Professional Documents
Culture Documents
CSEC IT Study Guide
CSEC IT Study Guide
NW RM
– Computer Fundamentals
– Networking
– Word-processing
– Spreadsheets
– Database Management
Information Technology - the use of computers to create, process, store, retrieve, and
exchange electronic data and information
Local Storage is any physical storage device directly connected internally or externally to the
computer system hardware. Examples include USB drives, memory cards, hard disk drives
and optical disks
Types of Software:
- Systems Software: programs that enable the computer system to run properly and
efficiently, installed before any application software can run.
a. Operating Systems: a set of programs that monitor and coordinate software
and hardware in a computer system, e.g. Windows, Unix, Linux, MS-Dos and
Mac OS.
b. Utilities: a specialized program that assists in maintaining and improving the
efficiency of a computer system, e.g. Backup, Disk Fragmented, Disk Error
Checker, Disk Clean-up and Antivirus.
c. Translators: these are systems software that convert other programming
language instruction to machine language, e.g. assemblers, interpreters and
compilers
- Application Software - programs that enable the user to carry out useful tasks for a
business or personal use. There are two main types of application software:
a. General Purpose: this is used to carry out common tasks and is readily
available at computer stores, e.g. word processing, spreadsheet, presentation
and database
b. Special Purpose: this is used to carry out specialist tasks, such as designing
products, e.g. Payroll Package, Peach Tree Accounting and Adobe Photoshop.
c. Custom Written: written for a specific organization/company to perform
tasks specific to what they need in that institution
d. Customisation of General Purpose: modifies a general-purpose software to
be more specific to a company or task. Automates certain tasks
User Interface - the combination of hardware and software that allows users and computers to
communicate with each other effectively.
4. Wireless • Loose USB receiver a. Plug the USB receiver into another
keyboard/mouse • Dirty battery port
not responding b. Check to ensure the USB receiver is
plugged in correctly
5. Wireless connection • Wireless network a. Try to get closer to the router/access
not working adapter not plugged point, and eliminate interference.
in. Restart or reset the wireless router
• No Wi-Fi device or access point and/or your device.
(such as a router) is
in range.
6. “Network cable • Malfunctioning a. Turn the computer off and then
unplugged” errors network adapter restart to ensure any temporary
• Missing, corrupted memory corruption issues are
or out of date cleared.
network device b. Check both ends of the network
cable connected to the adapter to
ensure they are firmly connected to
the network port and that no part of
the cable is frayed or broken.
Networking
Network - the collection of two or more computers and devices connected via
communications devices and transmission media so they can share facilities
Types of Networks:
- Local Area Network (LAN): This is a connection of computers over short distances
through communications media. LAN is a relatively cheap and simple communication
system linking a number of computers, usually microcomputers, within a defined and
small locality. This locality may be an office, a building or a cluster of buildings.
Advantages Disadvantages
• Software and data files can be • The initial set-up is expensive
shared by many users • There is a greater risk from viruses
• Users can work together on a single because they are spread easier
document • There is an increase of data
• It is cheaper to buy one package of corruption since many users will be
a software application than to buy a using the system, data can be
one for each computer tampered with.
- Wide Area Network (WAN): This connects networks across a large geographical
area such as a city, a whole country or several countries. Information can be
transmitted using special high-speed telephone lines, microwave links, satellite links
or a combination of the three. WANs are used mainly by universities and research
centres so that information can be shared, and by large organizations, companies and
banks with branches in different countries.
- Metropolitan Area Network (MAN): This is a high-speed network that connects
local area networks in a metropolitan area such as a city or town and handles the bulk
of communications activity across that region. A MAN typically includes one or more
LANs but covers a smaller geographic area than a WAN.
- Internet: This is a Wide Area Network; it is a huge collection of networks connected
together by what are called gateways.
- Intranet: This is an in-house Web Site that serves the employees of the enterprise. An
intranet is set up entirely within a LAN. Web pages can be stored and accessed from
anywhere on the network and email can be sent internally within the LAN.
- Extranet: This is a private network that enterprises use to provide trusted third parties
such as suppliers, vendors, partners, customers and other businesses, with secure,
controlled access to business information or operations.
Parts of a Network:
- Server: device that receives a request for web information and serves the data to the
client
- Client: device that receives requests and responses from the server
- Hub: device that splits a network connection among multiple computers
- Switch: component that helps devices to connect to the networks
- Router: hardware device that connects computer networks
- Modem: component that converts digital signals to analogue signals through
modulation
- Transmission Media: media through which data is transferred from one computer to
another in a network
Terms to remember:
- Point-to-point: when a device is connected directly to another device by a dedicated
communication channel, giving those devices sole use of that channel
- Uploading: when data from a storage device (e.g. disk) from your computer is sent to
another computer via a communication channel
- Downloading: when data is received from another computer and saved onto a storage
device on your computer via a communication channel
- Broadcast Transmission: arrangement with multiple systems, a broadcast
transmission is one sent out data to all the machines simultaneously
- World Wide Web (WWW): combination of resources and protocols using HTTP
- Hypertext Markup Language (HTML): formatting language for webpage design
- Hypertext Transfer Protocol (HTTP): a secure internet protocol to transfer data
over the web
- Hyperlinks: an icon, graphic or text that links to another file or object
- Web Server: a computer where web content is stores
- Web Page: a simple document on the world wide web
- File Transfer Protocol (FTP): a standard protocol for transmitting files from one
computer system to a next
- Web Browser: an application software used to access the world wide web
- Uniform Resource Locator (URL): the address of a unique resource on the web
- Email: a method of exchanging messages between electronic devices
Implications of Misuse and Cybersecurity
Computer Security or Cybersecurity - the protection of internet-connected systems such as
hardware, software and data from cyberthreats
Computer Misuse - the inappropriate use of computer systems to fulfil illicit or unethical ends
Elements of cybersecurity:
- Threat: a potential negative action or event
- Vulnerability: a weakness in the computer system that can be exploited
- Risk: the potential of a significant impact as a result of exploiting the vulnerability,
i.e. the consequences of the vulnerability.
- Countermeasures: an action, device, procedure, or technique that reduces the
vulnerability or risk
- Attack: an attempt to expose, alter, disable, destroy, steal or gain information through
unauthorized access to a computer system.
o SUM
= SUM([cell 1] : [cell 2])
eg: =SUM(G16:G21)
o AVERAGE
= AVERAGE([cell 1] : [cell 2])
eg: =AVERAGE(G16:G21)
o MAX
= MAX([cell 1] : [cell 2]) eg.
=MAX(G16:G21)
o MIN
= MIN([cell 1] : [cell 2])
eg: =MIN(G16:G21)
o VLOOKUP:
=VLOOKUP([lookup value], [table array], [column number], [range])
eg: =VLOOKUP(E2,$A$36:$D$38,2,FALSE)
o PMT:
=PMT([annual interest rate]/12, [number of payments], [principal])
eg: =VLOOKUP(E2,$A$36:$D$38,2,FALSE)
o IF:
= IF([“logical test”], [“value if true”], [“value if false”])
eg: =IF(C5="Guyana","Local", "Overseas")
Database Management
Database Management (DBM) - the organisation, manipulation, storage and retrieval of
information in a database
Uses of Databases:
- Telecommunications: call records, monthly bills, maintaining balances
- Finance: storing information about stock, sales, and purchases of financial instruments
like stocks and bonds
- Sales: storing customer, product & sales information
Database Terminologies:
- table
- record or tuple - row
- field - column
- primary key: unique identifier used to identify each record
- secondary or alternate key: candidate field not chosen as primary key
- candidate key: possible option for primary key
- foreign key: primary key of another table
- data type: number, date/time, currency, autonumber
- form:
- query:
- report:
Problem-Solving and Programming
Steps in Solving a problem:
1. Define the problem
2. Propose and evaluate solutions
3. Determine the most effective solution
4. Develop an algorithm
5. Test and validate the solution
Characteristics of Algorithms:
1. The number of steps must be finite: This means that the computer has a definite
number of instructions to follow, and when it comes to the end of those steps, it has
completed the task.
2. The steps must be precise: The instructions or steps must be accurate. A computer
cannot think for itself, so if you make a mistake in the instructions, it will have an
incorrect outcome.
3. The steps must be unambiguous: The steps must be very clear so that they can be
carried out easily.
4. The steps must have a flow of control from one process to another: There may be
many processes involved in a problem, but each process must be related and should
have a clear flow from one process to the other.
5. The steps must terminate: There must be a clear end to the instructions. The final
step in the process of baking a chicken would be to take the chicken out of the oven.
6. The steps must lead to an output: An algorithm must have at least one output.
Types of Algorithms
- Simple Sequence
- Selection Control Structure
- Looping Control Structure
A constant is a data item whose value remains the same throughout an algorithm or program,
e.g. JOHN or 100.
A data type indicates the type of data that is stored in a variable, e.g. numbers or characters.
The main data types:
- integer (4)
- string (Ronald)
- character (T)
- real (6.7)
- boolean (TRUE)
A condition is an expression that when evaluated returns a true statement or a false statement
based on a condition.
- If-then
IF (Condition) THEN
(Instruction to be carried out if the condition is true)
ENDIF
- If-then-else
IF (condition) THEN
[statement 1]
[statement 2]
ELSE
[statement 1
[statement 2]
ENDIF
- If-then else-if
IF (condition) THEN
[statement 1]
[statement 2]
ELSE
IF (condition) THEN
[statement 1]
[statement 2]
ELSE
IF (condition) THEN
[statement 1]
[statement 2]
ENDIF
ENDIF
ENDIF
Looping Control Structure: used to repeat a set of instructions for a predetermined number
of times or an undetermined number of times while solving a problem
Counting involves increasing the value by a fixed amount repeatedly. This amount may be
one, two, three or any value.
Syntax:
[Counter variable] ← 0
[Counter variable] ← [Counter variable] + 1
Totalling is a progressive total that is arrived at by adding a value to the current total to obtain
a new total.
Syntax:
[Total] ← 0
[Total] ← [Total] + [Variable]
There are two main types of loops:
- For Loop: we use this when we know how many times the loop will execute.
Syntax:
FOR <Counter variable> ← <beginning> TO <ending> DO
<Instructions to be repeated>
ENDFOR
• While Loop: we use this when we do not know how many times the loop will
execute. There are also some phrases that may indicate the type of loop: Dummy
value, terminated by, terminates, repeat until, continue until, continue as long as.
Syntax:
WHILE <Condition> DO
<Instructions to be repeated>
ENDWHILE
Trace table: used to do a ‘dry run’ or ‘manual trace’ of the algorithm to test to see if it is
working
Example 1:
FOR x = 1 to 3 DO
FOR y = 1 to 3 DO
Product = x*y
Print Product
ENDFOR
ENDFOR
Example 2:
AMOUNT = 2
G=4
WHILE AMOUNT < 50 Do
G = G*2
AMOUNT = AMOUNT + G
Print AMOUNT, G
ENDWHILE