SS2 COMPUTER STUDIES 2ND TERM NOTE
SCHEME OF WORK FOR 2024/2025
WEEK TOPIC
1 • · REVIEW OF FIRST TERM EXAM QUESTION
• · WRITING THE SCHEME OF WORK
2-3 CONCEPT OF COMPUTER FILES
· Definition of terms – Data, field, record, file
· Types of data items
· Types of file organization method
· Method of accessing files
· Computer file classification
· Criteria for classifying computer files
4-5 HANDLING COMPUTER FILES
· Basic operations on computer files
· File insecurity and its effect
· Methods of file security
· Advantages /disadvantages (Limitations) of computer file
· Differences between computer files and manual file
6-7 SYSTEM DEVELOPMENT CYCLE (SDC)
· Definition of System Development Cycle
· Description of the stages in the SDC
CONCEPT OF COMPUTER FILE
Definition of terms
• 1. Data: a raw fact that has not been processed. It is the smallest unit (an
item) of information e.g. James, 45, Male etc.
• 2. Field: it is a space/named area of a record allocated to store an item of
information, e.g. Name, Age, Gender etc.
• 3. Record: It is a collection of related data items or fields about an entity
i.e. a person, thing or place. For example, a student record may consist of
his/her gender, name, age etc.
• 4. (Computer) file: A file can be defined as a collection of related records
that give a complete set of information about a certain item or entity.
• 1. A computer file is defined as the smallest meaningful unit of data
representation within a computer.
2. A computer file is a block of arbitrary information, or resource for storing
information, which is available to a computer program and usually on some
kind of durable storage.
A file may also refer to an object on a computer that stores data, information,
settings, or commands used with a computer program. In a graphical user interface
(GUI) such as Microsoft Windows, files display as icons that relate to the program
that opens the file.
A file is created using a software program on the computer. For example, to create
a text file you would use a text editor (notepad), to create an image file you would
use an image editor (paint,corel draw etc.), and to create a document you would
use a word processor (Microsoft Word, Word Perfect etc).
Computer files are stored on a drive (e.g., the hard drive), disc (e.g., DVD), and
a diskette (e.g., floppy disk) and may also be contained in a folder (directory) on
that medium.
Every created file has an extension. A file extension or file name extension is the
ending of a file that helps identify the type of file in operating systems, such
as Microsoft Windows. In Microsoft Windows, the file name extension is a period
that is often followed by three characters, but may also be two or four characters
long. As an example the file name "[Link]" has a file extension of ".txt", which
is a file name extension associated with text files.
Assignment:
List the type of file associated with each of the following file extensions:
1.”.3gp” 2. “.exe” 3. “.dll” 4. “.bat” 5. “.html” 6.
“.cmd”
7. “.rtf” 8. “.accdb” 9. “.pptx” 10. “.cdr”
Types of data items
The following are types of data (item):
· Numeric data: these consists of digits (0-9) e.g. 1, 43, 0.56 etc.
· Alphabetic data: these consists of alphabetic characters (A-Z or a-z) only
e.g. School, Bond, Name etc.
· Alphanumeric data: these are data made up of combination or alphabets
and numbers.
Types of File Organisation Method
File organization is a way of organizing the data or records in a file. It refers to
how the contents of a file are added and accessed, but not how files are organized
in folders. The four file organisation methods are:
• 1. Serial file organisation: records are stored in the order they occur.
They have not been sorted in any particular order.
• 2. Sequential file organisation: records are stored in a sorted order of a
particular field(s), usually the key field(s).
• 3. Indexed file organisation: An indexed file contains records ordered
by a record key. A record key uniquely identifies a record and determines the
sequence in which it is accessed with respect to other records.
• 4. Random or direct file organisation: records are stored randomly in
no particular order i.e. in any sequence
Methods of Accessing Files
Access method is a mechanism or manner in which the records in a file may be
accessed. It defines the way the read and write operations are done. The methods
of accessing files include:
• 1. Sequential access: a sequential file access is that in which the records
are accessed in some sequence i.e., the information in the file is processed in
order, one record after the other. It requires the program to start writing or
reading at the beginning and continues until it finds the desired data. Device
like magnetic tape enforces sequential access method.
• 2. Direct/random access: the records on the storage location can be
accessed (read or written to) in any order i.e. randomly/directly. Devices
such as magnetic disk storage and the main storage i.e. RAM and ROM are
based on this method.
• 3. Indexed-sequential access: this mechanism is built on the basis of
sequential access. An index is created for each file which contains pointer to
various records (blocks). Index is searched sequentially and its pointer is
used to access the file directly.
Computer File Classifications
Computer files can be classified as follows:
• 1. Master file: This is a computer file that is used as the authority in a
given job that is relatively permanent. It is
a permanent file, periodically updated, that serves as an authoritative
source of data. It is an original file from which duplicates are made.
• 2. Transaction file: It is a computer file containing relatively transient
data about a particular data processing task. It is a file, especially a data file,
containing transaction records, used to update the master file.
• 3. Reference file: This is a computer file containing data, which is kept
so that it can be referenced for future use. It is stable and permanent in
nature.
