Comp Notes
Comp Notes
COMPUTER APPLICATION
This chapter deals with the areas where computers are used, what they used for, how
they are used and the advantages and disadvantages of their usage in such areas.
CAD Requirements
- considerable processor power
- Input devices like:
- Light pen: Used to make alterations on the screen to the drawings. Also used to
write directly on the screen. Can be used again to select commands.
- Tracker balls: used to draw designs and to select menus
- Mouse: adjust drawings
- Graphics tablet: provide interface for drawing on the screen. It also links with
the light pen.
- Output Devices like:
- Large high resolution screens
- Graph plotters to draw scale and full size and high quality drawings
- High specification graphics cards
- Some systems support stereoscopic drawings where 3-D spectacles can be worn and
the user sees a 3-D image.
Page 1 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Ability to link with Computer-Aided Manufacture (CAM)
- Facility to calculate the mass of the actual object once built
- Facility to calculate the cost of producing the article
- Simulation of designs without the need to build a prototype
- Import and export to allow the exchange of data with other software packages
- Kinematics (i.e. check moving parts in assemblies don’t interfere with each other)
NB: Ergonomics: the design and functionality of the computer environment and
includes furniture setup and how it affect human beings, e.g. ventilation, security,
space, noise, etc.
Page 2 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
actions e.g. data goggles track eye movement and respond by sending new video
input.
Areas of use for Virtual Reality (VR)
1. Entertainment:
a) Used in films/television as special effects where the studio audience wear
VR helmets in a space simulation.
b) Also used in computer arcade games like Need for Speed.
2. Marketing
a) Used in virtual tours around houses and hotels, kitchen designs,
ergonomics, etc.
3. Training: Areas of use include: military training, medical/dental training,
teaching personnel how to use equipment and in general areas where training is
dangerous and/or expensive e.g. flight simulators, car driving simulators,
operating devices under water or in outer space, etc.
4. Design: Design of chemical and nuclear plants, ergonomic studies (e.g. factory
layouts), helping to develop devices for handicapped people, etc.
Page 3 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- It is possible to do tasks which would normally be impossible (e.g. walking
inside a nuclear reactor, doing a task in outer space, etc.)
- There is a feeling of “being there” which makes the training more realistic
- Allow a number of very realistic scenarios to be tested out e.g. how to deal with
an emergency on a chemical plant which could be made to be really realistic.
ROBOTICS
- A robot is a reprogrammable, multifunctional computer controlled device designed
to perform multiple tasks in industries, replacing human beings; e.g. for spray
painting, welding, fixing parts of a car, etc.
- Robotics refers to the science of developing and the use of computer controlled
devices to replace human beings in manufacturing.
- Robots can contain embedded processors or be linked to a computer system.
- They are pre-programmed to do a specific task or “taught” to remember
instructions from a human operator carrying out the task manually e.g. teaching a
robot to spray a car with paint.
- Robots rely on processors and sensors. The sensors gather information so that the
robot knows it is the right time to do the task (e.g. is a car in position to be sprayed,
is there an obstruction to prevent the robot doing its task, etc.)
- They are capable of doing some pseudo-intelligent tasks (e.g. different sized cars to
be painted)
- Robots are mostly used (suitable) in the following areas:
o In very dangerous areas for human beings to work, e.g. fire fighting, nuclear
power stations, underground mining, chemical, nuclear factories, deep in the
ocean, in space, etc.
o In areas where heavy items are to be lifted, e.g. for loading containers in
ships, in production lines, etc.
o In areas where the degree of accuracy is of utmost importance, e.g.
manufacturing of computer chips. Thus producing standardised goods.
o Where work is repeatedly executed and boring, like traffic control at road
junctions
Robots can move from one position to another, e.g. when lifting cars into the
warehouse and when going for recharging their batteries.
They keep a record of the distance they have travelled and the angles they have
turned through so that they can return to original position
They can sense (using light sensor) and stop if unwanted object gets on their way.
Page 4 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
They need information and programming for them to work. Information is provided
by sensors.
ARTIFICIAL INTELLIGENCE
Artificial Intelligence (AI) is the science of developing computer systems that have
the ability to learn from experience and mimic human reasoning in specific areas, as
Page 5 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
in medical diagnosis, mineral prospecting, etc. Expert systems are a branch of
Artificial Intelligence
EXPERT SYSTEMS
These are computer systems developed to mimic human reasoning and work at the
level of an expert in a particular field, e.g. in medical diagnosis. A good example of an
expert system is MYCIN that diagnose bacterial blood disease and then recommend
appropriate antibiotic therapy for patients.
Expert systems are used in the following fields:
- oil or minerals prospecting,
- diagnosing a person’s illness,
- Diagnostics (e.g. finding faults in a car engine, etc.),
- tax and financial calculations,
- complex “thinking” tasks such as chess,
- weather forecasting,
- criminology/forensic science,
- career choices, etc
The system uses a rule base and an inference engine together to simulate human
reasoning when analysing a problem and arriving at a conclusion. To simulate human
processes it is necessary to have a vast amount of information stored in the
knowledge base and the reasoning set out as a set of rules in the rule base.
Page 6 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Input data into knowledge base.
- Design the rule base.
- Design inference engine
- Test system with known facts
- Design display of results
- Design appropriate user interface
Page 7 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Questions are asked about geological profiles. Answers to questions are typed in. The
inference engine searches the knowledge base using the rule base.
Inputs
Geological data such as rock and soil type
Processing
Draws conclusions from rules and facts using geological data entered and the mineral
data stored in the knowledge base. E.g
- suggest the probability of finding oil as an output
- indicates the probable depth of deposits
- predicts geological deposits above the soil
- produces contour maps showing concentration of minerals, rocks, etc
Output
- Possible mineral deposits that can be found in that area
- Geological maps
DATA LOGGING
The process of automatically collecting data from source at set intervals, over a period
of time, for use at a later stage. A device that automatically collects data from source at
set intervals for use at a later stage is called a data logger.
Page 8 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
water, in pollution monitoring, chemical process control, etc
Humidity(moisture) Measures humidity (moisture) levels in air, greenhouses,
sensor irrigation systems, etc
Distance sensor Measure the distance from one point to another
(could be
proximity)
Oxygen sensor Used to monitor pollution levels
Page 9 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Page 10 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Monitoring scientific experiments in laboratories
- A burglar alarm system
- Environmental monitoring (oxygen or pollution level in river)
- Sensors read data from the river (Oxygen level, acidity level, using the pH
sensor)
- Data from sensors is converted to digital form
- Computer stores received data
- Oxygen and acidity levels from sensors are compared with historically stored
(pre-set values/parameters)
- Either data can be transferred to CD/DVD/Memory stick for later analysis OR
- Data is send to the monitoring station directly through mobile phone network
or through cables.
- Red colour is displayed on screen if values are outside acceptable level or an
alarm is sound.
These systems are designed to monitor critically ill patients or premature babies.
Some biosensors connected to the computer are attached to the patient for tracking
and recording vital signs such as heart beat, blood pressure and brain activity. The
biosensors will transmit readings to the central computer should the situation go
beyond a critical warning level and:
- issue a warning on the computer display for nurses on standby
- sound a warning siren, beep or sound to alert medical staff
- flash a light to draw attention of medical staff
Patients in intensive care are monitored through sensors. The sensors measure and
give feedback pertaining to: blood pressure, temperature level, weight, pulse rate, etc.
The computer is pre-set with normal range of values. It compares these with feedback
from sensors.
Computers record patients’ medical data over some time for later analysis. Data
recorded includes:
Page 11 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Taking measurements on patients, for instance: blood pressure, temperature
level, weight, pulse rate etc. This relieves nurses of some duties that will be
boring, making them faster and more reliable.
- There are however some hospital tasks that are more suitable for human
beings to perform than computers. These include dressing patients, bathing
patients, etc.
CONTROL SYSTEM
- It is a system in which one or more computers are used to monitor and regulate the
operations of non-computer equipment like in oil refineries.
- Control systems involve monitoring and logging of physical quantities, provide an
analysis of performance and allows some user interaction.
- Feedback is an essential element as well as timing.
- Most control systems are real-time systems, e.g. in oil refining, chemical processing,
traffic lights (controlling the sequence of lights to maintain optimum traffic flow),
chemical and nuclear plants (opening and closing valves, safety systems, etc.), etc.
- In computer control:
computer system takes information from the sensors
compares the data with stored values
Takes action to try to get values within acceptable ranges by sending
signals to devices to open/close, on/off etc. Devices that receive signals
include valves, motors, windows, tapes, etc.
Page 12 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
output from system can affect next input (feedback)
NB: In chemical and nuclear plants, there is often a combination of monitoring and
control taking place. Information from sensors is often displayed on a control panel
where operators can see key values and alarm conditions (e.g. if a system monitors
temperatures and 1100C is the normal temperature and 1200C is the alarm
temperature, the control panel will show normal, present and alarm values in the
form of read outs – either the computer will automatically take action if necessary or
the operator will take action (override the system if necessary)
Page 13 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Temperature and chemical sensors read data from the chemical process
- Data from these sensors is converted to digital form using ADC
- Computer compares values from sensors with pre-set data in computer
memory
If temperature is too low, a signal is send to switch on heaters
If temperature is too high, a signal is send to switch off heaters
If temperature is within acceptable range, no action is taken
If pH is too high, signal is send to open valve and acid is added
If pH is too low, signal is send to close valve
If pH is within acceptable levels, no action is taken
Signals are changed from digital to analogue so as to control heaters
and valves
- This continues as long as the computer is activated.
Control in Greenhouses
- The environment must be kept constant if plants are to grow successfully in
greenhouses.
- Temperature and humidity in the air needs to be controlled so that it is kept
constant
- Sensors are used to record humidity and temperature levels in analogue form. The
analogue signals are sent to the computer
- The computer will have stored (pre-set) values of minimum acceptable level and
maximum acceptable level for both temperature and humidity
- If the sensor records humidity level below the minimum acceptable level, the
computer will send signal to the actuator to close the windows and switch on the
pump for a certain period of time, which will spray water as a fine mist inside the
greenhouse.
- Too much humidity will cause the processor to send signals to the actuator to open
windows to assist ventilation and drying out air.
- In case of temperature, if the greenhouse becomes too hot, the windows are
opened and heater turned off. If it becomes too cold, windows are closed and
heater switched on.
Inputs:
Humidity/moisture (collected from humidity/moisture sensor),
Temperature (all in analogue form; collected from temperature sensor)
Processing:
- detecting temperature/humidity level
- Processors compares pre-set values in the computer with data collected from
sensors
- Processor instructs actuator to take action if values exceed or are less than
minimum/maximum pre-set values
Outputs:
- Windows open or closed (digital form)
- Heater on or off (digital)
- Pump for water supply on or off (digital)
Page 14 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Data is read from sensors(light sensor, motion/pressure sensor, weight sensor,
sound sensor, etc)
- Data is read from camera images
Processing:
- Computers analyse data from sensors.
- Computers calculate average traffic flow and speed.
- Computer sends signals to actuators to adjust change of lights and timing
Output:
- Change of lights at junction.
- change timing plan
In case of an emergency, the computerised traffic system may perform any one
of the following:
- Give uninterrupted path through the system of linked traffic lights.
- Give green link – wave for all traffic to pass.
- Turn all lights to red.
- Activate emergency generator.
- Sound an alarm.
Microprocessor-Controlled Streetlights
Input:
- Pre-set values of Sunset time and Sunrise time
- Light level (Light sensor sends measurement of light to microprocessor, ADC
converts this to digital)
Processing:
- Processor compares sunrise time, sunset time and current time.
- If sunrise time = current time or higher, the processor send signal to actuator
so that it switches off lights, else,
- if signal equals sun set time, the processor send signal to actuator so that it
switches on light.
- Also the amount of light is compared with pre-set value. If higher – nothing
happens, If lower or equal sends signal to send signal to actuator so that it
switches on the streetlights.
Output:
Lights switched on or off
Page 15 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Computer systems do not miss key data that must be entered into the system as
humans do.
- Computer control is more reliable than human beings as computer does not
forget to take readings
- computers are more accurate and can take more frequent readings (e.g. if
readings need to be taken every 30 seconds, humans can make mistakes or miss
readings or even find it impossible to take readings at such short time intervals)
- data can be automatically displayed and analysed without the need to enter data
manually (which in itself could introduce errors into the system)
- Data can be automatically stored and used in other programs.
- The results of the system can be automatically stored in a spread-sheet package
or a database package for future reference.
- Computer’s response time is faster, which is important especially in patient
monitoring
AUTOMATED SYSTEMS
- These are control systems that are dedicated to one particular task and lack the
ability to collect and analyse data as in digital cameras.
- They do not allow for or act on user interaction, e.g. washing machines, cameras,
watches.
- Most control systems have embedded computers systems inside them.
Refrigerators
Inputs:
- temperature level (from temperature sensor/ or entered manually through the
number pad),
- Pressure (from pressure sensor/contact switch/push switch) ,
- push switch setting
Processing:
Page 16 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Analogue data from sensors is converted to digital by the ADC
- Processor controls temperature level by comparing with pre-set values.
- If temperature is higher than pre-set value, the processor sends signal to motor
to switch on compressor
- If not higher, the compressor is switched off by the actuator
- Processor controls the display panel.
- Processor sends signals to display panel and to the motor to switch lights on or
off.
Outputs
- Switch on lights if door is opened and off when closed
- Light emitting diodes indicating current temperature of the inside of
refrigerator.
- A warning buzzer (sound) if light is left open.
- Cold temperature
Air Conditioners
Inputs:
- Pre-set temperature level
- Temperature from temperature sensors
- Pressure from pressure sensors: monitors pressure of refrigerant
Processing
- Processor controls temperature.
- Processor sends signal to motor to change fan speed
- If temperature is below pre-set value, the processor gives motor signal so that
it switches off fans
- If temperature is above pre-set value, the processor gives motor signal so that
it switches on fans
- Processor controls timing and the display panel
Output
- Cool temperatures in the room
- Fans switched off or on depending on the situation
Digital Camera:
Input:
- Light mode( night or day mode)
- Film speed
- Colour setting
Processing:
- Processor sends signal to automatically adjust film speed,
- Processor positions the end of film,
- Processor sends signal to adjust distance from object,
- Processor sends signal to adjusts light.
- Processor sends signal to save image on the memory card
Output
- Sound to indicate that the film/picture has been taken
- Image/film captured and stored
- Light flashed to indicate film/picture is taken
Speed Cameras
Page 17 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
These are used on roads to take photographs of cars which have exceeded the speed
limit. Some of these cameras use microprocessor controlled chips to store
information.
The advantages of speed cameras with microprocessor controlled chips are
that:
- Data and images can be transferred automatically which will be faster.
- Image can be viewed straight away.
- Can store considerably more data and photos.
- Can store other information (apart from photo image) e.g. road conditions.
- Chips can be re-used.
Inputs
- Maximum speed (speed limits)
- Road condition
Processing:
Tasks which would be carried out by the microprocessor as a speeding car
approaches a camera include:
- Sense and record speed of vehicle.
- Compare speed of vehicle with stored value(s) and decide whether photograph
should be taken.
- Check on value of light intensity.
- Adjust focal length, focus image, adjust shutter speed and set exposure.
Tasks which would be carried out by the microprocessor as the photograph is
being taken include:
- Log the time.
- Log the date.
- Log the speed.
- Record the road conditions.
- Operate ―flash.
- Operate shutter.
- Instructs storage of the image.
- Check on value of light intensity.
- Adjust focal length and focus image.
Outputs
- Video/pictures of cars captured
- Alarms of over-speeding cars
Microwave Cookers
Function by switching a microwave unit on for a sufficient time to either defreeze
frozen food or cook it. It is used to cook food quickly by using waves (similar to radio
waves) to heat the food.
Inputs:
Modern cookers have sensors attached to a microprocessor for detecting as inputs:
Weight of food
Temperature of food
Some cookers will also have additional sensors for detecting:
- Amount of steam produced during cooking
- Amount of alcohol produced
Processing:
- The microprocessor continually monitors sensor readings and by referring to a
programmed in-built database of food types.
- The microprocessor determines time needed to cook or defreeze food.
Page 18 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- IF a temperature in the food indicates the food is cooked OR the time set on the
oven clock is reached THEN microwaves are not produced
Output: Heat for cooking, Light indicating that food is cooked, power turned off if
food is cooked.
Feedback: The process in which output of a system can affect its own output. It is
whereby part of the output of a system is returned to its input in order to regulate its
further output.
3-D Models can be built using CAD, e.g for planning stores.
Advantages of modeling
- No equipment is damaged
- People are not put in any danger
- Expensive prototypes don't need to be built
- Time can be sped up or slowed down
- Models can be run and re-run over and over
- Modifications can easily be made and re-tested quickly
Disadvantages of Modeling
Page 19 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- The results depend on how good the model is and how much data was used to
create it in the first place.
- Models and simulations can't ever completely re-create real-life situations.
- Not every possible situation may have been included in the model.
- The equipment and software are expensive to purchase.
- Staff need to be trained how to use the software and equipment.
SIMULATION
Simulation is the study of the behaviour of a system using models in order to predict
future real life events, like population growth, flight simulator, etc. It involves feeding
values into a model to see how the model behaves.
In simulation, past and present data, as well as models are analysed in order to
predict the future. Simulation is used in the following areas:
- Training (e.g. pilots, drivers, medical doctors, etc.)
- running/testing chemical plants and nuclear plants
- trying out equipment to be used under sea or in outer space
- crash testing cars
- financial simulations (e.g. stock market predictions based on various
scenarios)
- population growth (i.e. predict how the world’s population will increase based
on a number of different scenarios)
- queues (e.g. simulating queues at supermarket checkouts)
- weather forecasting
Advantages of simulation
- saves cost (rather than doing the real thing)
- safer (scenarios tried out on the simulation first before used in reality)
- possible to try out various scenarios in advance
- Some environments make simulations the only way to carry out a task
beforehand (e.g. outer space, under sea, chemical processes, nuclear reactors,
etc.)
