0% found this document useful (0 votes)
26 views13 pages

CSEC Notes - Section 1

The document provides an overview of computer fundamentals and information processing, covering concepts such as information technology, types of computer systems, hardware components, software roles, and data validation. It discusses the interrelation of hardware components, the merits of cloud versus local storage, and suitable input/output devices for various applications. Additionally, it evaluates the reliability of online information and outlines troubleshooting methods for common hardware issues.

Uploaded by

gibrain.nizamali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views13 pages

CSEC Notes - Section 1

The document provides an overview of computer fundamentals and information processing, covering concepts such as information technology, types of computer systems, hardware components, software roles, and data validation. It discusses the interrelation of hardware components, the merits of cloud versus local storage, and suitable input/output devices for various applications. Additionally, it evaluates the reliability of online information and outlines troubleshooting methods for common hardware issues.

Uploaded by

gibrain.nizamali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

SECTION 1:

COMPUTER FUNDAMENTALS AND


INFORMATION PROCESSING
1.​ Explain the concept of Information Technology.

Definition: Information technology is the use of computers, software, and telecommunications


equipment to process, store, retrieve, and transmit data and information.

Scope: IT plays a critical role in many aspects of modern life, from business operations and
finance to healthcare and education. With the ongoing advancements in technology, the scope of
IT continues to expand and evolve in a wide range of industries and fields, including:

●​ Software development ●​ Networking


●​ Web design ●​ Cybersecurity
●​ Database administration ●​ Data analysis

2. Major types of computer systems.

Supercomputers: High-speed computer systems, often composed of multiple interconnected


computers that work together to perform complex calculations beyond the capability of
traditional computers. They are used in scientific research, weather forecasting, and financial
modeling. Disadvantages: Expensive, Not portable.

Mainframe Computers: Large, powerful, and secure machines used by big organizations to
process and manage large amounts of data and transactions. They support multiple users and
applications simultaneously, and are used for critical business operations

Desktop systems: Personal computers designed for use at a desk, consisting of a monitor,
keyboard, and mouse. They are highly customizable and offer high processing power and storage
capacity.

Mobile devices: such as smartphones and tablets, are highly portable and designed for on-the-go
computing tasks such as web browsing, email, and social media. They have moderate processing
speeds and storage capacities compared to personal computers, but are highly portable.

Embedded devices: Specialized computer systems that perform specific tasks within other
devices or products, such as appliances or medical equipment. They are low-power and low-cost,
designed for reliability and longevity.
3. Explain the functions of the major hardware components of a computer system.

Central Processing Unit (CPU): The "brain" of the computer and is responsible for executing
instructions and processing data. It performs arithmetic and logical operations on data and
communicates with other components to control the overall operation of the computer.

Random Access Memory (RAM): A type of volatile memory that temporarily stores data and
instructions that the CPU needs to access quickly. It is used to hold data and programs while they
are being used and allows the computer to multitask.

Read Only Memory (ROM): Read-only memory (ROM) is a non-volatile memory (retains data
even when power is turned off), used to store permanent data and program instructions that are
unchangeable, such as critical system information like the BIOS and firmware.

Erasable Programmable Read-Only Memory (EPROM): is a non-volatile memory chip that


can be programmed and erased multiple times. Used to store program code or data in electronic
devices, such as microcontrollers, embedded systems, and other electronic devices.

Secondary storage devices are used to store data that needs to be retained beyond the
computer's primary memory. These devices provide large amounts of storage capacity and are
used for backing up data, archiving files, and transferring data between computers.

1.​ Hard Disk Drive (HDD): A magnetic disk drive that stores data on spinning platters.
2.​ Magnetic Tape: A data storage device that uses magnetic tape to store digital information.
3.​ Flash Drive: A portable storage device that uses flash memory to store data.
4.​ Memory Card: A small portable storage device used in cameras, smartphones, and other
portable devices.
5.​ Optical Disks: A type of storage device that uses lasers to read and write data to CDs,
DVDs, and Blu-ray disks.

Units of Storage

1.​ Bit: The smallest unit of storage, representing a single binary digit (0 or 1).
2.​ Byte: A unit of storage that consists of 8 bits.
3.​ Kilobyte (KB): Approximately 1,000 bytes.
4.​ Megabyte (MB): Approximately 1,000 kilobytes.
5.​ Gigabyte (GB): Approximately 1,000 megabytes.
6.​ Terabyte (TB): Approximately 1,000 gigabytes.
4. Explain how the major hardware components of a computer system interrelate.

The IPOS cycle refers to the sequence of operations performed by the major hardware
components of a computer system, essential for the proper functioning of a computer system.

Interrelation: Input devices send data to the processing unit, where it is processed and stored in
memory. The CPU retrieves the stored data and performs operations on it. The results are then
sent to Output devices for display or printing, and Storage devices store the data for future use.

Input: The user enters data or commands into the computer system through input devices
such as keyboards or mice.

Processing: The processing unit, consisting of the CPU and memory, performs arithmetic
and logical operations on the data received from the input devices.

Output: The processed data is sent to output devices such as monitors or printers for
display or printing.

Storage: The processed data is stored on secondary storage devices such as hard disk
drives or flash drives for later retrieval and processing.

5. Evaluate the relative merits of cloud storage and local storage.

Cloud storage: refers to storing data remotely on third-party servers that are accessed through
the internet.

Local storage: refers to storing data on physical storage devices that are connected to a
computer system. These devices include hard disk drives, flash drives, and memory cards.

Cloud Local

Capacity Virtually Unlimited limited by the size of the physical


storage device.

Cost Subscription-based payment plan.​ One-time cost. ​


More expensive in the long run. More expensive upfront.

Accessibility Accessed from anywhere with an accessible from the device to


internet connection which it is connected.

Security Raises concerns about data security More control over their data, but
and privacy the data can still be vulnerable to
theft or loss.
6.​ Select appropriate input/output devices to meet the needs of specified applications;

Associate the following devices with suitable applications:

(a)​Input
●​ Optical mark reader (OMR): Standardized testing and surveys to scan and capture data
from multiple-choice answer sheets.
●​ Character readers (OCR, MICR): Convert printed text into digital format. OCR is
commonly used for document scanning, while MICR is used for reading magnetic ink on
checks.
●​ Mouse: Control the movement of a cursor on a computer screen and to click on icons,
buttons, and menus.
●​ Joystick: Gaming and flight simulation applications to control the movement of
characters and vehicles.
●​ Barcode reader: Retail and inventory management to scan and capture information from
barcodes on products and packaging.
●​ Document scanner: Scan and digitize paper documents for storage and retrieval.
●​ Light-pen: Graphic design & Art applications - draw or select items directly on a
computer screen.
●​ Touch terminals: Point-of-sale (POS) systems - input sales transactions, orders, and
payments.
●​ Voice response unit: Customer service and support applications - provide automated
responses to user inquiries.
●​ Touch screens: Mobile devices, kiosks, and self-service machines - provide an
interactive interface for users to input data and commands.
●​ Keyboard: Data entry, text input, and navigation in a variety of applications, including
word processing, email, and gaming.
●​ Digital camera: Capture and input digital images into a computer system for editing and
storage.
●​ Biometric systems: Authentication and security purposes, such as fingerprint and facial
recognition.
●​ Sensors: Capture and input data from physical environments, such as temperature,
pressure, and motion, into computer systems for analysis and control.
●​ Remote control: Input commands into electronic devices from a distance, such as
television, audio, and home automation systems.
●​ Sound capture: Input audio recordings and voice commands into computer systems for
processing and storage.
●​ Pointing devices: Control the movement of a cursor on a computer screen, including
mouse, touchpad, and trackball.
●​ Webcam: Capture video input and for video conferencing and streaming applications.
(b) Visual output:

Monitors: used for displaying visual output on a computer system.

Printers: used to produce hard copies of digital documents or images. Different types of printers
are used for different applications:
●​ Laser printers: used for high-volume printing of text documents in offices.
●​ Inkjet printers: used for printing high-quality color documents and photos at home or in
small offices.
●​ Dot matrix printers: used for printing multipart forms or invoices in industrial settings.
●​ Thermal printers: used for printing receipts or labels in retail and hospitality settings.
●​ Plotters: used for printing large-format drawings or graphics.
●​ 3D printers: used for printing three-dimensional objects from digital designs.

Microfilm: used for archiving and storing large volumes of documents in a compact format.

(c) Audible output:

Speakers: Audio output from a computer, such as music, videos, or games, or in public spaces.

Headphones, earphones: Provide private listening with noise isolation.


7.​ Explain the role of the different types of software in computer operation;

System Software: A type of computer program that is designed to provide a platform for other
software to run on, and other essential software that is necessary for the computer to operate
properly.

1.​ Operating system: Controls the basic functions of the computer, and manages its
resources. E.g. Microsoft Windows, macOS, Linux, and Unix.
2.​ Utilities: Designed to help users manage and optimize their computer systems. E.g.
Antivirus software, disk cleanup and defragmentation tools, and system optimization
software.
3.​ Translators: Used to convert high level language source code into executable code.
Interpreters translate and execute source code one line at a time, while compilers translate
the entire source code into machine code before executing it.​

a)​ Interpreters are programs that translate and execute source code one line at a time.

Advantages: Easier to debug​ ​ Disadvantages: Slow execution time.

b)​ Compilers translate the entire source code into machine code before executing it. ​

Advantages: Quicker execution time. Disadvantages: More difficult to debug.
8.​ Discuss the relative merits of the various types of user interface;

Hardware: The choice between touch screens and specialized keyboards depends on the user's
specific needs and preferences.

a)​ Touch Screens​


Advantages: Versatile, intuitive, and hygienic​
Disadvantages: May not be as precise or comfortable for typing.
b)​ Specialized keyboards

Advantages:​
​ Can optimize input for specific tasks, provide haptic feedback, and be more ergonomic.​
​ Disadvantages:​
​ More expensive, requires more training to use effectively.

Software: The relative merits of each software interface depend on the specific context of their
usage and the user's needs and preferences.

Command line interfaces​


Advantages: Powerful and efficient​ Disadvantage: Requires learning specific commands.

Menu-driven interfaces

Advantages: Easy to use​ ​ Disadvantage: Limited flexibility

Graphical user interfaces (GUIs)

Advantages: Intuitive and offer visual representations​


Disadvantage: Resource intensive

Touch interfaces

Advantages: Intuitive and versatile,​


​ Disadvantage: Not very precise, uncomfortable for some tasks.
9.​ Evaluate the suitability of a given computer system for a specific purpose:

(a) Processing speed (CPU type and speed):

CPU speed and type are important for high processing tasks like gaming, video editing,
or 3D modeling. Faster processors with multiple cores are b etter. Specific software may
require a certain type of processor.

(b) Memory (RAM):

RAM is important for running multiple programs simultaneously. Video editing or data
analysis might require 8GB of RAM, while simple tasks like web browsing might suffice
with 4GB of RAM.

(c) Secondary storage (capacity and speed):

Secondary storage devices are important for storing and accessing files and data, capacity
and speed should be sufficient to meet the specific needs. For example: ​
​ Capacity: Is it able to store large media files or data sets?​
​ Speed: How fast can files be accessed and/or transferred?

(d) Types of software:

Each software has a minimum requirements of the computer system. E.g. Graphic design
software such as Adobe Photoshop or video editing software such as Final Cut Pro
require high processing power and memory, and may have specific requirements for
graphics cards.

(e) Input/Output devices:

The input/output devices, as well as all necessary ports and connectors are important for
user experience and productivity. For example,

●​ Graphic Design / Video Editing: a high-resolution monitor.


●​ Data Entry: Ergonomic keyboard and mouse.
●​ Gaming: High-quality headphones and joystick.
10.​Troubleshoot basic computer hardware problems;

Cable problems:

1.​ Check if the cable is connected properly at both ends.


2.​ Check for any visible damage on the cable.
3.​ Try using a different cable. If the issue persists it is likely an issue with the device.

Monitor problems:

1.​ Make sure the monitor is plugged in and turned on.


2.​ If there is power, check if the monitor is properly connected to the computer.
3.​ Device depending, adjust the brightness and contrast settings using physical buttons.
4.​ Try adjusting the screen brightness, contrast and resolution settings from the computer.

Printer problems:

1.​ Make sure the printer is plugged in and turned on.


2.​ If there is power, check if the printer is properly connected to the computer.
3.​ Check if the printer driver is installed and up to date.
4.​ Try printing a test page to see if the printer is working properly.

Battery problems:

1.​ Device depending, check if the battery is properly inserted in the device.
2.​ Try a full charging cycle.
3.​ Check if the charging cable is properly connected / for any visible damage on the cable
4.​ Device depending, check the battery health.
5.​ Consider replacing if the issue persists.
11.​Distinguish between data and information;

Data: raw, unprocessed facts and figures that have not been analyzed or interpreted. ​
Information: processed, organized, and analyzed data - provides context, insight, and knowledge.

Sources of data and information (people, places and things)

●​ People can provide data and information through… surveys, interviews, or observation.
●​ Places… through environmental sensors, such as weather stations or traffic cameras.
●​ Things… through sensors or other types of monitoring devices, such as fitness trackers or
smart home systems.

Document types: turnaround document, human-readable and machine-readable forms;


hard copy, and soft copy.

Documents are used to record and store data and information.

●​ Turnaround documents are forms or documents used for inputting data into a computer
system, such as order forms or invoices.
●​ Human-readable documents can be read and understood by humans, such as reports or
memos.
●​ Machine-readable documents are specifically designed to be read by computers, such as
barcodes or RFID tags.
●​ Hard copies - physical, paper-based documents that can be held and touched.
●​ Soft copies - electronic / digital versions of documents that can be stored and accessed on
a computer or other electronic device.

12.​Evaluate the reliability of information obtained from online sources;

Evaluation of information retrieved electronically for authenticity, currency, relevance, and


bias.

1.​ Authenticity: Is the source (website, organization, or individual) of the information


credible and reliable?
2.​ Currency: Is the information still relevant to your needs? What is the date of publication?
Is it frequency updated?
3.​ Relevance: Is the information related to your topic of interest or research question?
4.​ Bias: Is the information impartial, or does it contain a bias that may affect the accuracy
and credibility of the information?
13.​Differentiate between validation and verification of data &
14.​Identify appropriate validation and verification checks.

Validation evaluates whether the data meets the specific requirements of the user. It involves

checking the quality and reliability of the data, to ensure that it is of sufficient quality and

reliability to support the intended use.

1.​ Range check: - checking whether the data falls within a specified range of values. ​
E.g. Age (0 and 120 years), Temperature (-40°C and 100°C), Score (0 and 100%). ​

2.​ Reasonableness checks: checking whether the data is reasonable and makes sense. E.g.
ensuring that the weight is within a reasonable range for their height.​

3.​ Data type checks: checking whether the data is of the correct type. E.g. checking that a
date of birth field is in the correct format for a date.​

4.​ Consistency checks: checking whether the data is consistent with other data. E.g.
checking that a person's gender is consistent with the title.​

5.​ Presence checks: checking whether the data is present or missing. E.g. ensuring that the
email address is not left blank.​

6.​ Format checks: checking whether the data is in the correct format. E.g. a contact number
field is in the correct format for a phone number.​

7.​ Length checks: checking whether the data is of the correct length. E.g. Password length
is between 8 and 16 characters long.

Verification checks for accuracy, consistency, integrity and completeness of data. It involves

comparing the data against its source to ensure that it is unaltered in any way.

1.​ Double entry: entering data twice and comparing the two entries to ensure that they

match. E.g. Accounting records.

2.​ Proofreading: reviewing a document to identify and correct any typographical or

transposition errors. E.g. Reports.


15.​Select appropriate file organization for particular application.

File organization refers to the way in which data is stored and arranged in a file.

File access methods are the techniques used to access and retrieve data stored in computer files.

Sequential:

●​ Data is stored in a sequence or order in the file


●​ To access a specific record in a file, the system must read through all of the preceding
records.

Suitable for:

●​ Data stored for long periods of time and accessed infrequently.


●​ Applications which require data to be processed in a specific order.

Serial:

●​ Allows for more flexibility in accessing the data than Sequential.


●​ The system can move directly to a specific location in the file.
●​ Suitable for applications that require frequent updates to the file.

Direct:

●​ Data is stored in fixed-length blocks or records, each assigned a unique address or key.
●​ Directly accesses the address or key, without reading through any preceding records.

Suitable for:

●​ applications that require frequent random access to the data, such as databases or
inventory management systems.
●​ For payroll files, where data is frequently accessed and updated.

Random:

●​ Similar to direct access, but the records in the file are not stored in any particular order.
●​ To access a specific record, the system searches the entire file until it finds the record.

Suitable for:

●​ Applications that require frequent random access to the data.


●​ For real-time systems, where data needs to be accessed quickly and efficiently.

You might also like