0% found this document useful (0 votes)
215 views

ICT 2ND TERM LESSON NOTE ORIGINAL

ict 2nd term lesson note

Uploaded by

ppconcepteze
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
215 views

ICT 2ND TERM LESSON NOTE ORIGINAL

ict 2nd term lesson note

Uploaded by

ppconcepteze
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 81

JSS1 WEEK 1 - LESSON NOTE

BASIC COMPUTER CONCEPT


WHAT IS COMPUTER?

A computer is a combination of electronic and electro-mechanical devices that is capable of


accepting data or information, processing it, storing it or providing output under the control of sets of
instructions called programs.
A computer is a device that is capable of accepting data as input, processes the data and produces
output as information.
Description of a computer as input – process – output (IPO) system
Data ---input unit ----process (arithmetic logic, control unit and main memory) ----output unit
INPUT DEVICES
An input device is any hardware component that allows you to enter data and instructions onto a
computer. Six widely used input devices are the keyboard, mouse, microphone, scanner, digital
camera and PC video camera.
Many input devices can be classified according to:
 Modality of input (e.g. mechanical motion, audio, visual etc.)
 The input is discrete (e.g. key pressing) or continuous (e.g. a mouse’s position, though
digitized into a discrete quantity, is fast enough to be considered continuous),
 The number of degrees of freedom involve (e.g. two dimensional traditional mouse, or three
dimensional navigators designed for CAD applications)
Examples of input devices: keyboard, mouse, microphone, camera, scanner, joystick, light pen, pad,
magnetic cards etc.
POINTING DEVICES,
These are devices used to specify a position in space, can further be classified according to: whether
the input is direct or indirect.
With direct input, the input space coincides with the display space; i.e. pointing is done in the space
where visual feedback or the cursor appears.
Touch screens and light pens involve direct input.
 Examples involving indirect input include the mouse and trackball.
 Whether the positional information is absolute (e.g. on a touch screen) or relative (e.g. with a
mouse that can be lifted and repositioned)
 Note that direct input is almost necessarily absolute, but indirect input may be either absolute
or relative.
JSS1 WEEK 2 - LESSON NOTE
PROCESSING DEVICES

Processing devices, stores, retrieves and processes data.

The Control Unit, Arithmetic and Logic Unit and storage Unit are in data processing unit. Their
function is as follows:

1. The control unit: this tells the rest of the computer system how to carry out a program’s
instructions. It controls the other elements of the system as directed by the program in store.
It also directs controls signals between the CPU, input and output devices. These instructions
are called software. Examples: Windows Vista, Windows XP.
2. The Arithmetic and Logic Unit consists of two Units; the arithmetic unit which performs
arithmetic operations such as addition, subtraction, multiplication and division. The logical
unit performs logical operations such as the comparison of data. That is. Two pieces of data
are compared to see whether one is greater or less than, equal to the other. This comparison
happens inside the processor which is the brain of the computer.
3. The storage unit contains data captured, instructions for processing the data, other associated
control measures and tools like operating systems and utilities, and the resultant product of
processing information. The storage unit is also known as the main memory. It is used for
storing data to be processed and the instruction for processing them.
4. Other examples of processing devices are;
Bluetooth adapter, GPU (Graphic processing unit), Motherboard, network card, RAM, Sound
card, video card etc.
JSS1 WEEK 3 - LESSON NOTE
OUTPUT DEVICES
An output device is any piece of computer hardware equipment used to communicate the results of
data processing carried out by an information processing system (such as a computer) to the outside
world.
In computing, input/output or I/O, refers to the communication between an information processing
system (such as computer), and the outside world. Inputs are the signals or data sent by the system,
and outputs are the signals or data sent by the system to the outside.
EXAMPLES OF OUTPUT DEVICES ARE:

- Speakers
- Headphones
- Screen (monitor)
- Printer
- Projector
- Plotters

Assignment
1. What is an output device?
2. List three examples of output devices
3. What is an input device?
4. List three examples of input device
JSS1 WEEK 4 - LESSON NOTE
COMPUTER ROOM MANAGEMENT ETHICS

Definition of Computer Room

Computer room is a room specially created for keeping computers and other peripheral devices. It is
also called computer laboratory. In designing this room, the components of a computer room must be
put into consideration.

Components of a Computer Room

1. Computer system
2. Furniture (computer tables and chairs)
3. Electric surge protector
4. Stabilizer
5. Air conditioner or ceiling fan
6. Printer
7. Scanner
8. Dust cover
9. Printing paper
10. Photocopy machine
11. Fire extinguisher
12. Multimedia speaker
13. Curtain
14. Uninterruptible power supply
15. Web camera
16. Projector
17. Interactive white board

Definition of Computer Room Management Ethics

This refers to the basic rules and regulations governing the behavior of individuals while using
computers in the laboratory. As a result of the delicate nature of the computer, it is very important to
take good care of the computer to make it work properly. Always keep your computer in a dust-free
room. Clean it regularly using a soft, dry cloth. Never touch the monitor or any part of the computer
with dirty hands.

How to Take Care of Your Computer

1. Always make sure that the computer is kept in a well-ventilated area


2. Place the computer on a desk, not in a closed cabinet
3. There should be appropriate lighting in the computer room to keep the room well lit up.
4. The arrangement of the computer system should be done in a way that the user would not
need to strain their neck, back or eyes.
5. Cables should not be left to litter the ground so as to avoid accident
6. Wipe desk or table tops, component casings and other exposed surface with a soft cloth or
any recommended cleaning product intended for computer use
7. Do not eat or drink anything near your computer
8. Shutdown the machine properly before switching off the power outlet
9. Unplug the system when it is not in use for long.
10. The use of anti-glare is recommended when using computer, in order to protect the eyes.

JSS1 WEEK 5 - LESSON NOTE


COMPUTER LABORATORY RULES AND REGULATIONS

Rules and Regulations of the Computer Laboratory

The following are the rules and regulations of the computer laboratory:

1. Computer room should be kept tidy always by regular cleaning


2. Do not remove or load any software into the computer
3. The security should be very tight to prevent stealing of the equipment.
4. Eating: eating in whatever form should be discouraged.
5. No user should attempt to repair any faulty system but the attention of a qualified engineer
should be called in the event of any faulty equipment.
6. All electrical appliances should be switched off at the end of each day’s activity.
7. Noise: noise of all form should be discouraged such as stereo set, sound set etc.
8. Always shut the door when coming in or going out.
9. On no account should anyone remove cable from the socket.
10. Always shut down the system properly and arrange the chairs before leaving computer room.
11. Always cover the computer system after use.
12. Do not access any restricted files on the computer system.
13. Lousy conversations and cell phones are not allowed in the computer laboratory.
14. All users should record the use of computers in the computer logbook.
15. Users are prohibited to enter the computer laboratory except authorized by the instructor.
16. Scan flash drives before using them.
17. Report all problems related to the computer system to the instructor
18. Do not change the settings in the computer
19. Do not move any equipment from its original position
20. Smoking is not allowed in the computer laboratory
21. Internet facility is strictly for educational purposes only

JSS1 WEEK 6 - LESSON NOTE


ICT APPLICATION IN EVERYDAY LIFE

Meaning of ICT

ICT is an acronym which stands for Information and Communication Technology. It can be
described as a diverse set of technological tools and resources used to communicate and to create,
disseminate, store and manage information. These technologies include;

(i) Computer

(ii) Internet

(iii) Broadcasting technologies (radio and television)

(iv) Telephone

Uses of ICT in Communication

(i) ICT is used to send information across to people using the electronic-mail (e-mail) through the
internet.

(ii) Many people use the GSM (mobile phone) to communicate.

(iii) Audio and Video conferencing is also made possible through the internet. With video
conferencing, people at various distant locations can discuss on different topics. Each of these people
makes their contributions to the topic under discussion.

(iv) Chatting and instant messaging

Uses of ICT in Timing and Control

Many of the devices that are used in everyday life are controlled by small computers to save time.
They are:

(i) Washing machine

(ii) Air conditioning system

(iii) Programmable microwave ovens

(iv) Traffic lights are switched off and on according to programs running on computers which
manage traffic flow through cities

(v) Controlling equipment used for scientific research.

(vi) Monitoring and reporting on the status of security equipment.

(vii) Monitoring and reporting status of weather and other atmospheric activities.
(viii) Manipulating and controlling equipment used in aircraft, ships, oil rigs, Automated Teller
Machines (ATMs), etc.

Uses of ICT in Information Processing/Management

ICT can be used in the following areas of information processing and management.

(i) Typing letters, notes and other documents.

(ii) Distributing and sharing of information.

(iii) Keeping records and inventory, storing, retrieving and manipulating data and information.

(iv) Transmitting information.


JSS1 WEEK 7 - LESSON NOTE

ICT AND SOCIETY

CONTENT

1. Introduction
2. ICT in the Education Industry
3. ICT in the Banking Industry
4. ICT in the Medical Sciences
5. ICT in Government
6. ICT in Law
7. ICT in Airlines

Introduction

Many of us go through our daily routine without noticing how many times we come into contact with
computers. Computer technology has become such a part of our daily lives that if it were taken away
we would lead radically different lives. Information communication technology involves the use of
modern communication channels to convey information. The Global System Mobile –
telecommunication (GSM), Facsimile (Fax), computers, television, satellite, communication, cellular
networks, internet are among the gadgets used for this.

ICT in the Education Industry

ICT has really widened the scope of education. Computers are used to aid student learning through
Computer Aided Instruction (CAI) and Computer Assisted Learning (CAL). CAI takes the form of:

(i) Drills: These allow students to practice concepts through repeated questions.

(ii) Tutorials: They are self-instructional programs that guide the student through new materials, but
which allow the student to move at his/her own pace. The student can repeat a lesson if he/she does
not understand it the first time.

