SS2 E-Note Second Term Computer
SS2 E-Note Second Term Computer
SS2 E-Note Second Term Computer
2023
www.deeperlifehighschool.org …leadership with distinction
SCHEME OF WORK
7 Mid term
SYSTEM DEVELOPMENT • Application process of SDLC
8 CYCLE • Group (students) Presentations
SYSTEM • The students should be grouped,
DEVELOPMENT each should will select a spoken
9 persons that will represent the
entire group, at the end of the
presentation the audience
(classmate) will be given room to
ask the group tough questions any
member of the group is free to
respond to the questions.
• Teacher should pay attention to
the presentation delivery,
www.deeperlifehighschool.org …leadership with distinction
confidence, speaking, knowledge
based marks should awarded
evenly to the group.
RECORD: A Record is a collection of related data items or fields. Each record usually corresponds
to a specific unit of information, e.g Employee number, Employee name, Basic salary, etc. The
elements of records are usually called fields or members.
FIELD: This is portion where data items are physically arranged in a computer file. It is commonly
used to refer to a column in a database or a field in a data entry form. It is a space allocated for a
particular item of information. The length of a field may be fixed or variable.
DATA ITEM: Data item is the smallest unit of information stored in computer files. In computing,
data is information that has been translated into a form that is more convenient to move or process.
Data can exist in a variety of forms – as numbers or text on pieces of paper, as bits and bytes stored
in electronic memory, or as facts stored in a person’s mind.
PRACTICE EXERCISE: (5 fill in the gap question per subtopic, 3 short answer questions)
1. A directory is a type of file that acts as a ____________ for other files and folders.
2. The file path provides the ____________ to locate a file's location within a file system.
3. The read-only attribute on a file prevents ____________ modifications to its content.
4. A fragmented file is one that is stored in non-contiguous ____________ on a storage device.
5. File permissions specify who can ____________ a file and what actions they can perform on
it.
1. Define the following key terms;
• Computer file
• Record
• Field
• Data item
2. Highlight the types of data item
SEQUENTIAL ORGANIZATION: Sequential files are serial files whose records are sorted and
stored in an ascending or descending order on a particular key field. In a sequential file organization,
records are organized in the sequence by which they were added. Records in these files can only be
read or written sequentially.
INDEXED ORGANIZATION: An indexed file organization contains reference numbers, like
employee numbers, that identify a record in relation to other records. These references are called the
primary keys that are unique to a particular record. This allows greater flexibility for users to
randomly search through thousands of records in a file. However, it employs complex programming
in order to be implemented.
RANDOM FILE ORGANIZATION: This is a file arranged physically without regard to the
sequence of the primary key. It is also called a ‘direct file’ or a ‘direct access file’, it enables quick
access to specific records or other elements within the file rather than having to read the file
sequentially.
----Confuciu
WEEK: 2
TOPIC: Computer files
LESSON OBJECTIVES:
• Methods of accessing files.
• File classification.
• Criteria for classifying files
PRACTICE EXERCISE: (5 fill in the gap question per subtopic, 3 short answer questions)
1. In random access, data can be read or written at ____________ positions within a file.
Transaction File:
Transaction file holds the data related to master file, transaction files holds the data used to update
master file and used for audit trails. In a company, huge data is to be stored about products, sales,
inventories and employee’s details This is a collection of transaction records. (customers, employees,
vendors, etc.). Transaction files also serve as audit trails and history of the organization.
Examples of transaction files are:
1. Customer’s orders for products (to update an order file)
2. Details of price changes for products (to update a product file)
3. Details of cash postings in customer accounts (to be held for audit purposes)
4. Purchase orders, job cards, invoice dispatch notes etc
Reference File:
In computer science, a reference is a value that enables a program to indirectly access a particular
data item, such as variable or a record, in the computer’s memory or in some other storage device.
Reference file contains data that are to be permanently stored. Amendment to records on it are usually
not frequent. It stores data that are used as reference for processing of transaction.
Backup file
A backup files is used to hold copies (backups) of data or information from the computers fixed
storage (hard disk). Since a file held on the hard disk may be corrupted, lost or changed accidentally,
www.deeperlifehighschool.org …leadership with distinction
it is necessary to keep copies of the recently updated files. In case of the hard disk failure, a backup
file can be used to reconstruct the original file.
Report file
Report file is used to store relatively permanent records extracted from the master file or generated
after processing. For example you may obtain a stock levels report generated from an inventory
system while a copy of the report will be stored in the report file.
