Tsambe Structure - JPG
Tsambe Structure - JPG
COMPUTER APPLICATIONS
This chapter deals with the areas where computers are used, what they used for, how they are used,
the advantages and disadvantages of their usage in such areas.
CAD Requirements
- considerable processor power
- Input devices like:
- Light pen: Used to make alterations on the screen to the drawings. Also used to write directly
on the screen. Can be used again to select commands.
- Tracker balls: used to draw designs and to select menus
- Mouse: adjust drawings
- Graphics tablet: provide interface for drawing on the screen. It also links with the light pen.
- Output Devices like:
- Large high resolution screens
- Graph plotters to draw scale and full size and high quality drawings
- High specification graphics cards
- Some systems support stereoscopic drawings where 3-D spectacles can be worn and the user sees a
3-D image.
- Kinematics (i.e. check moving parts in assemblies don’t interfere with each other)
NB: A hotspot is an area of a graphics object, or a section of text, that activates a function when
selected. Hot spots are particularly common in multimedia applications, where selecting a hot spot
can make the application display a picture, run a video, or open a new window, etc.
Features to see on a virtual tour website of a hotel being advertised on the internet
- hot spots on web page to allow user to move around the hotel
- plans and maps integrated to allow user to navigate the hotel
- ability to move from room to room to navigate whole hotel
Developments such as broadband, large computer memories and compression software have allowed
virtual tours to be offered on the Internet and/or CD/DVD files.
ROBOTICS
- A robot is a reprogrammable, multifunctional computer controlled device designed to perform
multiple tasks in industries, replacing human beings; e.g. for spray painting, welding, fixing parts of
a car, etc.
- Robotics refers to the science of developing and the use of computer controlled devices to replace
human beings in manufacturing.
- Sensors: capture information and data from the environment in analogue form
- Analogue-Digital Converter(ADC):Convert analogues signals to digital signals
- Microprocessor: Processes data collected from sensors
- Power supply: - Usually electricity through compressors or stepper motors.
- Controlling Computers: - Connected through an interface to give instructions to the robot.
- Have some form of interface (connection points to power supply, human interface, etc.)
Robots can move from one position to another, e.g. when lifting cars into the warehouse and when
going for recharging their batteries.
They keep a record of the distance they have travelled and the angles they have turned through so
that they can return to original position
They can sense (using light sensor) and stop if unwanted object gets on their way.
They need information and programming for them to work. Information is provided by sensors.
ARTIFICIAL INTELLIGENCE
Artificial Intelligence (AI) is the science of developing computer systems that have the ability to
learn from experience and mimic human reasoning in specific areas, as in medical diagnosis, mineral
prospecting, etc. Expert systems are a branch of Artificial Intelligence
EXPERT SYSTEMS
These are computer systems developed to mimic human reasoning and work at the level of an expert
in a particular field, e.g. in medical diagnosis. A good example of an expert system is MYCIN that
diagnose bacterial blood disease and then recommend appropriate antibiotic therapy for patients.
Expert systems are used in the following fields:
- oil or minerals prospecting,
- diagnosing a person’s illness,
- Diagnostics (e.g. finding faults in a car engine, etc.),
- tax and financial calculations,
- complex “thinking” tasks such as chess,
- weather forecasting,
- criminology/forensic science,
- career choices, etc
- Knowledge Base: a representation of facts (data) in a particular field (e.g. diseases, symptoms,
treatments, etc. as in medical diagnosis)
- Inference procedure (engine): contains reasoning methods used to arrive at a conclusion using
information in the knowledge base. It contains interrogation technique/questions and answers.
- User interfaces: these enable people to form queries, provide information, and interact with the
system.
- Explanation facilities (system): enable the systems to explain or justify their conclusions, and
they also enable developers to check on the operation of the system themselves.
- Rule Base: This is found in the Working Store. It contains inference rules and the inference
engine uses these to draw its conclusions.
The system uses a rule base and an inference engine together to simulate human reasoning when
analysing a problem and arriving at a conclusion. To simulate human processes it is necessary to have
a vast amount of information stored in the knowledge base and the reasoning set out as a set of rules
in the rule base.
DATA LOGGING
The process of automatically collecting data from source at set intervals, over a period of time, for use
at a later stage. A device that automatically collects data from source at set intervals for use at a later
stage is called a data logger.
Reading are stored by the data logger and loaded into the computer at a later date for processing
They can be used in remote areas (not directly connected to the computer): remote data
logging.
Control system
- It is a system in which one or more computers are used to monitor and regulate the operations of
non-computer equipment like in oil refineries.
- Control systems involve monitoring and logging of physical quantities, provide an analysis of
performance and allows some user interaction.
- Feedback is an essential element as well as timing.
- Most control systems are real-time systems, e.g. in oil refining, chemical processing, traffic lights
(controlling the sequence of lights to maintain optimum traffic flow), chemical and nuclear plants
(opening and closing valves, safety systems, etc.), etc.
- In computer control:
computer system takes information from the sensors
compares the data with stored values
sends signals to devices to open/close, on/off etc.
output from system can affect next input (feedback)
Automated Systems: -
- These are control systems that are dedicated to one particular task and lack the ability to collect
and analyse data as in digital cameras.
- They do not allow for or act on user interaction, e.g. washing machines, cameras, watches.
- Most control systems have embedded computers systems inside them.
the form of read outs – either the computer will automatically take action if necessary or the operator
will take action (override the system if necessary)
COMPUTERS IN GREENHOUSES
- The environment must be kept constant if plants are to grow successfully in greenhouses.
- Temperature and humidity in the air needs to be controlled so that it is kept constant
- Sensors are used to record humidity and temperature levels in analogue form. The analogue signals
are sent to the computer
- The computer will have stored (pre-set) values of minimum acceptable level and maximum
acceptable level for both temperature and humidity
- If the sensor records humidity level below the minimum acceptable level, the computer will send
signal to the actuator to close the windows and switch on the pump for a certain period of time,
which will spray water as a fine mist inside the greenhouse.
- Too much humidity will cause the processor to send signals to the actuator to open windows to
assist ventilation and drying out air.
- In case of temperature, if the greenhouse becomes too hot, the windows are opened and heater
turned off. If it becomes too cold, windows are closed and heater switched on.
Inputs:
Humidity/moisture (collected from humidity/moisture sensor),
Temperature (all in analogue form; collected from temperature sensor)
Processing:
- detecting temperature/humidity level
- Processors compares pre-set values in the computer with data collected from sensors
- Processor instructs actuator to take action if values exceed or are less than
minimum/maximum pre-set values
Outputs:
- Windows open or closed (digital form)
- Heater on or off (digital)
- Pump for water supply on or off (digital)
In case of an emergency, the computerised traffic system may perform any one of the
following:
- Give uninterrupted path through the system of linked traffic lights.
- Give green link – wave for all traffic to pass.
- Turn all lights to red.
- Activate emergency generator.
Kapondeni T. Page 12 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
- Sound an alarm.
MICROPROCESSOR-CONTROLLED STREETLIGHTS
Input:
- Pre-set values of Sunset time and Sunrise time
- Light level (Light sensor sends measurement of light to microprocessor, ADC converts this to
digital)
Processing:
- Processor compares sunrise time, sunset time and current time.
- If sunrise time = current time or higher, the processor send signal to actuator so that it
switches off lights, else,
- if signal equals sun set time, the processor send signal to actuator so that it switches on light.
- Also the amount of light is compared with pre-set value. If higher – nothing happens, If lower
or equal sends signal to send signal to actuator so that it switches on the streetlights.
Output:
Lights switched on or off
REFRIGERATORS
Inputs:
- temperature level (from temperature sensor/ or entered manually through the number pad),
- Pressure (from pressure sensor/contact switch/push switch) ,
- push switch setting
Processing:
- Analogue data from sensors is converted to digital by the ADC
- Processor controls temperature level by comparing with pre-set values.
- If temperature is higher than pre-set value, the processor sends signal to motor to switch on
compressor
- If not higher, the compressor is switched off by the actuator
- Processor controls the display panel.
- Processor sends signals to display panel and to the motor to switch lights on or off.
Outputs
- Switch on lights if door is opened and off when closed
- Light emitting diodes indicating current temperature of the inside of refrigerator.
- A warning buzzer (sound) if light is left open.
- Cold temperature
AIR CONDITIONERS
Inputs:
- Pre-set temperature level
- Temperature from temperature sensors
- Pressure from pressure sensors: monitors pressure of refrigerant
Processing
- Processor controls temperature.
- Processor sends signal to motor to change fan speed
- If temperature is below pre-set value, the processor gives motor signal so that it switches off
fans
- If temperature is above pre-set value, the processor gives motor signal so that it switches on
fans
- Processor controls timing and the display panel
Output
- Cool temperatures in the room
- Fans switched off or on depending on the situation
DIGITAL CAMERA:
Kapondeni T. Page 13 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
Input:
- Light mode( night or day mode)
- Film speed
- Colour setting
Processing:
- Processor sends signal to automatically adjust film speed,
- Processor positions the end of film,
- Processor sends signal to adjust distance from object,
- Processor sends signal to adjusts light.
- Processor sends signal to save image on the memory card
Output
- Sound to indicate that the film/picture has been taken
- Image/film captured and stored
- Light flashed to indicate film/picture is taken
SPEED CAMERAS:
These are used on roads to take photographs of cars which have exceeded the speed limit. Some of
these cameras use microprocessor controlled chips to store information.
The advantages of speed cameras with microprocessor controlled chips are that:
- Data and images can be transferred automatically which will be faster.
- Image can be viewed straight away.
- Can store considerably more data and photos.
- Can store other information (apart from photo image) e.g. road conditions.
- Chips can be re-used.
Inputs
- Maximum speed (speed limits)
- Road condition
Processing:
Tasks which would be carried out by the microprocessor as a speeding car approaches a
camera include:
- Sense and record speed of vehicle.
- Compare speed of vehicle with stored value(s) and decide whether photograph should be
taken.
- Check on value of light intensity.
- Adjust focal length, focus image, adjust shutter speed and set exposure.
Tasks which would be carried out by the microprocessor as the photograph is being taken
include:
- Log the time.
- Log the date.
- Log the speed.
- Record the road conditions.
- Operate ―flash.
- Operate shutter.
- Instructs storage of the image.
- Check on value of light intensity.
- Adjust focal length and focus image.
Outputs
- Video/pictures of cars captured
- Alarms of over-speeding cars
Patients in intensive care are monitored through sensors. The sensors measure and give feedback
pertaining to: blood pressure, temperature level, weight, pulse rate, etc
The computer is pre-set with normal range of values. It compares these with feedback from sensors.
Computers record patients’ medical data over some time for later analysis. Data recorded includes:
- Taking measurements on patients, for instance: blood pressure, temperature level, weight,
pulse rate etc. This relieves nurses of some duties that will be boring, making them faster and
more reliable.
- There are however some hospital tasks that are more suitable for human beings to perform
than computers. These include dressing patients, bathing patients, etc
MICROWAVE COOKERS
Function by switching a microwave unit on for a sufficient time to either defreeze frozen food or cook
it. It is used to cook food quickly by using waves (similar to radio waves) to heat the food.
Inputs:
Modern cookers have sensors attached to a microprocessor for detecting as inputs:
Weight of food
Temperature of food
Some cookers will also have additional sensors for detecting:
Amount of steam produced during cooking
Amount of alcohol produced
Processing:
- The microprocessor continually monitors sensor readings and by referring to a programmed
in-built database of food types.
- The microprocessor determines time needed to cook or defreeze food.
