www.belden.com/blog/smart-building/11-types-of-networks-explained-vpn-lan-more
Computer network components include the major parts that are needed to install a network
both at the office and home level. Before delving into the installation process, you should be
familiar with each part so that you could choose and buy the right component that fits with
your network system.
Network media is the actual path over which an electrical signal travels as it moves from
one component to another. A computer network is a digital telecommunications network
which allows nodes to share resources. In computer networks, computing devices exchange
data with each other using connections (data links) between nodes. These data links are
58
established over cable media such as wires or optic cables, or wireless media such as Wi-Fi.
Source: https://www.lambda-tek.com
Figure 40: Switch
Hub is a device that splits a network connection into multiple computers. It is like a
distribution center. When a computer request information from a network or a specific
computer, it sends the request to the hub through a cable. The hub will receive the request
and transmit it to the entire network. Each computer in the network should then figure out
whether the broadcast data is for them or not.
Source: http://www.certiology.com
Figure 41: Hub
When we talk about computer network components, the other device that used to connect a
LAN with an Internet connection is called Router. When you have two distinct
networks (LANs) or want to share a single Internet connection to multiple computers, we use
a Router.
59
Source: https://www.lifewire.com
Figure 42: Router
A network port is a number that identifies one side of a connection between two computers.
Computers use port numbers to determine to which process or application a message should
be delivered. As network addresses are like street address, port numbers are like suite or
room numbers.
Source: https://basri.my
Figure 43: Port
Network media is the actual path over which an electrical signal travels as it moves from
one component to another. Types of network media,
o Twisted-pair cable
o Coaxial cable
o Fiber-optic cable
o Wireless.
60
support/network-media/
A computer network is a set of computers connected together for the purpose of sharing
resources. The most common resource shared today is connection to the Internet. Other
shared resources can include a printer or a file server. The Internet itself can be considered
a computer network.
Source: http://www.cyberagentsinc.com
Figure 45: Peer-to-peer network
61
Read: Introduction to peer-to-peer network:
https://www.onlinelms.org/mod/book/view.php?id=43&chapterid=452
Client/Server network is a network model designed for the end users called clients, to
access the resources such as songs, video, etc. from a central computer known as Server the
central controller is known as a server while all other computers in the network are
called clients a server performs all the major operations such as security and network
management a server is responsible for managing all the resources such as files, directories,
printer, etc. All the clients communicate with each other through a server. For example, if
client1 wants to send some data to client 2, then it first sends the request to the server for the
permission. The server sends the response to the client 1 to initiate its communication with
the client 2.
Source: https://www.javatpoint.com
Figure 46: Client or server network
3.3.2.3 Self-Assessment
i. What is client/server network?
ii. Define HUB, SWITCH, ROUTER
iii. What is a LAN?
iv. What is the benefit of the Networking?
A. File Sharing
62
B. Easier access to Resources
C. Easier Backups
D. All of the Above
v. Each LAN type has its own strategy in sending of
A. Bits
B. Bytes
C. Data
D. Frames
vi. Describe star topology. What is the disadvantage of a star topology?
vii. What is Hybrid network?
viii. What type of network is used for communicating data across states, countries, or the
whole world?
ix. What is peer-to-peer network?
x. Name the different types of network topologies and brief its advantages.
xi. Prepare ring topology in packet tracer.
xii. How many broadcast domains and collision domains are there in the diagram below?
Source: https://www.networkbulls.com
63
xiii. You connect a laptop to an available port on a Cisco Catalyst switch. By default, how
long does it take that port to start forwarding traffic?
A. 0 seconds
B. 15 seconds
C. 30 seconds
D. 50 seconds
xiv. One of your clients is a Cyber Café owner. He has 10 laptops in a single room. He
wants the laptops to be connected with each other and the printer. What will be your
recommendation? What are the resources you will need?
xv. What steps do you take when troubleshooting a networking issue?
xvi. What are the first things you check when a user is experiencing problems accessing
the network?
xvii. A new switch is bought. What must the network technician do to install the new
switch and make it work as a replacement for the failed device? Is this easy or hard to
do? Why is it easy or hard?
3.3.2.5 References
• https://www.javatpoint.com/types-of-computer-network
• https://www.all-about-computer-parts.com/computer_network_components.html
• http://www.pearsonitcertification.com/articles/article.aspx?p=30191
• https://www.javatpoint.com/computer-network-architecture
• Network Topology: Star Network, Grid Network, Tree and Hypertree Networks,
Spanning Tree Protocol, Metro Ethernet, Token Ring, Mesh Networking, authored by
Books Llc, published by General Books LLC, 2010
64
o Network devices: Switches/Hubs, Ports, Computers
o Connect network devices
A wired network is a common type of wired configuration. Most wired networks use
Ethernet cables to transfer data between connected PCs. In a small-wired network, a single
router may be used to connect all the computers. Larger networks often involve multiple
routers or switches that connect to each other.
3.3.3.3 Self-Assessment
i. What are Routers?
ii. What is the difference between Hub, Switch, and Router?
iii. How a switch is different from a Hub?
iv. Configure a new router within your lab.
v. List the benefits of wired versus wireless network.
vi. Case situation: You are a consultant to a small size hotel. You have been called to
check the Internet WIFI network. According to your client, some of their guests are
facing challenges with connecting their computer devices to the WIFI. How will you
address the situation? What are the steps that you will consider?
vii. Set up a wireless network for connecting 10 devices in your lab.
viii. Case situation: You are a consultant at a coffee shop for their IT system. Your client
is keen on providing their customer free Internet via WIFI. What will be your
suggestions? What are the key challenges that you should make your client caution
about?
65
ix. Case Study on Network Typology: TUT Company recently installed a new router in
their office. Complete the network installation by performing the initial router
configurations and configuring RIPv2 routing using the router command line interface
(CLI) on the R2-TUT. Following are the details for your reference.
Source: https://www.9tut.com/59-ccna-configuration-sim-question/comment-page-5
66
xv. What does router do in a network?
A. Forwards a packet to all outgoing links
B. Forwards a packet to the next free outgoing link
C. Determines on which outing link a packet is to be forwarded
D. Forwards a packet to all outgoing links except the originated link
xvi. Which of the following cables can be used to connect a PC and a Hub?
A. Rollover cable
B. Straight cable
C. Cross cable
D. Any of the above
3.3.3.5 References
• https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router-
gateways/
• https://andersontech.com/three-critical-reasons-choose-wired-network-small-business/
• Cabling Part 1: LAN Networks and Cabling Systems, 5th Edition authored by Andrew
Oliviero, published by Sybex, 2015
• Network Design Basics for Cabling Professionals authored by BICSI published by
McGraw-Hill Professional; 1 edition
67
3.3.4.2 Information Sheet
Network configuration is the process of setting a network's controls, flow and operation to
support the network communication of an organization and/or network owner. This broad
term incorporates multiple configuration and setup processes on network hardware, software
and other supporting devices and components.
The Open Systems Interconnection model (OSI) is a conceptual model that characterizes
and standardizes the communication functions of a telecommunication or computing system
without regard to its underlying internal structure and technology.
Source: https://www.geeksforgeeks.org
Figure 47: Open Systems Interconnection (OSI) Model
The TCP/IP Protocol suite is a set of protocols used on computer networks today (most
notably on the Internet). It provides an end-to-end connectivity by specifying how data
should be packetized, addressed, transmitted, routed and received on a TCP/IP network. This
functionality is organized into four abstraction layers and each protocol in the suite resides in
a particular layer.
68
Read: TCP/IP Protocol suite: https://study-ccna.com/tcpip-suite-of-protocols/
TCP/IP technically applies to network communications in which the TCP transport is used to
deliver data across IP networks. Known as a connection-oriented protocol, TCP works by
establishing a virtual connection between two devices via a series of request and reply
messages sent across the physical network.
Source: https://www.iplocation.net
Figure 48: TCP/IP
Ethernet is the technology that is most commonly used in wired local area networks (LANs).
A LAN is a network of computers and other electronic devices that covers a small area such
as a room, office, or building. It is used in contrast to a Wide Area Network (WAN), which
spans much larger geographical areas.
Network protocols are formal standards and policies made up of rules, procedures and
formats that define communication between two or more devices over a network. Network
protocols conduct the action, policies, and affairs of the end-to-end process of timely, secured
and managed data or network communication.
69
Source: nikemurphycs.com
Figure 49: Network protocols
Control Protocol (TCP) used primarily for establishing low-latency and loss-tolerating
connections between applications on the Internet.
File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between
computers on the Internet over TCP/IP connections.
FTP is a client-server protocol that relies on two communications channels between client
and server: a command channel for controlling the conversation and a data channel for
transmitting file content. Clients initiate conversations with servers by requesting to
download a file. Using FTP, a client can upload, download, delete, rename, move and copy
files on a server.
FTP sessions work in passive or active modes. In active mode, after a client initiates a session
via a command channel request, the server initiates a data connection back to the client and
begins transferring data. In passive mode, the server instead uses the command channel to
send the client the information it needs to open a data channel. Because passive mode has the
client initiating all connections, it works well across firewalls and Network Address
Translation (NAT) gateways.
70
Source: https://searchnetworking.techtarget.com
Figure 50: Active and passive FTP
HTTP means Hypertext Transfer Protocol. HTTP is the underlying protocol used by the
World Wide Web and this protocol defines how messages are formatted and transmitted, and
what actions Web servers and browsers should take in response to various commands.
71
This entire process is centralized so that TCP/IP configuration can also be completed from a
central location. DHCP has “pool of IP addresses” from which it allocates the IP address to
the network devices. DHCP cannot recognize if any device is configured manually and
assigned with the same IP address from the DHCP pool. In this situation, it throws “IP
address conflict” error.
DHCP environment requires DHCP servers to set-up the TCP/IP configuration. These servers
then assign, release and renew the IP addresses as there might be a chance that network
devices can leave the network and some of them can join back to the network.
A Network Operating System (NOS) is a computer Operating System (OS) that is designed
primarily to support workstations, personal computers and, in some instances, older terminals
that are connected on a local area network (LAN).
3.3.4.3 Self-Assessment
i. Describe the layers of OSI model?
ii. Explain TCP/IP Model
iii. What is HTTP and what port does it use?
iv. What are TCP and UDP?
v. Explain DHCP briefly?
vi. Expand DHCP and describe how it works?
vii. Network Layer is in OSI’s:
A. 7th layer
B. 4th Layer
C. 1st layer
D. 3rd Layer
viii. What does UDP provide in OSI model?
A. It provide data segmentation
B. It secure the data
C. It is connection less protocol
D. It is a layer 3 protocol
ix. You are IT support engineer, your IT manager wants you to Telnet R7 which is in
LA, Which is the highest layer used to get access to LA’s router from Telnet?
72
A. Layer 7
B. Layer 1
C. Layer 4
D. Layer 5
x. The physical layer translates logical communication requests from the ______ into
hardware-specific operations.
A. Data link layer
B. Network layer
C. Transport layer
D. Application layer
xi. Which software troubleshooting tool could you use to determine which protocol Is
Configured with the wrong address?
xii. Which TCP/IP utility is most often used to test whether an IP host is up and
functional?
xiii. What protocol can be applied when you want to transfer files between different
platforms, such between Unix systems and windows servers?
3.3.4.5 References
• https://www.webopedia.com/TERM/H/HTTP.html
• https://study-ccna.com/http-https/
• https://www.w3schools.com/whatis/whatis_http.asp
• The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference, authored
by Charles M. Kozierok, published by No Starch Press; 1st edition
• Elements of Network Protocol Design, authored by Mohamed G. Gouda published by
Wiley-Interscience; 1st edition
73
3.3.5 Learning Outcome 4: Network testing
Source: https://www.flukenetworks.com
Figure 51: Clamp meter
A voltmeter is an instrument used for measuring electrical potential difference between two
points in an electric circuit. Analog voltmeters move a pointer across a scale in proportion to
the voltage of the circuit; digital voltmeters give a numerical display of voltage by use of an
analog to digital converter.
A cable tester is an electronic device used to verify the electrical connections in a signal
cable or other wired assembly.
74
The Signal Tester will provide a summary of all networks found and their absolute and
relative strengths. The information is shown directly on the LCD screen.
Source: https://www.4grouter.co.uk
Figure 52: Signal tester
3.3.5.3 Self-Assessment
i. What is cable tester?
ii. How to measure your network signal?
iii. What is the role of clamp meter?
iv. Differentiate clamp meter and voltmeter?
v. Which device we use to test network signal?
A. Clamp meter
75
B. Voltmeter
C. Signal Tester
D. None of them
v. Voltmeter measures?
A. Electrical current
B. Network speed
C. Signal
D. None above all
vi. How fast is 10baseT?
A. 100Mbps
B. 30Mbps
C. 10Mbps
D. 2Mbps
E. 1000Mbps
vii. How fast can data travel over Cat3 UTP?
A. 200Mbps
B. 100Mbps
C. 10Mbps
D. 2Mbps
E. 1.5Mbps
3.3.5.5 References
• https://www.techopedia.com/definition/29991/network-performance-test
• The Art of Testing Network Systems, authored by Robert W. Buchanan published by
Wiley; 1 edition 1996
• Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize
Availability and Performance Networking Technology, authored by Tom Kunath, Andy
Sholom, published by Cisco Press; 1 edition 2011
76
3.3.6 Learning Outcome 5: Configuration of Network types
Network configuration is the process of setting a network's controls, flow and operation to
support the network communication of an organization and/or network owner. This broad
term incorporates multiple configuration and setup processes on network hardware, software
and other supporting devices and components.
Network configurations procedures take place along with the installation of the operating
system software. At that time, certain IP configuration parameters must be stored in
appropriate files so they can be read at boot time.
The procedure is a matter of creating or editing the network configuration files. How
configuration information is made available to a machine's kernel depends on whether these
files are stored locally (local files mode) or acquired from the network configuration server
(network client mode).
77
3.3.6.3 Self-Assessment
i. Define network configuration
ii. Which parameter used during network configuration?
iii. Conduct performance test in your lab.
iv. Case situation: You are asked to visit a near-by high school and test their ICT lab.
They are facing lot of challenges with their computer lab. What are the steps you will
consider for diagnosis of their challenges?
v. ________ is the process of setting a network control.
A. Network configuration
B. Network management
C. Network styling
D. Network wiring
3.3.6.5 References
• https://youtu.be/gVrXLq5E-CQ
• https://www.techopedia.com/definition/25766/network-configuration
• Computer Networking: Top-Down authored by Kurose, Ross, published by Pearson 2013
Network Security is the process of taking physical and software preventative measures to
protect the underlying networking infrastructure from unauthorized access, misuse,
malfunction, modification, destruction, or improper disclosure, thereby creating a secure
78
platform for computers, users and programs to perform their permitted critical functions
within a secure environment.
External threats are malicious campaigns and threat actors that attempt to exploit security
exposures in your attack surface that exist outside the firewall. All organizations with a
digital presence are exposed to external threats by attackers who attempt to impersonate your
brand and official communications channels on the internet, social media, and through
mobile apps.
A firewall is software used to maintain the security of a private network. Firewalls block
unauthorized access to or from private networks and are often employed to prevent
unauthorized Web users or illicit software from gaining access to private networks connected
to the Internet. A firewall may be implemented using hardware, software, or a combination of
both.
User Account Control or UAC for short is a security feature of Windows which helps
prevent unauthorized changes to the operating system. Applications, users, viruses or other
forms of malware can initiate these changes.
Encryption is the process of encoding a message or information in such a way that only
authorized parties can access it and those who are not authorized cannot.
A network security policy, or NSP, is a generic document that outlines rules for
computer network access, determines how policies are enforced and lays out some of the
basic architecture of the company security/ network security environment.
3.3.7.3 Self-Assessment
i. Define antivirus?
ii. What is the difference between antivirus and firewall?
iii. What is firewall?
79
iv. Differentiate internal threads and external threads?
v. What is Network Security?
vi. Which way to prevent unauthorized user to change the operating system?
A. Firewall
B. User account control
C. Encryption
vii. Case situation: You have been hired by a pharmaceutical office. The manager of the
sales team has asked you to ensure that none of the computers have access to any
social media or entertainment sites on the Internet. What will be your approach to
address the manager’s request?
viii. Review the different anti-viruses available and make a table on advantages and
disadvantages.
ix. Case situation: You are visiting a Cyber Café and you see that the anti-virus package
is pirated. What will you consider doing?
3.3.7.5 References
• https://www.riskiq.com/products/external-threats/
• Network Security authored by Jan L. Harrington, published by Elsevier Science &
Technology
Monitoring software observes and tracks the operations and activities of users, applications
and network services on a computer or enterprise systems. This type of software provides a
way to supervise the overall processes that are performed on a computing system, and
provides reporting services to the system or network administrator.
80
Ping is a computer network administration software utility used to test the reachability of a
host on an Internet Protocol network. It is available for virtually all operating systems that
have networking capability, including most embedded network administration software.
Traceroute (or tracert on Microsoft Windows systems) displays information about each
“hop” a packet takes from your computer to the remote host. It is often a good way to
pinpoint possible ISP connection issues or network bottlenecks.
The nslookup command will look up the IP addresses associated with a domain name.
An internet speed test is a website or web application that measures a user's internet
connection speed. It reports on: Upload speed and download speed.
3.3.8.3 Self-Assessment
i. What is ping command and what are its uses?
ii. Why is it necessary to test the speed of your Internet?
iii. Explain briefly computer monitoring?
iv. What are ipconfig and ifconfig?
v. Differentiate between ping and tracert.
vi. You need to troubleshoot your network IP connectivity. Which of the following
commands would you use to find the IP address on your Ethernet 0 interface?
A. Ping
B. IPConfig
C. traceroute
D. Show interface Ethernet 0
vii. We can use ping program to find, if a host is:
A. Alive
B. Dead
C. Responding
D. Both A and C
viii. __________ command is used to manipulate TCP/IP routing table.
A. route
B. Ipconfig
C. Ifconfig
D. Traceroute
ix. Ping can:
81
A. Measure round-trip time
B. Report packet loss
C. Report latency
D. All of the mentioned
3.3.8.5 References
• https://techterms.com/definition/ping
• https://youtu.be/mx8RP-XsEKw
• https://youtu.be/x_3dWSQkHB8
• Computer Networking: Top-Down authored by Kurose, Ross, published by Pearson 2013
Maintenance planning and scheduling includes planning decisions related to what, how
and time estimate for a job.
There are different types of maintenance tools for network. Console is the combination of
display monitor and keyboard (or other device that allows input). Another term for console is
terminal. The term console usually refers to a terminal attached to a minicomputer or
mainframe and used to monitor the status of the system.
Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting,
analysis, software and communications protocol development, and education. Originally
named Ethereal, the project was later renamed to Wireshark.
82
Read: About Wireshark: https://en.wikipedia.org/wiki/Wireshark
Network Mapper (Nmap) is a free and open-source network scanner created by Gordon
Lyon (also known by his pseudonym Fyodor Vaskovich). Nmap is used to discover hosts and
services on a computer network by sending packets and analyzing the responses.
3.3.9.3 Self-Assessment
i. What is Nmap?
ii. Explain wireshark.
iii. What is console?
iv. In the virtual LAN of your lab, how many hosts are running? Please list their IP
addresses. You should consider the router in all this and following questions,
remember the router has different interfaces on different subnets.
A. If a computer is up, which services (TCP and UDP) are open on it?
B. Can you determine the Operating system and its possible version that is running
on each alive computer?
C. All the answers should be included in a file named /tmp/nmap,
v. Nmap was originally a command-line application for Unix, but a Windows version
has been available since
A. 2005
B. 2008
C. 2019
D. 2000
vi. Wireshark is free_______ Analyzer?
A. Console
B. Network
C. Parket
D. B and C
3.3.9.5 References
• https://www.networkworld.com/article/3296740/what-is-nmap-why-you-need-this-
network-mapper.html
• Computer Networking: Top-Down authored by Kurose, Ross, published by Pearson 2013
83
CHAPTER 4: SOFTWARE INSTALLATION
4.1 Introduction
This unit describes the competencies required in installing computer software. It involves
identification of software to be installed, installation of the software, configuration of the
software, software testing, user training and software maintenance.
o Classified the software according to the functionality, resource requirement and use
o Established software acquisition methods as per the functionality
o Configured software as per the installation manual provided
o Performed software testing
o Prepared user-training manuals according to software functionality
These are the key learning outcomes, which make up workplace function:
o Identify software to be installed
o Install the software
o Configure the software
o Test software functionality
o Perform user training
o Perform Software Maintenance
84
o Functions of operating systems: Device management, Memory management, Storage
management, Process control, Security Management
o Types of operating system interfaces: Menu driven and Graphical user Interface
Application Sotware
• Spreadsheets
• Word processors
• Databases
• Internet Browser
System software
• Operatiing System
• Utilities
Hardware
• CPU, disks, mouse, printer
etc.
Source: https://courses.cs.vt.edu
Figure 53: Overview of software
85
System software manages and controls the internal operations of a computer system. It is a
group of programs, which is responsible for using computer resources efficiently and
effectively. For example, an operating system is system software, which controls the
hardware, manages memory and multitasking functions, and acts as an interface between
application programs and the computer. System software is designed to provide platform for
other software.
Source: https://en.wikibooks.org
Figure 54: Interface of application software, system software and hardware
Application software is the general designation of computer programs for performing tasks.
Application software may be general purpose (word processing, web browsers, etc.)
86
application softwares. the presence of system software.
• Some examples of system softwares are • Some examples of application softwares
compiler, assembler, debugger, driver, are word processor, web browser, media
etc. player, etc.
An Operating System (OS) is a program that acts as an interface between the software and
the computer hardware.
The main difference between single user and multiuser operating system is that in a single
user operating system, only one user can access the computer system at a time while in a
multiuser operating system, multiple users can access the computer system at a time.
An operating system that allows a single user to perform two or more functions at once is a
single-user or multitasking operating system. Early versions of both Microsoft Windows
and the Macintosh operating systems were examples of this category.
A real-time operating system (RTOS) is a very fast and relatively small OS. Often
embedded, meaning it is built into the circuitry of a device and not normally loaded from a
disk drive, a real-time operating system runs real-time applications. It may support multiple
simultaneous tasks or it may only support single tasking.
A distributed operating system manages a group of distinct computers and makes them
appear to be a single computer. The development of networked computers that could be
linked and communicate with each other gave rise to distributed computing. Distributed
computations are carried out on more than one machine. When computers in a group work in
cooperation, they form a distributed system.
Batch processing is a technique in which an Operating System collects the programs and
data together in a batch before processing starts. An operating system does the following
activities related to batch processing. The OS defines a job, which has predefined sequence of
commands, programs and data as a single unit.
87
Single user
operating
system
Multi- Multi-
processing tasking
Multi-
Time programmi
Sharing
ng
Distributed
Data Offline
Processing
Processing
An Operating System manages device communication via their respective drivers. It does
the following activities for device management:
o Keeps tracks of all devices. Program responsible for this task is known as the I/O
controller.
o Decides which process gets the device when and for how much time.
o Allocates the device in the efficient way.
o De-allocates devices.
88
o Keeps tracks of primary memory, i.e., what part of it are in use by whom, what parts are
not in use?
o In multiprogramming, the OS decides which process will get memory when and how
much.
o Allocates the memory when a process requests it to do so.
o De-allocates the memory when a process no longer needs it or has been terminated.
Since main memory is usually too small to accommodate all the data and programs
permanently, the computer system must provide secondary storage to back up
main memory. Process Control is a data structure in the operating system kernel containing
the information needed to manage the scheduling of a particular process.
Operating system security refers to specified steps or measures used to protect the OS from
threats, viruses, worms, malware or remote hacker intrusions. OS security encompasses all
preventive-control techniques, which safeguard any computer assets capable of being stolen,
edited or deleted if OS security is compromised.
Source: https://www.includehelp.com
Figure 56: Operating System interfaces
89
Menu-driven is used to describe a software program that is operated using file menus instead
of using commands. Below is an example of how a user may quit a menu-driven program, as
opposed to a non menu-driven program.
Source: https://www.computerhope.com
Figure 57: Menu
Graphical User Interface (GUI) is an interface that uses icons or other visual indicators to
interact with electronic devices, rather than only text via a command line. For example, all
versions of Microsoft Windows are a GUI, whereas MS-DOS is a command line.
Source: https://en.wikipedia.org
Figure 58: Approach for Graphical User Interface (GUI)
4.3.2.3 Self-Assessment
i. What are real-time systems?
ii. Describe the objective of multitasking?
iii. What is menu-driven? Give examples
iv. What is multitasking?
v. State differences: real-time operating system vs. distributed operating system
vi. What is GUI?
A. A type of virus
90
B. Good universal indicator
C. There is no such a thing
D. Graphical user interface
v. Case situation: A user is running Windows 8 and wants to upgrade to Windows 10.
Is this possible? If yes, how? If no, why?
vi. Identify the difference between: Ubuntu and VLC player
vii. ________________ is an example of menu driven software.
viii. ________________ is an example of GUI software program.
ix. Identify the application software from the image below:
Source: https://brainly.in
4.3.2.5 References
• https://www.techopedia.com/definition/4356/software
• http://ecomputernotes.com/software-engineering/characteristics-and-classification-of-
software
91
• https://www.tankonyvtar.hu/en/tartalom/tamop412A/2011_0009_Herdon_Miklos-
Agroinformatics/ch03s09.html
• https://www.tutorialspoint.com/operating_system/os_overview.htm
• https://study.com/academy/lesson/what-is-a-graphical-user-interface-gui-definition-
components-examples.html
• Software Engineering authored by Sumit Prakash Tayal, Bharat Bhushan Agarwal,
published by Firewall 2009
• Principles of Operating Systems: Design and Applications authored by Brian Stuart
published by Cengage Learning 2008
Software installation is the process of making hardware and/or software ready for use.
