Wednesday, 27 February 2019

2019 SS1 WEEK 11 TOPIC: INFORMATION SYSTEMS

Information systems contain information about important people, places and things within the organization. By information, we mean data that have been converted or processed into meaningful form for human being use. Data in the other words are streams of raw facts representing events happening in an organization or immediate environment before they are organized and arranged into a form that people can use. Three main processes are important in an information system, which are input, processing and output. Input collects raw data from within the organization, from its immediate environment as the case maybe. Processing converts this raw input into more meaningful form. Output conveys the processed information to the people. Information system also needs feedback. Feedback is the output given back to appropriate members of the organization to help them evaluate or correct the input stage. DATA PROCESING Data processing is the stage involved in converting data into meaningful information. It entails collection of data from the scratch to the end. This processing is usually assumed to be automated and running on a computer. Sometimes data processing system is often referred to as information system. GLOBAL POSITIONING SYSTEM (GPS) The Global Positioning System (GPS) is space-based satellite navigation system that provides location and time information in all weather, anywhere on or near the Earth. it is maintained by the united states government and it is freely accessible by anyone with a GPS receiver

2019 SS1 WEEK 10 TOPIC: COMPONENTS OF I.C.T

Types of Broadcasting:  Radio Broadcasting: This is one way wireless transmission over radio waves intended to reach a wide audience. Audio broadcasting can be done via cable radio, local wire television networks, satellite radio and internet radio via streaming media on the internet. Waves are used for receiving AM and FM radio and for wireless telecommunication use radio waves sent through space from one antenna to another as a medium of communication.  Television Broadcasting: Is a mode of television broadcasting which does not make use of satellite transmission or cables- typically using radio waves through transmitting and receiving antennas or aerials.  Satellite TV Broadcasting: satellite television is a television delivered by means of communication satellite and received by an outdoor antenna, usually a parabolic mirror generally referred to as a satellite dish. TYPES OF TELECOMMUNICATION SYSTEM  PUBLIC SWITCHED TELEPHONE NETWORK (PSTN): PSTN Landline is the network of the world’s public circuit switched telephone networks. It consists of telephone lines, fiber optic cables, micro ware transmission links, cellular networks, communication site and any other. Originally a network of fixed line analog telephone system.  SATELLITE TELEPHONE SYSTEM: A satellite telephone, satellite phone, or satphone is a type of mobile phone that connects to orbiting satellite instead of terrestrial cells site. They provide similar functionally to terrestrial mobile telephones; voice, short messaging service and low bandwidth internet access are supported through most system. Depending on the architecture of a particular system, coverage may include the entire earth, or only specific region.  FIXED WIRELESS TELEPHONE SYSTEM: Fixed wireless refers to wireless devices or systems that are situated in fixed locations, such as an office or home, as opposed to devices that are mobile, such as cell phones. Fixed wireless device normally derive their electrical power from utility mains, as opposed to portable wireless devices that normally derive their power from batteries. The rest are:  Mobile Phone System (GSM): refers to as the global system for mobile communication  Circuit Switched Packet Telephone(CSPT) TYPES OF DATA NETWORK: LAN: Local Area Network WAN: Wide Area Network MAN: Metropolitan Area Network PAN: Personal Area Network Internet LOCAL AREA NETWORK: A LAN connects network devices over a limited geographical area such as schools, home, computer laboratory etc. each device on the network is called the node. WIDE AREA NETWORK: A WAN is a computer network that covers large geographical area such as city, country. It can even span intercontinental distances using communication channel which combines telephone line, cables and air waves. A router connects LANS and WAN. A wan differs from a LAN in many important ways. Most wan are not owned by any one organization but rather exist under a collective partnership and management. WAN tends to use technology like ATM. METROPOLITAN AREA NETWORK: this is a network that connects two or more Local Area Network or campus area networks together, but they are smaller than WAN. MAN is applicable for a city. MAN can be operated by a government or a large corporation. PERSONAL AREA NETWORK: A PAN is a computer network is a network used for communicating among different computers that are close to a particular person. Personal computers, printers, fax machines, telephone, scanner and video game consoles are examples of devices that are used for PAN. A PAN may include wired and wirelesses inter connectivity between computers. The coverage of a PAN usually extends to 10 meters. Wired PAN network is usually constructed with USB and fiber wire while wireless is with Bluetooth. INTERNET: This is a global connection of different computers that are linked together. Internet is a set of networks using IP based tools such as web browsers and file transfer applications. The internet network of an establishment is an example of intranet. An extranet is a network that is limited in scope to a single entity and also has limited connections to the networks of one or more users e.g a company customer may be permitted to some part of its intranets.