(iii) Simulation: These are basically ‘what if’ analyses. They use sound, text and graphics
(multimedia) to bring about an outcome based on a specific scenario. Topics on different subjects are
on CDs and can be played on the computer by students. Students can then learn at their own paces.
Degree and Masters Courses are also obtainable on internet. These are made possible through on-line
courses.
JSS1 WEEK 8 - LESSON NOTE

ICT AND SOCIETY 11

ICT in the Banking Industry

The bank uses the high power of ICT equipment to handle wide variety of task such as:

(i) Keeping of customer’s accounts

(ii) Processing of cheques

(iii) Processing of deposit and withdrawals

(iv) Money transfer or electronic funds transfer (ETF)

(v) Automated Teller Machine (ATM)

ICT in the Medical Sciences

The versatility of computer and ICT equipment is most useful in medical profession. Doctors, nurses,
pharmacists, physiotherapists, radiologists and researchers find computer to be very useful and
indispensable tools. Many lives have been saved because of the use of computers.

ICT in Government

E-government has become a global phenomenon, especially in the western world. Information from
the government is passed to the citizen’s logical decision much faster and accurate.

ICT in Law

Computers are revolutionizing legal practices rather than spending days researching related cases in
legal case books, lawyers use keyboards to search through massive full text database containing
more cases than in any law office’s library.

ICT in Airlines

An airline reservation agent communicates with a centralized computer via a remote terminal to
update the database the moment a seat on any flight is filled or becomes available
JSS1 WEEK 9 - LESSON NOTE
STARTING UP A COMPUTER (BOOTING)
Booting is a process in which a Computer loads up files while it prepares itself for usage. The first
basic step to boot a computer is to press the Power button.
STAGES IN BOOTING
1. Active BIOS (Basic Input/output System) and setup programs
2. Initiate Power On Self-Test (POST)
3. Load the Operating System.
4. Configure the system for use.
5. Load system utilities
6. Authenticate the user through log in.

TYPES OF BOOTING
1. COLD BOOTING: it is a process whereby the computer starts all processes form the scratch,
e.g. if the computer is just switched on it performs cold booting.
2. WARM BOOTING: It is a process in which the computer initializes booting when the power
is already up. This happens if the computer was on Standby or Sleep. The microprocessor
skips some steps, the process is faster and the computer is ready for use. The keyboard
shortcut for warm booting is achieved by holding the Ctrl, Alt and Del keys of the keyboard
simultaneously.
JSS1 WEEK 10 - LESSON NOTE
SHUTTING DOWN COMPUTER
This is the process of putting off the computer after use.

STEPS TO TAKE IN SHUTTING DOWN THE COMPUTER


1. Save and Close all open applications.
2. Go to Start button
3. Click on shut down
JSS2 WEEK 1 - LESSON NOTE
INTRODUCTION TO GRAPHIC PACKAGES

CONTENT

1. Meaning of Graphic Package


2. Examples of graphic Packages
3. CorelDRAW
4. Loading CorelDRAW 11
5. The Features of a Graphic Package

Meaning of Graphic Package

Graphic packages are programs that allow you to create graphic pictures, logos, letter headed papers,
brochures, calendars, etc. A package is software written to perform a particular task. A graphics
package use lines, shapes, colours and patterns to show information. Apart from being able to draw
lines and other geometric shapes, it is also possible to do full art works and painting in full colours of
any kind of objects. Graphic images can be created using computers.

Examples of Graphic Packages

All these can be produced with art illustration graphic software. They are:

1. Paint
2. CorelDRAW
3. Instant Artist
4. Harvard Graphics
5. Photoshop
6. Logo Graphics

CorelDRAW

This can be defined as a high-quality graphic designed and developed for automating artistic
functions. CorelDRAW was developed by Corel Corporation founded in June 1985. This corporation
has a network of over 100 distributors in more than 40 countries.

CorelDRAW Versions

There are many versions of CorelDRAW ranges from Corel 5, 6, 7, 8, 9, 10, 11, 12, 14, 15 and 16.
The uses of all the versions are similar only with little modifications and improvement to the
advantage of the user. However, the teaching will be based on CorelDRAW 11 versions.
Loading CorelDRAW 11

1. Click the Start button on the task bar


2. Click All Programs
3. Click Corel Graphic Suite 11
4. Click CorelDRAW 11

OR

Double click the CorelDRAW icon on the desktop

JSS2 WEEK 2 - LESSON NOTE


The Features of a Graphic Package

(i) Title Bar: It displays application name and file name at the top of the package.

(ii) Menu Bar: It displays the various command used to work on the program.

(iii) Page Layout: This is a workspace for user’s work. It is otherwise known as printable page.

(iv) Standard Tool Bar: This bar contains icons and commands for performing operations on
documents.

(v) Status Bar: It displays detailed information about programs selected.

(vi) Ruler: This is used for measuring objects in order to obtain accurate size. There are two
types: horizontal and vertical.

(vii) Properties Bar: It displays detailed information about graphic/text selected.

(viii) Scroll Bar: They are used for scrolling page layout/work in the desired direction (Horizontal
and Vertical)

(ix) Colour Palette: It displays various colours used for colouring any selected object/text.

(x) Tool Box: This contains the tools used to create, fill, and modify your drawing.

ASSIGNMENT 1. List the steps one can take to open to Microsoft Paint on a computer
system
2. List five different Microsoft Paint tools and their functions

JSS2 WEEK 3 - LESSON NOTE


Features of Graphic packages (PRACTICAL)

JSS2 WEEK 4 - LESSON NOTE


THE PAINT ENVIRONMENT

CONTENT

1. Definition of MS Paint
2. Loading Paint
3. Features of the Paint Environment
4. Using MS Paint Tools
5. MS Paint Tools and their Function
Definition of MS Paint

Paint is a program used to create drawings on a blank canvas or top of other pictures. The drawings
can be deposited on the desktop or in other applications if need be. Scanned pictures or photographs
can be viewed and edited with paint program.

The Paint Environment

Loading Paint

1. Click on the start icon at the bottom left corner of the screen.
2. Click the programs option.
3. Click on Accessories to see sub menus.
4. Click on the Paint environment.

Features of the Paint Environment

1. Title bar
2. Tool box
3. Workspace
4. Restore Button
5. Minimize Button
6. Close Button
Using MS Paint tools

Find the tool bar on the screen. The icons on this bar stand for the different things you can do. The
small pictures on the toolbar are called icons. Icon is a graphical representation of a symbol.
MS Paint Tools and their Functions

Irregular Selection Tool

The irregular selection tool is used for marking areas. First, click it to select it, and then click
anywhere in your document (with your left mouse button) and move your cursor around while
holding the button. A line will indicate your choice. When you’re done, release the button. You have
now chosen an area. You can move it, copy it, delete it, or whatever you want.

Regular Selection Tool

The regular selection tool is exactly the same as the irregular selection tool, except one thing. It is not
a freehand function. It will create a rectangle. Click anywhere in the document and drag your cursor
away. The farther from the creating point you release the button, the bigger the rectangle gets. When
released, you have a chosen area.

Eraser Tool

The eraser tool is a tool for erasing lines and objects already drawn. You can choose between four
sizes after selecting the eraser tool. Select your size by clicking on one of the black squares beneath
the tool menu to the left. Those are exactly the same size as your eraser will be after choosing a size.
To erase, click anywhere in your document and drag your cursor around to delete certain areas.

Bucket Tool

This is a tool for filling certain areas with a colour. Click anywhere in a 1-coloured area after
choosing it, and the area will be coloured with that colour.

Eyedropper tool

The eyedropper tool is used for “absorbing” colour. After selecting it, click a pixel in the document
to set your current colour to that pixels colour.

Zoom Tool

This tool is used to enlarging and reducing the view of your document. After selecting it, you can
choose between zooming 1x, which is normal size, 2x, 6x or 8x. Clicking one of those will make the
document zoomed to the selected size.
JSS2 WEEK 5 - LESSON NOTE
PAINT TOOLS AND FUNCTIONS CONTINUED

Pencil Tool

This is also a freehand tool. Choose a colour, and click anywhere in the document to colour 1 pixel.
There is no option for this tool, so clicking just once will colour 1 pixel. Dragging your cursor
around will colour every pixel your cursor touches while holding down the left mouse button.

Brush Tool

This is much like the pencil tool except that it has options. You can choose between several brushes
in several sizes. Just select the brush tool, and click the preferred brush to select it. As the pencil tool,
this is a freehand tool. Click and optionally drag to draw something with the brush tool.

Airbrush Tool

This is like spray. Select a colour and click around in the document to colour pixels with random
distance between each pixel (not very far though). You have 3 options here that decide the size of the
brush. Those are also located beneath the tools menu to the left.

Text tool

The text tool is basically for typing. First, do as with the regular selection tool, click a place in your
document and drag until the rectangle becomes the size you want. Inside this is the typing area. The
text will not appear outside it.

Line Tool

The line tool is for creating straight lines. Click anywhere in the document and hold the button, now
drag the cursor to the ending point of your line. Releasing the button will create the line you drew.

Curve Tool

The curve tool is for creating curved lines. It works like this: First, click anywhere in the document
and do as described in the line tool (click anywhere in the document and hold the button, now drag
the cursor to the ending point of your line) after that, you can twice curve your line. First, click
anywhere in your line and drag your cursor around to curve it in different ways. Do this again, and
you’re done with your curved line.
JSS2 WEEK 6 - LESSON NOTE
PAINT TOOLS, FUNCTIONS AND PRACTICAL

Rectangle Tool

The rectangle tool is basically for creating rectangles. It works just as the regular selection tool
except from that, it creates a rectangle rather than selecting a rectangled area. You have three options
(located beneath the tools menu to the left). The upper one is for creating just a rectangle outline. The
mid one is for creating a rectangle with the foreground colour as outline colour, and the background
colour as the rectangle’s basic colour (inside the outline). The lower one will create a rectangle
completely.