- faster (no need to build and test real system, so it is possible to get results
more quickly)
FLIGHT SIMULATOR
- Flight simulators are used to train pilots how to fly aircraft.
- They can also be used to test new aircraft before they are actually flown for the
first time.
- Flight simulators are expensive to buy but are much cheaper than actual
aircraft.
A landing simulation with ice on the runway, thick fog and only one of the four
engines working would really test the pilot’s ability
Flight simulators enable pilots to experience turbulence, snowstorms, thunderstorms,
fog, etc, without leaving the ground.
Page 20 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Page 21 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- the control box or computer “decides” what course of action to take and sends
signals to the traffic lights to change timing if necessary
- as with any system involving sensors, ADC and DAC interfaces may be needed
Output:
Page 22 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Information obtained is displayed on the computer screen ready for
presentation on televisions
- Information can be printed documents.
- Tables and graphs are produced
- Rainfall maps and isobars are produced.
- Expected minimum and maximum temperatures are produced
- Areas of pressure change with time so it is possible to predict rainfall, strong
winds, etc. in advance
- Show how the clouds patterns will change with time so it is possible to predict
rainfall
Page 23 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- It is possible to control any device in this way if it contains an embedded processor
e.g. television, DVD player/recorder, washing machine, scientific experiments in
remote areas such as outer space
- GPS systems are used to determine the exact location of a car, airplane, ship or any
form of transport which travels from one place to another.
- In vehicles these systems are called Satellite Navigation Systems (sat nav).
- Satellites in outer space transmit signals to the Earth.
- Computers in vehicles (e.g. car, airplane or ship) receive and interpret these
signals.
- Positioning depends on very accurate timing – atomic clocks are used because of
their accuracy to within a fraction of a second per day.
- Each satellite transmits data indicating its position and time.
- The computer in the vehicle calculates its location based on the information from at
least three satellites as shown below:
Page 24 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- computer in bus calculates its position based on received satellite data
- at least three satellites are used to give the vehicle’s exact position
Advantages
- It is far safer since a driver of a vehicle doesn’t have to consult maps whilst driving.
- it also removes error (e.g. going the wrong way down a one-way street).
- Sat nav systems can also give additional information such as position of speed
cameras, estimate time of arrival, etc.
- GPS can monitor a vehicle’s position if it has broken down or has been stolen
(vehicle tracking system).
- In airplanes GPS can pinpoint its exact location in case of an accident which enables
search teams to quickly respond to the incident.
Disadvantages
- maps may not up to date therefore instructed to turn into a road which no longer
exists
- road closures due to accidents or road works may cause problems to a sat nav
system
- signal loss can cause problems with GPS systems
- potential interferences from external sources (major problem on aircraft)
- incorrect start and end point entered into system can cause problems
THE INTERNET
Internet stands for INTERnational NETwork and it is a global (world-wide)
connection of computer networks for information sharing. On the internet, one is able
to access data stored on a server in any part of the world as long as it is connected to
the internet itself. The internet can be accessed from anywhere. It is also available to
anyone. No one controls the internet as computers in different countries are
connected yet the countries have different laws. However, each country may regulate
internet usage in its own territory.
Definition of Terms
Page 25 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Information Superhighway (ISH): A global network of computers for moving huge
amounts of information via satellite and cable connection. Information found on ISH
includes home shopping, entertainment, news, software downloads and help, online
banking, stock market dealing, jobs, (vacancies), university placements, etc.
Information Technology (IT): - The use of computers in information handling and
communication.
Information Age: A period beginning in the last quarter of the 20th century when
information became easily accessible through publications and through the
manipulation of information by computers and computer networks.
Global Village: the use of the internet to access information from any part of the
world.
Information and Communication Technology (ICT): The use of computers and
related method as a tool for information communication, for instance through e-mails,
cell phones, etc.
Web page: an HTML document or page on the internet that contains information
about an organisation.
Website:-a collection of HTML documents at the same domain, often with a common
name and maintained and provide information of a single organisation and is found
on the internet. It is an HTML page/pages on the internet that contains information
about an organisation
Hyperlink :- an area of a web page, usually text or image, that contains a links to
another web page. It is usually underlined or has a different colour to show that it can
link the user to another site.
Home page: A web page that loads first (by default) when one logs on to the internet.
It then provides links to other sites on the internet. It is also a web page that appears
first when you log on to a website.
URL: Uniform Resource Locator: This is a unique address that identifies a
website/page on the internet, e.g. http://www.econet.co.zw. This only identifies one
(unique) web page for Econet Wireless which is found in Zimbabwe (.zw). Thus a URL
is a unique address for each web page. A typical URL looks like:
http://www.google.co.zw/computing/student.html.
- .zw Zimbabwe
- .zm Zambia
Page 26 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Modem (MOdulator DEModulator):- a device that converts analogue data to
digital form and vice versa, often for internet connection using a telephone line.
Alternatively one may acquire a GPRS (general packet radio service) modem.
- Communication link: Acts as a transmission media for data, e.g. telephone line,
satellite transmission, etc.
- Network cards for each computer:- a device that identifies computers to the
network, has an interface where network cables are plugged on the computer
Website features
The following are the general features of a good website
- shopping basket
- offer security when using credit/debit cards
- search facility for artist, tile, item, etc
- drop down boxes to choose categories
- help facilities
- currency converters for international customers
- date/sales confirmation by automatic email
- saved customer details/customised pages
- ability to track status of orders
- ability to listen to/view/see video/see product, etc
- recognise customer as soon as they log on
Page 27 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- buttons to navigate to other web pages
When designing web pages it is necessary to supply the correct spacing for customer
information (and/or use drop down menus), buttons to navigate to other web pages,
etc
(c) Network operating system: manages the network and offers security to internet
users.
NB: internet account: a unique personal identifier given by the Internet Service
Provider (ISP). An ISP is an organisation that links users to the internet, for example,
Mweb, Ecoweb, Africaonline, Yahoo, Google Inc, etc.
Page 28 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Below are some of the security concerns and some suggestions on how they can be
rectified / prevented.
Page 29 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
UPS: Uninterruptible Power Supply (A device with rechargeable batteries that
provide continuous supply of electricity to computers for a given period of time if
there is power cut.
Parallel systems: Refers to the running of two different systems but doing the same
job in the same organisation. Each system will have its own files.
Password: A password is a secret group of alphanumeric characters used to protect a
document or file from unauthorised access
PIN: Personal Identification Number- a secret number used by individual account
holders to access bank account and get service at the ATM, phone, Point of Sale
terminal (POS) using debit cards, etc.
Firewall: Hardware and associated software used to protect networked private
computer systems from unauthorised access by preventing outside data/users from
entering the system while at the same time preventing internal data from leaving the
system.
NB: Note
- Viruses do not only infect computers, they can also affect mobile phones, MP3
players etc. – any device which can download files from a source such as the
internet is potentially at risk.
- Backing up may allow files that have become lost/corrupted (due to hacking or
viruses) to be reinstated; however, this would not recover the system nor
would it prevent hacking/viruses affecting a system in the first place.
- Problems like spam, pop-ups, cookies, etc. are more of a nuisance (they can
also slow down the operation of a computer). These can however be blocked
(or made inactive) by using suitable software.
When using the Internet, security can be enhanced using encryption.
Credit and debit card transactions can also be protected by a special type of password
control.
For example, if a user chooses the password COMPUTE34 to protect their credit card,
when they buy something over the internet the card issuer will ask the user an
additional question such as: “Please type in the 2 , 4 and 7 character of your password
in the following boxes:
□□□“
The user will then type in O P E and the card purchase will be authorised. This
additional protection is used as well as encryption.
Some of the new systems allows user slots the card into the side of the keyboard and
is required to type in a PIN before the Internet can be accessed. This gives an
Page 30 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
additional level of security since it is necessary to have the card, know the PIN
associated with the card AND also know the user’s log in id and password!!!
Page 31 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- The message is transmitted to the recipient’s ISP mail server
- The message is stored in the recipient’s electronic mail box.
- The addressee logs in to a local computer and receives the mail
Disadvantages of e-mail
Not everyone has equipment to send e-mails.
Junk mail (spam) is a problem.
You waste a lot of time looking through mails that are just adverts.
E-mails are not as secure as traditional mails.
The system relies on people checking their mails regularly.
Old people feel left out as they consider themselves too old to learn.
Equipment used to send and receive e-mails is very expensive as compared to
traditional methods.
However, despite the increase in the use of e-mail, there has been a sharp increase in
the amount of paper used. This is because:
People print copies for meetings and then destroy them afterwards, but if
needed again, print out another copy.
Some people find it difficult reading large amounts of text on the screen.
People often e-mail colleagues rather than use the phone who then print out
the document.
Page 32 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
3. Video conferencing: Conducting meetings with several people in different
locations and seeing each other on the screen of networked computers. Video images
and audio are seen/heard in real time on large monitors/through speakers. Delegates
do not need to leave their homes or work places or conference rooms. Video
conferencing requires the following:
A computer with a codec (which converts and compresses analogue data into
digital data for sending down digital lines.)
Video cameras or Webcam to take video images
Microphone to speak through.
Loud Speakers for delegates’ voices to be heard.
Large and high resolution monitor.
Internet/WAN/modem to transmit data
An integrated Services Digital Network (ISDN) line with a high bandwidth to
transmit video data at fast speed.
Sound card.
Video card
Compression software to compress video and sound
which converts and compresses analogue data into digital data for sending
down digital lines
requirement for echo cancellation software (this allows talking in real time and
keeps communications synchronised)
Page 33 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
The hardware and software needed to run video conferencing is very
sophisticated and expensive.
Confidential documents may need to be seen in their original form, which may
be difficult in this situation
There is no direct eye contact, which plays a large role in group discussions.
The quality of video or audio may be low, depending on the bandwidth.
There may be interruptions due to breakdowns in transmission
Power cuts may prevent the conference from continuing.
4. View data (videotext) systems: These are interactive systems on which users
view data when they access specialized databases like Prestel. The requirements
include:
the telephone line or cable TV,
specialized keyboard and
A Television set.
6. Facsimile (Fax): A method whereby output from a scanned document is send over
telephone line and reproduce on a fax machine on the receiving end. Fax method has
the following advantages:
It is very cheap to send messages.
It is very easy to use.
It is a very fast method of sending messages.
However, it has the following disadvantages:
Its requirements are expensive (fax machine).
There must be a person at the receiving end to attend to the fax when receiving
messages.
NB: The use of fax, e-mail, view data, teletext, teleconferencing and video conferencing
in an office brings about an electronic (paperless) office.
- An electronic office is an office in which the storage and processing of data as well
as communication are done electronically.
- An electronic office is efficient because:
Communication is easier and faster.
Less paperwork is involved.
Current and up-to-date information is provided.
Ensures a clean office environment.
Page 34 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Tele and video conferencing as well as networking bring about tele-commuting
(tele-working). Tele-commuting is carrying out work without leaving home.
- Communication is done through networked computers.
- Requirements for telecommuting includes: modem, very fast communication links
(for example telephone line), computers, internet services, etc.
Benefits of telecommuting
- Easier to concentrate on work in a quiet environment than in a noisy office.
- It saves time spent in travelling to the work place thereby increasing
productivity.
- It cut costs involved in travelling to work place.
- The employer saves costs of office space and overheads like water and
electricity.
- People can be recruited from a wide geographical area.
- People with disabilities like the handicapped can be employed.
- People in different locations can work as a team.
Disadvantages of tele-commuting
- Workforce not in office is difficult to control.
- Workers would not understand corporate goals and will not be loyal to the
organisation.
- Employees feel isolated and miss the environment of an office full of
colleagues.
- People may find it difficult to work in teams.
- It is difficult to separate work from home duties while at home.
- Unions find it difficult to mobilise workers for demonstrations and strike.
7. File Transfer : allows users to transfer files from host computers on the internet to
their personal computers.
8. News groups: a global electronic bulletin board system in which users exchange
information on different topics.
9. Entertainment: the internet provides an option for users to download and listen to
music, newspapers, radio stations, etc.
10. Internet Shopping: (Internet buying, electronic commerce, online shopping): The
internet provides a facility for customers to purchase products from the internet
without visiting shops. Credit cards are used in internet buying.
Page 35 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Goods and services usually cheaper on the internet.
- Customer need not to go to shop and therefore save travelling time.
To businesses/shop managers
- Business is carried out any time of the day (provides a 24 hour shopping
service).
- Increases sales due to greater number of customers from all over the world.
- No wastage space for goods is involved.
- Ensures huge saving on overheads like rent, warehousing, employee facilities.
- More goods can be made available.
- It is cheaper to use as there are no leaflets, pamphlets, etc.
- Can reduce the number of shops on the streets.
- Organisations can employ fewer workers thereby cutting labour costs.
- No need to travel to the shop as business can be run from home.
To businesses
- Increase in cases of industrial espionage.
Industrial espionage involves selling of company secrets by employees to rival
companies and the use of destructive methods by competitors to destroy other
organisations.
Page 36 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Decline in leisure shopping as goods are deskilling of the work force (e.g CAD has
bought on-line. taken over draftsman skills, word processors
have taken over many office-based duties,
etc.)
A lot of money is wasted by the need to re-train the workforce in the use of new
software/computers
Computer systems have allowed companies to set up call centres in other countries
where potential cost savings can be made. This, of course, can lead to job losses in the
host country.
Page 37 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
INTRANET
- Intranet stands for INTernal Restricted Access NETwork, which is a restricted
private organisation’s network that uses internet technologies for the benefits of
such an organisation.
- An intranet is a computer network based on internet technology that is designed
to meet the internal needs for sharing information within a single
organisation/company
- Intranet requires password entry.
- Intranet is protected by a firewall.
- Intranet only gives local information relevant to the company/organisation
- It is possible to block access to certain sites using the intranet, e.g Facebook.
- it is not always necessary to have external modems when using intranets
- information for use on intranets is stored on local servers
Many companies use intranets as well as the internet for the following reasons:
- it is safer since there is less chance of external hacking or viruses
- it is possible to prevent employees from accessing unwanted web sites
- companies can ensure that the information available is specific to their needs
only
- it is easier to keep “sensitive” messages to remain within the company only
Differences between internet and Intranet
Internet Intranet
the INTERNET is INTERnational NETwork an INTRANET is INTernal Restricted Access
NETwork
Internet gives all information including that the intranet only gives local information
which is not relevant to the organisation relevant to the company/organisation
Always need external modems for internet it is not always necessary to have external
connections modems when using intranets
Information on internet saved in different information for use on intranets is stored on
computers local servers
the internet can be accessed from anywhere Intranet is accessed within the range of the
organisation’s network
the internet is available to anyone without whereas the intranet requires password
password restriction entry
Page 38 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Broadband: a communications network that provides for high quality and high speed
voice, data and video transmission usually over one channel in wireless networks or
over high bandwidth media like fiber optics and satellites.
Wireless Communication:
This is a method of networking (linking) computers and computer devices without
the use of cabling (wires), e.g. using Bluetooth, radio, satellite, infra-red, microwave,
etc. The devices that can be used in wireless technology include:
- Mobile phones /cell phone/remote key pad/remote control/ remote keyboard.
- Infra-red mouse.
- Multimedia mobile handsets and notebooks.
- GPRS (General Packet Radio Service) modems.
- Wireless LAN(or Wi-Fi –Wireless Fidelity: A local area network that uses high
frequency radio signals to transmit and receive data over distances of a few
hundred feet; uses Ethernet protocol).
- PDAs (personal digital assistants).
Most areas in the world now offer broadband rather than dial up for connecting to the
internet. The advantages of broadband over dial up include:
- the system is always “on”-no need to dial into ISP every time you want access
- the connection rate/data transfer rate is much higher (for example broadband
operates at 11 000 kbps compared to the dial up rate of 60 kbps)
- there is a flat monthly rate with broadband (dial up is charged per hour of usage)
- it is possible to use the telephone at the same as the internet with broadband/the
line isn’t tied up
- broadband permits other facilities such as “skype”
- Wireless technology (WiFi) allows connection of a computer to the Internet
without the need for connecting cables. A router (containing a modem and
external aerial) is connected to a telephone line and it is then possible for any
computer within range to communicate with the router and allow Internet access
– the link between computer and router is completely wireless.. The main
Page 39 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
advantage of doing this is clearly the portability (i.e. can go anywhere within
range since no wires are needed).
Range
Reliability
– Like any radio frequency transmission, wireless networking signals are subject to
a wide variety of interference, as well as complex propagation effects that are
beyond the control of the network administrator.
Speed
– The speed on most wireless networks (typically 1-54 Mbps) is far slower than
even the slowest common wired networks (100Mbps up to several Gbps). However,
in specialized environments, the throughput of a wired network might be necessary
It isn’t just computers that can be linked without wires, various peripheral devices
can be linked to a computer system without the need for a physical, wired connection.
For example:
- Printers
- Keyboards
- Mouse
- Digital cameras
COMPUTERS IN ENTERTAINMENT
Music
Computers are now used for playing and composing music. Computer hardware and
software advances have changed how music is generated and produced. Software
used includes Fruit Loops, Virtual DJ, etc.
Musical instruments can be connected to a MIDI (Musical Instrument Digital
Interface).
MIDI is a type of serial interface built into a piece of electrical equipment so that it can
communicate with the computer. It also converts output signals from the instrument,
e.g. guitar, into digital form.
Page 40 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Some of the key reasons for the widespread development of music using computers
are:
- the recording process for music is faster
- there is no need for tapes during the recording process
- It is easier to remove or add sounds to a track.