Criteria for classifying computer file
Computer files can be classified according to the following criteria:
1. Nature of content: files of similar contents are classified together. Examples
are database file, word processed file etc.
2. Organisation method i.e. whether sequential, direct etc.
3. Storage medium: whether they are stored in tapes, disks or any other
storage devices.
TOPIC TWO: HANDLING COMPUTER FILES
Basic operations on Computer files
The following are some of the basic operations on a computer file:
• 1. File creation: using an application package to create a file
• 2. File deletion: an unneeded file can be removed (deleted) from the
computer to free up disk space.
• 3. File retrieval: the file is brought out from where it is located for
further processing
• 4. File copy: process of making duplicate copies of a file
• 5. File open: files are loaded (opened) before it can be used. The content
are being displayed on the screen
• 6. File close: when you are done with a file and need to free up main
memory space, you close the file.
• 7. File read: The file read operation is performed just to read the data
that are stored in the required file. No addition is done to the file.
• 8. File Write: The file write operation is used to write the data to the file,
again, generally at the current position.
• 9. File Update: making changes to the content/records of a file
• 10. File Rename: The file rename operation is used to change the name of
the existing file.
File insecurity and its effect
File insecurity is a concept that a file is always vulnerable and is prone to be lost or
missing in the computer. Virus attack, careless deletion of files, hardware
failure/malfunctioning etc. are some of the causes of file insecurity.
The following are the effects of file insecurity:
1. Loss of data
2. Data unreliability
3. Data corruption
Methods of File Security
The methods of file security include:
1. Use of backup: make copy of computer files on DVD, external HD, CD etc.
2. Use of antivirus: install and update antivirus to avoid virus attack
3. Passwords: Password your computer to prevent unauthorized access to the
files.
4. Proper labeling of storage devices: this helps in identifying what file is
stored in a particular storage device
5. Disk/directory/file encryption: encode/encrypt the file to make it
meaningless to anyone that may have unauthorized access to it.
6. Physical security: e.g. security guards, alarm systems, lock on rooms and on
computer etc.
Advantages and disadvantages of computer file
Advantages
1. Faster and efficient in processing of information
2. More secure
3. Fast to access
4. Uses less space
5. More accurate
6. Can be updated
7. Permits long term storage and retrieval
Disadvantages/limitations
1. Expensive to set up
2. Require power supply
3. Data are often duplicated
4. Can be corrupted
5. Vulnerable to virus attack
6. Requires formal training to handle
Differences between Computer Files and Manual Files
Computer files Manual files
More secured Less secured
More reliable Less reliable
Can easily and neatly be modified Cannot be easily and neatly modified
Fast to access Slow to access especially if there is
large number of file to check from
Can be attacked by virus and worms Can be attacked by rodents, insects,
fire etc.
TOPIC THREE: SYSTEM DEVELOPMENT CYCLE (SDC)
Software Development Cycle (SDC) or Software Development Life Cycle (SDLC)
is a process that consists of a series of planned activities to develop or alter an
Information system.
System development Cycle can be thought of as a set of activities that analysts,
designers and users carry out to develop and implement an information system.
Stages in the SDC
The diagram below shows the stages involved in the SDC, starting from the initial
stage i.e. the preliminary study to the study review stage. Note that since this is a
cycle, the event may be repeated.
The stages in the SDC include the following:
• 1. Preliminary
• 2. Feasibility study
• 3. Investigative
• 4. Analysis
• 5. Design
• 6. Implementation
• 7. Maintenance
• 8. Study review
Description of the stages in SDC
1. Preliminary: The intended goal (i.e. what the system will do) of the project
(information system) is established in this stage.
2. Feasibility study: This is the study carried out before development of the
system to ascertain if the proposed system is possible, practical and can
serve a purpose.
3. Investigative: The project goals are restated into specific functions and
operation of the intended system. Whatever the end-user want, how he/she
wants it and when he/she wants it is considered and analysed here.
4. Analysis: The goal of the system analysis is to examine the type of the
system on the basis of user requirements (what the user needs in the system).
5. Design: Designing the system in terms of user interface, data storage and
data processing functions on the basis of the analysis phase by developing
system flowcharts, system and data flow diagrams, screen layouts and
reports.
6. Implementation: programming the system as designed and conducts the
continuous testing and debugging. The user accepts it at this stage before
migration to live environment.
7. Maintenance: This stage involves making changes, corrections, additions to
the software while in use.
8. Study review: The system is continuously evaluated as it functions in the
live environment; this is done to see if there is need for upgrade or
replacement of the system.
Basic File Operations
Following are some of the basic file operations:
1. Create: To make a new file
2. Delete: To remove a file from a disk
3. Retrieve: To find a file and bring it back
4. Copy: To produce a file so that it is the same as the original piece of work
5. View: To see the files in a folder
6. Update: A manipulation involving adding, modifying, or deleting data to bring a
file up-to-date
7. Open: Open a file for editing
8. Close: To exit the edited file.
9. Rename: To change the name of a file
Sequential File Creation
There are many ways to organize data in a sequential file. One way is by using
BASIC Programming Language.
