0% found this document useful (0 votes)
32 views34 pages

Guide For G10

Uploaded by

Ezana Samuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views34 pages

Guide For G10

Uploaded by

Ezana Samuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

Grade 10

Unit 1 – Organization of Files

At the end of this chapter, you will be able to:

- Explain file management system


- Analyze extensions of file types
- Familiarize with the techniques to organize, delete and restore files and folders
- Review file formats
- Convert a file into different formats
- Mechanisms of file importing and exporting
- File backup and recovery in case of disaster
- File compression

Unit 2 – Computer Networks

At the end of this chapter, you will be able to:

- Explain transmission (network) media


- Describe telecommunications network
- Explain mobile and cellular communications
- Analyze satellite networks
- Discuss data communication
- Conceptualize the use of Internet protocols (IP)

Unit 3 – Application Software

At the end of this chapter, you will be able to:

- Create tables (make use of Microsoft Word)


- Organize and insert pictures, clip arts and shapes
- Explain how page numbers are formatted
- Analyze mathematical operators on data to perform addition and others
- Summarize functions such as filter, sort and rank
- Apply different effects to a cell and its contents
- Prepare and present a slide show
- Create a slide master

Unit 4 – Image Processing and Multimedia

At the end of this chapter, you will be able to:

- Importance of multimedia
- Explain Multimedia and their components
- Describe multimedia authoring and its tools (make use of Macromedia Flash)
- Summarize multimedia editing
- Edit and publish multimedia files
- Explain computer animation

Unit 5 – Information and Computer Security

At the end of this chapter, you will be able to:

- Explain information security


- Apply steps to install antivirus software
- Create and change user account in their computers
- Explain privacy and security
- Computer security threats
- Threat prevention strategies
- Analyze cyber security

Unit 6 – Fundamentals of Programming

At the end of this chapter, you will be able to:

- Explain concepts of algorithms


- Describe the representation of algorithms
- Discuss Integrated Development Environment (IDE).
Unit 1 – Organization of Files

File management

Brainstorming

1. How are files handled at your home?


2. Can you describe ways of managing files in school or other organizations?

File management is the process of organizing and keeping track of files and folders,
helping you stay organized, so information is easily located.

Traditional file systems (such filing cabinets) vs modern file management

The followings are the advantages and disadvantages of traditional file based approach:

Advantages Disadvantages

Easy to understand and use Data redundancy and inconsistency

Low cost implementation Limited data sharing

Minimal training required Hard to enforce standards

High data security Lack of flexibility in queries

Poor security and limited data integrity

The followings are the advantages and disadvantages of computer based approach:

Advantages Disadvantages

Flexibility Lack of human interaction

Interactivity Technical issues

Data duplication

Personalization Though it’s minimal, here still we encounter data


duplication
Advantages Disadvantages

Accessibility
Cost effective
Direct access, less flexible

Tracking and assessment Redundancy

Security Inconsistency

Reliability
Files here are very less likely to undergo Requires expertise (including training)
damage or destruction.

Data backup
Any damages from nature or handling can
Security
be completely avoided in a file management
system.

Data recovery
Data sharing
Limited, manual backup required

Scalability
Data retrieval
Limited, not ideal for large datasets

Environment friendly

Common storage devices (let’s do a simple google; we end up with the below screenshots)

o Primary storage devices


o Magnetic storage devices
o Flash memory devices
o Optical storage devices
o Cloud and virtual storage
Brainstorming

1. What do you think a drive is? Why is it used for?


2. How do you identify a drive on your computer?

Disk drives vs drivers - related but distinct concepts

Open to discussion – check their difference in class (ChatGPT tells us that …)

Key concepts:

File management is the process and act of creating an organized structure in which you
store information for easy retrieval.

Folder (directory) is a virtual storage space used to store and organize computer files.
File name extension

Brainstorming

1. How do you identify one file from another (a music file from an image file, for
instance)?
2. What do you understand by the term filename extension?

A file extension is a two- or three- or four-letter identifier found at the end of a file name
being followed by a period. The extension tells you about the characteristics of a file
and its use.

File extensions are used by an operating system to identify what applications are
associated with a particular file type.

Activity – in-class activity – define an OS (Operating System and list some popular operating systems)

Section activity – lists down some random files from a device and differentiate them based on their file
extensions; including the application they’re made of.

File directory structure

Files are typically displayed in a hierarchical tree structure. When you see the structure,
it looks like a tree; hence, the term hierarchical tree structure is used to describe it.

The first or the top folder (directory) in the structure is called the root directory. A
directory contained inside another directory is called a subdirectory.