Polygon Tool

The polygon tool is basically for creating different shapes. First do like you do with the line tool.
Create a line by clicking, dragging, and releasing. Then click anywhere else in the document to
create a line between your line ending point and where you clicked. Keep doing this until you have a
nice shape. Now click at the first line’s starting point to create yet another line and finish your
polygon.

Ellipse Tool

The ellipse tool is for making ellipses. Used exactly as the rectangle tool is used, except that it makes
circles, not rectangles.

Rounded Rectangle Tool

The rounded rectangle tool is also exactly like the rectangle tool except that it has rounded edges.
JSS2 WEEK 7 - LESSON NOTE
DEFINITION OF WORD PROCESSING
Word processing is an act of using software to create, save, edit and print a word document. Word
processing refers to dealing with information written in a language understood by anyone who is
familiar with such a language. It could be English, Hausa, Igbo or Yoruba. It all depends on the
language with which it was written.
Word processors are software used in word processing. Word processing packages or software are
being utilized in offices, school, homes, etc. for writing of official letters and other textual
preparation. It is used in newspaper houses as well.
EXAMPLES OF WORD PROCESSOR
Examples of word processing packages include WordStar, Notepad, WordPerfect, CorelDraw and
MS-word etc. Over the year others have been prevalent, but MS-Word seems to be in vogue as it is
newer, better and easier to use.
MICROSOFT WORD (MS-Word)
Microsoft word (MS-Word) is simply word is a product of Microsoft corporation of the United
States. It is very useful word processing software.
Different versions of word exist. They include Word 3.1, Word5, Word 7, and Word 97. We now
have word 2000. Word 97 and 2000 denote the years for which they were made. Our scope is around
these two as they are the latest
JSS2 WEEK 8 - LESSON NOTE
GETTING STARTED (LOADING AND EXITING WORD PROCESSOR)
Start your computer and make sure it is being properly booted-up.
Selecting MS-Word on the desktop
1. Click the start button with the mouse.
2. Move to the program
3. Move in a horizontal direction to fly out menu
4. Locate and click on the Microsoft word.
5. The program will start automatically.

Exiting MS- Word

1. After you are done with your work


2. To exit the program, click on the close button
3. Or go to File, and select close
JSS1 WEEK 9 - LESSON NOTE
CREATING A DOCUMENT AND FORMATTING A DOCUMENT AND PRACTICALS
When you start Microsoft word, a new blank document called ‘Document 1’ to appear. To start
working, just start typing. You will now create the document in the next page, but before you begin
note the following:
When you are typing and the insertion point approaches the right margin, do not press <Enter>, just
keep typing. The words that cannot fit into a line will be moved

FORMATTING A DOCUMENT
Formatting a document means to change how it looks, it makes the document look presentable. It
entails changing the font face, font size, font style, font Colour, font effect and character spacing.
1. Font face/Type: This is the text outlook format of a document, example includes Arial, Times
New Romans, Tahoma, etc. This is located on the home menu; the shortcut is Ctrl + Shift +
F, to change the font face.
2. Font size: This displays text size of your choice ranging from 8-72. You can change the font
size using the options on the ribbon or using the keyboard shortcuts: Ctrl +] to increase or
Ctrl + [to decrease the font.
3. Font style: This displays effects on text such as bold, italic, regular, Bold Italic.
JSS2 WEEK 10 - LESSON NOTE

EDITING A DOCUMENT AND PRACTICAL


Copying: To copy a document means to duplicate the document, the original copy still remains while
the copied one will be found in the new location
TO COPY AND PASTE A DOCUMENT
1. Highlight the portion of the document to be copied
2. Right click on the highlighted text
3. Click/select copy or Ctrl + C
4. Position the insertion point in a new location
5. Right click in an empty space
6. Select paste or Ctrl + V to paste

TO CUT AND PASTE A DOCUMENT


To cut a document means to move the document from its original location to a different location.
To cut a document
1. Highlight the text to be cut
2. Right click on the highlights and select cut or Ctrl + X
3. Position the insertion point on a new location
4. Right click on an empty space
5. Click paste
JSS3 WEEK 1 - LESSON NOTE
CREATING AND EDITING GRAPHS

Definition of Graph

A graph is a diagram showing the relationship that exist among variables, quantities (varies data),
usually of two, each measured along one of a pair of axes at right angles. It may not be possible to
plot a graph without value. The excel spreadsheet provides the values that are plotted.

Importance of Graph

1. Graphs are used to show relationships such as comparisons, relative amounts, developments,
processes, classification and organization by means of facts, figures and statistics
2. To present information in a summarized form.
3. To help in the visual presentation of the abstract ideas.
4. To help in the quick clarification of meanings which often save considerable time in the
presentation of the subject matter.
5. To raise issues and help in the process of systematic thinking and intelligent understanding.
6. To inculcate interest, capture students’ attention and provide motivation for carrying out
instructional work

JSS3 WEEK 2 - LESSON NOTE


Creating a Graph

To create a graph, you can either use the chart wizard or press the F11 key.

Types of Chart

1. Line graph
2. Histograms
3. Pie-charts
4. Legends

Line Graph

Line graphs are often used to plot changes in data over time, such as monthly temperature changes or
daily changes in stock market prices. Line graphs have a vertical axis and a horizontal axis. If you
are plotting changes in data over time, time is plotted along the horizontal or x-axis and your other
data, such as rainfall amounts is plotted as individual points along the vertical or y-axis.

Histograms

A histogram consists of tabular frequencies, shown as adjacent rectangles, erected over discrete
intervals (bins), with an area equal to the frequency of the observations in the interval. The height of
a rectangle is also equal to the frequency density of the interval.
Pie Charts and Legends

Pie Charts

Pie charts, or circle graphs as they are sometimes known, are a little different from the other two
types of graphs discussed.

For one, pie charts do not use horizontal and vertical axes to plot points like the others. They also
differ in that they are used to chart only one variable at a time. As a result, it can only be used to
show percentages. The circle of pie charts represents 100%. The circle is subdivided into slices
representing data values. The size of each slice shows what part of the 100% it represents.

Legends

A legend is used to identify each series in a chart. It contains on sample of the marker colour and
pattern of each series.
JSS3 WEEK 3 - LESSON NOTE
EDITING GRAPHS

Changing Chart Type

After creating a chart, you can change it to the type you want. The type you choose depends on how
you want to present your data.

1. Select the chart


2. Within the chart, click the right mouse button OR
3. Click on insert on menu bar
4. Click on change Chart type
5. Under Chart Type, list click to select the desired chart type (e.g, Column, Bar, Line, etc). Under Chart
sub-type list, click to select the chart sub-typed desired. You can view the chart sample by pressing it
and hold to view sample button.
6. Click on OK when satisfied.

Changing from histogram to pie chart using the same data


JSS3 WEEK 4 - LESSON NOTE
FORMATING GRAPHS

Adding and Editing Charts

Once you have created a chart, you can add more chart data series or copy additional chart data
series from a worksheet or another chart. Microsoft Excel offers a variety of ways to edit your chart
data

You can change a chart data series by:

1. Adding a chart data series to a chart


2. Adding or removing more data point to the existing chart data series.
3. Plotting the data by rows or by columns.

To add or edit a chart data series with chart wizard tool

1. Select the chart you want to edit


2. Click the chart wizard tool
3. Follow the instruction on the screen

The chart is automatically updated to reflect the new data.

Adding more data to the present data gives us


FORMATTING A CHART

You can change the font of chart text, change the horizontal and vertical alignment and rotate text to
a vertical orientation. You can also change the pattern and the colour of the text area. The text is
displayed in the front of the area pattern so that it is always visible. Microsoft Excel automatically
formats the charts title and axes title as bold.

To format chart text with the standard tool bar

1. To format all the text in a chart, select the chart by choosing select chart from the chart menu. To
format a single piece of attached or unattached text, click the text to select it. To format tick-mark
labels for an axis, click the axis to select it.

To format text that appears in a legend, click the legend; click the legend to select it.

2. Click one of the formatting or alignment tools to format the text

ASSIGNMENT
List the type of graph
JSS3 WEEK 5 - LESSON NOTE
GRAPHICAL PRACTICAL
JSS3 WEEK 6 - LESSON NOTE

OPERATING SYSTEM

Definition of an Operating System (OS)


An Operating System is a software that communicates with the hardware and allows
other programs to run. It also controls and manages the flow of signals from the
system unit to various parts of the computer.

The computer system cannot work without the presence of the operating System.
Examples of Operating Systems are:
1. Disk operating system (DOS)
2. Microsoft Windows (MS WINDOWS)
3. UNIX
4. LINUX

WINDOWS OPERATING SYSTEM

Windows: The windows operating system is easier to use as it is more graphical in outlook. The
commands are operated by clicking on icons on the desktop with the mouse. In windows
Operating system users can do multiple things at a time. Examples are Windows 98 and
Windows XP

DISK OPERATING SYSTEM

1. DOS: DOS means disk operating system. It is an operating system that performs its
tasks using text commands. The text instructions are entered into the Command
prompt in order to start a task. DOS is a binary-tasking operating system which means
it can execute one task at a time.
JSS3 WEEK 7 - LESSON NOTE
OPERATING SYSTEM

3. UNIX: It 1s an operating system that is capable of supporting and using more than one
computer processor at a time. It is a multi-processing and multi-users type of operating system. It
can run on a single computer or an entire network.

4. LINUX: This is an operating System that supports and uses more than one computer processor
at a time like the UNIX operating system. The operating system is free on the Internet and 1s
Virus-free.