- IF a temperature in the food indicates the food is cooked OR the time set on the oven clock is
reached THEN microwaves are not produced
Output: Heat for cooking, Light indicating that food is cooked, power turned off if food is cooked,
3-D Models can be built using CAD, e.g for planning stores.
Advantages of modeling
- No equipment is damaged
- People are not put in any danger
- Expensive prototypes don't need to be built
- Time can be sped up or slowed down
- Models can be run and re-run over and over
- Modifications can easily be made and re-tested quickly
Disadvantages of Modeling
- The results depend on how good the model is and how much data was used to create it in the
first place.
- Models and simulations can't ever completely re-create real-life situations.
- Not every possible situation may have been included in the model.
- The equipment and software are expensive to purchase.
- Staff need to be trained how to use the software and equipment.
SIMULATION
Simulation is the study of the behaviour of a system using models in order to predict future real life
events, like population growth, flight simulator, etc. It involves feeding values into a model to see how
the model behaves.
In simulation, past and present data, as well as models are analysed in order to predict the future.
Simulation is used in the following areas:
- Training (e.g. pilots, drivers, medical doctors, etc.)
- running/testing chemical plants and nuclear plants
- trying out equipment to be used under sea or in outer space
- crash testing cars
- financial simulations (e.g. stock market predictions based on various scenarios)
- population growth (i.e. predict how the world’s population will increase based on a number of
different scenarios)
- queues (e.g. simulating queues at supermarket checkouts)
- weather forecasting
Advantages of simulation
- saves cost (rather than doing the real thing)
- safer (scenarios tried out on the simulation first before used in reality)
- possible to try out various scenarios in advance
- Some environments make simulations the only way to carry out a task beforehand (e.g. outer
space, under sea, chemical processes, nuclear reactors, etc.)
- faster (no need to build and test real system, so it is possible to get results more quickly)
FLIGHT SIMULATOR
- Flight simulators are used to train pilots how to fly aircraft.
- They can also be used to test new aircraft before they are actually flown for the first time.
- Flight simulators are expensive to buy but are much cheaper than actual aircraft.
A landing simulation with ice on the runway, thick fog and only one of the four engines working would
really test the pilot’s ability
Flight simulators enable pilots to experience turbulence, snowstorms, thunderstorms, fog, etc, without
leaving the ground.
The data is entered into the computer and the simulation is run. The following scenarios may be tried
out:
- timing of lights is varied to see how the traffic flow is affected
- build up number of vehicles stopped at a junction and change timing of lights to see how it
affects the traffic flow
- increase/decrease traffic flow in all directions to see how the traffic is affected
- try out the impact of accidents
- consider passage of emergency vehicles
- effect of adding in pedestrian crossings
- once the simulation is run, the timing of the lights is determined and how they interact so that
the maximum traffic flow is achieved;
- fault scenarios (e.g. an accident) and their impact are considered
how clouds build up, how temperature and pressure changes over, for example, the next 7
days, wind speeds etc.
- it is also possible to do statistical analysis and predict the percentage probability that certain
weather conditions will occur.
Output:
- Information obtained is displayed on the computer screen ready for presentation on
televisions
- Information can be printed documents.
- Tables and graphs are produced
- Rainfall maps and isobars are produced.
- Expected minimum and maximum temperatures are produced
- Areas of pressure change with time so it is possible to predict rainfall, strong winds, etc. in
advance
- Show how the clouds patterns will change with time so it is possible to predict rainfall
Advantages of this automatic weather forecasting system include:
- Computer can take readings during weekends and public holidays without the presence of human
beings.
- Computer readings are more accurate.
- Readings can be taken more frequently.
- Readings can be taken any time of day or night.
- Graphs can be produced more easily.
- Readings can be taken more reliably.
- Humans can be more productive if not collecting data.
- GPS systems are used to determine the exact location of a car, airplane, ship or any form of
transport which travels from one place to another.
- In vehicles these systems are called Satellite Navigation Systems (sat nav).
- Satellites in outer space transmit signals to the Earth.
- Computers in vehicles (e.g. car, airplane or ship) receive and interpret these signals.
- Positioning depends on very accurate timing – atomic clocks are used because of their accuracy to
within a fraction of a second per day.
- Each satellite transmits data indicating its position and time.
- The computer in the vehicle calculates its location based on the information from at least three
satellites as shown below:
Advantages
- It is far safer since a driver of a vehicle doesn’t have to consult maps whilst driving.
- it also removes error (e.g. going the wrong way down a one-way street).
- Sat nav systems can also give additional information such as position of speed cameras, estimate
time of arrival, etc.
- GPS can monitor a vehicle’s position if it has broken down or has been stolen (vehicle tracking
system).
- In airplanes GPS can pinpoint its exact location in case of an accident which enables search teams to
quickly respond to the incident.
Disadvantages
- maps may not up to date therefore instructed to turn into a road which no longer exists
- road closures due to accidents or road works may cause problems to a sat nav system
- signal loss can cause problems with GPS systems
- potential interferences from external sources (major problem on aircraft)
- incorrect start and end point entered into system can cause problems
THE INTERNET
Internet stands for INTERnational NETwork and it is a global (world-wide) connection of computer
networks. On the internet, one is able to access data stored on a server in any part of the world as long
as it is connected to the internet itself. The internet can be accessed from anywhere. It is also available
to anyone. No one controls the internet as computers in different countries are connected yet the
countries have different laws. However, each country may regulate internet usage in its own territory.
Definition of Terms
Information Superhighway (ISH): A global network of computers for moving huge amounts of
information via satellite and cable connection. Information found on ISH includes home shopping,
entertainment, news, software downloads and help, online banking, stock market dealing, jobs,
(vacancies), university placements, etc.
Information Technology (IT): - The use of computers in information handling and communication.
Information Age: A period beginning in the last quarter of the 20th century when information
became easily accessible through publications and through the manipulation of information by
computers and computer networks.
Global Village: the use of the internet to access information from any part of the world.
Information and Communication Technology (ICT): The use of computers and related method as a
tool for information communication, for instance through e-mails, cell phones, etc.
Web page: a document or page on the internet that contains information about an organisation
Website:-a collection of web pages at the same domain, often with a common name and maintained
and provide information of a single organisation, e.g. www.zimpapers.co.zw .
Kapondeni T. Page 21 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
Website features
The following are the general features of a good website
- shopping basket
- offer security when using credit/debit cards
- search facility for artist, tile, item, etc
- drop down boxes to choose categories
- help facilities
- currency converters for international customers
- date/sales confirmation by automatic email
- saved customer details/customised pages
- ability to track status of orders
- ability to listen to/view/see video/see product, etc
Kapondeni T. Page 22 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
When designing web pages it is necessary to supply the correct spacing for customer information
(and/or use drop down menus), buttons to navigate to other web pages, etc
(c) Network operating system: manages the network and offers security to internet users.
NB: internet account: a unique personal identifier given by the Internet Service Provider (ISP). An
ISP is an organisation that links users to the internet, for example, Mweb, Ecoweb, Africaonline, Yahoo,
Google Inc, etc.
Problem
Hacking - Use of passwords and (usernames) ids to prevent illegal access to files.
- Locking the computer itself or locking the computer room.
- Encryption stops the information from being read even if access has
been gained to a file but won’t stop hacking!!
- Installing firewalls
Viruses - Use ant-virus software like AVG, Avast, Esat NOD32, etc,
- Use firewalls to prevent viruses from entering a computer.
- Do not open emails/attachments from “unknown” sources;
- Only load software from disks/cds which are originals
Corruption/Loss
of Data due to
the following
ways: - Prevention of viruses is as given above
- viruses
- hackers - Prevention of hackers is as given above
- Accidental damage to data can be prevented by: keeping back-up
- accidental files or use the Grandfather-Father-Son (GFS) method;
damage to data - use of passwords and ids can also help by restricting access in the
first place
- protection against hardware faults could be through keeping back-
ups or use Grandfather-Father-Son;
- hardware faults
- use of UPS (Uninterruptible Power Supply), in case of power loss
- Running parallel systems also help
- Software faults can be solved by keeping back-up files or
NB: Note
- Viruses do not only infect computers, they can also affect mobile phones, MP3 players etc. –
any device which can download files from a source such as the internet is potentially at risk.
- Backing up may allow files that have become lost/corrupted (due to hacking or viruses) to be
reinstated; however, this would not recover the system nor would it prevent hacking/viruses
affecting a system in the first place.
- Problems like spam, pop-ups, cookies, etc. are more of a nuisance (they can also slow down the
operation of a computer). These can however be blocked (or made inactive) by using suitable
software.
When using the Internet, security can be enhanced using encryption.
Credit and debit card transactions can also be protected by a special type of password control.
For example, if a user chooses the password COMPUTE34 to protect their credit card, when they buy
something over the internet the card issuer will ask the user an additional question such as: “Please
type in the 2 , 4 and 7 character of your password in the following boxes:
□□□“
The user will then type in O P E and the card purchase will be authorised. This additional protection is
used as well as encryption.
Some of the new systems allows user slots the card into the side of the keyboard and is required to
type in a PIN before the Internet can be accessed. This gives an additional level of security since it is
necessary to have the card, know the PIN associated with the card AND also know the user’s log in id
and password!!!
- The first part (kapondenit) is the username and is used to identify the name of the person or
organisation that has the mailbox. The username is unique.
- The second part (gmail) is the domain name and is used to identify the server where the
person has a mailbox.
- The other part (the one after the dot (.) indicates the domain type e. g
o . com – commercial organisation
o . edu – educational organisation
o . org – non-profit making organisation, etc
- An e-mail address should be known by many people so that they will know the address where
to send the emails.
- Every mailbox is protected from illegal access by use of password.
- A password is a secret group of alphanumeric characters used to protect a document from
unauthorised access.
- NB. When creating an e-mail, one is requested to enter the password twice in order to verify if
it is the one you intend to use.
- Mailbox: - An electronic folder used to store electronic mails. It contains the inbox; which
contains incoming mails; and the outbox; which is used to save outgoing messages.
Disadvantages of e-mail
Not everyone has equipment to send e-mails.
Junk mail (spam) is a problem.
You waste a lot of time looking through mails that are just adverts.
E-mails are not as secure as traditional mails.
The system relies on people checking their mails regularly.
Old people feel left out as they consider themselves too old to learn.
Equipment used to send and receive e-mails is very expensive as compared to traditional
methods.
However, despite the increase in the use of e-mail, there has been a sharp increase in the amount of
paper used. This is because:
People print copies for meetings and then destroy them afterwards, but if needed again, print
out another copy.
Some people find it difficult reading large amounts of text on the screen.
People often e-mail colleagues rather than use the phone who then print out the document.
3. Video conferencing: Conducting meetings with several people in different locations and seeing
each other on the screen of networked computers. Video images and audio are seen/heard in real
time on large monitors/through speakers. Delegates do not need to leave their homes or work places
or conference rooms. Video conferencing requires the following:
A computer with a codec (which converts and compresses analogue data into digital data for
sending down digital lines.)
Video cameras or Webcam to take video images
Microphone to speak through.
Loud Speakers for delegates’ voices to be heard.
Large and high resolution monitor.
Internet/WAN/modem to transmit data
An integrated Services Digital Network (ISDN) line with a high bandwidth to transmit video
data at fast speed.
Sound card.
Video card
Compression software to compress video and sound
which converts and compresses analogue data into digital data for sending down digital lines
requirement for echo cancellation software (this allows talking in real time and keeps
communications synchronised)
4. View data (videotext) systems: These are interactive systems on which users view data when
they access specialized databases like Prestel. The requirements include:
the telephone line or cable TV,
specialized keyboard and
A Television set.
Information on the database is provided by companies that advertise their products like news,
weather reports, and so on. View data systems have the following advantages:
they are interactive and
service is provided for free to the public.