- Sampling of sounds is very easy
- actual musical notes can be generated from the music itself by software
- music samplers and mixers give an almost limitless ability to alter the original
tracks recorded in a studio
- don’t need to understand music notation to write a musical score
- electric instruments (such as guitars and organs) play back through electronic
machines
- synthesisers combine simple wave forms to produce more complex sounds
- electric organs can now mimic almost any instrument (including a full
orchestra)
- automatic rhythm
- music notes automatically printed out in the correct format
- There are many other software and hardware developments; the above is just
a summary of the more common elements.
- A performance can be directly recorded onto the computer and stored in a
MIDI file, which can be edited later.
- Synthesisers are also used to generate notes and desired sounds from pre-
recorded electrical signals. These signals can be combined with signals from
conventional instruments and recorded to produce songs.
Music can be compressed to produce MP3 (motion picture expert) format.
Music can be played using software like Microsoft Windows Media Player, JetAudio,
Nero Show Time, Real Player, etc.
Image processing: The images can be darkened, sharpened, changed colour, cropped,
etc.
Animation
- Animation consists of displaying a rapid succession of 2-D or 3-D graphics
arrangements to create the illusion of movement. It is used for web presentations
and advertisements and for film.
- Computer animation is the art of creating moving images via computer hardware
and software.
- For 3-D animation, objects are designed on a computer and a 3-D skeleton is
produced.
- The limbs, mouth, eyes, etc. are moved by the animator using key frames. A frame
can just be a picture/graphic image.
- A start and end of frame is produced.
- Software is used to produce animation between the different frames automatically.
- The differences in appearance between key frames are automatically calculated by
the computer – this is called TWEENING or MORPHING. The animation is finally
RENDERED (i.e. turned into a realistic image).
Page 41 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Computer animation uses a technique called avars (animation variable) which
control all movement of the animated character.
- Finally, surfaces are added requiring a process called rendering (i.e. turned into a
realistic image).
- avars can be set manually using a joystick. Software produces a level of quality for
movie animation that would take many years to produce by hand and would
employ several cartoonists/animators.
- This all saves considerable time and money to the film and television producers.
- Avatars are another example of animation. These are often used to represent
people either in 3-D (as used in computer games) and in 2-D (as used in internet
message boards).
- Some avatars are animated consisting of a sequence of images played one after the
other.
- Ultimately, animators want to create a human image which moves and interacts
with its background in such a way that the viewers can’t tell if a particular scene is
computer generated or produced by real actions in front of an actual movie camera.
- Sounds can be added to the animation to produce advertisements, cartoons and
films.
- Computers with large hard disk and powerful processors are needed, as well as
high resolution monitors
- Special effects in many modern films (televisions) all use computer animation to
produce fantasy worlds.
-
Benefits of using computers in film and animation
Computer software helps produce realism
Speeds up or simplifies editing process
Removes need for several artists to draw the animations
Use of tweening speeds up the process
Reference to avatars
Reference to rendering
Page 42 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- barcode reader (automatically enter details of goods purchased into the
computer by scanning them),
- keyboard (manually typing in product code if the barcode reader fails to do
so),
- mouse (selecting item by clicking)
- touch screen: for selecting menu and entering data into the computer
- swiping machine: for entering PIN and swiping debit cards
(b) Output Devices:
- printer (producing receipts),
- monitor (VDU) -displays item details and items that are being purchased by
the client, amount paid and change
The POS terminals can also be connected to the main server in banks like CABS,
Barclays, etc. This enables customers to purchase goods electronically without the
burden of carrying cash around. This is called Electronic Funds Transfer at Point of
Sale (EFTPOS). Customers can also be given cash back at the EFTPOS after
purchasing goods using debit cards.
After purchasing the goods, a receipt is produced. The receipt will have the following
details:
- date of purchase,
Page 43 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- time purchased,
- shop attendant,
- item (s) bought,
- quantity bought,
- unit price,
- total price,
- amount tendered,
- change,
- cashier name
- etc.
NB. The system updates the master file when an item is sold. It first searches the
master file. Using the barcode number (or product code) it decrease the number in
stock and increase the quantity sold
*NB: POS –Point of Sale terminal: the point where customers pay for goods
purchased in shops, either by cash or otherwise.
Page 44 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
use of scanners and barcodes (and use of keyboard) and has an added feature of
allowing customers to transfer money from one account to another, usually to the
account of the shop where the goods are being bought. Customers can also get cash-
back at the EFTPOS terminal in shops.
LOGIC GATES
- A logic gate is a device that produces signals of 1 or 0 when the input logic
requirements are met and are used in manipulating binary information.
- A logic gate is a device (or electrical circuit) that performs one or more logical
operations on one or more input signals.
- Its output represent Boolean (T or F) or binary values (1 or 0) as voltages.
- Logic gates are the building blocks of digital technology.
- They can be used in applications like:
Building computer chips
Programming traffic signals
Chips for automatic alarm systems
Chips for automated control systems
- Electronic circuits operate using binary logic gates.
- Logic gates process signals which represent TRUE or FALSE, ON or OFF , 1 or 0
(a) OR gate
(b) AND gate
(c) NOT gate
(d) NOR gate
(e) NAND gate
Logic gates are used with truth tables.
A truth table is a table which shows how a logic circuit's output responds to
various combinations of the inputs, using logic 1 for true and logic 0 for false.
A truth table is a table that describes the behaviour of a logic gate.
It lists the value of the output for every possible combination of the inputs
Truth tables contains 1s and 0s and are an integral part of logic gates
functionality.
Truth table and logic gates use the following:
- 1 (True, ON, Not False)
- 0 (False, OFF, Not True)
Page 45 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
The number of rows in a truth table shows the number of combinations of the
inputs of a particular circuit. The number of rows for each gate is found using the
following formulae: rows = 2n , n being the number of inputs in the gate or circuit.
For example, a gate or circuit has the following rows corresponding to the number
of input (excluding column headings):
- 1 input = 21 = 2 rows
- 2 inputs = 22 = 4 rows
- 3 inputs = 23 = 8 rows
- …..
Graphical Representation of Gates and their Truth Tables
Each logic gate has its own unique graphical representation, which can be in general
form or in standard form.
The name inside the gate gives us the type of the gate
(a) OR gate
This represents two inputs entering the gate and one output from the gate. The
inputs can be represented by any alphabetic characters, e.g. A and B, while the
output can be X, given as follows:
- X= A OR B
- The output (X) is true if the INPUT A OR INPUT B are true.
Page 46 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Thus if any one of the inputs is 1, the output is automatically 1
- Output only becomes 0 if all inputs are 0
The output (X) is only true if the INPUT A AND INPUT B are both true. If any one of
the inputs is 0, then the output becomes 0 also. Thus X = A AND B.
The NOT gate has only one input and one output. The input is negated. Thus if input is
1, output is 0, and vice versa.
Page 47 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Standard Form General Form
This is an AND gate with the output X inverted. The output is true if INPUT A AND
INPUT B are NOT both True. It translates to NOT (A and B)
A combination of logic gates, which may be different, gives a logic circuit as given
below:
Boolean Expressions
Boolean Expressions are equivalent expressions of the logic state of gates. For
example, the Boolean expression for:
NAND and NOR gates are known as universal gates because they are inexpensive to
manufacture and any Boolean function (AND, OR, NOT) can be constructed using only
NAND or only NOR gates. Even NAND and NOR gates can be used as each other’s
alternatives in a circuit.
Page 48 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Expressions using mathematical symbols can be used to represent logic gates. One
may be required to draw logic gates using such mathematical expressions Such
symbols and their meaning are as given below:
2. Multiplication Sign
- This represents an AND gate
- E.g C = AB,
- C = AxB,
- C = A.B
- C= (AB)(AC)
- C = (A.B).(A.C)
- All these are various versions of the AND gate.
A steel rolling mill is to be controlled by a logic network made up of AND, OR and NOT
gates only. The mill receives a stop signal (i.e. S = 1) depending on the following input
bits:
Either: Length, L > 100 metres and Velocity, V < =10 m/s
Draw a logic network and truth table to show all the possible situations when the stop
signal could be received.
Answer
Page 49 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- The first statement can be re-written as: (L = 1 AND V = NOT 1) since Length >
100 metres corresponds to a binary value of 1 and Velocity <=10 m/s corresponds
to a binary value of 0 (i.e. NOT 1).
- The second statement can be written as (T = NOT 1 AND V = 1)
- Both these statements are joined together by OR which gives us the logic
statement: if (L = 1 AND V = NOT 1) OR (T = NOT 1 AND V = 1) then S = 1
- The above statement can be written as: S = 1 if (L = 1 AND V = NOT 1) OR (T = NOT
1 AND V = 1)
NB: the Student should first of all write the following logic statement before
coming up with a truth table or logic circuit as this has some marks awarded to
it., i.e.
- Using the logic statement above, one can now draw the logic circuit as given below:
- One can now draw the truth table, basing from the logic statement in Step 1.
Questions
1. A computer will only operate if three switches P, S and T are correctly set. An
output signal (X = 1) will occur if R and S are both ON or if R is OFF and S and T are
ON. Design a logic network and draw the truth table for this network.
2. A traffic signal system will only operate if it receives an output signal (D = 1).
This can only occur if:
Either (a) signal A is red (i.e. A = 0)
Or (b) signal A is green (i.e. A = 1) and signals B and C are both red (i.e. B
and C are both 0)
Page 50 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Design a logic network and draw a truth table for the above system.
3. A chemical plant gives out a warning signal (W = 1) when the process goes wrong. A
logic network is used to provide input and to decide whether or not W = 1
Draw a logic network and truth table to show all the possible situations when the
warning signal could be received
4. A power station has a safety system based on three inputs to a logic network. A
warning signal (S = 1) is produced when certain conditions occur based on these 3
inputs:
Or (b) Temperature <= 120C and (Pressure > 10 bar or Cooling Water < 100 l/hr)
Draw a logic network and truth table to show all the possible situations when the
warning signal could be received.
Page 51 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
8. a. Simplify the following logic equations by using the rules of Boolean algebra.
a. A • C + A • B • C
b. (A + B) • (B + Ā)
c. A • (Ā + C) + C
b. For each of the previous questions, create a circuit for the Boolean expression
before simplification.
CAM(COMPUTER-AIDED MANUFACTURE)
This is automated manufacturing process where computers are used to regulate
(control) and monitor the production process in industries.
CAM uses some industrial robots or computer-controlled sensors for detecting:
Excessive heat
Faults
Acceleration forces
CAM works well with CAD systems. Machinery is programmed automatically
A real CAD/CAM system enables any engineering component to be designed and
manufactured using numerically controlled machine tools. The computer make some
calculations for defining the tool path and generates the instructions necessary to
produce the part. A machine tool such as a lathe is controlled by a computer which
sends it instructions to select tools and to use them to make metal components.
CAM and CAD system systems are integrated. Data from CAD system is converted to a
set of instructions for the processor controlling the CAM equipment. Once a part has
been designed using the CAD software, the other processes are automatic. The
following are involved:
(a) Conversion of data into a set of machine tool instructions;
(b) Operation of the CAM system:
a. Selection of tools, e.g. cutter, drills, etc.
b. Selection of speed e.g. for drills
c. Movement of the tool to machine the part being manufactured.
Page 52 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
CLOSED-CIRCUIT TELEVISION (CCTV)
- Closed-circuit television is the use of one or more video cameras to produce video
signals that are not broadcast, but displayed on a monitor screen. The images may
be recorded.
- The camera may be remotely controlled by an operator or by a computer that
receives data from sensors signalling an event of interest in a particular area.
- The computer’s software could react by tilting and zooming the CCTV camera onto
the area protected by the sensor and starting to record the camera’s video stream.
- Mostly used in shops to record all transactions, e.g. capturing video of customers. It
can be easy to identify shoplifters and thus reducing theft of goods in shops.
- CCTV is now being used even to record street events. This has been triggered by
rise in terrorist activities especially in Western countries and the United States.
COMPUTER NETWORKS
Definition of Terms
a. Network: A connection of computers for them to share data, files and resources
like a printer.
b. Data communication: The process of transferring data through networked
computers
Advantages of Networking
- Expensive peripherals like printers and scanners can be shared between users.
- Messages can be sent easily and faster between users whether on WAN or LAN.
- Avoids duplication of information as users can access the same file on the
network.
- Network software can be purchased cheaply than buying individual packages for
each computer.
- It is possible to access data or programs from any terminal or workstation.
- Data and programs can be stored centrally making it easier to maintain and
backup.
- Users can be easily prevented from accessing files not intended for them.
- Allows sharing of files, software and data held in computers.
- Allows emails to be send between users.
Disadvantages of Networking
- Sophisticated equipment is needed, which may be expensive to buy.
- Security of data can be a problem due to hacking.
- Wiring can be expensive both to buy and to install; wiring can be sunk on the
ground to avoid trailing cables.
- If a server breaks down, the whole network becomes unusable.
- Networks need experienced network managers, who will be highly paid to keep the
network running.
Types of Networks
- Computer networks are grouped into Local Area Networks (LAN) and Wide Area
Networks (WAN).
- However we also have WLAN (Wireless Local Area Networks), MAN
(Metropolitan Area Networks) and PAN (Personal Area Networks); and these
are described below.
Page 53 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
NB: A bridge can also be connected to link a Local Area Network to another network
and is an optional requirement.
However, some networks are now using wireless technology and these are called
Wireless Local Area Networks (WLAN). WLAN uses radio signals and therefore no
cabling is required.
The diagram below shows the structure of a LAN that can be connected to another
network.
Page 54 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
a. Communication software like TCP/IP – Transmission Control Protocol Internet
Protocol. A protocol is a set of rules followed by devices when they are
communicating.
b. Network operating system: manages the network and network devices
A PAN enables user to transfer files from a laptop to a PDA, camera or Personal
Computer.
1. Ring Network:
- Computers are connected together to form a circle and uses a token when
transferring data.
Page 55 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Data/information travels in one direction only.
- Information moves around the ring in sequence from its source to its destination.
- As data passes from one computer to another in the ring, each computer removes
any data relevant to itself and adds any data it wishes to send.
- The diagram below illustrates the physical configuration of a ring network:
2. Star Network:
Computers form a star shape with host computer at the centre.
The Server (host computer) manages all other computers/terminals on the network.
If the terminals are not intelligent, they have to rely on the host computer for
everything.
This network is as shown below:
Page 56 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
3. Mesh Network
- A network in which each computer serves as a relay point for directly sending
information to any other computer on the network.
- No central device oversees a mesh network, and no set route is used to pass data
back and forth between computers.
- Thus, if any one computer is damaged or temporarily unavailable, information is
dynamically rerouted to other computers—a process known as self-healing
Page 57 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Definition of Terms
(a) Bus/Backbone: the dedicated and main cable that connects all workstations and
other computer devices like printers.
(b) Nodes: these are connection points for workstations and the bus.
(c) Terminator: devices that prevent data in the bus from bouncing back, causing
noise and prevents data from getting lost.
Page 58 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Disadvantages of Bus Network
- Computers cannot send data at the same time nor while there is data being
transferred in the bus.
- Can cause collision of data during transmission.
- It is slow in transferring data.
- Its requirements are expensive, that is computers with their own processors and
storage facilities.
- The system will be down if the main cable (bus) is disrupted at any point.
- Less secure.
- Performance worsens as new stations added
NETWORK PROTOCOLS
A protocol is a set of rules that governs how communication between two devices will
occur. Such devices might be computers themselves, between modems.
A network communication protocol: a standard method for transmitting data from
one computer to another across a network. Some of the protocols that we are going to
look at are:
i. TCP/IP (Transmission Control Protocol Internet Protocol)
TCP: It ensures that data is transmitted accurately
IP: It ensures that data is transmitted to its correct address (IP address). Every
device on the internet has its IP address. It also ensures that packets are
rearranged to the original message on arrival of their destination.
ii. HTTP (HyperText Transfer Protocol)
This is a protocol that defines the process of identifying, requesting and
transferring multimedia web pages over the internet. It is used for transferring
data across the internet, usually between servers and computers on the
internet. It is based on the client –server relationship. It uses TCP/IP to
transmit data and messages
Page 59 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
iii. FTP (File Transfer Protocol)
it is a protocol used to transfer data from one computer to another. It is often
used to download software from the internet, and it uses the TCP/IP protocol
in doing this. However, FTP has no security to data as the data is not encrypted
prior to its transmission.
iv. TELNET
This is a network protocol that allows a computer user to gain access to
another computer and use its software and data, usually on a LAN and on the
Internet. It allows users to access data stored on servers from their terminals.
Telnet allows computers to connect to each other and allows sharing of data
and files. Telnet has security problems especially on the internet.
v. VoIP (Voice Over Internet Protocol)
It is a method of using the internet to make ordinary voice telephone calls.
Thus it is a way of having phone conversations using the internet as a way of
communication. By VoIP, international and long distance calls are of the same
price as local calls and sometimes are for free. However, the system does not
offer emergency calls. An example of VoIP is Skype.
Page 60 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Must have good managerial skills.
Must be a problem solver and see problems as challenges.
Must be self-motivated. Must be well disciplined.
Must be able to work under pressure and meet deadlines.
Evaluation
Fact Finding
Implementation
Feasibility Study
Documentation &
User Training
Page 61 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Analysis
Development &
Testing
Design
1. Problem identification/Recognition/Definition/Realisation:
This is where the problems of the current system are stated.
These might have been realised by system users or by managers. The system might be
producing wrong results.
This includes the general statement of the problems being experienced by the system.
i. Interview:
This refers to the face-to-face communication between two or more people in order to
obtain information. Interviews can also be done over the phone but the most common
ones are face to face. Interviews are done when you want to collect information from
a very small population sample.
Advantages of Interviews
The researcher can ask for clarification on some points that may not be clear.
Encourages good rapport between the researcher and the respondent.