The terms parent and child are often used to describe the relationship between the
directory and the subdirectory.

For Example, the root directory of the main partition on a computer is usually C:\.
spy.mp4
spy.mp4

Pathname: refers to a path for files and folders is the list of parent directories that the
computer (the OS to be precise) must go through to find that particular item.
Filesystems have two different types of paths: absolute and relative paths.

Side note: The slash (/) is used to delimit names in the sequence.

Note that it is perfectly acceptable to have several files with the same file name, as long
as they have unique pathnames. That is, the same file name may be used in different
directories.

Section activity – in-class activity: discuss absolute and relative pathnames.

Absolute pathname is the path given from the root directory to the file. Relative
pathname is the path referenced relative to the current directory.
File conversion

File conversion is the process of converting a file from one file format into another.

File converter is the software that converts a file from one file type to another.

If a file was created in one application and you want to use it in another, you can either
import the file or use a conversion program.

Saving and opening files, file importing and exporting

Create a document (using MS-Word) and practice activity 1.6 given on the textbook.

Section activity (1.6) – in-class activity

File backup and recovery

Backup and recovery describe the process of creating and storing copies of data that
can be used to protect individuals and organizations against data loss. This is
sometimes referred to as operational recovery.

Backing up is a precautionary measure so that your data is accessible in case it is lost,


stolen or damaged.

Restoring is the process of copying backed-up data from a secondary location and
restoring it to its original device or a new device. The purpose of the backup is to create
a copy of data that we use to recover in the event of a primary data failure.

Section activity – in-class activity

File compression

File deletion

File restoration
Unit 2 – Computer Networks

Overview

Computer network is the connection of two or more computers or communication


devices connected by transmission media and guided by a set of rules (the so-called
protocols) for communication purposes that allow users to communicate with each
other and share hardware, applications and data.

And therefore, the fundamental components of a network are devices, media, messages
and protocols.

Network media (transmission media)

Data can be transmitted from point A to point B (from device A to device B) via a
physical pathway or medium. These pathways are called transmissions media and can
be either physical or wireless. The physical transmission use wire, cable, and other
tangible materials; wireless transmission media send communications signals through
the air or space.

The physical transmission media are generally referred to as guided media (or cable
media) – example, twisted pair wire, coaxial cable, and fiber optic cable.

Wireless media include cellular radio, microwave transmission, satellite transmission,


radio and infrared media and are also called unguided media.

Types of computer networks

o PAN (Personal Area Network)


o LAN (Local Area Network)
o MAN (Metropolitan Area Network)
o WAN (Wide Area Network)
Other types of computer networks include:

o WLAN (Wireless Local Area Network)


o Storage Area Network
o System Area Network
o Home Area Network
o POLAN- Passive Optical LAN
o Enterprise private network
o Campus Area Network
o Virtual Area Network
Guided (wired) media

Ethernet cable color coding

Ethernet cable which is used to connect networking devices through UTP cable and end
is terminated with RJ45 connector. UTP cable consists of 4 pair or 8 wire of different
color that is used to terminate on RJ45 (or 8P8C - Eight Position, Eight Contact)
connector.

Ethernet cable color coding as standardized by EIA (Electronic Industries association)


and TIA (Telecommunication Industry Association) there are two standards: EIA/TIA-
568-A and EIA/TIA-568-B.

An easy way to remember color code is in odd places (1, 3, 5, and 7) color with white strip is present.

Identifying the Cable type

Hold both ends/RJ-45connectors of cable with their Jack in downward position. Now
start matching the color coding from left pin of connector towards right.
There are 3 types of cables

o Straight through

o Crossover Ethernet cable

o Rollover or Console
Straight cable

Devices having different function can be connected with this type of cabling. It is used
to connect:

 a router to a hub or switch

 a server to a hub or switch

 workstations to a hub or switch


Cross cable

It is used to connect devices having same functions or roles. It is used to connect:

 uplinks between switches (a switch to another switch)

 hubs to switches

 a hub to another hub

 PC to PC

 PC to a Router*

 2 routers together without a hub or a switch

Unlike straight through cabling, crossover cables use the two different wiring standards: one end
uses the T568A wiring standard and the other end uses the T568B wiring standard.

Note that the only difference with respect to straight cable is that 1st and 3rd and 2nd and 6th
numbered cables are swapped on the 2nd end of the cable.
Rollover or console cable

It is used for device configuration. For example, one end of console cable is connected
to console port of the router or a switch and other end would be connected to NIC
(Network Interface Card) port of your laptop or PC.