Sort file
It stores data which is arranged in a particular order.
Used mainly where data is to be processed sequentially. In sequential processing, data or records
are first sorted and held on a magnetic tape before updating the master file.
File Insecurity This is the concept that a file is always vulnerable and is prone to be lost or missing
in the computer.
EFFECTS OF FILE INSECURITY
File Insecurity refers to the concepts that a computer system is vulnerable to attack, thereby affecting
the files in the system.
Effects of file insecurity include;
1. Data Loss: This refers to the unforeseen loss of data or information.
Causes of data loss:
(i) Human error
(ii) Computer virus
(iii) Natural disaster
INSPIRATIONAL QUOTES:
The only person who is educated is the one who has learned how to learn and change.
WEEK: 4
TOPIC: WORD PROCESSING
LESSON OBJECTIVES:
• Definition of (i) Word Processing (ii) Text document.
• Examples of word processors.
• Application Areas.
• Facilities available in a word processor – type document, edit document, store document,
move, copy, paste, etc,
• Features: Editing, Formatting, Justification, search and replace, spell-check etc
SUB-TOPIC 1: Definition of (i) Word Processing (ii) Text document
CONTENT:
Word Processing
This is an act of using the computer or other electronic equipments for the manipulation of text which
involves creation, editing, storage and printing. Other electronic devices that can be used to achieve
this are mobile phones, personal digital assistant (PDA), electric typewriters, computer etc.
Text Document
This is a collection of data that is written, typed, printed on paper, or created with a Computer
application and used to provide information for future use. A text document could contain single or
multiple pages.
APPLICATION AREAS
1. Offices: Word processing plays a vital role in the running of offices. It is used in the
production of letter heads, memo writing, circulars, etc.
2. Publishing: In publishing, typesetting process has been replaced by desktop publishing
software (DTP). This is the use of computers with graphics capacities to produce printed
materials for public consumption such as newspapers and magazines. DTP is much faster and
more flexible than typesetting. Publishers can easily make last minutes changes.
3. Journalism: This is the profession of reporting or editing news stories for the mass. Journalists
get information noted down on paper or through some other means like audio recording device.
4. Education: Word processing offers high versatility and flexibility to education. It is also
model-free instructional software, i.e. it provides many general relative advantages to teachers
and students. Word processing helps teachers use reparation time more efficiently by letting
them modify materials (lesson plan, lesson note and diaries) instead of creating new ones.
Enhances document appearance and allows sharing of documents.
5. Articles: Word processing has reduced the stress involved in article writing. The features
of modern word processing software such as Search and Replace, Go to, File sharing etc. have
made article writing more flexible unlike when typewriter was used.
6. Home: Word processing in the home tends to be educational, planning or business
related, dealing with assignments or work being completed at home or occasionally
recreational, e.g. writing short stories, letter writing, resume creation and card creation.
1. Type Document
www.deeperlifehighschool.org …leadership with distinction
The keyboard is used to type a document. You type a document by pressing the relevant keys
on the keyboard in order to arrive at the desired word. You do not have to worry about
overflowing the text line because the program will take care of breaking it up appropriately.
This automatic line breaking features is called word wrapping.
2. Edit Document
This is the ability to change text by adding, deleting and re-arranging letters, words, sentences
and paragraph. Text editing is the main operation users perform in word processing, which
also handles graphics and other multimedia files.
3. Store Document
Word processor gives the opportunity of accessing a previously saved file or document either
on the computer or on external storage facility, e.g. flash disk, DVD, diskette, etc. the
following are the three ways of saving a document:
(a) Click on File on the menu bar, the file menu list appears, click on the ‘SAVE’ command
(b) Click on the save button on the standard tool bar.
(c) Press CTRL + S on the keyboard. If you are saving the document for the first time, the
‘Save As’ dialog box will appear after you have used any of the three methods above.
Then type the file name in the space provided in a dialog window in front of ‘FILE NAME’
(the file name must be a name that reflects its contents for easy and quick retrieval).
Click on the ‘SAVE’ button.
You can remove the space between paragraphs you have already typed in your document.
Simply select the paragraphs and then follow the above steps.
3. Justification
Justification in word processor means to adjust horizontal spacing, so that text is aligned evenly along
both the left and right margins. Justifying text creates a smooth edge on both sides.
