CSEC IT Study Guide
CSEC IT Study Guide
NW RM
– Computer Fundamentals
– Networking
– Word-processing
– Spreadsheets
– Database Management
Information Technology - the use of computers to create, process, store, retrieve, and
exchange electronic data and information
Cloud Storage is a model in which Data is stored on remote servers and can be accessed only
via the Internet or cloud. Examples include Dropbox, Google Drive, iCloud and Microsoft
OneDrive.
Local Storage is any physical storage device directly connected internally or externally to the
computer system hardware. Examples include USB drives, memory cards, hard disk drives
and optical disks
Types of Software:
- Systems Software: programs that enable the computer system to run properly and
efficiently, installed before any application software can run.
a. Operating Systems: a set of programs that monitor and coordinate software
and hardware in a computer system, e.g. Windows, Unix, Linux, MS-Dos and
Mac OS.
b. Utilities: a specialized program that assists in maintaining and improving the
efficiency of a computer system, e.g. Backup, Disk Fragmented, Disk Error
Checker, Disk Clean-up and Antivirus.
c. Translators: these are systems software that convert other programming
language instruction to machine language, e.g. assemblers, interpreters and
compilers
- Application Software - programs that enable the user to carry out useful tasks for a
business or personal use. There are two main types of application software: a.
General Purpose: this is used to carry out common tasks and is readily available at
computer stores, e.g. word processing, spreadsheet, presentation and database
b. Special Purpose: this is used to carry out specialist tasks, such as designing
products, e.g. Payroll Package, Peach Tree Accounting and Adobe Photoshop. c.
Custom Written: written for a specific organization/company to perform tasks
specific to what they need in that institution
d. Customisation of General Purpose: modifies a general-purpose software to
be more specific to a company or task. Automates certain tasks
User Interface - the combination of hardware and software that allows users and computers to
communicate with each other effectively.
3. Printer not printing • Loose power cable a. Make sure the USB receiver
• Loose or or cable is plugged in correctly.
disconnected Plug the USB receiver or cable
interface cable into another port.
Networking
Network - the collection of two or more computers and devices connected via
communications devices and transmission media so they can share facilities
Types of Networks:
- Local Area Network (LAN): This is a connection of computers over short distances
through communications media. LAN is a relatively cheap and simple communication
system linking a number of computers, usually microcomputers, within a defined and
small locality. This locality may be an office, a building or a cluster of buildings.
Advantages Disadvantages
- Wide Area Network (WAN): This connects networks across a large geographical area
such as a city, a whole country or several countries. Information can be transmitted
using special high-speed telephone lines, microwave links, satellite links or a
combination of the three. WANs are used mainly by universities and research
centres so that information can be shared, and by large organizations, companies and
banks with branches in different countries.
- Metropolitan Area Network (MAN): This is a high-speed network that connects local
area networks in a metropolitan area such as a city or town and handles the bulk of
communications activity across that region. A MAN typically includes one or more
LANs but covers a smaller geographic area than a WAN.
- Internet: This is a Wide Area Network; it is a huge collection of networks connected
together by what are called gateways.
- Intranet: This is an in-house Web Site that serves the employees of the enterprise. An
intranet is set up entirely within a LAN. Web pages can be stored and accessed from
anywhere on the network and email can be sent internally within the LAN.
- Extranet: This is a private network that enterprises use to provide trusted third parties
such as suppliers, vendors, partners, customers and other businesses, with secure,
controlled access to business information or operations.
Parts of a Network:
- Server: device that receives a request for web information and serves the data to the
client
- Client: device that receives requests and responses from the server - Hub:
device that splits a network connection among multiple computers -
Switch: component that helps devices to connect to the networks
- Router: hardware device that connects computer networks
- Modem: component that converts digital signals to analogue signals through
modulation
- Transmission Media: media through which data is transferred from one computer to
another in a network
Terms to remember:
- Point-to-point: when a device is connected directly to another device by a dedicated
communication channel, giving those devices sole use of that channel
- Uploading: when data from a storage device (e.g. disk) from your computer is sent to
another computer via a communication channel
- Downloading: when data is received from another computer and saved onto a storage
device on your computer via a communication channel
- Broadcast Transmission: arrangement with multiple systems, a broadcast
transmission is one sent out data to all the machines simultaneously
- World Wide Web (WWW): combination of resources and protocols using HTTP -
Hypertext Markup Language (HTML): formatting language for webpage design -
Hypertext Transfer Protocol (HTTP): a secure internet protocol to transfer data over
the web
- Hyperlinks: an icon, graphic or text that links to another file or object -
Web Server: a computer where web content is stores
- Web Page: a simple document on the world wide web
- File Transfer Protocol (FTP): a standard protocol for transmitting files from one
computer system to a next
- Web Browser: an application software used to access the world wide web -
Uniform Resource Locator (URL): the address of a unique resource on the web -
Email: a method of exchanging messages between electronic devices
Implications of Misuse and Cybersecurity
Computer Security or Cybersecurity - the protection of internet-connected systems such as
hardware, software and data from cyberthreats
Computer Misuse - the inappropriate use of computer systems to fulfil illicit or unethical ends
Elements of cybersecurity:
- Threat: a potential negative action or event
- Vulnerability: a weakness in the computer system that can be exploited - Risk: the
potential of a significant impact as a result of exploiting the vulnerability, i.e. the
consequences of the vulnerability.