Non-verbal gestures like facial expressions can help the researcher to
determine if the respondent is telling the truth.
Information can be collected even from the illiterate since the respondent’s
language could be used.
First-hand information is collected.
The researcher can probe to get more information.
Disadvantages of Interviews
It is impossible to remain anonymous on the part of the interviewee.
Page 62 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
It is expensive since the researcher has to travel to the interview venue.
It is time consuming as more time is spent travelling and carrying out the
interview.
Good interview techniques are required as failure may lead to
disappointments.
Biased information can be given since the respondent may not tell the truth.
iii. Questionnaire:
A document with carefully crafted questions to be answered by the respondent by
filling on the spaces provided. Questionnaires are used when collecting information
from a widely spaced population sample and when collecting information from many
people. A questionnaire contains open-ended and closed questions. Open-ended
questions are gap filling questions which require the respondent to express his or her
own view. Closed questions are guided questions where the respondent just chooses
Yes or No, True or False, or by just putting a tick on given options. Questionnaires can
be distributed personally or by post.
Advantages of questionnaires
Questions are very simple and faster to answer.
It saves time as questionnaires can be distributes and then collected later.
Respondents can fill questionnaires at their own pace.
Give guarantees confidential of information, thereby encouraging respondents
to give accurate information.
They are cheap to use when collecting data from a very large sample
Disadvantages of questionnaires
Some questions are left blank.
Some questionnaires may not be returned at all.
Biased information can be collected as people may lie.
Respondents usually do not fill the correct information.
It is difficult to analyse information collect using questionnaires.
They are expensive to use if the postal system is used.
Abusive information can be filled by respondents.
It is difficult to prepare a good questionnaire
iv. Observations:
Page 63 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
It is a fact finding method that involves viewing the actual system in operation by the
researcher. The researcher can even take part in operating the system. It is used when
the researcher wants to see for himself how the system operates.
Advantages of observations
First-hand information is collected.
Accurate information can be obtained.
Areas of interest can be observed.
The researcher can take part in operating the system thereby getting insight on
how the system operates.
the analyst obtains reliable data
it is possible to see exactly what is being done
Disadvantages of observations
People work differently if they feel that they are being observed, therefore
inaccurate information can be collected.
The researcher may not understand some of the activities being observed.
It is time consuming to collect the required information.
The researcher may interrupt some of the activities being done.
if workers perform tasks that violate standard procedures, they may not do
this when being watched!!
3. Feasibility Study:
It involves an evaluation of proposals to determine if it possible to construct a new
system or just modification of the existing one. Feasibility can be measured by making
the following considerations:
Economic feasibility: determining whether the benefits of the new system will out-
weigh the estimated cost involved in developing, purchasing, assembling
requirements, installing and maintenance of the new system. The cost-benefits
analysis is carried out. Benefits can be tangible and quantifiable, e.g. profits in terms
of monetary values, fewer processing errors, increased production, increased
response time, etc. Other benefits are intangible, e.g. improved customer goodwill,
employee moral, job satisfaction, better service to the community, etc.
Technical feasibility: determines if the organisation can obtain software, equipment
and personnel to develop, install and operate the system and even to maintain it.
Social feasibility: a measure of the system’s acceptance by the general public; if it
will meet the norms and values of the society.
Legal feasibility: This is determining if the system can conform to the laws and
statutes of the country. This is done by considering government legislation, e.g. Data
processing system must comply with the local Data Protection Acts
Operational feasibility: determines whether the current work practices and
procedures are adequate to support the system, e.g. effects on social lives of those
affected by the system, can it work well with existing hardware, etc
Operational feasibility assessment focuses on the degree to which the proposed
system fits in with the existing business environment and objectives with regard to
development schedule, delivery date, corporate culture, and existing business
processes
After carrying out the feasibility study, a feasibility study report must be produced
and it contains the following information:
- A brief description of the business.
- Advantages and problems of the existing system.
- Objectives of the new system.
Page 64 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Evaluation of the alternative solutions.
- Development timetable.
- Management summary.
- Terms of reference.
- Proposed solution.
4. Analysis stage:
This is the in-depth study of the system to determine how data flows within the
system.
Analysis tools used includes:
- Decision trees
- Decision tables
It involves use of flowcharts, data flow diagrams, structure diagrams, decision trees,
and others, to describe the operations of the system in detail. The analysis stage
determines whether computerisation will take place or not. The analysis stage also
specifies the hardware and software requirements of the new/proposed system, the
advantages and disadvantages of the proposed solution, etc.
Analysis stage also involves identification of the following:
- Alternative solutions: other solutions, not considering the chosen one
- Specification requirements: other system requirements like hardware,
software, personnel, etc
- Carrying out the Cost-benefit analysis: weighing out costs of developing the
new system versus the benefits that will be realised.
Dataflow Diagrams
These are diagrams that show how data moves between external sources, through
processes and data stores of a particular system. Dataflow diagrams use the following
symbols:
5. Design Stage:
This stage is concerned with the design of the new computer based solution as
specified by the analysis stage. Design stage involves:
Input Design: includes designing of data entry forms, input methods (e.g. by filling
forms, use of barcodes, etc) and the user interface.
Output Design: Includes design of reports, data output formats, screen displays and
other printed documents like receipts, etc
File design: Involves designing tables/files, records and validation rules. It also
involves determining how data is to be stored and accessed, the media to be used for
Page 65 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
storage and the mode of file organisation. Fields in each files ca be designed, their
length and data type, e.g.
File Structure:
The computer environment is prepared, the programs to be written are done and they
are tested to determine if the run as expected.
Computer environment being prepared: electrical wires, network cables are installed,
furniture, air conditioning are in place. The computers are installed and tested.
It also involves the construction and assembling of the technical components that are
needed for the new system to operate. This includes preparation of the computer
Page 66 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
room environment, coding of the computer program using a specific programming
language, testing of the coded program,
Testing strategies
- standard (normal) data testing: testing of data within the given range
(should be accepted)
- abnormal data testing: testing of data outside the given range (should be
rejected). It gives an error message when entered into the computer system.
- extreme (boundary) data testing: testing of the minimum and maximum
values in the given range (should be accepted)
(a) User Documentation: It is a manual that guides system users on how to load,
operate, navigate and exit a program (system). User documentation contains the
following:
System/program name.
Storage location.
System password.
Instruction on how to install the program.
Instruction on how to operate the system: e.g.
o How to quit the program
o how to load/run the software
o how to save files
o how to do print outs
o how to sort data
o how to do a search
o how to add, delete or amend records
o print layouts (output)
o screen layouts (input)
o the purpose of the system/program/software package
o error handling/meaning of errors
o troubleshooting guide/help lines/FAQs
o how to log in/log out
(b) Technical Documentation: This is a manual for programmers which aid them in
modifying the system and in correcting program errors. The following are found in
technical documentation:
Algorithms of the program,
Program testing procedures and test data,
Sample of expected system results,
Program structure showing modules and their relationships,
System flowcharts,
Programming language used,
Program code,
program listings,
File structures.
Validation rules
Page 67 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Output formats
Bugs in the system
Hardware requirements
Software requirements
User Training:
Once a new system is put in place, existing employees are trained on how to operate
the new system, otherwise new employees are recruited. Users are trained on how to
enter data, search records, edit fields, produce reports, handling errors, etc.
User training can be in the following forms:
i. On the job training: Users are trained at their organisation by hired trainers. This
has the following advantages:
Learners practice with actual equipment and the environment of the job.
Learners can engage in productive practices while on training.
This is cheaper for the organisation.
Enough practice (experience) is gained on how to operate the system.
Production does not stop
ii. Classroom training: Users are send to other colleges and institutions which offer
courses on the subject matter. This could be expensive to organisations since
employees take study leave while being paid at the same time. Employees can also be
trained on aspects that they will not apply when they finish the course. The gap
between what is learnt and what is needed at the job may be too wide.
a. Parallel Run: This involves using of both the old and new system concurrently
until the new system proves to be efficient. It involves operating the new and old
systems simultaneously until management is confident that the new system will
Page 68 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
perform satisfactorily. Other workers will be using the old system while others use
the old system but doing the same type of job.
Advantages of parallel run
Results for both systems are compared for accuracy and consistency.
If the new system develops problems, it will be easier to revert to the old one.
There is enough time given to determine if the new system produces expected
results.
Employees have enough time to familiarise with the new system.
ii. Abrupt (Direct) changeover: Involves stopping using the old system on a certain
day and the new system takes over on the next morning. This is suitable for control
systems like in chemical plants and for traffic lights.
Advantages of Direct Changeover
Reduces cost as of running two systems at the same time.
Faster and more efficient to implement.
There is minimum duplication of tasks.
Enough resources can be allocated to make sure that the new system operates
successfully.
iii. Phased / Partial conversion: This is whereby the old system is gradually
removed while the new system is gradually moved in at the same time. This can be
done by computerising only one department in an organisation this month, then the
next department in two months’ time, and so on until the whole system is
computerised.
iv. Pilot conversion: This is whereby a program is tested in one organisation (or
department), and is applied to the whole organisation if it passes the pilot stage. It
serves as a model for other departments. A pilot program can then be applied in
phases, directly or using the parallel run method.
NB: before making system live, the following must have taken place:
- Production of user documentation and technical documentation
- Installation of hardware and software
- fully testing the new system
Page 69 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- training the staff to use the new system
9. Maintenance/review/evaluation Stage:
This stage is concerned with making upgrades and repairs to an already existing
system. Certain sections of the system will be modified with time.
Maintenance can be to Perfect the system, to Correct some errors or to make it
adapt to changing needs, e.g change in government laws. Maintenance involves the
following:
update hardware as new items come on the market or the company changes in
any way which requires new devices to be added/updated
update software if necessary if company structure changes or legislation is
introduced which affects how the company operates
Page 70 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
they are a general overview. It shows the overview of the system, tasks carried out by
the system, whether manual or computer, devices, output media and files used, etc.
Common symbols for designing systems flowcharts are as follows:
*NB: Meanings of these symbols are not universal and mean a different thing to
others. Some symbols are borrowed from program flowcharts.
Page 71 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Below is a systems flowchart for a payroll Below is a systems flowchart that is used
processing system that uses batch to update a stock master file when stock
processing items are purchased.
Review Questions
1. (a) A systems analyst was brought in to computerise a paper -based car sales
system. What methods could be used to gather data about the existing system?
Give reasons for your choice.
(b) What would need to be done before the new computerised system become
‘Live’?
(c) Why would PILOT and PARALLEL change over methods be suitable in this
application?
2. A program is written to input daily temperatures. Name three types of test
data that could be used. Give examples of each type of test data which could be
used and discuss the outputs you would expect to get.
3. Name five tasks that would be carried out at the DESIGN stage in systems
analysis.
4. Name four methods used to change over from a manual system to a new
computerised system. Discuss the relative advantages and disadvantages of
these four methods.
5. Describe how the effectiveness of a new computer system can be assessed
6. What tools exist to help the analyst draw up an action plan and ensure that the
project is completed on time and to budget?
7. What information would a systems analyst need to gather to decide on what
hardware is required for a new computerised system?
8. State 5 items that need to be included in the User guide and 5 items of the
technical guide of a newly developed computer system.
9. Choose 6 symbols used in systems flowcharts and explain what each means.
Page 72 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Data capturing can be either automatic or manual.
Manual methods are slow in entering data and are also prone to errors, e.g. typing 2.3
instead of 3.2. Manual data capturing techniques includes the following:
- keyboards/keypads to type in data
- touch screens to select data/options
Automatic data capturing techniques are more accurate and faster but are more
expensive and involves use of the following:
(a) Data logging: this technique involves collecting data automatically using
sensors; mostly used when doing scientific experiments or monitoring a
control system
(b) Barcode readers: these take data from printed barcodes and allow automatic
stock control in, for example, supermarkets.
(c) Radio Frequency Identification (RFID): this method involves using small
electronic devices containing a microchip and antenna; they work in a
similar way to bar codes but can be read from a distance of 5 metres; often
used to track livestock, vehicles, library books and goods sold in shops.
(d) Biometrics: this involves obtaining data and identifying characteristics
automatically in security systems e.g. use of finger prints, palm prints, facial
images and iris prints
(e) Magnetic Strips: these contain information/data stored on magnetic material
often on the back of a credit/debit card; the information is automatically
read by swiping the magnetic stripe past a reading head (reading device).
(f) Optical character recognition (OCR): information on paper is automatically
read by a scanner and is then analysed/processed by OCR software and
stored in an electronic format.
(g) Voice recognition: these systems recognise spoken words e.g. for disabled
people who can’t use keyboards where they speak commands instead of
having to type
(h) Smart cards: these contain embedded microchips and receive power from the
card readers; the microchip is made up of RAM, ROM and 16-bit processor
and the stored data is automatically read by the card reader; used in credit
cards, security cards, loyalty cards, etc.
(i) Optical Mark Recognition (OMR): OMR technology scans a printed form and
reads pre-defined positions (where specific fields have been filled in e.g.
●─● or ▄); the system records where marks have been made so can
automatically determine responses to, for example, a questionnaire.
Types of Errors
1. Transcription Errors: These are mistakes due to misreading or mistyping of data,
e.g., confusing the number 5 with the letter S, 0 (zero) instead of the letter O, etc. This
can also be caused by bad handwriting.
2. Transposition Errors: These are mistakes caused by swapping 2 letters or digits,
e.g. typing ‘ot’ instead of ‘to’, 5721 instead of 7521. Transposition errors occur mostly
when typing at very high speeds.
Page 73 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Avoiding Data Entry Errors
The following procedures can be used to avoid / reduce data entry errors:
1. Verification: Involves checking whether what has been entered into the computer
is similar to what is on the input document. Also done data is copied from one
medium to another, e.g. from paper to disk. Verification is done manually by the user
of the computer. Verification is carried out to determine errors that cannot be
detected by the computer.
NB:-Verification can also be used to determine if data has been correctly transferred
from one place to other(e.g. between devices or on a network).
Verification can be done in the following forms:
(a) Double entry:
In this method, data is entered twice (using two different people); the data is
only accepted if both versions are similar.
Double entry is often used to verify passwords by asking them to be typed in
again by the same person twice.
(b) Visual Checking
This is checking for errors by comparing entered data with the original
document (NOTE: this is not the same as proof reading!!). If the entered data is
similar with the source document, then it has been entered correctly.
(c) Parity Checking
This is used in determining whether data has been correctly transmitted between
computer devices or on a network. It uses parity bits to verify correctness of
transmitted data.
Parity Bits: A parity bit is an extra bit (1 or 0) that is appended to the left of a
byte to make it even or odd depending on the method of parity checking being
used. It is used in checking for errors in a group of bits transferred within or
between computers. Parity bits are also used to determine if a block of data has
been correctly transmitted over a communication channel. It works in the
following way:
Using Odd Parity: The letter C is transmitted as 1000011. Since there are
three 1s in this byte, a 0 is added to the left so that the total for 1s is odd, thus
making it 01000011. The first 0 (underlined) is used as the parity bit.
Using even parity: In even parity, a 1 would be appended to the left of the
byte so that the total number of ones is even, thus making it 1 1000011
Page 74 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
and you enter 51, the computer should automatically reject this since it lies outside
the required range.
(c) Limit Check: this is similar to a range check except only ONE of the limits
(boundaries) is checked e.g. input data must be > 10.
(d) Presence checks: check that data is actually present and not missed out e.g. in
Student form, somebody’s Student Surname may been left out yet it is a required field
name. The computer does not allow the user to continue until an entry has been made
in a required field name.
(e) Length checks: These are validation checks used to determine if data entered is of
the required number of characters. For example, if a student number has 5 digits, the
computer should reject if a number with 4 or less digits or even more digits is
entered.
(f) Format Check: this checks that data is in a specified format (template) e.g. date
should be in the form dd/mm/yyyy.
(g) Consistence (Cross Field) Check: this checks if fields correspond with the other,
e.g. if one enters ‘MR’ on Title field, the Sex field must contain ‘Male’ or ‘M’. If one
enters the title as Mr and then on sex enters Female, there is no correspondence on
the two fields and therefore the computer must reject this.
(h) Spell Checkers: These are validation checks that determine if accurate text has
been entered especially in word processing. Spell checkers use custom dictionaries to
check spelling mistakes in documents. If a word is typed in, it is checked if it is in the
custom dictionary, if not, it is treated as an error. Spell checkers cannot be used in
case of names of people, places, computer jargon, new slang words, etc.
(i) Control Total: this is a meaningful total obtained by adding together all data in a
table, e.g. prices of goods to give a total. If the total does not tally, then other elements
may have been left out. This total is meaningful since it may be used to deduce if the
organisation is making profit or not.
(j) Hash Total: It is a meaningless total, obtained by adding together all digits in a
field like serial numbers of a product to give a total that is used for validation
purposes only. The total obtained is not, and cannot be used to deduce any other
meaning. Thus in this case, the total obtained by adding product serial numbers
cannot be used for any other purpose.
(k) Check Sum: A validation check of adding together the digits in a block to give a
number that will be transmitted together with the data. It is used to check whether
errors have occurred in transmission or storage. Checksum can also imply hash total
and control total.
(l) Data Type check: This is used to check if data entered is of the correct data type.
For example, Quantity of Items bought is an integer data type, therefore it must
reject fractions. Thus the correct data type is considered in this situation. Data types
includes Boolean, integers, char, etc.
(m) Check Digits: A check digit is an extra digit appended to the right -end of an
original number for error checking purposes and is calculated from the original block
of data using modulus 11.
*NB: - Check digits are used where data is entered automatically as in using
barcode readers and are important for checking for transposition errors
(swapped digits)
Page 75 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
We have 9 digits. Working from the right, the first digit is multiplied by 2, second
number by 3, third number by 4 and so on. We start at 2 because position 1 is for the
check digit. The results are added together, e.g.