Steps
i. Highlight the text
ii. Press Ctrl + J on the keyboard OR
ii. In the Replace with text box, type the word you will like to use to replace the existing ones in
the document.
iv. Click Replace to replace only that word.
v. Click Replace All to replace all the occurrence of the word.
5. Spell Check/Thesaurus
This is the capability of the word processor to check the correctness of spelling or the grammar of a
document using a particular dictionary; it could be British or American dictionary.
Type the text exactly as seen and observe how the word processor underlines words and sentences.
Take your cursor over the underlined texts and right-click to see the correct options.
6. File Merging
Modern word processors have the ability of joining two or more documents from one. These
documents can be texts or graphics. Steps:
i. Create a new blank document and then set the page layout to be similar to the documents that
you are going to merged.
ii. Click Insert tab option in the Office ribbon menu bar
iii. In the Text group, click on the down arrow at the right side of object.
LESSON OBJECTIVES:
• Working with object, pictures and shapes, grouping of shapes in Ms Word.
• Using the Drop cap
• Steps creating water mark
• Inserting footer and header
A drop cap (dropped capital) is a large capital letter used as a decorative element at the beginning
of a paragraph or section. The size of a drop cap is usually two or more lines.
The following illustration shows your options for positioning a drop cap.
▪ To create a drop cap that is in the margin, outside of your paragraph, select In margin.
CONTENT:
To delete, select Insert > Header (or Footer) > Remove Header (or Remove Footer)
PRACTICE EXERCISE:
Task: Creating a Newsletter Article
Imagine you are part of a school's journalism club, and you've been assigned to create an article for
the upcoming school newsletter. Your article will be about the recent Pi day that took place in your
school. Follow the instructions below to complete the task:
1. Open a New Document Open a blank document in a word processing software of your
choice.
2. Formatting: Format your document with the following specifications:
- Set the font style to "Arial" and the font size to 12.
- Align the text to justify.
- Insert a centered title at the top of the document: "Highlights from the Annual Pi day"
3. Introduction Write an introduction paragraph (3-4 sentences) introducing the Pi day and its
significance to the school community.
4. Event Details create a bulleted list that includes at least four key event details from the science fair
(e.g., projects displayed, participating grades, special guests).
5. Participant Interviews: Add a section with two participant interviews. Use italic font for the
interviewees' names and bold for their answers. Include questions about their favorite project and
what they learned from the experience.
6. Visuals insert one relevant image from the Pi day. Position it to the right of the text and provide a
caption for the image.
7. Conclusion Write a closing paragraph summarizing the success of the Pi day and encouraging
readers to look forward to more school events.
WEEK: 6
TOPIC: System Development Cycle.
LESSON OBJECTIVES:
• Definition of System Development Cycle
• Description of System Development Cycle.
• Stages in System Development Cycle: (i) Preliminary study (ii) Feasibility study (iii)
Investigative study (iv) Analysis (v) Design (vi) Implementation (viii) Study review.
SUB-TOPIC 1: Description of System Development Cycle.
CONTENT:
Description of System Development Cycle
The System Development Life Cycle (SDLC) process applies to information system development
projects ensuring that all functional and user requirements and agency strategic goals and objectives
are met. The SDLC provides a structured and standardized process for all phases of any system
development effort. These phases track the development of a system through several developmental
stages from feasibility analysis, system planning and concept development; to acquisition and
requirements definition; design; development; integration and testing; deployment and acceptance;
though deployment and production; and finally to system retirement or maintenance.
(ii) Feasibility study: After the system proposal is accepted by the management, the next phase
is to examine the feasibility of the system. The feasibility study is basically the test of the
proposed system in the light of its workability, meeting user’s requirements, effective use of
resources and of course, the cost effectiveness. These are categorized as technical, operational,
economic, schedule and social feasibility. The main goal of feasibility study is not to solve the
problem but to achieve the scope. In short, following decision are taken in different feasibility
study:
Economic feasibility - The likely benefits outweigh the cost of solving the problem which is
generally demonstrated by a cost/ benefit analysis.
Operational feasibility - Whether the problem can be solved in the user’s environment with existing
and proposed system workings?
Organizational feasibility – Whether the proposed system is consistent with the organization’s
strategic objectives?
Technical feasibility - Whether the problem be solved using existing technology and resources
available?