Functions of Operating Systems


Some of the functions of the of the operating system are:
(a) It serves as a resource allocator. it allocates and shares available resources based on the need
of various users.
(b) It monitors and controls all the system activities like system performance and security.
(c) It contains utility programs which can be used to solve system hardware problems.
(d) It starts the control of all input and output operations.
(e) It serves as an intermediary between the user and application programs.
JSS3 WEEK 8 - LESSON NOTE
DIFFERENCE BETWEEN DISK OPERATING SYSTEM AND WINDOWS
OPERATING SYSTEM

The main difference between DOS and Windows OS is that DOS is an operating system that
provides a command line or a text based interface while the windows provides a Graphical User
interface.

S/ WINDOWS DOS
N0

1. Windows has no full form The full form DOS is Disk Operating System

2. They are multi-tasking Operating System It is a binary tasking Operating System

3. It utilizes high power It utilizes low power as compared to windows

4. It supports networking It does not support networking

5. Windows is easier to use and user friendly DOS on the other hand is more complex and not
user-friendly

6. Windows consumes more memory It consumes less memory as compared to windows

7. Windows are widely known as the graphical DOS are popularly known as command line
operating systems operating systems

8. Windows supports all these multimedia DOS does not support multimedia such as games,
features such as games, songs, movies and songs, movies etc.
lot more.

9. In Windows the execution of task is faster The execution of task in DOS is slower as
compared to windows

10. In Windows we can use multiple windows In DOS we can only use one window at a time

11. Windows is expensive It is not expensive

12. DOS requires less memory Windows requires more memory than DOS
JSS3 WEEK 9 - LESSON NOTE
IDENTIFICATION OF THE LOGIC GATES

A logic gate is an elementary building block of a digital circuit. It is also defined as


an electrical circuit, that performs one or more logical operations on one or more input signal.
Types of Standard Single Logic gate

There are basically three types of standard single logic gate. They are:

1. AND gate
2. OR gate
3. NOT gate
AND GATE

An AND gate is a logic gate that gives a high output (1) only if all of the inputs are high (1) and the
outputs are usually 0 whenever at least one of the inputs is 0.

OR GATE
An OR gate is a digital logic gate that gives an output of 1 when any of its inputs are 1, otherwise 0.
That is gives out 1 when either or both of the inputs is 1and gives out 0 when both inputs are 0.

NOT GATE

A NOT gate is often called an inverter. A NOT gate is slightly different because it has just one input.
It will give a high output if the input is low and vice versa.
Logic Symbol for AND gate

Logic Symbol for OR gate

Logic Symbol for NOT gate


SS1 WEEK 1 - LESSON NOTE
OUTPUT DEVICES
An output device is any piece of computer hardware equipment used to communicate the results of
data processing carried out by a computer to the outside world.
In computing, input/output (I/O) refers to the communication between information processing system
(such as computer), and the outside world. Inputs are the signals or data sent to the system, and
outputs are the signals or data sent by the system to the outside world.
TYPES OF OUTPUT DEVICES
1. Printer: this is a peripheral which produces a text and or/graphics of documents stored in
electronic form, usually on physical print media such as paper or transparencies
2. Speaker: this is an electromechanical transducer which converts an electrical signal into
sound. The term “loudspeaker” is used to refer to both the device itself and a complete
system consisting of one or more loudspeaker drivers (as the individual units are often called)
in an enclosure. This is an output device that is external to a computer that is used to output
sound.
3. Plotter: this is a computer printing device for printing vector graphics.
4. Monitor: this is the most frequently used output device, it is also known as Visual Display
Unit. It displays the output (softcopy) generated by the computer.
Images are formed on the monitor by individual dots or picture elements called PIXELS. It is
capable of producing clear images in different colours.
FEATURES OF OUTPUT DEVICES
Output devices provide data in different forms, some which include audio, visual, and hard copy
media. The devices are usually used for display, projection, or for physical reproduction.
Monitors and printers are two of the most commonly-known output devices used with a computer.
Output devices relay the response from the computer in the form of a visual response (monitor),
sound (speakers) or media devices (CD or DVD drives). The purpose of these devices is to translate
the machine’s response to a usable form for the computer user.
STRUCTURE OF THE MONITOR
1. DISPLAY DEVICE
This is where the text and graphics are displayed.
2. CIRCUITRY
This is the entire electronic components are not visible. The external electronic
components i.e. the ports and wires at the back of the monitor transfers electricity into the
internal electronic components. It supplies power to the monitor in order to display text
and graphics.
3. ENCLOSURE
These are panels covering the monitor.
TYPES OF MONITORS
1. MONOCHROME MONITOR: monochrome monitors display text and graphics in one colour
only. Generally, the colours range from gray to blue to black to white. They were used to
display text on traditional monitors e.g. CRT (Cathode Ray Tube) Monitors
2. COLOURED MONITOR: all modern monitors are nearly color monitors. They display a
myriad of colours of text and graphics. Most Personal Computers today use color monitors
e.g. Liquid Crystal Display (LCD).
SS1 WEEK 2 - LESSON NOTE
PRINTER
A printer is a peripheral which produces a text and/or graphics of documents stored in electronic
form, usually on physical print media such as paper or transparencies. Many printers are primarily
used as local peripherals, and are attached by a printer cable or a USB cable to a computer which
serves as a document source.
TYPES OF PRINTERS
1. Impact printers
2. Non-impact printers

IMPACT PRINTERS
This forms characters and graphics on a piece of paper by striking a mechanism against an ink ribbon
that is in physical contact with the paper. This striking activity makes them noisy.
Examples are:
a. Line printers

They have spinning horizontal drum that stretches the full width of the paper which is separated from
it by an inked ribbon. The drum is made up of 132 thin cylinders each having a complete set of
characters. Behind the paper is a row of 132 hammers that strikes the paper at the right moment to
select the required character from the corresponding cylinder. In this way, it is able to print a
complete line at a time. Line printers are used for high volume low quality output and are very noisy.
b. Daisy wheel printer

On a daisy wheel printer, the complete set of characters is held on a removable wheel which consists
of a central collar radiating out from which are a set of spokes, each ending in a single character. The
wheel spins round to align the required character with a single hammer. The hammer and wheel
assembly moves across the paper striking it through an inked ribbon. These produce high quality
output but are limited to the range of characters on the wheel. Changing wheels is simple, this
provides alternative fonts, but it is no substitute if a wide range of fonts are required. They are quite
noisy and are used for low volume office work.
c. Dot matrix printers
This have a horizontally moving head with a vertical line of pins mounted inside. An inked ribbon is
located between the head and the paper and as the head moves the pins strike the ribbon to form each
character as series of dots. The best quality printers have heads with 24pins and low quality ones
have 9pins. These printers can produce small dots anywhere on the paper, support graphics and have
software fonts. Dot matrix printers are noisy but can be cheap. They are mostly for low to medium
quality, low volume personal use. They are obsolete now.

(OUTPUT DEVICES:-printers, types-Impact: line printers, Daisy wheel, Dot matrix printers. -
NON-Impact. Inkjet Printers, Laser jet Printers, Thermal Printers)

NON-IMPACT PRINTERS
A non-impact printer forms characters and graphics on a piece of paper without actually striking the
paper. Some spray ink, while others use pressure and heat to create images. Because these printers do
not strike the paper, they are less noisy than the impact printers.
Examples are:
1. Inkjet printer

This is a type of computer printer that reproduces a digital image by propelling variably sized
droplets of ink onto a page. Inkjet printers are the most common type of printer and ranges from
small inexpensive consumer models to very large and expensive professional machines. This is an
alternative to daisy wheel printer. It can be used in advertising and public relations.
2. Laser printers

Here, paper is given an electro-static charge by passing it over a charged drum and then a laser scans
it discharging all clear areas. Next the paper is passed over a tray of powdered ink (toner) which is
attracted to the charged areas. Finally, the toner is bonded the paper by heat or pressure. Laser
printers are quiet and are used for high quality low or high volume work.
3. Thermal printers

This produces a printed image by selectively heating coated thermo chromic or thermal paper;
when the paper passes over the thermal print head. The coating turns black in the areas where it
is heated, producing an image. Two colour direct thermal printers are capable of printing both
black and additional colour (often red), by applying heat at two different temperatures. It prints
using very small wires to burn a special paper. It uses the dot matrix principle and its noiseless.
SS1 WEEK 3 - LESSON NOTE
COMPUTER SYSTEM SOFTWARE
This is the collection of computer programs, procedures and documentation that perform different
tasks on a computer system. Software is a program that enables a computer to perform a specific
task, as opposed to the physical components of the system (hardware). The software is a program
written by a programmer or software developer. A program is a list of instructions given to the
computer to perform a particular task. The software is the intangible part of the computer system,
though they come in CDs according to today’s standard.
Types of software
1. Application software
2. System software
LANGUAGE TRANSLATORS
This is a type of software that converts programs written in a source code, into an object code that a
computer understands. Examples of high level programming languages that requires translators are:
BASIC, FORTRAN, COBOL, PASCAL etc.
TYPES OF TRANSLATORS
Three types of language translators are:
1. Assemblers: an assembler converts an assembly program into a machine code also known as
the object code or object program.
2. Compilers: a compiler is a program that translates a high level language into a machine code
before execution. The Turbo Pascal compiler, for example, translates a program written a
program written in Pascal into machine code that can be run on a PC.
3. Interpreter: it is also program that translates high-level source code into an executable code
during execution. However, the difference between a compiler and an interpreter is that an
interpreter is that an interpreter translates one line at a time and then executes it.
Interpreted and compiled program
Compiler characteristics:
1. Spends a lot of time analyzing and processing the program
2. The resulting executable is some form of machine-specific binary code.
3. The computer hardware interprets (executes) the resulting code program
4. Execution is fast

Examples of interpreted languages:


1. BASIC
2. Perl
3. Python
4. PHP

Interpreter characteristics:
1. Relatively little time is spent analysing and processing the program
2. The resulting code is some sort of intermediate code.
3. The resulting code is interpreted by another program
4. Program execution is relatively slow.
Examples if compiled languages are:
1. C
2. C++
3. COBOL
4. FORTRAN
SS1 WEEK 4 - LESSON NOTE
Operating system
An operating system is software consisting of programs and data that runs on computers, manages
computer hardware resources and provides common services for execution of various applications
software.
Types of operating system
1. Graphical user interface (GUI)
2. Command based Operating System
3. Single user Operating System
4. Multi-user Operating System
5. Network Operating System
Graphical user interface (GUI)
These are operating system that has interactive features which make them user friendly, easier to use,
etc. Examples of this operating system include: MS, Windows, Linux, etc.
Command based Operating System
This communicates via a command utility. Special commands are used to access their features. Their
operation requires an expert. Therefore, a novice cannot easily work with them. Examples are MS-
DOS, Unix etc.
Single user Operating System
This is an Operating System that is designed to manage the computer resource and allocates them to
one user. Examples are MS-DOS, some versions of windows operating system.
Multi-user Operating System
This is an operating system that allows concurrent access by multiple users of a computer. This
operating system allows more than one user to run several programs at the same time. The process of
running more than one program concurrently or at the same time is known as multiprogramming.
GUI or command based operating system can also be classified as multi user operating system.
Examples are: UNIX, XENIX etc.
Network Operating System
This links computers and users together to share resources and communicate with one another.
Common examples of this operating system includes: Windows NT, Windows Server 2003 etc.