(1x10) + (5x9) + (1x8) + (2x7) + (1x6) + (1x5) + (3x4) + (2x3) + (3x2) = 112
The total (112) is divided by 11 and the remainder is noted; e.g., 112 divided by 11 =
10 remainder 2.
The remainder is subtracted from 11 to give the check digit: 11 – 2 = 9
9 becomes the check digit. Therefore the number will be transmitted as 1512113239
*NB: -
(1) If the check digit found is 10, an X is used as the check digit.
(2) If, upon dividing the total by 11 and the remainder is 0, then 0 is the check digit.
This is obtained as, 11-0=11. Divide 11 by 11 and take the remainder, which is 1
remainder 0, thus 0 becomes the check digit.
(3) Check digits are used to detect where digits have been swapped
- Allocate weights for digits from right going to the left, starting as 2.
- Multiply each digit with its weight and add them.
- Divide the total by its modulus (11 in our case) and get the remainder.
- Subtract the remainder from the modulus (11)
- The result will be the check digit.
- However, some authors go further by saying that, divide the answer (obtained
after subtracting from 11) by its modulus (11) and take the remainder. The
remainder is the check digit.
(1). Remove the given check digit, calculate your own check digit. If they are
similar, then the check digit is correct. If they are not similar, then the given check
digit is wrong.
(2) Re-calculate without removing the given check digit using the example given
below:
Example:
Here, the check digit is on position 1. So the numbers and their positions is as
follows:
Position 10 9 8 7 6 5 4 3 2 1
Digit 0 1 3 1 5 2 4 4 7 X
Multiply each digit with its position and add the results, thus giving:
(10x0)+(9x1)+(8x3)+(7x1)+(6x5)+(5x2)+(4x4)+(3x4)+(2x7)+(1x10) = 132
Divide 132 by modulus (11) and get the remainder. This gives us 12 remainder 0.
Page 76 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Therefore the check digit is correct.
NB: If the remainder obtained is 0, then the check digit is correct, if not, then the
check digit is wrong.
Questions
SOFTWARE
Software refers to a set of instructions written in computer language that tell a
computer to perform a specific task, like adding a set of numbers. Without software, a
Page 77 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
computer will be useless. Software is grouped into systems software and
application software. The diagram below illustrates branches/groups of software:
Systems Software: Refers to programs that control and manages the performance of
all computer systems. Systems software comprises of: (a) operating systems (b)
Utility programs (c) Translators (d) Device drivers
1) Operating System: - refers to the programs that supervise, control and manage
the performance of the computer hardware and software in accordance with set
objectives, for example, Windows 7. Examples of operating systems include: Windows
95/98/2000/XP/ VISTA/ Windows 7/Windows 8, Microsoft Disk Operating System
(MS-DOS), Unix, Linux, OS/2, Ubuntu, etc.
The operating system is loaded onto the computer by the bootstrap loader. Programs
stored on ROM chip runs first and this checks if all hardware components are working
normally. It also checks the CPU and the Basic Input output System (BIOS) for errors.
If there are no errors, the BIOS will activate the disc drive. The operating system is
then found and the computer can boot. Booting refers to the process of loading the
Operating system into memory so that it takes control over hardware and software
resources of the computer.
Page 78 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
NB: Household equipment like refrigerator do not have an operating system since the
processor has one task to perform, no multiple devices and tasks to handle, hence
they are cheap.
*NB: Response time – the time that elapses from the moment an instruction is given
to the computer and the time that instruction is carried out.
Turn around time – the time taken from the moment a document is produced by a
computer and the moment it is used as an input document to that computer again.
NB. Most operating systems are written in low level language. This is for them to
quickly coordinate computer activities since they will not be converted as they are
already in machine language or less time is needed for conversion if the operating
system is written in assembly language. The following must be considered when
buying an operating system:
- Hardware type and computer design e.g. windows operating system works
well on IBM compatible machines.
- Applications intended for the computer e.g. accounting, stock taking, etc.
- Method of communicating with the computer, that is, use of few or many
peripherals and terminals.
- Method of operating the computer e.g. multi-access, multi-programming, etc
Page 79 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
2. Time sharing operating systems: This type of operating system allows many
users to use the same processor at a time, using the round robin method by use of
time slices. In Round Robin, each user is given a fraction of a second (time slice) to use
the processor so that all users seem not to be sharing the processor.
*NB: - Time slice: A brief period of time during which a particular task (or computer)
is given control of the microprocessor in a time-sharing multitasking environment. A
computer's processor is allocated to an application, usually measured in milliseconds.
Time slice is also called quantum.
Multitasking: It is the concurrent execution of two or more programs on the same
computer by use of time slices, doing the same job. For example, copying a graph from
Microsoft Excel to Microsoft Word. Thus the two programs will be running
concurrently, doing a related or same job.
3. Multi Access / Multi user operating systems: It is when many online users access
one processor at the same time to make use of multi-programming.
5. Multiprocessing: A type of operating system that allows one computer to have two
or more processors but sharing the same memory, e.g. dual core computers.
6. Batch Processing System: - A system in which data is collected over a long period
of time, put in groups and processed at one go, without user interaction from start to
finish, as in payroll processing. Jobs can be entered at a remote terminal, that is, on a
terminal far away from the host computer. Thus batch processing promotes Remote
Job Entry (RJE): which is the entering of data into the computer through a terminal
far away from the host computer.
- For instance, a central computer can process batches of cheques collected from
different branches, mostly during the night. If there are errors, the results will also be
wrong. Batch processing is very cheap to operate and easy to run. Users can also
perform some other tasks while batch processing takes place.
- In batch processing, there is minimum or no human intervention during data
processing period. It is used where large amounts of data is processed and where
processing does not need to be done immediately, e.g. in Payroll processing, water
billing, electricity billing, telephone billing, clearance of cheques, etc).
Payroll Processing
These calculate wages and print payslips. It h the following inputs, processes and
outputs:
Inputs: employee details (rate of pay, tax code, bank name, bank account number,
etc), number of hours worked, over time, etc.
Processing: Calculation of Gross Salary, Net Salary, deductions, updating master file,
etc.
Outputs: printed payslips, updated master file, transfer to bank account, etc.
Billing systems
Used to create bills and invoices to customers. It has the following inputs, processing
and outputs:
Page 80 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Inputs: customer details (names, address, account numbers, etc), charge, previous
readings, new readings, bank account details, etc
Processing: calculating the of number of total units, total cost, monthly payments
made, outstanding amount, etc.
Output: printed bill showing all details, updated customer file, etc.
b. Translators: - These are programs that convert source code to object code.
Translators are in three forms, which are interpreters , assemblers and compilers.
These will be covered in more detail under Programming Languages.
c. Utility Programs:
These are programs used to perform specific, useful and frequently needed task in a
computer system. They usually have one single task to perform on the computer
system. Utilities include the following:
i. Virus Scan Utility: These are programs that protect computers from virus attacks,
for example Norton Antivirus, AVG, Avast, Esat NOD32, MacAfee, etc.
ii. Sort Utilities: These are programs used to arrange data, files and records into a
specific ordered sequence, for instance in ascending or descending order of a given
key.
iii. Debuggers: These are utilities used for assisting in correcting errors in programs.
iv. Dump Utilities: These are programs that assist in copying data from main storage
to output devices and to other storage devices like the hard drive.
v. Editors: These are programs used to make changes to data already held in the
computer.
vi. Peripheral Transfer Utility: These are programs used to transfer data from one
peripheral device to another.
vii. System Status Utilities: These are programs that provide information on the
state of files, memory, users and peripherals.
viii. File Maintenance Utilities: These are programs used to reorganise programs
and to update them.
Page 81 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
(d) Device Drivers: Programs that allows a device, e.g. printer to work on a given
operating system/computer.
APPLICATION SOFTWARE
This refers to programs and their documentation, designed to perform a specific task
for the user in daily life, like payroll processing, word processing, etc.
Integrated Package (Application suite) - a collection of application programs
purchased as one package, for example Microsoft Office 2010. It is a collection of a
word processor, spreadsheet, database and presentation packages bought as one
package, for example, Microsoft Office 2010.
Page 82 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- It is easy to share files produced by the software with others as chances are
they also have the software available to open the file
- sharing of files with other packages is usually easier since they are likely to be
compatible (e.g. Excel and Word)
Page 83 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Off - the - self software is cheaper to buy while tailor-made software is
expensive.
- Off-the-Shelf software has been tried and tested hence free from errors while
tailor-made software may have some errors.
- Off-the-Shelf software is easier and faster to implement while tailor made
software takes long to implement.
- Off-the-Shelf software is used by many organisations; therefore users can
share information on its usage while tailor-made software is only used by one
organisation.
- Off-the-Shelf software has regular updates available for download on the
internet while tailor-made software does not.
Page 84 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- word wrap (e.g. auto adjust a line to fit into paragraph alignment such as straight
- file management (create/delete/move/search for files)
- headers and footers and the automatic numbering of pages
- graphics (embed drawings and graphs into the document)
- use macros
- merge (merge text files from one file into another e.g. mail merge)
- ability to send documents to a printer
- carry out a word count on the document
- add and manipulate tables in the main body of the document
- windows (edit 2 or more documents at the same time)
- WYSIWYG (what you see is what you get) – preview document to see how it will
look when printed
- spell checkers, language check and thesaurus
- Simple translation from one language to another; for example, from English to
French.
*NB: Editing: the process of correcting mistakes in a document, for example, spelling
mistakes.
Formatting: making a document look more attractive by bolding, underlining,
inserting borders, etc
Page 85 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- a cell may contain a label (text entry such as Surname, Date Of Birth,..) or a
value (which can be a number, a date, a formula, result of a calculation, or
currency)
- the cursor identifies the current cell selected; it is possible to click on to a cell
and a “+” sign appears in the bottom right hand corner; by dragging the
formula down it is possible to replicate it in other cells
- etc……
3. Presentation Packages:
- These are programs used for designing slides for a presentation to an
audience, for example Microsoft Office PowerPoint, Lotus Smart Suite, etc.
- Presentation packages include text, pictures, sound, animation, graphics and
tables, thus being multimedia.
- Presentations are colourful and attractive.
- Speakers and projectors are needed.
- Presentation packages have the following features:
Have Clip art. Can accommodate images and graphics.
Can use sound, video and animation.
Incorporate Word Art.
Have facility to insert charts and graphs.
*NB: Animation: - Creating illusion of moving sequence using a series of still images
as done in movies and cartoons.
Properties/features of databases
Most database packages have the following features:
(a) Tables: These are equivalent to files and therefore are used to store data. The
data is stored in rows and columns. Each row in a table is called a record
which is made up of a number of fields (columns in the table). The data type
in the fields is usually either text, numeric or date/time. Most databases
contain a number of tables which are usually linked together in some way.
(b) Forms: Forms are commonly called data entry screens since they are the user
interface which allows data in the tables to be viewed, entered or edited.
Forms permit the control of how other users interact with the information
in the database e.g. only allow certain fields to be seen or only allow certain
Page 86 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
operations to be carried out . This subsequently helps the protection of the
information and also ensures it is entered correctly
(c) Reports: Reports are produced as a result of questions such as
“date>=01/01/1975”. The data on report is extracted from queries or
tables as per user requirement. They display certain required data as
needed by the user, e.g. after searching or filtering of data. Reports can be
printed out as hardcopy, or viewed on the screen or exported (e.g. to a
word processor, an email message, etc.).
(d) Queries: Queries are questions that request certain data from tables, e.g,
Amount <200. It can also be an instruction to search data which meets a
certain criteria from table and display it on the screen in form of another
table created from the original table. Most commonly allow information to
be retrieved from tables. They also allow filtering so only the records
required are seen.
(e) Macros
A macro is a name or key that represents a series of commands or key
strokes. Many applications allow single word or single nominated key on a
keyboard to perform a whole series of actions. Macros can be either written
as required and then stored or stored in a library for future use. Macros can
be very sophisticated and save the operator a lot of time. For example, the
name and address in a word processor could be set up by pressing key F1
and the system brings information from a related database
5. Graphics Packages: Refers to programs used to create and edit graphs, diagrams,
drawings, charts and plans for buildings, for example Microsoft Paint, Harvard
Graphics, Corel Draw, Real Draw, etc. Computer graphics are images designed for
logos, commercial and news inserts during television advertisements or transmission.
Page 87 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
(b) High Resolution Monitor with graphics capabilities: - For viewing publication
during design stage.
(c) Colour Printer: For printing high quality and colourful documents.
(d) Digital camera/webcam/cell-phone with a camera: - for taking and storage of
photographs that will be incorporated into the computer.
(e) Keyboard: For typing in text
(f) Mouse: - For adjusting size of pictures and for drawing purposes.
(g) Desktop Publishing (DTP) software.
(9) Web Browsers: Software used to open web pages on the internet, examples are:
Mozilla Firefox, Microsoft Internet Explorer, Safari, Opera, etc.
(10) Search Engines: These are packages used for searching data for the user from
the internet, e.g. google, yahoo, etc.
*NB: - Specialist Packages for Business: These are packages for use in a specific
business environment, for example, Pastel for accounting purposes.
*NB: - Install: - to add programs to the computer. Therefore to uninstall is to remove
programs from the computer.
Page 88 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Application intended for.
- Easiness of installation.
- Mode of processing (single user, multi user, etc).
- User friendliness.
- Availability of support personnel.
- Availability, readability and clarity of documentation.
- Memory requirements.
- Hardware requirements.
TYPES OF SYSTEMS
1. Real Time Processing System: - An online system in which individual, discrete
transactions are processed as they occur to influence the activity currently taking
place, as in airline reservation. Results of the process are produced immediately. The
system response quickly and give feedback of a request. Thus the system is interactive
in nature. Such systems include airline reservation systems, hotel reservations, stock
control, etc.
Real Time Processing System can also be called Transaction Processing System
(or Real Time Transaction Processing Systems): this is a real-time (or pseudo-real-
time) transaction processing system whereby only individual items of data need
immediate processing, results and files are updated instantly e.g., airline reservation,
balance enquiry at an ATM, etc. Response to a query needs to be very fast and once a
seat is booked it needs to marked as “not available” immediately to avoid any risk of
double booking.
Using this example of booking seats on a flight, the following sequence of events
would take place:
- customer/travel agent contacts the airline
- the customer/travel agents types in the day/time of flight and number of
travellers
- the customer/travel agent types in the departure airport and the destination
airport
- the airline database is searched and availability of seats checked
- if seats are available on the required day/time then a booking is made
- the database/file is updated immediately to indicate that these seats are no
longer available and prevents double booking from occurring
- if no seats are available a message is sent back to the customer/travel agent
- this uses real time (transaction) processing since the files are updated in real
time; interrogation of files will have access to totally updated information
Page 89 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
that: In real time (transaction) processing system, files are often updated in real time
(e.g. when booking flights on an airplane); but in real time process control, physical
quantities (such as temperature) are continuously monitored and the input is
processed sufficiently quickly to be capable of influencing the data source
3. On-Line System: A system that is directly linked to the host computer for real-time
communication and provides interaction between the user and the job, as in POS
terminals in supermarkets. In networked computers, the terminals must be directly
linked to the host computer. Examples include ATM systems in banks, airline
reservation systems. Online systems can just be for information retrieval. Information
retrieval systems are there for users to access certain information promptly as on the
internet. In contrast, offline systems are computer systems that work without being
directly connected to the host computer.
5. Control System: - A system in which one or more computers are used to monitor
the operations of some non-computer equipment like in oil refineries. Control
systems involve monitoring and logging of physical quantities, provide an analysis of
performance and allows some user interaction. Feedback is an essential element as
well as timing. Most control systems are real-time systems, e.g. oil refining, chemical
processing, traffic control, etc.
6. Automated Systems: - These are control systems that are dedicated to one
particular task and lack the ability to collect and analyse data as in digital cameras.
They do not allow for or act on user interaction, e.g. washing machines, cameras,
watches. Most control systems have embedded computers systems inside them.
Page 90 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- The total breakdown of information processing disappears.
Disadvantages of distributed systems:
- There is often lack of coordination and control.
- It is difficult to impose standardisation, adequate security measures and
sharing of data and know-how.
- Difficult to obtain integrated information for top management. Duplication of
data is rampant.
- Excessive investment in hardware, software and personnel is involved.
Disadvantages of Centralisation:
- Requires high initial capital investment of sophisticated equipment, operating
systems, well developed communication systems and complex application
packages.
- Requires highly qualified and experienced personnel to run it.
- A system failure will paralyse the entire system unless expensive backup
system is provided.
- Users feel not being fully involved and therefore are not motivated.
FILE HANDLING
Types of files
1. Master File: It is a permanent file that is kept up-to-date by applying transactions
that occur during business operations. It contains permanent (static) and semi-
permanent data. Static data stored in database files can include Surname, First names,
Date of birth, etc.
2. Transaction Files: These are temporary files that contain data that can change
regularly, e.g. on daily bases and it is used to update the master file. This includes
Page 91 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
sales per day, student mark in a weekly test, etc. Transaction files are used to update
master files.
3. Reference files: These are files that contain permanent data which is required for
referencing (viewing) purposes only. This includes data on tax bands, formulae, etc.
No changes to files are done.
4. Data file: A set of related records (either written or electronic) kept together.
When entered into the database, the record will appear as follows:
Page 92 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Not flexible to work with
NB:- * Indicates the end of field marker, and the ≈ indicates the end of record marker
Variable length records have the following advantages:
They are more economical in terms of usage of disk storage space as they do
not allow spaces to lie idle.
Data entered will not be cut but appears as entered no matter how long it is.
may reduce time taken to read file/transfer data
enables as many fields as possible to be added to a file
File Organisation
Refers to the way in which records in a file are stored, retrieved and updated. This
affects the number of records stored, access speed and updating speed. The most
common methods of file organisation are: Serial File Organisation, Sequential File
organisation, indexed – sequential file organisation and random (direct) file
organisation.