Obviously, different systems require different types of installations. While certain
installations are simple and straightforward and can be performed by non-professionals,
others are more complex and time-consuming and may require the involvement of specialists.
Software installation legal requirements : Software can be provided as a single user and
92
multi-user user license:
Data Protection controls how your personal information is used by organizations, businesses
or the government.
o Setup Program (text mode): prepares the hard drive for the subsequent stages of
installation and copies the files required for running the Setup Wizard. Requires reboot.
(Clean installations only.)
o Setup Wizard (graphical mode): prompts for additional information such as product
key, names, passwords, regional settings, etc.
o Install Windows Networking: detects adapter cards, installs networking components
(Client for MS Networks, File & Printer Sharing for MS Networks), and installs TCP/IP
protocol by default (other protocols can be installed later). You can choose to join a
workgroup or domain at this stage. You must be connected to network and provide
appropriate credentials to join a domain. After all choices have been made, components
are configured, additional files are copied, and the system is rebooted.
o Post installation: create user accounts and activate retail versions software. This stage is
sometimes referred to as the "Out of Box Experience" (OOBE).
Headless software (e.g. "headless java" or "headless Linux") is software capable of working
on a device without a graphical user interface. Such software receives inputs and provides
output through other interfaces like network or serial port and is common on servers and
embedded devices.
A clean install is a software installation in which any previous version is eradicated. The
alternative to a clean install is an upgrade, in which elements of a previous version remain.
Software license registration tools and services provide the means for presenting a software
93
developer's software licenses (also known as an End-User License Agreement, or EULA) to
an end user as well as facilitating the transfer of required registration information and consent
to the license. Successfully registering a software application often activates the software for
legal use by the end user or enterprise.
4.3.3.3 Self-Assessment
i. What is the importance of registering software?
ii. Differentiate attended installation and unattended installation.
iii. What is Software Acquisition?
iv. Explain headless software.
v. Case situation: Your computer application software prompts you to upgrade it and
you do not have registration keys how will fix the issue?
vi. Identify and install software for office application.
vii. Identify and install software for doing creative design.
viii. Hardness software is software capable of working on a device without a graphical
user interface
A. True
B. False
viii. ___________is the process of making hardware and/or software ready for use?
A. Hardness software
B. Software installation
C. Clean install
ix. __________ software can be activated on single PCs and laptops?
A. Single user
B. Attended
C. Multi user
x. Attended installation goes through the following setup stages:
A. Setup Program text mode
B. Setup Wizard graphical mode
C. Install Windows Networking
D. Post installation
94
4.3.3.5 References
• https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=13031
• http://www.thenetworkencyclopedia.com/entry/unattended-installation/
• https://www.sqa.org.uk/e-learning/ClientOS01CD/page_04.htm
• Software Engineering authored by Sumit Prakash Tayal, Bharat Bhushan Agarwal,
published by Firewall, 2009
• Principles of Operating Systems: Design and Applications authored by Brian Stuart
published by Cengage Learning, 2008
Identification, control, audit, and status accounting are the four basic requirements for a
software configuration management system. These requirements must be satisfied
regardless of the amount of automation within the SCM process. All four may be satisfied by
an SCM tool, a tool set, or a combination of automated and manual procedures.
Configuration identification is the process of identifying the attributes that define every
aspect of a configuration item. A configuration item is a product (hardware and/or software)
that has an end-user purpose.
The recording and reporting of information needed for configuration management including
the status of configuration items proposed changes and the implementation status of approved
changes. Status accounting provides the means by which the current state of the development
can be judged and the history of the development life cycle can be traced.
95
o The history of baseline changes including rationales for change
o A list of open change requests by configuration item
o Deficiencies identified by configuration audits
o The status of works associated with approved change requests by configuration identifier
Tracking software observes and tracks the operations and activities of users, applications and
network services on a computer or enterprise systems. This type of software provides a way
to supervise the overall processes that are performed on a computing system, and provides
reporting services to the system or network administrator.
Software control is the set of procedures used by organizations to ensure that a software
product will meet its quality goals at the best value to the customer, and to continually
improve the organization's ability to produce software products in the future.
4.3.4.3 Self-Assessment
i. What are the requirements of software installation?
ii. Why identification configuration is important?
iii. What is software tracking?
iv. What is software controlling?
v. Prepare a configuration status report.
vi. Case situation: Download different tracking software and prepare a detailed report on
the software used.
vii. Case situation: You are asked to visit a high school hostel to check their ICT lab set
up. There key challenge has been high Internet consumption. What will be your
approach of addressing their challenges?
viii. ________ is the set of procedures used by organizations to ensure that a software
product will meet its quality goals at the best value to the customer?
A. Microsoft
B. Operating system
C. Software control
ix. ________Software observes and tracks the operations and activities of users,
applications and network services on a computer or enterprise systems.
A. Sniffing
B. Tracking
C. Hacking
D. Penetration
96
4.3.4.4 Tools, Equipment, Supplies and Materials
Computer, external hard disk, Deploy master, utility program
4.3.4.5 References
• https://www.techopedia.com/definition/4313/monitoring-software
• http://www.chambers.com.au/glossary/configuration_status_accounting.php
• Software Engineering authored by Sumit Prakash Tayal, Bharat Bhushan Agarwal,
published by Firewall 2009
Installation testing is performed to check if the software has been correctly installed with all
the inherent features and that the product is working as per expectations. Also known as
implementation testing, it is done in the last phase of testing before the end user has his/her
first interaction with the product.
97
Check for and updte software
to latest maintainence levels
Choose configuration
Check requirements
Source: https://www.ibm.com
Figure 59: Basic program installation steps
Functional Testing is defined as a type of testing which verifies that each function of the
software application operates in conformance with the requirement specification. This testing
mainly involves black box testing and it is not concerned about the source code of the
application.
98
Watch: How to resolve problems while installing software in Windows 10:
https://youtu.be/rKKatwf6dSM
4.3.5.3 Self-Assessment
i. What are mainline functions?
ii. Define installation testing.
iii. Differentiate between accessibility and error conditions
iv. In which activity of the Fundamental Test Process is the test environment set up?
A. Test implementation and execution
B. Test planning and control
C. Test analysis and design
D. Evaluating exist criteria and reporting
v. Identify a productivity software and install it in a Windows computer.
vi. Identify an entertainment software and install it in a Windows laptop.
vii. ______checks the accessibility of the system for the user
A. Accessibility
B. Usability
C. Durability
D. None of above
viii. _______ test the main functions of an application
A. Basic usability
B. Mainline functions
C. Accessibility
4.3.5.5 References
• http://www.professionalqa.com/installation-testing
• https://www.guru99.com/functional-testing.html
• Software Engineering authored by Sumit Prakash Tayal, Bharat Bhushan Agarwal,
published by Firewall 2009
99
4.3.6 Learning Outcome 5: Perform user training
Creating a training program: End-user training is more effective and memorable if you
tailor it to your own organization's use of the software, rather than generic lessons.
Setting training goals: Your first objective in providing software training for end-users is
minimizing any productivity losses associated with the software transition. This means you
have to, as quickly as possible, get them up to the skill level required to do their jobs at least
as quickly and accurately as they were doing with the old software.
Content Audience
Delivery Style Budget
Development Consideration
Communication Measuring
Timelines
of Training Effectiveness
Source: https://saylordotorg.github.io
Figure 60: Training module development and delivery steps
100
Training delivery methods
o Individual hands-on instructor
o Hands-on classroom style instructor-led training
o Seminar style group demonstration
o Computer Based Training (CBT)
o Book-based self-paced training
Assessing end-user needs An important element in creating your training plan is to evaluate
the technical skill level(s) of those who will actually use the software on a daily basis.
Overall Considerations
Before considering specific training techniques, ask yourself these questions:
A training feedback form is a tool used by training managers and human resource
professionals to collect feedback from trainers and trainees. It is used to identify skill gaps
and problems to help improve training programs and the overall experience these programs
provide.
4.3.6.3 Self-Assessment
i. Determine user-training needs?
ii. Explain training delivery methods for software training.
iii. Case situation: Prepare a checklist for assessing training requirements of a women’s
Sacco group for using social media for enhancing their business opportunities.
iv. Case situation: Prepare a basic introduction to computer course for a community
group who has never used computers.
v. Case-situation: You are asked to prepare and submit a proposal for conducting ICT
training for using various office packages that promotes productivity in a legal firm.
What will be the key training outcomes that you will focus on?
101
vi. End-user training is more effective and memorable if you tailor it to your own
organization's use of the software, rather than generic lessons.
A. True
B. False
vii. Blended approach is best for non-native computer users.
A. True
B. False
viii. Blended training approach means:
A. Self-paced training
B. Instructor driven training
C. Both
D. None of the above
4.3.6.5 References
• https://www.sunviewsoftware.com/blog/learn/blog/5-keys-to-end-user-training
• End-User Training (Technological Innovation And Human Resources) authored by Urs E.
Gattiker published by D Gattiker
102
Maintenance procedures are important. This process requires detailed knowledge
of maintenance requirements and the resources that are required in order to perform
maintenance. The resources required include labour, parts, materials, and tool costs.
4.3.7.3 Self-Assessment
i. What is software maintenance?
ii. What is maintenance evaluation?
iii. Software Maintenance includes:
A. Error corrections
B. Enhancements of capabilities
C. Deletion of obsolete capabilities
D. All of the mentioned
iv. Maintenance is classified into how many categories?
A. Two
B. three
C. four
D. five
v. Case situation: You are software developer and you have developed software for one
of your client but you didn’t mention to him that the software needs maintenance to
work perfectly. What are the steps you will consider taking to ensure that client pays
additionally for software maintenance?
vii. __________ in software engineering is the modification of a software product after
delivery to correct faults, to improve performance or other attributes.
A. Software maintenance
B. Maintenance procedure
C. Maintenance reporting
4.3.7.5 References
• https://www.igi-global.com/dictionary/software-evaluation/27677
• http://swebokwiki.org/Chapter_5:_Software_Maintenance
• https://www.tutorialspoint.com/software_engineering/software_maintenance_overview.ht
m
• Software Engineering authored by Sumit Prakash Tayal, Bharat Bhushan Agarwal,
published by Firewall, 2009
103
CHAPTER 5: ICT SECURITY THREATS
5.1 Introduction
This unit covers the competencies required to provide ICT security. They include
identification of security threats, installation of security control measures, implementation of
security measures, testing of system vulnerability and monitoring of the security system.
These are the key learning outcomes, which make up workplace function:
o Identify security threats
o Establish and Install security measures
o Deploy security measures
o Test system vulnerability
o Monitor security system
104
5.3.2.2 Information Sheet
A threat, in the context of computer security, refers to anything that has the potential to
cause serious harm to a computer system. A threat is something that may or may not happen,
but has the potential to cause serious damage. Threats can lead to attacks on computer
systems, networks and more.
For competitive advantage: Developing an effective security system for networks will give
the organization a competitive edge. In the arena of Internet financial services and e-
commerce, network security assumes prime importance. The customers would avail the
services of Internet banking only if the networks are secured.
Fraud and theft have a lot in common. Both are criminal acts, and both are forcibly taking
something from others without asking permission. Both are all about stealing and both are
bad things.
105
Identification of common threats: It is important to identify and appropriately manage
common threats to an organization.
o Employee sabotage: Employees are most familiar with their employer's computers and
applications, this include knowing what actions might cause the most damage, mischief,
or sabotage.
o The loss of supporting infrastructure includes power failures (outages, spikes, and
brownouts), loss of communications, water outages and leaks, sewer problems, lack of
transportation services, fire, flood, civil unrest, and strikes.
o The term malicious hackers, sometimes called crackers, refer to those who break into
computers without authorization. They can include both outsiders and insiders. Much of
the rise of hacker activity is often attributed to increases in connectivity in both
government and industry.
o Malicious code refers to viruses, worms, Trojan horses, logic bombs, and other
"uninvited" software. Sometimes mistakenly associated only with personal computers,
malicious code can attack other platforms.
o Industrial espionage is the act of gathering proprietary data from private companies or
the government for the purpose of aiding another company(ies). Industrial espionage can
be perpetrated either by companies seeking to improve their competitive advantage or by
governments seeking to aid their domestic industries.
User responsibility
o Use computer and information systems in an ethical and legal manner.
o Agree not to duplicate or use copyrighted or proprietary software without proper
authorization.
The challenge of integration between physical and cyber security creates a number of
challenges. First, no single system exists to confirm a person's identity because each
functional security department controls its own identity database. Second, the lack
of integration increases the potential for theft.
106
Case studies - Cyber Crime around the world
It was only stopped when a 22-year-old security researcher from Devon managed to find the
kill switch, after the NHS had been down for a number of days.
107
Source: https://www.nation.co.ke
Figure 61: Cyber crime in Kenya
5.3.2.3 Self-Assessment
i. What is the difference between fraud and theft?
ii. Differentiate internal and external threads?
iii. What is hacking?
iv. What is malicious?
v. Differentiate hacking and cybercrime?
vi. Case situation: One of your friend’s social media accounts has been hacked. What
will you do to help him?
viii. Review various risks associated with computer security and make a detail report on
how to address them.
ix. What are the training contents you will consider for helping community understand
the security treats related to cyber security?
x. Case situation: You at working as a consultant to the Financial Auditing firm. They
want you to evaluate their employee contract and ensure that there are strict rules
against cyber crime. What will be your suggestions? They also want you to improvise
their security. They are a financial audit firm and they need to ensure security of all
their client data.
xi. Which of the following are forms of malicious attack?
A. Theft of information
B. Modification of data
C. Wiping of information
D. All of the mentioned
108
E.
xii. What are common security threats?
A. File Shredding
B. File sharing and permission
C. File corrupting
D. File integrity
xiii. What is not a good practice for user administration ?
A. Isolating a system after a compromise
B. Perform random auditing procedures
C. Granting privileges on a per host basis
D. Using telnet and FTP for remote access.
xiv. Why would a hacker use a proxy server?
A. To create a stronger connection with the target.
B. To create a ghost server on the network.
C. To obtain a remote access connection.
D. To hide malicious activity on the network.
xvi. Conduct secondary analysis and share in group discussion regarding challenges of
data hacking on social media site.
5.3.2.5 References
• https://www.avalan.com/blog/bid/385189/Importance-Of-Network-Security-For-
Business-Organization
• https://www.yourdictionary.com/external-threat
• https://www.coursehero.com/file/11659891/Employee-sabotage/
• http://www.differencebetween.net/miscellaneous/difference-between-fraud-and-
theft/#ixzz5qRVXtQ00
• Cyber Security, authored by John G. Voeller published by Wiley, 2014
109
5.3.3 Learning Outcome 2: Establish and install security measures
Risk is the possibility of something adverse happening. Risk management is the process of
assessing risk, taking steps to reduce risk to an acceptable level and maintaining that level of
risk. Though perhaps not always aware of it, individuals manage risks every day. Actions as
routine as buckling a car safety belt, carrying an umbrella when rain is forecast, or writing
down a list of things to do rather than trusting to memory fall into the purview of risk
management. People recognize various threats to their best interests and take precautions to
guard against them or to minimize their effects.
Risk assessment often produces an important side benefit in depth knowledge about
system and an organization as risk analyst tries to figure out how system and functions are
interrelated. Risk assessment, the process of analyzing and interpreting risk, is comprised of
three basic activities:
Risk mitigation involves the selection and implementation of security controls to reduce risk
110
to a level acceptable to management, within applicable constraints.
Assess
Risk
Risjk
Identify Management Control
Risk Risk
Process
Review
Controls
Source: www.123rf.com
Figure 62: Risk Management Process
Interdependencies: Risk management touches on every control it is, however, most closely
related to life cycle management and the security planning process. The requirement to
perform risk management is often discussed in organizational policy and is an issue for
organizational oversight.
Secure Sockets Layer (SSL) is a standard protocol used for the secure transmission of
documents over a network. Developed by Netscape, SSL technology creates a secure link
between a Web server and browser to ensure private and integral data transmission. SSL uses
Transport Control Protocol (TCP) for communication.
111
Cloud
IaaS
Cloud
VPN apps
MFA
Chared
On- resource
premises
s
Server
login BYOD
Source: www.centrify.com
Figure 63: Multi-factor authentication (MFA)
Malware detection focuses on detecting intrusions by monitoring the activity of systems and
classifying it as normal or anomalous.
• Strange emails
• Files wont open
• Programs acting weird
• Pop-up
Source: thelatesttechnews.com
Figure 64: Malware infection symptoms
Watch: Prevention and detection of malware: https://youtu.be/Ces7UeMQ7ic
Site monitoring is the process of testing and verifying that end-users can interact with a
website or web application as expected. Website monitoring is often used by businesses to
ensure website uptime, performance, and functionality is as expected.
Some common backup frequencies you'll see offered include continuous, once per minute,
every x minutes (e.g. every 15 minutes), hourly, daily, weekly, monthly, and manually.
Continuous backup means that the software is constantly backing up data.
112
Application security encompasses measures taken to improve the security of an application
often by finding, fixing and preventing security vulnerabilities.
5.3.3.3 Self-Assessment
i. What is meant by risk assessment of an organization’s ICT department?
ii. What is SSL?
A. Source socket layer
B. Secure socket lay
C. Socket secure layer
D. Secure socket layer
iii. What is Multi-factor authentication?
iv. What is site monitoring?
v. Evaluation of security control measures is done as per the ICT Security policy in the
lab
vi. Installation of Security control measures is done as per the ICT Security policy in
the lab.
vii. Case situation: How can you help an organization to set multi-factor authentication
when making any changes on their system administration settings?
viii. _____________ is an authentication method in which a computer user is granted
access only after successfully presenting two or more pieces of evidence to support
credibility.
A. Multi-factor authentication
B. Cost
C. Monitoring
5.3.3.5 References
• http://www.davidsalomon.name/CompSec/auxiliary/handbook.pdf
• https://www.keycdn.com/blog/website-monitoring-tools
• Cyber Security, authored by John G. Voeller published by Wiley 2014
113
5.3.4 Learning Outcome 3: Deploy security measures
The network security audit is a process that many managed security service providers
114
(MSSPs) offer to their customers. In this process, the MSSP investigates the customer's cyber
security policies and the assets on the network to identify any deficiencies that put the
customer at risk of a security breach.
5.3.4.3 Self-Assessment
i. What is corrective action?
ii. Define network security audit?
iii. Review the computer lab and prepare a report if it conforms to the ICT Security Act
2018.
iv. Security levels should be _________ to risks involved.
A. Equal
B. Great
C. Appoximate
v. National security of Kenya is govern by ___________ .
A. ICT Authority
B. Police
C. Network of ICT
5.3.4.5 References
• https://www.computerworld.com/article/2572970/10-steps-to-a-successful-security-
policy.html
• https://www.nyu.edu/about/policies-guidelines-compliance/policies-and-guidelines/data-
and-system-security-measures.html
• Cyber Security, authored by John G. Voeller published by Wiley 2014
115
o System vulnerability test report
Computer vulnerability is a cyber security term that refers to a defect in a system that can
leave it open to attack. This vulnerability could also refer to any type of weakness present in a
computer itself, in a set of procedures, or in anything that allows information security to be
exposed to a threat.
A System test schedule includes the testing steps or tasks, the target start and end dates, and
responsibilities. It should also describe how the test will be reviewed, tracked, and approved.
Ethical penetration is a broader term that includes all hacking methods, and other related
cyber attack methods. The goal of ethical hacking is still to identify vulnerabilities and fix
them before criminals can exploit them, but the approach is much wider in scope than simple
testing. In other words, ethical hacking is more of an umbrella term, while penetration testing
represents one subset of all ethical hacking techniques.
5.3.5.3 Self-Assessment
i. What is ethical penetration?
ii. Define computer vulnerability.
iii. Explain level system vulnerability.
iv. Identify the vulnerability levels of a system. Prepare a case study using an example.
v. Prepare report at a worksite on the security system on their computers and network.
vi. _______ is a broader term that includes all hacking methods, and other related cyber
attack methods.
A. Vulnerability
B. Ethical penetration
C. A System test schedule
vii. When is it better to perform a vulnerability assessment versus a penetration test?
A. It is necessary to perform them together
B. When you seek a larger overview of the environment, versus a smaller view
C. Penetration tests are full of false positives and should not be used
116
D. Penetration tests are potentially damaging to devices and should not be used
viii. ___________ is a weakness that can be exploited by attackers.
A. System with virus
B. System without firewall
C. System with vulnerabilities
D. System with strong password
5.3.5.5 References
• https://www.hudsoncourses.com/ethical-hacker-vs-penetration-tester/
• https://www.atlassian.com/trust/security/security-severity-levels
• Cyber Security, authored by John G. Voeller published by Wiley 2014
Given the ubiquitous, unavoidable nature of security risks, quick response time is essential to
maintaining system security and automated, continuous security monitoring is the key to
quick threat detection and response. Monitoring criteria should be for hackers and malware,
to disgruntled or careless employees, to outdated or otherwise vulnerable devices and
operating systems, to mobile and public cloud computing, to third-party service providers.
117
o Acquisition: Provides customers a standard for specifying acquisition requirements and
identifying systems that meet those requirements.
o Security policy: The rules and procedures by which a trusted system operates.
o Discretionary access control (DAC): Owners of objects are able to assign permissions
to other subjects.
o Mandatory access control (MAC): Permissions to objects are managed centrally by an
administrator.
o Object reuse: Protects confidentiality of objects that are reassigned after initial use. For
example, a deleted file still exists on storage media; only the file allocation table (FAT)
and first character of the file have been modified. Thus residual data may be restored,
which describes the problem of data remanence. Object-reuse requirements define
procedures for actually erasing the data.
o Labels: Sensitivity labels are required in MAC-based systems.
o Assurance: Guarantees that a security policy is correctly implemented.
o System integrity: Hardware and firmware operate properly and are tested to verify
proper operation.
o Updating and overhauling of Security systems : When a company needs new data
security practices, an external viewpoint can prove invaluable. Remember, a data security
auditor has experience helping many different kinds of companies find what they need to
change, and that experience can prove invaluable in creating the right kind of overhaul
plan. Third party intervention provided broader view of the problem at hand for an
organization.
5.3.6.3 Self-Assessment
i. Define monitoring criteria?
ii. Explain evaluation of system security?
iii. What is overhauling of security?
iv. _______ identifies standard security requirements that vendors must build into
systems to achieve a given trust level.
A. System integrity
B. Assurance
C. Guidance
D. Acquisition
v. _____Hardware and firmware operate properly and are tested to verify proper
operation.
A. System integrity
B. System architecture
C. Covert channel analysis
vi. ______ provides a metric for assessing comparative levels of trust between different
computer systems.
A. Guidance
118
B. Measurement
C. Security policy
D. Monitoring criteria
vii. You are a Network security administrator and your company. Your company has been
attacked by hackers, how will you identify what sort of information have been
hacked?
viii. You are an ICT manager of a hotel. The General Manager of your hotel called you
this afternoon, since he is having difficulty in accessing past customer details. The
files are randomly opening and there is gibberish. What are the possibilities that
customer data have been hack? What are your suggestion actions?
5.3.6.5 References
• https://www.dummies.com/programming/certification/evaluation-criteria-systems-
security-controls/
• https://www.infiniwiz.com/planning-a-security-overhaul-here-are-key-tips-on-how-to-
start/
• https://pdfs.semanticscholar.org/45a2/775770d870b8675fb1301919224c9bcb7361.pdf
• Cyber Security, authored by John G. Voeller published by Wiley 2014
119
CHAPTER 6: ICT SYSTEM SUPPORT
6.1 Introduction
This unit describes the competencies required to perform ICT infrastructure support. It
involves identification and documentation of ICT infrastructure, evaluation of the state of
performance and possible causes of failure, diagnosing and fixing of the problems, testing of
performance and user training.
These are the key learning outcomes, which make up workplace function:
o Identify and document ICT infrastructure
o Evaluate the state of performance and possible causes of failures
o Diagnose and fix problems
o Test component performance
o Perform User training
120
o Types of ICT infrastructure: Computer hardware platforms, Operating system platforms,
Enterprise and other software applications, Data management and storage, Networking
and Telecommunications platforms, Internet platforms, End users
o Safety precautions of ICT Infrastructure
o Documentation of Infrastructure assets and their operational and service status
The ICT Infrastructure that is currently used in the business constitutes all the information
and communications technology and other systems infrastructure reasonably necessary to
carry on the business, including having sufficient capacity and maintenance and support
requirements to satisfy the requirements of the business with regard to information and
communications technology, data processing and communications.
A computer platform is a system that consists of a hardware device and an operating system
that an application, program or process runs upon. An example of a computer platform is a
desktop computer with Microsoft Windows installed on it. A desktop is a hardware device
and Windows is an operating system.
In the same way generally an operating system acts as an interface between hardware and
the user in IT, a platform is any hardware or software used to host an application or service.
Data management is a critical component of any business strategy as companies of all sizes
and types struggle with data growth, data storage costs, data protection (through replication,
121
snapshots or backups) and long-term data storage capacity to meet growing business
demands.