Steps involved in Creating a Sequential File Using BASIC
1. Choose a DOS file name: A DOS file name is a string consisting of a base name
of at most eight characters followed by an optional extension consisting of a period
and at most three characters. Blank spaces are not allowed. Some examples of
DOS file names are INCOME.86, [Link]. And FORT500.
2. Choose a number from 1 through 255 to be the reference number of the file:
While the file is used, it will be identified by this number. <br3. Execute the
statement. OPEN file name FOR OUTPUT AS #n. Where n is the reference
number.
4. Place data into the file with the WRITE statement.
5. After all the data have been recorded in the file, execute CLOSE #n</br
Example 1: A program to demonstrate the use of WRITE statement
REM Demonstrate use of WRITE statement
CLS
WRITE “ENIAC”
WRITE 1946
WRITE “ENIAC, 1946
LET a$ = “Eckert”
LET b$ = “Mauchly”
WRITE 14*139, “J.P. “ , a$, b$, “John”
END
[run]
output
ENIAC
1946
ENIAC 1946
1946, J.P. Eckert, Mauchly, John
Example 2: Write a program to create a file [Link] with marks in
English and Mathematics.
REM a program to create a file [Link] and record data into it
OPEN “[Link]” FOR OUTPUT AS #1
READ Maths$, Eng$
DO WHILE names$ <> “EOD”
WRITE #1, names$, Maths$, Eng$
READ names$, Maths$, Eng$
LOOP
CLOSE #1
DATA Joy, 87, 75
DATA Gbenda, 88, 67
DATA Viola 77, 70
DATA EOD, 0, 0
END
Accessing a Sequential File
Data stored in a sequential file can be accessed and read in order with the
following steps:
1. Choose a number from 1 to 255 to be the reference number for the file
2. Execute the statement. OPEN filename FOR INPUT AS n. where n is the
reference number
3. Read data from the file with the INPUT statement.
4. After the desired items have been found close the file with the statement CLOSE
#n.
Example: 3 write a program to display the contents of [Link]
Solution
REM Read data from [Link] file
OPEN “[Link]” FOR INPUT AS #1
PRINT “Name”, English”, Mathematics”
DO WHILE NOT EOF (1)
REM process the entire file
INPUT name$, Maths$, Eng$
LOOP
CLOSE #1
END
File Insecurity
File security is a feature of a file system which controls which users can access
which files, and places limitations on what users can do to it. If these measures are
not put in place, files would be insecure.
Effects of File Insecurity
The effects of file insecurity are:
1. Result to file loss
2. Data will become unreliable
3. It will lead to data corruption
File Security Methods
(i) Use of backups: This refers to making copies of data so that these additional
copies are used to restore the original after the loss event. It is also a method of
making copies of the file in a separate location so that they can be restored if
something happens to the computer. This can be done by using removable media
such as a rewritable CD, memory card, flash etc.
(ii) The use of antivirus: A virus is a self–replicating program that copies itself
and that can infect other programs by modifying them or their environment. An
anti-virus is software designed to detect and destroy computer viruses.
(iii) The use of password: A password is a string of characters used for
authenticating a user on a computer system. It can prevent people from accessing a
computer system, account files or parts of files by requiring a user to enter a
password.
(iv) Proper label of storage device: You should label your storage devices like
floppies, CDs, DVDs, Pen drivers etc. So that you know what is exactly stored in
them and so as not to accidentally delete or format them.
(v) File management: file management is the process of maintaining folders,
documents and multimedia into categories and subcategories as desired by a user.
DIfferences Between Computer files and Manual Files
Computer File Manual File
Computer files are transferred Manual files can be transported
electronically. through physical means
Computer files are difficult to destroy and Manual files can warn off and can be
can last for a long time depleted easily by hand
Difficult to access at all times Easy to access whenever required
Large amount of information can be stored It is difficult to store a large amount of
and transferred information manually
Advantages of Computerized Files
(i) Computer can perform calculations quickly and efficiently.
(ii) Data can be retrieved quickly and easily.
(iii) Documents that are lost can often be retrieved.
(iv) Security is tight and hard to break into.
(v) Makes work easier.
(vi) Quicker to find things and sort things.
(vii) Transactions can be handled more properly by computers than manually.
Limitations of Computerised Files
(i) Computerized filing system is expensive to set up.
(ii) Not effective where there is irregular electric supply.
(iii) Skilled labour with proficiency in computers is required.
File Contents
On the atomic level, all the information in a file is binary, or just a series of
ones and zeros. A computer file may contain;
i. Document: A document includes any file created by a user.
ii. Program: Program files contain instructions for the computer’s
microprocessor.
iii. Data: Data files include all other files that aren’t programs or documents.
File Functions
Files are used to do one or more of the following functions:
a. They provide machine-executable code
b. They store application programs or operating system configuration
c. They store data used by the users such as Microsoft Word files.
Computer File Terms
1. Record: A record is a collection of related fields.
2. Field: Field is a single piece of information about an object. A is also
defined as a space that holds specific parts of data from a set or a record.