Below is the color coding of Console cable. The color coding of both ends are totally
reversed.
Networking devices

Network devices, also known as networking hardware, are physical devices that allow
hardware on a computer network to communicate and interact with one another.

Examples include Repeater, Hub, Bridge, Switch, Routers, Gateway, and NIC, etc.

Note that are there are 7 layers in the OSI (Open Systems Interconnection) layers:

 Application layer
 Presentation layer
 Session layer
 Transport layer
 Network layer
 Data link layer
 Physical layer

Repeater

- repeater operates at the physical layer


- its job is to regenerate (and amplify) the signal over the same network before the
signal becomes too weak or corrupted (to extend the length to which the signal
can be transmitted over the same network)
- it is a 2-port device
Hub

- hub is basically a multi-port repeater


- hubs cannot filter data, so data packets are sent to all connected devices

The collision domain1 of all hosts connected through Hub remains one. Also, they do
not have the intelligence to find out the best path for data packets which leads to
inefficiencies and wastage.

There are 3 different types of hubs:

o Active hub
o Passive hub
o Intelligent hub

1
A collision domain is a network segment connected by a shared medium or through repeaters where
simultaneous data transmissions collide with one another.
Bridge

- bridge operates at the data link layer


- a bridge is a repeater, with add on the functionality of filtering content by
reading the MAC addresses of the source and destination
- it is also used for interconnecting two LANs working on the same protocol
- it has a single input and single output port, thus making it a 2 port device

Switch

- a switch is a multiport bridge


- a switch is a data link layer device
- the switch can perform error checking before forwarding data, which makes it
very efficient (as it does not forward packets that have errors and forward good
packets selectively to the correct port only)
Note that the switch divides the collision domain of hosts, but the broadcast
domain remains the same.

There are various types of switches:

o unmanaged switches
o managed switches
o smart switches
o Layer 2 switches
o Layer 3 switches
o PoE (Power over Ethernet) switches
o gigabit switches
o rack-mounted switches
o desktop switches
o modular switches
Routers

- a router is a device like a switch that routes data packets based on their IP
addresses
- the router is mainly a Network Layer device
- routers normally connect LANs and WANs
- have a dynamically updating routing table based on which they make decisions
on routing the data packets
- the router divides the broadcast domains of hosts connected through it
NIC – NIC or network interface card is a network adapter that is used to connect the
computer to the network. It is installed in the computer to establish a LAN. It has a
unique id that is written on the chip, and it has a connector to connect the cable to it.
The cable acts as an interface between the computer and the router or modem. NIC
card is a layer 2 device which means that it works on both the physical and data link
layers of the network model.

Other networking devices include:

Brouter – it is also known as the bridging router is a device that combines features of
both bridge and router. It can work either at the data link layer or a network layer.
Working as a router, it is capable of routing packets across networks and working as
the bridge, it is capable of filtering local area network traffic.

Gateway – a gateway, as the name suggests, is a passage to connect two networks


that may work upon different networking models. They work as messenger agents
that take data from one system, interpret it, and transfer it to another system.
Gateways are also called protocol converters and can operate at any network layer.
Server rack – server racks keep network of power cords and cables well organized
and make tracing wires easy during systems maintenance or when a problem occurs.
Unguided (wireless) media

1. Radio waves
2. Microwaves
3. Infrared waves

Telecommunications network

1. Overview and telecommunication system


2. Electronic signals
3. The importance of telecommunications

Mobile communications

1. Bluetooth network
2. WLAN (Wireless Local Area Network)
3. Cellular networks
4. 4G vs 5G
5. Satellite networks
Data communications

Data communication in computers refers to the process of exchanging data between


devices or systems through the use of communication channels such as cables, optical
fibers, or wireless signals.

This communication is essential for computers to share information, collaborate, and


interact within a network. Data communication involves the transmission of data, which
can include text, numbers, images, and other forms of digital information.

The effectiveness of a data communication system is determined by four fundamental


characteristics, commonly known as the "Four Pillars of Data Communication." These
characteristics contribute to the efficiency, reliability, and overall performance of the
system.

Delivery: refers to the successful and accurate transmission of data from the source to
the destination.

Significance – an effective data communication system ensures that the data sent by
the sender is reliably delivered to the intended recipient without loss or corruption.

Accuracy: involves the precision and correctness of the data transmitted. It ensures
that the received data is an exact replica of the original information.

Significance – an accurate data communication system minimizes errors during


transmission, guaranteeing the integrity of the information.

Timeliness: timeliness pertains to the speed and responsiveness of data transmission,


emphasizing the importance of delivering data in a timely manner.

Significance – a timely data communication system ensures that information is


delivered within an acceptable timeframe, meeting the requirements of real-time
applications and user expectations.
Jitter and latency

Jitter: refers to the variation in the arrival time of data packets. Inconsistent delays can
lead to jitter, affecting the quality of real-time applications.

Latency: is the time it takes for data to travel from the source to the destination. High
latency can result in delays and sluggish performance.

Significance – minimizing jitter and latency is crucial for maintaining a smooth and
responsive data communication system, especially in applications where timing is
critical.

Conclusion

These four characteristics collectively determine the efficiency and reliability of a data
communication system. A well-designed system should prioritize the successful and
accurate delivery of data in a timely manner while minimizing variations in latency and
jitter. Achieving a balance among these characteristics is essential to meet the diverse
requirements of different communication scenarios and applications.
Key components and concepts related to data communication include:

Sender and Receiver

Sender: the device or system that initiates the transmission of data

Receiver: the device or system that receives and processes the transmitted data

Message

The actual data or information being transmitted from the sender to the receiver

Channel

The medium or communication path through which data is transmitted

This can be wired (e.g., cables) or wireless (e.g., radio waves).

Modulation and Demodulation

Modulation: the process of encoding digital data into analog signals for transmission

Demodulation: the process of decoding analog signals back into digital data at the
receiving end

Multiplexing

The technique of combining multiple data streams into a single channel for transmission,
and optimizing the use of available bandwidth.
Transmission Modes

Simplex: data flows in one direction only (examples: Television broadcasting, radio
broadcasting, electronic billboards and/or public displays, elevator floor indicators,
alarm systems, temperature and weather sensors …).

Half-duplex: data can be transmitted in both directions, but not simultaneously


(example: walkie-talkies).

Full-duplex: simultaneous two-way communication (examples: telephone conversations,


video conference systems, modern Ethernet networks, VoIP – Voice over Internet
Protocol calls, Bluetooth headsets, Satellite communication systems …).

Error Detection and Correction

Methods employed to identify and rectify errors that may occur during data
transmission.

Examples include:

 Parity bit
 Checksums
 CRC (Cyclic Redundancy Check)
 Hamming code
 FEC (Forward Error Correction)
 ARQ (Automatic Repeat reQuest)
 Interleaving

Networking

The interconnection of multiple devices to form a network, allowing them to


communicate and share resources
Protocols and standards

Protocol: refers to a set of rules and conventions that govern the format and timing of
data transmission between devices. Protocols ensure that data is exchanged accurately
and efficiently.

Established sets of rules and standards that ensure compatibility and seamless
communication between diverse systems

Examples include:

 TCP/IP (Transmission Control Protocol / Internet Protocol)


 HTTP/HTTPS (Hypertext Transfer Protocol / Hypertext Transfer Protocol Secure)
 FTP (File Transfer Protocol)
 SMTP/POP/IMAP (Simple Mail Transfer Protocol / Post Office Protocol / Internet
Message Access protocol)
 DNS (Domain Name System)
 SNMP (Simple Network Management Protocol)
 VoIP (Voice over Internet Protocol) …
Internet Protocol (IP)

An IP address, which stands for Internet Protocol address, is a numerical label assigned
to each device connected to a computer network that uses the Internet Protocol for
communication.

Why IP?

IP addresses serve two main purposes: host or network interface identification and
location addressing.

Host identification: uniquely identifies each device (computer, printer, router …) on a


network.

Location addressing: facilitates the routing of data packets between devices on


different networks by indicating the source and destination of the communication.

Network interface identification: identifies the specific network interface of a device,


particularly in the case of devices with multiple interfaces.

Network routing: enables routers to forward data packets between different networks
based on the destination IP address.

Types of IP addresses

IPv4 (Internet Protocol version 4)

o consists of a 32-bit numerical address, usually expressed as four sets of decimal


numbers separated by periods (example: 192.168.0.1)
o provides approximately 4.3 billion unique addresses
o the most widely used version, but the exhaustion of available addresses has led
to the adoption of IPv6
IPv6 (Internet Protocol version 6)

o consists of 128-bit numerical address, expressed as eight sets of hexadecimal


numbers separated by colons
(Example: 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
o designed to address the limitations of IPv4 by providing an enormously larger
38
pool of unique addresses  340 undecillion (3.4 * 10 ) unique addresses
o aimed at supporting the growing number of devices connected to the internet to
ensure every device can have a unique address

Note

IP addresses are essential for the proper functioning of the internet and local networks,
enabling devices to communicate and share information. They are assigned
dynamically (temporarily) or statically (permanently) by network administrators or
Internet Service Providers (ISPs). Additionally, IP addresses can be public (routable on
the internet) or private (used within a local network and not directly accessible from the
internet).