5. Teletext: It is a broadcast service that comes as a television transmission. It is cheaper than the
internet service. However, it is non-interactive.
6. Facsimile (Fax): A method whereby output from a scanned document is send over telephone line
and reproduce on a fax machine on the receiving end. Fax method has the following advantages:
It is very cheap to send messages.
It is very easy to use.
It is a very fast method of sending messages.
NB: The use of fax, e-mail, view data, teletext, teleconferencing and video conferencing in an office
brings about an electronic (paperless) office.
- An electronic office is an office in which the storage and processing of data as well as
communication are done electronically.
- An electronic office is efficient because:
Communication is easier and faster.
Less paperwork is involved.
Current and up-to-date information is provided.
Ensures a clean office environment.
- Tele and video conferencing as well as networking bring about tele-commuting (tele-working).
Tele-commuting is carrying out work without leaving home.
- Communication is done through networked computers.
- Requirements for telecommuting includes: modem, very fast communication links (for example
telephone line), computers, internet services, etc.
Benefits of telecommuting
- Easier to concentrate on work in a quiet environment than in a noisy office.
- It saves time spent in travelling to the work place thereby increasing productivity.
- It cut costs involved in travelling to work place.
- The employer saves costs of office space and overheads like water and electricity.
- People can be recruited from a wide geographical area.
- People with disabilities like the handicapped can be employed.
- People in different locations can work as a team.
Disadvantages of tele-commuting
- Workforce not in office is difficult to control.
- Workers would not understand corporate goals and will not be loyal to the organisation.
- Employees feel isolated and miss the environment of an office full of colleagues.
- People may find it difficult to work in teams.
- It is difficult to separate work from home duties while at home.
- Unions find it difficult to mobilise workers for demonstrations and strike.
7. File Transfer : allows users to transfer files from host computers on the internet to their personal
computers.
8. News groups: a global electronic bulletin board system in which users exchange information on
different topics.
9. Entertainment: the internet provides an option for users to download and listen to music,
newspapers, radio stations, etc.
10. Internet Shopping: (Internet buying, electronic commerce, online shopping): The internet
provides a facility for customers to purchase products from the internet without visiting shops. Credit
cards are used in internet buying.
- Shopping is done any time of the day, thus providing a 24 hour service.
- A wide choice of products is available.
- Shopping can be done by setting up a file.
- It is very convenient to use as customers do not leave their homes for shopping.
- It cut travelling costs to the shops.
- Customers do shopping without being jostled by crowds.
- There are less cases of impulse buying.
- Product reviews are obtainable before purchase.
- Goods and services usually cheaper on the internet.
- Customer need not to go to shop and therefore save travelling time.
To businesses/shop managers
- Business is carried out any time of the day (provides a 24 hour shopping service).
- Increases sales due to greater number of customers from all over the world.
- No wastage space for goods is involved.
- Ensures huge saving on overheads like rent, warehousing, employee facilities.
- More goods can be made available.
- It is cheaper to use as there are no leaflets, pamphlets, etc.
- Can reduce the number of shops on the streets.
- Organisations can employ fewer workers thereby cutting labour costs.
- No need to travel to the shop as business can be run from home.
To businesses
- Increase in cases of industrial espionage.
Industrial espionage involves selling of company secrets by employees to rival companies and the
use of destructive methods by competitors to destroy other organisations.
Less money is spent in travelling The gap between the rich and the poor
widens as the rich get savings from shopping
on-line.
Increase in small businesses. Lower profits for companies that do not
engage in e-commerce.
Decline in leisure shopping as goods are deskilling of the work force (e.g CAD has
bought on-line. taken over draftsman skills, word processors
have taken over many office-based duties,
etc.)
A lot of money is wasted by the need to re-train the workforce in the use of new software/computers
Computer systems have allowed companies to set up call centres in other countries where potential
cost savings can be made. This, of course, can lead to job losses in the host country.
INTRANET
- Intranet stands for INTernal Restricted Access NETwork. It is a restricted private organisation’s
network that uses internet technologies for the benefits of such an organisation.
- An intranet is a computer network based on internet technology that is designed to meet the
internal needs for sharing information within a single organisation/company
- Intranet requires password entry.
- Intranet is protected by a firewall.
- Intranet only gives local information relevant to the company/organisation
- It is possible to block access to certain sites using the intranet, e.g Facebook.
- it is not always necessary to have external modems when using intranets
- information for use on intranets is stored on local servers
Many companies use intranets as well as the internet. The main reasons for doing this include:
- it is safer since there is less chance of external hacking or viruses
- it is possible to prevent employees from accessing unwanted web sites
- companies can ensure that the information available is specific to their needs only
- it is easier to keep “sensitive” messages to remain within the company only
Internet Intranet
the INTERNET is INTERnational NETwork an INTRANET is INTernal Restricted Access
NETwork
Internet gives all information including that the intranet only gives local information
which is not relevant to the organisation relevant to the company/organisation
Always need external modems for internet it is not always necessary to have external
connections modems when using intranets
Information on internet saved in different information for use on intranets is stored on
computers local servers
the internet can be accessed from anywhere Intranet is accessed within the range of the
organisation’s network
the internet is available to anyone without whereas the intranet requires password
password restriction entry
Extranet: It is an intranet made available off -site to members or business partners of an organisation.
It is an extension of the intranet giving authorized outsiders controlled access to the intranet.
Wireless Communication:
This is a method of networking (linking) computers and computer devices without the use of cabling
(wires), e.g. using Bluetooth, radio, satellite, infra-red, microwave, etc. The devices that can be used in
wireless technology include:
- Mobile phones /cell phone/remote key pad/remote control/ remote keyboard.
- Infra-red mouse.
- Multimedia mobile handsets and notebooks.
- GPRS (General Packet Radio Service) modems.
- Wireless LAN(or Wi-Fi –Wireless Fidelity: A local area network that uses high frequency radio
signals to transmit and receive data over distances of a few hundred feet; uses Ethernet protocol).
- PDAs (personal digital assistants).
Most areas in the world now offer broadband rather than dial up for connecting to the internet. The
advantages of broadband over dial up include:
- the system is always “on”-no need to dial into ISP every time you want access
- the connection rate/data transfer rate is much higher (for example broadband operates at 11 000
kbps compared to the dial up rate of 60 kbps)
- there is a flat monthly rate with broadband (dial up is charged per hour of usage)
- it is possible to use the telephone at the same as the internet with broadband/the line isn’t tied up
- broadband permits other facilities such as “skype”
- Wireless technology (WiFi) allows connection of a computer to the Internet without the need for
connecting cables. A router (containing a modem and external aerial) is connected to a telephone
line and it is then possible for any computer within range to communicate with the router and
allow Internet access – the link between computer and router is completely wireless.. The main
advantage of doing this is clearly the portability (i.e. can go anywhere within range since no wires
are needed).
It isn’t just computers that can be linked without wires, various peripheral devices can be linked to a
computer system without the need for a physical, wired connection.
Kapondeni T. Page 33 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
For example:
- Printers
- Keyboards
- Mouse
- Digital cameras
COMPUTERS IN ENTERTAINMENT
Music
Computers are now used for playing and composing music. Computer hardware and software
advances have changed how music is generated and produced. Software used includes Fruit Loops,
Virtual DJ, etc.
Musical instruments can be connected to a MIDI (Musical Instrument Digital Interface).
MIDI is a type of serial interface built into a piece of electrical equipment so that it can communicate
with the computer. It also converts output signals from the instrument, e.g. guitar, into digital form.
Some of the key reasons for the widespread development of music using computers are:
- the recording process for music is faster
- there is no need for tapes during the recording process
- It is easier to remove or add sounds to a track.
- Sampling of sounds is very easy
- actual musical notes can be generated from the music itself by software
- music samplers and mixers give an almost limitless ability to alter the original tracks recorded
in a studio
- don’t need to understand music notation to write a musical score
- electric instruments (such as guitars and organs) play back through electronic machines
- synthesisers combine simple wave forms to produce more complex sounds
- electric organs can now mimic almost any instrument (including a full orchestra)
- automatic rhythm
- music notes automatically printed out in the correct format
- There are many other software and hardware developments; the above is just a summary of
the more common elements.
- A performance can be directly recorded onto the computer and stored in a MIDI file, which can
be edited later.
- Synthesisers are also used to generate notes and desired sounds from pre-recorded electrical
signals. These signals can be combined with signals from conventional instruments and
recorded to produce songs.
Music can be compressed to produce MP3 (motion picture expert) format.
Music can be played using software like Microsoft Windows Media Player, JetAudio, Nero Show Time,
Real Player, etc.
Image processing: The images can be darkened, sharpened, changed colour, cropped, etc.
Animation
- Animation consists of displaying a rapid succession of 2-D or 3-D graphics arrangements to create
the illusion of movement. It is used for web presentations and advertisements and for film.
- Computer animation is the art of creating moving images via computer hardware and software.
- For 3-D animation, objects are designed on a computer and a 3-D skeleton is produced.
- The limbs, mouth, eyes, etc. are moved by the animator using key frames. A frame can just be a
picture/graphic image.
Kapondeni T. Page 34 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
- Avatars are another example of animation. These are often used to represent people either in 3-D
(as used in computer games) and in 2-D (as used in internet message boards).
- Some avatars are animated consisting of a sequence of images played one after the other.
- Ultimately, animators want to create a human image which moves and interacts with its
background in such a way that the viewers can’t tell if a particular scene is computer generated or
produced by real actions in front of an actual movie camera.
- Sounds can be added to the animation to produce advertisements, cartoons and films.
- Computers with large hard disk and powerful processors are needed, as well as high resolution
monitors
- Special effects in many modern films (televisions) all use computer animation to produce fantasy
worlds.
- Telephone line/high distance communication link: for online linkage of the POS terminal
and the bank.
The POS terminals can also be connected to the main server in banks like CABS, Barclays, etc. This
enables customers to purchase goods electronically without the burden of carrying cash around. This
is called Electronic Funds Transfer at Point of Sale (EFTPOS). Customers can also be given cash
back at the EFTPOS after purchasing goods using debit cards.
After purchasing the goods, a receipt is produced. The receipt will have the following details:
- date of purchase,
- time purchased,
- shop attendant,
- item (s) bought,
- quantity bought,
- unit price,
- total price,
- amount tendered,
- change,
- cashier name
- etc.
NB. The system updates the master file when an item is sold. It first searches the master file. Using the
barcode number (or product code) it decrease the number in stock and increase the quantity sold
*NB:
POS –Point of Sale terminal: the point where customers pay for goods purchased in shops, either by
cash or otherwise.
Difference between Electronic Point Of Sale (EPOS) and Electronic Funds Transfer at Point Of
Sale (EFTPOS).
EPOS terminal only involves scanning of goods electronically by use of barcodes and by keyboard
entry. EFTPOS involves electronic scanning of goods at point of sale by use of scanners and barcodes
(and use of keyboard) and has an added feature of allowing customers to transfer money from one
account to another, usually to the account of the shop where the goods are being bought. Customers
can also get cash-back at the EFTPOS terminal in shops.
CAM(COMPUTER-AIDED MANUFACTURE)
This is automated manufacturing process where computers are used to regulate (control) and
monitor the production process in industries.
CAM uses some industrial robots or computer-controlled sensors for detecting:
Excessive heat
Faults
Acceleration forces
CAM works well with CAD systems. Machinery is programmed automatically
A real CAD/CAM system enables any engineering component to be designed and manufactured using
numerically controlled machine tools. The computer make some calculations for defining the tool path
and generates the instructions necessary to produce the part. A machine tool such as a lathe is
controlled by a computer which sends it instructions to select tools and to use them to make metal
components.
