0% found this document useful (0 votes)
654 views28 pages

Ss 3 2nd Term Computer Science

Uploaded by

Onose Godsbless
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
654 views28 pages

Ss 3 2nd Term Computer Science

Uploaded by

Onose Godsbless
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

SALEM SECONDARY SCHOOL

Website: www.salemacademyng.com
SECOND TERM E-LEARNING NOTES
SUBJECT: COMPUTER STUDIES CLASS: SS 3

SCHEME OF WORK

WEEK TOPIC

THEME: INFORMATION AND COMMUNICATIONS TECHNOLOGY


1. Revision of last term’s work.
2. Graphics (Introduction to Corel Draw): (a) Definition of Graphics (ii (b) Examples of graphics
packages: (i) Paint (ii) Harvard
Corel Draw from Programs (H-O-E) (d) Simple designs: Complimentary cards (ii) Business cards
(iii) Birth/congratulatory cards (iv) Schools logo (v) Nigeria flag.
3. BASIC Programming III (One –dimensional array): (a) Defining one –dimensional array (i.e.
using DIM statement) (b) Operations on Array (i) Input of an array (ii) Output of array (iii)
Arithmetic on array (c) Review of the: (i) FOR_NEXT statement (ii) WHILE_END statements (iii)
DIM statements (One dimensional array)
4. BASIC Programming III (One –dimensional array): (d) Write BASIC Program to: (i) State data in
a vector of 10 integer with and without a FOR_NEXT statement (ii) Calculate the average of a
one-dimensional array with 100 numeric values (iii) Calculate the area of 10 different rectangles
with and without the WHILE_END statement (iv) Output the sum of the first 100 integers (v)
Output the value elements of a given array.
5. High Level Languages (H.L.L.): (a) Definition of High Level Language (H.L.L.) (b) Examples of
H.L.L. – BASIC, FORTRAN, ALGOL, C, PASCAL, PL/I, PROLOG, SNOBOL, COBOL. (c) (i) BASIC,
FORTRAN, ALGOL (Scientific) (ii) C, PASCAL, PL/I, (Gen – purpose) (iii) LISP, PROLOG (Artificial
intelligent (AI) (iv) SNOBOL Special purpose programming language (SPL)
6. High Level Languages (H.L.L.): (d) Interpreted Language (i) BASIC (ii) Compiled Language{
PASCAL, COBOL, C, FORTRAN. (d) Features of BASIC, C, PASCAL, COBOL. (e) Advantages
of HILL over ML and LLL.
THEME:CODING SYSTEMS IN COMPUTEROverview of Number Bases: (a) Review of number
bases (i) Binary (ii) Octal (iii) Decimal (iv) Hexadecimal (b) Conversion in number bases (c) Basic
Arithmetic in number bases (i) Addition (ii) Subtraction.
7. Data Representation: (a) Definition of data representation (b) Description data representation
methods: (i) Bits (ii) BCD (iii) EBCDIC (iv) ASCII (c) Computer character sets.
THEME: COMPUTER ETHICS
8. Security and Ethics: (a) Sources of Security Breaches (i) Virus, worms and Trojan horses (ii)
Poorly implemented network (iii) Poorly implemented or lack of ICT policy (iv) Carelessness –
Giving out personal and vital information on the net without careful screening (v) Hackers (b)
Preventive measures (i) Use of anti-virus software (ii) Use of fire wall (iii) Exercising care in
giving out personal and vital information (iv) Encryption (v) Proper network implementation &
policy (vi) Using sites with web certificate (vii) Exercising care in opening e-mails attachments.
9. Security and Ethics: (c) Legal Issues: (i) Copy right (ii) Ownership rights to – Text, Images, Audio,
Video (iii) Web content subject to existing laws of host country (iv) Piracy – software, audio,
video (v) Cyber crimes – Identity theft, Internet fraud. *Hacking(Gaining unauthorized access
to resources with the intention to cause harm).
10. Revision.
11. Mock WASSCE/NECO SSCE.

REFERENCES:
1. HiiT @ School, Computer Studies for Senior Secondary Education
2. MELROSE Computer Studies for SS 3 by O.B. Ajayi
WEEK TWO
TOPIC: GRAPHICS (Introduction to Corel Draw)
CONTENT:
➢ Definition of Graphics
➢ Examples of Graphic Packages
➢ Simple designs

SUBTOPIC 1: DEFINITION AND EXAMPLES OF GRAPHICS PACKAGES


Graphics can be defined as a visual representation on some surfaces, such as a wall, computer screen, paper or
stone, to inform, illustrate or entertain.

There are two types of computer graphics:


Raster Graphics, where each pixel is separately defined (as in a digital photograph), and
Vector Graphics, where mathematical formulas are used to draw lines and shapes, which are then
interpreted at the viewer's end to produce the graphic.
Examples are;

i. Photographs
ii. Drawings
iii. Graphs
iv. Diagrams
v. Numbers
vi. Symbols and other images
Graphics often combine text, illustrations and colours.

Computer Graphics can be defined as the pictorial representation and manipulation of data by a
computer. It is the use of computer to produce pictorial images that can be printed or displayed in a
video display screen/monitor.

Graphic Packages are computer programs that create, display and control images on the computer
screen. They are ready-made computer programs that enable users to perform computer graphics with
ease. A graphic package is the software for image creation.