Examples of fields are NAME, ADDRESS, QUANTITY, AGE, etc.
3. Data element: A data element is the logical definition of a field
4. Data item: Data item is the actual data stored in the field
Types of Data Items
Each data element consists of only a single item. These items will have one
of the three basic types: numeric, alphabetic and alpha-numeric.
Numeric data: Data consisting of digits and not letters of the alphabet or
special characters.
Alphabetic data: Data consisting of letters and not digits or special
characters.
Alpha-Numeric data: Data consisting of digits, alphabets as well as special
characters.
File Organization
The term "file organization" refers to how data are stored in a file and,
consequently, the method by which it can be accessed.
File organization Terms
a. Block: A block is the physical unit of transfer between the backing store
and the main memory.
b. Bucket: A bucket is the logical unit of transfer between the backing store
and the main memory.
c. Hit: A hit is the number of times a program or item of data has been
accessed.
File organization Structure
Types of File Organization
There are mainly four types of file organization:
1. Serial file organization
2. Sequential file organization
3. Index file organization
4. Random file organization
Explanation
Serial file organization
Serial files are stored in chronological order, that is, as each record is
received it is stored in the next available storage position. In general, it is
only used on a serial medium such as magnetic tape.
Sequential file organization
Sequential files are files whose records are sorted and stored in ascending or
descending on a particular key field.
Index file organization
Indexed Sequential file organization is logically the same as a sequential
organization, but an index is built indicating the block containing the record
with a given value for the Key field. An index is an alphabetical list of
names, subjects, etc., with references to the places where they occur,
Random file organization
A randomly organized file contains records arranged physically without
regard to the sequence of the primary key. Records are loaded to disk by
establishing a direct relationship between the Key of the record and its
address on the file, normally by use of a formula (or algorithm) that converts
the primary Key to a physical disk address. This relationship is also used for
retrieval.
Methods for Accessing Files
Files can be accessed:
a. Serially
b. Sequentially and
c. Randomly
File Classification
Files are classified as follows;
a. Transaction Files: transaction files contain details of all activities that
have occurred in the last period. Examples of transaction files are the price
of the products, customers' orders for the products, inserting new data into
the database etc.
Features of transaction file
1. The data stored in these files are temporary by nature
2. Any data to be modified is done in this file
b. Master Files: Master files are permanent files kept up-to-date by
applying the transactions that have occurred during the operation of the
business. E.g. customer ledgers, and student databases.
Features of master file
1. The data stored in these files are permanent by nature
2. These files are updated only through recent transactions
3. This file stores a large amount of data
c. Reference Files: Reference files are the type of master file containing
referential data. They contain data that are necessary to support data
processing e.g. price lists, dictionary files, present value schedules, table of
inventory codes or categories, lookup tables
Features of reference file
1. It is stable and permanent
2. It is data used for citation purposes.
Criteria for File Classification
1. How the file is to be used
2. How many records are processed each time the file is updated
3. whether the individual records need to be quickly accessible
4. nature of content
5. Organization method
6. Storage medium
File Classification
Files are classified as follows;
a. Transaction Files: transaction files contain details of all activities that have
occurred in the last period. Examples of transaction files are the price of the
products, customers' orders for the products, inserting new data into the database
etc.
Features of transaction file
1. The data stored in these files are temporary by nature
2. Any data to be modified is done in this file
b. Master Files: Master files are permanent files kept up-to-date by applying the
transactions that have occurred during the operation of the business. E.g. customer
ledgers, and student databases.
Features of master file
1. The data stored in these files are permanent by nature
2. These files are updated only through recent transactions
3. This file stores a large amount of data
c. Reference Files: Reference files are the type of master file containing referential
data. They contain data that are necessary to support data processing e.g. price
lists, dictionary files, present value schedules, table of inventory codes or
categories, lookup tables
Features of reference file
1. It is stable and permanent
2. It is data used for citation purposes.
Criteria for File Classification
1. How the file is to be used
2. How many records are processed each time the file is updated
3. whether the individual records need to be quickly accessible
4. nature of content
5. Organization method
6. Storage medium
Word Processing
Topic: Word Processing
Class: SSS Two
Definition of Terms
Word Processing: Word processing means using the computer to create, edit, and
print document.
Word processor: A word processor is an electronic device or computer software
application, which performs the task of composition, editing, formatting, and
printing of documents.
Text Document: Text document is something written, printed, or online document
that presents data in the form of an articles, letter, memorandum, report, etc.
Examples of Word Processors
There are many word processing software packages available today, such as
WordStar
MS-word
Corel WordPerfect
WordPad
Notepad
WPS writer, etc
Application Areas of Word processing Software
i. Offices
ii. Publishing
iii. Journalism
iv. Education
v. Articles
Steps Involved in Loading Microsoft Word
There are two ways of loading Microsoft word:
a. If the icon of the package is on desktop, double click on it for it to open
b. If the icon is not on the desktop, follow the step below:
i. Click the Start Button
ii. Click on all program
iii. Select and click Microsoft office
iv. Select and click Microsoft Word
MS-Word Processing Environment
The word window is made up of many components that are displayed onscreen at
the start of the program such as:
a. Title bar: The title bar is the top part of the window displaying MS Word. It
displays the name of the active document.
b. Menu bar: The menu bar contains commands for word operation. E.g Home,
Insert, view, insert, page layout, etc
c. Status bar: bottom of the window it displays the status of the document
d. Toolbar: Toolbar serves as short cuts for common commands such as save,
print, new, open, undo, etc.
e. Work space: it is the area where actual word processing is done.
f. Formatting toolbar: This toolbar contains shortcut to the commands used for
formatting text. You can change your word or line paragraph to bold, italic or
underline,
Facilities Available in a Word Processor
a. Type document: the Keyboard is used to type a document. You type a document
by pressing the relevant keys on the keyboard in order to arrive at the desired
word.
b. Edit document: This is the ability to change text by adding, deleting and
rearranging letters, words, sentences and paragraph.
c. Store document: Word processor gives the opportunity of accessing a
previously saved file or document either on the computer or on external storage
facility.
d. Move, copy and paste: A word, line or text, paragraph, page or diagram can be
moved from one document to another. It could be also be within a document that
for one line to the other. It can also be from one application packages to the other,
e.g., from CorelDraw to Microsoft Word.
>Features of a Word Processor
Word processor varies considerably, but all word processors support the following
basic features:
Insert text: Allows you to insert text anywhere in the document
Delete text: Allows you to erase characters, words, lines, or passages.
Cut and paste: Allows you to remove a section of text from one place in a
document and insert it somewhere else
Copy: Allows you to duplicate a section of text
Page size and Margins: allows you to define various page size and margins.
Search and replace: Allows you to search for a particular word or phrase and also
replace one group of characters with another everywhere that first group appears.
Word wrap: The word processor automatically moves to the next line when you
have filled one line with text.
Headers, footers, and page numbering: Allows you to specify customized
headers and footers the word process will display at the top and bottom of every
page
Font Specification: Allows you to change font attributes within a document.
Spell Checker: A utility that allows you to check the spelling of words. It will
highlight any word that it does not recognize
Thesaurus: Allows you to search for synonyms without leaving the word
processor
WYSIWYG (what you see is what you get): With WYSIWYG, a document
appears the display screen exactly as it will look when printed. ETC
Definition and Description System Development Life Cycle
1. System development Life Cycle (SDLC) is a conceptual model in project
management that describes the stages of an information system development
project.
2. The system development life cycle can be defined as a project management
technique that divides complex projects into smaller, more manageable segments
or phases.
A system development life cycle has three primary objectives: To ensure that high-
quality systems are delivered, to provide strong management controls over the
projects, and to maximize the productivity of the systems staff.
Stages of System Development Life Cycle
The following are stages in the system development life cycle
i. Preliminary study
ii. Feasibility study
iii. Investigative study
iv. System analysis
v. System design
vi. Implementation
vii. Maintenance
viii. Study review
Description of each Stage
Preliminary study
The initial system study involves the preparation of a system proposal which list
the problem definition, objectives of the study, terms and reference of the study,
constraints, and the expected benefits of the new system, etc.
Feasibility study
In case the proposal is acceptable to the management, the next stage is to examine
the Feasibility study. A feasibility study is the test of the proposed system in the
light of workability, meeting user’s requirements, effective use of resources and
cost-effectiveness.
Investigative study
This involves a detailed study of various operations performed by a system and
their relationships within and outside the system. During this process, data are
collected on available files, decision points and transactions handled by the present
system.
System analysis
System analysis is a process of collecting factual data, understanding the process
involved, identifying problems and recommending feasible suggestions for
improving the functional system.
System Design
Based on the user requirements and the detailed analysis of the existing system, the
new system must design. This is the phase of system designing. It is the most
crucial phase in the developments of a system.
Implementation
After having the user acceptance of the new system developed, the implementation
phase begins. Implementation is the stage of a project during which theory is
turned into practice. The major steps involved in this phase are:
• Acquisition and Installation of Hardware and Software
• Conversion
• User Training
• Documentation
Maintenance
Maintenance is necessary to eliminate errors in the system during working life and
to tune the system to any variation in its working environments.
Study Review
Review activities occur several times throughout this phase. Each time the system
is reviewed, one of three of the following decision will be made:
• The system is operating as intended and meeting performance expectations
• The system is not operating as intended and needs corrections and modifications
• Users are/are not satisfied with the operation and performance of the system.
Diagram of System Development Life Cycle
Comments
1.
Ashwini11 October 2021 at 13:31
great post. Thanks for sharing.
We are an experienced team in one of the Best software company and product
specialist for software development and implementation. Sovereign provides
Website Design, Wordpress Development and Mobile App Development, Digital
marketing and SEO Services.
SDLC
Software Development
Definition and Description System Development Life Cycle
1. System development Life Cycle (SDLC) is a conceptual model in project
management that describes the stages of an information system development
project.
2. The system development life cycle can be defined as a project management
technique that divides complex projects into smaller, more manageable segments
or phases.
