Notes Ict Master
Notes Ict Master
ICT is the technology required for information processing, in particular, the use of electronic
computers, communication devices and software applications to convert, store, protect,
process, transmit and retrieve information from anywhere, anytime.
INFORMATION
Information refers to the knowledge obtained from reading, investigation, study or research.
The tools to transmit information are the telephone, television and radio. Information is
knowledge and helps us to fulfill our daily tasks.
COMMUNICATION
Communication is an act of transmitting messages. It is a process whereby information is
exchanged between individuals using symbols, signs or verbal interactions. Communication is
important in order to gain knowledge.
TECHNOLOGY
Technology is the use of scientific knowledge, experience and resources to create processes
products that fulfill human needs. Technology is vital in communication.
COMPUTER GENERATIONS
First Generation (1940-1956)
The 1st. generation computer were huge, slow, expensive and often unreliable. In 1946, two
Americans, Presper Eckert and Willian Mauchly build the ENIAC (Electronic Numerical
Integrator and Computer). It use vacuum tube instead of mechanical switches of the MARK 1.
In 1951, Eckert and Mauchly build the UNIVAC, which could calculate at the rate of 10,000
addition per seconds.
The new invention of hardware were needed with the new computer technology. Among them
are vacuum tube, punched card, magnetic tape.
Problems:
• the vacuum tubes generated a great deal of heat causing many problems in
temperature regulation and climate control
• the tubes also burnt out frequently
• people operating the computer did not know that the problem was in the programming
machine
SECOND GENERATION (1956-1963)
The creation of transistor spark the production of 2nd. generation. Transistor was small devices
use to transfer electronic signals across a resister. Compared to other hardware technology,
transistors had many advantages such as:
• transistors were smaller than vacuum tubes
• they needed no warm up time
• consumed less energy
• generated much less heat
• faster and more reliable
THIRD GENERATION (1964-1971)
In the 3rd. generation era, the IBM 370 series were introduced in 1964. It came in several
models and sizes. It was used for business and scientific programs. Other computer models
introduced were CDC 7600 and B2500.
The development of integrated circuit (IC) signal the beginning of the 3 rd. generation. Silicone
chips were manufactured in 1961. Then came the IC technology, which had reduced the size
and cost of computers. It is a complete electronic circuit on a small chip of silicone which is also
known as semi conductor. Other than that, the Magnetic Core Memory was replaced by a
1 fauzi&ghozes@ksah2009
Panitia ICT KSAH
device called the microchip. Also the first 256 bit RAM was introduced and it was the basis for
development of 1K bit RAM.
Advantages:
A new concept in this generation was that of a family of computer which allowed computer to
be upgraded and expanded as necessary.
• Silicone chips were reliable, compact and cheaper.
• Sold hardware & software separately which created the software industry.
• customer service industry flourished (reservation and credit checks)
FOURTH GENERATION (1971- PRESENT)
The growth of the computer industry developed technologies of computer inventions. There are
many types of computer models such as Apple Macintosh, IBM, DELL & ACER.
In 1971 Intel created the first microprocessor. In 1976, Steve Jobs built the first Apple
computer. Then, in 1981, IBM introduced its first personal computer.
During the 4th. generation, hardware technology such as silicone chips, microprocessor and
storage devices were invented. A microprocessor is a chip which is developed for computer
memory and logic.
The microprocessor is a large-scale integrated circuit which contained thousands of transistors.
The transistors are capable of performing all of the functions of a computer's CPU.
Advantages:
• Computers became 100 times smaller than ENIAC the first computer
• Gain in speed, reliability and storage capacity
• Personal & software industry boomed
FIFTH GENERATION (PRESENT & BEYOND)
The 5th. generation are technologically advance and are still being development to become
more efficient. The inventions of new hardware technology have grown rapidly including many
other computer devices such as silicone chips, processor, robotics, virtual reality intelligent
systems & programs which translate languages
NEW ERA COMPUTER
After the 5th. generation computer, the technology has become more advanced, modern &
sophisticated. The latest invention in are Super Computers, Mainframe Computers, Mini
Computers, Personal Computers & Mobile Computers.
In the new era of computers, expert system such as teleconferencing & speech-recognition
system have been invented as part of communication tools.
EDUCATION
In education, teachers, students, researchers and school administrators benefits from the
usage of ICT. Computers offer interactive experiences, enhanced learning, cognitif
development & better management.
Teachers:
~ use computers to search for teaching materials, participate in online forums and online
conferences as well as to aid their teaching.
Students:
~ use the computers as a reference tool. They use computers to browse the internet to look
for information.
Researchers:
~ use computers to collect and process data.
School Administrators:
~ use computers for administrative purposes to make sure that the entire operation runs
smoothly.
BANKING
In the banking, customers, businessman & bank administrator benefits from the usage of ICT.
Customers:
~ can make any transactions at the 24 hour service centres or via online.These services
allow them to do transaction at anytime they want.
Businessman:
2 fauzi&ghozes@ksah2009
Panitia ICT KSAH
~ can save their time by using the online services offered by banks. They can access
company accounts for loan applications, business transactions and update on their cash
flow at any time.
Bank Administrator:
~ can oversee the entire banking activities such as reconciliations, inter-branch transactions
(IBT), telegraphic transfer and others by referring to the banking system.
INDUSTRY
Computers are used to facilitate production planning and control systems, to support chain
management and to help in product design in the industrial sector. In the industrial sector,
workers, researchers and administrator benefits from the usage of ICT.
Workers:
~ use machines that are connected to computers to operate. In some productions, robots are
used to take over jobs that are dangerous to the workers.
Researchers:
~ use computers to analyse and collect research data for future reference.
Administrators:
~ use computers to oversee the entire operations in the plant or factory to detect specific
errors or defects that occurred in the process.
E-COMMERCE
E-commerce helps in boosting the economy. It makes buying and selling activities easier, more
efficient and faster. For this application, computers, Internet and shared software are needed.
In the e-commerce sector, customers, suppliers and employees benefits from the usage of ICT.
Customers:
~ use computers to be connected online with suppliers to purchase products. This method
can save time and cost as they do not have to go to any outlets.
Suppliers:
~ use computers to keep track of their transactions. All products are bar coded and can be
read by the computer scanner to help in determining prices and managing inventory.
Employees:
~ use computers and telephones to communicate with their customers for any enquiries. The
system helps employees to get the latest updates on inventory to be informed to the
customers.
OTHER SECTORS:
Among other sectors that benefit from the usage of ICT are archiecture, arts, career,
goverment, healthcare, home, law enforcement, transportation and travel
3 fauzi&ghozes@ksah2009
Panitia ICT KSAH
1. COMPUTER ETHICS
Computer ethics is a system of moral standards or values used as a guideline for computer
users. It is needed to stop the current technology products from being exploited.
4 fauzi&ghozes@ksah2009
Panitia ICT KSAH
2. CODE OF ETHICS
Ethics is a moral philosophy where a person makes a specific moral choice and sticks to it.
Code of ethics in computing means moral guidelines to refer to when using the computer
and the Internet.
3. INTELLECTUAL PROPERTY
Intellectual property refers to any product of human intellect that is unique and has value in
the market place. This covers ideas, inventions, unique name, computer program codes and
many more.
4. PRIVACY
Privacy in IT refers to data and information privacy. In general, data include texts, numbers,
sounds, images and video. Information privacy is described as the rights of individuals and
companies to deny or restrict the collection and use of information about them.
5. COMPUTER CRIMES
Computer crimes is defined as any criminal activities that are related to the use of
computers. These activities include computer fraud, copyright infringement, computer theft
and computer attack.