Examples of Graphic packages

1. Microsoft Paint
2. Harvard Graphics
3. Adobe Photoshop
4. CorelDraw
5. Paint Artist
6. Logo Graphics
7. Instant Artist
8. Ventura
9. Adobe Page maker
10. Photoshop pro
11. Gimp (free and awesome) etc.
USES OF GRAPHIC PACKAGE

1. Graphic package is used to create, edit, display and print graphic images.
2. Graphic packages are used to design letter head paper, birthday cards, wedding card logos,
banners etc.
3. They are used in designing professional art work
4. Graphic packages are commonly used in business and economics to create financial charts and
tables
5. It is used for political purposes to create cartoons, graffiti, poster arts, flag designs etc.
6. Graphics are heavily used in textbooks especially those concerning subjects such as
geography, science and Mathematics in order to illustrate theories and concepts, such as
human anatomy
7. Computer graphics are used in film and animation e.g. The Lord of the Rings, Harry Potter,
Spiderman etc.

FEATURES IN COREDRAW ENVIRONMENT

1. MENU BAR: This is the area that contains the main menu of the package
2. PROPERTY BAR: This is a detachable bar with commands that relate to the active tool or object
3. TOOL BAR: This is a detachable bar that contains short cut to different menu options and other
commands
4. TITLE BAR: This is the area that displays the title of the currently opened drawing
5. RULERS: These are horizontal and vertical borders that are used to determine the size and
position of objects in a drawing (working area)
6. TOOL BOX: A floating bar with tools for creating, filling and modifying objects (shapes) in the
drawing

ASSIGNMENT
Explain with the aid of diagrams, all the tools found on in a CorelDraw tool box.
i. Pick tool
ii. Shape tool (shape, smudge brush, roughen brush, free, transform tool)
iii. Crop tool (crop, knife, erase, virtual segment deletes)
iv. Zoom (zoom, hand)
v. Curve (free hand, Bezier, artistic medial tool, pen, polyline, 3-point curve, interactive
connector, dimension)
vi. Smart tool (smart fill, smart drawing)
vii. Rectangle
viii. Ellipse
ix. Object (polygon, star, complex star, graph paper, spiral)
x. Perfect shapes (basic shapes, arrow shapes, flowchart shapes banner shapes, callout)
xi. Text tool
xii. Interactive tools (interactive blend, interactive contour, interactive drop shadow,
interactive envelop, interactive distortion, interactive extrude, interactive transparent)
xiii. Eye dropper (paint bucket)
xiv. Outline (outline pen dialogue, outline colour, dialogue, no outline etc.)
xv. Fill tools (fill colour dialog, fountain fill, pattern fill, texture fill, foot script fill, no dialog,
colour docker window)
xvi. Interactive fill (interactive fill, interactive mesh)

7. DRAWING WINDOW: The area outside the drawing page border by the scroll bars and
application controls
8. DRAWING PAGE: (Printable area), the rectangular area inside the drawing window. It is the
printable area of your work area.
9. COLOUR PALLETE: This is the a dockable bar that contains colour switches.
10. DOCKER: A window containing available commands and settings relevant to aa specific tool or
task
11. STATUS BAR: An area at the bottom of the application window that contains information about
the object properties such as type, size, colour, fill, resolution. It shows the current mouse
position.
12. DOCUMENT NAVIGATOR: The area at the bottom left of the application window that contains
buttons for moving between pages and adding pages.
13. NAVIGATOR: These are buttons located at the bottom right corner that enables you to move
either forward or backward one page at a time.
The tool box can be categorized into:

1. Utility tool: the pick tool, the shape tool, the zoom tool
2. Diagramming objects (the freehand curve) tool: the rectangle, the ellipse tool, the polygon
tool, the text tool
3. Interactive tools: interactive fill tool, interactive transparency tool, interactive blend tool.
4. Painting tool: outline tool, the fill tool.

LOADING CORELDEAW APPLICATION

To access the CorelDraw application, take the following steps:

1. Click on the start button


2. Point to all programs
3. Point to CorelDraw graphic suite 2020
4. Select CorelDraw 2020
Window Components
You can customize this or any other Toolbar or create additional
A - Standard Toolbar
Toolbars.
The Property Bar is dynamic. Property options change depending on
B - Property Bar what you are working on. This enables you to access commands that
are specific to the current tool or feature you are using.
C - Main Tool Box The main tools you will use are accessed from this bar.
The Rulers show the current mouse cursor location as you move in the
D – Rulers
work area.
The Color Palette by default is located to the right of the work window.
Like the Toolbars, it can also be relocated. You can choose from a
E - Color Palette
preset palette of colors, or use a specific color system such as Pantone
Spot Colors.
The Status Bar is used to give you information about cursor
F - Status Bar
movements or symbol properties such as the fill or size.
The Page Selector is used to add and move between pages. When a file
G - Page Navigator contains multiple pages, individual page tabs appear to the right of the
Page Selector bar.
Dockers allow access to effects, styles, colors, and many other features
H - Docker Tabs of CorelDRAW. They can be floated or “docked” at the side of the
window. When closed, they are accessible through a vertical tab.