SS1 WEEK 5 - LESSON NOTE


Examples of operating system
Common examples of operating system are:
1. MS Windows which is a single user GUI operating system. That is only one person can use
the system at a time.
Versions of Windows operating system:
 Windows 95
 Windows 98
 Windows 2000
 Windows ME (Millennium Edition)
 Windows XP (Experience)
 Windows NT (New Technology)
 Windows Vista
 Windows 7 etc
 UNIX (a multi-user command line operating system)
 Novell Netware (is a command line Network Operating System)
 Linux: this is a GUI or command line multi user and network Operating system.
 XENIX: this is a UNIX based multiuser operating system.
 MS DOS (Microsoft disk Operating system): this is a single user operating system.

B. LANGUAGE TRANSLATORS
This is software that converts programs written in a source code, into an object code that a computer
understands. Examples of high level programming languages that requires translators are: BASIC,
FORTRAN, COBOL, PASCAL etc.
TYPES OF TRANSLATORS
Three types of language translators are:
4. Assemblers: an assembler converts an assembly program into a machine code also known as
the object code or object program.
5. Compilers: a compiler is a program that translates a high level language into a machine code
before execution. The Turbo Pascal compiler, for example, translates a program written a
program written in Pascal into machine code that can be run on a PC.
6. Interpreter: it is also program that translates high-level source code into an executable code
during execution. However, the difference between a compiler and an interpreter is that an
interpreter is that an interpreter translates one line at a time and then executes it.
Interpreted and compiled program
Compiler characteristics:
5. Spends a lot of time analysing and processing the program
6. The resulting executable is some form of machine-specific binary code.
7. The computer hardware interprets (executes) the resulting code program
8. Execution is fast

Examples of interpreted languages:


5. BASIC
6. Perl
7. Python
8. PHP

Interpreter characteristics:
5. Relatively little time is spent analysing and processing the program
6. The resulting code is some sort of intermediate code.
7. The resulting code is interpreted by another program
8. Program execution is relatively slow.
Examples if compiled languages are:
5. C
6. C++
7. COBOL
8. FORTRAN
SS1 WEEK 6 - LESSON NOTE
UTILITY SOFTWARE
These are used for general house-keeping functions of the computer such as backing up files,
repairing the computer, copying, sorting and printing data.
Examples of utility programs
They are:
1. Norton utilities: Norton Utilities is a utility software suite designed to help analyze,
configure, optimize and maintain a computer. The current version of Norton Utilities is
Norton Utilities 16 for Windows XP/Vista/7/8 was released 26 October 2012
2. Anti-virus: This is software that is created specifically to help detect, prevent and remove
malware (malicious software). Antivirus is a kind of software used to prevent, scan, detect
and delete viruses from a compute
3. Windows explorer File Explorer, previously known as Windows Explorer, is a file manager
application that is included with releases of the Microsoft Windows operating system
from Windows 95 onwards. It provides a graphical user interface for accessing the file
systems.
4. Scan disk: It is a Windows utility used to check your hard disk for errors and to correct
problems that are found. These errors often occur when Windows locks up and must be
restarted.
5. Editors: this is a computer program that enables the user to enter or alter text
SS2 WEEK 1 - LESSON NOTE
CONCEPT OF COMPUTER FILES (DEFINITION OF TERMS)
Computer files are the most basic unit of data that users can store on a disk. Every program, image,
video, song and document is stored as a file.
RECORD
A record is a collection of related data items or fields. Each record normally corresponds to a specific
unit of information. For example: employee number, employee’s name, basic salary and house rent
allowance.
FIELD
Data items are physically arranged as fields in a computer file. Their length may be fixed or variable.
Since all individuals have 3-digit field is required to store the particular data. Hence, it is fixed field.
In contrast, since customer’s name varies considerably from one customer to another, a variable
amount of space must be available to store this element. This can be called variable field.
DATA ITEM
This is the smallest unit of information stored in computer file. It is a single element used to
represent a fact such as an employee’s name, item price etc.
TYPES OF DATA ITEMS
Numeric
This is type of data item consists of numbers 0-9.
Alphabet
This type of data item consists of letters A-Z.
Alphanumeric
This is often shortened to alphanumeric is a combination of alphabetic and numeric characters, and
its used to describe the collection of Latin letters and Arabic digits or a text constructed from this
collection. There are either 36 (single case) or 62 (case-sensitive) alphanumeric characters. The
alphanumeric character set consists of the numbers 0-9 and letters A-Z.
File structure: this is the structure of files in a systematic order from top to bottom.
File structure refers to the collection of logically related variables that form a file in a systematic
order from top to bottom.

Data

Field

Record

Files

Data
A data item is the smallest unit of information stored in computer file.
Field
A field is a collection of related data items.
Record
A record is a collection of related fields.
Files
The collection of records is called a file.
SS2 WEEK 2 - LESSON NOTE
TYPES OF FILE ORGANIZATION
1. Serial: a serial file is one in which the records have been stored in the order in which they
have arisen. They have not been sorted into any particular order. An example of a serial file is
an example of a non-computerized serial file. Serial files can be stored on tape, disc, or in
memory.
2. Indexed: An indexed file organization contains reference numbers, like employee numbers,
that identify a record in relation to other records. These references are called the primary keys
that are unique to a particular record. Alternate keys can also be defined to allow alternate
methods of accessing the record. For example: instead of accessing an employee’s record
using employee numbers, you can use an alternate key that reference employees by
departments. This allows greater flexibility for users to randomly search through thousands of
records in a file. However, it employs complex programming in order to be implemented.
3. Random file: this is a file organization where data is organized via an index. Also called a
“direct file” or a “direct access file”, it enables quick access to specific records or other
elements within the file rather than having to read the file sequentially. The index points to a
specific location within the file, and the file is read from that point.
4. Sequential: in sequential file organization, records are organized in the sequence by which
they were added. A sequential file contains records organized in the order of the records is
fixed. The records are stored and sorted in physical, contiguous blocks within each block the
records are in sequence. Records in these files can only be read or written sequentially.
SS2 WEEK 3 - LESSON NOTE
Methods of Accessing Files
1. Serial Files: The only way to access serially organized file is serial sorting, which is in
series; the order they have arisen.
2. Sequential: Sequential files can only be accessed sequentially. For example; if one is
working on voters’ registration database, you must have registered the people on the basis of
first come first serve. That simply connote that if you need to search to know the address of a
person with number 150, you must first pass the first 149 persons’ records on disk to access
the desired record.
3. Index Files: These files are accessed using the index number.
4. Random Files: These files are accessed randomly. Any element (or record) in the file can be
found directly by calculating the records offset in the file.

ASSIGNMENT 1. List and explain different methods of file classification.


2. List and explain different criteria for file classification.
SS2 WEEK 4 - LESSON NOTE
WEEK 4- Computer File Classification
Computer files can be classified as follows:
1. Master File: This is a file containing a fairly permanent data. This file is often updated by
records in a transaction file. It is seen therefore that master file will contain both data of a
static nature and data that will change each time a transaction occurs. Examples are
inventory, customer ledger, payroll, etc.
2. Transaction File: These are collection of records that record the activity of an organization.
The data in transaction file is used to update the data in master files, which contains the
subject of the organization. It is also known as movement file. It has a very short life as it is
replaced by a file containing the next batch of order.
3. Reference File: A special type of master file which is not updated during the job being
processed. It contains fixed data that does not change which are used for reference purposes
like price lists, tables of rate of pay, names and addresses. When changes are necessary, this
will be achieved by a separate program.

Criteria for classifying computer files


Computer files are classified based on the following criteria:
1. Nature of Content: This refers to the nature of the contents of the file.
2. Organization Method: This refers to the arrangement of files, e.g. serial, sequential.
3. Storage Medium: This refers to storage devices in which files could only be stored such as
magnetic or optical disk, and magnetic tapes.