6. CYBER LAW
Cyber law refers to any laws relating to protecting the Internet and other online
communication technologies.
ETHICS LAW
Free To Follow: Computer users are free to Must Follow: Computer users must follow
follow or ignore the code of ethics. the regulations and law.
Intellectual property laws are needed to establish and safeguard the intellectual property which
refers to works created by inventors, authors and artists. It is also needed as businesses today
continue to expand globally. There are four types of Intellectual Property protection. They are
patents for invention, trademarks for brand identity, designs for product appearance and
copyright for material.
5 fauzi&ghozes@ksah2009
Panitia ICT KSAH
Methods of Authentication
There are two commonly used authentication methods, which are biometric device and
callback system. Biometric device is a device that translates personal characteristics into a
digital code that is compared with a digital code stored in the database. Biometric devices
include Fingerprint Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal
Scanning, Voice Recognition and Signature Verification. Callback system refers to the checking
system that authenticates the user.
Methods of Verification
There are two methods used in verification, which are user identification and processed
object. User identification refers to the process of validating the user. Processed object refers
to something the user has such as identification card, security token and cell phone.
Pornography:
• can lead to criminal acts such as exploitation of women and children
• can lead to sexual addiction or perversion
• can develop low moral value towards other men, women or children
• can erode good religious, cultural and social beliefs and behaviour
Slander:
• can develop into a society that disregards honesty and truth
• can develop bad habit of spreading untruths and rumours
• can lead to unnecessary argument
• can cause people to have negative attitudes towards another person
Internet filtering is a process that prevents or blocks access to certain materials on the Internet.
It is a process of controlling the access to the internet by means of filtering software. It is used
to prevent children from accessing inappropriate material and to keep employees productive on
the Internet.
The current preferred method of choice to limit access on the Internet is to filter content either
by:
• keyword blocking
• site blocking
• web rating systems
These methods require software to be installed at a client of server level.
6 fauzi&ghozes@ksah2009
Panitia ICT KSAH
Cyber Law is needed as in the recent years, many concerns and issues were raised on the
integrity and security of information, legal status of online transactions, privacy and
confidentiality of information, intellectual property rights and security of government data placed
on the Internet.
Fraud:
Computer fraud is defined as having an intention to take advantage over or causing loss to
other people, mainly on monetary basis through the use of computers. Computer fraud includes
e-mail hoaxes, programme fraud, investment schemes, sales promotions and claims of
expertise on certain fields.
Students need to be aware of other computer frauds such as health frauds, scams and
hacking. Students will also most likely get false information while researching information on
the Internet.
Copyright Infringement:
Copyright infringement is defined as a violation of the rights secured by a copyright. It involves
illegal copy or reproduction of copyrights material by the black market group. The open
commercial sale of pirated item is also illegal. With the current technology, the most perfect
copy of the original copy can be downloaded from the internet.
Theft:
Computer theft is defined as the unauthorised use of another person’s property with the
intention to deny the owner the rightful possession of that property or its use. Examples of
computer theft include:
• transfer of payments to the wrong accounts
• tap into data transmission lines on database at no cost
• divert goods to the wrong destination
Attacks:
Computer attack may be defined as any activities taken to disrupt the equipment of computer
systems, change processing control or corrupt stored data.
Computer attack can be in the forms of:
• physical attack that disrupt the computer facility or its transmission lines.
• an electronic attack that uses the power of electromagnetic energy to overload
computer circuitry.
• a computer network attack that uses a malicious code to exploit a weakness in
software, or in the computer security practices of a computer user.
Computer security means protecting our computer systems and the information they contain
against unwanted access, damage, destruction or modification. Three types of computer
security are:
• hardware security
• software security/data security
• network security
We need to protect our computer from any intruders such as hackers, crackers and script
kiddie.
Malicious code
Malicious code is also known as a rogue program. It will cause undesired effects in the
programmer’s part. The effect is caused by an agent, with the intention to cause damage. The
7 fauzi&ghozes@ksah2009
Panitia ICT KSAH
agent for malicious code is the writer of the code who causes its distribution. There are various
kinds of malicious code. They include virus, Trojan horse, logic door, trapdoor and backdoor,
worm and many others.
Hacking
Hacking is defined as unauthorised access to the computer system by a hacker. Hackers are
persons who learn about the computer system in detail. They write program referred to as
hacks. Hackers may use a modem or cable to hack the targeted computers.
Natural disaster
Computers are also threatened by natural or environmental disaster. Examples of natural and
environmental disasters:
Flood
Fire
Earthquakes, storms and tornados
Excessive Heat
Inadequate Power Supply
Theft
Two types of computer theft:
1) Computer is used to steal money, goods, information and resources.
2) Stealing of computer, especially notebook and PDAs.
Data Protection
We need to protect the data in the computer as it may somehow get lost or corrupted due to
some viruses or mishap like fire, flood, lightning, machine failures and even human errors.
There are a few ways to protect the information namely:
• make backup files
• detect the virus and clean the computer
• warn others on virus attacks
Detecting Illegal Access To Systems
The computer system is able to detect any illegal access to the system by a user who does not
have any authorisation. Tcpwrappers and tripwire are often used to detect any illegal access
(unauthorize) to the system. User's access will be reviewed periodically by computer
operations. On going internal audits will be made to ensure detection of violations of security
and unauthorised modifications to software and data .
Tcpwrappers will control access at the application level, rather than at the socket level like
iptables and ipchains. The system will run tcpwrappers to log access to ftp, tftp, rch, rlogin,
rexec and telnet.
Tripwire will detect and report on any changes in the thousands of strategic system files. The
system will run tripwire to determine if system files have changed.
Preventing Illegal Access To Systems
Computer systems would not allow any unauthorised users to simply access the system. Ways
to prevent illegal access to systems:
• Run anlpassword to make password cracking difficult.
• Run tcpwrappers to check if the name for an ip address can be provided by
DNC
• Use a callback system to prevent unauthorised use of stolen passwords.
Preventing Illegal Root Access
To prevent any illegal root access, we should have Sudo (stands for Superuser do) so that
people can perform on some machine without getting access to the entire root if that is not
required. In addition, with Sudo we did not have to give out the root password.
Sudo is a program in Unix, Linux and similar operating systems such as Mac OS X that allows
users to run programs in the form of another user (normally in the form of the system's
superuser). Sudo allows a permitted user to execute a command as the superuser or another
user, as specified in the sudoers file.
Patch
Patch supplies small updates to software, provided that the source code is available. Patch is a
name of an UNIX utility. It applies a script generated by the different program to a set of files
8 fauzi&ghozes@ksah2009
Panitia ICT KSAH
that allows changes from one file to be directly applied to another file. Resources are not
enough to patch all security holes that we hear about through the bugtraq list.
Informations or study materials are available offline and online. We can search for the
information that we want in books, journals, articles or other resource materials found in the
library and the Internet. A list of all the books, journals and electronic materials are available
from the library. We can use the online databases to find the most useful materials for our
study.
Anyway, the selected materials need to be evaluated in four aspects. They are relevance,
reliability/credibility, perspective & update.
The computer has change the society today as much as industrial revolution changed society in
18th and 19th century. People interacts directly with computer in education, finance,
government, health care, science, publishing, tourism, and industry.
Computers help them to do their work faster and more efficient by using the software
application that consist of special program for specific task.
Home & Education
Today, computers are used in schools, colleges and universities to promote better education.
Students use software packages to complete their assignments. Educators use the computer-
based training and web-based training as replacements for lecture presentation.