EVALUATION
1. Briefly explain the term ‘Computer Graphics’
2. State FIVE examples of graphic packages
3. Identify SEVEN features of Corel draw

SUBTOPIC 2: SIMPLE DESIGNS


The following examples show the step-by-step procedure in using CORELDRAW features to carry out
some simple designs:

Birthday/Congratulatory Cards
• Open a blank document after launching the available coreldraw version
• Go to property bar, click the dropdown menu for setting Paper Type/Size, set to ‘Photocard’
• If you want the card to have a landscape view, Click Layout, on the menu bar, select Switch
Page Orientation
• Use the rectangle tool to draw a rectangle on the Page Layout
• Select the Rectangle, and fill with the desired colour
• In the tool box, select the basic shapes tool. Afterwards go to the Property bar, click the perfect
shapes option that will display the required menu
• Choose the round face shape. Use the tool to create the round face on the green rectangle box,
then use the color picker tool to add yellow color to the round face
• Then add “Happy Birthday” using the text tool, the font size, style, type can be edited as
desired.
• Stylish effects can be added to the text by clicking on Effect in the Menu Bar. From the drop
down menu, chose Add Perspective.

EVALUATION
The students are to carry out the following practical designs:
(i) Complimentary Cards
(ii) Birthday Cards
(iii) Logo - School and NNPC logos
(iv) Nigeria Flag

GENERAL EVALUATION
1. What type of graphic application comes with Windows Operating System by default?
2. Describe the function of each of the following features of CorelDraw;
(a) Menu bar
(b) Property bar
(c) Tool bar
3. Design your personal Complimentary card

READING ASSIGNMENT
Study the topic: BASIC PROGRAMMING

WEEKEND ASSIGNMENT
1. ___involves the representation and manipulation of images by a computer using specialized
software and hardware adapted devices
(a) Imagery (b) Scanning (c) Graphics (d) Coreldraw
2. Corel Draw package can be used for the following except (a) Congratulatory cards (b) Browsing
(c) Business card (d) Logo design
3. Which of the following is an example of Graphic package?
(a) VLC Player (b) YTD Video downloader (c) Internet explorer (d) Ventura
4. There are ___types of Graphics (a) 2 (b) 3 (c) 4 (d) 5
5. The rectangular area inside the drawing window of coreldraw environment is known as
(a) color palette (b) printable area (c) title bar (d) ruler

THEORY
1. Outline the major types of Graphics
2. Explain the functions of the following features;
➢ Status bar
➢ Dockers
➢ Property bar
WEEK 3
TOPIC: BASIC Programming III (One-dimensional array)

CONTENTS
i. Defining one-dimensional array
ii. Operations on Array
iii. Review of the (i) FOR-NEXT Statement, WHILE_END Statement etc
Sub-topic 1
What is an Array?
An array is a group of data items given the same name for processing. Students’ scores in some
subjects, when listed or arranged under a name, constitute an array. OR
An array is a series of elements of the same type placed in contiguous memory locations that can be
individually referenced by adding an index to a unique identifier. Also arrangement of items of
computerized data in tabular form for easy reference and identification is regarded as an array.

Defining one-dimensional array


An array whose values or items are arranged in only one direction is referred to as one-dimensional
array. It is also called a linear list. E.g. [2, 4, 3, 6, 7, 10, 12], [Ade, Ngozi, Zainab, Bello]
Numeric array: contain a set of numbers. The set is given a single name and each number in the
array is called an element of the array.
Dimension Statement (DIM): this specifies the maximum values for any variable subscripted, and
allocates storage accordingly. The default is 10. OR specifies the name of any array as well as the
number of elements in the array. E.g.

10 DIM T(40) Array T has a maximum of 40 elements


15 DIM XI(23), X2(34) Array X1 has a maximum of 23 elements and array X2
Has a maximum of 34 elements
30 DIM SCORE (400) Array SCORE has a maximum of 400 elements

Suppose we have 400 scores listed for 400 students in a test. The set of scores make up an array.
Each score is an element of the array.

Operations on Array:
(a) Input of an array
The program below reads 15 values into array score of 15 elements.

10 DIM SCORE (15)


20 FOR I = 1 TO 15
30 READ SCORE (I)
40 NEXT I
50 DATA 20, 30, 35, 56,22, 76, 66, 56,
55 DATA 45, 68, 87, 49, 90, 89, 73
60 REM DISPLAY THE VALUES READ
65 FOR I = 1 TO 15
70 PRINT SCORE (I)
75 NEXT I
80 END
(b) Output of Array
Program below outputs the value of elements of the array on line groups:

10 DIM SCORE (15)


20 FORJ = 1 TO 15
30 READ SCORE (J)
40 NEXT J
50 DATA 20, 30, 35, 56, 22, 76, 66, 56,
60 FOR J = 1 TO 15
70 PRINT SCORE (J)
80 NEXT J
90 END

Performing Arithmetic on Array


Arithmetic can be carried out on elements of an array using arithmetic operators. The program below
shows how arithmetic operators are used:

10 FOR I = 1 TO 10
12 LET A(I) = I
13 LET B = A(I) + 3
14 LET C = A(I) * 3
15 LET D = A(I) / 3
20 PRINT B; C; D
30 NEXT I
40 END

Evaluation
1. Define an Array in computer
2. What is DIMENTION STATEMENT?

Sub-topic 2
FOR_NEXT Statement
The FOR_NEXT statement is generally used to implement an operation that is to be repeated for a
specific number of times. It is also called looping, see the program below:

10 FOR K = 1 TO 4
20 READ S
30 DATA 6, 7, 10, 8
40 LET A = S * S
50 PRINT S, A
60 NEXT K
70 END

WHILE_END Statement
The While...End While statement acts according to a Boolean test expression. As long as the test
expression evaluates to True, the statement will continue to iterate. The following example shows a
simple While...End While loop.
Dim counter As Integer = 0
Dim total As Integer = 0
While counter < 10
total = total + counter
counter = counter + 1
End While

You can jump out of a While...End While loop by using an Exit statement

LOOP: This can be defined as a set of instructions in a computer program that is repeated in a
particular number of times or until a specific objective has been achieved.