CAM and CAD system systems are integrated. Data from CAD system is converted to a set of
instructions for the processor controlling the CAM equipment. Once a part has been designed using
the CAD software, the other processes are automatic. The following are involved:
(a) Conversion of data into a set of machine tool instructions;
(b) Operation of the CAM system:
a. Selection of tools, e.g. cutter, drills, etc.
b. Selection of speed e.g. for drills
c. Movement of the tool to machine the part being manufactured.
Kapondeni T. Page 37 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
URL: Uniform Resource Locator: This is a unique address that identifies a website/page on the
internet, e.g. http://www.econet.co.zw. This only identifies one (unique) web page for Econet Wireless
which is found in Zimbabwe (.zw). Thus a URL is a unique address for each web page. A typical URL
looks like:
http://www.google.co.zw/computing/student.html.
This address has some a number of parts:
http:// - protocol
www. - host computer
google.co.zw – Domain name and country
computing – folder
student. – Document name
.html – document type (HTML type of document in this case)
"http" (HyperText Transfer Protocol) and a domain name (such as ."co.uk"). Other domain names are
as follows:
.zw Zimbabwe
.zm Zambia
Phishing is a way of fooling someone into handing over the security details for their bank account.
The phisher sends an email that looks as if it comes from the recipient’s bank and contains a link to a
website controlled by the phisher. It can be prevented by not clicking on the link and instead going to
the bank’s website directly.
Spam is unwanted email, often advertising products or services. It can be prevented by using an anti-
spam filter, which is oft en provided automatically by an ISP.
Pharming is an attack by hacking. It intercepts a browser request and redirects it to another website
on which the attacker attempts to steal authentication credentials or debit or credit card details, as in
a phishing attack. It can be discouraged by changing the password on a router (especially a wireless
router) so that the hacker cannot redirect the DNS information.
COMPUTER NETWORKS
Definition of Terms
a. Network: A connection of computers for them to share data, files and resources like a printer.
b. Data communication: The process of transferring data through networked computers
Advantages of Networking
- Expensive peripherals like printers and scanners can be shared between users.
- Messages can be sent easily and faster between users whether on WAN or LAN.
- Avoids duplication of information as users can access the same file on the network.
- Network software can be purchased cheaply than buying individual packages for each computer.
- It is possible to access data or programs from any terminal or workstation.
- Data and programs can be stored centrally making it easier to maintain and backup.
- Users can be easily prevented from accessing files not intended for them.
- Allows sharing of files, software and data held in computers.
- Allows emails to be send between users.
Disadvantages of Networking
- Sophisticated equipment is needed, which may be expensive to buy.
- Security of data can be a problem due to hacking.
- Wiring can be expensive both to buy and to install; wiring can be sunk on the ground to avoid
trailing cables.
- If a server breaks down, the whole network becomes unusable.
- Networks need experienced network managers, who will be highly paid to keep the network
running.
TYPES OF NETWORKS
- Computer networks are grouped into Local Area Networks (LAN) and Wide Area Networks
(WAN).
- However we also have WLAN (Wireless Local Area Networks), MAN (Metropolitan Area
Networks) and PAN (Personal Area Networks); and these are described below.
3. Network cables: These act as pathway for data from one computer to another. Cables can be
coaxial, fibre optics, twisted pair, etc.
4. Hub: a device used as a connection point for devices and computers on a Local Area Network.
Usually used when connecting computers to a star network.
5. Network cards for each computer/terminal: - a device that identifies computers to the network,
where network cables are plugged on the computer
NB: A bridge can also be connected to link a Local Area Network to another network and is an
optional requirement.
However, some networks are now using wireless technology and these are called Wireless Local
Area Networks (WLAN). WLAN uses radio signals and therefore no cabling is required.
The diagram below shows the structure of a LAN that can be connected to another network.
A PAN enables user to transfer files from a laptop to a PDA, camera or Personal Computer.
NETWORK TOPOLOGY (CONFIGURATION)
This refers to the shape/configuration of the network. Common network topologies are Ring, bus, star
and mesh network topologies.
1. Ring Network:
- Computers are connected together to form a circle and uses a token when transferring data.
- Data/information travels in one direction only.
- Information moves around the ring in sequence from its source to its destination.
- As data passes from one computer to another in the ring, each computer removes any data relevant
to itself and adds any data it wishes to send.
- The diagram below illustrates the physical configuration of a ring network:
- Only the computer with the token is allowed to send data at a given time. One may not send data
when another node (computer) is still sending its own data.
- System is less secure as token together with data has to pass through other nodes that do not
concern it.
2. Star Network:
Computers form a star shape with host computer at the centre.
The Server (host computer) manages all other computers/terminals on the network.
If the terminals are not intelligent, they have to rely on the host computer for everything.
This network is as shown below:
3. Mesh Network
- A network in which each computer serves as a relay point for directly sending information to any
other computer on the network.
- No central device oversees a mesh network, and no set route is used to pass data back and forth
between computers.
- Thus, if any one computer is damaged or temporarily unavailable, information is dynamically
rerouted to other computers—a process known as self-healing
Definition of Terms
(a) Bus/Backbone: the dedicated and main cable that connects all workstations and other computer
devices like printers.
(b) Nodes: these are connection points for workstations and the bus.
(c) Terminator: devices that prevent data in the bus from bouncing back, causing noise and prevents
data from getting lost.
NB: Point – to-Point Connection: Point-to-point topology is the simplest connection, consisting of
two connected computers.
NETWORK PROTOCOLS
A protocol is a set of rules that governs how communication between two devices will occur. Such
devices might be computers themselves, between modems.
A network communication protocol: a standard method for transmitting data from one computer to
another across a network. Some of the protocols that we are going to look at are:
i. TCP/IP (Transmission Control Protocol Internet Protocol)
TCP: It ensures that data is transmitted accurately
IP: It ensures that data is transmitted to its correct address (IP address). Every device on the
internet has its IP address. It also ensures that packets are rearranged to the original message
on arrival of their destination.
ii. HTTP (HyperText Transfer Protocol)
This is a protocol that defines the process of identifying, requesting and transferring
multimedia web pages over the internet. It is used for transferring data across the internet,
usually between servers and computers on the internet. It is based on the client –server
relationship. It uses TCP/IP to transmit data and messages
iii. FTP (File Transfer Protocol)
it is a protocol used to transfer data from one computer to another. It is often used to download
software from the internet, and it uses the TCP/IP protocol in doing this. However, FTP has no
security to data as the data is not encrypted prior to its transmission.
iv. TELNET
This is a network protocol that allows a computer user to gain access to another computer and
use its software and data, usually on a LAN and on the Internet. It allows users to access data
stored on servers from their terminals. Telnet allows computers to connect to each other and
allows sharing of data and files. Telnet has security problems especially on the internet.
v. VoIP (Voice Over Internet Protocol)
It is a method of using the internet to make ordinary voice telephone calls. Thus it is a way of
ha+ving phone conversations using the internet as a way of communication. By VoIP,
international and long distance calls are of the same price as local calls and sometimes are for
free. However, the system does not offer emergency calls. An example of VoIP is Skype.
This is a person who identifies problems of the existing system and recommends the best solution to
such a problem. The duties of a systems analyst are:
Identifies the problems of the current system.
Liaises with system users and determine their requirements.
Finds out facts important to the design of the new system.
Determines the human and computer procedures that will make up the system.
Participates in the process of system implementation.
Problem
Identification
Evaluation
Fact Finding
Implementation
Feasibility Study
Documentation &
User Training
Analysis
Development &
Testing
Design
1. Problem identification/Recognition/Definition/Realisation:
This is where the problems of the current system are stated.
These might have been realised by system users or by managers. The system might be producing
wrong results.
This includes the general statement of the problems being experienced by the system.
i. Interview:
This refers to the face-to-face communication between two or more people in order to obtain
information. Interviews can also be done over the phone but the most common ones are face to face.
Interviews are done when you want to collect information from a very small population sample.
Advantages of Interviews
The researcher can ask for clarification on some points that may not be clear.
Encourages good rapport between the researcher and the respondent.
Non-verbal gestures like facial expressions can help the researcher to determine if the
respondent is telling the truth.
Information can be collected even from the illiterate since the respondent’s language could be
used.
First-hand information is collected.
The researcher can probe to get more information.
Disadvantages of Interviews
It is impossible to remain anonymous on the part of the interviewee.
It is expensive since the researcher has to travel to the interview venue.
It is time consuming as more time is spent travelling and carrying out the interview.
Good interview techniques are required as failure may lead to disappointments.
Biased information can be given since the respondent may not tell the truth.
iii. Questionnaire:
A document with carefully crafted questions to be answered by the respondent by filling on the spaces
provided. Questionnaires are used when collecting information from a widely spaced population
sample and when collecting information from many people. A questionnaire contains open-ended and
closed questions. Open-ended questions are gap filling questions which require the respondent to
express his or her own view. Closed questions are guided questions where the respondent just
chooses Yes or No, True or False, or by just putting a tick on given options. Questionnaires can be
distributed personally or by post.
Advantages of questionnaires
Questions are very simple and faster to answer.
It saves time as questionnaires can be distributes and then collected later.
Respondents can fill questionnaires at their own pace.
Give guarantees confidential of information, thereby encouraging respondents to give accurate
information.
They are cheap to use when collecting data from a very large sample
Disadvantages of questionnaires
Some questions are left blank.
Some questionnaires may not be returned at all.
iv. Observations:
It is a fact finding method that involves viewing the actual system in operation by the researcher. The
researcher can even take part in operating the system. It is used when the researcher wants to see for
himself how the system operates.
Advantages of observations
First-hand information is collected.
Accurate information can be obtained.
Areas of interest can be observed.
The researcher can take part in operating the system thereby getting insight on how the
system operates.
the analyst obtains reliable data
it is possible to see exactly what is being done
Disadvantages of observations
People work differently if they feel that they are being observed, therefore inaccurate
information can be collected.
The researcher may not understand some of the activities being observed.
It is time consuming to collect the required information.
The researcher may interrupt some of the activities being done.
if workers perform tasks that violate standard procedures, they may not do this when being
watched!!
3. Feasibility Study:
It involves an evaluation of proposals to determine if it possible to construct a new system or just
modification of the existing one. Feasibility can be measured by making the following considerations:
Economic feasibility: determining whether the benefits of the new system will out-weigh the
estimated cost involved in developing, purchasing, assembling requirements, installing and
maintenance of the new system. The cost-benefits analysis is carried out. Benefits can be tangible and
quantifiable, e.g. profits in terms of monetary values, fewer processing errors, increased production,
increased response time, etc. Other benefits are intangible, e.g. improved customer goodwill,
employee moral, job satisfaction, better service to the community, etc.
Technical feasibility: determines if the organisation can obtain software, equipment and personnel
to develop, install and operate the system and even to maintain it.
Social feasibility: a measure of the system’s acceptance by the general public; if it will meet the
norms and values of the society.
Legal feasibility: This is determining if the system can conform to the laws and statutes of the
country. This is done by considering government legislation, e.g. Data processing system must comply
with the local Data Protection Acts
Operational feasibility: determines whether the current work practices and procedures are
adequate to support the system, e.g. effects on social lives of those affected by the system, can it work
well with existing hardware, etc
Operational feasibility assessment focuses on the degree to which the proposed system fits in with the
existing business environment and objectives with regard to development schedule, delivery date,
corporate culture, and existing business processes
After carrying out the feasibility study, a feasibility study report must be produced and it contains the
following information:
- A brief description of the business.
- Advantages and problems of the existing system.
- Objectives of the new system.