Basic operations on computer files


There are various operations that can be performed on a computer file which include: Update,
Search, Sort, Retrieve, Copy, View, Create, Open and Close, etc.
1. Update: To update a file means to alter it with new information. A file can be update either
interactively or by batch processing.
Updating can involve:
a. Insertion: Adding new record to file.
b. Deletion: Removing existing records from the file.
c. Amendment: Changing the items within existing records.
2. Search: To search a file means to scan it methodically looking for a given item. A linear
search is a search in which each record is read in turn and checked for the item. If the end of
the file is reached without finding the required item, then the search has failed.
3. Sort: The computing words means to rearrange data into an order. The user decides which
fields are used for sorting and what rules are used to determine the new order. The order cold
be numeric, alphanumeric sort. A file can be sorted into ascending or descending order.
4. Retrieve: to retrieve a file means to recover a stored or a lost file.
5. Create: to create means to generate a file with a given name. To create a file means to
organize data into a file e.g. when fields are set up in a database file and records are keyed
into it.
6. Copy: to copy means to reproduce created file to either external or an inbuilt storage device.
7. Open: this means opening or viewing an existing file to use its content. To open a file means
to prepare it so that data can be read from or written to it.
8. Viewing: this means granting the privilege of viewing a created file.
9. To close a file is the procedure which is necessary when the user has finished using a file.
10. To save a file means to copy all the records of the file from the main store to a backing store.
11. To a load a file means to read all the records of the file from a backing store into the main
store.

ASSIGNMENT 1. Explain file insecurity and file security.


2. Lists and explain methods of securing files.
SS2 WEEK 5 - LESSON NOTE
FILE INSECURITY
- File insecurity refers to a state whereby computer system is vulnerable to attack.
- Computer file insecurity refers to the concept that a computer system is vulnerable to attack,
and that this fact creates a constant battle between those looking to improve security, and
those looking to circumvent security.
- File insecurity refers to the concept of computer file being vulnerable to attack which causes
data loss or file being overwritten.
EFFECTS OF INSECURITY OF FILES
1. Data Loss: this refers to the unforeseen loss of data or information. Files may be in danger of
accidentally or intentionally being lost, backup and recovery schemes are therefore important
to be developed to restore lost data.
2. Overwriting: this refers to the process of writing a binary set of data on a memory. It can
occur when unused file system clusters are written upon with new data and it writes over the
previous data. Files may be modified by being written or maliciously written over

FILE SECURITY
The security of computer file means the protection of files. It refers to all methods of protecting data
and software from being lost, destroyed, corrupted, incorrectly modified or disclosed to someone
who should not have access to it.
METHODS OF FILE SECURITY
Computer files can be protected by:
1. BACKUP: this refers to making copies of a computer files or reproducing them so that these
additional copies can be used to restore the original after a data loss event. A backup file is a
copy of a file which is kept in case anything happens to the original file. Data can be
protected from destruction or modification by keeping copies.

The primary purpose of backup is to recover data as a reaction to data loss, be it by data deletion
or corruption, and the secondary purpose is to recover data from a historical period of time within
the constraints of a user-defined data retention policy.

2. ANTI-VIRUS: An anti-virus program protects a computer file from malicious viruses attack,
detects and heals files that have been attacked.
3. PASSWORD: This safeguards the computer files by allowing the user to choose a secret
string of characters that allows access to a computer, interface or files. The use of password is
at users’ discretion and caution must be exercised by the user to always use characters the
user can remember.

ASSIGNMENT 1. Differentiate between the computer files and manual files


2. List two advantages of computer files over manual files
3. List five limitations of computerized file system

SS2 WEEK 6 - LESSON NOTE


DIFFERENCE BETWEEN COMPUTER FILES AND MANUAL FILES
Manual is using old method without the help of technology or maybe less to perform certain task or
work. For examples using the typewriter to write a report or keeping documents in paper folder.
While computerized file system is using the latest technology of ICT to carry out various tasks that is
more effective when compared with manual system in terms of the productivity and time usage.
1. Manual files are subject to physical damages thus may not be accurate but computer files are
consistently reliable.
2. Manual files cannot be easily managed, transferred and updated while computer files are
easy.
Advantages of computer files over manual files
1. Faster and efficient in processing of information unlike manual files.
2. More timely information can be produces with computer files while manual files information
is not timely.
3. Many types of useful reports can be generated for management form computer files to make
decisions.
4. A computer file can take less space and it’s up to date but a manual file system takes lots of
spaces and is difficult to find.
5. Accurate information and faster decision making while manual database is like filing cabinet,
slow and clumsy, and you can lose your records.
Limitations of computerized file system
1. Expensive to set up
2. Requires regular power supply
3. Data are separated and isolated.
4. Data are often duplicated
5. Application program dependent
6. Incompatible or mismatched data files
7. Vulnerable or open to attacks.
SS2 WEEK 7 - LESSON NOTE
Topic: Computer Data Conversion 1

Computer Data Conversion

Data conversion is the conversion of computer data from one format to another. Throughout a
computer environment, data is encoded in a variety of ways. For example, computer hardware is
built on the basis of certain standards, which requires that data contains, for example, parity bit
checks. Similarly, the operating system is predicated on certain standards for data and file handling.
Furthermore, each computer program handles data in a different manner. Whenever any one of these
variables is changed, data must be converted in some way before it can be used by a different
computer, operating system or program.

REGISTERS: Registers are used to quickly accept, store and transfer data and instructions that are
being used immediately by the CPU. There are different types of registers, accumulator, program
counter, memory data register, memory buffer register. Registers are temporary storage area for
instructions or data. They are not a part of memory; rather they are special additional storage
locations that offer the advantage of speed. It works under the direction of the control unit to accept,
hold, and transfer instructions or data and perform arithmetic or logical comparisons at high speed.
Most operations are done on the register; the processor can’t directly perform arithmetic in memory.
For example, if you want to add 1 to a memory address, the processor will normally do this by
loading the initial value from memory into a register, adding 1 to the register, and then saving the
value back to memory.

TYPES OF REGISTER
(a) MDR (Memory Data Register): This is the register of a computer’s control unit that contains
the data to be stored in the computer storage (e.g RAM), or the data after a fetch from the computer
storage. It acts like a buffer and holds anything that is copied from the memory ready for the
processor to use it.

The MDR is a two – way register because when data is fetched from memory and placed into the
MDR, it is written to in one direction. When there is a write instruction, the data to be written is
placed into the MDR from another CPU register, which then puts the data into memory.

(b) CIR (Current Interrupt Register): It captures the value that is winning the interrupt
arbitration. The CIR is updated at the beginning of an interrupt acknowledge bus cycle or in response
to an update CIR command. The contents remain in the CIR until another interrupt acknowledge
cycle or update CIR Command occurs.

(c) User – Accessible Register: The most common division of user – accessible registers is into
data registers and address registers.

(d) Data Registers: They are used to hold numeric values such as integer and floating – point
values.

(e) GPRs (General Purpose Registers): They can store both data and addresses.

(f) FPRs (Floating Point Registers): They store floating point numbers in many

architectures.

(g) Constant Registers holds read – only values such as one, or pi.

(h) Special Purpose Registers: They hold program state

(i) Instruction Registers store the instruction currently being executed.

(j) Model – Specific Register (also known as machine – specific register) store data and settings
related to the processor itself.

(k) Control and status register: It has three types which are program counter, instruction register
and status word (PSW).
ADDRESS: Is the code that identifies where a piece of information is stored. A memory address is
an identifier for a memory location, at which a computer program or a hardware device can store
data and later retrieve it. In modern byte – addressable computers, each address identifies a single
byte of storage; data too large to be stored in a single byte may reside in multiple bytes occupying a
sequence of consecutive addresses. Some microprocessors were designed to be word – addressable,
so that the addressable storage unit was larger than a byte. The efficiency of addressing of memory
depends on the size of the address bus.

In a computer program, an absolute address, (sometimes called an explicit address or specific


address), is a memory address that uniquely identifies a location in memory. This is different from a
relative address, which is not unique and specifies a location only in relation to somewhere else (the
base address). For example, a computer said to be “32 bits” usually treats memory addresses as 32 –
bit integers; a byte addressable 32 – bit computer can address 2 32 = 4,294,967,296 bytes of memory
or 4 gigabyte.

BUS: Is a collection of wires through which data is transmitted from one part of a computer to
another. A bus, in computing is a set of physical connections (cables, printed circuits etc.) which can
be shared by multiple hardware components in order to communicate with one another. The purpose
of bus is to reduce the number of pathways needed for communication between the components, by
carrying out all communications over a single data channel.
SS2 WEEK 8 - LESSON NOTE

Differences between Register and Main Memory

Factor considered: storage, speed, storage capacity and relative cost.

Storage devices Speed Storage capacity Relative cost

Register Fast Very low Very high

Main memory Very fast Low and moderate High speed

Data-Fetch-Execute cycle

Fetch execute cycle is the very basic way a computer works. All commands are executed through the
running of this cycle. The cycle itself has very few commands, however, when linked up together it
is possible to create a large program or even an operating system.

The cycle contains 3 main parts

1. Fetch the instruction


2. Decode the instruction
3. Execute the instruction
Operating procedure of computer data processing

Data processing consists of all activities which are necessary to transform data into information.

Computer data processing is grouped under five basic categories as shown below;

The following are factors affecting the Speed of Data Transfer

1. Bus Speed
2. Bus Width
3. Medium of Storage
4. Data transfer medium
SS2 WEEK 9 - LESSON NOTE
WORD PROCESSING: DEFINITION AND EXAMPLES
Word processing is the process of using software to create, edit, view, store, retrieve, format and
print textual documents such as letters, reports, letterhead papers and other documents.
A word processor is software that is used for word processing. They are used in place of manual
typewriters because of the quality of outputs, ability to replicate copies without having to retype or
photocopy. Word processing is used in the Offices, publishing, journalism, education, writing
articles.
A text document is a written communication such as letters, reports, memos, and so on.
Examples of word processors are:
1. Microsoft word
2. Word Pro
3. Word Perfect
4. Word Star
5. Lotus Notes
6. Perfect Writer
7. MultiMate Advantage
8. Professional Write etc.
FEATURES OF MS WORD 2007
1. Office button
2. The horizontal ruler
3. The vertical ruler
4. Scroll bars (Horizontal and Vertical)
5. Menu bar
6. Title bar
7. Minimize, maximize and close buttons
8. Status bar
9. Task bar
10. Tool bar

Editing features in Microsoft Word include:

1. Cut: This allows the removing of a feature from a document. The keyboard shortcut is Ctrl +
X.
2. Copy: this means duplication a portion or the document. The keyboard shortcut is Ctrl + C.
3. Paste: this allows you to have whatever you have cut or copied to appear in another portion of
the word processor. The keyboard shortcut is Ctrl + V.
4. Format painter: this can be used to apply text formatting and some basic graphics formatting,
such as borders and fills.
5. Find and replace: this is a faster way of locating a word or group of words in a file and it also
allows you to replace the singly or entirely. The keyboard shortcut is Ctrl + H.
6. GO TO: this gives you access to directly locate a page, section, line, bookmark, comment,
footnote, endnote, field, table, graphics, equation, object and heading. The keyboard shortcut
is Ctrl + G.
7. Spelling and Grammar: this allows you to check whether a document is error free both in
spelling and grammar. A spelling error is shown by a red zigzag underline while grammar
error is shown by a green zigzag underline.
8. Thesaurus: this gives the option for the synonym or meaning of a selected word
9. Word count: this gives the number of words in a document.

FORMATTING A DOCUMENT
Formatting makes a document presentable. It entails changing the following:
1. Font face: this is the text outlook format of a document
2. Font size: this displays the sizes of your choice. In Ms Word, sizes 8 to 72 are embedded
3. Font style: this displays effects on text which include: bold, italics, regular, bold italic,
underline
4. Font effects: this displays other effects on text such as strike through, subscript, superscript,
double strike through and change case.
5. Font color: this displays color effects on text such as red, blue, green etc
6. Character spacing: this displays different characteristics of spacing that can be applied on a
text they include: Expanded or Condensed, Kerning, Paragraph, Indent and Spacing,
Alignment, Indentation and Spacing.
7. Bullets and numbering: this format displays how a list should appear. Bullets and numbers
are used for listing items.
INSERTING FEATURES TO A DOCUMENT
These are features embedded in MS Word that can be extracted into a document
1. Tables
2. Pictures
3. Headers and footers: they are texts that appear consistently on all the pages of a document.
Header appears at the top while footer appears at the bottom part.
4. Page numbers
5. Shapes
6. Page numbers
7. Textbox: this is usually used to insert text beyond the cursor reach.
8. WordArt: this colorful artistic text.
9. Drop cap: this is an artistic single letter, which is usually applied to the beginning of a
document to illustrate emphasis.
10. Print preview: this feature allows you to have a view of documents before any print operation
as this will determine if the document is intact as it should be.
11. Symbols
12. Margin setting: this setting entails the alignment of text to fit into paper size.
SAVING A DOCUMENT
The keyboard shortcut is Ctrl + S. the best practice demands that we save our documents before we
begin creating texts; this is because of power failure or unforeseen circumstances. You can have
options to choose Save, or Save As or Saving a Document with password.
SS3 WEEK 1 - LESSON NOTE
DATA REPRESENTATION
What is data representation?
This is the way data is represented in a physical storage medium. We have different data storage
medium: flash drive, hard disk, hard drive, cd and DVD etc and they all store data differently.
Data representation refers to the methods used internally to represent information stored in a
computer. Computer stores different types of information or data, such as numbers, text, graphics of
many varieties (stills, video, animation) and sound.
BITS
This is a short for binary digits, it is the format all computer systems store all types of information
internally in the same simple format of zeros and ones.
BCD
This is short for Binary Coded Decimal (BCD), it is a digital encoding method for decimal numbers.
Here, each digit is represented by its own binary sequence.
In BCD, a numeral is usually represented by four bits which, in general, represent the decimal range
of zero through nine
EBCDIC
This is short for (Extended Binary Coded Decimal Interchange Code), it is a character encoding set
used by IBM mainframes which uses the dull 8bits available to it, so parity checking cannot be used
on an 8bit system. EBCDIC consists of 256 8-bit characters and are used for data representation and
transfer. It is used to represent both numbers and text. EBCDIC has wider range of control characters
than ASCII.
ASCII
This is short for American Standard Code for Information Interchange, which defines 128 different
symbols which includes all the characters found on the standard keyboard plus extra few and it
assigns to each a unique numeric code between 0 and 127 to represent all English characters as well
as special control characters.
SS3 WEEK 2 - LESSON NOTE
COMPUTER SECURITY
This is the protection of computer components such as hardware, software and data from
unauthorized access. The need for computer security is as a result of a number of security breaches.
SOURCES OF SECURITY BREACHES
Security breach is an act of breaking security policies, practices or procedures. When security is
breached, it may result in the damage of vital files or failure of some certain computer hardware
components.
The following are possible sources of security breaches:
1. Computer viruses
2. Hackers
3. Poorly implemented computer network
4. Poorly implemented or lack of ICT policy
5. carelessness
1. COMPUTER VIRUSES

this is an executable program that is capable of replicating itself thereby causing great harm to files
or other programs on the computer in infects.
A computer virus can spread easily from one computer to another with the use of storage media such
as: flash drives, floppy disk etc; it can also be transferred by downloading and infected file from the
internet.\
Examples of computer viruses are: stator, Satan bug, Elkern, Asimov.1539, Tuareg, AntiEXE.
Types of computer viruses are:
Worms
A worm is a virus program that copies and multiplies itself by using the computer networks and
security flaws.
Examples:
a. ILOVE YOU worms discovered in 2000
b. Stuxnet discovered in July 2010
Trojan Horses
A Trojan horse is a computer program or file on the computer of a user that makes the computer
susceptible to malicious intruders by allowing them to access and read user’s files. They do not
multiply themselves as in the case of worms. The later Trojan horse is Alureon discovered in 2010
2. HACKERS

A hacker is a clever programmer who tries to break into computer systems. A hacker understands the
weak points in a security system and writes a program that will utilize the system. They are
sometimes responsible for writing computer virus codes
3. POORLY IMPLEMENTED COMPUTER NETWORK

A complex network may result into poor implementation and management which in turn may give
room to intruders who will eventually invade the computer network to steal passwords, confidential
files or even infect all the network files.
4. POORLY IMPLEMENTED OR LACK OF ICT POLICY

When ICT security policies that controls or maintains the order in which people should conduct
themselves when using ICT facilities barely exist due to poor implementation or ignorance,
lawlessness will be in place and this can lead to security breach.
5. CARELESSNESS

This is a major contribution to security breaches. This include been careless with information,
storage devices, passwords, movement of people and so on.
SS3 WEEK 3 - LESSON NOTE
PREVENTIVE MEASURES
Here are some preventive measures to avoid damages caused by security breaches
1. Use of antivirus software: An Antivirus software can be able to protect the computer from
virus. If the computer is infected, it can detect and heal the system. In some cases, the virus
can be deleted. Examples of these antivirus are: ESET, Norton, Symantec and many others
2. Using Firewall: A firewall is a device or set of devices designed to permit or deny network
transmissions based upon a set of rules and is frequently used to protect networks from
unauthorized access while permitting legitimate communications to pass
3. Care should be taken to ensure that personal information (such as passwords, email
addresses, etc) is not disclosed to any person through any means. It is advised that persons
should change their passwords often or when they notice any intrusion.
4. Encryption: this is the conversion of data into a form that cannot be easily understood by
unauthorised people. Decryption is the process of converting encrypted data back into its
original form, so it can be understood.
5. There is need to have a proper network implementation and management policy
6. Use websites with security certificates because they are secured.
7. Do not download file attachments from unknown sources
8. Read about new hacking technologies and preventive measures frequently to keep you
updated.
SS3 WEEK 4 - LESSON NOTE
LEGAL ISSUES
Some computer security issues considered include:
1. Piracy
2. Cyber crime
3. Identity theft
4. Internet fraud
5. Hacking

Piracy
This is the unauthorized reproduction or use of a copyrighted material, book, recording, television
program, patented invention, trademarked product etc.
In Nigeria, a lot of software are pirated, the use of pirate software is a violation of the manufacturer’s
license agreement and it is a criminal offence to use pirated software
Cyber crime
Cybercrime or computer crime is the crime committed by means of computers or the internet.
Examples of cybercrime are internet fraud, identity theft, hacking etc.
Identity theft
This is a cybercrime that involves stealing of someone else’s identity by pretending to be the actual
person.
Internet fraud
This refers to the use of internet to conduct fraudulent transactions. It involves paying for a purchase
with fake credit cards, counterfeiting postal money orders, outright stealing from people’s account
and so on.
Hacking
This is the unauthorized access and use of computer and network resources. The person who
consistently engages in hacking activities as a lifestyle is called a hacker. A common example of a
method used by hackers is an email with a program that either automatically runs, or that runs when
the attachment is clicked.
SS3 WEEK 5 - LESSON NOTE
PROGRAMMING LANGUAGE
This is a process that results in the development of a set of detailed instructions following a pattern
of a particular programming language necessary to solve a problem. A programming language is a
formal constructed language designed to communicate instructions to a machine, particularly a
computer. Programming languages can be used to create programs to control the behavior of a
machine or to express algorithms.
LEVELS OF LANGUAGES
1. Machine language
2. Low-level language
3. High-level language
Machine Language: This was the first level of language known to man. It involves the use of binary
digits i.e. 0’s and 1’s to write programs and instructions.
Low-Level Language: this was the next language developed after the machine language; it uses
mnemonic symbols to represent instructions.
High-Level Language: A high-level language has instructions which are similar to the English
language. It is very user friendly. It is much easier to understand and write with a program using this
language. The greatest advantages of these languages are their independence. A program written in
HLL can be used on almost all computers without any change. The instructions written in HLL are
also converted into machine language with the help of translators. Interpreter and Compiler are two
programs used to translate a high-level language into machine language so that the computer can
understand it. They are highly developed languages and are currently used by programmers in the
world today. It involves the use of English to write programming instructions. The invention of high-
level language has made it easy for programmers to develop programs in the shortest possible time.
Some high-level programs
1. BASIC
2. LOGO
3. COBOL
4. FORTRAN
5. C AND C++
6. JAVA
SS3 WEEK 6 - LESSON NOTE
Topic: OVERVIEW OF NUMBER BASES

Human nature dictates that we try to quantify everything we come in contact with, e.g. the number of
students in a class, the number of eggs in a basket, etc. If we think about the type of things humans
try to quantify, we can see that they are not all quantified in the same units of measure, e.g. time is
measured in hours, minutes and seconds but the distance from Glasgow to Edinburgh is measured in
miles. Therefore, a number system defines a set of values used to represent a quantity.

Number Systems can be traced back to the early civilizations of Egypt and Babylon. These cultures
could perform arithmetic operations on whole numbers, i.e. numbers without a decimal
point. Number bases are different ways of writing and using the same number. We use a system
called base 10, or denary, for our arithmetic, but there are almost as many number bases as there are
numbers. Many people think that we use base 10 because we have 10 fingers on which we can count.
Computers, and other electronic devices, can only reliably use an electrical current, or the absence of
a current, to count (like having two fingers), and so they tend to use base 2 (binary) internally.
Many number systems have been, and still are in use, some of which may be familiar, these include
Arabic, Babylonian, Mayan and Roman. The Roman number system uses numerals to represent each
number, e.g. the number 5 is represented as V. In contrast, the most commonly used system is the
Arabic system which uses the digits 0 to 9. This number system was used as early as the 3rd Century
BC.

Each number system can be defined by its base (sometimes referred to as the radix). This base value
of the number system indicates the number of different values the set has before repeating itself, e.g.
Decimal has a base of ten values, hence, the digits 0-9, Octal has a base of 8 values, hence the digits
0-7.

You can work in any number base (except 1, which wouldn’t make sense), and some programming
languages such as Lisp let you do that. In computing, however, you generally only come across the
following four bases, and you know base 10 already. These common bases also have proper names,
shown in parentheses:

 base 2 (binary)
 base 8 (octal)
 base 10 (denary)
 base 16 (hexadecimal)

The largest digit you can have in any column is the one less than the number of the base. So for
binary (base 2), it’s 1, then 7 for Octal (base 8), 9 for Denary (base 10), etc.

After base 10, however, we run out of digits to represent the numbers, so we have to use letters,
where A = 10, B = 11, C = 12, etc. So the sequence for numbers written in Hexadecimal is 0, 1, 2, 3,
4, 5, 6, 7, 8, 9, A, B, C, D, E, F, followed by 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 1A, 1B, 1C, 1D,
1E, 1F, etc.

When we write a number in base 10, we know its value because we multiply the individual digits by
their corresponding column headings. For example, when we see 123, even if we don’t think about it,
we calculate 1 x 100 + 2 x 10 + 3 x 1 to give us one hundred and twenty-three. Other number bases
work in the same way.
You can use this information to convert numbers in other bases to base 10,

Binary (Base 2):

You probably won’t encounter binary much these days, but it’s useful to understand that this is how
computers work internally, so you can understand concepts such as parallel transmission. The fact
that computers use binary is why everything is a multiple of 2 – why computers come with 8Mb,
16Mb, 32Mb, 64Mb, etc., of memory, rather than 10Mb, 20Mb, 30Mb, etc., and also why there are
1024 bytes in a kilobyte (1024 = 210) rather than 1000 bytes.

Its main use is probably in combination with the bitwise logic techniques shown on the previous
page, to combine and split values stored in the same byte (or word).
SS3 WEEK 7 - LESSON NOTE

Overview of Number Bases II

There are some other binary-related terms you’ll need to know. Firstly, a bit is a binary digit – i.e. a
single occurrence of 0 or 1. This is the smallest unit of storage you can have inside a computer.
Groups of 8 bits are called bytes. A byte can be used to represent a number, or colour, or a character
(e.g. using ASCII). You may also hear the term nibble, which is 4 bits. Finally, a word is the largest
numbers of bits that a processor can handle in one go – for example, when we say that new
computers have 64-bit processors, we mean that the word length is 64-bits or 8 bytes.

The largest value that you can store using a particular number of bits can be determined quite easily.
Using n bits, the largest value you can store is 2n – 1, and the number of different values you can
store is 2n (from 1 to 2n – 1, and then 0 as well). So using 8 bits, the largest number you can store is
28 – 1 = 255, and the number of possible values is 2 8 = 256 (i.e. 0 – 255). A 32-bit computer can
therefore handle values up to 4,194,967,296 in one clock cycle – it can cope with larger numbers, but
it would need to split them up first.

Octal (Base 8):

I’ve never come across anything that uses octal! I think it’s probably included on exam specifications
for purely academic reasons, and because it’s easy to convert into binary (see below).
Hexadecimal (Base 16):

Hexadecimal is still used quite a lot – particularly for things like colours in HTML or programming
languages. It’s also quite useful because representations of large numbers are relatively compact, but
are easily converted to binary so that you can see the bit patterns.
SS3 WEEK 8 - LESSON NOTE

Topic: SHIFTING BITS

You’ve no doubt noticed that with numbers in base 10, you can move the digits left or right one
place by multiplying or dividing the number by 10. The same trick works with different number
bases – you just multiply and divide by the base number (e.g. multiply by 2 in binary to shift the bits
left one place).

This can be useful for things like creating hexadecimal colour values (e.g. for web pages). In a 24-bit
system (such as HTML), colours are represented by 24-bit numbers from 000000 to FFFFFF (each
hexadecimal digit corresponds to 4 bits – see below). The 24 bits are made up of 8 bits each for the
amount of red, green and blue in the colour.

So, each component is represented by 8 bits – i.e. a number from 0 to 255. If you know how much
red, green and blue you want, how do you combine them to find the complete colour? For HTML,
the correct order of the bits is RRGGBB (r = red, g = green, b = blue), so what we need to do is
“shift” the values of green and red components, and then add all three components together.

We can leave the blue value as it is, but we need to move the green value along two places. To move
along one place in hexadecimal, we multiply by 16, so to move along two places, just do it twice –
16 x 16 = 256 – so multiply the green value by 256. For the red value, we need to move four places –
16 x 16 x 16 x 16 = 65,536 – so we multiply the value of the red component by 65,536.

If you were just trying to work out the colour yourself, you wouldn’t need to go through these steps,
but if you were to create a program like my colour mixer, then this is how you’d do it.

Binary:

Let’s look at base-two, or binary, numbers. How would you write, for instance, 12 10 (“twelve, base
ten”) as a binary number? You would have to convert to base-two columns, the analogue of base-ten
columns. In base ten, you have columns or “places” for 10 0 = 1, 101 = 10, 102 = 100, 103 = 1000, and
so forth. Similarly in base two, you have columns or “places” for 2 0 = 1, 21 = 2, 22 = 4, 23 = 8, 24 =
16, and so forth.
The first column in base-two math is the units column. But only “0” or “1” can go in the units
column. When you get to “two”, you find that there is no single solitary digit that stands for “two” in
base-two math. Instead, you put a “1” in the twos column and a “0” in the units column, indicating
“1 two and 0 ones”. The base-ten “two” (210) is written in binary as 102.

A “three” in base two is actually “1 two and 1 one”, so it is written as 11 2. “Four” is two-times-two,
so we zero out the twos column and the units column, and put a “1” in the fours column; 4 10 is
written in binary form as 1002. Here is a listing of the first few numbers:

decimal binary
(base 10) (base 2)

0 0 0 ones
1 1 1 one
2 10 1 two and zero ones
3 11 1 two and 1 one
4 100 1 four, 0 twos, and 0 ones
5 101 1 four, 0 twos, and 1 one
6 110 1 four, 1 two, and 0 ones
7 111 1 four, 1 two, and 1 one
8 1000 1 eight, 0 fours, 0 twos, and 0 ones
9 1001 1 eight, 0 fours, 0 twos, and 1 one
10 1010 1 eight, 0 fours, 1 two, and 0 ones
11 1011 1 eight, 0 fours, 1 two, and 1 one
12 1100 1 eight, 1 four, 0 twos, and 0 ones
13 1101 1 eight, 1 four, 0 twos, and 1 one
14 1110 1 eight, 1 four, 1 two, and 0 ones
15 1111 1 eight, 1 four, 1 two, and 1 one
16 10000 1 sixteen, 0 eights, 0 fours, 0 twos, and 0 ones

Converting between binary and decimal numbers is fairly simple, as long as you remember that each
digit in the binary number represents a power of two.
Convert 1011001012 to the corresponding base-ten number.

I will list the digits in order, and count them off from the RIGHT, starting with zero:

The first row above (labelled “digits”) contains the digits from the binary number; the second row
(labelled” numbering”) contains the power of 2 (the base) corresponding to each digits. I will use this
listing to convert each digit to the power of two that it represents:

1×28 + 0×27 + 1×26 + 1×25 + 0×24 + 0×23 + 1×22 + 0×21 + 1×20

= 1×256 + 0×128 + 1×64 + 1×32 + 0×16 + 0×8 + 1×4 + 0×2 + 1×1

= 256 + 64 + 32 + 4 + 1

= 357 All Rights Reserved

Then 1011001012 converts to 35710

Operations with binary numbers

We can add, subtract and multiply binary numbers in much the same ways as we operate with base
ten numbers. The main things to remember in base two are:

Addition:

0+0=0 1+0=1

0+1=1 1 + 1 = 10

Multiplication:

0X0=0 1X0=0

0X1=0 1X1=1

Add the following

1011
+ 1101

——

11000

———

You might also like