Computers for Higher Education
Open Distance Learning (ODL) or online learning can be implemented as computers are the
main medium in delivering the knowledge from one location to the other locations. This type of
learning consists of online forum, discussion, quizzes, test questions and many more. The
example of the Open Distance Learning institution is the Open University of Malaysia.
Business
People use finance or accounting software to balance check books, pay bills, track personal
income and expenses, manage investments and evaluate their financial plans. Accounting
software helps companies to record and report their financial transactions.
Computers in Banking
In the banking sector, many financial institutions offer online banking. People can access their
financial records from anywhere in the world. One example of online banking is Maybank2u.
Most of the packages on banking offer a variety of online services which requires access to the
web. For example we can track our investment online, compare insurance rates and do online
banking.
Industry
By using the CAM system, computers record actual labour, material, machine and computer
time used to manufacture a particular product. Computers process this data and automatically
update inventory, production, payroll and accounting records on the company’s network.
Examples of companies using this system are Proton and Perodua.
Graphics & Multimedia
Computers are crucial in publishing especially in the process of making works available to the
public. These works include magazines, books, newspapers, music and film production.
Special software applications are used to assist graphic designers to develop graphics, texts,
photographs and composing songs.
Communication
A government provides society with direction by making and administering policies. Most
government offices or agencies have websites in order to provide citizens with up-to-date or
latest information. Examples of software applications used for communication include e-mail,
web browsers, newsgroups, instant messaging and video conferencing. We can access
government websites to:
check information on taxes (www.hasil.org.my)
pay parking tickets and check summons (www.jpj.gov.my)
9 fauzi&ghozes@ksah2009
Panitia ICT KSAH
Cooperation in conducting study can be display through delegation of works among team
members. Delegation is the ability to assign tasks to others with the authority, responsibility and
accountability to finish the tasks. This means it is not enough to just give out orders to people
but as a team leader you also need to give specific instructions on what to do. Tell your team
members that they are responsible for the task given to them and explain to them what would
happen to the project if they failed to finish the task.
10 fauzi&ghozes@ksah2009
Panitia ICT KSAH
Input
Input is any data or instructions that we enter into the computer system for processing. There
are four types of input: which are text, graphic, audio and video. Example of input devices are
keyboard, light pen, joystick, microphone, mouse, video & digital camera.
Process
The processing unit controls all activities within the system. The CPU is an example of a
processor. It has the same important as the brain to human being.
Storage
Storage is a location which data, instruction and information are held for future use. It is the
physical material that keeps keeps data, instruction and information. There are two types of
storage. They are the primary storage and secondary storage. The example of storage devices
are hardisk, Floppy Disk, diskette, RAM, CD ROM and DVD ROM.
Output
Output is data that has been processed into a useful form, called information. There are four
types of output, which are texts, graphics, audio and video. Example of output devices are
monitor, printer, speaker and plotter.
Input
Users input data or instruction into the computer system to be process. Input could be either
text, graphic, audio or video. Input devices are used by users to input data. Input devices are
any electronic device connected to a computer and produces input signals.
Process
Data or instruction being input into the computer system is then processed by the CPU which
controls all activities within the system. The results of the processed data are then sent to an
output device as usable data.
A CPU interprets the and carries out the instructions by processing data and controlling the rest
of the computer’s components.
A CPU consists of two subcomponents; the Control Unit (CU) and the Arithmetic Logic Unit
(ALU). CU’s main function is to direct the CPU to process data by extracting instructions from
memory and decodes and executes them. The CU manages a four-step basic operation which
is called a machine cycle. The steps are Fetching, Decoding, Executing & Storing:
Storage
Computer storage is important to help users store programs and data to be used at a later time.
It is also useful to keep current data while being processed by the processor until the
information is saved in a storage media such as a hard disk or a diskette. Computer storage
11 fauzi&ghozes@ksah2009
Panitia ICT KSAH
also stores instructions from a computer program. There are two type of computer storage;
primary storage and secondary storage.
Primary storage is known as the main memory of a computer, including RAM (Random-
Access Memory) and ROM (Read-Only Memory). It is an internal memory (inside the CPU) that
can be accessed directly by the processor.
Secondary storage an external storage that refers to various ways a computer can store
program and data. Many complex functions, such as translators for high-level languages and
operating systems are placed in primary storage. Secondary storage is an alternative storage.
It is very useful to store programs and data for future use.
Output
Output is the result of data processing activity when it is presented external to the system. The
output from a computer can be in a form for use by people, for example, printed or displayed.
There are four types of output, which are texts, graphics, audio and video.
2.1.2.1 State the relationship of data representation: bit, byte and character.
Bit
A bit is the smallest unit of data that the computer can process. Bit is a short for binary digit. A
bit is represented by the numbers 1 and 0. These numbers represent the binary system. They
correspond to the states of on and off, true and false, or yes and no. All digital data use the
binary system to process the information. This information include letters, digits or special
character.
Byte
Byte is a unit of information built from bits. One byte is equals to 8 bits. Eight bits that are
grouped together as a unit. A byte provides enough different combinations of 0s and 1s to
represent 256 individual characters. One byte represents a single character such as the
number 3, letter b or a $ symbol. Bits and bytes are the basis for representing all meaningful
information and programs on computers.
Character
A byte represents a single character in the computer. One character such as A, 7, 9 and + is
eight bits that are grouped together.A byte provides enough different combinations of 0s and 1s
to represent 256 individual characters. For example, the capital letter F is represented by the
binary code 01000110 that can be understood by the computer system. Eight bits grouped
together as a unit are called a byte..
ASCII (American Standard Code for Information Interchange) was established to:
• achieve compatibility between various types of data processing equipment making it
possible for the components to communicate with each other successfully.
• enables manufacturers to produce components that are assured to operate correctly in
a computer.
• make it possible for humans to interact with a computer. It also enables users to
purchase components that are compatible with their computer configurations.
Bit
A bit is represented by the numbers 1 and 0. They correspond to the states of on and off, true
and false, or yes and no.
Byte
1 byte = 8 bit
12 fauzi&ghozes@ksah2009
Panitia ICT KSAH
Kilobyte (KB)
1 KB = 1024 bytes or 1 KB = 210 bytes
Megabyte (MB)
1 MB = 1 048 576 bytes or 1 MB = 220 bytes
Gigabyte (GB)
1 GB = 1 073 741 824 bytes 1 GB = 230 bytes
Terabyte (TB)
1 TB = 1 099 511 627 776 bytes or 1 TB = 240 bytes
Note:
1 KB = 1 024 byte
1 MB = 1 024 KB = 1 048 576 byte
1 GB = 1 024 MB = 1 048 576 KB = 1 073 741 824 byte
1 TB = 1 024 GB = 1 048 576 MB = 1 073 741 824 KB = 1 099 511 627 776 byte
2.2.1.1 Identify the input devices used for text, graphic, audio and video.
13 fauzi&ghozes@ksah2009
Panitia ICT KSAH
2.2.2.1 Identify the output devices used for text, graphic, audio and video
A monitor is an example of an output device that can be used to display text. It can also display
graphics and video. It iaccepts video signals from a computer and displays information on its
screen.
A printer is another example of an output device that can be used to print text, apart from
graphics, on mediums such as paper, transparency film or even cloths. A photo printer is a
colour printer that produces photo-lab-quality pictures.
An image setter produces high quality output compared to an ordinary laser printer. An image
setter is a high resolution output device that can transfer electronic text and graphics directly to
film, plates, or photo-sensitive paper.
A pair of speakers is an audio output device that generates sound. The headphone is a pair of
small speakers placed over the ears and plugged into a port on the sound card. A woofer or
subwoofer is used to boost the low bass sound and is connected to the port on the sound card.
A Liquid Crystal Display (LCD) projector uses its own light source to project what is displayed
on the computer on a wall or projection screen. A digital light processing (DLP) projector uses
tiny mirrors to reflect light which can be seen clearly in a well-lit room.
Identify the location of the central processing unit (CPU), expansion slots,
2.2.3.1
expansion cards, RAM slots, ports and connectors on the motherboard.
Motherboard is the main circuit board which has some electronic components attached to it and
others built into it. CPU, expansion slots, expansion cards, RAM slots, ports and connectors are
the components on the motherboard.
14 fauzi&ghozes@ksah2009
Panitia ICT KSAH
permanently
Processing time Very fast, but uses a lot of power Fast, but uses very little power
Volatility Volatile Non-volatile
15 fauzi&ghozes@ksah2009
Panitia ICT KSAH
16 fauzi&ghozes@ksah2009
Panitia ICT KSAH
UNIX is a multitasking operating system. Some versions of UNIX have a command line
interface but most versions of UNIX offer a graphical user interface.
Linux is a popular, free, UNIX-like graphical user interface operating system. It is an open
source software. Linux provides a great deal of liberty to those that interact with Linux
technology. Although Linux runs on many kinds of equipment, it is best known for its support of
IBM-Intel PC-based hardware.
The three type of user interface are Command-Line, Menu-Driven and Graphical User Interface
.Command-Line User Interface
The command-line user interface requires a user to type commands or press special keys on
the keyboard to enter data and instructions that instruct the operating system what to do. It has
to be typed one line at a time.
17 fauzi&ghozes@ksah2009
Panitia ICT KSAH
It is difficult to use because it requires exact spelling, syntax or a set of rules of entering
commands and punctuation.
We must observe the complicated rules of syntax that specify exactly what you can type in a
given place.
This interface also requires memorisation. It is also easy to make a typing mistake. The
advantage of command-line interface is, it helps the user to operate the computer quickly after
memorizing the keywords and syntax.
Menu Driven Interface
Menu-driven user interface enables the user to avoid memorizing keywords such as copy,
paste and syntax. On-screen, menu-driven interface provide menus as means of entering
commands. It shows all the options available at a given point in a form of text-based menu.
Menu-driven user interfaces are easy to learn.
Graphical User Interface (GUI)
GUI makes use of the computer’s graphics capabilities to make the operating system and
programs easier to use, which is also called ‘user-friendly’. Today GUIs are used to create the
desktop that appears after the operating system finishes loading into memory.
We can easily differentiate the interfaces between Mac OS, Windows XP or Linux by looking at
their desktops. GUI with menus and visual images such as buttons, icons and other graphical
objects to issue commands.
On the desktop, we can initiate many actions by clicking icons that represent computer
resources such as files, programs and network connections. GUI is commonly used and has
become a standard.
18 fauzi&ghozes@ksah2009
Panitia ICT KSAH
Utility programs, also known as service programs, perform maintenance-type tasks related to
the managing of a computer, its devices, or its programs. They provide services not supplied by
other system software programs. Most computers come with built-in utilities as part of the
system software. However they may also be bought separately as external utility programs
such as Norton SystemWorks and McAfee Utilities.
File Manager
File manager is the software used to manage files on a disk. It provides functions to delete,
copy. move, rename and view files as well as create and manage folders (directories). File
manager performs tasks of formatting and copying disks, displaying a list of files on a storage
medium, checking the amount of used or free space on a storage medium, organising, copying,
renaming, deleting, moving and sorting files and also creating shortcuts.
Diagnostic Utility
A diagnostic utility compiles technical information about a computer's hardware and certain
system software programs and then prepares a report outlining any identified
problems.Information in the report assists technical support staff in remedying any problems.
Disk Defragmenter
When an operating system stores data on a disk, it places the data in the first available sector
on the disk. The process of defragmentation is the reorganising of the disk so the files are
stored in contiguous sectors. A fragmented disk has many files stored in non-contiguous
sectors. Defragmenting reorganises the files so they are located in contiguous sectors, which
speeds access time.
Data Compression
Data compression is a utility that removes redundant elements, gaps and unnecessary data
from a computer’s storage space so that less space is required to store or transmit data. With
the increasing use of large graphics, sound, and video files, data compression is necessary to
reduce the time required to transmit such large files over a network.
Compressed files are sometimes called zipped files and it must be unzipped to its original form
before being used. Two popular file compression utilities are PKZIP and WinZip.
Proprietary Software
Proprietary software is also called closed source software. The closed source software or
proprietary software offers a stable system with support if the software fails or malfunctions.
Examples of Proprietary Software are Ms-Dos, Mac OS, UNIX & Solaris.
Open Source Software
Open source software is not a closed software. It is provided for use, modification and
redistribution. Any programmer can make improvements which can result in better quality
software. A programmer can download from the Internet for free and modify with suggested
improvements. The only qualification is that changes can't be copyrighted.
Linux is an example of Open Source Software. Linux is the popular multi-tasking UNIX type
operating system. Some version of Linux are command line. Others are GUI. The two most
popular GUIs available for Linux are GNOME and KDE.
Many application programs, uitlities and plugins have Linux versions including OpenOffice.org,
PHP-Nuke,The GIMP, Mozilla, ClamAV, OpenLDAP, Audacity and RedHat.
Users can obtain Linux in a variety of ways. Some download it for free from the web. Others
purchase it from vendors.
The comparision between proprietary and open source software
SOFTWARE PROS CONS
• security poblems
• runs on a wide range of
hardware • not efficient as a server OS
Windows XP
(Propriety Software) • has largest market share • have to reboot every time a
network configuration is
• has many built-in utility
changed
Mac OS X • easy to install • supports only Apple
19 fauzi&ghozes@ksah2009
Panitia ICT KSAH
Explain the latest open source OS and application software available in the
2.5.1.1
market.
Pervasive computing means the technology that is gracefully integrated in our everyday life.
The user is no longer aware of this embedded technology.
Pervasive computing uses web technology, portable devices, wireless communications and
nomadic or ubiquitous computing systems. Other terms for pervasive computing are Ubiquitous
Computing, Calm Technology, and Things That Think.
Pervasive computing devices are not personal computers, but very tiny - even invisible -
devices, either mobile or embedded in almost any type of object imaginable, including cars,
tools, appliances, clothing and various consumer goods - all communicating through
interconnected networks.
Thee xamples of pervasive computing in our daily lives are which is the automatic Touch 'n Go,
SmartTAG toll gate & the 3G technology video phone.
20 fauzi&ghozes@ksah2009
Panitia ICT KSAH
COMMUNICATIONS
Communications is about the transfer of information from a sender, across a distance, to a
receiver. Using electricity, radio waves or light, information and data in the form of codes are
transmitted through a physical medium such as wire, cable, or even the atmosphere.
The information that is transmitted (sent) can be text, voice, sound, video, graphics and
images, or a combination of all these, which we call multimedia. We transmit information or
data by using two types of signals, namely analog and digital.
Information is now made easy with the availability of network communications. In a clinic for
example, network communications plays an important part in keeping patients’ database for
easy retrieval. Unlike in conventional practice, doctors and nurses have to look for a patient’s
personal file from hundreds or maybe thousands of records. With network communication, the
clinic saves time and manpower. Allocation can be effectively planned.
E-Business
E-business refers to conducting business transactions on the internet, not only limited to buying
and selling but also servicing customers and collaborating with business partners.
E-business supports many types of business transactions, including online shopping, selling
and renting. Users can browse the website and choose from the list of items or services to buy.
Payment is usually via credit card.
Online Education
With a network connections, online education is made possible. Students at any location
around the world can participate in an online classroom, download tutorial questions and
submit their assignments.
E-Banking
E-banking handles all types of banking transactions like account management, fund transfer
and payments primarily over the internet. User can pay bills, check the account balance and
transfer money to other parties, using e-banking facilities twenty four hours a day and seven
days a week.
With e-banking, most of the transactions can be done at home or from the office, thus users
save time on traveling and queuing at the bank counters.
Long Distance Communication
Long distance communication is made easy via network availability. Communication is possible
via voice, text or video. The cost of having this type of communication is cheaper than making a
normal phone call and definitely faster and more effective than corresponding via letters of fax.
In business, important decisions can effectively made through video conference meeting.
21 fauzi&ghozes@ksah2009
Panitia ICT KSAH
LAN is a group of computers and network devices connected together, usually within the same
building. It is the smallest network compared to the other two networks. The simplest form of
LAN is to connect two computers together. LAN is operated within a limited physical area, such
as at home, school, a single building or several buildings. A network which consists of less than
500 interconnected devices across several buildings, is still recognised as a LAN.
Inexpensive hardware used in LAN previously include twisted pair, coaxial cables and the
higher end is fiber optic or wireless. However, coaxial cables are now being replaced by a
higher speed cabling system such as CAT5 using RJ45 connectors.
LAN is a very high speed network (from previously 10Mbps) to 100Mbps, which is faster than
MAN and WAN.
MAN can be defined as a group of computers and network devices connected together within a
large physical area. It is a network of computers located at different sites within a large physical
area, such as a city. Companies that have several branches within the Kuala Lumpur city such
as banks, might find a MAN useful to them.
In this case, setting up a MAN across long distances can be best connected using fiber optics.
Sometimes, a MAN can be a collection of several LANs within the same city. MAN often acts as
a high speed network (although not as fast as a LAN) to allow sharing of regional resources.
WANis the largest network of all network types. The Internet is the largest WAN in the world.
WAN generally covers large distances such as states, countries or continents.
An example in the society using WAN is the banking organisation. Local banks have always
maintained their business online by connecting all computers of their branches in the countries.
International banks also use WAN to connect their computers all over the world.
Actually, WAN is a group of MANs or LANs or the mixture of both networks.
A device called a router is needed to connect the MANs and LANs all over a large physical
area. A router is a special networking device that connects two or more different networks and
keeps data flowing between them.
A router makes all the different networks communicate, such as connecting LAN to LAN, LAN
to WAN or WAN to WAN. The transmission media in WAN uses the fibre optic cable. WAN is
still considered a fast network with speeds 20 – 2000 Kbps, but slower than LAN and MAN.
Client/Server
A client/server network is a network in which the shared files and applications are stored in the
server but network users (clients) can still store files on their individual PCs. A server is a
computer that shares information and resources with other computers on a network. A client is
a computer which requests services or files from a server computer.
Peer-to-Peer
Peer-to-peer network is a network with all the nodes acting as both servers and clients. A PC
can access files located on another PC and can also provide files to other PCs. With peer-to-
peer network, no server is needed; each computer in the network is called a peer. All
computers in the peer-to-peer network has equal responsibilities and capabilities to use the
resources available on the network.
22 fauzi&ghozes@ksah2009
Panitia ICT KSAH
Bus Topology
A bus topology consists of a single central cable to which all computers and other devices
connect. It refers to the main physical pathway or central cable where all other devices are
connected to it. All nodes share the backbone to communicate with each other on the network.
Sometimes, a bus network has more than one server. Sometimes, a server is not needed on
the network. If one of the nodes fails, the bus network would still function as long as the
backbone is working.
Ring Topology
A ring topology consists of all computers and other devices that are connected in a loop. Ring
topology is also known as a ring network. In a ring network each node directly connect to two
neighbouring nodes. A server may exist in a ring network, but it will not connect to all the nodes
in the network. The server, like other nodes, will only communicate to its two neighbouring
nodes.
Star Topology
A star topology consists of a central host which acts as the centre, and all nodes connect to the
host. The host can be a server, hub or router. In a star network, every node will not connect to
the neighbouring nodes. Every node must connect to the host in order to communicate.
The host will control the flow of communication in the network. If one of the nodes fails, the star
network can still function as long as the host is working.
Host failure Network can still run Network will fail Network will fail
Node failure Network can still run Network will fail Network can still run
23 fauzi&ghozes@ksah2009
Panitia ICT KSAH
extending
network
TCP/IP is the internet communication protocol. It is a standard that sets the rules computers
must follow in communicating with each other on a network. Some refer TCP/IP as the Internet
Protocol Suite.
When you use any applications or programs to access the Internet, these application will use
TCP/IP to achieve the task. For example, when you want to surf a network, you will use the
internet browser. Your browser then uses TCP/IP to request services from Internet servers.
These servers will use TCP/IP to send the web pages you requested back to your browser.
Internet
The Internet is the worldwide, publicly accessible system of interconnected computer networks
that transmit data by packet switching using the standard Internet Protocol (IP). It consists of
millions of smaller business, academic, domestic and government networks, which together
carry various information and services, such as electronic mail, online chat, and the interlinked
Web pages and other documents of the World Wide Web. Internet is one of the uses of
communication. Through the Internet, society has access to global information and instant
communication.
Intranet
An Intranet is an internal network that uses Internet technologies and it is a small version of the
Internet that exists within an organisation. It is a private computer network that uses Internet
protocols, network connectivity and possibly the public telecommunication system to securely
share part of an organisation’s information or operation with its employees.
Intranet generally make company information accessible to employees and facilitate working in
groups. Simple intranet applications include electronic publishing of organisational materials
such as telephone directories, event calendars and job postings.
Extranet
An extranet is a private network that uses Internet protocols, network connectivity, and possibly
the public telecommunication system to securely share part of a business’s information or
operations with suppliers, vendors, partners, customers or other businesses.
Package shipping companies, for example, allow customers to access their network to print air
bills, schedule pickups, and even track shipped packages as the packages travel to their
destinations.
• Hub / Switch
• Router
24 fauzi&ghozes@ksah2009
Panitia ICT KSAH
A Network Interface Card (NIC) is an adapter card or PC card that enables the computer to
access the network
Wireless Network Interface Card (WNIC) is a network card that provides wireless data
transmission
There are two types of modem, internal modem and external modem. An internal modem only
works in stand-alone computers. It is built into the computer. An external modem is separated
from the computer and is also mobile.
• Hub / Switch
Hub or switch is a common connection point for devices in a network. Hubs are commonly used
to connect segments of a LAN.
• Router
A router is a communications device that connects multiple computers or other routers together
and transmits data to the correct destination
A wireless access point is a central communications device that allow computers to transfer
data. This device can help information to be transferred wirelessly to other wireless devices or
to a wired network. Wireless access point has high quality antennas for optimal signals.
Identify various types of cables such as Unshielded Twisted Pair (UTP), Shielded
3.2.2.1
Twisted Pair (STP), Coaxial and Fibre Optic Cable.
The twisted-pair cable is generally a common form of transmission medium. It consists of two
wires or conductors twisted together, each with its own plastic insulation.
The twisted wires cancel out electromagnetic interference that can cause, the noise generated
by adjacent pairs. Undesired coupling of a signal from one circuit, part of a circuit, or channel,
to another. The most common connector used for twisted-pair cable is RJ-45. A wave
produced by the interaction of time-varying electric and magnetic fields.
25 fauzi&ghozes@ksah2009
Panitia ICT KSAH
COAXIAL CABLE
The coaxial cable, often referred to as ‘coax’, consists of a single copper wire surrounded by at
least three layers. They are an insulating material, a woven or braided metal and a plastic outer
coating.