- Countermeasures: an action, device, procedure, or technique that reduces the
vulnerability or risk
- Attack: an attempt to expose, alter, disable, destroy, steal or gain information through
unauthorized access to a computer system.
o SUM
= SUM([cell 1] : [cell 2])
eg: =SUM(G16:G21)
o AVERAGE
= AVERAGE([cell 1] : [cell 2])
eg: =AVERAGE(G16:G21)
o MAX
= MAX([cell 1] : [cell 2]) eg.
=MAX(G16:G21)
o MIN
= MIN([cell 1] : [cell 2])
eg: =MIN(G16:G21)
o VLOOKUP:
=VLOOKUP([lookup value], [table array], [column number],
[range]) eg: =VLOOKUP(E2,$A$36:$D$38,2,FALSE)
o PMT:
=PMT([annual interest rate]/12, [number of payments], [principal])
eg: =VLOOKUP(E2,$A$36:$D$38,2,FALSE)
o IF:
= IF([“logical test”], [“value if true”], [“value if false”])
eg: =IF(C5="Guyana","Local", "Overseas")
Database Management
Database Management (DBM) - the organisation, manipulation, storage and retrieval of
information in a database
Uses of Databases:
- Telecommunications: call records, monthly bills, maintaining balances - Finance:
storing information about stock, sales, and purchases of financial instruments like stocks
and bonds
- Sales: storing customer, product & sales information
Database Terminologies:
- table
- record or tuple - row
- field - column
- primary key: unique identifier used to identify each record
- secondary or alternate key: candidate field not chosen as primary key -
candidate key: possible option for primary key
- foreign key: primary key of another table
- data type: number, date/time, currency, autonumber
- form:
- query:
- report:
Problem-Solving and Programming
Steps in Solving a problem:
1. Define the problem
2. Propose and evaluate solutions
3. Determine the most effective solution
4. Develop an algorithm
5. Test and validate the solution
Characteristics of Algorithms:
1. The number of steps must be finite: This means that the computer has a definite
number of instructions to follow, and when it comes to the end of those steps, it has
completed the task.
2. The steps must be precise: The instructions or steps must be accurate. A computer
cannot think for itself, so if you make a mistake in the instructions, it will have an
incorrect outcome.
3. The steps must be unambiguous: The steps must be very clear so that they can be
carried out easily.
4. The steps must have a flow of control from one process to another: There may be
many processes involved in a problem, but each process must be related and should
have a clear flow from one process to the other.
5. The steps must terminate: There must be a clear end to the instructions. The final
step in the process of baking a chicken would be to take the chicken out of the oven. 6.
The steps must lead to an output: An algorithm must have at least one output.
Types of Algorithms
- Simple Sequence
- Selection Control Structure
- Looping Control Structure
A constant is a data item whose value remains the same throughout an algorithm or
program, e.g. JOHN or 100.
A data type indicates the type of data that is stored in a variable, e.g. numbers or characters.
The main data types:
- integer (4)
- string (Ronald)
- character (T)
- real (6.7)
- boolean (TRUE)
A condition is an expression that when evaluated returns a true statement or a false statement
based on a condition.
A condition has three main points:
- Variable used before
- Relational operator
- Variable used before or constant
Example: Marks > 60, where Marks is the variable used before, > is the relational operator
and 60 is the constant or variable.
Relational Operators Meaning
= Equal to
> Greater than
< Less than
>= Greater than or equal to
<= Less than or equal to
<> Not equal to
- If-then
IF (Condition) THEN
(Instruction to be carried out if the condition is true)
ENDIF
- If-then-else
IF (condition) THEN
[statement 1]
[statement 2]
ELSE
[statement 1
[statement 2]
ENDIF
- If-then else-if
IF (condition) THEN
[statement 1]
[statement 2]
ELSE
IF (condition) THEN
[statement 1]
[statement 2]
ELSE
IF (condition) THEN
[statement 1]
[statement 2]
ENDIF
ENDIF
ENDIF
Looping Control Structure: used to repeat a set of instructions for a predetermined number
of times or an undetermined number of times while solving a problem
Counting involves increasing the value by a fixed amount repeatedly. This amount may be
one, two, three or any value.
Syntax:
[Counter variable] ← 0
[Counter variable] ← [Counter variable] + 1
Totalling is a progressive total that is arrived at by adding a value to the current total to obtain
a new total.
Syntax:
[Total] ← 0
[Total] ← [Total] + [Variable]
There are two main types of loops:
- For Loop: we use this when we know how many times the loop will execute.
Syntax:
FOR <Counter variable> ← <beginning> TO <ending> DO
<Instructions to be repeated>
ENDFOR
• While Loop: we use this when we do not know how many times the loop will
execute. There are also some phrases that may indicate the type of loop: Dummy
value, terminated by, terminates, repeat until, continue until, continue as long as.
Syntax:
WHILE <Condition> DO
<Instructions to be repeated>
ENDWHILE
Trace table: used to do a ‘dry run’ or ‘manual trace’ of the algorithm to test to see if it is
working
Example 1:
FOR x = 1 to 3 DO
FOR y = 1 to 3 DO
Product = x*y
Print Product
ENDFOR
ENDFOR
Example 2:
AMOUNT = 2
G=4
WHILE AMOUNT < 50 Do
G = G*2
AMOUNT = AMOUNT + G
Print AMOUNT, G
ENDWHILE