A system development life cycle has three primary objectives: To ensure that high-
quality systems are delivered, to provide strong management controls over the
projects, and to maximize the productivity of the systems staff.
Stages of System Development Life Cycle
The following are stages in the system development life cycle
i. Preliminary study
ii. Feasibility study
iii. Investigative study
iv. System analysis
v. System design
vi. Implementation
vii. Maintenance
viii. Study review
Description of each Stage
Preliminary study
The initial system study involves the preparation of a system proposal which list
the problem definition, objectives of the study, terms and reference of the study,
constraints, and the expected benefits of the new system, etc.
Feasibility study
In case the proposal is acceptable to the management, the next stage is to examine
the Feasibility study. A feasibility study is the test of the proposed system in the
light of workability, meeting user’s requirements, effective use of resources and
cost-effectiveness.
Investigative study
This involves a detailed study of various operations performed by a system and
their relationships within and outside the system. During this process, data are
collected on available files, decision points and transactions handled by the present
system.
System analysis
System analysis is a process of collecting factual data, understanding the process
involved, identifying problems and recommending feasible suggestions for
improving the functional system.
System Design
Based on the user requirements and the detailed analysis of the existing system, the
new system must design. This is the phase of system designing. It is the most
crucial phase in the developments of a system.
Implementation
After having the user acceptance of the new system developed, the implementation
phase begins. Implementation is the stage of a project during which theory is
turned into practice. The major steps involved in this phase are:
• Acquisition and Installation of Hardware and Software
• Conversion
• User Training
• Documentation
Maintenance
Maintenance is necessary to eliminate errors in the system during working life and
to tune the system to any variation in its working environments.
Study Review
Review activities occur several times throughout this phase. Each time the system
is reviewed, one of three of the following decision will be made:
• The system is operating as intended and meeting performance expectations
• The system is not operating as intended and needs corrections and modifications
• Users are/are not satisfied with the operation and performance of the system.
Diagram of System Development Life Cycle
PROGRAM
What is a Program?
A program is a set of instructions that are executed by the CPU. A program can
also be defined as an organized list of instructions that when executed cause the
computer to behave in a predetermined manner. Without a program the computer is
useless.
Characteristics of a Good Program
The following are characteristics of a good program:
Accuracy: Program should be sufficiently accurate to get the desired results.
Extensibility: this means that you so design the program so that you can add and
remove an element from your program without disturbing the underlying structure
of the program.
Maintainability: this is making your code easy to update
Efficiency: a good program should be designed to use the least amount of primary
memory and the fewest devices possible.
Generality: Design the program to be generalized and flexible, if possible
Portability: a good program can be moved to another environment
Simplicity: program logic should be as simple and as uncomplicated as possible
Transferability: plan the program to be as machine independent as possible.
Reusability: write code that will be able to be used in unrelated projects.
Leanness: leanness means making the design with no extra parts.
Precautions in Program Development
There are certain precautions that one should take during the development of a
program. These are:
Patience: one should not rush up the programming process, although deadlines are
important that should not be at the expense of a faulty program.
Step Following: all steps of the program should be followed religiously without
skipping any step or there will be erroneous results.
Execution order: the order of execution of instructions should be followed.
Fresh mind: One should be sufficiently fresh to work on a program, being free of
any kind of fatigue.
Program Development Stages
Software(Program) development can be divided into several stages as listed below:
1. Problem Definition
2. Problem analysis
3. Flowcharting
4. Desk checking
5. Program coding
6. Program compilation
7. Testing/Debugging
8. Program documentation
Problem Definition: This is the formal definition of task. It includes specification
of inputs and outputs processing requirements, system constraints and error
handling methods.
Problem Analysis: this step is the process of becoming familiar with the problem
that will be solved with the computer program.
Flowcharting: A flowchart is a pictorial representation in which symbols are used
to show the various operations and decisions to be followed in solving a problem.
Flow chart depicts the logic involved in the problem solution and therefore, is a
step-by-step sequence that the program will describe to the computer.
Desk-checking: Desk-checking is a manual (non-computerized) technique for
checking the logic of an algorithm
Program coding: this is the process of transforming the program logic document
into a computer language format.
Program compilation: A compiler is a computer program (or a set of programs)
that transforms source code written in a programming language (the source
language) into another computer language (the target language), with the latter
often having a binary form known as object code. The process of transforming
source code into object code is called compilation.
Testing and debugging: This stage is the discovery and correction of
programming errors.
Program documentation: Comprehensive information on the capabilities, design
details, features, and limitations of the program so that those who use and maintain
it can understand it so that the program can be extended to further applications.
ALGORITHM
Definition Algorithm
Algorithm can be defined as a set of rules and sequential steps that define how a
particular problem can be solved in finite and ordered sequences.
Function of Algorithms
An algorithm generally takes some input, carries out several effective steps in a
finite amount of time, and produces some output.