1. Serial File Organisation: This is whereby data is recorded one after another as
they occur, without any definite order, as supported by magnetic tapes. Data is stored
according to arrival time. Data is read from the first record until the needed data is
found. New records are added to the end of the file. Serial file organisation is not
appropriate for master files since records are not sorted and therefore are difficult to
access and to update. It is faster to find records at the beginning of the file, but takes
too long to find records towards the end of the file. Serial files are suitable for
temporary transaction files since records are not sorted.
Serial files promote Serial Access: whereby records are accessed by reading from the
first until needed record is found in an unordered file, e.g on magnetic tape.
2. Sequential File Organisation: This is whereby records are sorted into a key
sequence, that is, in ascending or descending order of a given key filed as on magnetic
tapes. Sequential files organisation is appropriate for files with a high hit rate like
payroll processing. They are suitable for master files since they are ordered. However,
it takes too long to access records towards the end of the file since the records are
accessed by reading from the first record until the required data is found. However,
searching of records at the beginning of files is very fast. Adding of new records is
difficult as this is done by re-entering the data and the new record is inserted at its
Page 93 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
right position. It is time consuming to update such records. Suitable for master files
since records are sorted. This is used where all records need processing, e.g payroll.
Sequential Files promote sequential Access: Sequential Access is whereby records
are retrieved by reading from the first record until the needed record is found in an
ordered list of records, e.g. on magnetic tape. Sequential access occurs where records
are ordered using a key field.
File Processing
Refers to any form of activity that can be done using files. This includes: file
referencing, sorting, maintenance and updating.
1. File Referencing/Interrogation: This involves searching of record and displaying
it on the screen in order to gain certain information, leaving it unchanged. The record
can also be printed.
2. Sorting: Refers to a process of arranging (organising) records in a specific ordered
sequence, like in ascending or descending order of the key field.
3. Merging Files : This is the process of combining two or more records into one.
Below is an example of how records can be merged:
Record A (sorted) Record B (unsorted)
12 34 71 78 101 103 67 3 90 12
Record C (Merged and sorted for records A and Record B)
3 12 34 67 71 78 90 101 103
4. File maintenance: This is the process of reorganising the structure of records and
changing (adding or removing or editing) fields. This can be due to changes due to
addition or deletion of records.
5. File Updating: Updating is the process of either adding new record, deleting
unwanted records or modifying existing records. It involves making necessary
changes to files and records. Mostly master files are updated and they must be up-to-
date (contain accurate and most recent information).
For updating to occur, any one of the following must have occurred:
A new record has been entered.
Deletion of an unwanted record.
An amendment (change) to the existing data has been made, e.g. change in date
of birth only.
Page 94 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
The most common methods of file updating are: Updating in situ and Updating by
copying.
a. Updating by copying
This happens in sequential file updating process. This is done through the following
steps:
- A record is read from master file into memory.
- A record is read from transaction file into memory.
- Record keys from each file are compared.
- If record keys are the same, the master file is updated by moving fields form
transaction file to the master file.
Page 95 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
PROGRAMMING CONCEPTS
Definition of terms:
- Program: a set of detailed and unambiguous instructions that instructs a computer
to perform a specific task, for example, to add a set of numbers.
- Programming: A process of designing, coding and testing computer programs
- Programmer: A person who specialises in designing, coding and testing computer
programs
- Problem: any question or matter involving difficulty or uncertainty and is proposed
for solution.
Programming Languages
A programming language is a set of symbols in computer language that are used in
coding computer programs. A programming language is a specially written code used
for writing application programs e.g C, Pascal, COBOL, BASIC, C++ and Java.
1. Low Level Languages (LLL): These are programming languages used to write
programs in machine code, that is in zeros and ones or in mnemonic codes. Low level
language is in two forms: Machine Language and Assembly Language.
a. Machine Code (Language) is the language used to write programs in binary form
(zeros and ones). Machine language has the following advantages:
(i) Programs run faster since they are already in computer language. There is no need
for conversion as programs are in machine language.
(ii) Programs occupy very small disc storage space by storing just 1s and 0s.
b. Assembly Language: These are programming languages that use mnemonic codes
in coding programs. Mnemonic codes are abbreviations used in coding assembly
language programs, for example, LDA for Load, ADD for Addition, etc. Mnemonic
codes are very close to machine code, hence are low level language assembly language
codes
Advantages of Assembly language:
One assembly language instruction corresponds to one machine code
instruction and therefore translation is easier and faster.
Programs run faster since they are close to machine code.
They occupy very small disk storage space hence are economical to use.
Easier for a programmer to use than machine language.
Page 96 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
They can be machine dependent.
2. High Level Languages (HLL): These are programming languages that use English-
like statements in coding programs, for example COBOL, Pascal, BASIC, etc. There are
so many high level languages because each language is designed for a specific problem
to be solved in our daily lives. For example BASIC was designed for learning purposes,
COBOL for business applications, FORTRAN for scientific purposes, etc. Below is an
example of a BASIC program that accepts two numbers entered through the keyboard,
adds them and display the result on the screen:
INPUT “ENTER FIRST NUMBER.”, A
INPUT “ENTER SECOND NUMBER.”, B
SUM = A + B
PRINT SUM
END
Programs written in High Level Language are first converted to machine code before
running.
Disadvantages of HLL
Takes long to run since they need to be first converted to machine code.
They occupy a lot of disk storage space as compared to low level languages.
Translators
These are programs used to convert source code into machine code, and are in three
types, which are interpreters, compilers and assemblers, which are further
explained below:
1. Interpreters
These are programs that convert (translate) and run one instruction of a program at a
time before going to the next, until the end of the program, e.g. the BASIC interpreter.
They do not produce the machine code version of a program; hence conversion is
repeated when you run the program again. Thus interpreters retain source code. The
interpreter must be present in the computer for the program to run.
Functions of Interpreters
They check syntax error in a program statement.
Page 97 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
They translate an instruction into machine language and run it before going to
the next.
Allocates storage space to variables.
Advantages of interpreters
It is easy to find and correct syntax errors in interpreted programs.
It is very fast to run programs for the first time.
It is very fast to run small programs.
Disadvantages of interpreters
They are very slow in running very large programs.
They do not produce an object code of a source code and hence difficult to use.
The interpreter must be present in the computer for the program to run.
2. Compilers
These are programs that convert a high level language program into its machine code
equivalent at one go and then run it, e.g. the COBOL compiler. Thus it translates the
entire program before running it. Once compiled, the program no longer needs
conversion since the machine code version is the one that will be run, until some
changes are made to the program code. Thus a compiler produces an object code of
the program. The computer must have a compiler for translation.
Functions of Compilers
They check syntax errors in program statements.
They allocate storage space to variables.
Translate the whole program into machine code at one go.
Run an object code of the program.
Produces a program listing which indicates position of errors in a program.
Advantages of Compilers
Compiled programs runs faster since the object code is run.
Compilers indicate the line numbers with syntax errors and therefore assist
programmers in debugging programs.
They are appropriate even for very large programs.
Disadvantages of Compilers
Slower than interpreters for running programs for the first time.
The compiler must be present for the translation process to occur.
They can cause the computer to crash.
Difficult to find errors in compiled program.
*NB: Source Code refers to the program written in English-like statements (High
Level Language) by the programmer.
Object Code refers to a machine code version of a source code. All programs written
in source code must be converted to object code for the computer to understand
them.
Page 98 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
High Level Language Low Level Language
1 Written in English like statements Written in 1s and 0s (machine code) or in
mnemonic codes.
2 Easier to work with Difficult to work with
3 Easier to understand Difficult to understand
4 Are problem oriented and can be used Machine oriented
on any computer
5 Slower in execution since they need to Faster in execution since they are in machine
be first converted to machine code code already.
before running
6 Occupy large disk storage space on the Occupy small disk storage space on the
computer computer
7 They are machine independent They are machine dependent
ALGORITHMS
A set of instructions describing the steps followed in performing a specific task, for
example, calculating change. Algorithms are not necessarily written in any specific
language. Algorithms can be illustrated using the following:
Descriptions, Flowcharts, Pseudocodes, Structure diagrams.
Advantages of algorithms
Page 99 of 160
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- not biased towards any programming language
- easy to convert to a program code or flowchart
- easy to determine logic errors
- has finite steps which lead to a solution
Disadvantages
- time consuming to design, i.e. first convert to flowchart, then to program code
- most people find them difficult to learn
a. Descriptions: These are general statements that are followed in order to complete
a specific task. They are not governed by any programming language. An example is as
follows:
Enter temperature in oC
Store the value in box C
Calculate the equivalent temperature in oF
Store the value in box F
Print the value of box C and F
End the program.
VARIABLES
Definition: A variables is a memory location that can store a value that can change
during program execution.
Naming variables: Each programming language has its own way of naming variables.
However, the following conventions are common:
- a variable should not be a reserved word. A reserved word is a word with a
specific meaning / function in that programming language, e.g. Print, else, are
reserved words in BASIC
- Variables must start with an alphabetic character, not with digit.
- It is wise to name a variable using the data it stores, e.g. surname (to store
surnames), DOB (to store a date of birth), etc. Thus it must be meaningful to
avoid confusion
- Must not be too long
- Must be one word
i. Simple sequence: This is whereby instructions are executed in the order they
appear in a program without jumping any one of them up to the end of the program.
Statements are executed one after another in the order they are. It is simple and
avoids confusion. Example:
Enter first number, A
Enter second number, B
C=A+B
IF...THEN ...ELSE statement: A programming structure that allows the user to choose
one from at least two routes of solving a problem. The following Pseudocodes
compares two numbers entered through the keyboard and determines the bigger one.
Enter first Number, A Enter first Number, A Enter first Number, A
Enter second number, B Enter second number, B
Enter second number, B
IF A>B THEN IF A > B THEN
Print A is bigger Print A is bigger IF A>B THEN Print A is bigger
ELSE ENDIF
IF A<B THEN Print B is bigger
IF A<B THEN IF A < B THEN
Print B is bigger Print B is bigger IF A=B THEN Print Numbers are equal
ELSE ENDIF
END
Print Numbers are equal IF A = B THEN
ENDIF Print Numbers are equal
ENDIF ENDIF
END END
The above 3 Pseudocodes produces the same result.
Iii. Repetition/Iteration/Looping:
A control structure that repeatedly executes part of a program or the whole program
until a certain condition is satisfied. Iteration is in the following forms: FOR...NEXT
loop, REPEAT... UNTIL Loop and the WHILE...ENDWHILE Loop.
a. For...Next Loop: A looping structure that repeatedly executes the loop body for a
specified number of times. The syntax of the For...Next loop is as follows:
A group of statements between the looping structures is called the loop body and is
the one that is repeatedly executed.
The For...Next loop is appropriate when the number of repetitions is known well in
advance, e.g. five times. An example of a program that uses the For...Next loop is as
follows:
Sum, Average = 0
FOR I = 1 to 5 DO
Enter Number
Sum = Sum + number
NEXT I
Average = Sum/5
Display Sum, Average
End
c. While ... Do Statement: A looping structure in which the loop body is repeatedly
executed when the condition set is TRUE until it becomes FALSE. It is used when the
WHILE {condition}
Statement 1
Statement 2 loop body
................
ENDWHILE
The word WEND can be used to replace the word ENDWHILE in some structures and
therefore is acceptable. The word Do, after the condition is optional.
c. Flowcharts
It is a diagram used to give details on how programs and procedures are executed.
Flowcharts are drawn using specific symbols, each with its own meaning, as given
below:
Symbol Explanation
Process Symbol - Indicates where some form of processing occur
3. Using Iteration
(a) Repeat ... Until Structure
Flowchart (a) above indicates modules named Accept Numbers, Add numbers
Multiply Numbers and Display Results. Flowcharts for individual modules can then be
designed as given in diagram (b) above, only the first module is indicated. Can you do
the rest?
The structure diagram above indicates five sub-programs of the program Process
Numbers, namely Initialise, Accept Numbers, Process Numbers, Display Results and
Exit. The module Process Numbers has its own sub-programs, which are Add
Numbers and Multiply Numbers. Modules are appropriate for very large programs.
Can you write pseudocode for individual modules? The program can be written as a
continuous single program as indicated on the right side of the diagram.
DATA TESTING
After a program has been coded, it must be tested with different data types to
determine if intended results are produced. The types of test data that can be used
include:
i. Extreme Data(boundary data/border line data): Refers to the minimum and the
maximum values in a given range. For example, a computer program requires the user
to enter any number from (between) 1 to 20. 1 and 20 are extreme data and the
computer must accept these. Thus extreme data is accepted by the computer.
ii. Standard (normal) Data: This refers to data that lies within (in-between) a given
range. In our example above, the numbers from 2 to 19 are standard data and are
accepted by the computer.
iii. Abnormal Data: This refers to data outside a given range. As to our example
above, the number 0, -1, -50 and all number from 21 and above are abnormal data.
The computer system gives/displays an error message if abnormal data is entered.
Testing Strategies
First step involves testing of the programs and various modules individually, e.g.
- Top-Down testing: program is tested with limited functionality. Most functions are
replaced with stubs that contain code. Functions are gradually added to the program
until the complete program is tested.
- Bottom – up testing: Each function is tested individually and then combined to test
the complete program.
- Black-box testing:
- Program is regarded as a black box and is tested according to its specification.
- No account is taken of the way the program is written
- Different values are entered for variables to determine whether the program
can cope with them. This includes standard (typical/normal), extreme
(borderline) and abnormal data values.
- White-box testing:
Each path through the program is tested to ensure that all lines of code work
perfectly.
Involves testing the program to determine whether all possible paths through
the program produce desired results
Mostly appropriate if the program has different routes through it, i.e. uses
selection control structure and loops
System testing
Once a program is tested, it is installed and the analyst can now test it. A very large
program must be tested using the following types of tests:
Advantages of GUI:
It is faster to give/select commands by just clicking.
It is easier for a novice (beginner) to use the system right away.
It is user friendly (this is an interface that is easy to learn, understand and to
use).
There is no need for users to remember commands of the language.
It avoids typing errors since no typing is involved.
It is easier and faster for user to switch between programs and files.
A novice (beginner) can use the system right away.
Disadvantages of GUI:
The icons occupy a lot of disk storage space that might be used for storage of
data.
Occupy more main memory than command driven interfaces.
Run slowly in complex graphics and when many windows are open.
Irritate to use for simple tasks due to a greater number of operations needed.
Usually only predefined choice are available.
The user has to remember the commands to be typed when performing a specific
task. An example of a program that uses command driven interface is Microsoft Disk
Operating System (MS-DOS). The commands are abbreviated and short e.g. Del (for
delete), copy, print, etc.
Command Line interface is ideal for programmers and technically competent
personnel.
Advantages of Command Driven Interface:
It saves disk storage space since there are no icons involved.
It is very fast in executing the commands given once the user mastered the
commands.
It saves time if the user knows the commands by heart.
The user has to enter 1, 2, 3 or 4 and then press enter on the keyboard.
Advantages of Menu Driven Interface:
It is fast in carrying out task.
The user does not need to remember the commands by heart.
It is very easy to learn
No need to consult manual
DATABASES
A Database is a collection of related and organised files sharable among computer
users of an organisation. Databases enable addition, deletion and modification of data
held in the computer.
Relational databases organise data in a flexible manner. They are also simple to
construct and are easy to use. However, it may be difficult to come up with
relationships.
From the above database structure, it can be noticed that:
- There are three records for Kapondeni, Turugari and Moyo. A record is also called a
tuple.
- There are four fields: Student Number, Surname, First Name and Date of Birth.
- The student Number is used as a Primary Key (Key field) because it gives a
unique(one) record. A primary key is a field that is used to identify a unique record
2. Network Databases
Advantages of Databases
Validation checks are made on data during entry thereby reducing data entry
errors.
Searching and retrieval of data is very fast.
Less likelihood of data getting lost.
Record structure can be easily modified if the need arises.
Files can be linked together making file updating easier and faster.
Avoids/reduces data redundancy.
Data can be secured from unauthorised access by use of passwords.
Users can share data if the database is networked.
Duplication of records is eliminated.
Ad hoc reports can be created easily.
Sorting of records in any order is very fast
Disadvantages of databases
If the computer breaks down, you may not be able to access the data.
It is costly to initially setup the database.
Computer data can be easily copied illegally and therefore should be password
protected.
Takes time and costs to train users of the systems.
Expensive to employ a database administrator who will manage the database
However, the introduction of the computer systems means that staff would need new
skills, can lead to unemployment, people are likely to work from home, could lead to
de-skilling and some health problems will suffice.
Sample Question
A database stores details about cars in a showroom: The database information can be
amended, deleted or new ones inserted due to:
Amended: information in the databases is incorrect. Price of vehicle needs to be
changed (e.g. sales). Change of vehicle colour.
Deleted (record deleted): Vehicle is sold or Vehicle is scrapped
Inserted/ added: new vehicle arrived. More information about current vehicle
becomes known.
CODING DATA
Data to be entered into the computer can be coded / written in a short way, for
example:
In databases, a field for sex can be coded as follows: F for Female, M for Female. In this
case the user just enters F or M and not the whole field as it is. The column for colour
can also be coded as B for Black, R for Red, Y for Yellow, etc.
Features of Codes
Should be of the same length.
Must be easy to use.
Must not be too short in case you will run out of codes.
Codes are often unique
1. Buffers: This is a temporary memory store for data awaiting processing or output,
compensating speed at which devices operate, for example printer buffer. Buffering is
appropriate where an output device processes data slower than the processor. For
example, the processor sends data to the printer, which prints much slower and the
processor does not need to wait for the printer to finish printing in order for it to
carry out the next task. The processor therefore saves the data, awaiting to be printed,
in a buffer where it will be retrieved by the printer. Buffering usually match devices
that work at different speeds, e.g. processor and disk.