EVALUATION
1. What is FOR….NEXT Statement?
2. What is WHILE…END Statement?

GENERAL EVALUATION
1. What is Loop?
2. What is the difference between READ and INPUT?

READING ASSIGNMENT
Work out examples of FOR….NEXT Statement and WHILE…..END Statement.

WEEKEND ASSIGNMENT
1. Which of the following is a command recognized in BASIC program to identify array
elements? (a) DIM (b) LENS (c) FNS (d) ARRS
2. A one-dimensional array is also referred to as .. (a) Matrix (b) Linear list (c) row
(d) vector
3. The Phrase ‘DIM X(15)’ tells the computer that __ (a) The data is 15X (b) The dimension is
15 (c) An array contains 15X (d) Array X contains 15 elements
4. Every ‘FOR statement must have a ____ command along. (a) Do (b) NEXT (c) WHILE
(d) GOTO
5. The statement ‘FOR J = 1 TO 15’ implies the counter is from (a) 2 to 14 (b) 1 and 15
(c) 15 to 1 (d) 1 to 15
WEEK 4
TOPIC: BASIC Programming III (One-dimensional array)

CONTENTS
i. Write BASIC program to:
(a) State data in a vector of 10 integers with and without a FOR_NEXT statement etc
(b) Calculate the average of a one-dimensional array with 100 numeric value
(c) Calculate the area of 10 different rectangles with and without the WHILE_END statement
(d) Output the sum of the first 100 integers
(e) Output the value elements of a given array.

Sub-topic 1
a. Write a program to put 10 integers into the memory and print them on the screen.

DIM A(10)
FOR 1 = 1 TO 10
READ A (1) // OR INPUT A (1) in an interactive session, i.e. through keyboard
PRINT A(1) // The PRINT statement output data/value of A(I) on the screen
NEXT I
DATA 80, 60, -10, 11, 100, 8, 99, 67, 9, 14 //DATA statement not required if INPUT
END // Statement is used

b. Calculate the average of a one-dimensional array with 100 numeric values.

REM using WHILE…END


DIM value(100)
Count = 1
Total = 0
WHILE count < 101
Total = total + valu(count)
Count = count + 1
PRINT “total =”, total
PRINT Average=”, total/100
END

REM using FOR…NEXT


DIM valu(100)
Count=1
total =0
FOR count=1 TO 100
Total = total + valu(count)
Count=count + 1
NEXT count
PRINT “Total=”,total
PRINT “Average=”,total/100
END
Evaluation
1. Write a BASIC program to compute and display the sum of first 100 integers

Sub-topic 2

c. Calculate the area of 10 different rectangles

REM using WHILE…END


Count=1
WHILE count < 11
Input “base”, b
Input “height”, h
Area = (b*h)/2
PRINT “AREA=”, area
Count=count + 1
END

REM using FOR…NEXT


FOR J = 1 TO 10
Input “base”, b
Input “height”, h
Area = (b*h)/2
PRINT “AREA=”, area
NEXT J
END

d. Output the sum of the first 100 integers

REM using WHILE..END


Count = 1
Sum = 0
WHILE count < 101
PRINT count * 2
END

REM using FOR…NEXT


Count = 1
Sum = 0
FOR I = 1 TO 100
PRINT count * 2
NEXT I
END
Evaluation
1. Output the values of the elements in array TEST(30)
2. Write a BASIC program that would read and display the following scores: 20, 50, 45, 56, 80,
60, 10, 30, 100, 79, in a row

ASSIGNMENT
Revise all the topics from SS1 to SS3

WEEKEND ASSIGNMENT
REVISION (WAEC , NECO)
WEEK 5.
TOPIC: HIGH LEVEL LANGUAGES (HLL)

CONTENT:
(a) Definition of High Level Language (H.L.L.)
(b) Examples of H.L.L. – BASIC, FORTRAN, ALGOL, C, PASCAL, PL/I, PROLOG, SNOBOL, COBOL. (c) (i)
BASIC, FORTRAN, ALGOL (Scientific) (ii) C, PASCAL, PL/I, (General purpose) (iii) LISP, PROLOG
(Artificial intelligent (AI) (iv) SNOBOL Special purpose programming language (SPL)

DEFINITION OF HIGH LEVEL LANGUAGE (H.L.L.)


A high-level programming language is a programming language with strong abstraction from the
details of the computer. In comparison to low-level programming languages, it may use natural
language elements, be easier to use, or may automate (or even hide entirely) significant areas of
computing systems (e.g. memory management), making the process of developing a program simpler
and more understandable relative to a lower-level language. The amount of abstraction provided
defines how "high-level" a programming language is. Examples of high-level programming languages
include FOCUS, Lisp, Perl, Python, and SAS.
Examples of H.L.L
▪ BASIC (Beginners All-purpose Symbolic Instruction code)
▪ FORTRAN (Formular Translation)
▪ ALGOL
▪ C
▪ PASCAL
▪ PL/I
▪ PROLOG
▪ SNOBOL
▪ COBOL (COmmon Business Oriented Language)

Scientific Language
This is the language that is used for scientific and engineering purposes. Examples include FORTRAN –
Formula Translator, BASIC – Beginner All-purpose Symbolic Instruction Codes. It combines the
features of the extensive arithmetic computational ability and the ability to handle mathematical
expression.