- Evaluation of the alternative solutions.
- Development timetable.
- Management summary.
- Terms of reference.
- Proposed solution.
4. Analysis stage:
This is the in-depth study of the system to determine how data flows within the system.
Analysis tools used includes:
- Decision trees
- Decision tables
It involves use of flowcharts, data flow diagrams, structure diagrams, decision trees, and others, to
describe the operations of the system in detail. The analysis stage determines whether
computerisation will take place or not. The analysis stage also specifies the hardware and software
requirements of the new/proposed system, the advantages and disadvantages of the proposed
solution, etc.
Analysis stage also involves identification of the following:
- Alternative solutions: other solutions, not considering the chosen one
- Specification requirements: other system requirements like hardware, software, personnel, etc
- Carrying out the Cost-benefit analysis: weighing out costs of developing the new system versus
the benefits that will be realised.
Dataflow Diagrams
These are diagrams that show how data moves between external sources, through processes and data
stores of a particular system. Dataflow diagrams use the following symbols:
5. Design Stage:
This stage is concerned with the design of the new computer based solution as specified by the
analysis stage. Design stage involves:
Input Design: includes designing of data entry forms, input methods (e.g. by filling forms, use of
barcodes, etc) and the user interface.
Output Design: Includes design of reports, data output formats, screen displays and other printed
documents like receipts, etc
File design: Involves designing tables/files, records and validation rules. It also involves determining
how data is to be stored and accessed, the media to be used for storage and the mode of file
organisation. Fields in each files ca be designed, their length and data type, e.g.
File Structure:
Program Design: Involves design of systems flowcharts, structure diagrams, dataflow diagrams,
algorithms, etc. Selection of appropriate hardware: Specify the input hardware, output hardware,
processing hardware and speed, storage media, RAM size, etc. Selection of appropriate software:
specifying the type of operating system, programming language or database package and other
application packages to be used.
Design of test plan and strategy, Design of the user manual, Design of the technical documentation
In general, design stage involves the following:
design the data capture forms/input forms
design the screen layouts
design output forms and reports
produce systems flowcharts and/or pseudocode
select/design any validation rules that need to be used
design a testing strategy/plan
file structures/tables need to be designed/agreed
select/design the hardware requirements for the new system
select/design the software requirements
produce any algorithms or program flowcharts
select the most appropriate data verification method(s)
interface design(Command-line, GUI, form-based, menu-driven, etc
The computer environment is prepared, the programs to be written are done and they are tested to
determine if the run as expected.
Computer environment being prepared: electrical wires, network cables are installed, furniture, air
conditioning are in place. The computers are installed and tested.
It also involves the construction and assembling of the technical components that are needed for the
new system to operate. This includes preparation of the computer room environment, coding of the
computer program using a specific programming language, testing of the coded program,
Testing strategies
- standard (normal) data testing: testing of data within the given range (should be accepted)
- abnormal data testing: testing of data outside the given range (should be rejected)
Kapondeni T. Page 50 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
- extreme (boundary) data testing: testing of the minimum and maximum values in the given
range (should be accepted)
(a) User Documentation: It is a manual that guides system users on how to load, operate, navigate
and exit a program (system). User documentation contains the following:
System/program name.
Storage location.
System password.
Instruction on how to install the program.
Instruction on how to operate the system: e.g.
o How to quit the program
o how to load/run the software
o how to save files
o how to do print outs
o how to sort data
o how to do a search
o how to add, delete or amend records
o print layouts (output)
o screen layouts (input)
o the purpose of the system/program/software package
o error handling/meaning of errors
o troubleshooting guide/help lines/FAQs
o how to log in/log out
(b) Technical Documentation: This is a manual for programmers which aid them in modifying the
system and in correcting program errors. The following are found in technical documentation:
Algorithms of the program,
Program testing procedures and test data,
Sample of expected system results,
Program structure showing modules and their relationships,
System flowcharts,
Programming language used,
Program code,
program listings,
File structures.
Validation rules
Output formats
Bugs in the system
Hardware requirements
Software requirements
User training:
Once a new system is put in place, existing employees are trained on how to operate the new system,
otherwise new employees are recruited.
User training: users are trained on how to enter data, search records, edit fields, produce reports,
handling errors, etc.
User training can be in the following forms:
i. On the job training: Users are trained at their organisation by hired trainers. This has the following
advantages:
Kapondeni T. Page 51 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
Learners practice with actual equipment and the environment of the job.
Learners can engage in productive practices while on training.
This is cheaper for the organisation.
Enough practice is gained on how to operate the system.
ii. Classroom training: Users are send to other colleges and institutions which offer courses on the
subject matter. This could be expensive to organisations since employees take study leave while being
paid at the same time. Employees can also be trained on aspects that they will not apply when they
finish the course. The gap between what is learnt and what is needed at the job may be too wide.
a. Parallel Run: This involves using of both the old and new system concurrently until the new
system proves to be efficient. It involves operating the new and old systems simultaneously until
management is confident that the new system will perform satisfactorily. Other workers will be using
the old system while others use the old system but doing the same type of job.
Advantages of parallel run
Results for both systems are compared for accuracy and consistency.
If the new system develops problems, it will be easier to revert to the old one.
There is enough time given to determine if the new system produces expected results.
Employees have enough time to familiarise with the new system.
ii. Abrupt (Direct) changeover: Involves stopping using the old system on a certain day and the new
system takes over on the next morning. This is suitable for control systems like in chemical plants and
for traffic lights.
Advantages of Direct Changeover
Kapondeni T. Page 52 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
iii. Phased / Partial conversion: This is whereby the old system is gradually removed while the new
system is gradually moved in at the same time. This can be done by computerising only one
department in an organisation this month, then the next department in two months’ time, and so on
until the whole system is computerised.
iv. Pilot conversion: This is whereby a program is tested in one organisation (or department), and is
applied to the whole organisation if it passes the pilot stage. It serves as a model for other
departments. A pilot program can then be applied in phases, directly or using the parallel run method.
NB: before making system live, the following must have taken place:
- Production of user documentation and technical documentation
- Installation of hardware and software
- fully testing the new system
- training the staff to use the new system
9. Maintenance/review/evaluation Stage:
This stage is concerned with making upgrades and repairs to an already existing system. Certain
sections of the system will be modified with time.
Maintenance can be to Perfect the system, to Correct some errors or to make it adapt to changing
needs, e.g change in government laws. Maintenance involves the following:
update hardware as new items come on the market or the company changes in any way which
requires new devices to be added/updated
update software if necessary if company structure changes or legislation is introduced which
affects how the company operates
*NB: Meanings
of these symbols are not universal and mean a different thing to others. Some symbols are borrowed
from program flowcharts.
Below is a systems flowchart for a payroll Below is a systems flowchart that is used
processing system that uses batch to update a stock master file when stock
processing items are purchased.
Review Questions
1. (a) A systems analyst was brought in to computerise a paper -based car sales system. What
methods could be used to gather data about the existing system? Give reasons for your choice.
(b) What would need to be done before the new computerised system become ‘Live’?
(c) Why would PILOT and PARALLEL change over methods be suitable in this application?
2. A program is written to input daily temperatures. Name three types of test data that could be
used. Give examples of each type of test data which could be used and discuss the outputs you
would expect to get.
3. Name five tasks that would be carried out at the DESIGN stage in systems analysis.
4. Name four methods used to change over from a manual system to a new computerised system.
Discuss the relative advantages and disadvantages of these four methods.
5. Describe how the effectiveness of a new computer system can be assessed
6. What tools exist to help the analyst draw up an action plan and ensure that the project is
completed on time and to budget?
7. What information would a systems analyst need to gather to decide on what hardware is
required for a new computerised system?
8. State 5 items that need to be included in the User guide and 5 items of the technical guide of a
newly developed computer system.
9. Choose 6 symbols used in systems flowcharts and explain what each means.
(b) Barcode readers: these take data from printed barcodes and allow automatic stock control in,
for example, supermarkets.
(c) Radio Frequency Identification (RFID): this method involves using small electronic devices
containing a microchip and antenna; they work in a similar way to bar codes but can be read
from a distance of 5 metres; often used to track livestock, vehicles, library books and goods
sold in shops.
(d) Biometrics: this involves obtaining data and identifying characteristics automatically in
security systems e.g. use of finger prints, palm prints, facial images and iris prints
(e) Magnetic Strips: these contain information/data stored on magnetic material often on the
back of a credit/debit card; the information is automatically read by swiping the magnetic
stripe past a reading head (reading device).
(f) Optical character recognition (OCR): information on paper is automatically read by a scanner
and is then analysed/processed by OCR software and stored in an electronic format.
(g) Voice recognition: these systems recognise spoken words e.g. for disabled people who can’t use
keyboards where they speak commands instead of having to type
(h) Smart cards: these contain embedded microchips and receive power from the card readers; the
microchip is made up of RAM, ROM and 16-bit processor and the stored data is
automatically read by the card reader; used in credit cards, security cards, loyalty cards, etc.
(i) Optical Mark Recognition (OMR): OMR technology scans a printed form and reads pre-defined
positions (where specific fields have been filled in e.g. ●─● or ▄); the system records where
marks have been made so can automatically determine responses to, for example, a
questionnaire.
Types of Errors
1. Transcription Errors: These are mistakes due to misreading or mistyping of data, e.g., confusing
the number 5 with the letter S, 0 (zero) instead of the letter O, etc. This can also be caused by bad
handwriting.
2. Transposition Errors: These are mistakes caused by swapping 2 letters or digits, e.g. typing ‘ot’
instead of ‘to’, 5721 instead of 7521. Transposition errors occur mostly when typing at very high
speeds.
2. Validation: A process done by the computer to detect if data entered is valid, correct, complete,
sensible and reasonable. For instance the height of a person entered as 12 metres is incorrect, is not
sensible, neither is it reasonable, and therefore the computer should reject this. Validation is a process
of checking if data satisfies certain criteria when input i.e. falls within accepted boundaries. Validation
is done by the computer.
Using Odd Parity: The letter C is transmitted as 1000011. Since there are three 1s in this byte, a 0 is
added to the left so that the total for 1s is odd, thus making it 01000011. The first 0 (underlined) is
used as the parity bit.
Using even parity: In even parity, a 1 would be appended to the left of the byte so that the total
number of ones is even, thus making it 1 1000011
(n) Check Digits: A check digit is an extra digit appended to the right -end of an original number for
error checking purposes and is calculated from the original block of data using modulus 11.
*NB: - Check digits are used where data is entered automatically as in using barcode readers
and are important for checking for transposition errors (swapped digits)
We have 9 digits. Working from the right, the first digit is multiplied by 2, second number by 3, third
number by 4 and so on. We start at 2 because position 1 is for the check digit. The results are added
together, e.g.
(1x10) + (5x9) + (1x8) + (2x7) + (1x6) + (1x5) + (3x4) + (2x3) + (3x2) = 112
The total (112) is divided by 11 and the remainder is noted; e.g., 112 divided by 11 = 10 remainder 2.
The remainder is subtracted from 11 to give the check digit: 11 – 2 = 9
9 becomes the check digit. Therefore the number will be transmitted as 1512113239
*NB: -
(1) If the check digit found is 10, an X is used as the check digit.
(2) If, upon dividing the total by 11 and the remainder is 0, then 0 is the check digit. This is obtained
as, 11-0=11. Divide 11 by 11 and take the remainder, which is 1 remainder 0, thus 0 becomes the
check digit.
(3) Check digits are used to detect where digits have been swapped
- Allocate weights for digits from right going to the left, starting as 2.
- Multiply each digit with its weight and add them.
- Divide the total by its modulus (11 in our case) and get the remainder.