This cable is often used as cable television (CATV) network wiring because it can be cabled
over longer distances in comparison to the twisted-pair cable.
FIBRE OPTIC CABLE
The fibre optic cable is a networking medium that uses light for data transmission. The intensity
of light is increased and decreased to represent binary one and zero. The binary system is a
way of counting using just the two numbers 0 and 1.
Its core consists of dozens or hundreds of thin strands of glass or plastic which uses light to
transmit signals. Each strand, called an optical fibre, is as thin as a human hair.
Identify various types of wireless transmission media such as infrared, radio wave and
3.2.2.2
satellite.
WIRELESS TECHNOLOGY
The use of wireless technology as a method of data transport appears very similar to a wired
technology. In a wireless media however, signal transmission is unguided and the device
communicates without using wires between nodes, usually by relying on radio frequencies
instead.
Infrared is used in devices such as the mouse, wireless keyboard and printers. Some
manufacturers provide a special port called the IrDA port that allows a wireless keyboard to
communicate with a PC. Infrared signals have frequencies between 300 GHz to 400 THz. They
are used for short-range communication. Infrared signals have high frequencies and cannot
penetrate walls. Due to its short-range communication system, the use of an infrared
communication system in one room will not be affected by the use of another system in the
next room.
Radio waves are normally omnidirectional. When an antenna transmits radio waves, they are
propagated in all directions. This means that the sending and receiving antennas do not have
to be aligned. The omnidirectional characteristics of radio waves make them useful for
multicasting, in which there is one sender but many receivers. Our AM and FM radio stations,
cordless phones and televisions are examples of multicasting.
An operating system is the program that first loads when a computer boots and manages any
other software or hardware on the computer. A Network Operating System or known as NOS,
has additional functionality that allows it to connect computers and peripherals to a network.
26 fauzi&ghozes@ksah2009
Panitia ICT KSAH
A Network Operating System is most frequently used with Local Area Networks and Wide Area
Networks, but could also have application to larger network systems.Text String, A NOS is not
the same as the networking tools provided by some existing operating systems, Windows XP
for instance. NOS is an operating system that has been specifically written to keep networks
running at optimal performance.
• Windows NT
• Windows 2000 Server
• Windows Server 2003
• Red Hat Linux
WEB BROWSER
A web browser is a software application that enables a user to display and interact with HTML
documents hosted by web servers or held in a file system.Text and images on a web page can
contain hyperlinks to other web pages at the same or to different websites.Web browsers allow
a user to quickly and easily access information provided on many web pages at many websites
by surfing these links.
Web browsers available for personal computers include Microsoft Internet Explorer, Safari,
Netscape and Opera. Web browsers are the most commonly used type of Hypertext Transfer
Protocol (HTTP) user agent. Although browsers are typically used to access the World Wide
Web, they can also be used to access information provided by web servers in private networks
or content in file systems.
EMAIL CLIENT
An email client is a computer program that is used to read and send email.
FUNCTIONS OF FILE TRANSFER PROTOCOL (FTP) CLIENT
File Transfer Protocol (FTP) client is used to connect two computers over the Internet so that
the user of one computer can transfer files and perform file commands on the other computer.
• Straight cable
• Crossed cable
• Subnet Mask
• Server name
27 fauzi&ghozes@ksah2009
Panitia ICT KSAH
3.5.1.1 Describe
NOTEBOOK COMPUTER
A notebook computer or notebook is a small mobile personal computer, usually weighing
from one to three kilograms. Using the technology from Symbionics Networks Ltd., a
wireless LAN adapter can be made to fit on a PCMCIA card in a laptop or notebook
computer to provide mobile computing.
TABLET PC
A tablet PC is a notebook or slate-shaped mobile computer.
Its digitising tablet technology allows the user to operate the computer using a stylus or digital
pen and a touch screen instead of the usual keyboard and mouse.
Most Tablet PCs offer built-in support for wireless networks.
PDA
Personal digital assistants or PDAs are handheld devices that were originally designed as
personal organisers but became much more versatile over the years.
Many PDAs can access the Internet, intranets or extranets via Wi-Fi or Wireless Wide-Area
Networks or WWANs
SMART PHONE
A smart phone is an electronic handheld device that integrates the functionality of a
mobile phone and a personal digital assistant or PDA or other information appliance.
This is often achieved by adding telephone functions to an existing PDA or PDA Phone or
putting "smart" capabilities such as PDA functions into a mobile phone.
28 fauzi&ghozes@ksah2009
Panitia ICT KSAH
29 fauzi&ghozes@ksah2009
Panitia ICT KSAH
broadband access.WiMAX would operate similar to WiFi but at higher speeds, over greater
distances and for a greater number of users.
A WiMAX system will have two major parts:
• a WiMAX base station, similar in concept to a mobile phone tower
• a WiMAX receiver installed at home
4 MULTIMEDIA
Multimedia has played an important role in other fields, such as business, arts, medicine and
engineering. In business, multimedia applications are used in advertising products. Many
companies nowadays develop and distribute catalogues in the form of a CD-ROM as it is more
interesting to the consumers. In art, artists use multimedia elements by combining drawing and
animation. In medicine, doctors can practice or be trained in performing high-risk surgery by
using virtual surgery. In engineering, Computer-Aided Design or CAD is used. By using this
application, engineers can view the design from many aspects and improve on it before
production.
LINEAR INTERACTIVITY
In linear interactivity, the user interacts with the multimedia application without controlling the
progress of the content. In other words, the user is a passive receiver of the multimedia content
most of the time.
The linear content is usually arranged in sequence. An example of the multimedia linear
content is a movie. Although a movie uses a combination of audio, graphics and animations,
the user has no control over the sequence of events.
NON-LINEAR INTERACTIVITY
Unlike linear interactivity, non-linear interactivity allows the user to interact with the content
according to what the user wants from the content. In other words, it is a two-way
communication.
The user can control the progress and sequence of the multimedia content by using buttons or
links. Non-linear interactivity uses tools like “hypertext” to connect a word or a phrase to
another screen.
An electronic book with links to another screen is considered as having non-linear multimedia
content. Hypermedia is also used in non-linear interactivity. This tool is similar to hypertext.
However, it connects to different media elements such as audio and video.
4.1.4.1 Compare and contrast the mediums of delivery for multimedia applications:
• web-based
30 fauzi&ghozes@ksah2009
Panitia ICT KSAH
In the past, Web pages were filled only with static texts and graphics as there were problems in
downloading large multimedia files through the Internet. Downloading a video file could take a
long time as it is large.
MULTIMEDIA TECHNOLOGY IN THE INTERNET
Now, with the advancement of both technologies, most Web pages integrate elements like text,
graphic, audio, video and animation.
These dynamic elements make the process of distributing information through the Internet
more interesting and effective to the user.
There are a lot of multimedia software including plug-ins, players and browsers used in the
Internet. These software allow better quality multimedia programs to be stored and viewed.
• CD-based
CDs like CD-ROM (Compact Disc Read Only Memory) have been used to store and deliver
multimedia content.
CDs are usually used with computers. An improvement of the CD-ROM is the Blu-ray disc
which can store better quality video.
However, the main problem in using CD-ROMs as a medium is that, it can be costly as it takes
a long time to produce a complete multimedia program.
• text
Text is the basic element of multimedia. It involves the use of text types, sizes, colours and
background colour.
In a multimedia application, other media or screen can be linked through the use of text. This is
what you call Hypertext.
To produce an effective multimedia program there are three things that need to be considered.
They are:
• The position of the text on the screen.
• Length of the message
• And legibility of the text.
• graphics
Graphics make the multimedia application attractive. They help to illustrate ideas through still
pictures. There are two types of graphics used: bitmaps (paint graphics) and vector (draw
graphics).
Bitmaps images are real images that can be captured from devices such as cameras or
scanners.
Vector graphics are drawn on the computer and only require a small amount of memory.
31 fauzi&ghozes@ksah2009
Panitia ICT KSAH
• audio
A multimedia application may require the use of speech, music and sound effects. These are
called audio or the sound element. There are two basic types of audio or sound: analog and
digital audio.
Analog audio refers to the original sound signal. Digital audio refers to the digital sampling of
the actual sound. The sound used in multimedia is digital audio.
We can record analog audio file. We can use special audio editors like Sound Forge to convert
analog audio files into digital audio files.
• video
• animation
Animation is a process of making a static image look like it is moving. In multimedia, digital
animation is used. Digital animation can be categorised into two broad area: 2D (2 Dimension)
and 3D (3 Dimension) animations.
2D animation refers to creating movements in basic objects. These objects are put into various
situations or positions and have movement on the screen.
3D animation refers to creating movements to three dimensional digital objects from
photographs. Movements like spinning and flying across the screen are some samples of
animations.
STANDARD FILE FORMATS FOR EACH ELEMENT
32 fauzi&ghozes@ksah2009
Panitia ICT KSAH
• scanner
• video camera
• camera
• audio devices
4.2.2.1 Identify editing software that can be used to produce multimedia elements:
• text editor
33 fauzi&ghozes@ksah2009
Panitia ICT KSAH
• audio editor
With time frame concept authoring tools, the multimedia elements or events are presented and
organised along a time line.This type of tool helps users coordinate when each multimedia
element (text, graphics, audio, video or animation) plays.
In time frame concept authoring tools, a timeline consists of layers which span several frames.
For example a simple presentation could contain three layers; layer one could contain a picture
of a blue sky, layer two could contain a picture of a mountain and layer three a picture of a
mountain climber.
If each of the layers span 10 frames and the user presses the "play" button, then the
presentation will show a picture containing all of the elements in the layers e.g. blue sky, a
mountain and a mountain climber.
If layer one however only spans 5 frames from the beginning, then the blue sky would only
show for 5 frames and then disappear for the remaining 5.
Examples of authoring tools using the time frame concept are Flash and Director. These two
software can support multi platform.
• icon concept
The icon concept in authoring tools provides the multimedia developer with a visual
programming approach to sequencing events in the multimedia application. In this concept,
elements and events are organised in a structural framework.
With icon authoring tools, users can present visually a logical flow of events by dragging icons
from an icon menu.
The icon can represent graphics, audio files, animation, text, movies, and other elements
should be played in a logical flow or flow chart.
These entire icon concept authoring tools use "drag and drop" to pick up and place icons on the
presentation page.
These icons represent:
34 fauzi&ghozes@ksah2009
Panitia ICT KSAH
• card concept
The card concept in authoring tools are based on the idea of card stacks containing graphics,
audio, video, text and animation. Elements and events in card concept authoring tools are
organised as pages in a book or a stack of cards.
When card concept authoring tools starts, a blank page is displayed. Certain objects can be
inserted e.g. text, pictures and buttons. By inserting objects into several pages, a multimedia
"book'' is eventually created.
The developer can create transitions between pages and on the objects themselves. Zoom text
in and out, causing a picture to flow onto the page.
Examples of the card concept in Authoring Tools are ToolBook, HyperCard and SuperCard.
ToolBook uses the Windows platform. ,Hypercard and Supercard uses the Macintosh platform.
• text-based
A text-based Web editor is a basic editor where you work with Hypertext Markup Language
(HTML) tags to create a Web page. It can be used to change HTML source codes. Using a
text-based Web editor requires you to have HTML knowledge to get started. Software such as
Notepad and PSPad are examples of text-based editors. PSPad has additional functions that
include syntax highlighting and toolbars.
• WYSIWYG
WYSIWYG is an acronym for What You See Is What You Get. WYSIWYG web editors provide
an editing interface that shows how the pages will be displayed in a web browser. Using a
WYSIWYG editor does not require any HTML knowledge. It is easier for an average computer
user.
Examples of WYSIWYG web editor are Microsoft FrontPage and Macromedia Dreamweaver.
User interface is a way a computer program communicates with the person who is using it.
There are eight main principles of the user interface.
1. Consistency
2. Clarity
3. Context
4. Navigation
5. Search
35 fauzi&ghozes@ksah2009
Panitia ICT KSAH
6. Personalisation
7. Learnability
8. Flexibility
36 fauzi&ghozes@ksah2009
Panitia ICT KSAH
Based on the needs of target users, the multimedia developer will design a Flow Chart and
Storyboard.
Implementation Phase
Once the Storyboard is confirmed, the multimedia developers will start Implementation Phase.
This phase refers to the process of converting the design plan into a multimedia program. This
is the phase where the multimedia program is produced.
Testing Phase
The multimedia developers will use a Checklist to test the multimedia program. If there are any
errors, the programmer will fix the program.
Evaluation Phase
In the Evaluation Phase, selected users will use an Evaluation Form to try out the program and
give feedback.
Publishing Phase
Finally, when the multimedia program is completed, it will be published to CD.
5 PROGRAMMING
37 fauzi&ghozes@ksah2009
Panitia ICT KSAH
A programming language is a set of words, symbols and codes that enables humans to
communicate with computers. It is a language used for writing computer programs, that direct a
computer to perform computation and to organise the flow of control between mechanical
devices.
38 fauzi&ghozes@ksah2009
Panitia ICT KSAH
Fifth generation programming allows people to interact with computers without needing any
specialised knowledge. People can talk to computers and the voice recognition systems can
convert spoken sounds into written words, but these systems do not understand what they are
writing; they simply take dictation.
Prolog and Mercury are the best known fifth-generation languages.
In the top-down design model, programs are drawn as rectangles. A top-down design means
that the whole program is broken down into smaller sections that are known as modules. A
program may have a module or several modules.
Structured programming is beneficial for organising and coding computer programs which
employ a hierarchy of modules. This means that control is passed downwards only through the
hierarchy.
Examples of structured programming languages include Ada, Pascal and Fortran.
The object-oriented approach refers to a special type of programming approach that combines
data with functions to create objects. In an object-oriented program, the object have
relationships with one another. One of the earliest OOP languages is Smalltalk. Java, Visual
Basic and C++ are examples of popular OOP languages.
Differentiate between structured approach and object-oriented approach in
5.1.3.3
programming.
• Structured programming often uses a top-down design model.
• The object-oriented programming approach uses objects.
Describe the translation method of programming using assembler, interpreter and
5.1.4.1
compiler.
ASSEMBLER
An assembler is a computer program for translating assembly language — essentially, a
mnemonic representation of machine language — into machine language.
For example in intel 80836, the assembly language for the ’no operation’ command is NOP and
its machine code representation is 10010000. Example of assemblers are MACRO-80
Assembler and Microsoft MASM.
INTERPRETER
Interpreter is used to interpret and execute program directly from its source without compiling it
first. The source code of an interpreted language is interpreted and executed in real time when
the user execute it.
The interpreter will read each codes converts it to machine code and executes it line by line
until the end of the program. Examples of interpreter-based language are BASIC, Logo and
Smalltalk.
COMPILER
The source code (in text format) will be converted into machine code which is a file consisting
of binary machine code that can be executed on a computer. If the compiler encounters any
errors, it records them in the program-listing file.
39 fauzi&ghozes@ksah2009
Panitia ICT KSAH
When a user wants to run the program, the object program is loaded into the memory of the
computer and the program instructions begin executing. A compiled code generally runs faster
than programs based on interpreted language. Several programming languages like C++,
Pascal and COBOL used compilers as their translators.
Constants Variables
5.1.5.2 Differentiate between the data types: Boolean, integer, double, string and date.
Integer
Integer data type contains any whole number value that does not have any fractional part.
Double
Any number value that may and could contain a fractional part.
String
Any value that contains a sequence of characters.
Boolean
Boolean type consists either a True or False value. Programmers usually use it to store status.
Function:
Mathematical operators perform mathematical operations such as plus or substract. Relational
operators perform element-by-element comparisons between two arrays. Logical operators
perform logical operations such as checking the condition of two Boolean values.
Symbols:
These operators have their own symbols based on the programming language.
5.1.5.4 Differentiate between sequence control structure and selection control structure.
Usage • Use when want to execute code • Use when want to implement
line by line. decision making process in the
program.
40 fauzi&ghozes@ksah2009
Panitia ICT KSAH
Execution Flow • Execute statement one by one • Execute different statement for
in linear @ consecutive order. different conditions.
Flow Chart
• problem analysis
During the problem analysis phase, the programmer will interview the client to find out what the
client’s needs are.
• program design
Based on that, the programmer will design a flow chart that represents the needs of the client
• coding
Once the flow chart is confirmed, the programmer will perform coding.
If there are any errors, the programmer will do a debugging of the program.
• documentation
After this, the programmer will complete the documentation for the program; this includes the
user manual, a clear layout of the input and output records and a program listing.
PROBLEMS SOLUTIONS
41 fauzi&ghozes@ksah2009
Panitia ICT KSAH
Users often do not participate in views Programmers should show users some
or are incapable of doing so. samples programs (prototyping).
• natural language
Natural Language programming aims to use natural language such as English to write a
program.
Instead of using a specific programming language syntax, natural language programming will
use normal English as the input to program software. Such a technique would mean less
technical programming knowledge is required to write a program.The programmer needs to
define the program using normal language.
42 fauzi&ghozes@ksah2009
Panitia ICT KSAH
6. INFORMATION SYSTEMS
DATA
Data is like raw material. It is not organised and has little value. Data can include text, numbers,
images, audio and video.
INFORMATION
Information is organised data that is valuable and meaningful to a specific user.
INFORMATION SYSTEM
Information system is a set of a related components that collects data, processes data and
provides information.
6.1.2.1 State the usage of Information Systems in education, business and management.
43 fauzi&ghozes@ksah2009
Panitia ICT KSAH
• Process customer ordes, organise production times and keep track of product
inventory : In manufacturing management, information systems are used to process
customers orders, organise production times and keep track of product inventory.
• data
• hardware
• software
• people
• procedure
DATA
Data is very important in information systems. Without data, decision and conclusion cannot be
made. The right data in information systems helps us to make the right decision. For example,
the stock status report in a book store helps the book store's manager to decide when to
reorder their stocks.
HARDWARE
The hardware component in an information system means all computer equipment used to
perform input, processing and output functions. Hardware resources also include all media on
which data is recorded, such as paper, floppy disks and compact discs.
SOFTWARE
The software component in an information system consists of programs for the computers.
These programs allow the computers to carry out most of the instructions related to information
processing. There are two types of software: system software and application software.
System software controls basic computer operations. For example, the Operating Systems are
Microsoft Windows, Linux and Macintosh. Application software are the programs that allow
users to do specific tasks. Examples of application software are Microsoft Excel, Microsoft
Access and SQL Server.
PEOPLE
People involved is information systems personnel and end users.
PROCEDURES
Procedures are operating instructions for the user of an information system. Procedures can be
in the form of guidelines in the user manuals.
6.1.3.3 Describe the interrelation between information system components using a diagram.
44 fauzi&ghozes@ksah2009
Panitia ICT KSAH
45 fauzi&ghozes@ksah2009
Panitia ICT KSAH
46 fauzi&ghozes@ksah2009
Panitia ICT KSAH
A byte is a collection of bits. Each byte consists of eight bits. Each byte represents a character.
A field is a unit of data consisting of one or more characters (bytes). A field is the smallest unit
of meaningful information in the database. Each field has a field name. The field name
describes the data that should be entered into the field, such as StudentID (Student ID), Name,
Address and MyKad Number.
A record is a collection of related fields. Example : Each record stores data about a students.
For example, a student record is a collection of fields about a student.
A file is a collection of related records. For example, a student file is a collection of students’
records.
6.2 Software
47 fauzi&ghozes@ksah2009
Panitia ICT KSAH
A database ensures that data is correct for all files. When a user modifies data in one of the
files in a database, the same data will change automatically in all the files. This is called data
integrity.
6.2.2.1 State the relationship between attribute (field), row (record) and relation (file).
FIELD
Field is a specific category of information in a table. In a table, fields are usually shown in
columns and it has its own field name at the top. For example, StudentID, Name, MyKad
Number, Date of Birth, Gender, Address and Contact Number. All the data within the same
field holds the same data type.
For example, StudentID, Name, Gender, Address and ContactNumber use text as data type.
MyKad Number uses number as data type. Date Of Birth uses date as data type. Several fields
make up a record.
RECORD
Record is a collection of fields about one person, place or thing in a table. Records are
arranged in rows. The records consist of several data type such as of text, date or numerical
data. A record is also known as the row or tuple. For example, we have a total of five records in
this table.
FILE
A file is a set of data arranged in columns and rows. They are grouped together for a specific
purpose. For example, this is a Student Registration System which records all the students’
information.
To form a file, the file must have fields and records. A file is sometimes called a table or
relation.For example, a Book file and a Student file.
There is also another name for a primary key: the unique identifier. In the student table, student
name might not be a good primary key. For example there are two Sulaiman bin Yahya in this
school.
So, the Student Name is not a good primary key. You may use the MyKad Number as the
primary key. Some students might not have their own MyKad Number yet, the MyKad Number
is sometimes rejected as the primary key. To uniquely identify each student, you can add a
special StudentID field to be used as the primary key. For example, each StudentID represents
a student.
48 fauzi&ghozes@ksah2009
Panitia ICT KSAH
A foreign key is the field that matches the primary key in another table. It contains the same
data as those of the primary key in the other table. Foreign key fields are linked to fields in
other tables. While a primary key must have unique values, a foreign key may have duplicate
values.
For example, the StudentID is the primary key in the Student table, but the StudentID is a
foreign key in the Subject table. Since a student may take more than one subject, the foreign
key (StudentID) will have a duplicate value in the subject table.
A primary key ensures data integrity by uniquely identifying each record. It helps to avoid
duplicating records. It prevents null values being entered in the unique field.
A foreign key links to a primary key in another table. While primary keys must have unique
values, foreign keys may have duplicate values. These are the differences between the primary
key and foreign key.
6.2.2.5 State the importance of relationship between the primary key and foreign key.
The primary key of one table becomes a foreign key of the other table. By matching a foreign
key with a primary key, the data does not need to be entered repeatedly.
A primary key makes creating Queries, Forms and Reports easier. A primary key improves
data performance by relating smaller tables into meaningful databases.
6.2.3.1 Define the following database objects/ tools: Table, form, query, report.
OBJECTS
Tables are one of the database objects in Microsoft Access. A Table is a collection of data that
is organised as rows and columns.
Every database object such as Queries, Forms and Reports are based on one ore more
Tables. A database contains at least one Table.
49 fauzi&ghozes@ksah2009