Multi-Purpose
This type of high level programming language can cope with a number of different types of application
areas. Examples of multi-purpose language are Visual BASIC, PL/I C++, Java etc.

Commercial Language
This type of program was first developed by the American Government Defensive Department to
create a common administrative language for internal and external use. The prominent language is
COBOL (Common Business Oriented Language).
Artificial intelligence
Researchers have developed several specialized programming languages for artificial intelligence:
IPL was the first language developed for artificial intelligence. It includes features intended to
support programs that could perform general problem solving, including lists, associations, schemas
(frames), dynamic memory allocation, data types, recursion, associative retrieval, functions as
arguments, generators (streams), and cooperative multitasking.
• Lisp:is a practical mathematical notation for computer programs based on lambda
calculus. Linked lists are one of Lisp languages' major data structures, and Lisp source code is
itself made up of lists. As a result, Lisp programs can manipulate source code as a data structure,
giving rise to the macro systems that allow programmers to create new syntax or even
new domain-specific programming languages embedded in Lisp. There are many dialects of Lisp
in use today; among them are Common Lisp, Scheme, and Closure.
• Prolog is a declarative language where programs are expressed in terms of relations, and
execution occurs by running queries over these relations. Prolog is particularly useful for symbolic
reasoning, database and language parsing applications. Prolog is widely used in AI today.
• STRIPS is a language for expressing automated planning problem instances. It expresses an initial
state, the goal states, and a set of actions. For each action preconditions (what must be
established before the action is performed) and post conditions (what is established after the
action is performed) are specified.

Special Purpose Language


This is programming language designed for a specific assignment. It is tailored towards a particular
problem. E.g. Structural Query Language.
SQL is a standard language for accessing and manipulating databases.

General Evaluation
1. What is HLL?
2. List any five HLL.
3. Mention two special purpose languages.
4. Define artificial intelligence.
5. Highlight any three multi-purpose languages.
6. Mention any three artificial intelligence languages.
READING ASSIGNMENT
Read Features of BASIC, C, PASCAL, COBOL and summarize in one page.

WEEKEND ASSIGNMENT
Objectives
1. Which one of the following does not fit classinfication of HLL? (a) general purpose (b)
interpreted (b) object oriented language (d) functional language.
2. High level language instructions are written in ___________ (a) Bytes code (b) 1s or 0s (c)
Mnemonics (d) English language
3. _______ can be assigned various values within a program.
4. It is extremely difficult to program directly in ______________-.
5. Which of the following belong to a special purpose program? (a) SQL (b) COBOL (c) BASIC (d)
JAVA
Essay
1. List five features of BASIC.
2. Briefly describe three Artificial Intellegence programs.
WEEK 6.
TOPIC: HIGH LEVEL LANGUAGES (HLL)
CONTENT:
(d) Interpreted Language (i) BASIC (ii) Compiled Language PASCAL, COBOL, C, FORTRAN.
(e) Features of BASIC, C, PASCAL, COBOL.
(f) Advantages of HLL over ML and LLL.

Sub-topic 1: Interpreted Language


They are languages that must be read and then executed directed, with no compilation stage. A
program called the interpreter is used to read each line of grogram following the program flow,
converts it to machine code and it is used to interpret again if the line is executed again.

Compiled Language
Compiled languages are transformed into an executable form before running. They are of two types:
(a) machine code generation: some compilers compile source code directly into machine code. This
is the original mode of compilation, and languages that are directly and completely transformed to
machine-native code in this way may be called ‘truly compiled’ languages e.g. PASCAL. (b)
intermediate representation: a language that is compiled to an intermediate representation, is that
which can be optimized or saved for later execution without the need to read the source file again.
When the intermediate representation is saved it is often represented by a bite-code. The
intermediate representation must then be interpreted or further compiled to execute it. E.g. Java.

Advantages of HLL over ML and LLL


1. HLL makes a complex programming simpler, whereas low level languages tend to produce
more efficient code.
2. They are considered simply to use due to the numerous technical details, which must be
remembered in ML and LLL.
3. Ease of modification and maintenance.
4. Greater portability for a program.

Evaluation
1. State two advantages of HLL of ML and LLL.
2. Define interpreted language
3. What is compiled language?

Sub-topic 2: Features of BASIC


The features of True BASIC included in the above program include:
The first statement is an optional PROGRAM header. The inclusion of a program header is good
programming style.
Comment statements begin with ! and can be included anywhere in the program.
PROGRAM, LET, PRINT, and END are keywords (words that are part of the language and cannot be
redefined) and are given in upper case. The case is insignificant (unlike C, F, and Java). The DO
FORMAT command converts keywords to upper case.
The LET statement causes the expression to the right of the = sign to be evaluated and then causes
the result to be assigned to the left of the = sign. (The LET statement reminds us that the meaning of
the = symbol is not the same as equals.) It is not necessary to type LET, because the ‘DO FORMAT’
command automatically inserts LET where appropriate. The LET statement can be omitted if the
OPTION NOLET statement is included.
True BASIC does not distinguish between integer numerical variables and floating point numerical
variables and recognizes only two types of data: numbers and strings (characters). The first character
of a variable must be a letter and the last must not be an underscore.
The PRINT statement displays output on the screen.
The last statement of the program must be END.