Characteristics of Algorithms
Every algorithm should have the following five characteristic features
i. Input
ii. Output
iii. Definiteness
iv. Effectiveness
v. Termination
Example1: Write an algorithm to compute the area and circumference of a cycle
given the diameter d. Use the formular A= πr^2 and C= 2πr Solution
Step 1: Start
Step 2: Get the diameter d
Step 3: Compute r=(d/2)
Step 4: Compute A= πr^2
Step 5: Compute C= 2πr
Step 6: Display the results
Step 7: Stop
Example 2: Write an algorithm that tells you how to wash dishes
Solution
Step 1: start
Step 2: scrape food off dishes
Steps 3: wash the dishes with soap and water
Step 4: Rinse the dishes
Step 5: Dry them
Step 6: Stop
Example 3: Write an algorithm to evaluate the equation y = a(b-c)^2/d+2
Solution
The rule of BODMAS is to be followed to effectively evaluate thise equation
Step 1: start
Step 2: Input the values of a, b, c, d
Step 3: The value of y is to be calculated
Step 4: Calculate the value of b-c and denote f
Step 5: Calculate the square of f
Step 6: Multiply f by a and denote g
Step 7: Calculate the value of d+2 and denote h
Step 8: divide h by g
Step 9: We get the value of y
Step 10: Print y
Step 11: Stop
Definition of Flowchart
This is the graphical representation of the steps involved in solving a given
problem. More formally, a flowchart is a pictorial representation in which symbols
are used to show the various operation and decisions to be followed in solving a
problem.
Some standard symbols used in drawing a program flow chart are:
Rules for Drawing Flowchart
i. Every flowchart must terminate, that is, it must have a starting and ending points.
ii. The Direction of flow should be from left to right or top to bottom.
iii. Maintain consistent spacing between symbols
iv. Use the correct symbol for each step
v. Keep it simple and clear.
Example 1: Draw a flow chart to print the area of a 10cm square
EMAIL
Definition of Electronic Mail
i. Electronic mail, commonly called email or e-mail, is a method of exchanging
digital messages from an author to one or more recipients.
ii. It can also be defined as a system for sending and receiving messages
electronically over a computer network.
E-mail Services
The following are services provided by email
a. Sending/receiving emails
b. Chatting: The exchange of messages online in real-time with one or more
simultaneous users of a computer network
c. Task List: Task is a feature designed to help you keep track of the things
you need to do.
d. Share updates, photos, videos and links.
Steps to Create an Email Account
Follow the steps below to create an email account
i. Click On a web browser
ii. Visit an email service provider web address e.g. [Link]
iii. Click on the Free Sign Up Button
iv. Enter all mandatory fields (First Name, Last Name, Gender, etc.)
v. Click the "Accept" - Button underneath
Email Address
An email address is the name of an electronic postbox that can receive and
send email messages on a network.
Components of an Email Address
1. User Name: The user name is found on the left-most part of an email
address, before the "@" symbol.
2. The "@" symbol: (read as "at") is placed between the user name and
domain name, without spaces or
3. Domain Name: An email address domain is found to the right of the "@"
symbol.
Domain Name consists of the second and top-level domains, separated by a
dot
a. Second Level Domain: the second-level domain is the name of the business,
organization or Internet service provider that owns that domain.
b. Top Level Domain: Top level domain is what appears right-most in an email
address, after the second-level domain.
Some top-level domains are generic such as .com, .net [Link], and are
referred to as gTLD or generic top-level domains. Others are country-specific
such as .[Link] (Malta), and termed ccTLD or country-code top-level
domains.
Email Address Samples
Procedure for sending an Email
i. Log in to your email account
ii. Click Compose.
iii. A new blank email window will open up. In the ‘To’ box, type in the email
address of the recipient.
iv. You might want to include someone else in your email to ‘keep them in the
loop’. You can do this by clicking CC (Carbon Copy) or BCC (Blind Carbon
Copy), which will open another field. ‘Cc’ means ‘carbon copy’ and ‘Bcc’
means ‘blind carbon copy
v. Type in the subject of the email. The subject field allows you to give the
recipient an idea of the topic of your email, like a heading.
vi. Type your message in the main body field of your email.
vii. Email text can be formatted in a similar way to text in a word document.
viii. Click the Send button at the bottom of the compose window.
Relationship between “TO”, “CC” and “BCC” in Email
BCC (Blind Carbon
TO CC (Carbon Copy)
Copy)
Sents to primary Sents to Secondary
Tertiary contact(s)
contact(s) contact(s)
Used for emailing Used for emailing Used for emailing
individual or multiple individual or multiple individual or multiple
contacts contacts contacts
Email addresses viewable Email addresses viewable Email addresses viewable
by all by all only by the sender
Steps Involved in chatting
i. Click on Contacts
ii. Select the name of the person you'd like to chat with, and click the Chat
link to open a chat window.
iii. Enter your message in the text field, and press Enter.
iv. Wait for your contact to respond!
Differences between Email Address and Website Address
Email Address Website Address
It has username and domain name It has only domain name
It usually requires login credentials to be It does not usually require
accessed authentication
Designed to be accessed by one user It can be accessed by all users
They are case sensitive They are not case sensitive
It has the @ (at) sign It does not have the @ (at) sign
Advantages of Email
i. It is very fast.
ii. It is secure
iii. Formatted files can be shared through attachment
iv. lower cost than conventional mail
Definition of Internet
Internet is a worldwide network of computers that share information.