An end user is the person that a software program or hardware device is designed for. The
term is based on the idea that the "end goal" of a software or hardware product is to be useful
to the consumer. The end user can be contrasted with the developers or programmers of the
product. End users are also in a separate group from the installers or administrators of the
product.
It is important to educate users regarding the negative impacts of using computers for long
duration and the harmful effects of sedentary lifestyle. A lot of time users forget to
appropriately use ICT tools. These can be easily addressed through ergonomics (workplace
furniture and set up) and lifestyle changes.
122
Source: http://ergonomictrends.com
Figure 65: Sitting ergonomic
6.3.2.3 Self-Assessment
i. What is ICT Infrastructure?
ii. Differentiate between operating system and platform.
iii. Who are end-users?
iv. What is Internet platform?
v. What is enterprise software?
vi. Case situation: You are School Network Administrator currently your network
device support 50 students, by next year, the total number of student will be 200.
What type of network infrastructure will you suggest? Prepare a budget plan for full
network solution and seamless ICT education for all students.
vii. Prepare an awareness-training program for proper use of ICT devices for your
institution or company.
viii. How do you sit ergonomically on your computer desk?
A. Bending your back
B. Your head closer enough to your screen
C. Your legs on the desk
123
D. Sitting ergonomically
ix. _______ is a big network, which is formed by connecting multiple small networks.
A. Internet
B. Computer
C. Telephone
x. ________ acts as an interface between hardware and the user.
A. Operating system
B. Platform
C. Network
D. Computer
6.3.2.5 References
• https://www.advance-africa.com/health-and-safety-using-ict-tools.html
• https://searchservervirtualization.techtarget.com/definition/platform
• https://www.lawinsider.com/dictionary/ict-infrastructure
• ICT Infrastructure Management authored Office of Government Commerce published by
6.3.3 Learning Outcome 2: Evaluate the state of performance and possible causes of
failures
Troubleshooting is a systematic approach to problem solving that is often used to find and
correct issues with complex machines, electronics, computers and software systems.
124
There are many different things that could cause a problem with your computer. No matter
what's causing the issue, troubleshooting will always be a process of trial and error—in some
cases, you may need to use several different approaches before you can find a solution; other
problems may be easy to fix. We recommend starting by using the following tips.
o Write down your steps: Once you start troubleshooting, you may want to write down
each step you take. This way, you'll be able to remember exactly what you've done and
can avoid repeating the same mistakes. If you end up asking other people for help, it will
be much easier if they know exactly what you've tried already.
o Take notes about error messages: If your computer gives you an error message, be sure
to write down as much information as possible. You may be able to use this information
later to find out if other people are having the same error.
o Always check the cables: If you're having trouble with a specific piece of computer
hardware, such as your monitor or keyboard, an easy first step is to check all related
cables to make sure they're properly connected.
o Restart the computer: When all else fails, restarting the computer is a good thing to try.
This can solve a lot of basic issues you may experience with your computer.
Now that you have a basic understanding of what the issue is all about, you can look into
technical details that could point you toward to a solution.
125
Step 2: Gather more details, eliminate variables
In many instances, what was reported as a general issue (e.g., the Internet is down) is actually
something very particular, such as a specific website being offline. Best way to find out? Ask
those pertinent questions and then dig up more info from various sources such as:
• Error messages: If the user reports one or you’re present to check for one, they can point
you in the right direction as to why a failure occurred. For example, Windows blue
screens of death provide a relevant error code that’ll give you a good sense of what
caused a failure.
• Events logs: Do they exist, and if so, what exactly do they say? In addition to error
messages, logs often provide a timestamp so you can answer the question of when exactly
events happened. Checking the Windows event viewer can be a first step in pointing you
towards any relevant logs.
• Can the user provide screenshots, video, or other supporting information that can help
assist in the troubleshooting process?
• Diagnostics results: Have you run system utilities to get even more information? For
example: ping can help you remotely check if a server or website in question is reachable.
Additionally, the Windows memory diagnostic can check for faulty memory, the resource
monitor or performance monitor can check for unusually high CPU or memory usage,
and a disk check can examine your hard drives for errors.
• Monitoring: Do you have any 3rd party tools that can offer more clues or predict issues
before they occur? A network monitoring solution like company provides preemptive
alerts and warnings about servers at risk of going down. And a network inventory
application can provide vital statistics on dozens or hundreds of systems such as disk
space, available memory, OS installed, and software running on the devices in question.
126
Step 4: Attempt a fix based on findings
The evidence you’ve already gathered should have narrowed down possible root causes and
positioned you to fix the issue. You can try tweaking changing settings related to the
problem, swapping out faulty parts, repairing corrupted files, updating drivers and software,
etc. until you solve the problem (or at least get closer).
While every issue is like a unique, a significant number of issues can be resolved through
common troubleshooting steps like rebooting the problematic machine, checking for DNS
and DHCP issues, checking the device manager for driver issues, cleaning up a machine, or
checking firewall or proxy settings, etc.
For issues that are tougher, if your own experimentation and Google searches don’t result in a
satisfactory result, browsing discussions online IT forums can be extremely helpful for fixing
PC issues.
Problem Solved? Prepare for future issues. No matter what the underlying tech problems
are (networks issues, driver conflicts, disk problems, etc.), the process outlined above works
well for gathering info, identifying possible causes of the issue, and getting to a solution no
matter what issue you’re dealing with. But you’ll still have to make judgment calls depending
on each unique case.
With this sort of system in place, and knowledge learned working through previous computer
problems, you’ll be able to knock out computer problems more efficiently as you gain more
experience. And to be proactive in avoiding future crises, perhaps you can document issues
so they can be referred to by anyone who encounters similar challenges down the line.
Unstable power sources are a common challenge for devices in remote and extreme
environments. This can severely affect solid-state drive (SSD) operation. Instability during
start-up and shutdown can cause system crashes and restarting issues.
Machine fault diagnosis is a field of mechanical engineering concerned with finding faults
arising in machines. A particularly well-developed part of it applies specifically to rotating
machinery, one of the most common types encountered.
A natural disaster is a major adverse event resulting from natural processes of the Earth;
examples are floods, hurricanes, tornadoes, volcanic eruptions, earthquakes, tsunamis, and
other geologic processes.
Dust in a computer can cause a variety of heat-related issues. Dust that collects on
127
components, such as memory modules, insulates them, preventing the air from the computer's
fans from drawing the heat away.
Ventilation is the intentional introduction of outdoor air into a space and is mainly used to
control indoor air quality by diluting and displacing indoor pollutants; it can also be used for
purposes of thermal comfort or dehumidification.
Lack of Maintenance Processes is maintenance operations are the backbone of every heavy
industry company. Almost every major industrial disaster can be tracked back to a root cause
of a clear lack of maintenance protocol or adherence to maintenance practices.
6.3.3.3 Self-Assessment
i. Define malicious damage.
ii. What is natural disaster?
iii. What is troubleshooting?
iv. How does dust affect your computer performance?
v. Case situation: You are IT technician, a user save file on desktop after some minutes
file become shortcuts how will you resolve the problem?.
vi. Identify the steps to solve problems for a client over a call. What are the options you
have to sort the problem without travelling to your client location? Tips! Use online
tools to have a deeper look.
vii. A technician arrives and asks a customer, "Can you describe the problem?" The
customer replies, "All email messages that I send have the wrong date. I have
restarted the computer several times, but this does not seem to help." What could be
the problem?
A. The CMOS battery has failed
B. The hard drive is beginning to fail
C. The MBR is corrupted
D. The CPU voltage is set too low
viii. Several times during the last few days, a user has experienced the Blue Screen of
Death when plugging an external hard drive into a laptop via USB. What is a possible
solution for this problem?
A. Upgrade the operating system.
B. Research the boot error beep code to identify the source of the error.
C. Research the STOP error and the name of the module that produced the error.
D. Reinstall the operating system
ix. A PC is not able to connect to a wired network. Pinging the loopback address is
successful, but the gateway cannot be reached. On the network switch all the interface
128
lights are on, except for the interface connected to the PC. The LED on the network
card is off. What is the most likely cause of this problem?
x. A computer repeatedly locks without any error message. Which two conditions may
be the cause of the problem? (Choose two.)
A. The index service is not running.
B. The computer has a virus.
C. An update has corrupted the operating system.
D. The UAC has been turned off.
E. The user has breached the user security policy.
F. The CPU needs to be upgraded
6.3.3.5 References
• https://whatis.techtarget.com/definition/troubleshooting
• https://www.haploos.com/home/industry-issues/maintenance/
• ICT Infrastructure Management authored Office of Government Commerce
• Failure-Tolerant Computer Design authored by William H. Pierce published Academic
Press, 2014
129
6.3.4.2 Information Sheet
Diagnostic terms means identification of a condition, disease, disorder, or problem by
systematic analysis of the background or history, examination of the signs or symptoms,
evaluation of the research or test results, and investigation of the assumed or probable causes.
Effective prognosis is not possible without effective diagnosis.
Tools are available to help you diagnose and solve hardware-related problems.
Power-on self-test (POST), progress codes (checkpoints), error codes, and isolation
procedures: The POST checks out the hardware at system initialization. IPL diagnostic
functions test some system components and interconnections. The POST generates eight-digit
checkpoints to mark the progress of powering up the blade server.
Light path diagnostics: Use the light path diagnostic LEDs on the system board to identify
failing hardware. If the system error LED on the system LED panel on the front or rear of the
BladeCenter unit is lit, one or more error LEDs on the BladeCenter unit components also
might be lit.
Troubleshooting tables: Use the troubleshooting tables to find solutions to problems that
have identifiable symptoms.
Dump data collection: In some circumstances, an error might require a dump to show more
data. The Integrated Virtualization Manager (IVM) or Hardware Management
Console (HMC) sets up a dump area. Specific IVM or HMC information is included as part
of the information that can optionally be sent to IBM® support for analysis.
Internet connection problems can be frustrating. Ensure you check the physical connections
before getting too involved with troubleshooting. Someone could have accidentally kicked
130
the router or modem’s power cable or pulled an Ethernet cable out of a socket, causing the
problem.
As the ICT department tries to meet the needs of the workforce, it also needs to
develop policies to ensure the acceptable uses of ICTs within the organization. Developing
an ICT policy for an organization is as important as having any other policy within
the organization.
Read: https://www.liberianobserver.com/columns/technology/develop-an-ict-policy-within-
your-organization-a-repeat/
6.3.4.3 Self-Assessment
i. Identify different kinds of diagnostic tools available.
ii. What is hardware troubleshooting?
iii. What is troubleshooting?
iv. How to fix Internet problem?
v. Case situation: In a network that contains two servers and twenty workstations,
where is the best place to install an anti-virus program?
vi. Prepare an ICT policy for a firm of 20 employees.
vii. A laptop that is running Windows 10 displays "Missing NTLDR" after the POST.
What are the two most probable reasons for this problem? (Choose two.)
A. There is a conflict with a newly installed device.
B. The index service is not indexing in the correct locations.
C. Boot.ini is missing or damaged.
D. The boot order is not set correctly in the BIOS.
E. BOOTMGR has been corrupted
viii. _____ can help with troubleshooting because it can help you eliminate the simplest
possible causes of a computer problem.
A. The KISS (Keep it simple and straightforward) principle
B. An owner's manual
C. A call to tech support
D. A call to a help desk
ix. John sets up a new Window 10 Professional PC for his client in an insecure,
networked environment. What's the first step for making the data safe?
A. Make sure the user shuts the machine off every night.
B. Require the user to log in with a password
C. Require the user to log in with a password composed of alphanumeric characters
D. Nothing, anybody with a external disk can access the data on the PC
x. Which utility is useful in identifying a program that is hogging the processor?
A. Task Manager
B. Device Manager
C. System Monitor
D. System Information
131
6.3.4.4 Tools, Equipment, Supplies and Materials
Protocol analyzer, Toner probe, Punch down tool, Cable tester, SolarWinds Security Event
Manager
6.3.4.5 References
• http://www.businessdictionary.com/definition/diagnosis.html
• https://www.ibm.com/support/knowledgecenter/en/HW235/ps701_r_diagnostics_tools.ht
ml
• https://www.howtogeek.com/126265/how-to-troubleshoot-internet-connection-problems/
• https://www.ibm.com/support/knowledgecenter/en/SS63NW_9.1.0/com.ibm.tivoli.tem.do
c_9.1/SUA_9.1/com.ibm.license.mgmt.doc/probdet/r_ui_problems.html
• Troubleshooting and Maintaining Your PC All-in-One For Dummies authored by Dan
Gookin published by For Dummies; 2nd edition
132
Record usr Parameterize Group User
scenario Test Script Scenarios
Reports
Source: stackify.com
Figure 66: Performance Testing Process
Below are some tools, which technicians use to troubleshoot a windows PC. These tools are
useful in diagnosing a PC to find out the exact issue.
Process Explorer: Process Explorer is a small utility available for free. It can help to find out
the files and directory opened by a program. If you need information that - what file or folder
is using a process then this tool is very helpful. It is useful to track the DLL version problems
or handle leaks.
133
Source: www.downloadcrew.com
Figure 67: Windows Systeminternals suite
HWiNFO: Popular and award winning hwinfo is a free software utility for
hardware monitoring and reporting with detailed analysis. It can generate reports and log files
in XML, CSV and HTML Formats. It alerts about the system health by real time monitoring.
Customized tables and graphs option.
Hddscan It is a disk drive diagnostic tool. HDDScan is available free to download. It can
check storage devices including USB drive for bad sectors.
File database can help to find out the suspicious files, system resources detailed graphs, WMI
browser and more.
System Explorer: It is also a free software tool to get the detailed system information. It is
an award winning software, which can explore the internal system and processes running in
the computer such as - get details about tasks, processes services, drivers and opened files.
134
Source: http://www.rohitab.com
Figure 68: System explorer
6.3.5.3 Self-Assessment
i. How to perform software test?
ii. Explain performance analysis?
iii. Which of the following is NOT a static testing technique?
A. Error guessing
B. Walkthrough
C. Data flow analysis
D. Inspections
vi. Identify tech support tools for system diagnosis. Prepare a list and mention their
benefits.
v. ________ is a disk drive diagnostic tool.
A. Hddscan
B. Flash disk
C. CD-ROM
vi. _________ is a small utility available for free. It can help to find out the files and
directory opened by a program.
A. Mozilla firefox
B. Process Explorer
C. Internet
vii. What is NDT?
A. Network Diagram Tools
B. Network Diagnostic Tool
C. Network Data test
135
6.3.5.4 Tools, Equipment, Supplies and Materials
Ranorex, TestComplete, Tosca Testsuite, TestingWhiz, Windows Sysinternals Suite, System
Explorer.
6.3.5.5 References
• https://www.techsupportall.com/10-best-computer-diagnostic-tools-technicians/
• Troubleshooting and Maintaining Your PC All-in-One For Dummies authored by Dan
Gookin published by For Dummies; 2 edition 2011
The creation of a training plan is one element within the training process of a software
organisation. The model has four components:
o (E) entry criteria : Management support, Training policy and objectives, Resources,
Organizational context
o (T) tasks: Conducting training needs analysis, Create training plan, Design curriculum,
Create training products, Pilot and deliver training, Evaluate training
o (V) validation tasks or criteria: Training plan approved, course development and delivery
processes followed, Quality standards me, Training results analyzed and reported
o (X) exit criteria: Needed training delivered, Training objective met
136
6.3.6.3 Self-Assessment
i. Why is user training important?
ii. What are the approaches for training end-users?
iii. What is importance of support after software installation? What are the kinds of
support provided by some of the key software companies?
iv. Case situation: Prepare a software-training plan for an organization for using basics
of Microsoft Excel for documenting research data.
v. _______ end-user training is more effective and memorable if you tailor it to your
own organization's use of the software, rather than generic lessons.
A. Creating a training program
B. Setting training
C. All are true
vi. Determine set skill is training program scalable a scalable training program is flexible
enough to accommodate both small numbers of users
A. True
B. False
vii. Now-a-days there is a number of online application for bodaboda drivers. The
bodaboda drivers are new users of technology for transportation logistics. Mobile
application companies are training the bodaboda drivers on using the app effectively.
Is it an example of user-training?
A. Yes
B. No
C. I don't know
6.3.6.5 References
• https://www.princeton.edu/~pshrsys/Implementation%20Plan/Strategies/EndUserTrainin
g.html
• http://www.namtek.ca/the-importance-of-user-training-during-software-implementation/
• End-User Training (Technological Innovation And Human Resources) authored by Urs E.
Gattiker published by D Gattiker
137
CHAPTER 7: WEBSITE DESIGN
7.1 Introduction
This unit specifies competencies required Design a Website. It involves gathering data
required, determining website design tool, developing functional website, host website
developed and perform website routine maintenance.
These are the key learning outcomes, which make up workplace function:
o Gather data required
o Determine Website design tool
o Develop functional website
o Host Website developed
o Perform Website Routine Maintenance
138
7.3.2.2 Information Sheet
The Web is the common name for the World Wide Web, a subset of the Internet consisting
of the pages that can be accessed by a Web browser. Many people assume that the Web is the
same as the Internet, and use these terms interchangeably. However, the term Internet
actually refers to the global network of servers that makes the information sharing that
happens over the Web possible. So, although the Web does make up a large portion of the
Internet, but they are not one and same.
A website or web site is a collection of related network web resources, such as web pages,
multimedia content, which are typically identified with a common domain name, and
published on at least one web server. Notable examples are wikipedia.org, google.com, and
amazon.com.
Websites can be accessed via a public Internet Protocol (IP) network, such as the Internet, or
a private local area network (LAN), by a uniform resource locator (URL) that identifies the
site.
Websites can have many functions and can be used in various fashions; a website can be a
personal website, a corporate website for a company, a government website, an organization
website, etc. Websites are typically dedicated to a particular topic or purpose, ranging from
entertainment and social networking to providing news and education. All publicly accessible
websites collectively constitute the World Wide Web, while private websites, such as a
company's website for its employees, are typically part of an intranet.
Web pages, which are the building blocks of websites, are documents, typically composed in
plain text interspersed with formatting instructions of Hypertext Markup Language (HTML,
XHTML). They may incorporate elements from other websites with suitable markup anchors.
Web pages are accessed and transported with the Hypertext Transfer Protocol (HTTP), which
may optionally employ encryption (HTTP Secure, HTTPS) to provide security and privacy
for the user. The user's application, often a web browser, renders the page content according
to its HTML markup instructions onto a display terminal.
Hyperlinking between web pages conveys to the reader the site structure and guides the
navigation of the site, which often starts with a home page containing a directory of the site
web content. Some websites require user registration or subscription to access content.
Examples of subscription websites include many business sites, news websites, academic
journal websites, gaming websites, file-sharing websites, message boards, web-based email,
social networking websites, websites providing real-time stock market data, as well as sites
providing various other services. End users can access websites on a range of devices,
including desktop and laptop computers, tablet computers, smartphones and smart TVs.
139
Here are the top 10 importance of having a Website:
Types of websites: There are many varieties of websites, each specializing in a particular
type of content or use, and they may be arbitrarily classified in any number of ways. A few
such classifications might include:
o Classified
o Community site
o Corporate website
o Government website
o Personal website
o eCommerce
o Social media
140
Some websites may be included in one or more of these categories. For example, a business
website may promote the business's products, but may also host informative documents, such
as white papers.
A static website is one that has web pages stored on the server in the format that is sent to a
client web browser. It is primarily coded in Hypertext Markup Language (HTML); Cascading
Style Sheets (CSS) are used to control appearance beyond basic HTML. Images are
commonly used to effect the desired appearance and as part of the main content. Audio or
video might also be considered "static" content if it plays automatically or is generally non-
interactive. This type of website usually displays the same information to all visitors. Similar
to handing out a printed brochure to customers or clients, a static website will generally
provide consistent, standard information for an extended period of time. Although the
website owner may make updates periodically, it is a manual process to edit the text, photos
and other content and may require basic website design skills and software. Simple forms or
marketing examples of websites, such as classic website, a five-page website or a brochure
website are often static websites, because they present pre-defined, static information to the
user. This may include information about a company and its products and services through
text, photos, animations, audio/video, and navigation menus.
A dynamic website is one that changes or customizes itself frequently and automatically.
Server-side dynamic pages are generated "on the fly" by computer code that produces the
HTML (CSS are responsible for appearance and thus, are static files). There are a wide range
of software systems, such as CGI, Java Servlets and Java Server Pages (JSP), Active Server
Pages and ColdFusion (CFML) that are available to generate dynamic web systems and
dynamic sites. Various web application frameworks and web template systems are available
for general-use programming languages like Perl, PHP, Python and Ruby to make it faster
and easier to create complex dynamic websites.
A site can display the current state of a dialogue between users, monitor a changing situation,
or provide information in some way personalized to the requirements of the individual user.
For example, when the front page of a news site is requested, the code running on the web
server might combine stored HTML fragments with news stories retrieved from a database or
another website via RSS to produce a page that includes the latest information. Dynamic sites
can be interactive by using HTML forms, storing and reading back browser cookies, or by
creating a series of pages that reflect the previous history of clicks. Another example of
dynamic content is when a retail website with a database of media products allows a user to
input a search request, e.g. for the keyword Beatles. In response, the content of the web page
will spontaneously change the way it looked before, and will then display a list of Beatles
products like CDs, DVDs and books. Dynamic HTML uses JavaScript code to instruct the
web browser how to interactively modify the page contents. One-way to simulate a certain
type of dynamic website while avoiding the performance loss of initiating the dynamic
engine on a per-user or per-connection basis, is to periodically automatically regenerate a
large series of static pages.
141
Early websites had only text, and soon after, images. Web browser plug ins were then used to
add audio, video, and interactivity (such as for a rich Internet application that mirrors the
complexity of a desktop application like a word processor). Examples of such plug-ins are
Microsoft Silverlight, Adobe Flash, Adobe Shockwave, and applets written in Java. HTML 5
includes provisions for audio and video without plugins. JavaScript is also built into most
modern web browsers, and allows for website creators to send code to the web browser that
instructs it how to interactively modify page content and communicate with the web server if
needed. The browser's internal representation of the content is known as the Document
Object Model (DOM) and the technique is known as Dynamic HTML.
WebGL (Web Graphics Library) is a modern JavaScript API for rendering interactive 3D
graphics without the use of plug-ins. It allows interactive content such as 3D animations,
visualizations and video explainers to presented users in the most intuitive way.
A 2010-era trend in websites called "responsive design" has given the best of viewing
experience as it provides with a device based layout for users. These websites change their
layout according to the device or mobile platform thus giving a rich user experience.
Domain Name
Business Email Address
Website Building Software
Website Hosting
Website Template Design
Logo Design
High-Quality Images for Website
Image Editors
Google Analytics
Web programming refers to the writing, markup and coding involved in Web development,
which includes Web content, Web client and server scripting and network security. The most
common languages used for Web programming are XML, HTML, JavaScript, Perl 5 and
PHP. Web programming is different from just programming, which requires interdisciplinary
knowledge on the application area, client and server scripting, and database technology.
142
7.3.2.3 Self-Assessment
i. Define website?
ii. What is web programming?
iii. Explain briefly importance of website?
iv. What are requirements of website?
v. What are types of website?
vi. Case situation: You are asked by a women SACCO to prepare their website. What
information do you need from your client? How you will help them share the details
with you?
vii. Which one of the following is an example of a web browser?
A. Google
B. Frontpage
C. Internet Explorer
viii. What is a CMS in web design?
A. Content Management System
B. Creative Management System
C. Content Mixing System
D. Creatives Managerial System
ix. To make your website mobile friendly, you can make your website
A. Responsive
B. Reactive
C. Fast Loading
D. Light
x. What does CSS stand for?
A. Current Style Sheets
B. Current Sheets Style
C. Cascading Style Sheets
D. Cascading Sheets Style
7.3.2.5 References
• https://www.nirvanacanada.com/businessonline/top-10-benefits-of-having-a-website/
• https://en.wikipedia.org/wiki/Web_design
• Web Design For Dummies (3rd edition), authored by Lisa Lopuck, published by Wiley,
(2012)
• The Principles of Beautiful Web Design Second Edition (2nd edition), authored by Jason
Beaird published by SitePoint
143
7.3.3 Learning Outcome 2: Determine website design tool
List of website authoring tools include - Word Processors, HTML Editors, Plain Text
Editors, Photoshop, Dreamweaver, Firefox developer. Word processors like Microsoft Word,
WordPerfect or OpenOffice Writer are some of the most popular web authoring tools
available. Users can create a Web page just as they would a printable document and then save
it in HTML format, creating a quick and easy web page. Because users are usually familiar
with the word processor on their computers, creating HTML pages with the same program
represents a low learning curve. These usually present content in a what you see is what you
get format, or WYSIWYG, meaning how the page appears on the screen is how it will appear
when it's online.
Desktop publishing programs, like Adobe InDesign and Scribus are designed for producing
material like newspapers, magazines, books and Web pages. Like word processors, desktop
publishing programs provide a WYSIWYG interface. Their advanced Web authoring options,
such as page layout and style elements, give users more control over the page's appearance.
These programs also support multimedia objects, like images, graphics or audio files.
Completed pages can be converted to both HTML and CSS files.
Website hosting sites usually offer their customers many web-authoring tool options to create
and maintain their web pages online. Tools can include Web page builders, shopping
systems, audio/visual editors and domain options. The builders incorporate many web
authoring tools, including word processing, graphic editing, templates and layout schemes.