- Subtract the remainder from the modulus (11)
- The result will be the check digit.
- However, some authors go further by saying that, divide the answer (obtained after
subtracting from 11) by its modulus (11) and take the remainder. The remainder is the check
digit.
(1). Remove the given check digit, calculate your own check digit. If they are similar, then the
check digit is correct. If they are not similar, then the given check digit is wrong.
(2) Re-calculate without removing the given check digit using the example given below:
Example:
0-1315-2447–X
Here, the check digit is on position 1. So the numbers and their positions is as follows:
Position 10 9 8 7 6 5 4 3 2 1
Digit 0 1 3 1 5 2 4 4 7 X
Multiply each digit with its position and add the results, thus giving:
(10x0)+(9x1)+(8x3)+(7x1)+(6x5)+(5x2)+(4x4)+(3x4)+(2x7)+(1x10) = 132
Divide 132 by modulus (11) and get the remainder. This gives us 12 remainder 0.
NB: If the remainder obtained is 0, then the check digit is correct, if not, then the check digit is
wrong.
Questions
SOFTWARE
Software refers to a set of instructions written in computer language that tell a computer to perform a
specific task, like adding a set of numbers. Without software, a computer will be useless. Software is
grouped into systems software and application software. The diagram below illustrates
branches/groups of software:
Systems Software: Refers to programs that control and manages the performance of all computer
systems. Systems software comprises of: (a) operating systems (b) Utility programs (c) Translators
1) Operating System: - refers to the programs that supervise, control and manage the performance of
the computer hardware and software in accordance with set objectives, for example, Windows 7.
Examples of operating systems include: Windows 95/98/2000/XP/ VISTA/ Windows 7/Windows 8,
Microsoft Disk Operating System (MS-DOS), Unix, Linux, OS/2, Ubuntu, etc.
The operating system is loaded onto the computer by the bootstrap loader. Programs stored on ROM
chip runs first and this checks if all hardware components are working normally. It also checks the
CPU and the Basic Input output System (BIOS) for errors. If there are no errors, the BIOS will activate
the disc drive. The operating system is then found and the computer can boot. Booting refers to the
process of loading the Operating system into memory so that it takes control over hardware and
software resources of the computer.
NB: Household equipment like refrigerator do not have an operating system since the processor has
one task to perform, no multiple devices and tasks to handle, hence they are cheap.
*NB: Response time – the time that elapses from the moment an instruction is given to the computer
and the time that instruction is carried out.
Turn around time – the time taken from the moment a document is produced by a computer and the
moment it is used as an input document to that computer again.
Turn Around Document: a document produced by the computer and later used as an input
document to the same computer, e.g. electricity bill
NB. Most operating systems are written in low level language. This is for them to quickly coordinate
computer activities since they will not be converted as they are already in machine language or less
time is needed for conversion if the operating system is written in assembly language. The following
must be considered when buying an operating system:
- Hardware type and computer design e.g. windows operating system works well on IBM
compatible machines.
- Applications intended for the computer e.g. accounting, stock taking, etc.
- Method of communicating with the computer, that is, use of few or many peripherals and
terminals.
- Method of operating the computer e.g. multi-access, multi-programming, etc
- Monitor (supervisor) programs: - These are programs that supervise and manage hardware and
software elements of the computer
2. Time sharing operating systems: This type of operating system allows many users to use the
same processor at a time, using the round robin method by use of time slices. In Round Robin, each
user is given a fraction of a second (time slice) to use the processor so that all users seem not to be
sharing the processor.
*NB: - Time slice: A brief period of time during which a particular task (or computer) is given control
of the microprocessor in a time-sharing multitasking environment. A computer's processor is
allocated to an application, usually measured in milliseconds. Time slice is also called quantum.
Multitasking: It is the concurrent execution of two or more programs on the same computer by use of
time slices, doing the same job. For example, copying a graph from Microsoft Excel to Microsoft Word.
Thus the two programs will be running concurrently, doing a related or same job.
3. Multi Access / Multi user operating systems: It is when many online users access one processor
at the same time to make use of multi-programming.
4. Multi-programming: This is whereby two or more programs (tasks) are being processed (run) at
the same time on one computer by use of time slices, for example playing music while typing a
document. Programs may take turns to make use of the processor, thus when one is using the CPU,
others will be using the peripherals. It uses interrupts to pass control from one program to another.
5. Multiprocessing: A type of operating system that allows one computer to have two or more
processors but sharing the same memory, e.g. dual core computers.
6. Batch Processing System: - A system in which data is collected over a long period of time, put in
groups and processed at one go, without user interaction from start to finish, as in payroll processing.
Jobs can be entered at a remote terminal, that is, on a terminal far away from the host computer. Thus
batch processing promotes Remote Job Entry (RJE): which is the entering of data into the computer
through a terminal far away from the host computer.
- For instance, a central computer can process batches of cheques collected from different branches,
mostly during the night. If there are errors, the results will also be wrong. Batch processing is very
cheap to operate and easy to run. Users can also perform some other tasks while batch processing
takes place.
- In batch processing, there is minimum or no human intervention during data processing period. It is
used where large amounts of data is processed and where processing does not need to be done
immediately, e.g. in Payroll processing, water billing, electricity billing, telephone billing, clearance of
cheques, etc).
b. Translators: - These are programs that convert source code to object code. Translators are in two
forms, which are interpreters , assemblers and compilers. These will be covered in more detail
under Programming Languages.
Kapondeni T. Page 63 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
c. Utility Programs:
These are programs used to perform specific, useful and frequently needed tasks in a computer
system. Utilities include the following:
i. Virus Scan Utility: These are programs that protect computers from virus attacks, for example
Norton Antivirus, AVG, Avast, Esat NOD32, MacAfee, etc.
ii. Sort Utilities: These are programs used to arrange data, files and records into a specific ordered
sequence, for instance in ascending or descending order of a given key.
iii. Debuggers: These are utilities used for assisting in correcting errors in programs.
iv. Dump Utilities: These are programs that assist in copying data from main storage to output
devices and to other storage devices like the hard drive.
v. Editors: These are programs used to make changes to data already held in the computer.
vi. Peripheral Transfer Utility: These are programs used to transfer data from one peripheral device
to another.
vii. System Status Utilities: These are programs that provide information on the state of files,
memory, users and peripherals.
viii. File Maintenance Utilities: These are programs used to reorganise programs and to update
them.
APPLICATION SOFTWARE
This refers to programs and their documentation, designed to perform a specific task for the user in
daily life, like payroll processing, word processing, etc.
Integrated Package (Application suite) - a collection of application programs purchased as one
package, for example Microsoft Office 2010. It is a collection of a word processor, spreadsheet,
database and presentation packages bought as one package, for example, Microsoft Office 2010.
*NB: A programmer is a person who specialises in designing, coding and testing computer programs.
Software House is an organisation that specialises is developing software; this includes both generic
and tailor-made.
Special Purpose Application Software: - These are programs designed for one specific business
purpose, for example Pastel for accounting purposes.
- They have the ability to delete words, sentences and paragraphs neatly.
- They are less manual than typewriters.
*NB: Editing: the process of correcting mistakes in a document, for example, spelling mistakes.
Formatting: making a document look more attractive by bolding, underlining, inserting borders, etc
2. Spreadsheet Packages: These are application programs used to manage and analyse statistical,
numeric and financial data, for example Microsoft Office Excel, Lotus 1-2-3, SuperCalc, etc. The
structure of a spreadsheet is as follows:
3. Presentation Packages:
- These are programs used for designing slides for a presentation to an audience, for example
Microsoft Office PowerPoint, Lotus Smart Suite, etc.
- Presentation packages include text, pictures, sound, animation, graphics and tables, thus being
multimedia.
- Presentations are colourful and attractive.
- Speakers and projectors are needed.
- Presentation packages have the following features:
Have Clip art. Can accommodate images and graphics.
Can use sound, video and animation.
Incorporate Word Art.
Have facility to insert charts and graphs.
*NB: Animation: - Creating illusion of moving sequence using a series of still images as done in
movies and cartoons.
4. Database Packages (DBMS): Refers to programs used to create and maintain databases for a
specific application area.
They are used for maintaining and providing interface been users and the database and to interface
the database and other application programs.
Examples of database packages include Microsoft Office Access, Oracle, Dbase IV, MySQL, etc
Properties/features of databases
Most database packages have the following features:
(a) Tables: These are equivalent to files and therefore are used to store data. The data is stored in
rows and columns. Each row in a table is called a record which is made up of a number of
fields (columns in the table). The data type in the fields is usually either text, numeric or
date/time. Most databases contain a number of tables which are usually linked together in
some way.
Kapondeni T. Page 68 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
(b) Forms: Forms are commonly called data entry screens since they are the user interface which
allows data in the tables to be viewed, entered or edited. Forms permit the control of how
other users interact with the information in the database e.g. only allow certain fields to be
seen or only allow certain operations to be carried out . This subsequently helps the
protection of the information and also ensures it is entered correctly
(c) Reports: Reports are produced as a result of questions such as “date>=01/01/1975”. The data
on report is extracted from queries or tables as per user requirement. They display certain
required data as needed by the user, e.g. after searching or filtering of data. Reports can be
printed out as hardcopy, or viewed on the screen or exported (e.g. to a word processor, an
email message, etc.).
(d) Queries: Queries are questions that request certain data from tables, e.g, Amount <200. It can
also be an instruction to search data which meets a certain criteria from table and display it
on the screen in form of another table created from the original table. Most commonly allow
information to be retrieved from tables. They also allow filtering so only the records
required are seen.
(e) Macros
A macro is a name or key that represents a series of commands or key strokes. Many
applications allow single word or single nominated key on a keyboard to perform a whole
series of actions. Macros can be either written as required and then stored or stored in a
library for future use. Macros can be very sophisticated and save the operator a lot of time.
For example, the name and address in a word processor could be set up by pressing key F1
and the system brings information from a related database
5. Graphics Packages: Refers to programs used to create and edit graphs, diagrams, drawings, charts
and plans for buildings, for example Microsoft Paint, Harvard Graphics, Corel Draw, Real Draw, etc.
Computer graphics are images designed for logos, commercial and news inserts during television
advertisements or transmission.
6. Communication Software: These are programs that allow users to communicate on networked
computers and to log on to the internet, for example TCP/IP software, Client – server software, e-
mails, etc.
*NB: - Log On: to provide a username and password for the user to gain access to a computer or
computer network.
(f) Mouse: - For adjusting size of pictures and for drawing purposes.
(g) Desktop Publishing (DTP) software.
8. Authoring Packages (Authorware): Software that can be used to write interactive, hypertext or
multimedia computer programs without the technically demanding task of computer programming.
Also used in multimedia presentations. These programs can be used for developing databases and
material for Computer Aided Instruction (CAI).
Authoring tools require less technical knowledge to master and are usually used for applications that
present a mixture of text, graphics, and audio/music files. Authoring tools usually allow the creation of
the actual required application by linking together objects which can be text, graphics, music file, etc.
By defining the relationship between objects it is possible to produce very useful and eye catching
applications.
(9) Web Browsers: Software used to open web pages on the internet, examples are: Mozilla Firefox,
Microsoft Internet Explorer, Safari, Opera, etc.
(10) Search Engines: These are packages used for searching data for the user from the internet, e.g.
google, yahoo, etc.
*NB: - Specialist Packages for Business: These are packages for use in a specific business
environment, for example, Pastel for accounting purposes.
*NB: - Install: - to add programs to the computer. Therefore to uninstall is to remove programs from
the computer.
TYPES OF SYSTEMS
1. Real Time Processing System: - An online system in which individual, discrete transactions are
processed as they occur to influence the activity currently taking place, as in airline reservation.