Features of PASCAL
Pascal has the following features:
• Pascal is a strongly typed language.
• It offers extensive error checking.
• It offers several data types like arrays, records, files and sets.
• It offers a variety of programming structures.
• It supports structured programming through functions and procedures.
• It supports object oriented programming.

Features of C
It is easier to write assembly language codes in C programming.
C Programs are portable i.e. they can be run on any Compiler with Little or no Modification
Compiler and Pre-processor make it Possible for C Program to run it on Different PC
Previous languages have their pros and cons but C Programming collected all useful features
of previous languages thus C become more effective language.
C Program Consist of Different Modules that are integrated together to form complete
program
C Supports efficient use of pointer
Provides Wide verity of ‘Data Types‘
Provides useful Control & Loop Control Statements

Features of COBOL
• The language that automated business
• Allows names to be truly connotative - permits both long names (up to 30 characters) and
word-connector characters (dashes)
• Every variable is defined in detail - this includes number of decimal digits and the location of
the implied decimal point
• File records are also described with great detail, as are lines to be output to a printer - ideal
for printing accounting reports
• Offers object, visual programming environments
• Class Libraries
• Rapid Application Capabilities
• Integration with the World Wide Web

General Evaluation
1. State any two features of BASIC.
2. What do you understand by interpreted language?
3. Give three advantages that high level language has over the others?
4. List four features of COBOL.
5. Enumerate two features of C.
6. Highlight any three features of PASCAL.
READING ASSIGNMENT
Read number bases and provide the binary numbers from 1-15.

WEEKEND ASSIGNMENT
Objectives
1. Assembly languages are written in ________ (a) Bytes (b) Mnemonics (c) 1s and 0s (d)
English like
2. High level = ____________ and ____________ more programmer work.
3. ______________ allows programmers to write instruction sing more English like
statement.
4. It is extremely difficult to programme in ____________---
5. Examples of artificial intelligence language are ________- or __________
Essay
1. Enumerate five advantages HLL.
2. Highlight any three multi-purpose languages.
WEEK 7
TOPIC: OVERVIEW OF NUMBER BASES

CONTENT:
➢ Review of number bases
➢ Conversion in Number bases
➢ Basic Arithmetic in number bases

SUBTOPIC 1: REVIEW OF NUMBER BASES


Most computer systems operates using binary logic. The binary number shystem works like the decimal
number system except that the binary number systems uses base 2, and its digits are 0 and 1 while
decimal system uses base 10 and its digits are from 0 – 9.
The common number systems used in computing are:
(i) Base 10 known as Decimal Number System
(ii) Base 2 known as Binary Number System
(iii) Base 8 known as Octal Number System
(iv) Base 16 known as Hexadecimal Number System

Binary Number system:


The binary numeral system, or base-2 number system, represents numeric values using two symbols,
0 and 1.

Octal Number System:


The octal numeral system is the base 8 number system, and uses the digits 0-7. Numerals can be made
from binary numerals by grouping consecutive binary digits into group of three (starting from the
right). For example, the binary representation for decimal 74 is 1001010, which can be grouped into
(00)1 001 010. Therefore, the octal representation is 112.

Decimal Number System:


the decimal numeral system (also called base ten or occasionally denary) has ten as its base. It is the
most common notation and often refers to a base-10 positional notation.

Hexadecimal Number System:


Hexadecimal (also base 16, or hex) is a positional numeral system with a base of 16, i.e. it uses sixteen
distinct symbols, i.e. 0-9, A-F representing values 10-15.

EVALUATION
Write short notes on the on the various number systems.

SUBTOPIC 2: CONVERSION IN NUMBER BASES


From Decimal to other bases:
To convert from base 10 to any other base, simply divide the given number continuously by the number
base being converted to, until its no longer divisible. Then the remainders are copied in ascending
order.
Example I: Convert 34510 to base 2
2 345
2 172 R1
2 86 R0
2 43 R0 Therefore, 34510 = 1010110012

2 21 R1
2 10 R1
2 5 R0
2 2 R1
2 1 R0
0 R1

Example II: Convert 200010to base 8


8 2000
8 250 R0 Therefore, 200010 = 37208
8 31 R2
8 3 R7
8 0 R3

Conversion from Binary to Decimal


Example I: Convert 1011001012 to base 10
8 7 6 5 4 3 2 1 0 place value
1 0 1 1 0 0 1 0 12 binary digits
= 1 x 2 + 0 x 2 + 1 x 2 + 1 x 2 + 0 x 24 + 0 x 23 + 1 x 22 + 0 x 21 + 1 x 20
8 7 6 5

= 1 x 256 + 1 x 64 + 1 x 32 + 1 x 4 + 1 x 1
= 256 + 64 + 32 + 4 + 1
= 35710

Conversion from Octal to Decimal


458 to base 10
= 4 x 81 + 5 x 80
=4x8+5x1
= 32 + 5
= 3710
Conversion from Hexadecimal to Binary
The hexadecimal number system (base 16) uses group of four bits, the table below can be used for
conversions:
Decimal Binary Hexadecimal
0 0000 0
1 0001 1
2 0010 2
3 0011 3
4 0100 4
5 0101 5
6 0110 6
7 0111 7
8 1000 8
9 1001 9
10 1010 A
11 1011 B
12 1100 C
13 1101 D
14 1110 E
15 1111 F

To convert D14B to binary:


D = 1101, 1 = 0001, 4 = 0100, B = 1011
When we put the pieces together, we get D14B16 = 11010001010010112