Classes of IP Addresses

An IP Address can have two parts:

 Prefix: identifies the physical network to which the computer is attached; it’s also
known as a network address.
 Suffix: identifies the individual computer (host) on the network; it’s also called
the host address.
Public IP Range Private IP Range Subnet Mask # of Networks # of Hosts per Network

1.0.0.0 10.0.0.0
Class A to to 255.0.0.0 126 16,777,214
127.0.0.0 10.255.255.255

128.0.0.0 172.16.0.0
Class B to to 255.255.0.0 16,382 65,534
191.255.0.0 172.31.255.255

192.0.0.0 192.168.0.0
Class C to to 255.255.255.0 2,097,150 254
223.255.255.0 192.168.255.255

CIDR notation Default subnet mask Range Example IP

Class A /8 255.0.0.0 1.0.0.0 to 126.255.255.255 10.0.0.1

Class B /16 255.255.0.0 128.0.0.0 to 191.255.255.255 172.16.0.1

Class C /24 255.255.255.0 192.0.0.0 to 223.255.255.255 192.168.0.1


Class D IP Address Range
Class D IP addresses are not allocated to hosts and are used for multicasting.
Multicasting allows a single host to send a single stream of data to thousands of hosts
across the Internet at the same time.

It is often used for audio and video streaming, such as IP-based cable TV networks.
Another example is the delivery of real-time stock market data from one source to many
brokerage companies.

 Range: 224.0.0.0 to 239.255.255.255


o First octet value range from 224 to 239
 Number of Networks: N/A
 Number of Hosts per Network: Multicasting

Class E IP Address Class


Class E IP addresses are not allocated to hosts and are not available for general use.
These are reserved for research purposes.

 Range: 240.0.0.0 to 255.255.255.255


o First octet value range from 240 to 255
 Number of Networks: N/A
 Number of Hosts per Network: Research/Reserved/Experimental

Network mask

A network mask, also known as a subnet mask, is a 32-bit number used in Internet
Protocol (IP) networking to divide an IP address into network and host portions. It works
in conjunction with IP addresses to define the boundaries of a network and identify the
network and host parts of an address.

Note that the network mask consists of a series of contiguous '1' bits followed by a
series of contiguous '0' bits.
Common network mask formats include:

Dotted decimal notation: in this format, the network mask is expressed as four octets
separated by dots, each representing 8 bits.

Example: 255.255.255.0

CIDR (Classless Inter-Domain Routing) notation: this notation represents the number of
'1' bits in the network mask by appending a forward slash and the subnet prefix length
to the IP address.

Example 1:

/24 can represent a network mask of 24 '1' bits (255.255.255.0).

Example 2:

IP address: 192.168.1.10

Network mask: 255.255.255.0 (or /24 in CIDR notation)

In this example, the network portion is 192.168.1.0, and the host portion is 10. The
network mask helps define the scope and boundaries of IP networks.

Private IP Addresses
Within each network class, there is designated IP address that is reserved specifically
for private/internal use only. This IP address cannot be used on Internet-facing devices
as that are non-routable.

For example, web servers and FTP servers must use non-private IP addresses. However,
within your own home or business network, private IP addresses are assigned to your
devices (such as workstations, printers, and file servers).

 Class A Private Range: 10.0.0.0 to 10.255.255.255


 Class B Private APIPA Range: 169.254.0.0 to 169.254.255.255
 Automatic Private IP Addressing (APIPA) is a feature with Microsoft Windows-based
computers to automatically assign itself an IP address within this range if a Dynamic
Host Configuration Protocol (DHCP) server is not available on the network. A DHCP
server is a network device that is responsible for assigning IP addresses to devices
on the network.
 At your home, your Internet modem or router likely provides this functionality. In your
work place, a Microsoft Windows Server, a network firewall, or some other
specialized network device likely provides this functionality for the computer at your
work environment.

 Class B Private Range: 172.16.0.0 to 172.31.255.255


 Class C Private Range: 192.168.0.0 to 192.168.255.255

Special IP Addresses

 IP Range: 127.0.0.1 to 127.255.255.255 – network testing addresses (also referred


to as loop-back addresses). These are virtual IP addresses, in that they cannot be
assigned to a device. Specifically, the IP 127.0.0.1 is often used to troubleshoot
network connectivity issues using the ping command. Specifically, it tests a
computer's TCP/IP network software driver to ensure it is working properly.

Activity – differentiate Automatic Private IP Addressing (APIPA) and Private IP Range.

You might also like