2019 SS1 WEEK 9 TOPIC: COMMUICATION SYSTEM

MEANNING AND DEFINITION OF ICT: The term ICT keeps on changing fast with technology. About fifteen years ago, there was nothing like internet (Global connection of different computers) but now, we have sophisticated devices that can communicate information in the twinkle of an eye. However, the term ICT stands for I – Information C- Communication T- Technology. I.e. Information and communications Technology. TYPES OF ICT 1. Broadcasting 2. Telecommunication 3. Data networks 4. Satellite communication 5. Information system 1. Broadcasting: This refers to a method of transferring a message to all recipients simultaneously; Broadcasting can be performed as a high level operation in a program. 2. Telecommunication: It is the transmission of information over a significant distance to communicate. Telecommunication involves the use of visual signals such as beacons, smoke signals, semaphore telegraphs, signal flags and optical heliographs or audio messages via coded drumbeats, or sent by loud whistles. In this modern day of electricity and electronics, telecommunication now also includes the use of electrical devices such as telephones, telegraph. 3. Data Network: Data network are telecommunications network that are installed and operated for information exchange between data communication devices such as computers and voice gateways. 4. Information system: Information system is a system that uses information technology, to collect, process, store and disseminate information to support decision making, coordination, control, analysis and approach in an organization. Information system is the pillars for conducting business today. Information system transforms raw data into useful information through information technology. 5. Satellite Communication: Communication satellite provides a means of transmitting telecommunications all over the globe, without the need for a network of wires and cables. They orbit the earth at all times. They orbit the earth at all times. The satellites receive transmission from the earth and transmit them back to numerous earth station receivers scattered within the receiving coverage area of the satellite. BENEFITS OF ICT General benefits · Greater efficiency throughout the school. · Communication channels are increased through email, discussion groups and chat rooms · Regular use of ICT across different curriculum subjects can have a beneficial motivational influence on students’ learning. Benefits for teachers · ICT facilitates sharing of resources, expertise and advice · Greater flexibility in when and where tasks are carried out · Gains in ICT literacy skills, confidence and enthusiasm. · Easier planning and preparation of lessons and designing materials · Access to up-to-date pupil and school data, anytime and anywhere. · Enhancement of professional image projected to colleagues. · Students are generally more ‘on task’ and express more positive feelings when they use computers than when they are given other tasks to do. · Computer use during lessons motivated students to continue using learning outside school hours. Benefits for students · Higher quality lessons through greater collaboration between teachers in planning and preparing resources. · More focused teaching, tailored to students’ strengths and weaknesses, through better analysis of attainment data · Improved pastoral care and behavior management through better tracking of students · Gains in understanding and analytical skills, including improvements in reading · Comprehension. · Development of writing skills (including spelling, grammar, punctuation, editing and re-drafting), also fluency, originality and elaboration. · Encouragement of independent and active learning, and self-responsibility for learning. · Flexibility of ‘anytime, anywhere’ access (Jacobsen and Kremer, 2000) · Development of higher level learning styles. · Students who used educational technology in school felt more successful in school, were more motivated to learn and have increased self-confidence and self-esteem · Students found learning in a technology-enhanced setting more stimulating and student-centred than in a traditional classroom · Broadband technology supports the reliable and uninterrupted downloading of web-hosted educational multimedia resources · Opportunities to address their work to an external audience · Opportunities to collaborate on assignments with people outside or inside school Benefits for parents · Easier communication with teachers · Higher quality student reports – more legible, more detailed, better presented · Greater access to more accurate attendance and attainment information · Increased involvement in education for parents and, in some cases, improved self-esteem · Increased knowledge of children’s learning and capabilities, owing to increase in learning activity being situated in the home · Parents are more likely to be engaged in the school community · You will see that ICT can have a positive impact across a very wide range of aspects of

2019 SS1 WEEK 8 LESSON TOPIC: BASIC ARITHMETIC OPERATION

Content: BASIC ARITHMETIC OPERATORS: They are expressed in terms of a hierarchy of operations in which operations of high priority are performed first. BASIC operator includes the following. OPERATOR SYMBOL OPERATION ^ Exponential * Multiplication / Division + Addition _ Subtraction BASIC ARITHMETIC EXPRESSION These Arithmetic expressions are not formed according to the same rule of Algebra and mathematics. The following symbols are used to denote arithmetic operations. SYMBOL MEANING EXAMPLE IN ARITHMETIC IN BASIC ↑ Exponential BA B↑A * Multiplication A x B A * B / Division A/B A/B + Addition A + B A + B _ Subtraction A - B A - B The following rule most be adhered to Precedence Rules: The BASIC expression equally follows the precedent rule. The computer will perform the exponential first, then multiplication or division, then addition or subtraction And if two or more operators of the same hierarchy appear in an expression, the order of evaluation is from left to right Example Mathematic Expression BASIC Expression a b d (A * B * D) (c + d)(e +f) ( C + D)*(E + F) 6 X3 6 * X^3 (2 X y)/(c-B ) 2 *Y / c – B LOGICAL OPERATORS They operate tests on multiple relations or BOO lean operators Examples: = Equal to < Less than > Greater than <= Less than or equal to <> Not equal to PUNCTUATION MARKS Examples: (.) Decimal (,) Comma (“”) Quotation Mark (:) Colon & Semi colon (;) BASIC STATEMENT: They are statement that causes the computer to execute certain actions. ORDER OF OPERATIONS Line number Remark (REM) Assignment ( LET, INPUT, DATA) Output statement Print Programme terminator [END, STOP] Write a BASIC program to find the area of a rectangle 10 REM PROGRAM TO FIND THE AREA OF A RECTANGLE 20 REM AND PRINT AREA 30 INPUT “ENTER THE LENGTH OF THE RECTANGLE”; L 40 INPUT “ENTER THE BREADTH OF THE RECTANGLE”; B 50 AREA = L* B 60 PRINT “AREA =”, AREA 70 END

2019 SS2 WEEK 9 TOPIC: FILE INSECURITY II

COMPUTER FILES VS. MANUAL FILES: Manual filing is the process of actually handling a physical piece of data. In the days before computers, a person made a folder of data and kept it in a filing cabinet, alphabetized or according to category. When the early computer came along, people converted the data into punched cards system that was readable to the computer. These looked like envelopes but were made of a light cardboard and were loaded into a punch card reader in a stack. The reader then entered the data into the computer, the cards were removed, and another pile put into the machine. ADVANTAGES OF COMPUTERIZED FILES 1. computers can form calculations quickly and efficiently 2. they use up less room 3. Data can be retrieved quickly and easily 4. Documents that lost can often be retrieved 5. Mistakes and changes made can be corrected or changed easily by using the back space or dele keys 6. Quicker to find things and sort things 7. Makes work easier 8. You can find work in seconds with a search tool, much quicker than rifling through folders by hand Limitation of computerized files 1. Computerized filling system is expensive to set up 2. Skilled labor with proficiency in computers is required 3. Not effective where there is irregular electric supply 4. A normal filling system cannot be destroyed by an accidental power loss. Also, hackers cannot access a normal filling system from another computer. This helps security issues

2019 SS2 WEEK 8 TOPIC: FILE INSECURITY

File Security is a feature of your file system which controls which users can access which files, and places limitation on what users can do to files. For example, a file may be secured so that everyone can view it but only certain specific people may change it, while another is secured so that only the owner may view it. Folders may also be secured in this way EFFECTS OF FILE INSECURITY: The general effects of file insecurity are Data loss and overwriting DATA LOSS: Computer users and many experts often consider lost data permanently destroyed, with no hope of recovery. And because much of the information about data loss is complex, inconsistent or inaccurate, it’s not surprising that data loss and data recovery are some of the most confusing and misunderstood concepts. CAUSES OF DATA LOSS 1. Human error 2. Computer viruses 3. Natural disaster 4. Hardware or system problem 5. Software corruption or program problem OVERWRITTING: is a process of writing a binary set of data on the memory. In general it writes over the previous data, hence the name. Overwriting generally occurs when unused file system clusters are written upon wit new data. Data that has been overwritten, even just ones, is generally considered to be unrecoverable. FILE SECURITY METHOD:  Data Backup  Anti-Virus  Password protection  Labeling storage devicesFile Security is a feature of your file system which controls which users can access which files, and places limitation on what users can do to files. For example, a file may be secured so that everyone can view it but only certain specific people may change it, while another is secured so that only the owner may view it. Folders may also be secured in this way EFFECTS OF FILE INSECURITY: The general effects of file insecurity are Data loss and overwriting DATA LOSS: Computer users and many experts often consider lost data permanently destroyed, with no hope of recovery. And because much of the information about data loss is complex, inconsistent or inaccurate, it’s not surprising that data loss and data recovery are some of the most confusing and misunderstood concepts. CAUSES OF DATA LOSS 1. Human error 2. Computer viruses 3. Natural disaster 4. Hardware or system problem 5. Software corruption or program problem OVERWRITTING: is a process of writing a binary set of data on the memory. In general it writes over the previous data, hence the name. Overwriting generally occurs when unused file system clusters are written upon wit new data. Data that has been overwritten, even just ones, is generally considered to be unrecoverable. FILE SECURITY METHOD:  Data Backup  Anti-Virus  Password protection  Labeling storage devices BACKUP or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. There are many ways to backup files. Most computer systems provide utility programs to assist in the backup process, which can become very time consuming if there many files to safe guard. Files are often copied to removable media such as writable CDs or cartridge tapes VIRUS: A computer virus is a self-replicating program that copies itself and that can infect other programs by modifying them or their environment such that a call to an infected program implies a call to a virus. If a virus has any damaging routines, they are known as payloads or warheads. The effects of a computer virus are a loss of information or your computer will shut down or your computer might just break. Care need be apply in what we open or download on the computer Virus types vary. Most have at least one of the following goal: 1. Randomly deletes personal files 2. Send your personal files to the virus programmer 3. Destroys your operating system 4. Infiltrate (and maybe destroy) your boot sector and / or BOIS Antivirus: An antivirus is software to protect your computer from viruses that may try to infect your computer or might have already done so. There are number of antivirus packages available in the market but the most trusted and acceptable are the Norton and McAffe scan. Password Protection: Password protection can prevent people accessing computer systems, accounts, files or parts of files by requiring a user to enter password. This prevents people damaging files or getting into e-mail accounts or network accounts and disrupting them. Storage Device Labeling: You should label your devices like floppies, CDs, DVDs; Pen drives etc. so that you know what you stored in them so are not accidentally deleted or formatted. BACKUP or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. There are many ways to backup files. Most computer systems provide utility programs to assist in the backup process, which can become very time consuming if there many files to safe guard. Files are often copied to removable media such as writable CDs or cartridge tapes VIRUS: A computer virus is a self-replicating program that copies itself and that can infect other programs by modifying them or their environment such that a call to an infected program implies a call to a virus. If a virus has any damaging routines, they are known as payloads or warheads. The effects of a computer virus are a loss of information or your computer will shut down or your computer might just break. Care need be apply in what we open or download on the computer Virus types vary. Most have at least one of the following goal: 1. Randomly deletes personal files 2. Send your personal files to the virus programmer 3. Destroys your operating system 4. Infiltrate (and maybe destroy) your boot sector and / or BOIS Antivirus: An antivirus is software to protect your computer from viruses that may try to infect your computer or might have already done so. There are number of antivirus packages available in the market but the most trusted and acceptable are the Norton and McAffe scan. Password Protection: Password protection can prevent people accessing computer systems, accounts, files or parts of files by requiring a user to enter password. This prevents people damaging files or getting into e-mail accounts or network accounts and disrupting them. Storage Device Labeling: You should label your devices like floppies, CDs, DVDs; Pen drives etc. so that you know what you stored in them so are not accidentally deleted or formatted.

2019 SS2 WEEK 7 TOPIC:HANDLING COMPUTER FILES

When you think of a file, don’t think of a paper file at all. Instead, the file is a container. The container can be very large or small. Unlike a printed sheet of paper, a file can contain a variety of stuff. The container keeps that stuff together and separate from other containers, which also contain stuff separate from other containers. Basic Operations on Computer Files Files on a computer can be created, moved, modified, grown, shrunk and deleted. In most cases computer programs that are executed handles these operations, but the user of a computer can also manipulate files if necessary. The following are some of the basic file operations: 1. Create: To make new file 2. Delete: To remove a file from disk 3. Retrieve: To find a file and bring it back 4. Copy: To reproduce a file so it can have same content as original file 5. View: See the files in a folder 6. Update: To make something more suitable for use now adding new information or changing its content 7. Open: To open a file for editing 8. Close: To close the edited file Creating a sequential file There are several ways to organize data in sequential file. The technique presented here is easy to implement. 1. Choose a DOS file name. A DOS file name is a string consisting of a base name of at most eight characters followed by an optional extension consisting of a period and at most three characters 2. Choose a number from 1through 255 to be the reference number of the file 3. Execute the statement OPEN filename FOR OUTPUT AS #n Where n is the reference number 4. Place data into the file with the WRITE* statement. If a$ is a string, then the statement WRITE #n. a$ Writes the string surrounded by quotation marks into the file. If c is a number, then the statement WRITE #n, c 5. After all the data have been recorded in the file, execute CLOSE #n Where n is the reference number. This statement breaks the communication line with the file and dissociates the number n from the file. This procedure is referred to as closing a file ACCESS A SEQUENTIAL FILE Data stored in a sequential file can read in order and assigned to variables with the following steps: 1. Choose a number from 1 through 255 to be the reference number of the file. This number is not necessary to be the same number that was used when the file was recorded. 2. Execute the statement OPEN filename FOR INPUT AS #n Where n is the reference number. This procedure is referred to as opening a file for input. It establishes a communication line between the computer and the disk drive for reading data from the diskette. 3. Read data from the file with the INPUT* statement. INPUT* statement assigns data from file to variable. INPUT #n. var1, var2 ,……. 4. After the desired items have been found or all the data has been read from the file, close the file with the statement CLOSE #n. Basic function EOF; it tells us if we have reached the end of a file. For example the condition EOF (n) will be true if the end of file n has been reached and false otherwise. EXAMPLE: Write a program to display a table showing the ages in 1991 of the people in the sequential file YOB.DAT. Solution 10 REM Process data from YOB.DAT file to find ages in 1991 CLS 20 OPEN “YOB.DAT” FOR INPUT AS #5 30 PRINT “NAME”, “Age in 1991” 40 DO WHILE NOT EOF (5) 50 REM Process the entire file 60 INPUT #5, name$, year 70 PRINT name$, 1991 – year 80 REM Display name and age in 1991 90 LOOP 100 CLOSE #5 END [run] Name Age in 1991 Barbra 49 Ringo 51 Sylvester 45