Reasons for using printer buffers:
6. Scheduling: This is whereby the processor decides the loading and execution of
programs to provide continuous job processing sequence. Scheduling can do this by
giving time slices to each computer or by queuing jobs. A number of scheduling
algorithms can be used; e.g Shortest Job First, Shortest Remaining Time, Round Robin,
First Come First Served, etc. Scheduling generally ensures that:
No resource is heavily under-utilised or over-utilised.
The maximum number of interactive users get a reasonable response time.
Making sure that no job is pushed to the back of a queue.
Getting maximum number of jobs done in the minimum amount of time.
MALWARE
Malware (malicious software) is code or software that is specifically designed to
damage, disrupt, steal or inflict some other “bad” or illegitimate action on data, hosts,
or networks.
Types Of Malware
1. WORM
A malicious program capable of reproducing itself and spread from one computer to
the next over a network and consume computer resources like memory and CPU. It
does not delete files as viruses do. Worms travel unaided through the computer
network. It does not require a host file or human assistance for it to spread.
2. Trojan Horses
These are malicious programs that appears as programs useful to the user with the
intention of soliciting information like user accounts and passwords or damaging
computer system files and desktop settings. It can also allow other users to access
confidential information from your computer. They do not self-replicate.
3. COMPUTER VIRUSES
A computer virus is a malicious program which attaches itself to computer file,
replicates itself, damages, destroys or corrupts files and memory of the computer, for
example, boot sector viruses. Computer viruses spread with human action, e.g. run an
executable file. Viruses also need a host file to attach to it for it to spread. By
replication, it means that the virus can multiply itself (produces several similar copies
of itself) when it enters the computer system. Examples of known viruses are: Virus
Melissa, Jerusalem, Cascade, etc.
Antivirus programs
This type of virus only comes into action when the file containing the virus is
executed.
4. Macro Virus
These attack macros in applications, e.g. in databases and spreadsheets. The most
well-known macro virus is probably Melissa, a Word document supposedly containing
the passwords to pornographic websites.
5. Multipartite Virus
A virus of this type may spread in multiple ways, and it may take different actions on
an infected computer depending on variables, such as the operating system installed
or the existence of certain files.
6. Polymorphic Virus
Another jack-of-all-trades, the Polymorphic virus actually mutates over time or after
every execution, changing the code. Alternatively, or in addition, a Polymorphic virus
may guard itself with an encryption algorithm that automatically alters itself when
certain conditions are met.
This broad virus definition applies to any virus that inserts itself into a system’s
memory. It then may take any number of actions and run independently of the file
that was originally infected.
DATA COMMUNICATION
This deals with the means of sending and receiving data on networked computers.
Transmitted data can be in analogue or in digital form.
Digital Data: Data is in discrete value, that is, in ones and zeros.
Analogue Data: Data is in continuously varying form, in physical or original form e.g.
human voice.
Transmission Modes
Transmission modes include Simplex, Duplex (Full duplex) and Half Duplex
Simplex Transmission Mode Half Duplex Transmission Mode Duplex Transmission Mode
A B C
Simplex Mode: This is a mode of data transmission in which data travels only in one
direction (uni-directional). Thus one computer acts as the sender and the other as a
receiver forever. See diagram A, above.
Half Duplex: This is a transmission mode in which data travels in both directions but
not simultaneously. It is bi-directional but not simultaneous.See diagram B above. The
receiver waits until the sender has finished sending data in order for him to respond.
Transmission impairments
This refers to change in signal form as it propagates through the transmission
channel. Transmission impairments include:
Attenuation: The loss of signal power as it moves through the transmission channel.
Noise: Occurs when an unwanted signal from other sources than the transmitter
enters the transmission channel.
Multiplexing
This is a method of allowing multiple signals to share the same channel, reducing too
much cabling, as shown below:
A multiplexer is used in
multiplexing. A multiplexer is
a device that joins two or
more channels into one
channel while the de-
multiplexer is responsible for
splitting a channel into a
number of them for easy
transmission to the intended
destination.
Bandwidth
Refers to the caring capacity of a transmission channel (measured in bits per second:
bps). It determines the amount of data a channel can transmit at a given period of
time.
Transmission Media
Refers to forms of media through which data is transferred from one point to another.
These include:
1. Twisted Pair: These are cables with two copper wires of about 1 millimetre thick.
The wires are twisted to avoid crosstalk. Twisted pair is very cheap to buy and offer
good performance over short distances.
Disadvantages of twisted pair: Twisted pair is very cheap to buy. Has big
attenuation. Has low bandwidth
3. Fibre optics: A media that uses light to transmit data. It has less attenuation, has
very high bandwidth and cannot corrode (not affected by corrosion), it is thin and
therefore has less weight. However, fibre optics is very expensive to buy and is uni-
directional (travels in one direction only)
NB: a UPS is a device connected between a computer and a power source to ensure
that electrical flow is not interrupted. UPS devices use batteries to keep the computer
running for a period of time after a power failure. UPS devices usually provide
protection against power surges and blackouts as well.
2. Data integrity
This refers to the correctness and accurateness of data held in the computer. The
issue of data integrity and security lead to the introduction of some data protection
laws which govern how organisations holding public data must operate.
3. Backbone problems: sitting on the computer for a long period can cause this. This
can be solved by:
Using a chair that is adjustable to fit the height suitable for each employee. Sitting up
while using the computer.
4. Increase in the amount of litter due to dumping of used and old computers
5. Children are being exposed to pornography, hate literature, racism and dangerous
experiments like those for manufacturing bombs on the internet. This can be solved
by:
Installing software that prevents children from accessing restricted sites on the
internet like Net-Nanny, Surfwatch, Cybersitter, etc. This software blocks
inappropriate sites and subject matter. Teachers and parents need to closely
supervise students during internet access. Firewalls can also be installed as a security
measure.
WHAT IS A COMPUTER?
It is an electronic device that works under the control of stored programs to
automatically accept, store and process data into information. Therefore, a computer
has the following characteristics:
It is electronic:- can only work when there is electricity
It is a device: a machine
Is controlled by programs: Works according to instructions, written in
computer language, given by the user for it to perform a specific tasks.
Is automatic in operation: Can work with minimum or no human
intervention.
Can accept data: data can be entered into the computer through various
means and the computer accepts it.
Can store data and programs: Data and programs entered into the computer
can be stored for future use.
Can process data into information
Computer Generations
Refers to stages through which computers developed from the 1940s to date. These
are as follows:
1. First Generation Computers (1945 -1955): These are the earliest computers
that used valves in controlling machines, e.g. EDVAC, ACE and UNIVAC
machines. These were very large computers, fitting about the size of an
average room. They were programmed in a language understandable by the
machine. Such computers used a lot of electricity and were very expensive to
purchase. Only very large organisation could afford these computers. Such
computers were huge, slow, expensive and often undependable.
2. Second Generation Computers (1955 -1965): These are computers that used
transistors instead of valves. They were faster, had reduced size, were more reliable
and less expensive.
Transistor
3. Third Generation Computers (1965 – 1980): These used integrated circuits e.g.
the IBM (International Business Machines) computers. The integrated circuit, also
referred to as semiconductor chip, packs a huge number of transistors onto a single
wafer of silicon. These computers have increased the power, lowered cost, carry out
instructions in billionths of a second, and smaller.
Microprocessor
5. Fifth Generation Computers (1990 to date and beyond): These use natural
language and can flexibly interact with the human being. Such systems are used in
medical diagnosis, mineral prospecting and in geological researches. Such computer
systems are capable of human intelligence and are commonly called expert systems.
Types of Computers
The types of computers are: Micro-computers, mainframe computer, super
computer & mini-computer. They can also be digital or analogue computers.
1. Micro Computers: These are computers with a microprocessor inside them and
occupy a small physical space. They are cheap, small, relatively slow and have
limited memory, often single user, easy to use and have low computing power.
Microcomputers include the following:
a. Desktop Computers: These are computers with a separate CPU and monitor
and fit on a desk during usage. They are relatively cheap. They are easy to add
expansion cards on them. However, they take up large desk space. They are not
portable
b. Personal Computers (PC): - These are microcomputers made for use at home
for general purpose, and includes desktop computers. They are cheap, more
powerful and has good storage capacity disks.
Advantages of desktop/PCs
- Low cost
- Spare parts tend to be standardised
- Faster processors, 2.0 GHz
- Large casing allows good dissipation of any heat build-up
Disadvantages
- Not portable
- Take large desk space
- All devices need to be wired together which might be too complex
e. Netbook Computer: These are smaller versions of laptops, they can almost fit
in a hand and do not have optical devices (CD/DVD drive) on them. Their
benefits and problems are similar to those of laptops. However, they are
cheaper and they have a weakness that they do not have optical devices.
f. Tablet Personal Computers: Type of notebook that accepts input from an
electronic pen
For schools and school children, laptops have the following advantages:
3. Mainframe Computers: these are large and powerful computer systems. They are
mostly used in large organisations like banks and where bulk data processing is
needed such as census, industry/consumer statistics, and financial transaction
processing. They have the following features:
- they can have several CPUs,
- have very fast processor speed
- can support multiple operating systems
- have huge storage capacity
- have huge internal memory
- can operate using time sharing or batch processing
- Allows several users and can accommodate multiple processors.
- They are very large and expensive.
4. Super Computers: These are very powerful computers that are used to perform
detailed calculations and for design purposes, for example, modelling of aircraft
wings, testing bombs, etc. They are the fastest and most expensive computers
Supercomputer
*NB:- The classification of computers as micro, mini, mainframes and super
computers have become blared due to recent technological advancements since a
microcomputer can now perform all functions that were believed to be for
mainframes.
Classification of computers can also be made relating to the use of the computer, as
follows:
(a) General Purpose Computers: - these are computers that can be used to perform
a number of functions like playing music, playing games, payroll processing and so on.
(b) Special Purpose Computers: - These are computers that are designed to perform
one task only, for example, to monitor patients in hospital.
(c) Analogue Computers: these handle data in continuously varying form.
(d) Digital Computers: Handle data in discrete values; that is in 0s and 1s.
(e) Embedded Computers: – Refers to use of microprocessors in non-computer
equipment like in cameras, washing machines, watches, etc. These are normally
dedicated for a specific task they are designed for. Embedded computers are also
found in household items like camera, microwave, washing machine, video recorder,
(b) To Customers
- Robust and therefore fewer repair bills
- Low power consumption
- Cheap to buy
- Faster processing
- More versatile
- Efficient since they can be dedicated to a specific task
ELEMENTS/COMPONENTS OF A COMPUTER
The main/major elements (components) of a computer are illustrated on the diagram
below; namely Input Devices, Storage Devices, Processing Device and Output
Devices.
Hardware: These are parts of a computer that exits in physical form, for example
mouse, keyboard. Hardware refers to tangible devices of a computer. Hardware is
grouped into: Input Hardware, Processing Hardware, Output Hardware, Storage
devices and communication hardware.
Input Hardware
These are devices used to enter/feed data into the computer, for example mouse and
keyboard. Below are some of the input hardware and their uses:
(d) Numeric keypads: mostly used to enter numbers only. Used on ATMs, to enter
PIN and amount to be withdrawn. Also found on cell and telephones, Chip and
(ii) Mouse: It is a pointing device used to enter data and instructions into the
computer by clicking. A mouse has either one, two or three buttons. A mouse can be
cable or wireless. The mouse is also used to:
- Select options from a menu
- Position the cursor when editing text/typing
- Select an object for drawing and for editing diagrams
- Select icons/text to be formatted, deleted or edited.
- Control movement of pointer on the screen.
Advantages of mouse
- It is a fast method of entering data and for selecting items as compared to the
keyboard.
- It is faster to move cursor around the screen using a mouse than a keyboard.
- Usually supplied with the computer and so there are no additional costs.
- Very easy to use for most users.
- Take up very small area of the desk
- Very fast to switch between programs
Disadvantages of mouse
- Needs a flat surface on which to operate
- Can be easily stolen or vandalised
- Some people find it very difficult to use
-
(iii) Touchpad
These are pointing devices used on laptops, where one moves a figure to control the
pointer on the screen. Their uses are similar to those of mouse. They aid portability
since they are attached to the whole computer system. Can also be used where there
are no flat surfaces available. However, they are difficult to use, e.g. when doing drag
and drop.
(iv) Scanner: an input device used to convert images from paper (hard copy) into
electrical signals for input into the computer.
The images can then be edited, printed
or saved. Mostly used to scan pictures,
photographs, etc. they can use OCR,
convert to Word or pdf format directly.
- no film is needed (saves costs for purchasing films and developing the film)
- Unwanted images can be deleted straight away
- Images are already digital and therefore can be transferred to a computer for
editing immediately,
- Easier and faster to upload photos to the computer
- Produce better quality images than the traditional camera
However:
- Images need to be compressed
- Needs those who are computer literate to use it efficiently
(vi) Touch Screen: A screen display on which you could enter data by
pointing/tapping with a finger on intended option. Used on (ATMs)-Automated
Teller Machines, cell phones, computers, etc.
(ix) Tracker ball: It is an input device with a small ball that can be moved by passing
the palm of your hand over it. This will move an arrow on the screen and therefore
can replace a mouse.
It is used to draw designs and to
select options from menu. Used as
an alternative to a mouse. To
operate it the user rotates the ball
which moves the pointer on screen.
They are particularly easy to use for
Tracer ball those with limited movement in
their hands and are often used in
Computer Aided Design (CAD) for
their increased precision over a
mouse.
Advantages of trackball
- It is stationery and therefore do not need a flat surface to move on
- Less likely to get damaged than mouse
- Less tiring as less movement is needed
- Can be useful in laptops
Disadvantages
- Rolling the ball is less effective than using mouse
- Can be difficult to control
- Not supplied as standard device, so extra cost is incurred
- Muscles can be strained due to repeated movement
(xi) Microphone: It is an analogue input device that recognises human voice for data
entry into the computer.
Microphones are used to input sound. In
computing, they can be used with voice
recognition software and a word
processing application to enter text.
Webcams commonly have microphones
built-in too.
Disadvantages:
- Older systems are speaker dependent.
- They allow the user to speak slowly, using specific words that were
programmed for it to understand.
NB: Multimedia speakers, sound cards, a microphone and voice recognition software
are needed in voice recognition systems.
(xii) Light pen: A ballpoint shaped device used to enter data by writing on an ink
pad. It is also used to make alterations on the screen to the drawings, to write directly
on the screen and to select commands.
Light pen
(xiii) Kimball Tags: These are punched cards with a magnetic strip which contains
details of a product, mostly clothes in a shop.
(xiv) Graphics tablet: Devices used to provide interface for drawing on the screen
and links with the light pen. Can also be used with a stylus. Can be used for drawing
(xv) Webcam: A digital video camera designed to take digital photographs and
transmit them over the internet or to the computer. They do not have own memory.
Laptops have their own web cam.
Uses: viewing each other when chatting on internet. For video conferencing. For
taking personal images.
Advantages: can be left on and only activated when required. People can see each
other when chatting.
(xvi) Sensor: an input device that automatically records physical data by sensing the
environment it is supposed to record, e.g. humidity sensor.
(xvii) Magnetic Stripes: Magnetic stripes can be seen on train tickets or bank or
credit cards.
(xviii) Smart Card Readers: Similar to magnetic strip readers except that they are
used to read data stored on a chip. Most bank cards and credit cards are now smart
cards. Also used on royalty cards, ID cards, electronic passports and transport passes.
Smart cards
- Smart cards are simple to produce
- Not easily damaged
- Store a fairly large amount of information
- Automatic input devices, reduce paperwork
However:
- Data can be changed by magnetic fields
- The strip can be damaged by scratching
- Limited storage capacity
- Not very secure as thieves can alter the data.
(xix) Barcode Reader: These are devices at Electronic Point of Sale terminals
(EPOS) that read barcodes on products for automatic data entry into the computer.
Mostly used in library systems, luggage handling systems at airports, warehouse stock
control, etc.
Barcodes are numbered vertical lines
and spaces of varying size on products
that provide data for such a product to
the computer when read by barcode
readers.
If the barcode reader fails to read the
Barcodes barcodes, data is entered manually
through the keyboard by entering the
numbers below the barcodes.
(xx)Video digitiser
A video digitiser takes an image from a video camera or television and digitises it so it
can be read by, and stored on, a computer. Video sequences captured using video
digitisers are often used in multimedia presentations.
(xxi) Stylus: device used to write on sensitive pads or screen for data entry into the
computer. Often purchased with touch screens
DOCUMENT READERS
These are devices used for entering data automatically into the computer by reading
through documents. These include:
(i) Optical Mark Recognition (OMR): The Optical Mark Readers use light sensitive
devices to sense pencil marks on a piece of paper for automatic data entry into the
computer. Light is reflected from the document onto the Optical Mark Reader which
records the output. It then records low intensity/zero intensity at certain points. OMR
is mostly used in marking multiple choice exams at ZJC and ‘O’ Level, reading pupils’
registers, playing lotto, etc. An Optical Mark Reader is the device that is used for
automatic data entry in OMR systems.
- OMR is fast in entering data
- It is also accurate and reliable in entering data.
- Has better recognition than OCR
- Can be prepared where data originates, without machines
- Errors can be corrected easily
However:
- Mark readers are relatively slow
- Verification of data is difficult
- Document may be difficult to design
- Forms must be completed clearly for data to be recorded accurately
- Papers need to be clean
(ii) Optical Character Recognition (OCR): It is the use of light sensitive devices to
recognise alphabetic characters and numbers on a sheet of paper for automatic data
entry into the computer. Mostly used by insurance companies, in billing systems and
processing of Bank Giro-forms. An Optical Character Reader is the device that is used
for automatic data entry in OCR systems. It recognises printed or even hand written
test form input into the computer
- Can convert large amount of text into digital form at once
- Less tiresome since it is an automatic data entry method
- Faster in entering text into the computer
- Accurate in data entry
OUTPUT DEVICES
These are devices used to display and produce data and information held inside the
computer, for example: screen, printer and graph plotters. These are described below:
Types of Printers
Printers can be classified into impact and non-impact printers.