Webpage builders have two main editing options: HTML or a non-HTML interface. Users
who have limited HTML knowledge can use the non-HTML interface to drop and drag items
to create layouts and use the text option to type in content.
144
HTML editing programs like Adobe Dreamweaver are some of the most powerful web
authoring tools available. They are generally used by professional Web designers to create
commercial websites. Most HTML editors are similar to web-page builders in offering users
HTML or non-HTML interfaces. The non-HTML interface allows the user to see how the
web page will look when it is uploaded to the Internet. HTML editors are used to type raw
code, much as one would in a plain text document like a word processor, including HTML,
CSS, JavaScript or XML. Most of the work is performed using a built-in text editor. HTML
editors feature HTML validation checkers that will run through a webpage and check for
markup errors and accessibility validation issues.
Basic text editors like Notepad are also a useful Web authoring tool for those familiar with
the code. Unlike word processors or desktop publishing programs, plain text editors do not
apply additional code to what appears in the document. Plain text editors are also useful for
quickly making edits to completed pages that require updates.
Web authoring is the practice of creating web documents using modern web
authoring software and tools. Web authoring software is a type of desktop
publishing tool that allows users to navigate the tricky environment of HTML and webcoding
by offering a different kind of graphical user interface.
There are many ecommerce tools and technologies required to build an e-commerce store and
operate a successful online business. Both software and hardware technologies must be
included in the e-business plan.
Web Server: A web server is used to host an e-commerce website. All the Html, JavaScript,
PHP files, databases, media files that make up the entire website are stored on this server.
The web server runs on Windows or Linux operating system. Managing a web server is a
very specific job. The website development companies host the site on their own web server
or pay a hosting company to provide space on a secure web server.
Server Software: When a user visits any website on a web browser, the web server knows
the client is requesting some specific information. So it processes that request and serves the
correct files to the client. The web browser then displays these files to the user.
145
There are many types of server software available including application software, database
server, file server software, and cloud computing software. The popular web server software
includes Apache and Windows IIS. Server software can either use on a physical server or on
a virtual / cloud server.
Web Tools: A web authoring tool is used to create the front end of an e-commerce website.
They range from basic HTML text editors (like Notepad++) to more complex graphic
authoring tools and CMS (content management system) with built-in frameworks and
debugging tools. Html files are created by Dreamweaver along with the CSS (cascading style
sheet) which enhance the visual appearance of the site. Another web authoring tool would be
Visual Studio .net that can be used to make the sites which have integrated databases in it.
Graphic design packages are also web authoring tools which design the skin for a user
interface.
Networking: TCP (transfer control protocol) and IP (internet protocol) defines as how
computers should connect with each other through the internet and how they share
information. Common TCP/IP protocols are HTTPS, HTTP, and FTP. We use these
protocols to access the website without even realizing it. FTP (file transfer protocol) used to
download files from a browser. HTTPS (where the “S” stands for security) responsible for
the secure communication between a server and a browser like an account information or
personal information. For an e-commerce website or online store, it is considered essential to
provide a secure connection. SSL (secure sockets layer) and TLS (transport layer security)
are the protocols associated with trust and security of any e-commerce website.
The Tip: To analyze website traffics, use tools like Google Analytics to get an idea as what
browsers people are using and which one is the most popular.
146
Ports: Ports allow one device to connect with the other through a different and unique IP
address. A device can have more than one port.
Port 25 (SMTP) is usually reserved for email. It is used to transmit data from remote email
servers. If that port is blocked no emails can be sent. Some other common port numbers are
80(HTTP), 443 (HTTPS), 21 (FTP), 22 (SSH). Firewalls can often block a port to tighten the
security.
Here is a quick recap that will help you put everything into place.
7.3.3.3 Self-Assessment
i. What is web authoring?
ii. Shortlist website authoring tools for preparing a webpage.
iii. Which of the following software is used for web designing?
A. MS Word
B. Frontpage
C. Powerpoint
iv. What is the Homepage called in FrontPage when you design a website?
A. Content.htm
B. Index.htm
C. Glossary.htm
7.3.3.5 References
• https://www.webfx.com/blog/web-design/top-five-web-design-tools/
• https://developer.mozilla.org/en-
US/docs/Learn/Getting_started_with_the_web/Installing_basic_software
• https://www.arpatech.com/blog/technologies-required-for-ecommerce-store/
147
7.3.4 Learning Outcome 3: Develop functional website
HTML Formatting is a process of formatting text for better look and feel. HTML provides
us ability to format text without using CSS. There are many formatting tags in HTML. These
tags are used to make text bold <b>Bold Text</b>, italicized <i>Italic Text</i> , or
underlined <u>Underline Text</u>,.
The <a> tag defines a hyperlink, which is used to link from one page to another. The most
important attribute of the <a> element is the href attribute, which indicates the link's
destination. By default, links will appear as follows in all browsers: An unvisited link is
underlined and blue.
A table is defined using the <table> element, and contains a number of table cells (<td>, for
“table data”) which are organized into table rows ( <tr>).
<Frame> Tag. HTML Frames are used to divide the web browser window into multiple
sections where each section can be loaded separately. A frameset tag is the collection
of frames in the browser window.
Creating Frames: Instead of using body tag, use frameset tag in HTML to use frames in web
browser.
148
The HTML <form> tag is used for creating a form for user input.
An unordered list is a collection of related items that have no special order or sequence.
Using HTML <ul> tag creates this list. Each item in the list is marked with a bullet.
JavaScript statements are composed of: Values, Operators, Expressions, Keywords, and
Comments. JavaScript variables are loosely typed which means it does not require a data
type to be declared. You can assign any type of literal values to a variable e.g. string, integer,
float, Boolean etc.
JavaScript operators are used to assign values, compare values, perform arithmetic
operations, and more.
In JavaScript (JS) there are two different kinds of data: primitives, and objects. A primitive
is simply a data type that is not an object, and has no methods. In JS, there are six
primitive data types: Boolean, Number, String, Null, Undefined, Symbol.
Often, when events happen, you may want to do something. JavaScript lets you execute
code when events are detected. HTML allows event handler attributes,
with JavaScript code, to be added to HTML elements.
The String() function converts the value of an object to a string. Note: The String() function
returns the same value as to String() of the individual objects.
JavaScript Numbers are always 64-bit floating point. Unlike many other programming
languages, JavaScript does not define different types of numbers, like integers, short, long,
floating-point etc. The Array in JavaScript is a global object, which contains a list of items.
PHP Programming the Languages mostly commonly used for Website and Web Application
Development. PHP is a general purpose, server-side scripting language run a web server
that's designed to make dynamic pages and applications.
The PHP syntax and semantics are the format and the related meanings of the text and
149
symbols in the PHP programming language. They form a set of rules that define how a PHP
program can be written and interpreted.
Variables are used to store data, like string of text, numbers, etc. Variable values can change
over the course of a script. Here're some important things to know about variables:
o In PHP, a variable does not need to be declared before adding a value to it. PHP
automatically converts the variable to the correct data type, depending on its value.
o After declaring a variable it can be reused throughout the code.
o The assignment operator (=) used to assign value to a variable.
Source: www.jquery-az.com
Figure 69: PHP variable code
Data Types defines the type of data a variable can store. PHP allows eight different types
of data types. These include - String, Integer, Float (floating point numbers - also called
double), Boolean, Array, Object, Null, Resource
A control structure is a block of code that decides the execution path of a program
depending on the value of the set condition. Let's now look at some of the control
structures that PHP supports.
150
Source: www.guru99.com
Figure 70: Control structure
What is a Function?
A function is a reusable piece or block of code that performs a specific action. Functions can
either return values when called or can simply perform an operation without returning any
value. PHP has over 700 functions built in that perform different tasks.
The array() function is used to create an array. In PHP, there are three types of arrays:
Indexed arrays - Arrays with numeric index. Associative arrays - Arrays with named keys.
When you login into a website or into your mailbox, you are interacting with a form.
Forms are used to get input from the user and submit it to the web server for processing.
151
Source: www.guru99.com
Figure 71: HTML handling process
A form, is an HTML tag that contains graphical user interface items such as - input box,
check boxes radio buttons etc. The form is defined using the <form>...</form> tags and GUI
items are defined using form elements such as input.
With database management systems, many tasks can be done either via programmatically or a
user interface. Creating databases is no exception. Example of creating database in SQL
CREATE DATABASE databasename;
Database Linking is available for researchers and data repositories as one method to ensure
that data can be easily discovered and accessed, this is done by creating bidirectional links
between data repositories and online articles such as - Science Direct. Readers on Science
Direct have one-click access to relevant, trusted data that may help to validate research or
drive further investigations.
7.3.4.3 Self-Assessment
i. HTML is a
A. Programming Language
B. Database software
C. Markup Language with Tags
D. Operating system
ii. What is the file extension used for HTML files
A. .htm or .html
152
B. ppt
C. .exe
D. .jpg
iii. What are tags?
iv. What is formatting in HTML? How to create a hyperlink in HTML?
v. What is the use of an iframe tag?
vi. How do you execute a PHP script from the command line?
vii. How can PHP and HTML interact?
viii. What are some of the common lists that can be used when designing a page?
ix. Write an HTML table tag sequence that outputs the following:
A. 50 pcs 100 500
B.10 pcs 5 50
x. What Javascript numbering?
xi. Explain how can you set an image as a background on web pages
xii. Create a simple webpage-using HTML.
a) Use frames to include images and videos.
b) Add a Cascading Style sheet for designing the web page
c) Design a dynamic web page with validation using JavaScript
d) Design a catalogue in ASP
e) Simple application to demonstrate servlets
f) Design a simple online test web page in PHP.
xiii. Discuss the relationship between HTML 4.01, XHTML 1.0, SGML and XML. (max.
200 words)
xiv. Choose the correct HTML tag for the largest heading
A. the H6 tag
B. The h1 tag
C. The h4 tag
D. The largest tag
xv. Which is the correct HTML code for a vertical frameset with 3 frames:
A. The tag - frameset cols= “500,250,250"
B. The tag - frames = “50%, 25%, 25%”
C. The tag - frameset cols=50%,25%,25%
D. The tag - frameset rows="50%,25%,25%"
7.3.4.5 References
• https://developer.mozilla.org/en-US/docs/Web/JavaScript/Guide/Working_with_Objects
• https://w3schools.com
• https://hackernoon.com/work-with-javascript-arrays-like-a-boss-97207a042e42
• https://www.guru99.com/php-forms-handling.html
153
• Web Design For Dummies, authored by Lisa Lopuck, published by Wiley; 3rd edition
2012
• The Principles of Beautiful Web Design Second Edition, authored by Jason Beaird
published by SitePoint; Second edition 2010
• HTML and CSS: Design and Build Websites 1st Edition authored by Jon Duckett
published by John Wiley & Sons; 1st edition 2011
Web hosts are companies that rent out their services and technologies to host websites on the
Internet. Once the hosting company hosts your website, users can access it by typing in your
web address (domain name) in their web browser. When they do this, their computer
connects to the server your website is hosted on.
At the same time, you should note that different hosting service providers are differently
suited to host varied types of sites. However, there are some common yet highly essential
factors you must consider before committing to a service provider.
154
Domain name is simply a human readable form of an IP address. In function it is the
destination that you type into a web browser in order to visit a website, such a
www.google.com
Uploading website files is one of the very first steps users have to take in order to publish
their creation on the Internet.
Here are eight essential things that you can do to safeguard your website right now.
o Keep your software up-to-date.
o Enforce a strong password policy
o Encrypt your login pages
o Use a secure host
o Backup your data
o Scan your website for vulnerabilities
7.3.5.3 Self-Assessment
i. What is domain name?
ii. How to secure your website?
iii. Name essential factor you must consider to commit service provider?
iv. Define web hosts?
v. The website for a company is hosted on a:
A. Web client
B. Web server
C. Web infrastructure
D. Web page
vi. A URL specifies the following:
A. Protocol Used
B. Domain Name Of Server Hosting Web Page
C. Name Of Folder With Required Information
D. Name Of Document Formatted Using Html
E. The Name Of Isp
vii. A search engine is a program to search
A. For information
B. Web pages
155
C. Web pages for specified index terms
D. Web pages for information using specified search terms
viii. Desirable properties of a website are
A. A meaningful address
B. Help and search facilities
C. Links to related sites
D. Features to allow users to give feedback
E. Hosting on a mainframe
7.3.5.5 References
• https://www.forbes.com/sites/theyec/2018/02/09/seven-factors-to-consider-when-
choosing-a-reliable-web-hosting-company/#71aa193b4cab
• Web Design For Dummies, 3rd edition, authored by Lisa Lopuck, published by Wiley
• The Principles of Beautiful Web Design Second Edition, authored by Jason Beaird
published by SitePoint
• HTML and CSS: Design and Build Websites 1st edition authored by Jon Duckett
published by John Wiley & Sons
156
7.3.6.2 Information Sheet
Website usability refers to the ease with which the average person can interact with any
given website. One of the main reasons website usability testing is so important is because of
the amount of websites offering the same services and products.
There are several reasons why website maintenance is considered so important for the growth
of your business. For one, it helps with the updating of codes/software of your website which
keeps the site’s data as well as your visitors’ info safe and secure.
Updating the site also helps with eliminating the chances of any broken links or links that
redirect to any unrelated pages. This, in turn, keeps customers engrossed and prevent them
from getting frustrated and switching over to the competition with their better-maintained
websites. Outdated content that is no longer being maintained, but which needs to be
available to the public for reference or to provide historic context should be archived
7.3.6.3 Self-Assessment
i. Define importance of web testing?
ii. Explain components of the website functionality?
iii. Case situation: One of you clients sells jewelry online. She wants you to help her
with her website maintenance. What are your suggestions?
iv. Case situation: A clients want to update their website. What are the steps will you
consider for updating their website. List out your suggestion and approach.
v. Identify various SEO tools that are useful for helping website have new visitors?
vi. Prepare a mobile friendly website for selling paintings for a local artist.
vii. Maintenance consist of the following action(s)
A. Replace of component
B. Repair of component
C. Service of component
D. All of the above
viii. Total website productive maintenance aims at
A. Less idle time
157
B. Increase in productivity
C. Zero down time
D. None of the above
ix. A portable chunk of code that can be embedded in Web pages to give extra
functionality is known as a
A. Folksonomy
B. Widget
C. Curator
D. Wiki
E. Listserv
7.3.6.5 References
• https://www.hostgator.com/blog/essential-components-successful-website/
• Web Design For Dummies. authored by Lisa Lopuck, published by Wiley; 3rd edition
• The Principles of Beautiful Web Design Second Edition, authored by Jason Beaird
published by SitePoint; Second edition
• HTML and CSS: Design and Build Websites 1st Edition authored by Jon Duckett
published by John Wiley & Sons; 1st edition
158
CHAPTER 8: COMPUTER REPAIR AND MAINTENANCE
8.1 Introduction
This unit specifies competencies required to perform computer repair and maintenance. It
involves performing troubleshooting, disassembling of faulty components,
repairing/replacing faulty components, testing of component functionality up gradation and
testing of hardware and software.
These are the key learning outcomes, which make up workplace function:
o Perform troubleshooting
o Disassemble faulty components
o Repair/Replace and reassemble faulty components
o Test computer functionality
o Upgrade computer software/hardware
159
o Test of theory of probable cause
o Problem identification
o Appropriate solutions
o Occupational safety and health standards
Detach the power cable: The disassembling of the computer system starts with externally
connected device detachment. Make sure the computer system is turned off, if not then
successfully shut down the system and then start detaching the external devices from the
computer system. It includes removing the power cable from electricity switchboard, then
remove the cable from SMPS (switch mode power supply) from the back of the CPU
Cabinet. Do not start the disassembling without detaching the power cable from the computer
system. Now remove the remaining external devices like keyboard, mouse, monitor, printer
or scanner from the back of CPU cabinet.
Remove the Cover: The standard way of removing tower cases used to be to undo the
screws on the back of the case, slide the cover back about an inch and lift it off. The
screwdrivers as per the type of screw are required to do the task.
Remove the adapter cards: Make sure if the card has any cables or wires that might be
attached and decide if it would be easier to remove them before or after you remove the card.
Remove the screw if any, which holds the card in place. Grab the card by its edges, front and
back, and gently rock it lengthwise to release it.
Remove the drives: Removing drives is easier. There can be possibly three types of drives
present in your computer system, Hard disk drive, CD/DVD/Blue-ray drives. They usually
have a power connector and a data cable attached from the device to a controller card or a
connector on the motherboard. CD/DVD/Blue Ray drive may have an analog cable connected
to the sound card for direct audio output.
The power may be attached using one of two connectors, a Molex connector or a Berg
connector for the drive. The Molex connector may require to be wiggled slightly from side to
side and apply gentle pressure outwards. The Berg connector may just pull out or it may have
a small tab, which has to be lifted with a screwdriver.
Now pull data cables off from the drive as well as motherboard connector. The hard disk
drive and CD/DVD drives have two types of data cables - IDE and SATA cables. The IDE
cables need better care while being removed as it may cause the damage to drive connector
pins. Gently wiggle the cable sideways and remove it. The SATA cables can be removed
easily by pressing the tab and pulling the connector straight back.
160
Remove the memory module: Memory modules are mounted on the motherboard as the
chips that can be damaged by manual force if applied improperly. Be careful and handle the
chip only by the edges. SIMMs and DIMMs are removed in a different way:
• SIMM - gently push back the metal tabs while holding the SIMM chips in the socket. Tilt
the SIMM chip away from the tabs until a 45% angle. It will now lift out of the socket.
Put SIMM in a safe place.
• DIMM - There are plastic tabs on the end of the DIMM sockets. Press the tabs down and
away from the socket. The DIMM will lift slightly. Now grab it by the edges and place it
safely. Do not let the chips get dust at all
Remove the power supply: The power supply is attached into tower cabinet at the top back
end of the tower. Make sure the power connector is detached from the switchboard. Start
removing the power connector connected to motherboard including CPU fan power
connector, cabinet fan, the front panel of cabinet power buttons and all the remaining drives
if not detached yet. Now remove the screws of SMPS from the back of the cabinet and the
SMPS can be detached from the tower cabinet.
Remove the motherboard: Before removing all the connectors from the motherboard, make
sure u memorize the connectors for assembling the computer if required, as that may require
connecting the connectors at its place. Remove the screws from the back of the motherboard
and you will be able to detach it from the cabinet. Now remove the CPU fan from the
motherboard. The heat sink will be visible now which can be removed by the pulling the tab
upward. Finally, the processor is visible now, which can be removed by the plastic tab which
can be pulled back one stretching it side way.
Assembling the computer system: The assembling of the computer system is exactly the
opposite of disassembling operation.
161
Read: Assembling new PC: https://www.instructables.com/id/Computer-Assembly/
Test probable cause theory to determine actual cause. Once you have established
your theory of probable cause, you should take a moment to consider whether or not you
can troubleshoot the issue on your own, or if escalating it to a higher authority is called for.
Identify and Define the Problem. The first step in the problem solving and decision making
process is to identify and define the problem. A problem can be regarded as a difference
between the actual situation and the desired situation.
8.3.2.3 Self-Assessment
i. What is computer assembling?
ii. Describe computer disassembling?
iii. What is hardware?
iv. What is software?
v. Identify the difference between a desktop and a laptop parts.
vi. Disassemble a desktop.
vii. Disassemble a laptop.
viii. Assemble a desktop
ix. Assemble a laptop
x. One of your friends is complaining that her laptop is heating up. She had recently
bought the laptop a secondhand purchase. How can your solve her problem?
xi. Which of the following should be your first choice to remove an application that you
no longer need?
A. Delete the program files
B. Use the uninstall program that came with the application
C. Use the Add or Remove Programs Applet
D. Use the Registry Editor to remove references to the application
xii. Troubleshooting can be best defined as _____.
A. A systematic way of diagnosing a complex problem
B. A simple way of diagnosing a complex problem
C. Checking connections and reviewing error messages
D. Responding to questions posed by tech support
162
xiii. Moving from a _____ to a _____ is a basic principle of troubleshooting.
A. Specific Problem, General Problem
B. General Problem, Specific Problem
C. Problem, Symptom
D. Symptom, Problem
8.3.2.5 References
• https://turbofuture.com/computers/Dissassembling-and-Assembling-the-computer-system
• https://www.cybrary.it/video/establish-theory-probable-cause/
• https://sielearning.tafensw.edu.au/toolboxes/toolbox316/ip/ip_c08.html
• Computer-Managed Maintenance Systems: A Step-by-Step Guide to Effective
Management of Maintenance, Labor, and Inventory, 2nd Edition, authored by William
W. Cato, R. Keith Mobley published by Butterworth-Heinemann
• Computer Hardware Maintenance authored by Stephen Rood published by Butterworth-
Heinemann
Using tools properly helps prevent accidents and damage to equipment and people. This
section describes and covers the proper use of a variety of hardware, software, and
organizational tools specific to working with computers and peripherals.
Hardware Tools: For every job there is the right tool. Make sure that you are familiar with
the correct use of each tool and that the correct tool is used for the current task. Skilled use of
tools and software makes the job less difficult and ensures that tasks are performed properly
and safely.
163
A toolkit should contain all the tools necessary to complete hardware repairs. As you gain
experience, you learn which tools to have available for different types of jobs. Hardware
tools are grouped into four categories:
o ESD tools
o Hand tools
o Cleaning tools
o Diagnostic tools
ESD Tools: There are two ESD tools: the antistatic wrist strap and the antistatic mat. The
antistatic wrist strap protects computer equipment when grounded to a computer chassis. The
antistatic mat protects computer equipment by preventing static electricity from accumulating
on the hardware or on the technician.
Hand Tools: Most tools used in the computer assembly process are small hand tools. They
are available individually or as part of a computer repair toolkit. Toolkits range widely in
size, quality, and price. Some common hand tools and their uses are:
• Flat-head screwdriver: Used to tighten or loosen slotted screws.
• Phillips-head screwdriver: Used to tighten or loosen cross-headed screws.
• Torx screwdriver: Used to tighten or loosen screws that have a star-like depression on
the top, a feature that is mainly found on laptops.
• Hex driver: Used to tighten or loosen nuts in the same way that a screwdriver tightens or
loosens screws (sometimes called a nut driver).
• Needle-nose pliers: Used to hold small parts.
• Wire cutters: Used to strip and cut wires.
• Tweezers: Used to manipulate small parts.
• Part retriever: Used to retrieve parts from locations that are too small for your hand to
fit.
• Flashlight: Used to light up areas that you cannot see well.
• Wire stripper: A wire stripper is used to remove the insulation from wire so that it can
be twisted to other wires or crimped to connectors to make a cable.
• Crimper: Used to attach connectors to wires.
• Punch-down tool: Used to terminate wire into termination blocks. Some cable
connectors must be connected to cables using a punch down tool.
Cleaning Tools: Having the appropriate cleaning tools is essential when maintaining and
repairing computers. Using the appropriate cleaning tools helps ensure that computer
components are not damaged during cleaning. Cleaning tools include the following:
• Soft cloth: Used to clean different computer components without scratching or leaving
debris
• Compressed air: Used to blow away dust and debris from different computer parts
without touching the components
• Cable ties: Used to bundle cables neatly inside and outside of a computer
164
• Parts organizer: Used to hold screws, jumpers, fasteners, and other small parts and
prevents them from getting mixed together
Diagnostic Tools: Diagnostic tools are used to test and diagnose equipment. Diagnostic tools
include the following:
• A digital multimeter is a device that can take many types of measurements. It tests the
integrity of circuits and the quality of electricity in computer components. A digital
multimeter displays the information on an LCD or LED.
Source: http://electricalacademia.com
Figure 72: Digital multimeter
• A loopback adapter, also called a loopback plug, tests the basic functionality of
computer ports. The adapter is specific to the port that you want to test.
• The toner probe, as shown in Figure 2-4, is a two-part tool. The toner part is connected
to a cable at one end using specific adapters, such as an RJ-45, coaxial, or metal clips.
The toner generates a tone that travels the length of the cable. The probe part traces the
cable. When the probe is in near proximity to the cable to which the toner is attached, the
tone can be heard through a speaker in the probe.
• Although an external hard drive enclosure is not a diagnostic tool, it is often used when
diagnosing and repairing computers. The customer hard drive is placed into the external
enclosure for inspection, diagnosis, and repair using a known-working computer.
Backups can also be recorded to a drive in an external enclosure to prevent data
corruption during a computer repair.
165
Source: https://www.flukenetworks.com
Figure 73: Toner probe
Software Tools: Like hardware tools, there are a variety of software tools that can be used to
help technicians pinpoint and troubleshoot problems. Many of these tools are free and several
come with the Windows operating system.
Disk Management Tools: Software tools help diagnose computer and network problems and
determine which computer device is not functioning correctly. A technician must be able to
use a range of software tools to diagnose problems, maintain hardware, and protect the data
stored on a computer.
You must be able to identify which software to use in different situations. Disk management
tools help detect and correct disk errors, prepare a disk for data storage, and remove
unwanted files.
166
• System File Checker (SFC): A command-line tool that scans the operating system
critical files and replaces files that are corrupted.
Protection Software Tools: Each year, viruses, spyware, and other types of malicious
attacks infect millions of computers. These attacks can damage operating systems,
applications, and data. Computers that have been infected may even have problems with
hardware performance or component failure.
To protect data and the integrity of the operating system and hardware, use software designed
to guard against attacks and to remove malicious programs.