BASIC ARITHMETIC IN NUMBER BASES


The rules for adding base 2 numbers are simple;
0+0=0
0+1=1
1 + 1 = 10
1 + 1 + 1 = 11
1 + 1 + 1 + 1 = 100
1 + 1 + 1 + 1 + 1 = 101
Example I: Add the numbers 10101101 + 1011110
10101101
+ 1011110
100001011
Example II: 10001 – 100
10001
100
11012

Example III: Add up 4678 + 4538


467
453
11428
Example IV: Compute FAD16 – BED16
BED16
FAD16
3C016

EVALUATION
Convert the following numbers to the base indicated;
(i) 4910 to base 8
(ii) 1011012 to decimal
(iii) FA616 to binary
Solve the following;
(iv) AB + C
(v) Subtract 678 from 2478

GENERAL EVALUATION
(i) List all the integers available in an octal number system
(ii) If 2578 = (X)2, find X
(iii) 110012 - 1012
(iv) ABBE16 + DE16

READING ASSIGNMENT
Refer to your students’ textbook and study the topic: DATA REPRESENTATION

WEEKEND ASSIGNMENT
1. Which of the following number is not among hexadecimal numbers/
(a) 13 (b) 14 (c) 15 (d) 16
2. Which of the following is equivalent to 12648
(a) 69210 (b) 3425 (c) 56910 (d) 39912
3. If X = 3145 and Y = 245, X + Y = ......................
(a) 3425 (b) 3435 (c) 3445 (d) 3465
4. 101010 / 111 equals (a) 1011 (b) 1101 (c) 110 (d) 11101
5. In hexadecimal, ‘D’ represents (a) 11 (b) 12 (c) 13 (d) 14

THEORY
1. Convert 15.37510 to base 8
2. Convert 10101.110112 to base 10
3. Subtract AF16 from CAD16
WEEK: 8

TOPIC: DATA REPRESENTATION

CONTENT: (a) Definition data representation (b) Description of data representation methods (c)
Computer Character Set

SUB-TOPIC 1: Definition of Data Representations


Data Representation is the way that the physical properties of a medium are used to represent data
and the manner in which data is expressed symbolically by binary digits in a computer.
DescriptionofData Representation Methods:
Data can be represented in the following ways;
Bits- A bit is simply a 1or a 0. A true or a false. It is the most basic unit of data in acomputer. It is also
called machine language. A bit (also called binary) is the basic unit of information in computing and
telecommunication. It is one of two possible distinct states.

BCD: BCD stands for binary coded decimal. It is a digital encoding method for numbers using decimal
notations, with each decimal digit represented by its own binary sequence. In BCD, a numeral is
usually represented by four bits which in general, represents the decimal range 0 through 9 to
00000000 through 00001001. BCD is a method of using binary digits to represent the decimal digits 0
through 9.
BCD Decimal BCD Decimal BCD Decimal
0000 0 0011 3 0110 6
0001 1 0100 4 0111 7
0010 2 0101 5 1000 8

EBCDIC: Extended Binary Coded Decimal Interchange Code: Is an 8-bit character encoding used
mainly on IBM mainframe and IBM midrange computer operating systems.
EBCDIC is a Character set that was developed before the ASCII (American Standard Code for
Information Interchange, became commonly used. Both ASCII and EBCDIC are both 8-bit character
set, unlike the BCD which is a 4-bit character set.

ASCII: The American Standard Code for Information Interchange (ASCII) is a character-encoding
scheme based on the ordering of the English alphabet. ASCII codes represent text in computers,
communication equipment, and other devices that use text. Most modern character-encoding
schemes are based on ASCII, though they support many more characters than ASCII does.

Computer Character Sets


Each Character is stored in the computer as a byte. Since a byte consists of 8-bits, there are 28, or
256 possible combinations of bits within a byte, numbered from 0 to 255. There are two commonly
used character sets that determine which particular pattern of bits will represent which character.
ASCII is used on most minicomputers and PCs, while EBCDIC is used on IBM, Mainframes.

EVALUATION:
1. Discuss any three ways in which data can be represented.
2. What is the advantage of EBCDIC over BCD?
GENERAL EVALUATION:
1. Give the full description of the words ‘ASCII’ and EBCDIC.
2. Which of the computer character set is most popular and why?

READING ASSIGNMENT:
Students are expected to read on ‘Security and Ethics’ on the next page of Handbook on Computer
studies for SS3.

WEEKEND ASSIGNMENT:
1. Write down the ASCII Character table and the symbols of the characters.
WEEK: 9

TOPIC: SECURITY AND ETHICS


CONTENT: (a) Sources of security breaches (b) Preventive measures

SUB-TOPIC 1: Sources of Security Breaches


1. Virus: Virus is a malicious piece of software, designed to spread and cause damage to
programs and files on computers. Some viruses are merely annoying, displaying useless error
messages. Other viruses can destroy your data and prevent your computer from working.
Examples of virus are Trojan horse, worm etc.
Trojan horse: This is a program that does not replicate or copy itself, but causes damage by
tricking you into opening an infected file.
Worm: This is a program that copies itself specifically intended to be distributed to other
computers, via email or network connections.
Virus: This is a program that replicates itself and infects another program by inserting or
attaching itself, especially on files already present on the computer.
2. Hackers: Hackers are people who break into someone’s personal online account without the
permission to do so. Hackers have developed automated programs, such as “cracks.” To break
the passwords in files by raw brute force, trial and error techniques. Since it could take a
month to crack well chosen passwords, some systems now uses aging systems that requires
all users to set new passwords periodically.
3. Poorly Implemented or Lack of ICT Policy: An ICT policy is a statement of what is allowed and
what is not allowed as far as computers id concerned. If such policy is not there or if it is
poorly implemented, there will be a problem because every computer user will be doing
whatever he or she likes.
4. Carelessness: Most of the time, computer security is breached due to the careless behaviour
of some organizations and individuals who do not exercise proper care in safeguarding data
and information.