(a) Impact Printers: these are printers whose write heads hit ink ribbon against
paper during printing, e.g. dot matrix printer, chain printer, daisy wheel printer, drum
printer, etc. Thus, there is contact between the paper and the write heads during the
printing stage. Examples include drum printers, dot matrix printers, daisy wheel
printers and chain printers. Impact printers have the following advantages:
they are very cheap to buy.
They are cheap to repair and to maintain.
They can use continuous paper.
They are economic in terms of ink usage.
Weaknesses
- Low resolution
- Noisy
- Slow printing speed: this is because they can be character based or line based
printers.
(b) Non-Impact Printers: These are printers that do not produce contact between
paper, write heads and ink cartridge during printing. Non-impact printers include:
inkjet printer, laser printer, thermal printer, etc.
Laser printers
Most of the printers use light and are therefore called laser printers.
The advantages of laser printers are
as follows:
They print at very high speeds
since they are page printers.
They produce high quality text
and graphics.
They produce less noise than
LaserJet printers dot-matrix printers (they are
Inkjet printers
uses print head to propel droplets of ink on a sheet of paper.
Advantages:
relatively high resolution
Good colour production
Low cost/heap to buy
Usually small size
Disadvantages
Slow printing speed
Ink is expensive
Has a water soluble ink which may be spilt
Running costs are expensive
*NB: - Printers can also be classified as page printers (these print one page at a given
time and are therefore faster), line printers (print one line at a time, very slow) and
character printers (print one character at a time).
(ii) Screen / Monitor: it is a television shaped device used to display contents on the
computer as soft copy. Soft copy refers to data viewed on the screen. The screen can
also be called the Visual Display Unit (VDU). The screen can differ in terms of
resolution, that is low resolution screens display less number of dots per inch on the
computer and therefore the display will be of poor quality. High resolution monitors
are needed mostly in graphics packages where colour and many dots per inch are
needed.
Advantage of Monitors
- Its output is immediate and visual
- High speed of display
- No noise
- No wastage of paper
- Can display text, graphics, etc
-
Disadvantages
- When the display changes, the previous output is lost.
- Needs a separate device to produce hardcopy
(iii) Graph Plotter: This is a device used to produce high quality drawings in various
paper sizes and is used in Computer Aided Design (CAD). A plotter can be used to
produce high quality, accurate, A3 size or bigger drawings. They are usually used for
Computer Aided Design (CAD) and Computer Aided Manufacture (CAM) applications,
such as printing out plans for houses or car parts. They print sharper and more
precise drawings.
Graph plotter
(v) Speakers: produce sound from music files on the computer. They are used in
conjunction with multimedia files.
(vii) Actuators: these are output/control devices which turns on or off some devices
in control systems. Some of the control devices include electric heater (supplier heat),
electric motor (provide movement/rotation), motorised pump, buzzers, lights,
heaters, actuators, etc
PROCESSING DEVICE
A device used to convert and to manipulate data as per user requirement. The sole
processing device of a computer is the processor, which is inside the Central
Processing Unit (CPU) casing. Processing involves sorting of data, updating records,
searching certain records, adding a sequence of numbers, and others.
The processor has the following functions:
- It controls the transmission of data from input device to memory
- It processes the data and instructions held in main memory
- It controls the transmission of information from main memory to output device.
- Controls the sequence of instructions,
- Give commands to all parts of the computer,
- Fetches the next instruction to be executed
- Decodes instructions
- Executes decoded instructions
The speed of a processor determines the speed and function of a computer. Until the
1980s, most computers had one processor, but recent ones have two or more
processors (called co-processors), those with two processors are called dual
processors. Two or more processors share loads and therefore perform operations
faster. The speed of a computer is also determined by the clock speed for each
microprocessor. This speed is measured in Megahertz (MHz). The general structure of
the CPU or Processor is as illustrated below:
NB: Memory (Main memory): Stores programs and data for programs currently
running on the computer. Main Memory is very close to the processors and therefore
the two can coordinate their activities very fast.
- ALU operations on data are first loaded into the accumulator register, a memory
which stores instructions, data being processed and results of an operation.
The function of the microprocessor is to fetch, decode and execute instructions. This is
also called the Fetch-Execute cycle.
The Fetch-Execute Cycle
Step 1. Fetch instruction: In the instruction phase,
the computer’s control unit fetches the instruction
to be executed from memory. Microprocessor gets
software instruction telling it what to do with data.
Step 2. Decode instruction: Then the instruction
is decoded so the central processor can understand
what is to be done. Microprocessor determines
what the instructions mean.
Step 3. Execute the instruction: In the execution
phase, the ALU does what it is instructed to do,
making either an arithmetic computation or a
logical comparison. Microprocessor performs the
The Fetch-Execute Cycle instruction.
Step 4. Store results: Then the results are stored
in the registers or in memory.
Step 3 & 4 are called the execution phase. The
time it takes to complete the execution phase is
called the EXECUTION TIME (E-time).
After both phases have been completed for one
instruction, they are again performed for the
second instruction, and so on.
Buses
A bus is a pathway through which data and signals are transferred from one
device to another in the computer system.
They are a set of parallel wires connecting two or more components of the
computer.
- Address bus:
Used for transferring memory addresses from the processor when it is accessing
main memory
They are used to access memory during the read or write process
The width of the address bus determines the maximum possible memory
capacity of the computer.
This a uni-directional bus (one way). The address is send from CPU to memory
and I/O ports only.
- Control bus:
The purpose of the control bus is to transmit command, timing and specific status
information between system components. Timing signals indicate the validity of
data and address information. Command signals specify operations to be
performed. Specific status signals indicate the state of a data transfer request, or
the status of request by a components to gain control of the system bus
This is a bi-directional bus used for carrying control signals (Signals can be
transferred in both directions).
They carry signals to enable outputs of addressed port and memory devices
Control signals regulate activities on the bus.
Control buses transmit command, timing and status information between
computer components.
Fan
A fan is used to cool the processor. It blows away hot air to that the processor remains
cool.
STORAGE MEDIA
These are devices used to store data and programs for future use.
Storage Capacity
Refers to the amount (volume) of data a device can store. The following storage
measurements can be used:
Bit: The smallest unit of data a computer can store, either a 1 or a 0.
Nibble: refers to half a byte, that is, a group of 4 bits.
Byte: a group of 8 bits representing a character. For example, the letter C is
represented by the byte 01000011.
Size Equal to
8 bits 1 byte
*NB:-Formatting (initialising) a disk: this is the process of creating new tracks and
sectors on the disk that will be used in storing data. When a disk is formatted, existing
tracks and sectors are destroyed, including the data stored on them, and new ones are
created. After formatting, the disk will be blank. Formatting is done using the FAT or
the NTFS file system. FAT (or FAT16) stands for File Allocation Table:- It is a file
system used by MS-DOS and Windows operating systems to organise and manage
files. It is a data structure that Windows creates when you format a volume by using
FAT or FAT32 file system. Windows will store information about each file in a FAT so
that it can retrieve the file later. FAT uses 16 bit filing system. FAT32 uses 32 bit
values and uses drive space more efficiently and supports drives of up to 2 TB.
Storage media is grouped in primary storage and secondary storage:
RAM Chips
RAM is volatile, which means that it loses its contents when power is switched off.
RAM is in two forms; that is, dynamic and static RAM. Static RAM is a Random Access
Memory chip whose contents do not change as long as there is continuous power
supply. Dynamic RAM is Random Access Memory chip whose contents can be lost
(b) ROM (Read Only Memory): ROM is a semi-conductor circuit (chip) whose
contents can only be read from and cannot be erased or modified. ROM contents are
fixed during manufacturing, that is, they are hard – wired. These contents can only be
read from and cannot be modified.
The uses of ROM are:
- Stores the Basic Input-Output System (BIOS-refers to software that test
hardware at start-up, starts the operating system and support data transfer
between devices.) of the computer.
- Stores control programs for the operation of the computer and its peripherals.
- Stores translator programs.
ROM is grouped into:
Programmable Read Only Memory (PROM): This is a ROM chip whose contents can
be changed but only once. It is re-programmable only once.
Erasable Programmable Read Only Memory (EPROM): This is a Read Only
Memory chip whose contents can be erased and modified several times.
Electrically Erasable Read Only Memory (EEPROM): This is a Read Only Memory
chip whose contents can be erased and modified several times using electricity.
*NB:- Firmware (microcode):-refers to coded instructions that are stored
permanently in read-only memory, for example BIOS.
Magnetic Storage
These store data on magnetised field of iron oxide and include magnetic tapes, zip
drives, diskettes, hard drives and flash drives.
(a) Magnetic Tapes: They are similar to a normal cassette tape in shape. They store
data in serial and sequential order. They are mostly used to backup data. Their
storage capacity can be up to 20 GB. Data is also accessed in serial or sequential order.
They can be used as off-line storage media.
(b) Hard Disk (Hard Drive): These are disks used to store large volumes of data and
programs, including operating systems and are resident in the CPU casing. Data is
stored on tracks in a random way and data retrieval is in a random way. Hard disks
can store data of up to 300 GB, but ranges from 2 GB, 8 GB, 20 GB, 40 GB, 80 GB, 120
GB, etc. a hard disk can be internal or external. External hard disks have a larger
storge capacity and can be used to back-up the system
(c) Diskette (Floppy Disk): A 3.5 inch and plastic magnetic disk enclosed in a stiff
envelope with a radial slit; used to store data or programs. They have a storage
capacity of 1.44 MB. They are used as backing storage for small volumes of data. Data
is stored on tracks in a random way. Direct access to data is provided. Its features are
shown below:
Diagram of a Diskette:
Notes on Diagram
Rigid plastic case: - protects the disk inside from
damage.
Write protect Window: When it is open, data
cannot be written on disk, unless it is closed. It is a
method of preventing data on disk from being
modified.
Disk Label: this is where the user writes some
information, for example his/her name, disk
contents, etc.
High Density Window: - indicates that a disk can
store data on two sides, thus allowing more data to
be stored on them. 1.44 MB disks are double
density disks.
Disadvantages of Diskettes:
have very short life span (not durable).
Can be affected by humid conditions.
Can easily be affected by dusty conditions.
Can easily be damaged if placed close to the sun for a long time.
Takes long to read data into memory than from a hard disk.
Hold very small amount of data, 1.44 MB.
(d) Zip Drives: Similar to diskettes in shape but does not flop. Data is stored in a
random way. Data is accessed in a random way. Storage capacity is 100 MB.
Advantages of Zip Drives:
They are portable (easy to carry
around as they can fit in a shirt
pocket.).
Conceals less electricity.
Relatively cheap
Most are high Double Density drives.
More durable than diskettes
Good for archiving data
Disadvantages of Zip Drives:
Hold small amount of data of about
100 MB.
Not as compact as USB flash drive
Slow data transfer rates
Zip drive
Memory Cards: memory card is like a portable hard disk that fits into personal
computer card slot.
Each of these small devices has some flash memory connected to a USB interface.
Plug it into your computer and it appears as a drive. You can then add files, erase files,
etc. You can use it to move any type of file between computers.
1. Bus: A communication line used for data transfer among the components of a
computer system
2. USB: - An external bus that supports Plug and Play installation of devices. Using
USB, you can connect and disconnect devices without shutting down or restarting
your computer. You can use a single USB port to connect up to 127 peripheral devices,
including speakers, telephones, CD-ROM drives, joysticks, tape drives, keyboards,
scanners, and cameras. A USB port is usually located on the back of your computer
near the serial port or parallel port.
3. USB port: An interface on the computer that enables you to connect a Universal
Serial Bus (USB) device. USB is an external bus standard that enables data transfer
rates of 12 Mbps (12 million bits per second).
Types of CDs
1. CD-ROM (Compact Disk Read Only Memory) a common form of optical
Disks on which data, once it has been recorded, cannot be modified.
2. CD-W (CD-Writeable) an optical disk that can be written upon, but only once.
Often called WORM (Write Once Read Many) disks.
3. CD-RW (CD-Rewriteable) on optical disk that allows personal computer users
to replace their diskettes with high-capacity CDs that can be written upon and
edited over.
2. DVD (Digital Versatile Disc): Are spherical in shape that can store data on 2 sides.
Stores data on tracks in a random way. Data retrieval is in random order. Storage
capacity is about 4 GB. Writing of data on DVD is done by a device called DVD
writer/burner. There are several formats on the market, such as:
DVD-ROMs - read only, the data is written to them before they are sold.
DVD-R - meaning DVD-Recordable, the user can write data to the DVD once or
fill it over time using multi-session.
DVD-RW - meaning DVD-ReWritable, the DVD can be written and re-written to.
Unlike multi-session discs, existing data can be overwritten.
Uses of DVDs:
*NB: - Virtual Memory – Refers to temporary storage (on hard disk) used by the
computer to run programs that need more memory (RAM) than the computer has. For
example, programs could have access to 4 gigabytes of virtual memory on a
computer's hard drive, even if the computer has only 32 megabytes of RAM.
ii. Distance learning made easier through chartrooms, digital interactive television,
CD-ROM (storage of encyclopaedia, learning materials (content)). Learning materials
like the encyclopaedia can be stored on the CD ROM as it will have the following
advantages as compared to a printed (manual) encyclopaedia:
Cannot write to it so cannot be changed.
Can use sound, text as well as video for students to understand better.
Search of data is quicker.
Can printout data conveniently.
It takes up less space.
Is more portable.
iv. Computers can be used to organise events in schools, for example, parents’ visits,
timetable, etc.
v. Used to store students data, exams, teachers records, etc.
vi. Used as teaching aids in all subjects. Enables interactive teaching
vii. For marking multiple choice examinations on scanner sheets
viii. For storage of student data pertaining to subjects, teachers and subjects taken.
ix. Used as a subject for student to learn, e.g. Computer Science, Information
Technology, etc.
x. Used for carrying out researches and experiments which may be dangerous for
human beings to do.
xi. Computers can also be used in Computer Aided Learning (CAL) and Computer
Aided Instruction (CAI).
CAI: a teaching system that operates on drill and practice principle, for instance, in
teaching computers, a student is presented with a word and its meaning. The student
studies it and will be asked its meaning at a later stage.
CAL: This whereby a lesson is rehearsed before the computer and then played back to
the class when the teacher is not physically present. The computer is thereby used to
teach the pupil. For example, the computer present a topic just like a teacher does in a
lesson. Pupils are asked questions. If they fail, the lesson is repeated; otherwise a new
topic will be presented. CAL has the following advantages:
This system allows pupils to study at their own pace, repeating sections they
do not understand.
Material is presented in a consistent way making learning easier.
Few teachers are required.
Computers are endlessly patient and can repeat sections that pupils did not
understand without hesitation.
xii. Used for typing and printing examination papers and keeping of student results.
Some schools have pupils who are either blind or partially sighted. Computers could
be used to help these pupils to learn in the following ways:
Use of sound (voice) output and speech synthesiser.
Use of speech (voice) input, recognition or microphones.
Type using large characters (large font size) on the screen.
Use of Braille keyboards, touch screens, touch pads.
Use of bright colours to improve visibility.
Use of scanners to input information and output speech.
Use of printers which give output in Braille
Xiii: Electronic Registration (e-registration) of students
xiv. E-marking of student examinations
ii. Used for cash disbursement at the Automated Teller Machine (ATM). An ATM is
a computerised, special purpose cash disbursement machine outside banking halls
used even when banks are closed. Services offered at the ATM include:
Balance enquiry,
mini-bank statement,
facility to change PIN code,
cash withdrawal, etc
PIN (Personal Identification Number) - a secret number used by individual account
holders to access bank account and get service at the ATM. The account holder needs
a debit card for him/her to access bank services at the ATM.
The Account holder inserts the debit card into the hole on the ATM, which in turn
request the user’s PIN. The user enters the PIN and then presses enter. The ATM
validates the PIN, and if it is correct, allows the user to select service required from
the list of options available. If the user enters the wrong PIN for three consecutive
attempts, the ATM would not eject the debit card, assuming that you are not the
owner of the card and no service shall be given.
iii. Clearance of cheques: The main branch receives cheques from other branches
and processes them using the batch processing method. MICR is used to read data
from the cheques into the computer.
Electronic banking (e-banking): the process of carrying out all bank transactions
electronically on the internet (internet banking) and by use of cell phones. This is
almost similar to tele-banking.
For Internet banking, credit cards are required for clients to get access to the bank
accounts. Data about credit cards is stored on the magnet strip and this includes: Date
of issue, Bank code, Branch code, Account number, Card number and Expiry date.
Information entered by a client to access banking services from home includes:
Account Number, Account name and password.
In home banking, users can stop a cheque, enquire their account balances, transfer
money between accounts, pay bills, order a cheque book, look at account transactions
for a given period, request a change of pin or password, amend or create standing
orders/direct debits, print statements and change personal details. It is impossible to
withdraw cash or pay in cash.
When purchasing the goods, the supermarkets and any other shops check the
following on the credit card:
Check if the card is valid.
Check if credit limit is not exceeded.
Check if credit card is not reported as stolen.
Check if expiry date has not been exceeded.
The introduction of ATMs, EFT and electronic banking, including internet banking has
the following advantages and disadvantages.
Advantages to Bank workers
Their workload is reduced, for instance the burden of counting cash and
service many clients can be done the ATM.
Reduction in mistakes, for instance counting cash and updating wrong
accounts as the computers validate details during entry.
Reduction in working hours.
Increased salaries.
Better working conditions