Kapondeni T. Page 70 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
Results of the process are produced immediately. The system response quickly and give feedback of a
request. Thus the system is interactive in nature. Such systems include airline reservation systems,
hotel reservations, stock control, etc.
Real Time Processing System can also be called Transaction Processing System (or Real Time
Transaction Processing Systems): this is a real-time (or pseudo-real-time) transaction processing
system whereby only individual items of data need immediate processing e.g., airline reservation,
balance enquiry at an ATM, etc. Response to a query needs to be very fast and once a seat is booked it
needs to marked as “not available” immediately to avoid any risk of double booking.
Using this example of booking seats on a flight, the following sequence of events would take place:
- customer/travel agent contacts the airline
- the customer/travel agents types in the day/time of flight and number of travellers
- the customer/travel agent types in the departure airport and the destination airport
- the airline database is searched and availability of seats checked
- if seats are available on the required day/time then a booking is made
- the database/file is updated immediately to indicate that these seats are no longer available
and prevents double booking from occurring
- if no seats are available a message is sent back to the customer/travel agent
- this uses real time (transaction) processing since the files are updated in real time;
interrogation of files will have access to totally updated information
3. On-Line System: A system that is directly linked to the host computer for real-time communication
and provides interaction between the user and the job, as in POS terminals in supermarkets. In
networked computers, the terminals must be directly linked to the host computer. Examples include
ATM systems in banks, airline reservation systems. Online systems can just be for information
retrieval. Information retrieval systems are there for users to access certain information promptly as
on the internet. In contrast, offline systems are computer systems that work without being directly
connected to the host computer.
4. Network Systems: - A system in which processing is carried out independently in more than one
location but with shared and controlled access to some common facilities like file storage.
5. Control System: - A system in which one or more computers are used to monitor the operations of
some non-computer equipment like in oil refineries. Control systems involve monitoring and logging
of physical quantities, provide an analysis of performance and allows some user interaction. Feedback
is an essential element as well as timing. Most control systems are real-time systems, e.g. oil refining,
chemical processing, traffic control, etc.
6. Automated Systems: - These are control systems that are dedicated to one particular task and lack
the ability to collect and analyse data as in digital cameras. They do not allow for or act on user
interaction, e.g. washing machines, cameras, watches. Most control systems have embedded
computers systems inside them.
7. Multimedia Systems: - Are computer systems that enable representation of data in a number of
formats like sound, pictures, films, video, etc. Multimedia systems are used in commercial applications
(advertising, journalism, presentations, etc.), entertainment (special effects, video games, fine arts,
etc.), education (CBT training, uses in virtual reality training, etc.). A computer that can be referred to
be a multimedia system should have at least the following:
- a CD – ROM/DVD-ROM drive,
- speakers, large RAM size,
- large disk storage space,
- sound card
- video card and
- multimedia software like Windows Media Player and
- other software like sound drivers.
9. Centralised systems: This is whereby processing is carried out at one central location for an
organisation with a number of branches. Users in other locations can view data and utilise it but with
limited capabilities. Centralised processing has the following advantages:
- Hardware within the organisation will be compatible and can be linked.
- The organisation gets better deals in terms of maintenance contracts. Employees do not have
to learn new systems when they move from one department (or branch) to another.
- It is easier to coordinate staff training courses using the same software and hardware for all
departments (or branches).
- There is better control over use of unlicensed software.
- Data can be exchanged easily between similar types of hardware and software
Disadvantages of Centralisation:
- Requires high initial capital investment of sophisticated equipment, operating systems, well
developed communication systems and complex application packages.
- Requires highly qualified and experienced personnel to run it.
- A system failure will paralyse the entire system unless expensive backup system is provided.
- Users feel not being fully involved and therefore are not motivated.
- Cost of hardware: online systems are more expensive to install, including installation of
communication systems like telephones and satellites.
- Volume of data involved: batch processing is appropriate where very large data is handled.
- Frequency of data change: banks need online systems for customer data changes more frequently
than in payroll processing systems.
CODING DATA
Data to be entered into the computer can be coded / written in a short way, for example:
In databases, a field for sex can be coded as follows: F for Female, M for Female. In this case the user
just enters F or M and not the whole field as it is. The column for colour can also be coded as B for
Black, R for Red, Y for Yellow, etc.
Features of Codes
Should be of the same length.
Must be easy to use.
Must not be too short in case you will run out of codes.
Codes are often unique
FILE HANDLING
Types of files
1. Master File: It is a permanent file that is kept up-to-date by applying transactions that occur during
business operations. It contains permanent (static) and semi-permanent data. Static data stored in
database files can include Surname, First names, Date of birth, etc.
2. Transaction Files: These are temporary files that contain data that can change regularly, e.g. on
daily bases and it is used to update the master file. This includes sales per day, student mark in a
weekly test, etc. Transaction files are used to update master files.
3. Reference files: These are files that contain permanent data which is required for referencing
(viewing) purposes only. This includes data on tax bands, formulae, etc. No changes to files are done.
4. Data file: A set of related records (either written or electronic) kept together.
When entered into the database, the record will appear as follows:
NB:- * Indicates the end of field marker, and the ≈ indicates the end of record marker
Variable length records have the following advantages:
They are more economical in terms of usage of disk storage space as they do not allow spaces
to lie idle.
Data entered will not be cut but appears as entered no matter how long it is.
Can accommodate unusual data, not as planned
Difficult to update (add or delete) as the transaction and master files might have different
lengths.
Hard to search data in the files
FILE ORGANISATION
Refers to the way in which records in a file are stored, retrieved and updated. This affects the number
of records stored, access speed and updating speed. The most common methods of file organisation
are: Serial File Organisation, Sequential File organisation, indexed – sequential file organisation
and random (direct) file organisation.
1. Serial File Organisation: This is whereby data is recorded one after another as they occur, without
any definite order, as supported by magnetic tapes. Data is stored according to arrival time. Data is
read from the first record until the needed data is found. New records are added to the end of the file.
Serial file organisation is not appropriate for master files since records are not sorted and therefore
are difficult to access and to update. It is faster to find records at the beginning of the file, but takes too
long to find records towards the end of the file. Serial files are suitable for temporary transaction files
since records are not sorted.
Serial files promote Serial Access: whereby records are accessed by reading from the first until
needed record is found in an unordered file, e.g on magnetic tape.
2. Sequential File Organisation: This is whereby records are sorted into a key sequence, that is, in
ascending or descending order of a given key filed as on magnetic tapes. Sequential files organisation
is appropriate for files with a high hit rate like payroll processing. They are suitable for master files
since they are ordered. However, it takes too long to access records towards the end of the file since
the records are accessed by reading from the first record until the required data is found. However,
searching of records at the beginning of files is very fast. Adding of new records is difficult as this is
done by re-entering the data and the new record is inserted at its right position. It is time consuming
to update such records. Suitable for master files since records are sorted. This is used where all
records need processing, e.g payroll.
Sequential Files promote sequential Access: Sequential Access is whereby records are retrieved by
reading from the first record until the needed record is found in an ordered list of records, e.g. on
magnetic tape. Sequential access occurs where records are ordered using a key field.
3. Indexed-Sequential Files: This is whereby records are ordered in sequence based on the value of
the index or disk address as supported by hard disks. This is used for storing master files records
since the records are ordered. It is also suitable for real time processing applications like stock control
as it is fast in accessing records and in updating them. It provides direct access to data as on hard
disks, diskettes and compact disks.
FILE PROCESSING
Refers to any form of activity that can be done using files. This includes: file referencing, sorting,
maintenance and updating.
1. File Referencing/Interrogation: This involves searching of record and displaying it on the screen
in order to gain certain information, leaving it unchanged. The record can also be printed.
2. Sorting: Refers to a process of arranging (organising) records in a specific ordered sequence, like in
ascending or descending order of the key field.
3. Merging Files : This is the process of combining two or more records into one. Below is an example
of how records can be merged:
Record A (sorted) Record B (unsorted)
12 34 71 78 101 103 67 3 90 12
Record C (Merged and sorted for records A and Record B)
3 12 34 67 71 78 90 101 103
4. File maintenance: This is the process of reorganising the structure of records and changing
(adding or removing or editing) fields. This can be due to changes due to addition or deletion of
records.
5. File Updating: Updating is the process of either adding new record, deleting unwanted records or
modifying existing records. It involves making necessary changes to files and records. Mostly master
files are updated and they must be up-to-date (contain accurate and most recent information).
For updating to occur, any one of the following must have occurred:
A new record has been entered.
Deletion of an unwanted record.
An amendment (change) to the existing data has been made, e.g. change in date of birth only.
The most common methods of file updating are: Updating in situ and Updating by copying.
a. Updating by copying
This happens in sequential file updating process. This is done through the following steps:
- A record is read from master file into memory.
- A record is read from transaction file into memory.
- Record keys from each file are compared.
- If record keys are the same, the master file is updated by moving fields form transaction file to
the master file.
In sequential file updating, it is recommended to keep at least three master file versions that will be
used for data recovery in case of a system failure or accidental loss of data. The first master file is
called the Grandfather file, the second master file is called the father file and the third master file is
the son file. This relationship is called the grandfather-father-son version of files. The process of
keeping three versions of master files (grandfather-father-son) as a result of sequential file
updating is called File Generations. Thus the first master file (grandfather file) is called the first
generation file, the second master file (father file) is called the second generation file and the third
master file (son file) is the third generation file. The following diagram illustrates the sequential file
updating process:
PROGRAMMING CONCEPTS
Definition of terms:
- Program: a set of detailed and unambiguous instructions that instructs a computer to perform a
specific task, for example, to add a set of numbers.
- Programming: A process of designing, coding and testing computer programs
- Programmer: A person who specialises in designing, coding and testing computer programs
- Problem: any question or matter involving difficulty or uncertainty and is proposed for solution.
PROGRAMMING LANGUAGES
A programming language is a set of symbols in computer language that are used in coding computer
programs. A programming language is a specially written code used for writing application programs
e.g C, Pascal, COBOL, BASIC, C++ and Java.
1. Low Level Languages (LLL): These are programming languages used to write programs in
machine code, that is in zeros and ones or in mneumonic codes. Low level language is in two forms:
Machine Language and Assembly Language.
a. Machine code (language) is the language used to write programs in binary form (zeros and ones).
Machine language has the following advantages:
(i) Programs run faster since they are already in computer language. There is no need for conversion
as programs are in machine language.
Kapondeni T. Page 77 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
(ii) Programs occupy very small disc storage space by storing just 1s and 0s.
b. Assembly Language: These are programming languages that use mnemonic codes in coding
programs. Mnemonic codes are abbreviations used in coding assembly language programs, for
example, LDA for Load, ADD for Addition, etc. Mnemonic codes are very close to machine code, hence
are low level language assembly language codes
Advantages of Assembly language:
One assembly language instruction corresponds to one machine code instruction and therefore
translation is easier and faster.
Programs run faster since they are close to machine code.
They occupy very small disk storage space hence are economical to use.
Easier for a programmer to use than machine language.
2. High Level Languages (HLL): These are programming languages that use English-like statements
in coding programs, for example COBOL, Pascal, BASIC, etc. There are so many high level languages
because each language is designed for a specific problem to be solved in our daily lives. For example
BASIC was designed for learning purposes, COBOL for business applications, FORTRAN for scientific
purposes, etc. Below is an example of a BASIC program that accepts two numbers entered through the
keyboard, adds them and display the result on the screen:
INPUT “ENTER FIRST NUMBER.”, A
INPUT “ENTER SECOND NUMBER.”, B
SUM = A + B
PRINT SUM
END
Programs written in High Level Language are first converted to machine code before running.
Disadvantages of HLL
Kapondeni T. Page 78 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
Takes long to run since they need to be first converted to machine code.
They occupy a lot of disk storage space as compared to low level languages.
TRANSLATORS
These are programs used to convert High level Language programs into machine code, and are in two
types, which are interpreters, compilers and assemblers, which are further explained below:
1. Interpreters
These are programs that convert and run one instruction of a program at a time until the end of the
program, e.g. the BASIC interpreter. They do not produce the machine code version of a program;
hence conversion is repeated when you run the program again.
Functions of Interpreters
They check syntax error in a program statement.
They translate an instruction into machine language and run it.
Allocates storage space to variables.
Advantages of interpreters
It is easy to find and correct syntax errors in interpreted programs.
It is very fast to run programs for the first time.
It is very fast to run small programs.
Disadvantages of interpreters
They are very slow in running very large programs.
They do not produce an object code of a source code and hence difficult to use.
2. Compilers
These are programs that convert a high level language program into its machine code equivalent at
one go and then run it, e.g. the COBOL compiler. Once compiled, the program no longer needs
conversion since the machine code version is the one that will be run, until some changes are made to
the program code.
Functions of Compilers
They check syntax errors in program statements.
They allocate storage space to variables.
Translate the whole program into machine code at one go.
Run an object code of the program.
Produces a program listing which indicates position of errors in a program.
Advantages of Compilers
Compiled programs runs faster since the object code is run.
Compilers indicate the line numbers with syntax errors and therefore assist programmers in
debugging programs.
They are appropriate even for very large programs.
Disadvantages of Compilers
Slower than interpreters for running programs for the first time.
They can cause the computer to crash.
Difficult to find errors in compiled program.
*NB: Source Code refers to the program written in English-like statements (High Level Language) by
the programmer.
Kapondeni T. Page 79 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
Object Code refers to a machine code version of a source code. All programs written in source code
must be converted to object code for the computer to understand them.
3. Assemblers: These are programs used to convert assembly language instructions into machine
language. Other uses of assemblers include:
They generate machine code that is equivalent to assembly language.
They are used to check the validity of instructions, that is, checking for syntax errors in an
instruction.
They also assign memory locations to variables.
3. Very High Level Languages (VHLL) – 4GLs: These only specify the desired end result and do not
indicate steps that the computer needs to take to make the calculation, e.g. SQL used in relational
databases. 4GLs are flexible and easy to use since no coding is required.
4. Natural Language – Artificial Intelligence and expert systems: These are programs that mimic
human reasoning and learn from experiences.
Procedural Languages: These languages give a precise definition of the steps to be followed by the
computer in order to perform a specific task. Most High Level Languages are procedural languages.
Object Oriented Languages (non-procedural). These languages just specify the constraint and
objects to be produced and do not specify the steps to be followed to perform a task. Very High Level
Programming Languages are procedural languages, e.g. SQL
*NB: Library programs: this refers to a collection of standard programs and subroutines that are
stored and available for immediate use by other modules in the system. Library programs are
referenced by most modules in the systems.
*NB: Stepwise refinement: a technique used in developing the internal working of a module.
ALGORITHMS
A set of instructions describing the steps followed in performing a specific task, for example,
calculating change. Algorithms can be illustrated using the following:
Descriptions, Flowcharts, Pseudocodes, Structure diagrams.
Advantages of algorithms
- not biased towards any programming language
- easy to convert to a program code or flowchart
- easy to determine logic errors
- has finite steps which lead to a solution
Disadvantages
- time consuming to design, i.e. first convert to flowchart, then to program code
- most people find them difficult to learn
a. Descriptions: These are general statements that are followed in order to complete a specific task.
They are not governed by any programming language. An example is as follows:
Enter temperature in oC
Store the value in box C
Calculate the equivalent temperature in oF
Store the value in box F
Print the value of box C and F
End the program.
b. Pseudocodes: These are English-like statements, closer to programming language that indicate
steps followed in performing a specific task. They are however independent of any programming
language. An example is as follows:
Enter centigrade temperature, C
If C = 0, then stop.
Set F to 32 + (9C/5)
Print C and F
End
A number of control structures are used in designing Pseudocodes. These includes: simple sequence,
selection and iteration.
i. Simple sequence: This is whereby instructions are executed in the order they appear in a program
without jumping any one of them up to the end of the program. Statements are executed one after
another in the order they are. It is simple and avoids confusion. Example:
Enter first number, A
Enter second number, B
C=A+B
Print C
Stop
ii. Selection Structure:
This allows one to choose the route to follow in order to accomplish a specific task. Selection is
written using the IF ....THEN...ELSE statement or the CASE statement.
IF...THEN ...ELSE statement: A programming structure that allows the user to choose one from at
least two routes of solving a problem. The following Pseudocodes compares two numbers entered
through the keyboard and determines the bigger one.
Enter first Number, A Enter first Number, A Enter first Number, A
Enter second number, B Enter second number, B Enter second number, B
IF A>B THEN IF A > B THEN IF A>B THEN Print A is
Print A is bigger Print A is bigger bigger
ELSE ENDIF IF A<B THEN Print B is
IF A<B THEN IF A < B THEN bigger
Print B is bigger Print B is bigger IF A=B THEN Print
ELSE ENDIF Numbers are equal
Print Numbers are IF A = B THEN END
equal Print Numbers are
ENDIF equal
ENDIF ENDIF
END END
A B C
The above 3 Pseudocodes produces the same result.
CASE Statement: This is an alternative to the IF...THEN...ELSE statement and is shorter. For example:
Enter first Number, A
Enter second number, B
Enter operand (+, -, * /)
CASE operand of:
“+”: C = A + B
“-”: C = A-B
“*”: C = A*B
“/”: C = A/B
ENDCASE
Print C
END
iii. Repetition/Iteration/looping:
A control structure that repeatedly executes part of a program or the whole program until a certain
condition is satisfied. Iteration is in the following forms: FOR...NEXT LOOP, REPEAT... UNTIL Loop and
the WHILE...ENDWHILE Loop.
a. For...Next Loop: A looping structure that repeatedly executes the loop body for a specified number
of times. The syntax of the For...Next loop is as follows:
A group of statements between the looping structures is called the loop body and is the one that is
repeatedly executed.
The For...Next loop is appropriate when the number of repetitions is known well in advance, e.g. five
times. An example of a program that uses the For...Next loop is as follows:
Sum, Average = 0
FOR I = 1 to 5 DO
Enter Number
Sum = Sum + number
NEXT I
Average = Sum/5
Display Sum, Average
End
b. Repeat...Until Structure: This is a looping structure that repeatedly executes the loop body when
the condition set is FALSE until it becomes TRUE. The number of repetitions may not be known in
advance and the loop body is executed at least once. The syntax is as follows:
Repeat
Statement 1
Statement 2 loop body
................
Until {Condition}
For example
Sum, Average, Count = 0
Repeat
Enter Number (999 to end)
Sum = Sum + Number
Count = count + 1
Until Number = 999
Average = Sum / count
Print Sum, count, Average
End
In the above program:
- Count records the number of times the loop body executes.
- 999 is used to stop further data entry through the keyboard and thereby ending the loop. Such
a value that stops further data entry through the keyboard thereby terminating a loop is called
a Rogue value or sentinel.
- The condition here is {Number = 999}. The loop exits when the number 999 is entered. If 999
is part of the number to be entered in this program, then the user has to split it into two
numbers, that is 999 = 990 + 9, therefore can be entered separately as 990 and 9.
- A flag is also used to control the loop. In this case 999 is also a flag.
NB. As for the Repeat...Until loop, the condition is tested after the loop body has been run at least once,
even when the condition is true from start. This is rather misleading.
Kapondeni T. Page 83 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
c. While ... Do Statement: A looping structure in which the loop body is repeatedly executed when
the condition set is TRUE until it becomes FALSE. It is used when the number of repetitions is not
known in advance. The condition set is tested first before execution of the loop body. Therefore the
loop body may not be executed at all if the condition set is FALSE from start. The syntax of the
WHILE…END WHILE structure is as follows:
WHILE {condition}
Statement 1
Statement 2 loop body
................
ENDWHILE
The word WEND can be used to replace the word ENDWHILE in some structures and therefore is
acceptable. The word Do, after the condition is optional.
c. Flowcharts
It is a diagram used to give details on how programs and procedures are executed. Flowcharts are
drawn using specific symbols, each with its own meaning, as given below:
Symbol Explanation
Process Symbol - Indicates where some form of processing occur
Enter number, A
Enter number, B
Sum = A + B
Display Sum
Stop
3. Using Iteration
Kapondeni T. Page 85 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
Repeat
Enter Number
Count = count + 1
End
Enter Number
Count = count + 1
WEND
END
Numbers
Flowchart (a) above indicates modules named Accept Numbers, Add numbers Multiply Numbers and
Display Results. Flowcharts for individual modules can then be designed as given in diagram (b)
above, only the first module is indicated. Can you do the rest?
d. Structure Diagrams: These are diagrams that show relationships between different modules as
given below.
Start
Sum, Product = 0
Sum = A + B
Product = A * B
End
The structure diagram above indicates five sub-programs of the program Process Numbers, namely
Initialise, Accept Numbers, Process Numbers, Display Results and Exit. The module Process Numbers
has its own sub-programs, which are Add Numbers and Multiply Numbers. Modules are appropriate
for very large programs. Can you write pseudocode for individual modules? The program can be
written as a continuous single program as indicated on the right side of the diagram.
Kapondeni T. Page 87 of 88 7-Nov-2017
‘O’ Level Computer Studies Notes – ZIMSEC Syllabus 7014
PROGRAMMING ERRORS
Programming errors are grouped into:
i. Syntax error: this is an error of violating the grammatical rules governing sentence construction in
a certain programming language, for example, leaving a semi-colon at the end of each line in Pascal.
Syntax errors are detected by the computer. A program cannot run with syntax errors.
ii. Logic error (Semantic error): refers to an error in the sequencing of instructions, modules and
specifying wrong formulae that will produce undesirable results. For example, instructing the
computer to display result before any processing has been done. Logic errors cannot be detected by
the computer. The user just finds wrong and unintended results of a process. It is also an error
generated by entering the wrong data type during program execution, for example, entering a text
value where a numeric value is needed.
iii. Runtime (execution) error: These are errors that occur during program execution and can be
generated when the computer tries to read past an end of file marker or by dividing a number by zero.
DATA TESTING
After a program has been coded, it must be tested with different data types to determine if intended
results are produced. The types of test data that can be used include:
i. Extreme Data: Refers to the minimum and the maximum values in a given range. For example, a
computer program requires the user to enter any number from (between) 1 to 20. 1 and 20 are
extreme data and the computer must accept these. Thus extreme data is accepted by the computer.
ii. Standard (normal) Data: This refers to data that lies within (in-between) a given range. In our
example above, the numbers from 2 to 19 are standard data and are accepted by the computer.
iii. Abnormal Data: This refers to data outside a given range. As to our example above, the number 0,
-1, -50 and all number from 21 and above are abnormal data.
iv. Valid data: refers to data of the correct data type. Invalid data is data of the wrong data type. Thus
if the user enter the value “Tungamirai” instead of a number, this is referred to as a wrong (invalid)
data type. Only numbers are needed, not text.
PROGRAM TESTING
A very large program must be tested using the following types of tests:
Unit testing: the process of testing each program unit singly to determine if it produces expected
results.
System testing: the testing of the whole program after joining the modules to determine if it runs
perfectly.
Integration Testing: testing to see if modules can combine with each other.
User acceptance testing: determining if users of the new system are prepared to use it.