EVALUATION:
1. Explain the term “sources of security breach”
2. What is a Trojan horse?

SUB-TOPIC 2: Preventive Measures


Preventive measures against computer security breaches are as follows:
1. Use of Antivirus: Antivirus programs are designed to detect and kill viruses. It is very
necessary to buy and install antivirus software in your system. Update your computer
regularly for protection against new viruses. Also scan your computer regularly.
2. Use of Firewall: Firewall is a security arrangement of hardware and of software that prevents
unauthorized access of data, information and storage media on the network. Firewall can also
prevent problems, worms and hackers that may attack your system over the internet.
3. Exercising care in giving out personal and vital Information: People steal personal or
confidential information a lot. The use of usernames and passwords or biometric devices can
help protect information stored on the computer located in the organization or one’s
premises.
4. Encryption: This is the process of converting readable data into unreadable characters with
the aim of preventing unauthorized access. To read an encrypted data, one must have to
decrypt or decipher it into readable form. The unencrypted readable data is known as Bold.
While the encrypted unreadable data are known as Cipher text.
5. Proper Networked Implementation and Policy: Effective management ensures that proper
network implementation and good ICT policy are put in place. Some of the effective
management strategies include the following;
i. Restrict access to those staff who can be trusted
ii. Educate staff on proper handling of electronic items and counter measures should be
adopted.
iii. Carry out effective staff supervision with a view of identifying those who are no longer
trustworthy.
iv. Rotate staff to check collusion and corrupt activities among them.
6. Using Sites with Web Certificates: Your internet service provider can help with a list of
certified websites so that you can know the sites to be avoided. Alternatively you can buy and
register any of the packages like internet filter, surf watch, Cyber patrol, Web Tract, etc.
7. Exercising Care in Opening E-mail Attachments: Spam is an electronic mail or junk newsgroup
posting mainly for the purpose of advertising for some products or services. It can be a
nuisance and a waste of time. It can also distribute virus. Hence care should be adequately
taken when opening e-mails.

EVALUATION:
1. State 5 preventive measures when using a computer.

GENERAL EVALUATION:
1. What is Spam mail
2. What is an internet filter?

READING ASSIGNMENT:
Students are expected to read further on ‘Security and Ethics’ on the next page of Handbook on
Computer studies for SS3.

WEEKEND ASSIGNMENT:
1. Which of these is not an internet security package
(a) Internet filter (b) web tract (c) Surf watch (d) Pal dive
2. Some effective management includes all except;
(a) Restrict access to those staff that can be trusted
(b) Sentimentalism
(c)Carry out effective staff supervision with a view of identifying those who
are no longer trustworthy.
(d)Rotate staff to check collusion and corrupt activities among them.
3. This is the process of converting readable data into unreadable characters
with the aim of preventing unauthorized access is called-------
(a)Cipher text (b) encryption (c) coding (d) hiding
4. A security arrangement of hardware and of software that prevents
unauthorized access of data, information and storage media on the
network.
(a) Firewall (b) anti-wall (d) wall defender (d)Fire tract
5. Which among theses is capable of distributing virus
(a) Spam mails (b) hotmail (c) Gmail (d) board mails
WEEK: 10

TOPIC: SECURITY AND ETHICS II


CONTENT: (a) Legal Issues

SUB-TOPIC 1: Legal Issues


Below are some of the important Legal Issues to be considered when using the ICT;

Copyright: This is the legal right given to the only producer or seller of a creative work, such as
textbook, a piece of music, a painting or a computer program.

Ownership Right: The originator of any textbook, images, audio and video programs has the
ownership rights to such programs. If you want to copy and use any of the programs, you must
accord the originator the due respect and recognition of obtaining permission.

Piracy: This is an illegal copying for personal use, sale or distribution of software, books, tapes, video,
etc. This is a serious offence and the offender must be punished by the law.

Cybercrimes: This is an online or internet-based illegal act. Once a thief has the computer, he or she
can access any document or information that is in the computer.

Hacking: This is gaining unauthorized access to the computer resources with the intention to cause
harm. Hackers breach the security of computer systems owned by banks, and government agencies
just to commit fraud.

EVALUATION:
1. ‘Define the term Hacking’
2. Explain 5 legal issues to be considered when making use of software’s.

GENERAL EVALUATION:
1. State 5 ways in which the internet can be abused.

WEEKEND ASSIGNMENT:
1. The Program that infects computer program files and boot sector is called—
(a) A file infector (b) Trojan horse (c) Worm (d)Virus
2. ----------- is not a preventive measure
(a) Use of antivirus (b) Use of Firewall (c) Encryption (d)Copyright
3. Issues of legal importance in ICT usage include the following except
(a) Piracy (b) Hacking (c) Ownership rights (d) Explorer rights
4. Which of these is not a source of security breach?
(a)Virus (b) Carelessness (c) Poor ICT implementation (d) none of the above
5. The aim of ICT policy is to ensure
(a) Security computing environment for all users
(b)Robust computing environment for all users
(c) Useable computing environment for all users
(d) All of the above.

You might also like