(iii) Investigative study: The detailed investigation of the system is carried out in accordance
with the objectives of the proposed system. This involves detailed study of various operations
performed by a system and their relationships within and outside the system. During this process,
data are collected on the available files, decision points and transactions handled by the present
system. Interviews, on-site observation and questionnaire are the tools to be used for detailed
system study. Using the following steps it becomes easy to draw the exact boundary of the new
system under consideration:
▪ Keeping in view the problems and new requirements
▪ Workout the pros and cons including new areas of the system
All the data and the findings must be documented in the form of detailed data flow diagrams (DFDs),
data dictionary, logical data structures and miniature specifications. It includes planning for the new
system, analysis of requirement, system constraints, functions and proposed system architecture,
prototype of the proposed system and its analysis.
▪ The new project will then proceed through all the above life cycle phases.
(v) Design: Based on the user requirements and the detailed analysis of a new system, the new
system must be designed. This is the phase of system designing. It is the most crucial phase in
the development of a system. The logical system design arrived at as a result of system analysis
and is converted into physical system design. In the design phase the SDLC process continues to
move from the, what questions of the analysis phase to the how. The logical design produced
during the analysis is turned into a physical design - a detailed description of what is needed to
solve original problem. Input, output, databases, forms, codification schemes and processing
specifications are drawn up in detail. In the design stage, the programming language and the
hardware and software platform in which the new system will run are also decided. In the design
stage, logical design is translated into computer programming codes after which testing is done
to ensure a workable system
Coding
The system design needs to be implemented to make it a workable system. This demands the
coding of design into computer language, i.e., programming language. This is also called the
programming phase in which the programmer converts the program specifications into computer
instructions, which we refer to as programs. It is an important stage where the defined procedures
Testing
Before actually implementing the new system into operations, a test run of the system is done
removing all the bugs, if any. It is an important phase of a successful system. After codifying the
whole programs of the system, a test plan should be developed and run on a given set of test data.
The output of the test run should match the expected results. Sometimes, system testing is
considered as a part of implementation process.
Using the test data following test run are carried out:
▪ Program test
▪ System test
Program test: When the programs have been coded and compiled and brought to working
conditions, they must be individually tested with the prepared test data. All verification and
validation be checked and any undesirable happening must be noted and debugged (error
corrected).
System Test: After carrying out the program test for each of the programs of the system and errors
removed, then system test is done. At this stage the test is done on actual data. The complete system
is executed on the actual data. At each stage of the execution, the results or output of the system is
analyzed. During the result analysis, it may be found that the outputs are not matching the expected
output of the system. In such case, the errors in the particular programs are identified and are fixed
and further tested for the expected output.
(vi) Implementation: After having the user acceptance of the new system developed, the
implementation phase begins. Implementation is the stage of a project during which theory is
turned into practice. The major steps involved in this phase are:
▪ Acquisition and Installation of Hardware and Software
▪ Conversion
▪ User Training
▪ Documentation
The hardware and the relevant software required for running the system must be made fully
operational before implementation. The conversion is also one of the most critical and expensive
activities in the system development life cycle. The data from the old system needs to be converted
to operate in the new format of the new system. The database needs to be setup with security and
recovery procedures fully defined.
During this phase, all the programs of the system are loaded onto the user’s computer. After loading
the system, training of the user starts. Main topics of such type of training are:
▪ How to execute the package?
▪ How to enter the data?
▪ How to process the data (processing details)?
WEEK: 8
TOPIC: SDLC
LESSON OBJECTIVES:
• Application process of SDLC
• Group (students) Presentations
SUB-TOPIC 1: Application process of SDLC
CONTENT:
The application of the Software Development Life Cycle (SDLC) in a firm involves implementing
a structured approach to develop and manage software projects. Here's how SDLC can be
applied in a firm:
1. Initiation
- Identify the need for a new software application or an update to an existing one.
- Define the scope, objectives, and expected outcomes of the project.
- Allocate resources, budget, and establish a project team.
2. Requirement Gathering and Analysis:
www.deeperlifehighschool.org …leadership with distinction
- Engage with stakeholders to understand their needs and expectations.
- Document detailed requirements, features, and functionalities.
- Analyze the feasibility, technical complexity, and potential risks of the project.
3. Planning:
- Create a project plan outlining the timeline, tasks, and milestones.
- Define roles and responsibilities for team members.
- Allocate resources, including personnel, hardware, and software tools.
4. Design
- Design the architecture and technical specifications of the software.
- Create wireframes or prototypes to visualize user interfaces.
- Plan the database structure, data flow, and integration points.
5. Implementation (Coding)
- Develop the software based on the design specifications.