It is also defined as a global system of interconnected computer networks that
use the Internet protocol suite to link devices worldwide.
Internet Terms
1. Cyber café: An internet café or cyber café is a place which provides internet
access to the public, usually for a fee.
2. Cyberspace: It is the electronic medium of computer networks, in which
online communication takes place.
3. Download: To transfer a file from a remote computer to a local computer.
In other words, it means to transfer a file from a web server to a web client.
4. Upload: Transfer a file from a local computer to a remote computer. In
other words, it means to transfer a file from a web client to a web server.
5. E-mail is mail that's electronically transmitted by your computer.
6. File Transfer Protocol (FTP) is the standard method for downloading and
uploading files over the Internet.
7. Homepage or Home page is the first page that appears when you visit any
website. It is also the page of a Web site that provides the introduction or
content with links.
8. HTTP: HTTP is an abbreviation for Hypertext Transfer Protocol. It is the
set of rules by which Web pages are transferred across the Internet.
9. URL: URL Stands for "Uniform Resource Locator." A URL is the address
of a specific webpage or file on the Internet
10. World Wide Web (WWW): It is a system of interlinked hypertext
documents accessed via the internet. It is also defined as part of the internet
that contains linked text, image sound, and video documents
11. A Website is a collection of World Wide Web pages or files.
12. A Web page is a single hypertext file or a page that is part of a Web site
13. Web server: A server is a computer that delivers web content to a web
browser.
14. Chat: An online text-based communication between internet users.
15. Chat room: A chat room is part of an online service that provides a venue
for communities of users with a common interest to communicate in real-time.
16. HTML (Hypertext Markup Language). It is the language of the web.
17. ISP (Internet Service Provider): ISP is an organisation that provides access
to the internet and web hosting.
18. Intranet: A private internet running inside a LAN
19. Browse: The term to describe a user’s movement across the web
20. Web Browser (Internet Browser): A software program used to display
WebPages. It is also defined as a software application for retrieving,
presenting, and traversing (moving through) information resources on the
World Wide Web.
Types of Internet Browsers
a. Mozilla Firefox
b. Opera browser
c. Microsoft Internet Explorer (Microsoft edge)
d. Google Chrome
e. Apple Safari
f. Brave
g. UC Browser
h. Pheonix
i. Chromium
j. Epic
k. DuckDuckGo, etc
Features of Internet Browser
An internet browser has many different parts. They include:
1. Title bar: Displays the title of the open web page
2. Menu bar: The menu bar can be used to activate commands. Depending on
the browser you are using, some contain the following: File, edit, view, tools,
Bookmark, help, etc
3. Address Bar: An address bar is a component of an Internet browser which
is used to input and show the address of a website. The web address is
generally given in lowercase letters and is case-insensitive. There are no spaces
in a webpage or website address.
4. Status Bar: Status bar displays the status of the current page
5. Scroll Bar: This provides vertical or horizontal scrolling through the web
pages.
6. Standard toolbar: Standard toolbar has many different buttons. They are
explained below.
a. Back: To go back to the previously viewed page
b. Forward: To move forward to a page which was viewed
c. Stop: To halt loading of the webpage.
d. Refresh/Reload: To refresh the contents of the currently displayed webpage
from the start
e. Home: To go to the homepage of the currently viewed website.
f. History: It displays a list of previously viewed websites
g. Print: Prints the webpage with the default printer settings.
Types of Internet Services
Some services supported by the internet are as follows:
1. E-mail
2. Discussion group
3. Video conferencing
4. FTP
5. WWW
6. Chat
7. Downloading files
8. Uploading files
9. Telnet
10. Usenet
11. Instant message
12. Blog
13. E-commerce
The Benefits of Internet
1. Researching
In the past, we would have to go to a library to do research. Today all of this
research is done online, in the comfort of your home or office. The main
concern is to be conscious of sites with faulty information
2. Buying Online
Internet has brought about the easiest way of buying and selling goods which
are called e-commerce (Electronic Commerce). In e-commerce, the
prospective buyer will book or register for the needed goods or services which
will be delivered to them within a stipulated time.
3. Worldwide media accessibility
Internet has opened up all users to worldwide media. Internet radio is
accessible to anyone in the world connected to the internet.
4. Online Degree
The benefits of online education far outweigh any drawbacks - especially for
anyone who works full time - since the logistics of driving to and from class
would simply be too time-consuming. Sure, there are some drawbacks, such as
not having face-to-face interaction with classmates.
5. Online Banking:
You can easily receive and pay electronically with a couple of clicks.
6. Communication
Information can be transmitted from one place to the other with the use
internet. For example sending and receiving e-mail messages, making phone
calls, audio and video conferencing, sending and receiving fax messages,
chatting and instant messages etc.
7. Searching:
Today, we have lighting fast search engines that can give us thousands of links
based on specific keywords.