Organizational Tools: Keeping accurate records and journals during a busy workday can be
challenging. Many organizational tools, such as work-order systems, can help the technician
document their work.
Reference Tools: A technician must document all repairs and computer problems. The
documentation can then be used as a reference for future problems or for other technicians
who may not have encountered the problem before. The documents can be paper based, but
electronic forms are preferred because they can be easily searched for specific problems.
It is important that a technician document all services and repairs. These documents need to
be stored centrally and made available to all other technicians. The documentation can then
be used as reference material for similar problems that are encountered in the future. Good
customer service includes providing the customer with a detailed description of the problem
and the solution.
167
Internet Reference Tools: The Internet is an excellent source of information about specific
hardware problems and possible solutions:
• Internet search engines
• News groups
• Manufacturer FAQs
• Online computer manuals
• Online forums and chat
• Technical websites
Miscellaneous Tools: With experience, you will discover many additional items to add to the
toolkit. Example roll of masking tape can be used to label parts that have been removed from
a computer when a parts organizer is not available.
A working computer is also a valuable resource to take with you on computer repairs in the
field. A working computer can be used to research information, download tools or drivers,
and communicate with other technicians. Make sure that the parts are in good working order
before you use them. Using known good components to replace possible bad ones in
computers helps you quickly determine which component is not working properly.
Before cleaning or repairing equipment, make sure that your tools are in good condition.
Clean, repair, or replace items that are not functioning adequately.
An example of ESD is the small shock that you receive when you walk across a carpeted
room and touch a doorknob. Although the small shock is harmless to you, the same electrical
charge passing from you to a computer can damage its components. Self-grounding or
wearing an antistatic wrist strap can prevent ESD damage to computer components.
The purpose of self-grounding or wearing an antistatic wrist strap is to equalize the electrical
charge between you and the equipment. Self-grounding is done by touching a bare metal part
of a computer case. The antistatic wrist strap is a conductor that connects your body to the
equipment that you are working on. When static electricity builds up in your body, the
connection made by the wrist strap to the equipment, or ground, channels the electricity
through the wire that connects the strap.
Antistatic Mat: You might not always have the option to work on a computer in a properly
equipped workspace. If you can control the environment, try to set up your workspace away
from carpeted areas. Carpets can cause the buildup of electrostatic charges. If you cannot
avoid the carpeting, ground yourself to the unpainted portion of the case of the computer on
which you are working before touching any components.
168
An antistatic mat is slightly conductive. It works by drawing static electricity away from a
component and transferring it safely from equipment to a grounding point.
When you are working at a workbench, ground the workbench and the antistatic floor mat.
By standing on the mat and wearing the wrist strap, your body has the same charge as the
equipment and reduces the probability of ESD. Either connect the table-top mat and the floor
mat to each other, or connect both to the electrical earth ground.
Reducing the potential for ESD reduces the likelihood of damage to delicate circuits or
components.
Hand Tools: A technician needs to be able to properly use each tool in the toolkit.
• Screws: Match each screw with the proper screwdriver. Place the tip of the screwdriver
on the head of the screw. Turn the screwdriver clockwise to tighten the screw and
counterclockwise to loosen the screw. Screws can become stripped if you over-tighten
them with a screwdriver. A stripped screw, as shown in may get stuck in the screw hole,
or it may not tighten firmly. Discard stripped screws.
• Flat-Head Screwdriver: Use a flat-head screwdriver when you are working with a
slotted screw. Do not use a flat-head screwdriver to remove a Phillips-head screw. Never
use a screwdriver as a pry bar. If you cannot remove a component, check to see if there is
a clip or latch that is securing the component in place.
CAUTION: Some tools are magnetized. When working around electronic devices, be
sure that the tools you are using have not been magnetized. Magnetic fields can be
harmful to data stored on magnetic media. Test your tool by touching the tool with a
screw. If the screw is attracted to the tool, do not use the tool.
169
• Component Retrieving Tools: Needle-nose pliers and tweezers can be used to place and
retrieve parts that may be hard to reach with your fingers. There are also tools called part
retrievers that are specifically designed for this task. Do not scratch or hit any
components when using these tools.
CAUTION: Pencils should not be used inside the computer to change the setting of
switches or to pry off jumpers. The pencil lead can act as a conductor and may damage
the computer components.
A computer technician needs proper tools to work safely and prevent damage to the computer
equipment. A technician uses many tools to diagnose and repair computer problems:
Various specialty tools, such as Torx bits, antistatic bags and gloves, and integrated circuit
pullers, can be used to repair and maintain computers. Always avoid magnetized tools, such
as screwdrivers with magnetic heads, or tools that use extension magnets to retrieve small
metal objects that are out of reach. Using magnetic tools can cause loss of data on hard drives
and floppy disks. Magnetic tools can also induce current, which can damage internal
170
computer components.
Additionally, there are specialized testing devices used to diagnose computer and cable
problems:
• Multimeter: A device that measures AC/DC voltage, electric current, and other cable and
electrical characteristics.
• Power supply tester: A device that checks whether the computer power supply is
working properly. A simple power supply tester might just have indicator lights, while
more advanced versions show the amount of voltage and amperage.
• Cable tester: A device that checks for wiring shorts or faults, such as wires connected to
the wrong pin.
• Loopback plug: A device that connects to a computer, hub, switch, or router port to
perform a diagnostic procedure called a loopback test. In a loopback test, a signal is
transmitted through a circuit and then returned to the sending device to test the integrity
of the data transmission.
Cleaning Materials
Keeping computers clean inside and out is a vital part of a maintenance program. Dirt can
cause problems with the physical operation of fans, buttons, and other mechanical
components. On electrical components, an excessive buildup of dust acts like an insulator and
traps the heat. This insulation impairs the ability of heat sinks and cooling fans to keep
components cool, causing chips and circuits to overheat and fail.
NOTE: When using compressed air to clean inside the computer, blow the air around the
components with a minimum distance of 4 in. (10 cm) from the nozzle. Clean the power
supply and the fan from the back of the case.
CAUTION: Before cleaning any device, turn it off and unplug the device from the power
source.
Computer Cases and Monitors: Clean computer cases and the outside of monitors with a
mild cleaning solution on a damp, lint-free cloth. Mix one drop of dishwashing liquid with 4
oz (118 ml) of water to create the cleaning solution. If water drips inside the case, allow
enough time for the liquid to dry before powering on the computer.
LCD Screens: Do not use ammoniated glass cleaners or any other solution on an LCD
screen, unless the cleaner is specifically designed for the purpose. Harsh chemicals damage
the coating on the screen. There is no glass protecting these screens, so be gentle when
cleaning them and do not press firmly on the screen.
CRT Screens: To clean the screens of CRT monitors, dampen a soft, clean, lint-free cloth
with distilled water and wipe the screen from top to bottom. Then use a soft, dry cloth to
171
wipe the screen and remove streaking.
Components: Clean dusty components with a can of compressed air. Compressed air does
not cause electrostatic buildup on components. Make sure that you are in a well-ventilated
area before blowing the dust out of the computer. A best practice is to wear a dust mask to
make sure that you do not breathe in the dust particles.
Blow out the dust using short bursts from the can. Never tip the can or use the can upside
down. Do not allow the fan blades to spin from the force of the compressed air. Hold the fan
in place. Fan motors can be ruined from spinning when the motor is not turned on.
Component Contacts: Clean the contacts on components with isopropyl alcohol. Do not use
rubbing alcohol. Rubbing alcohol contains impurities that can damage contacts. Make sure
that the contacts do not collect lint from the cloth or cotton swab. Before reinstallation, use
compressed air to blow lint off the contacts.
Keyboards: Clean a desktop keyboard with compressed air and then use a handheld vacuum
cleaner with a brush attachment to remove the loose dust.
CAUTION: Never use a standard vacuum cleaner inside a computer case. The plastic parts
of the vacuum cleaner can build up static electricity and discharge to the components. Use
only vacuums that are approved for electronic components.
Mice: Use glass cleaner and a soft cloth to clean the outside of the mouse. Do not spray glass
cleaner directly on the mouse. If cleaning a ball mouse, you can remove the ball and clean it
with glass cleaner and a soft cloth. Wipe the rollers clean inside the mouse with the same
cloth. Do not spray any liquids inside the mouse.
8.3.5.3 Self-Assessment
i. List the hand tools for dissembling a computer?
ii. List the diagnostic tools for dissembling a computer?
172
iii. Dissemble a desktop
iv. Clean a CPU
v. Clean a monitor
vi. Case situation: You Are Support Technician. One of your customers has just
installed a brand new printer for himself. This customer calls you after some time and
says that every time he tries to print something, all he gets is some garbled text.
However, the printer prints the test page fine. What do you think is the problem here?
vii. _______Used to terminate wire into termination blocks. Some cable connectors must
be connected to cables using a punch down tool.
A. Punch-down tool
B. Wrap plugs
C. Small mirror
D. Small dust brush
viii. ______ A device that checks for wiring shorts or faults, such as wires connected to
the wrong pin.
A. Cable tester
B. Needle-nosed pliers
C. Wire cutters
D. Chip extractor
E. None of above
ix. ______ A command-line tool that creates and deletes partitions on a hard drive.
A. Attrib
B. FDISK
C. CHKDSK
8.3.5.5 References
• http://www.ciscopress.com/articles/article.asp?p=2086239&seqNum=7
• Computer Hardware Maintenance authored by Stephen Rood published by Butterworth-
Heinemann; 1st edition
173
8.3.4 Learning Outcome 3: Repair/Replace and reassemble faulty components
With productivity plummeting, your decision will likely be made from an emotional
standpoint, rather than solid data to support your decision.
Data Driven Decisions, Analyze the Costs, Consider the Age of Equipment, Consider the
Cost of Repairs, Consider Downtime, Consider Safety, Consider Efficiency.
Component testing is defined as a software testing type, in which the testing is performed on
each individual component separately without integrating with other components. It's also
referred to as Module Testing when it is viewed from an architecture perspective.
8.3.4.3 Self-Assessment
i. Define factors to consider when replacing components?
ii. What is component testing?
iii. Case situation: You are asked to maintain a computer lab at an institution. You see
that their DVD/ CD drive is not working. What is your suggestion?
iv. Case situation: You have received a call from a client saying that their laptop is not
starting after it fell down from the bed. You client says that there is no outside
damage. What will you tell you client?
v. If you have a PC with an ATX motherboard and case, can you replace it with a BTX
motherboard?
A. Yes
B. Yes, if you set the jumpers
C. Yes, if you add more screw holes
D. Yes, if you remove some ports
E. No
174
vi. _________ is defined as a software testing type, in which the testing is performed on
each individual component separately without integrating with other components.
A. Component testing
B. RAM
C. Chip extractor
D. Motherboard
8.3.4.5 References
• https://www.micromain.com/asset-repair-or-replace/
• Computer Hardware Maintenance authored by Stephen Rood published by Butterworth-
Heinemann; 1st edition
Testing techniques
• Test system platform
175
• I/O signal conditioning
• Benchtop instrumentation
• Data acquisition hardware
• Test sequencing / automation
• Test Steps & application algorithms
• Operator and Engineering User Interface
When conducting functional tests, you typically need to follow a process that looks
something like this:
• Use test data to identify inputs
• Determine what the expected outcome should be based on those inputs
• Run the test cases with the proper inputs
• Compare the expected results to the actual results
8.3.5.3 Self-Assessment
i. Explain computer diagnostic?
ii. What is process for functional tests?
iii. What could cause a fixed disk error:
A. No-CD installed
B. Bad ram
C. Slow processor
D. Incorrect CMOS settings
E. None of the above
iv. Different components on the motherboard of a PC unit are linked together by sets of
parallel electrical conducting lines. What are these lines called?
A. Conductor’s
B. Buses
C. Connectors
D. Consecutively
v. Boot virus affects the ________ of the program of a system.
A. Boot recorded program
B. Booting computer
C. Boot halted
D. None
vi. Your IT technician and one of office computer is displaying blue screen you shut it on
what would you do without format it?
8.3.5.5 References
• https://www.techsupportall.com/10-best-computer-diagnostic-tools-technicians/
176
• Computer Hardware Maintenance, 1st edition, authored by Stephen Rood published by
Butterworth-Heinemann;
177
2. Undertake change control planning
Besides the technical work involved in upgrading your system, effective change control will
probably be the biggest challenge surrounding a software upgrade. Keeping the balance
between adequate communication and consultation, and overwhelming stakeholders with
detail can be difficult.
7. Backup everything
Store that backup somewhere very safe and secure. Backup again, and store that file
somewhere else safe and secure.
178
10. Perform testing
This includes functional, non-functional and technical testing, quality assurance, data
integrity, security, performance, and theme/design testing including browser, and device
testing.
15. Go Live
You have a few options around your go-live including a complete switchover or running the
old system and updated system in parallel for a period of time
8.3.6.3 Self-Assessment
i. Describe process of software and hardware upgrading?
ii. Why might a company need to upgrade their hardware? Provide examples to reason.
iii. You have a few options around your ______ including a complete switchover or
running the old system and updated system in parallel for a period of time.
179
A. Go Live
B. Provide Training
C. Backup Everything
iv. Upgrading your release of Identity Manager provides several advantages, including:
A. Access to advanced features and functionality
B. A more secure environment for your servers
C. Continued eligibility for full support and services
D. All are True
E. Only A and B are correct
8.3.6.5 References
• https://correct.com.au/15-great-reasons-upgrade-systems/
• https://www.ophtek.com/what-are-the-benefits-of-upgrading-your-hardware/
• Software Technology, authored by Mike Hinchey published by John Wiley & Sons Inc
2018
180
CHAPTER 9: DATABASE MANAGEMENT SYSTEM
9.1 Introduction
This unit specifies competencies required to manage database system. They include
identification of database management systems, designing of database, Creation and
manipulation of database, database testing e.g. using dummy data, implementation of the
designed database, establishing transaction and concurrency mechanism and managing
database security
These are the key learning outcomes, which make up workplace function:
o Identify database management system
o Design database
o Create and manipulate database
o Perform database testing
o Implement designed database
o Establish transaction and concurrency mechanism
o Manage database security
181
9.3.2 Learning Outcome 1: Identify database management system
Some other DBMS examples include: MySQL, SQL Server, Oracle, dBASE, FoxPro
Classification based on Data Model: The most popular data model in use today is the
relational data model. Well-known DBMSs like Oracle, MS SQL Server, DB2 and MySQL
support this model.
• Centralized database system: the DBMS and database are stored at a single site that is
used by several other systems.
• Distributed database system: the actual database and the DBMS software are distributed
from various sites that are connected by a computer network
• Heterogeneous distributed database system: different sites might use different DBMS
software, but there is additional common software to support data exchange between
these sites
• Homogeneous distributed database systems: use the same DBMS software at multiple
sites
• Multiuser database system: a database management system, which supports multiple
users concurrently
• Object-oriented data model: a database management system in which information is
182
represented in the form of objects as used in object-oriented programming
• Single-user database system: a database management system which supports one user at
a time
• Traditional models: data models that preceded the relational model
9.3.2.3 Self-Assessment
i. What is database management?
ii. Explain database classification?
iii. What is the difference between centralized and distributed database systems?
iv. What is the difference between homogenous distributed database systems and
heterogeneous distributed database systems?
v. Provide three examples of the most popular relational databases used.
vi. DBMS is software.
A. True
B. False
vii. DBMS manages the interaction between __________ and database.
A. Users
B. Clients
C. End Users
D. Stake Holders
viii. Database is generally __________
A. System-centered
B. User-centered
C. Company-centered
D. Data-centered
ix. Which of the following is not involved in DBMS?
A. End Users
B. Data
C. Application Request
D. HTML
x. As database administrator how will you explain the primitive operations common to
all record management System?
9.3.2.5 References
• https://www.techopedia.com/definition/24361/database-management-systems-dbms
• https://opentextbc.ca/dbdesign01/chapter/chapter-6-classification-of-database-systems/
183
• Database Systems: Design, Implementation, & Management 12th Edition authored by
Steven Morris, Carlos Coronel, published by Cengage Learning; 12 edition 2016
Instance: The data stored in database at a particular moment of time is called instance of
database. Database schema defines the variable declarations in tables that belong to a
particular database; the value of these variables at a moment of time is called the instance of
that database.
184
A database operation is the vehicle through which users and applications have access
to data in relational databases. Each database operation accesses one relational database.
Source: https://slideplayer.com
Figure 74: User database operations
185
Watch: MySQL queries: https://youtu.be/XMY6Wt1NREg
Source: https://www.guru99.com
Figure 75: Data Model
186
An entity–relationship model (or ER model) describes interrelated things of interest in a
specific domain of knowledge. A basic ER model is composed of entity types (which
classify the things of interest) and specifies relationships that can exist between entities
(instances of those entity types).
Source: http://jcsites.juniata.edu
Figure 76: Entity-relationship model
187
In the relational model, all data must be stored in relations (tables), and each relation
consists of rows and columns.
Source: https://en.wikipedia.org
Figure 77: Relation model
188
Hierarchical Models (aka Hierarchical Linear Modelsor HLM) are a type of linear
regression models in which the observations fall into hierarchical, or completely nested
levels. Hierarchical Models are a type of Multilevel Models.
Classification 1
2nd level
classification 1
Classification 2
Classification 1
2nd level
classification 3
Classification 2
189
A network model is a database model that is designed as a flexible approach to representing
objects and their relationships. A unique feature of the network model is its schema, which is
viewed as a graph where relationship types are arcs and object types are nodes.
Source: http://www.dbmsinternals.com
Figure 79: Network model
9.3.3.3 Self-Assessment
i. Write a SQL query to fetch all records FROM table?
ii. Write a SQL query to create a new table with data and structure copied from another
table?
iii. Who proposed the relational model?
vi. Define database model.
v. What is the purpose of SQL?
vi. What is DBMS used for?
vii. What is E-R model in the DBMS?
viii. Which SQL function is used to count the number of rows in a SQL query ?
A. COUNT()
B. NUMBER()
C. SUM()
D. COUNT(*)
ix. What mode of authentication does SQL Server NOT provide?
A. Windows-only security
B. Both SQL Server and Windows-only security
C. Mixed security
D. SQL Server only security
x. If you don’t specify ASC or DESC after a SQL ORDER BY clause, the following is
used by default
190
A. ASC
B. DESC
C. There is no default value
D. None of the mentioned
xi. Which of the following statement is true?
A. DELETE does not free the space containing the table and TRUNCATE free the
space containing the table
B. Both DELETE and TRUNCATE free the space containing the table
C. Both DELETE and TRUNCATE does not free the space containing the table
D. DELETE free the space containing the table and TRUNCATE does not free the
space containing the table
9.3.3.5 References
• https://www.w3schools.com/sql/default.asp
• https://www.softwaretestinghelp.com/database-design-tools/
• Database Systems: Design, Implementation, & Management 12th Edition authored by
Steven Morris, Carlos Coronel, published by Cengage Learning; 12 edition 2016
• SQL QuickStart Guide: The Simplified Beginner's Guide To SQL authored by
ClydeBank Technology published by CreateSpace Independent Publishing Platform 2015
191
One is selected as the primary key. Those not selected are known as secondary keys. For
example, an employee has an employee number, a National Insurance (NI) number and an
email address. If the employee number is chosen as the primary key then the NI number and
email address are secondary keys.
Source: https://www.researchgate.net
Figure 80: Database table
Linking of table is a very common requirement in SQL. Different types of data can be stored
in different tables and based on the requirement the tables can be linked to each other and the
records can be displayed in a very interactive way.
Source: https://www.plus2net.com
Figure 81: Table linkages
192
of birth, capital expenditure, class grades, eye colour and vehicle type are examples
of variables.
An integration database is a database, which acts as the data store for multiple applications,
and thus integrates data across these applications (in contrast to an Application Database).
An integration database needs a schema that takes all its client applications into account.
Source: https://en.wikipedia.org/wiki/Data_integration
Figure 82: Integration of database
SQL is a domain-specific language used in programming and designed for managing data
held in a relational database management system, or for stream processing in a relational data
stream management system.
9.3.4.3 Self-Assessment
i. How to create table?
ii. What is table linkage?
iii. Define data variable?
iv. What the difference between primary key and secondary key?
v. What is SQL?
vi. A medical Centre wishes to computerize all its patients’ records
a) Create database for the Centre and save it as your name and personal number.
193
b) InDesign View, Create a table with the following properties and save it as patient
Bio Table.
Field Name Properties
Patient Name Text (20)
Sex Text (1)
Residence Text (20)
Patient code Text (4)
Date of visit Date/Time(short date)
Diagnosis Text (25)
c) Create a form for patient Bio table and enter the records below, save it as patient
bio form
Patient Name Sex Residence Patient Date of Diagnosis
Code visit
Victor sam M Kangemi ADS011 3/8/2018 Septic
Wound
Stella mugo F Kisumu ADS025 9/1/2019 Malaria
Mwangi Nema F Buru buru ADS014 23/4/2018 Inflamed
joints
Njambi ella F Bulenga ADS034 14/2/2019 Infections
in chest
Michael wanyama M Naivasha ADS019 3/2/2019 Malaria
d) InDesign view, create another table with the following properties and save it as
patient billing Table.
Field Name Properties
Patient Code Text (4), Primary Key
Prescription Memo
Consult_fee Number
Treat_fee Number
Medical bill Number
Medical is a calculated field which is Consult_fee+ Treat_fee
194
f) Create a one-to-one relationship between the Patient Bio Table and the Patient
Billing Table.
g) Create a query which extract from patient bio table only those patients who were
not diagnosed with malaria. Save it as anti-malaria.
h) i.) Create a report showing Name, Residence, Prescription and Medical Bill. Save
it as clinic report.
ii.) Include a report footer of your name and personal number.
iii.) Print all your work.
vii. A logical schema is -
A. Is the entire database
B. Describe data in terms of relational tables and columns, object-oriented classes,
and XML tags
C. Describes how data is actually stored on disk.
D. Both (A) and (C)
vii. The database environment has all of the following components except:
A. Users.
B. Separate files
C. Database.
D. Database administrator
viii. The way a particular application views the data from the database that the application
uses is a
A. Module.
B. Relational model.
C. Schema.
D. Sub schema.
ix. Which is the subset of SQL commands to manipulate Oracle Database structures,
including tables,
A. Data Definition Language (DDL)
B. Data Manipulation Language (DML)
C. Both of above
D. None
9.3.4.5 References
• https://www.guru99.com/how-to-create-a-database.html
• https://www.plus2net.com/sql_tutorial/sql_linking_table.php
• https://www.coursera.org/lecture/core-database/part-1-sql-query-language-vevDZ
• Database Systems: Design, Implementation, & Management 12th Edition authored by
Steven Morris, Carlos Coronel, published by Cengage Learning; 12 edition 2016
• SQL QuickStart Guide: The Simplified Beginner's Guide To SQL authored by
ClydeBank Technology published by CreateSpace Independent Publishing Platform 2015
195
9.3.5 Learning Outcome 4: Perform database testing
Integration testing is a level of software testing where individual units are combined
and tested as a group. The purpose of this level of testing is to expose faults in the interaction
between integrated units. Test drivers and tests tubs are used to assist in Integration Testing.
Database Testing is checking the schema, tables, triggers, etc. of the database under test. It
may involve creating complex queries to load/stress test the database and check its
responsiveness it. It also checks data integrity and consistency.
Database Schema Testing: As mentioned earlier, it involves testing each object in the
Schema.
196
o Stored Procedure Parameters: Call stored procedure with boundary data and with valid
data. Make each parameter invalid once and run a procedure.
o Return values: Check the values that are returned by stored procedure. In case of a failure,
nonzero must be returned.
o Error messages check: Make changes in such a way that the stored procedure fails and
generate every error message at least once. Check any exception scenarios when there is
no predefined error message.
Stress Testing involves getting a list of major database functions and corresponding stored
procedures. Follow the steps given below for Stress Testing:
o Write test scripts to try those functions and every function must be checked at least once
in a full cycle.
o Perform the test scripts again and again for a specific time period.
o Verifying the log files to check any deadlocks, failure out of memory, data corruption,
etc.
Benchmark Testing
If your database does not have any data problems or bugs, system performance can be
checked. A poor system performance can be found in benchmark testing by checking the
parameters given below:
o System level performance
o Identify most-likely-used functions/features
o Timing – maximum time, minimum time and average time to perform functions
o Access volume
197
9.3.5.3 Self-Assessment
i. What is database testing?
ii. Differentiate trigger testing and stress testing?
iii. When you are testing database, what do you need to check normally as an IT
technician?
iv. How would you know for database testing, whether trigger is fired or not?
v. While testing stored procedures what are the steps does a tester takes?
vi. _________ involves getting a list of major database functions and corresponding
stored procedures.
A. Benchmark Testing
B. Stress Testing
C. Trigger test
D. None
vii. Trigger testing which tasks tester must perform?
A. Make sure the trigger name is correct.
B. Validate the trigger if it is generated for a specific table column.
C. Trigger’s update validation.
D. Update a record with a valid data.
E. Both of above
F. None of above
viii. __________ is checking the schema, tables, triggers.
A. Database Testing
B. Database Schema Testing
C. Benchmark Testing
D. None of above
9.3.5.5 References
• https://www.guru99.com/data-testing.html
• https://www.tutorialspoint.com/database_testing/database_testing_techniques.htm
• Database Systems: Design, Implementation, & Management 12th Edition authored by
Steven Morris, Carlos Coronel, published by Cengage Learning; 12 edition 2016
198
9.3.6 Learning Outcome 5: Implement designed database
199
Database Testing is checking the schema, tables, triggers, etc. of the database under test. It
may involve creating complex queries to load/stress test the database and check its
responsiveness. It checks data integrity and consistency.
Non-
Structural Functional Functional
Testing Testing
Testing
Source: www.guru99.com
Figure 83: Types of database testing
9.3.6.3 Self-Assessment
i. What is database testing?
ii. Explain design process of database?
iii. ________ choose each table’s primary key. The primary key is a column that is used
to uniquely identify each row. An example might be Product ID or Order ID.
A. Refine your design
B. Specify primary keys
C. The design process
D. None of Above
E. Both of above
iv. Analyze your design for errors. Create the tables and add a few records of sample
data. See if you can get the results you want from your tables. Make adjustments to
the design, as needed.
A. Refine your design
B. The design process
C. None of above
D. Both A and B
E. Apply the normalization rules
v. An enterprise data model is a relational model that shows the high-level entities for
the organization and associations among those entities.
A. True
B. False
vi. Term that is considered as a basis for most robust authentication schemes, is said to
be
A. Identification
B. Registration
C. Encryption
D. Refine information
200
9.3.6.4 Tools, Equipment, Supplies and Materials
Computer, Data Factory, MockupData, SQL Server
9.3.6.5 References
• https://support.office.com/en-us/article/database-design-basics-eb2159cf-1e30-401a-
8084-bd4f9c9ca1f5
• https://www.guru99.com/data-testing.html
• Database Systems: Design, Implementation, & Management 12th Edition authored by
Steven Morris, Carlos Coronel, published by Cengage Learning; 2016
Due to the nature of SQL and relational database architecture, where each update can act on
only one table at a time and where there are no trailers in the usual sense, two update
statements must be executed simultaneously. Both update statements must either succeed and
COMMIT or fail and ROLLBACK.
201
Source: www.guru99.com
Figure 84: Concurrency mechanism
Source: Tutorials4us.com
Figure 85: Transaction management
202
9.3.7.3 Self-Assessment
i. What is transaction mechanism?
ii. Differentiate between transaction mechanism and concurrency mechanism?
iii. What is managing multiple transactions?
iv. Any non-serial interleaving of T1 and T2 for concurrent execution leads to
A. A serializable schedule
B. A schedule that is not conflict serializable
C. A conflict serializable schedule
D. A schedule for which a precedence graph cannot be drawn
v. Which of the following locks the item from change but not from read?
A. Implicit lock
B. Explicit lock
C. Exclusive lock
D. Shared lock
vi. A transaction in which either all of the database actions occur or none of them do is
called:
A. Atomic
B. Consistent
C. Isolated
D. Durable
vii. Which of the following occurs when one transaction reads a changed record that has
not been committed to the database?
A. No repeatable read
B. Phantom read
C. Dirty read
D. Consistent read
9.3.7.5 References
• http://ftp.magicsoftware.com/www/help/uniPaaS/mergedprojects/MGHELPW/Data_Man
agement/SQL_Considerations/Transaction_Mechanism.htm
• Database Systems: Design, Implementation, & Management 12th Edition authored by
Steven Morris, Carlos Coronel, published by Cengage Learning; 2016
203
9.3.8 Learning Outcome 7: Manage database security
204
So a file that is updated after a normal backup will be archived every time a differential
backup is run until the next normal backup runs and clears the archive bit.
Design methodology: A structured approach that uses procedures, techniques, tools, and
documentation aids to support and facilitate the process of design. A design methodology
consists of phases each containing a number of steps, which guide the designer in the
techniques appropriate at each stage of the project.
Conceptual database design: The process of constructing a model of the information used
in an enterprise, independent of all physical considerations. The conceptual database design
phase begins with the creation of a conceptual data model of the enterprise, which is entirely
independent of implementation details such as the target DBMS, application programs,
programming languages, hardware platform, performance issues, or any other physical
considerations.
205
Physical database design
It is a description of the implementation of the database on secondary storage; it describes the
base relations, file organizations, and indexes used to achieve efficient access to the data, and
any associated integrity constraints and security measures.
Whereas logical database design is concerned with the what, physical database design is
concerned with the how. The physical database design phase allows the designer to make
decisions on how the database is to be implemented. Therefore, physical design is tailored to
a specific DBMS. There is feedback between physical and logical design, because decisions
taken during physical design for improving performance may affect the logical data model.
For example, decisions taken during physical for improving performance, such as merging
relations together, might affect the structure of the logical data model, which will have an
associated effect on the application design.
One of the main objectives of physical database design is to store data in an efficient ay.
There are a number of factors that we may use to measure efficiency:
• Transaction throughput
This is the number of transactions that can be processed in a given time interval.
In some systems, such as airline reservations, high transaction throughput is critical to the
overall success of the system.
• Disk storage
This is the amount of disk space required to store the database files. The designer may wish
to minimize the amount of disk storage used.
9.3.8.3 Self-Assessment
i. What are types of backup?
ii. What is database security?
A. Data encryption
B. A view
C. Fingerprint
D. All of the above
206
iii. Data security threats include
A. Privacy invasion
B. Hardware protection
C. Fraudulent manipulation od data
D. All of the above
iv. _______ is responsible for using that the database remains in a consistent state despite
system failure.
A. Storage Manager
B. Transaction manager
C. End user
D. Sophisticated
v. Prevention of access to the database by unauthorized users is referred to as:
A. Integrity
B. Productivity
C. Security
D. Reliability
vi. How will you know your database is unsecure and which software will you use to
make it secure
9.3.8.5 References
• https://www.solarwindsmsp.com/content/types-of-database-backups
• Database Systems: Design, Implementation, & Management 12th Edition authored by
Steven Morris, Carlos Coronel, published by Cengage Learning; 2016
207
CHAPTER 10: MANAGE INFORMATION SYSTEM
10.1 Introduction
This unit covers the competencies required to manage information system. It involves
identification of information system concepts, classification of information systems,
management of information resources, Planning of information system, identification of
impact of information system in an organization.
o Identified Components of an IS
o Identified Types of Information Systems
o Identified Strategic levels of an Organization
o Identified Functional areas of an MIS
o Classified IS Resources
o Identified IS planning techniques
o Identified IS Acquisition methods
These are the key learning outcomes, which make up workplace function:
o Identify information system concepts
o Classify information systems
o Manage information resources
o Information system planning
o Impact of information system in organization
208
o Qualities of an IS
o Types of systems
o Open , Closed, Probabilistic, Cybernetic etc
The role of computer information system is to support the key aspects of running an
organization, such as communication, record keeping, decision making, data analysis and
more. Companies use this information to improve their business operations, make strategic
decisions and gain a competitive edge. MIS system includes – collection of information,
management of information and incorporating in the database.
10.3.2.3 Self-Assessment
i. Define Information system?
ii. What are characteristics of IS?
iii. __________ is a system composed of people and computers that processes or
interprets information.
A. A computer information system
B. Information system
C. Database system
D. None of Above
209
10.3.2.5 References
• http://ecomputernotes.com/mis/information-and-system-concepts/typesofsystems
• https://www.guru99.com/mis-types-information-system.html
• Information and Knowledge System (Information Systems, Web and Pervasive
Computing: Advances in Information Systems (1st edition) authored by Pierre-Emmanuel
Arduin, Michel Grundstein, Camille Rosenthal-Sabroux published by Wiley-ISTE; 2015
• Management Information System authored by Anuranjan Misra, published by Laxmi
Publications Pvt. Ltd, 2017
Operational strategies refers to the methods companies use to reach their objectives.
210
Management System: Managers require precise information in a specific format to
undertake an organizational decision. A system which facilitates an efficient decision making
process for managers is called management support system.
Source: www.wikiwand.com
Figure 86: Management System
A Decision Support System can be seen as knowledge based system, used by senior
managers, which facilitates the creation of knowledge and allow its integration into the
organization. These systems are often used to analyze existing structured information and
allow managers to project the potential effects of their decisions into the future.
Executive Information Systems are strategic-level information systems that are found at the
top of the pyramid. They help executives and senior managers analyze the environment in
which, the organization operates, to identify long-term trends, and to plan appropriate courses
of action.
10.3.3.3 Self-Assessment
i. What is an executive information system?
ii. Give the difference between decision support system and executive information
system?
211
iii. Choose the correct statement about information system:
A. A system that comprises a set of interrelated elements that transform data into
information.
B. A collection of facts that are meaningfully organised and are useful to their users.
C. It can exist in the form of text, numbers, images, audio and video.
D. It collects information, stores and manipulates it into raw facts.
iv. The components of an information system are human, hardware, software, procedures
and _______________
A. field
B. data
C. information system
D. table
10.3.3.5 References
• http://www.chris-kimble.com/Courses/World_Med_MBA/Types-of-Information-
System.html
• Information and Knowledge System (Information Systems, Web and Pervasive
Computing: Advances in Information Systems (1st edition) authored by Pierre-Emmanuel
Arduin, Michel Grundstein, Camille Rosenthal-Sabroux published by Wiley-ISTE; 2015
• Management Information System authored by Anuranjan Misra, published by Laxmi
Publications Pvt. Ltd., 2017
212
10.3.4.2 Information Sheet
A hardware resource includes all physical devices and materials used in information
processing. Specially, it includes not only machines, such as computers and other equipment,
but also all data media, that is, all tangible objects on which data is recorded, from sheets of
paper to magnetic disks.
A Software Resources includes all sets of information processing instructions. This generic
concept of software includes not only the sets of operating instructions called programs,
which direct and control computer hardware, but also the sets of information processing
instructions needed by people, called procedures.
The main components of information systems are computer hardware and software,
telecommunications, databases and data warehouses, human resources, and procedures.
10.3.4.3 Self-Assessment
i. Define Information Management Resources?
ii. What are components of IS?
iii. What is the definition of MIS?
A. The proper way to address an unmarried woman
B. An acronym for "Missing In Space"
C. A computer system that organizes data and creates reports
D. Software that dictages the movements of a business
10.3.4.5 References
• https://www.techopedia.com/definition/7722/information-resource-management-irm
• https://www.ganttic.com/blog/why-is-resource-management-important
213
• Information and Knowledge System (Information Systems, Web and Pervasive
Computing: Advances in Information Systems (1st edition) authored by Pierre-Emmanuel
Arduin, Michel Grundstein, Camille Rosenthal-Sabroux published by Wiley-ISTE; 2015
• Management Information System authored by Anuranjan Misra, published by Laxmi
Publications Pvt. Ltd. 2017
214
o Encourages creativity and innovation
o Helps in decision making
Here are just some of the most common causes of project failure:
o Poorly defined project scope
o Inadequate risk management
o Failure to identify key assumptions
o Project managers who lack experience and training
o No use of formal methods and strategies
o Lack of effective communication at all levels
10.3.5.3 Self-Assessment
i. What are the technics of planning?
ii. Define project panning.
iii. What are common cause of project failure?
iv. Prepare a scope for collecting primary and secondary student’s demographic data
collection. What may be some of the variables considered for the purposes of data.
How different stakeholder holder may access and use such data effectively.
10.3.5.5 References
• https://www.civilserviceindia.com/subject/Management/notes/information-systems-
planning.html
• https://kalyan-city.blogspot.com/2012/02/importance-of-planning-why-planning-is.html
• https://www.projectsmart.co.uk/15-causes-of-project-failure.php
215
• Information and Knowledge System (Information Systems, Web and Pervasive
Computing: Advances in Information Systems (1st edition) authored by Pierre-Emmanuel
Arduin, Michel Grundstein, Camille Rosenthal-Sabroux published by Wiley-ISTE; 2015
• Management Information System authored by Anuranjan Misra, published by Laxmi
Publications Pvt. Ltd., 2017
Technology is a double-edged sword when it comes to bringing people together. On the one
hand, it makes it easier for co-workers to communicate and collaborate as they make use of
email and team-chat sites. Technology saves money for business by saving time, such as the
hours that would be required to compile reports by hand. In addition, meaningful and up-to-
date information helps organizations to quickly recognize problems and opportunities and
respond proactively. However, computers, software and the training required to maintain and
upgrade them can be expensive.
The key negatives of the Information System is that in case data is not secured it can be used
by malicious agencies to manipulate for personal gains. When there are data hacks, personal
information, business information is susceptible to risk and lead to distrust and limited
privacy.
216
another for certain purposes, but wish to restrict access to or by third parties.
Data integrity is the maintenance of, and the assurance of the accuracy and consistency of,
data over its entire life cycle, and is a critical aspect to the design, implementation and usage
of any system, which stores, processes, or retrieves data.
A code of conduct is a set of rules outlining the social norms, religious rules and
responsibilities of, and or proper practices for, an individual.
A warranty is a manufacturer's or seller's promise to stand behind its product and correct
problems if the product fails due to a manufacturing defect or because it doesn't work as
promised.
10.3.6.3 Self-Assessment
i. What is data integrity?
ii. Differentiate between data integrity and privacy?
iii. Explain negative and positive impact of Information System?
iv. What is warranty?
v. When a report is produced periodically, it is called what?
A. Drill-Down Report
B. Key-Indicator Report
C. Demand Report
D. Scheduled Report
vi. Case situation: An NGO has selected you for developing their software for collection
of data related to farms and their agricultural produce. As part of the agreement, they
have asked to you sign a NDA. What are the clauses that might be added in the NDA.
What are the things you need to keep in mind while signing the NDA. What might be
the liabilities?
viii. Go through the warranty card for the following items – laptop, mobile, keyboard,
mouse etc.
217
10.3.6.5 References
• http://www.umsl.edu/~joshik/msis480/chapt16.htm
• https://definitions.uslegal.com/l/legal-issue/
• https://bizfluent.com/list-6943594-positive-negative-effects-technology-business.html
• Information and Knowledge System (Information Systems, Web and Pervasive
Computing: Advances in Information Systems (1st edition) authored by Pierre-Emmanuel
Arduin, Michel Grundstein, Camille Rosenthal-Sabroux published by Wiley-ISTE; 2015
• Management Information System authored by Anuranjan Misra, published by Laxmi
Publications Pvt. Ltd., 2017
218
CHAPTER 11: GRAPHIC DESIGN
11.1 Introduction
This unit covers the competencies required to Perform Graphic Design. It involves
identification of graphic design concepts, identification of elements and principles of graphic
design, application of typography techniques, creation and editing of images, perform of
layout design and printing of the layout design.
These are the key learning outcomes, which make up workplace function:
o Identify Graphic Design Concepts
o Identify Elements and Principles of Graphic Design
o Apply Typography Techniques
o Create and Edit Images
o Perform Layout Design
o Print and Post the Design created
219
11.3.2.2 Information Sheet
Graphic design is the process of visual communication and problem-solving through the use
of typography, photography, and illustration. The field is considered a subset of visual
communication and communication design, but sometimes the term "graphic design" is used
synonymously. Graphic designers create and combine symbols, images and text to form
visual representations of ideas and messages. They use typography, visual arts, and page
layout techniques to create visual compositions. Common uses of graphic design include
corporate design (logos and branding), editorial design (magazines, newspapers and books),
environmental design, advertising, web design, communication design, product packaging,
and signage.
Graphic design is applied to everything visual, from road signs to technical schematics, from
inter-office memorandums to reference manuals.
Design can aid in selling a product or idea. It is applied to products and elements of company
identity such as logos, colors, packaging and text as part of branding and advertising.
Branding has become increasingly more important in the range of services offered by graphic
designers. Graphic designers often form part of a branding team.
Graphic design is applied in the entertainment industry in decoration, scenery and visual
story telling. Other examples of design for entertainment purposes include novels, vinyl
album covers, comic books, DVD covers, opening credits and closing credits in filmmaking,
and programs and props on stage. This could also include artwork used for T-shirts and other
items screenprinted for sale.
From scientific journals to news reporting, the presentation of opinion and facts is often
improved with graphics and thoughtful compositions of visual information - known as
information design. Newspapers, magazines, blogs, television and film documentaries may
use graphic design. With the advent of the web, information designers with experience in
interactive tools are increasingly used to illustrate the background to news stories.
Information design can include data visualization, which involves using programs to interpret
and form data into a visually compelling presentation, and can be tied in with information
graphics.
A graphic design project may involve the stylization and presentation of existing text and
either preexisting imagery or images developed by the graphic designer. Elements can be
incorporated in both traditional and digital form, which involves the use of visual arts,
typography, and page layout techniques. Graphic designers organize pages and optionally add
graphic elements. Graphic designers can commission photographers or illustrators to create
original pieces. Designers use digital tools, often referred to as interactive design, or
multimedia design. Designers need communication skills to convince an audience and sell
their designs.
220
Read: Graphic design equipment:
https://www.creativebloq.com/graphic-design/tools-every-graphic-designer-should-have-
6133208
https://www.devsaran.com/blog/10-best-tools-graphic-designers
Corporate branding refers to the practice of promoting the brand name of a corporate entity,
as opposed to specific products or services. The activities and thinking that go into corporate
branding are different from product and service branding because the scope of a corporate
brand is typically much broader.
Packaging is the science, art and technology of enclosing or protecting products for
distribution, storage, sale, and use. Packaging also refers to the process of designing,
evaluating, and producing packages.
An online art gallery is a website that display artworks. Usually, the online gallery is run as
a business, with the purpose of displaying the artwork being to promote it to potential buyers.
A printer is an external hardware output device that takes the electronic data stored on a
computer or other device and generates a hard copy of it.
When referring to hardware, a scanner or optical scanner is hardware input device that
optically "reads" and image and converts it into a digital signal. For example, a scanner may
be used to convert a printed picture, drawing, or document (hard copy) into a digital file,
which can be edited on a computer.
11.3.2.3 Self-Assessment
i. What is packaging?
ii. What is corporate branding?
iii. Define Graphic design?
iv. Case situation: As an ICT student, you are required to use suitable publication
software and design a cover for the college magazine called ‘Governance for better
future’ as follows:
a) Use appropriate layout, paper balance, font variable and relevant pictures. Save it
as your name and personal number.
b) Insert a clip to represent the writer at the bottom of the cover
c) Use your name as the author of the magazine.
d) Insert automatic current date to appear as the date of publication
e) Apply suitable background for the cover.
f) Insert your name and personal number as a header.
g) Save and print your work.
v. All of the following are Principles of Graphic Design except....
A. Proximity
221
B. Alignment
C. Placement
D. Contrast
vi. If a logo reads UP and DOWN, it is written:
A. Horizontally
B. Vertically
C. Diagonally
vii. True or False: Artwork can also exist on many places, like on products in grocery
stores:
A. True
B. False
11.3.2.5 References
• https://en.wikipedia.org/wiki/Packaging_and_labeling
• https://www.csi-products.co.uk/packaging-tools-and-materials-c-2936_2947_2961.html
• https://www.computerhope.com/jargon/p/printer.htm
• Sustainable Graphic Design (1st edition) authored by Wendy Jedlicka, published by
Wiley, 2009
• Introduction to Graphic Design authored by Aaris Sherin, published by Bloomsbury
Visual Arts, 2017
The Elements of good graphic design are the components or parts of a work of art or design.
222
More simply put, they are the ingredients of art. Take one part colour; a pinch of texture, and
a whole lot of shape and the result will be some well-designed graphic design.
o LINE: Lines, in graphic design, can be used for a wide range of purposes: stressing a
word or phrase, connecting content, creating patterns and more.
o COLOUR: Colour is used to generate emotions, define importance, create visual interest
and unify branding.
o TEXTURE: Texture relates to the surface of an object. Using texture in graphic design
adds depth and visual interest. This can be applied graphically in the form of pattern or
through the choice of printable surface.
o SIZE: In graphic design, size is used to convey importance, attract attention and create
contrast.
o SHAPE: The three basic shape types are Geometric (Circles, Squares, Triangles etc.),
Natural (leaves, trees, people etc.) and abstract (icons, stylisations and graphic
representations). Use carefully to create a visually pleasing design and eye-catching
design.
o SPACE: A vital part of any good graphic design, Space is the area around the elements in
a design. It can be used to separate or group information. Use it effectively to give the eye
a rest, define importance and lead the eye to where you want it to travel.
o VALUE: Value is how light or dark an area looks in a design. It is everything from the
darkest of blacks through to the brightest of whites. Used correctly it will create depth,
contrast and emphasis.
The principles and elements of design both carry the same weight in executing an effective
piece. If you disregard the principles, then you have a visual piece that lacks a story.
11.3.3.3 Self-Assessment
i. Explain briefly element?
ii. What are the principle of graphic design?
iii. Design a letter head for a company.
iv. Design a visiting card using appropriate tool.
v. Design a roll-up banner with for Awareness of Against Use of Drugs
vi. Design a banner for a birthday celebration.
223
11.3.3.5 References
• https://www.unahealydesign.com/elements-of-good-graphic-design/
• https://visme.co/blog/elements-principles-good-design/#jlHfsVaRKtDxATmm.99
Typography is the art and technique of arranging type to make written language legible,
readable, and appealing when displayed.
224
https://youtu.be/sByzHoiYFX0
https://youtu.be/VH8QT73Gxwo
https://youtu.be/iniUd-NZ-T8
In typography, kerning is defined as the adjustment of space between two individual letters.
11.3.4.3 Self-Assessment
i. What is typography?
ii. Differentiate old style and transitional typography?
iii. Design a visiting card for a pastry shop.
iv. Design a webpage blog for a fiction-writer author.
v. Kerning is _________
A. Weight of letters
B. Spacing between letters
C. Spacing between words
D. Font style
vi. Use appropriate software to prepare awareness poster slogan on a topic of your
choice.
11.3.4.5 References
• https://www.jotform.com/blog/a-crash-course-in-typography-the-basics-of-type/
• https://www.avantgraphic.com/10-typography-tricks-every-designer-should-know/
• https://medium.com/gravitdesigner/the-art-of-kerning-be16be25344f
• https://experience.sap.com/basics/what-makes-a-good-typeface/
• https://uxdesign.cc/how-to-make-the-typography-of-your-ios-app-not-suck-a6de09fb7c41
225
Trainees to demonstrate knowledge in relation to:
o Types of Graphic design software: Adobe Photoshop, Adobe InDesign, Corel Draw,
Paint.net
o Types of Image file types: Raster,Vector,
o Creation of: Letterforms, Lines of type, Body copy , Techniques of image manipulation
Colour blending, Image merging, Texture use, Proportion etc. Creation of Images using
Adobe Photoshop
Graphics software creates, edits, and manages two-dimensional images. These computer
graphics may be clip art, web graphics, logos, headings, backgrounds, digital photos, or other
kinds of digital images.
Read the following for further details on the types of files and their characteristics:
TIFF (.tif, .tiff): TIFF or Tagged Image File Format are lossless images files meaning that
they do not need to compress or lose any image quality or information (although there
are options for compression), allowing for very high-quality images but also larger file sizes.
Compression: Lossless - no compression. Very high-quality images.
Best For: High quality prints, professional publications, archival copies
Special Attributes: Can save transparencies
Bitmap (.bmp): BMP or Bitmap Image File is a format developed by Microsoft for
Windows. There is no compression or information loss with BMP files which allow images
to have very high quality, but also very large file sizes. Due to BMP being a proprietary
format, it is generally recommended to use TIFF files.
Compression: None
Best For: High quality scans, archival copies
JPEG (.jpg, .jpeg): JPEG, which stands for Joint Photographic Experts Groups is a “lossy”
format meaning that the image is compressed to make a smaller file. The compression does
226
create a loss in quality but this loss is generally not noticeable. JPEG files are very common
on the Internet and JPEG is a popular format for digital cameras - making it ideal for web use
and non-professional prints.
Compression: Lossy - some file information is compressed or lost.
Best For: Web Images, Non-Professional Printing, E-Mail, Powerpoint
Special Attributes: Can choose amount of compression when saving in image editing
programs like Adobe Photoshop or GIMP.
GIF (.gif): GIF or Graphics Interchange Format files are widely used for web graphics,
because they are limited to only 256 colors, can allow for transparency, and can be animated.
GIF files are typically small is size and are very portable.
Compression: Lossless - compression without loss of quality
Best For: Web Images
Special Attributes: Can be Animated, Can Save Transparency
PNG (.png): PNG or Portable Network Graphics files are a lossless image format originally
designed to improve upon and replace the gif format. PNG files are able to handle up to 16
million colors, unlike the 256 colors supported by GIF.
Compression: Lossless - compression without loss of quality
Best For: Web Images
Special Attributes: Save Transparency
EPS (.eps): An EPS or Encapsulated PostScript file is a common vector file type. EPS files
can be opened in many illustration applications such as Adobe Illustrator or CorelDRAW.
Compression: None - uses vector information
Best For: Vector artwork, illustrations
Special Attributes: Saves vector information
RAW Image Files (.raw, .cr2, .nef, .orf, .sr2, and more)
RAW images are images that are unprocessed that have been created by a camera or scanner.
Many digital SLR cameras can shoot in RAW, whether it be a .raw, .cr2, or .nef. These RAW
images are the equivalent of a digital negative, meaning that they hold a lot of image
information, but still need to be processed in an editor such as Adobe Photoshop or
Lightroom.
Compression: None
Best For: Photography
Special Attributes: Saves metadata, unprocessed, lots of information
227
A letterform, letter-form or letter form, is a term used especially in typography, paleography,
calligraphy and epigraphy to mean a letter's shape
Source: http://www.csun.edu
Figure 87: Letterform
Types of Lines
o Straight line
o Curved line
o Horizontal lines: The lines drawn horizontally are called horizontal lines.
o Vertical lines: The lines drawn vertically are called vertical lines.
o Oblique or slanting lines: The lines drawn in a slanting position are called oblique or
slanting lines.
The body text or body copy is the text forming the main content of a book, magazine, web
page, or any other printed or digital work.
Not every image you use is going to match your background, your texture, or even your other
images. So that is where color blending comes in. Things like Photo Filters and Gradient
Maps are used in Photoshop to either add or take away color in your images.
Now textures don't necessarily add to the realism of your art, but they do add a nice kick to
blend all your images together evenly. Blending is a huge part of photo manipulation, so
textures are something you have to carefully pick out.
228
o In the New dialog box, select a preset image category from the Preset pop-up menu. If
you selected an image category from the Preset menu in
o Select your desired preset Size for that category.
11.3.5.3 Self-Assessment
i. What are types of lines?
ii. Differentiate raster and vector format?
iii. What is the role of Graphic Software?
iv. How to create new image using Photoshop step-by-step?
v. Edit photographs using Photoshop.
vi. Case situation: You have been asked by your high school principal to collate old
pictures and prepare a collage for your school’s annual day. Some of the pictures are
old and torn. How will you help your school?
vii. In typography, a key component in graphic design, the Bauhaus school was
instrumental in developing fonts with what style?
A. Modern
B. Sans Serif
C. Gothic
D. Old Style
viii. If you write the word ''HOPE'' in large, block letters and write the words ''for the best''
in tiny cursive letters, what two elements did you just contrast?
A. Form and line
B. Typography and line
C. Texture and typography
D. Shape and color
ix. Which of the following professions would be MOST responsible for creating the
visuals on a product package?
A. Software engineers
B. Web designer
C. Graphic designer
D. Project management professional
x. If you want to include pictures on your website, a good resolution would be _____.
A. 320 PPI
B. 64 PPI
C. 1200 PPI
D. 96 PPI
229
11.3.5.4 Tools, Equipment, Supplies and Materials
Photoshop, Computer
11.3.5.5 References
• https://www.lifewire.com/what-is-graphics-software-1701504
• https://modassicmarketing.com/understanding-image-file-types
• https://design.tutsplus.com/tutorials/10-techniques-that-are-essential-for-successful-
photo-manipulation-artwork--psd-242
• Sustainable Graphic Design (1st edition) authored by Wendy Jedlicka, published by
Wiley; 2009
• Introduction to Graphic Design authored by Aaris Sherin, published by Bloomsbury
Visual Arts, 2017
Unified design blends all its parts to make a single impression. It is more visible and potent
than it’s flabby alternative: a bunch of individual impressions.
230
https://medium.com/@exokim/10-amazing-online-typography-tools-for-graphic-designers-
91471a2939cd
11.3.6.3 Self-Assessment
i. What is proportion?
ii. Use online tutorials to learn and practice layout design application
iii. Identify 5 typography free tools from online
11.3.6.5 References
• https://webflow.com/blog/9-of-the-best-typography-tools-for-designers
• https://alexanderwwhite.wordpress.com/designer/type-design/“putting-it-together-
achieving-a-unified-design”/
• Sustainable Graphic Design, (1st edition) authored by Wendy Jedlicka, published by
Wiley, 2009
• Introduction to Graphic Design authored by Aaris Sherin, published by Bloomsbury
Visual Arts, 2017
Digital printing refers to methods of printing from a digital-based image directly to a variety
of media. It usually refers to professional printing where small-run jobs from desktop
231
publishing and other digital sources are printed using large-format and/or high-volume laser
or inkjet printers. Digital printing has a higher cost per page than more traditional offset
printing methods.
Digital Printing is when you reproduce a digital based image to print format, using a physical
surface like paper, film, plastic, photographic paper or cloth.
Offset Printing. Offset printing is a type of print that makes use of plates. Other printing
techniques include such as – flexography, letterpress printing, screen printing etc.
Source: http://resources.lasertekservices.com
Figure 88: Paper size and printing formats
232
Table 12: Printing paper by weight
Paper weight Use
80 gms Everyday printing
90 gms Ideal for colour printing
100 gms Most popular for executive documentation, presentation and mail
120 gms High quality paper for presentation
160 gms A lightweight card and special projects
Source: www.paperstone.co.uk
11.3.7.3 Self-Assessment
i. What are the different types of printing?
ii. What are the different types of printing paper?
iii. What type of paper will you use for printing visiting cards for a top executive?
iv. What are the key factors for selecting paper quality?
v. Set page for different printing set up - A5, A4, A3, A2
vi. Case situation: You are working in a photocopy shop. You have noticed that there
are a lot of query related to architecture drawing printing since the time a college near
by has opened interior designing course. What kind of printer and paper will you
suggest to your manager?
vii. Case situation: For a home user that has casual printing needs, most important
specification of a printer is
A. Cost Of Use
B. Resolution
C. Speed
D. Paper Size
vii. Printer which uses carbon forms is
A. Daisy Wheel
B. Dot Matrix
C. Laser
D. Thimble
ix. Screen printing utilizes a ___________ to control the location of the ink.
A. Layer
B. Mask
C. Point
D. Spot
x. ___________ is held against the surface to be printed, and ink is forced through the
___________ (and supporting screen) with utilize of a squeegee.
233
11.3.7.4 Tools, Equipment, Supplies and Materials
Printer, Computer, Papers, Digital Tablet
11.3.7.5 References
• https://www.printerland.co.uk/blog/printer-buying-guide/in-depth-guide-to-printer-paper/
• http://imprimerie-sanjose.com/what-are-the-different-types-of-printing/
• https://www.fellesforbundet.no/globalassets/dokumenter/grafisk/publikasjoner/ngu-
digital-print-report-2016.pdf
• Sustainable Graphic Design authored by Wendy Jedlicka, published by Wiley; 1 edition
2009
• Introduction to Graphic Design authored by Aaris Sherin, published by Bloomsbury
Visual Arts 2017
234
CHAPTER 12: COMPUTER PROGRAMMING
12.1 Introduction
This unit specifies competencies required to develop computer program. It involves
Identifying program and programming concepts, identifying phases of program development,
perform program design and Analysis, develop a Computer program, Perform Program
testing and debugging, Perform User training and Program Maintenance.
235
12.3.2 Learning Outcome 1: Identify program and programming concepts
A programming language is a set of commands, instructions, and other syntax use to create
a software program.
Program structure The overall form of a program, with particular emphasis on the
individual components of the program and the interrelationships between these components.
Source: www.codeavail.com
Figure 89: Program structure
236
A declaration of a variable is where a program says that it needs a variable. For small
programs, place declaration statements between the two braces of the main method. The
declaration gives a name and a data type for the variable. It may also ask that a particular
value be placed in the variable.
Loops are control structures used to repeat a given section of code a certain number of times
or until a particular condition is met.
Source: www.tutorialscampus.com
Figure 90: Loops
237
Source: https://www.bouraspage.com
Figure 91: Control structure
The syntax of a computer language is the set of rules that defines the combinations of
symbols that are considered to be a correctly structured document or fragment in that
language.
A function is a block of organized, reusable code that is used to perform a single, related
action.
The waterfall model is a breakdown of project activities into linear sequential phases, where
each phase depends on the deliverables of the previous one and corresponds to a
specialization of tasks.
238
• Product
Requirements requirements
document
• Software
Design architecture
Implementation • Software
Verification
Maintainance
Source: https://en.wikipedia.org/wiki/Waterfall_model
Figure 92: Waterfall model
Spiral Model is a combination of a waterfall model and iterative model. Each phase in spiral
model begins with a design goal and ends with the client reviewing the progress.
12.3.2.3 Self-Assessment
i. What is Agile software development model?
ii. What are the benefits of agile approach?
iii. What is waterfall approach?
239
iv. If you needed to execute some code repeatedly based on a certain condition, which of
the following would you use?
A. Variable
B. Compiler
C. Loop
D. Conditional
v. Before source code can be compiled, it has to be _______________
A. Saved in a separate file
B. Viewed in a command prompt
C. Capitalized
D. Parsed
vi. You need special software to write programs?
A. True
B. False
vii. What is object-oriented programming?
A. A type of programming involving a structured method of creating programs
B. A type of programming using only numbers
C. A type of programming not in use anymore
D. A type of programming involving data types representing data structures
12.3.2.5 References
• https://techterms.com/definition/programming_language
• https://docs.microsoft.com/en-us/dotnet/visual-basic/programming-guide/language-
features/control-flow/loop-structures
• https://www.tutorialspoint.com/computer_programming/computer_programming_functio
ns.htm
• Computer Programming: Learn It, Try It!, authored by Brad Edelman published by
Capstone Global Library Ltd., 2017
• Computer Programming and Computer Systems authored by Anthony Hassitt, Anthony
Ralston published by Academic Press, 2014
240
12.3.3 Learning Outcome 2: Identify phases of program development
Design: In this phase the system and software design is prepared from the requirement
specifications, which were studied, in the first phase. System Design helps in specifying
hardware and system requirements and also helps in defining overall system architecture. The
system design specifications serve as input for the next phase of the model.
Testing: After the code is developed it is tested against the requirements to make sure that
the product is actually solving the needs addressed and gathered during the requirements
phase. During this phase all types of functional testing like unit testing, integration testing,
system testing, acceptance testing are done as well as non-functional testing are also done.
Deployment: After successful testing the product is delivered / deployed to the customer for
their use.
241
Read: Phase of program development: https://www.linkedin.com/pulse/what-software-
development-life-cycle-sdlc-phases-private-limited
12.3.3.3 Self-Assessment
i. What are the phases of program development?
ii. Prepare a timeline based on the phases of development for a developing a website.
iii. Prepare a timeline based on the phases of development for a mobile application.
iv. Read about software development processes.
v. Risk analysis of a project is done in:
A. System Analysis Phase
B. Feasibility Study
C. Implementation phase
D. Maintenance phase
vi. Which is the first step in the software development life cycle?
A. Analysis
B. Design
C. Problem/Opportunity Identification
D. Development and Documentation
vii. Which tool is use for structured designing?
A. Program flowchart
B. Structure chart
C. Data-flow diagram
D. Module
viii. A step-by-step instruction used to solve a problem is known as:
A. Sequential structure
B. A List
C. A plan
D. An Algorithm
ix. An iterative process of system development in which requirements are converted to a
working system that is continually revised through close work between an analyst and
user is called
A. Waterfall modeling
B. Iterative modeling
C. Spiral modeling
D. None of these above
12.3.3.5 References
• https://www.linkedin.com/pulse/what-software-development-life-cycle-sdlc-phases-
private-limited
242
• Computer Programming and Computer Systems authored by Anthony Hassitt, Anthony
Ralston published by Academic Press, 2014
• Computer Programming: Learn It, Try It!, authored by Brad Edelman published by
Capstone Global Library Ltd., 2017
243
Source: https://www.teach-ict.com
Figure 93: Data flow
A structure chart in software engineering and organizational theory is a chart, which shows
the breakdown of a system to its lowest manageable levels.
The architectural design is the highest abstract version of the system. It identifies the software
as a system with many components interacting with each other. At this level, the designers
get the idea of proposed solution domain.
244
The high-level design breaks the ‘single entity-multiple component’ concept of architectural
design into less-abstracted view of sub-systems and modules and depicts their interaction
with each other. High-level design focuses on how the system along with all of its
components can be implemented in forms of modules. It recognizes modular structure of
each sub-system and their relation and interaction among each other.
Detailed design deals with the implementation part of what is seen as a system and its sub-
systems in the previous two designs. It is more detailed towards modules and their
implementations. It defines logical structure of each module and their interfaces to
communicate with other modules.
12.3.4.3 Self-Assessment
i. What is HIPO diagram?
ii. Define high-level design.
iii. Differentiate between data-flow diagram and HIPO diagram?
iv. What is pseudocode?
v. Explain software design levels?
vi. Which of the following data structure is not linear data structure?
A. Arrays
B. Linked lists
C. Both of the above
D. None of the above
vii. A system flow chart describes the:
A. Details of each program module
B. Line diagram for particular program
C. Data files and operations and decision for a particular program
D. Sequence of operations techniques is used to simplify defining problem
viii. Which of the following items are discussed during the system implementation phase
of the application:
A. Program Specification
B. Software specification
C. Software maintenance
D. All of the above
ix. A system that groups a number of transactions for later processing is known is:
A. Client server
B. Batch system
C. Online system
D. Real time system
245
12.3.4.5 References
• https://www.teach-
ict.com/as_as_computing/ocr/H047/F451/312/slc_analysis/miniweb/pg4.htm
• https://www.tutorialspoint.com/software_engineering/software_design_basics.htm
• Computer Programming and Computer Systems, authored by Anthony Hassitt, Anthony
Ralston published by Academic Press, 2014
• Computer Programming: Learn It, Try It!, authored by Brad Edelman published by
Capstone Global Library Ltd, 2017
A data structure is a specialized format for organizing and storing data. General data
structure types include the array, the file, the record, the table, the tree, and so on. Any data
structure is designed to organize data to suit a specific purpose so that it can be accessed and
worked with in appropriate ways.
246
C is called a structured programming language because to solve a large problem, C
programming language divides the problem into smaller modules called functions or
procedures each of which handles a particular responsibility.
A function is a group of statements that together perform a task. Every C program has at
least one function, which is main, and all the most trivial programs can define additional
functions.
You can divide up your code into separate functions. How you divide up your code among
different functions is up to you, but logically the division is such that each function performs
a specific task.
A function declaration tells the compiler about a function's name, return type, and
parameters. A function definition provides the actual body of the function.
The C standard library provides numerous built-in functions that your program can call. For
example, strcat() to concatenate two strings, memcpy() to copy one memory location to
another location, and many more functions.
Return Type: A function may return a value. The return_type is the data type of the value
the function returns. Some functions perform the desired operations without returning a
value. In this case, the return_type is the keyword void.
Function Name: This is the actual name of the function. The function name and the
parameter list together constitute the function signature.
Parameters: A parameter is like a placeholder. When a function is invoked, you pass a value
to the parameter. This value is referred to as actual parameter or argument. The parameter list
refers to the type, order, and number of the parameters of a function. Parameters are optional;
that is, a function may contain no parameters.
Function Body: The function body contains a collection of statements that define what the
function does.
A function declaration tells the compiler about a function name and how to call the
function. The actual body of the function can be defined separately.
247
You may encounter situations, when a block of code needs to be executed several number of
times. In general, statements are executed sequentially: The first statement in a function is
executed first, followed by the second, and so on.
Programming languages provide various control structures that allow for more complicated
execution paths.
Source: www.tutorialspoint.com
Figure 94: Loop statement
o While loop: Repeats a statement or group of statements while a given condition is true. It
tests the condition before executing the loop body.
o For loop: Executes a sequence of statements multiple times and abbreviates the code that
manages the loop variable.
o Do...while loop: It is more like a while statement, except that it tests the condition at the
end of the loop body.
o Nested loops: You can use one or more loops inside any other while, for, or do..while
loop.
A loop becomes an infinite loop if a condition never becomes false. The ‘for’ loop is
traditionally used for this purpose. Since none of the three expressions that form the 'for' loop
are required, you can make an endless loop by leaving the conditional expression empty.
248
#include <stdio.h>
int main () {
for( ; ; ) {
return 0;
When the conditional expression is absent, it is assumed to be true. You may have an
initialization and increment expression, but C programmers more commonly use the for(;;)
construct to signify an infinite loop.
12.3.5.3 Self-Assessment
i. Explain the syntax for loop.
ii. Can a program be compiled without main() function?
iii. What is the advantage of declaring void pointers?
iv. What are command line arguments?
v. What is a variable?
vi. What is the output of the following program?
#include<stdio.h>
int x = 1;
switch(x)
default: printf("Hello");
}}
A. Hello
B. Hi
C. HelloHi
D. Compile error
vii. What is JV? Why is Java called the “Platform Independent Programming Language”?
viii. What are the features in JAVA?
ix. What is a class and give an example of class?
249
x. If, a moderately active person cuts their calorie intake by 500 calories a day, they can
typically lose about 4 pounds a month.
Write a Java and C program that lets the user enter their starting weight, then creates
and displays a table showing what their expected weight will be at the end of each
month for the next six month If they stay in this diet.
xi. Write a Java program that will calculate total of calories for every food classes
(protein, carbohydrate and fat) and then total up the calories of all the food classes.
The number of calories per gram of carbohydrate, fat and protein are 4, 7 and 9. The
program will allow user to enter the number of grams for every food class.
xii. Write a C program to compute the sum of the two given integer values. If the two
values are the same, then return triple their sum.
xiii. Which is a mechanism where one object acquires all the properties and behaviors of
the parent object?
A. Inheritance
B. Encapsulation
C. Polymorphism
D. None of the above
xiv. Java Virtual Machine is platform independent.
A. True
B. False
xv. Who is father of C Language?
A. Bjarne Stroustrup
B. James A. Gosling
C. Dennis Ritchie
D. Dr. E.F. Codd
12.3.5.5 References
• https://www.thoughtco.com/source-code-definition-958200
• http://www.vssut.ac.in/lecture_notes/lecture1424354156.pdf
• https://dzone.com/articles/15-tools-make-life-easy-java
• https://www.programiz.com/java-programming/basic-input-output
• https://www.tutorialspoint.com/cprogramming/c_functions.htm
• Java Programming 24-Hour Trainer (1st edition) authored by Yakov Fain published by
Wrox; 2011
• Computer Programming and Computer Systems authored by Anthony Hassitt, Anthony
Ralston published by Academic Press, 2014
• Computer Programming: Learn It, Try It!, authored by Brad Edelman published by
Capstone Global Library Ltd., 2017
250
12.3.6 Learning Outcome 5: Perform Program testing and debugging
Testing: Fundamentally, testing is a process to check if the system is working same as it was
supposed to do, and not working, as it was not supposed to do. It is done by the tester to
identify the defects in the system (actual result of test case execution is not matching with
expected result).
Debugging is the activity performed by developers to fix the bug found in the system. This is
manual step-by-step unstructured and unreliable process to find and removes a specific bug
from the system.
251
Source: https://dzone.com/articles/the-differences-between-testing-and-debugging
Figure 95: Dynamic testing and debugging
Smoke Testing: Whenever a new build is provided by the development team then the
software testing team validates the build and ensures that no major issue exists.
Functional Testing: This type of testing ignores the internal parts and focuses only on the
output to check if it is as per the requirement or not. It is a Black-box type testing geared to
the functional requirements of an application.
Security Testing: It is a type of testing performed by a special team of testers. A system can
be penetrated by any hacking way.
Performance Testing is done to check whether the system meets the performance
requirements. Different performance and load tools are used to do this testing.
252
Read: Software testing: https://www.softwaretestinghelp.com/types-of-software-testing/
Unit testing is a smallest testable portion of system or application, which can be compiled,
liked, loaded, and executed. This kind of testing helps to test each module separately.
Source: guru99.com
Figure 96: Flow of unit testing
White Box Testing: a software testing method in which the tester knows the internal
structure/design/implementation of the item being tested. Test design techniques include
Control flow testing, Data flow testing, Branch testing, Path testing.
Gray Box Testing: A software testing method which is a combination of Black Box Testing
method and White Box Testing method.
Agile Testing: A method of software testing that follows the principles of agile software
development.
Ad Hoc Testing: A method of software testing without any planning and documentation.
253
12.3.6.3 Self-Assessment
i. What is Functional Testing?
ii. Describe level of software testing?
iii. What is the difference between testing and debugging?
iv. Some incorrect word sequence in a program would generate
A. Semantics error
B. Syntax error
C. Runtime error
D. Logical error
v. Examination of the program step by step is called ______________
A. Controlling
B. Tracing
C. Stepping
D. Testing
vi. The examination of changing values of variables is called stepping.
A. True
B. False
vii. ____________ creates an inferior process that runs your program.
A. run
B. exit
C. execute
D. e
12.3.6.5 References
• http://www.softwaretestingclass.com/difference-between-testing-and-debugging/
• https://www.guru99.com/levels-of-testing.html
• http://softwaretestingfundamentals.com/software-testing-methods/
• Computer Programming and Computer Systems authored by Anthony Hassitt, Anthony
Ralston published by Academic Press, 2014
• Computer Programming: Learn It, Try It!, authored by Brad Edelman published by
Capstone Global Library Ltd., 2017
254
12.3.7 Learning Outcome 6: Perform User training and Program Maintenance
255
o Virus prevention and detection
12.3.7.3 Self-Assessment
i. What is software maintenance?
ii. Maintenance consist of the following action(s)
A. Replace of component
B. Repair of component
C. Service of component
D. All of the above
iii. Software Maintenance includes
A. Error corrections
B. Enhancements of capabilities
C. Deletion of obsolete capabilities
D. All of the mentioned
iv. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?
A. Corrective
B. Adaptive
C. Perfective
D. Preventive
v. ______________ measures the ability of a regression test selection technique to
handle realistic applications.
A. Efficiency
B. Precision
C. Generality
D. Inclusiveness
12.3.7.5 References
• https://www.researchgate.net/figure/Maintenance-tools-and-techniques_tbl1_227131529
• http://ecomputernotes.com/software-engineering/tools-for-software-maintenance
• https://www.hr.com/en/communities/training_and_development/list-of-training-
methods_eacwezdm.html
• https://www.researchgate.net/figure/Maintenance-tools-and-techniques_tbl1_227131529
256
• Computer Programming and Computer Systems authored by Anthony Hassitt, Anthony
Ralston published by Academic Press, 2014
• Computer Programming: Learn It, Try It!, authored by Brad Edelman published by
Capstone Global Library Ltd., 2017
257
CHAPTER 13: MOBILE APPLICATION DEVELOPMENT
13.1 Introduction
These are the key learning outcomes, which make up workplace function:
o Identify mobile application concepts
o Identify mobile application development environment
o Identify application design issues
o Develop mobile application
o Test the developed mobile application
o Publish and commercialize the developed application
258
o Types of Mobile applications: Hybrid, Native
o Mobile application development approaches: Native, Hybrid Native, Hybrid web,
Progressive web
o Reasons for mobile application
2. Hybrid apps for all platforms altogether with Xamarin, React Native, Ionic, and Angular
Mobile Sencha Touch etc.
13.3.2.3 Self-Assessment
i. Give 5 reasons to build successful mobile applications?
ii. Define mobile application.
iii. Explain types of mobile application?
iv. Language, which is supported by Android for application development?
A. PHP
B. VB.NET
C. Java
D. C++
v. Each application can have zero or more activities. True or False? Justify in short.
vi. Android is based on Linux for the following reason.
259
A. Portability
B. Security
C. Networking
D. All of these
vii. What was the main reason for replacing the Java VM with the Dalvik VM when the
project began?
A. Java VM ran too slow
B. Java VM was too complicated to configure
C. Java virtual machine was not free
D. There was not enough memory capability
viii. From a phone manufacturer's point of view, what makes Android so great?
A. Aside from some specific drivers, it provides everything to make a phone work
B. It allows them to compete with Apple's iPhone
C. It makes the hardware work better
D. It allows users to create apps, generating revenue for the companies
11.3.2.5 References
• https://mashable.com/article/build-mobile-apps/
• http://www.matchboard.com.au/MatchBoard/Forms/Article/App%20Appeal%20%2010%
20Great%20Reasons%20to%20build%20a%20Mobile%20App.aspx
• https://www.telerik.com/docs/default-source/whitepapers/choose-right-approach-mobile-
app-developmentbb581d10116543e79a9febdb187fd0a3.pdf?sfvrsn=0
• Android Application Development All-in-One For Dummies authored by Barry A. Burd
published by John Wiley & Sons Inc, 2015
• Beginning Android Programming With Android Studio (4th edition) authored by Jerome
DiMarzio published by Wrox;, 2016
260
o Mobile development frameworks; Native script, Flutter, React Native
o Mobile application development tools: Integrated Development Environment (IDE),
Graphic User Interface (GUI), Emulator, Android SDK
The Linux kernel is a free and open-source, monolithic, Unix-like operating system kernel.
The Linux family of operating systems is based on this kernel and deployed on both
traditional computer systems.
Dalvik is a discontinued process virtual machine in Google's Android operating system that
executes applications written for Android.
A Software Development Kit (SDK) is typically a set of software development tools that
allows the creation of applications for a certain software package, software framework,
hardware platform, computer system, video game console, operating system, or similar
development platform.
Native script this has been ranked as the top frameworks for the development of the hybrid
apps. Telerik, a Bulgaria based software company, which supports this framework and the
creator is Progress. The apps using the Native Scripts utilize the same APIs similar to using
Xcode or the Android Studio. You will get sufficient help in the form of tutorials from the
official website.
React Native is basically an open-source framework offering ample support to the IDEs and
the other mobile app development tools.
261
Read: Mobile Development framework: https://www.mindinventory.com/blog/mobile-app-
development-framework-2019/
The graphical user interface (GUI ) is a form of user interface that allows users to interact
with electronic devices through graphical icons and visual indicators such as secondary
notation, instead of text-based user interfaces, typed command labels or text navigation.
13.3.3.3 Self-Assessment
i. Explain mobile architecture?
ii. Explain briefly mobile development architecture?
iii. What is emulator?
iv. What is the name of the program that converts Java byte code into Dalvik byte code?
A. Mobile Interpretive Compiler (MIC)
B. Dex compiler
C. Dalvik Converter
D. Android Interpretive Compiler (AIC)
v. Required folder when Android project is created.
A. Build
B. Build/
C. Bin
D. Bin/
vi. Which of the following is not a component of an APK file?
A. Dalvik executable
B. Native Libraries
C. Resources
D. All of these are components of the APK
vii. Select a component which is NOT part of Android architecture.
A. Android framework
B. Libraries
C. Linux kernel
D. Android document
262
13.3.3.4 Tools, Equipment, Supplies and Materials
Software, Emulator, Mobile Device, Android SDK
13.3.3.5 References
• https://www.techopedia.com/definition/6010/application-stack
• https://www.cs.cmu.edu/~bam/uicourse/830spring09/BFeiginMobileApplicationDevelop
ment.pdf
• https://searchsoftwarequality.techtarget.com/definition/integrated-development-
environment
• https://www.techopedia.com/definition/30676/mobile-emulator
• Android Application Development All-in-One For Dummies authored by Barry A. Burd
published by John Wiley & Sons Inc., 2015
• Beginning Android Programming With Android Studio (4th edition) authored by Jerome
DiMarzio published by Wrox, 2016
The lifecycle of mobile development is largely no different than the SDLC for web or
desktop applications.
Hamburger Menu: Screen space is a precious commodity on mobile, and the hamburger
menu (or side drawer) is one of the most popular mobile navigation patterns for helping you
save it. The drawer panel allows you to hide the navigation beyond the left edge of the screen
and reveal it only upon a user’s action.
263
The tab bar pattern is inherited from desktop design. It usually contains relatively few
destinations, and those destinations are of similar importance and require direct access from
anywhere in the app.
13.3.4.3 Self-Assessment
i. Explain lifecycle of mobile development?
ii. Explain briefly navigation patterns and give example?
iii. Universal front end to database applications that connects to back end through
Internet, are the
A. Web browsers
B. Applications
C. Tools
D. Software programs
iv. _________ is largely no different than the SDLC for web or desktop applications.
The lifecycle of mobile development
A. Android application
B. Mobile development
C. None of the above
D. Both of the above
13.3.4.5 References
• https://www.smashingmagazine.com/2017/05/basic-patterns-mobile-navigation/
• https://www.corephp.com/blog/mobile-app-development-lifecycle/
• https://medium.com/@soulless/top-8-mobile-navigation-menu-design-for-your-
inspiration-8a2d925bffc0
• Android Application Development All-in-One For Dummies authored by Barry A. Burd
published by John Wiley & Sons Inc 2015
• Beginning Android Programming With Android Studio authored by Jerome DiMarzio
published by Wrox; 4 edition 2016
264
o Resources are defined in XML
o Framework components are defined
o SQL lite database is introduced
o Configuration of the Google play SDK is done
o Project prototype is created as per the scope
o Build the project prototype into a debuggable APK
o That can be installed to an emulator or Android powered device
Every application must have an AndroidManifest.xml file (with precisely that name) in its
root directory. The manifest presents essential information about the application to the
Android system; information the system must have before it can run any of the application's
code.
XML files that define a user interface layout. They are saved in res/layout/ and accessed
from the R.layout class.
XML files that define application menus, such as an Options Menu, Context Menu, or Sub
Menu. They are saved in res/menu/ and accessed from the R.menu class.
An activity is the entry point for interacting with the user. It represents a single screen with a
user interface. For example, an email app might have one activity that shows a list of new
emails, another activity to compose an email, and another activity for reading emails.
A service is a general-purpose entry point for keeping an app running in the background for
all kinds of reasons. It is a component that runs in the background to perform long-running
operations or to perform work for remote processes.
A broadcast receiver is a component that enables the system to deliver events to the app
outside of a regular user flow, allowing the app to respond to system-wide broadcast
265
announcements. Because broadcast receivers are another well-defined entry into the app, the
system can deliver broadcasts even to apps that aren't currently running.
A content provider manages a shared set of app data that you can store in the file system, in
a SQLite database, on the web, or on any other persistent storage location that your app can
access. Through the content provider, other apps can query or modify the data if the content
provider allows it.
13.3.5.3 Self-Assessment
i. What is activity?
ii. What is service?
iii. Explain briefly Resources defined in XML
iv. Differentiate XML and SDK?
v. How Long Does It Take To Build An App?
vi. What Is A Resource?
vii. Create Android program convert Temperature from Celsius to Fahrenheit and
Fahrenheit to Celsius?
viii. What happen if we all execute () more than once in Async Task
A. Nothing will happen
B. It will create those many threads
C. It will throw an error
D. It will throw an execution
ix. ADB is located in platform-tools folder under android-SDK
A. True
B. False
x. Can we create a different layout files for portrait and landscape mode?
A. One cannot create different layout files for portrait and landscape mode
B. One can create different layout files for portrait and landscape mode
x. A task can have multiple apps?
A. True
B. False
13.3.5.5 References
• https://www.tutorialspoint.com/android/android_resources.htm
• https://developer.android.com/guide/components/fundamentals
266
• https://www.ntu.edu.sg/home/ehchua/programming/android/Android_HowTo.html
• Android Application Development All-in-One For Dummies authored by Barry A. Burd
published by John Wiley & Sons Inc, 2015
• Beginning Android Programming With Android Studio (4th edition) authored by Jerome
DiMarzio published by Wrox, 2016
Mobile application testing is a process by which application software developed for handheld
mobile devices is tested for its functionality, usability and consistency. Mobile application
testing can be an automated or manual type of testing.
267
o Test method: There are two main ways of testing mobile applications: testing on real
devices or testing on emulators. Emulators often miss issues that can only be caught by
testing on real devices, but because of the multitude of different devices in the market,
real devices can be expensive to purchase and time-consuming to use for testing.
o Compatibility: It is necessary to test the compatibility; suppose an application can work
on the high resolution and it doesn't work on the lower resolution.
o Variety of mobile devices: Mobile devices differ in screen input methods (QWERTY,
touch, normal) with different hardware capabilities.
Testing applications on mobile devices is more challenging than testing web apps on the
desktop due to:
o Different range of mobile devices with different screen sizes and hardware configurations
like a hard keypad, virtual keypad (touch screen) and trackball etc.
o Wide varieties of mobile devices like HTC, Samsung, Apple and Nokia.
o Different mobile operating systems like Android, Symbian, Windows, Blackberry and
IOS.
o Different versions of operation system like iOS 5.x, iOS 6.x, BB5.x, BB6.x etc.
o Different mobile network operators like GSM and CDMA.
o Frequent updates – (like Android- 4.2, 4.3, 4.4, iOS-5.x, 6.x) – with each update a new
testing cycle is recommended to make sure no application functionality is impacted.
268
o Battery removal
o Cable insertion and removal for data transfer
o Network outage and recovery
o Media player on/off
o Device power cycle
o An application should be able to handle these interruptions by going into a
suspended state and resuming afterwards.
o Usability testing is carried out to verify if the application is achieving its goals and
getting a favorable response from users. This is important as the usability of an
application is its key to commercial success (it is nothing but user friendliness). Another
important part of usability testing is to make sure that the user experience is uniform
across all devices. This section of testing hopes to address the key challenges of the
variety of mobile devices and the diversity in mobile platforms/OS, which is also called
device fragmentation. One key portion of this type of usability testing is to be sure that
there are no major errors in the functionality, placement, or sizing of the user interface on
different devices.
o Installation testing: Certain mobile applications come pre-installed on the device
whereas others have to be installed by the store. Installation testing verifies that the
installation process goes smoothly without the user having to face any difficulty. This
testing process covers installation, updating and uninstalling of an application
o Certification testing: To get a certificate of compliance, each mobile device needs to be
tested against the guidelines set by different mobile platforms.
o Security testing checks for vulnerabilities to hacking, authentication and authorization
policies, data security, session management and other security standards.
o Location testing: Connectivity changes with network and location.
o Outdated software testing: Not everyone regularly updates their operating system. Some
Android users might not even have access to the newest version. Professional testers can
test outdated software.
o Load testing: When many users all attempt to download, load, and use an app or game
simultaneously, slow load times or crashes can occur causing many customers to abandon
your app, game, or website. In-country human testing done manually is the most effective
way to test load.
o Black box testing doesn't include the internally coding logic of the application. The tester
tests the application with functionality without peering with internally structure of the
application. This method of test can be applied virtually to every level of software testing:
unit, integration, system and acceptance.
o Crowdsourced testing: In recent years, crowdsourced testing has become popular as
companies can test mobile applications faster and cheaper using a global community of
testers. Due to growing diversity of devices and operating systems as well as localization
needs, it is difficult to comprehensively test mobile applications with small in-house
testing teams. A global community of testers provides easy access to different devices
and platforms. A globally distributed team can also test it in multiple locations and under
different network conditions. Finally, localization issues can be tested by hiring testers in
269
required geographies. Since real users using real devices test the application, this is more
likely to find issues faced by users under real world conditions.
Basic Difference Between Mobile And Desktop Application Testing: Few obvious aspects
that set mobile app testing apart from the desktop testing
o On the desktop, the application is tested on a central processing unit. On a mobile device,
the application is tested on handsets like Samsung, Nokia, Apple, and HTC.
o Mobile device screen size is smaller than a desktop.
o Mobile devices have less memory than a desktop.
o Mobiles use network connections like 2G, 3G, 4G or WIFI where desktop use broadband
or dial-up connections.
o The automation tool used for desktop application testing might not work on mobile
applications.
The debugger allows you to control the execution of your application by:
o Setting breakpoints.
o Suspending launched applications.
o Stepping through your code.
o Examining the contents of the variables and view them on an emulator.
13.3.6.3 Self-Assessment
i. What is debugging?
ii. How is mobile application testing different for different mobile?
iii. You are to prepare a mobile application of online grocery shopping (android). What
are the key parameters for testing and debugging?
270
iv. __________ ensures that the application is working as per the requirements. Most of
the tests conducted for the user drives this interface and call flow.
A. Black box testing
B. Functional testing
C. Location testing
D. None of above
v. ___________ connectivity changes with network and location.
A. Location testing
B. Installation testing
C. Testing
D. Program testing
11.3.6.5 References
• https://www.softwaretestinghelp.com/beginners-guide-to-mobile-application-testing/
• https://docs.oracle.com/cd/E37975_01/doc.111240/e24475/debugging.htm#ADFMF1047
• Android Application Development All-in-One For Dummies authored by Barry A. Burd
published by John Wiley & Sons Inc., 2015
• Beginning Android Programming With Android Studio (4th edition) authored by Jerome
DiMarzio published by Wrox, 2016
271
API monetization is the process by which businesses create revenue from their application
programming interfaces (APIs). APIs are the cornerstone of what is widely seen as the next
iteration of business development, where having well-developed APIs establishes and
maintains relationships in a digital economy. APIs are the wholesale version of a web
presence, allowing others to access and integrate your data and resources into their public or
private sites and applications.
13.3.7.3 Self-Assessment
i. What is API?
ii. Define application distribution through application stores
iii. ____________ is the process by which businesses create revenue from their
application programming interfaces (APIs).
A. API terminal
B. API monetization
C. API content
D. None of above
iv. You are mobile developer and your client ask you to cerate for him a e-commerce
mobile application and he wanted users to pay through mobile money how will you
do it?
v. ____________ is a software update comprised code inserted into the code of an
executable program.
A. Enterprise application
B. Patch
C. Update
D. Upgrade
E. None of above
272
11.3.7.5 References
• https://docs.microsoft.com/en-us/windows/desktop/msi/patching-and-upgrades
• https://www.redhat.com/en/topics/api/what-is-api-monetization
• Android Application Development All-in-One For Dummies authored by Barry A. Burd
published by John Wiley & Sons Inc 2015
• Beginning Android Programming With Android Studio authored by Jerome DiMarzio
published by Wrox; 4 edition 2016
273
CHAPTER 14: SYSTEM ANALYSIS AND DESIGN
14.1 Introduction
These are the key learning outcomes, which make up workplace function:
o Understand System Analysis and Design Fundamentals
o Understand Approaches to system Development and Project planning.
o Perform System Analysis
o Identify Essentials of System Design
o Understand advanced Design Concepts
o Perform System Implementation
o Understand Current Trends in System Development
274
Trainees to demonstrate knowledge in relation to:
o Define system, system design and system analysis
o Constrains of system: Interconnectivity, Objectives of organization
o Properties of a system
Organization, Interaction, Interdependence, Integration
o Elements of a system: Control, Input, Process, Output
o Classification of systems
o Types of Information system: Physical, Open or closed, Adaptive and non-adaptive,
Permanent and temporary, System models
o Schematic
o Flow system
o Static system
o Dynamic system: Categories of Information, Strategic, Management, Operational
Systems analysis is effective when all sides of the problem are reviewed. Systems design is
most effective when more than one solution can be proposed. The plans for the care and
feeding of a new system are as important as the problems they solve
Organizational objectives are short-term and medium-term goals that an organization seeks
to accomplish. An organization's objectives will play a large part in developing
organizational policies and determining the allocation of organizational resources.
A system has three basic elements input, processing and output. The other elements include
control, feedback, boundaries, environment and interfaces.
Input: Input is what data the system receives to produce a certain output.
Output: What goes out from the system after being processed is known as Output.
Control: In order to get the desired results it is essential to monitor and control the input,
Processing and the output of the system. This job is done by the control.
Processing: The process involved to transform input into output is known as Processing.
275
Systems are classified into the following categories:
o Liner and Non-liner Systems
o Time Variant and Time Invariant Systems
o Liner Time variant and Liner Time invariant systems
o Static and Dynamic Systems
o Causal and Non-causal Systems
o Invertible and Non-Invertible Systems
o Stable and Unstable Systems
Static systems are those whose output depends on the only present value of the input. Static
systems are the physically reliable system. Dynamic systems are those whose output depends
on the present as well as past value of the input. A dynamic system is not physically reliable.
14.3.2.3 Self-Assessment
i. What are the elements of system? Explain each of them.
ii. What is the difference between a static and dynamic system?
iii. ________ is a concept that is used in numerous fields such as cybernetics, network
theory, and non-linear dynamics.
A. Interconnectivity
B. System
C. System analysis
D. Both of above
iv. A system has three basic elements:
A. Input
B. Processing
C. Output
D. Both of above
E. None of above
276
v. _________ are those whose output depends on the only present value of the input.
Static systems are the physically reliable system.
A. Schematic
B. Static Systems
C. Operating System
14.3.2.5 References
• https://www.yourdictionary.com/systems-analysis-design
• https://www.definitions.net/definition/interconnectivity
• https://www.quora.com/What-is-the-difference-between-a-static-and-dynamic-system
• http://jhigh.co.uk/Using%20Information/13%20Categories%20of%20Informaiton%20Sy
stems.html
• Systems Analysis and Design in a Changing World authored by Stephen D. Burd , John
W. Satzinger , Robert Jackson published by Cengage Learning, Inc
• Systems Analysis and Design authored by Scott Tilley, Harry J. Rosenblatt
The systems development life cycle (SDLC), also referred to as the application development
life-cycle, is a term used in systems engineering, information systems and software
277
engineering to describe a process for planning, creating, testing, and deploying an
information system. The systems development lifecycle concept applies to a range of
hardware and software configurations, as a system can be composed of hardware only,
software only, or a combination of both. There are usually six stages in this cycle: analysis,
design, development and testing, implementation, documentation, and evaluation.
Requirement
Analysis
Evolution Design
Tesing Implementation
Source: blog.usejournal.com/
Figure 97: Software System Development Lifecycle
Activities such as budgets, requirements gathering, and documentation writing, are included
in the cycle, as well as the more technical elements. SDLC usually begins with determining
customer business needs, which is followed by implementation and testing.
14.3.3.3 Self-Assessment
i. What is SDLC?
ii. List the approached sin SDLC
iii. SDLC stand for:
A. Systems Development Life Cycle
B. System Debugging Life Cycles
C. System Design Life Cycle
iv. How is the component of maintenance incorporated in the SDLC model
278
12.3.3.4 Tools, Equipment, Supplies and Materials
Data Dictionary, Decision Trees, Decision Tables, software, computer
14.3.3.5 References
• https://www.dlsweb.rmit.edu.au/Toolbox/knowmang/content/gathering_data/systems_dev
elopment_methodologie.htm
• Systems Analysis and Design in a Changing World authored by Stephen D. Burd, John
W. Satzinger , Robert Jackson published by Cengage Learning, Inc.
• Systems Analysis and Design authored by Scott Tilley, Harry J. Rosenblatt
279
Source: www.tutorialspoint.com
Figure 98: System analysis
A systems analyst is a person who uses analysis and design techniques to solve business
problems using information technology. Systems analysts may serve as change agents who
identify the organizational improvements needed, design systems to implement those
changes, and train and motivate others to use the systems.
Structured Analysis is a development method that allows the analyst to understand the
system and its activities in a logical way.
o It is graphic which specifies the presentation of application.
o It divides the processes so that it gives a clear picture of system flow.
o It is logical rather than physical i.e., the elements of system do not depend on vendor or
hardware.
o It is an approach that works from high-level overviews to lower-level details.
During Structured Analysis, various tools and techniques are used for system development.
They are:
• Data Flow Diagrams
• Data Dictionary
• Decision Trees
• Decision Tables
• Structured English
• Pseudocode
280
Source: www.tutorialspoint.com
Figure 99: Structured analysis tools
14.3.4.3 Self-Assessment
i. Define system analysis?
ii. What is system analyst?
iii. Explain structure analysis tools?
iii. ______ is the process of understanding and specifying in detail what the information
system should accomplish.
A. Systems Design
B. Automation
C. Systems Analysis
D. Strategic Planning
iv. A ____ is a IT professional who uses analysis and design techniques to solve business
problems using information technology
A. Systems Analyst
B. Database Administrator
C. Project Manager
D. Network Administrator
v. A(n) ____ to the SDLC is used when the exact requirements of a system or the users’
needs are not well understood
A. Systems Development Life Cycle
B. Adaptive Approach
C. Predictive Approach
281
D. Unified Process
vi. A(n) ____ is a representation of an important aspect of the real world.
A. Model
B. System Development Methodology
C. Tool
D. Iteration
14.3.4.5 References
• https://www.tutorialspoint.com/system_analysis_and_design/system_analysis_and_desig
n_overview.htm
• Systems Analysis and Design in a Changing World authored by Stephen D. Burd, John
W. Satzinger, Robert Jackson published by Cengage Learning, Inc
• Systems Analysis and Design authored by Scott Tilley, Harry J. Rosenblatt
282
Detailed, Data Modeling techniques, Conceptual, Relational, Object Oriented
This triangular approach aides both development teams, who become more aware of
management’s priorities, and project managers, who are forced to take a more realistic view
of the system design process in terms of quality, cost and meaningful deadlines.
A project can implement one or more system designs. The purpose of defining each system in
this way is to provide a precise, manageable explanation of the work to be done during
construction and testing. For example, a completed design for a website may include
drawings of sample screenshots, flowcharts showing linking connections, or a Flash demo.
Timeliness
Cost-
Quality effectiveness
Component
of design
283
Outputs and Inputs
The main aim of a system is to produce an output, which is useful for its user.
Inputs are the information that enters into the system for processing.
Output is the outcome of processing.
Physical System may be static or dynamic in nature. For example, desks and chairs are the
physical parts of computer center, which are static. A programmed computer is a dynamic
system in which programs, data, and applications can change according to the user's needs.
Data modeling is the process of creating a data model for the data to be stored in a
Database.
Relational : The most common model, the relational model sorts data into tables, also known
as relations, each of which consists of columns and rows.
14.3.5.3 Self-Assessment
i. ______ is the process of creating a data model for the data to be stored in a Database.
A. Data modeling
B. Unified Modeling
C. Design modeling
ii. Explain briefly software requirements specification?
iii. _______ may be static or dynamic in nature. For example, desks and chairs are the
physical parts of computer center, which are static.
A. Data modeling
B. Physical System
C. Conceptual data model
D. Both of above
v. The ____ is an object-oriented system development methodology offered by IBM’s
Rational Software.
A. Unified Process
B. Structured System
284
C. Class Diagram
D. Entity-Relationship Diagram
14.3.5.5 References
• https://www.tutorialspoint.com/system_analysis_and_design/system_analysis_and_desig
n_overview.htm
• Systems Analysis and Design in a Changing World authored by Stephen D. Burd , John
W. Satzinger , Robert Jackson published by Cengage Learning, Inc
• Systems Analysis and Design authored by Scott Tilley, Harry J. Rosenblatt
File organization is very important because it determines the methods of access, efficiency,
flexibility and storage devices to use. There are four methods of organizing files on a storage
media.
285
When a file is used, information is read and accessed into computer memory and there are
several ways to access this information of the file.
Sequential Access: It is the simplest access method. Information in the file is processed in
order, one record after the other. This mode of access is by far the most common; for
example, editor and compiler usually access the file in this fashion.
Direct access: method also known as relative access method a filed-length logical record
that allows the program to read and write record rapidly in no particular order. The direct
access is based on the disk model of a file since disk allows random access to any file block.
For direct access, the file is viewed as a numbered sequence of block or record.
Integrity models keep data pure and trustworthy by protecting system data from intentional
or accidental changes. Integrity models have three goals:
Access control is a security technique that regulates who or what can view or use resources
in a computing environment.
Physical access control limits access to campuses, buildings, rooms and physical IT assets
Logical access control limits connections to computer networks, system files and data.
14.3.6.3 Self-Assessment
i. What is integrity model?
ii. What is file organizing?
iv. Differentiate file organizing and file control methods?
v. What are the difference between direct access and sequential access?
vi. The types of Data Modeling techniques are
A. Entity Relationship Model
B. Unified Modeling Language
C. Data structure
D. Both of above
E. None of Above
286
vii. ________It is the simplest access method. Information in the file is processed in
order, one record after the other.
A. Direct access
B. Sequential Access
C. Integrity models
D. Both of above
E. None
viii. _______ keep data pure and trustworthy by protecting system data from intentional or
accidental changes.
A. Integrity models
B. Direct access
C. Security Control
D. None
ix. ______ is very important because it determines the methods of access, efficiency,
flexibility and storage devices to use.
A. File organization
B. Entity Relationship
C. File access
D. Both of above
E. None of above
14.3.6.5 References
• https://www.open.edu/openlearn/science-maths-technology/introduction-software-
development/content-section-6
• http://www.pearsonitcertification.com/articles/article.aspx?p=2218577&seqNum=3
• https://searchsecurity.techtarget.com/definition/access-control
• Systems Analysis and Design in a Changing World authored by Stephen D. Burd , John
W. Satzinger , Robert Jackson published by Cengage Learning, Inc
• Systems Analysis and Design authored by Scott Tilley , Harry J. Rosenblatt
287
14.3.7 Learning Outcome 6: Perform system implementation
The Quality Assurance: Strategy defines the quality standards for the project and
determines how they are satisfied.
Data conversion is the process of translating data from one format to another while retaining
its viability and quality.
14.3.7.3 Self-Assessment
i. What is program development?
ii. What is data conversion?
iii. In the implementation phase of System Analysis and Design, following are included:
A. Parallel run
B. Sizing
C. Specification freeze
D. All of these
iv. System Implementation is necessary because:
A. Human never gets it right the first time
B. The Deployment may change over time
C. The User’s needs may change over time
D. All of the above
v. Which of the following is/are true about Close-out review or Post-implementation
review?
A. Understanding of cost-benefits
288
B. Goals achieved vis-à-vis targets
C. User friendliness of the system
D. All of these
vi. Unit implementation of software does not involve:
A. Source coding and compiling
B. Linking and creation of machine code files
C. Writing program codes for interfaces and compilation
D. All of the above
14.3.7.5 References
• https://www.sqa.org.uk/e-learning/ProjMan03CD/page_09.htm
• https://www.guru99.com/system-testing.html
• Systems Analysis and Design in a Changing World authored by Stephen D. Burd , John
W. Satzinger , Robert Jackson published by Cengage Learning, Inc
• Systems Analysis and Design authored by Scott Tilley , Harry J. Rosenblatt
289
14.3.8.2 Information Sheet
Abstraction is the act of representing essential features without including the background
details or explanations.
Software models are ways of expressing a software design. Usually some sort of abstract
language or pictures are used to express the software design. For object-oriented software, an
object modeling language such as UML is used to develop and express the software design.
290
14.3.8.3 Self-Assessment
i. What model-driven architecture?
ii. _______ is a set of components working together so they address a number of
problems in one or more domains.
A framework
A. Object-oriented
B. A model-driven
C. Both of above
iii. Agile Software Development is based on
A. Incremental Development
B. Iterative Development
C. Linear Development
D. Both Incremental and Iterative Development
iv. Which on of the following is not an agile method?
A. XP
B. 4GT
C. AUP
D. All of the mentioned
v. Agility is defined as the ability of a project team to respond rapidly to a change.
A. True
B. False
14.3.8.5 References
o http://www.informit.com/articles/article.aspx?p=27123
o https://www.dre.vanderbilt.edu/~schmidt/CACM-frameworks.html
o http://sahet.net/htm/swdev4.html#componentfw
o http://www.methodsandtools.com/archive/archive.php?id=5
o Systems Analysis and Design in a Changing World authored by Stephen D. Burd, John
W. Satzinger, Robert Jackson published by Cengage Learning, Inc
o Systems Analysis and Design, authored by Scott Tilley, Harry J. Rosenblatt
291