- Write clean, maintainable code following coding standards and best practices.
- Collaborate using version control systems and development environments.
6. Testing:
- Develop comprehensive test cases and scenarios.
- Conduct different levels of testing, including unit testing, integration testing, and user
acceptance testing.
- Identify and resolve defects and issues.
7. Deployment:
- Prepare the software for deployment in the production environment.
- Set up servers, databases, and other necessary components.
- Test the software in the target environment to ensure stability and compatibility.
8. Maintenance and Support:
- Monitor the software in the live environment for performance, security, and user experience.
- Address user feedback, bugs, and feature requests.
www.deeperlifehighschool.org …leadership with distinction
- Release updates, patches, and enhancements as needed.
9. Documentation:
- Maintain thorough documentation of the project, including design, code, and user guides.
- Document changes and updates made during the development process.
- Ensure documentation is accessible to the relevant stakeholders.
10. Project Management:
- Monitor project progress against the defined timeline and milestones.
- Manage risks and issues as they arise.
- Communicate project status and updates to stakeholders.
11. Change Management:
- Address changes in project scope or requirements through a structured change management
process.
- Assess the impact of changes on the project timeline, budget, and resources.
12. Feedback and Iteration:
- Gather feedback from end-users and stakeholders after deployment.
- Use feedback to identify areas for improvement and plan iterative updates.
13. Training and Knowledge Transfer:
- Provide training to users on how to use the software effectively.
- Ensure that the development team transfers knowledge to support and maintenance teams.
14. Compliance and Security:
- Ensure the software complies with relevant industry regulations and security standards.
- Implement security measures to protect data and user information.
15. Continuous Improvement:
- Conduct post-project reviews to identify lessons learned and areas for improvement.
- Use insights from reviews to refine the firm's SDLC processes for future projects.
By following a structured SDLC approach, a firm can effectively manage software projects,
minimize risks, deliver high-quality software solutions, and meet the needs of both internal and
external stakeholders.
www.deeperlifehighschool.org …leadership with distinction
PRACTICE EXERCISE:
Students should identify one problem or challenge in their campus and state the process of solving
the problem using SDLC
SUB-TOPIC 2: Group Presentation
CONTENT:
The students should be grouped, each group will select a spoke person that will represent the
entire group, at the end of the presentation the audience (classmate) will be given the floor to
ask tough questions any member of the group is free to respond to the questions.
Teacher should pay attention to the presentation delivery, confidence, speaking, knowledge
based, marks should awarded evenly to the group.( 5 mins for each presentation)
ENTRY BEHAVIOUR: Students are expected to have solid foundation in basic arithmetic and
number theory.
SUB-TOPIC 1: (a) Review of number bases (i) Binary (ii) Octal (iii) Decimal (iv) Hexadecimal
CONTENT:
PRACTICE EXERCISE:
Fill in the blanks with the appropriate terms or values to complete the sentences correctly.
SUB-TOPIC 3: (c) Basic Arithmetic in number bases (i) Addition (ii) Subtraction.
CONTENT:
PRACTICE EXERCISE:
Fill in the blanks correctly with the results of the arithmetic operations in the specified number
bases.
1. In binary addition, when adding 1 and 1, the result is __________ with a carry of
__________.
2. In octal subtraction, when subtracting 3 from 7, the result is __________.
3. The addition of 5 and 7 in hexadecimal yields __________.
4. In binary multiplication, when multiplying 101 by 10, the result is __________.
5. The result of subtracting 25 from 37 in octal is __________.
6. When dividing 1101 by 11 in binary, the quotient is __________ and the remainder is
__________.
7. In hexadecimal addition, adding B and 6 gives you __________.
8. Multiplying 25 by 3 in octal results in __________.
9. When performing 1111 minus 1001 in binary, the result is __________.
10.Dividing AB by 11 in hexadecimal gives a quotient of __________ and a remainder of
__________.
www.deeperlifehighschool.org …leadership with distinction
CONCLUSION
TOPICAL TEST:
ESSAY
Binary Triangle:
Imagine you have a triangle made up of rows of binary numbers like this:
1
10
www.deeperlifehighschool.org …leadership with distinction
11
100
101
110
111
Each row represents a binary number, where each digit is either 0 or 1. Can you find the pattern
in the rows and determine the next three rows in the sequence?
Give it a shot! This brain teaser challenges you to discern the pattern and continue the sequence
based on the rules of binary numbers.
INSPIRATIONAL QUOTES: