Information Technology For CSEC® Examinations - Nodrm
Information Technology For CSEC® Examinations - Nodrm
Information Technology For CSEC® Examinations - Nodrm
Information
Technology
for CSEC® Examinations
Teacher resources
Teachers can log on to www.macmillan-caribbean.com/resources to find and utilise
ExamView® test banks, a valuable database of questions to create electronic and
paper based tests for use online and in the classroom to help build students’
confidence in preparation for the exams.
Information
Technology
for CSEC® Examinations 2nd Edition
Howard Campbell
ISBN 978-0-230-48336-1 AER All rights reserved; no part of this publication may be reproduced,
ISBN: 978-0-230-42694-8 AER stored in a retrieval system, transmitted in any form, or by any
ISBN: 978-0-230-42694-8 AER stored in a retrieval system, transmitted in any form, or by any
ISBN: 978-0-230-42694-8 AER stored in a retrieval system, transmitted in any form, or by any
means, electronic, mechanical, photocopying, recording, or
means, electronic, mechanical, photocopying, recording, or
Text © Howard Campbell 2014
means, electronic, mechanical, photocopying, recording, or
Text © Howard Campbell 2014
otherwise, without the prior written permission of the publishers.
Text © Howard Campbell 2014
otherwise, without the prior written permission of the publishers.
Design and illustration © Macmillan Publishers Limited 2014
otherwise, without the prior written permission of the publishers.
Design and illustration © Macmillan Publishers Limited 2014
Design and illustration © Macmillan Publishers Limited 2014 The Typeset by E Clicks Enterprise, Malaysia
author has asserted his rights to be identified as the author of Typeset by E Clicks Enterprise, Malaysia
Typeset by E Clicks Enterprise, Malaysia
Designed by Macmillan Education Alamy/Art Directors & TRIP p41(b), Alamy/Pashkov Andrey
Designed by Macmillan Education
Designed by Macmillan Education Alamy/Art Directors & TRIP p41(b), Alamy/Pashkov Andrey
Illustrated by TechType Alamy/Art Directors & TRIP p41(b), Alamy/Pashkov Andrey
Illustrated by TechType p22(br), Alamy/Art Directors & TRIP p23, Alamy/Ted Foxx
Illustrated by TechType p22(br), Alamy/Art Directors & TRIP p23, Alamy/Ted Foxx
Cover design by Clare Webber p22(br), Alamy/Art Directors & TRIP p23, Alamy/Ted Foxx
Cover design by Clare Webber p39(a), Alamy/David Hancock p115(tcl), Alamy/Jiri Hera p8,
Cover design by Clare Webber p39(a), Alamy/David Hancock p115(tcl), Alamy/Jiri Hera p8,
Cover image by Corbis/JGI/Jamie Grill/Blend Images and p39(a), Alamy/David Hancock p115(tcl), Alamy/Jiri Hera p8,
Cover image by Corbis/JGI/Jamie Grill/Blend Images and Alamy/ D. Hurst p116(cl), Alamy/Brian Jackson p116(cr), Alamy/
Alamy/ D. Hurst p116(cl), Alamy/Brian Jackson p116(cr), Alamy/
Cover image by Corbis/JGI/Jamie Grill/Blend Images and Alamy/ D. Hurst p116(cl), Alamy/Brian Jackson p116(cr), Alamy/
Devon Shaw Konstantin Iliev p49(l), Alamy/ Image Source p116(tl), Alamy/
Devon Shaw Konstantin Iliev p49(l), Alamy/ Image Source p116(tl), Alamy/
Devon Shaw Konstantin Iliev p49(l), Alamy/ Image Source p116(tl), Alamy/
Picture research by Catherine Dunn Indigo Photo Agency p31(brc), Alamy/Christopher King p27(i),
Picture research by Catherine Dunn Indigo Photo Agency p31(brc), Alamy/Christopher King p27(i),
Picture research by Catherine Dunn Indigo Photo Agency p31(brc), Alamy/Christopher King p27(i),
Alamy/ Christopher King p17, Alamy/Marek Kosmal p31(blc),
The author and publishers would like to thank the following Alamy/ Christopher King p17, Alamy/Marek Kosmal p31(blc),
Alamy/ Christopher King p17, Alamy/Marek Kosmal p31(blc),
The author and publishers would like to thank the following Alamy/ Ilene MacDonald p115(tl), Alamy/ Oleksiy Maksymenko
Alamy/ Ilene MacDonald p115(tl), Alamy/ Oleksiy Maksymenko
The author and publishers would like to thank the following Alamy/ Ilene MacDonald p115(tl), Alamy/ Oleksiy Maksymenko
consultants and education professionals for their contribution to p38, Alamy/Nenov Brothers Photography p50(bc), Alamy/
consultants and education professionals for their contribution to p38, Alamy/Nenov Brothers Photography p50(bc), Alamy/
consultants and education professionals for their contribution to p38, Alamy/Nenov Brothers Photography p50(bc), Alamy/ Niels
this edition: Poulsen p39(c), Alamy/NUAGE p50(a), Alamy/Guy Primo
this edition: Niels Poulsen p39(c), Alamy/NUAGE p50(a), Alamy/Guy Primo
this edition: Niels Poulsen p39(c), Alamy/NUAGE p50(a), Alamy/Guy Primo
Consultants: Keith Burkette (St. Mary’s College, Trinidad and p115(bc), Alamy/Jeremy Sutton-Hibbert p115(tcr), Alamy/
Consultants: Keith Burkette (St. Mary’s College, Trinidad and p115(bc), Alamy/Jeremy Sutton-Hibbert p115(tcr), Alamy/
p115(bc), Alamy/Jeremy Sutton-Hibbert p115(tcr), Alamy/
Consultants: Keith Burkette (St. Mary’s College, Trinidad and Aleksandr Ugorenkov p31(bll), Alamy/Finnbarr Webster p22(bl),
Tobago), Gareth Byrne (UK) and Alan Wood (UK) Aleksandr Ugorenkov p31(bll), Alamy/Finnbarr Webster p22(bl),
Tobago), Gareth Byrne (UK) and Alan Wood (UK) Aleksandr Ugorenkov p31(bll), Alamy/Finnbarr Webster p22(bl),
Tobago), Gareth Byrne (UK) and Alan Wood (UK) Alamy/Westend61 GmbH p27(iv), Alamy/Shaun Wilkinson
Teachers: Jamaica: Huntley Anderson, Shawnette Dewar, Alamy/Westend61 GmbH p27(iv), Alamy/Shaun Wilkinson
Alamy/Westend61 GmbH p27(iv), Alamy/Shaun Wilkinson p49(r),
Kesha Teachers: Jamaica: Huntley Anderson, Shawnette Alamy/ ZUMA Press, Inc. p37(bl); Art Directors/Helene
p49(r), Alamy/ ZUMA Press, Inc. p37(bl); Art Directors/Helene
Dewar, Kesha p49(r), Alamy/ ZUMA Press, Inc. p37(bl); Art Directors/Helene
Teachers: Jamaica: Huntley Anderson, Shawnette Dewar, Kesha Rogers p129(bl); Howard Campbell p30(a); Corbis/Chris
Fraser, Meleseia Hawthorne, Janice Jones, Haidie Morant, Aggrie Rogers p129(bl); Howard Campbell p30(a); Corbis/Chris
Fraser, Meleseia Hawthorne, Janice Jones, Haidie Morant, Aggrie Rogers p129(bl); Howard Campbell p30(a); Corbis/Chris
Fraser, Meleseia Hawthorne, Janice Jones, Haidie Morant, Aggrie Collins p3(desktop), Corbis/ JLP/Jose L. Pelaez p232(c),
Osbourne; St. Vincent: Sherricea Burgin, Soyini Clarke-Palmer, Corbis/
Osbourne; St. Vincent: Sherricea Burgin, Soyini Clarke-Palmer, Collins p3(desktop), Corbis/ JLP/Jose L. Pelaez p232(c), Corbis/
Osbourne; St. Vincent: Sherricea Burgin, Soyini Clarke-Palmer, Collins p3(desktop), Corbis/ JLP/Jose L. Pelaez p232(c), Corbis/
Sheddie Conliff, Veneisha Daniel, Suzanna Leigertwood Ollivierre, Ocean p46(fig1), Corbis/Edward Rozzo p37(cl), Corbis/ Gonçalo
Sheddie Conliff, Veneisha Daniel, Suzanna Leigertwood Ollivierre, Ocean p46(fig1), Corbis/Edward Rozzo p37(cl), Corbis/ Gonçalo
Sheddie Conliff, Veneisha Daniel, Suzanna Leigertwood Ollivierre, Ocean p46(fig1), Corbis/Edward Rozzo p37(cl), Corbis/ Gonçalo
Michael Scott Silva/Demotix p41(c), Corbis/ Wavebreak Media LTD p35;
Michael Scott Silva/Demotix p41(c), Corbis/ Wavebreak Media LTD p35;
Michael Scott Silva/Demotix p41(c), Corbis/ Wavebreak Media LTD p35;
Special thanks to Channyatt Bullock-Ramsamooj, Ministry of Getty Images pp86, 232(b), Getty/AtomA p3(phone), Getty/
Getty Images pp86, 232(b), Getty/AtomA p3(phone), Getty/
Special thanks to Channyatt Bullock-Ramsamooj, Ministry of Getty Images pp86, 232(b), Getty/AtomA p3(phone), Getty/
Pawea Bartkowski p32(tl), Getty/Michael Bodmann p20, Getty/
Special thanks to Channyatt Bullock-Ramsamooj, Ministry of Pawea Bartkowski p32(tl), Getty/Michael Bodmann p20, Getty/
Education, St. Vincent and the Grenadines, for facilitating a team Pawea Bartkowski p32(tl), Getty/Michael Bodmann p20, Getty/
Education, St. Vincent and the Grenadines, for facilitating a team Keith Brofsky p116(c), Getty/Peter Dazeley pp34(blt), Getty/
Education, St. Vincent and the Grenadines, for facilitating a team Keith Brofsky p116(c), Getty/Peter Dazeley pp34(blt), Getty/
review. Keith Brofsky p116(c), Getty/Peter Dazeley pp34(blt), Getty/
review. Felbert+Eickenberg/STOCK4B p115(br), Getty/Maciej Frolow
review. Felbert+Eickenberg/STOCK4B p115(br), Getty/Maciej Frolow
The author and publishers would like to thank the following for Felbert+Eickenberg/STOCK4B p115(br), Getty/Maciej Frolow
The author and publishers would like to thank the following for p3(tablet), Getty/Halfdark p33(bl), Getty/Jetta Productions
p3(tablet), Getty/Halfdark p33(bl), Getty/Jetta Productions
The author and publishers would like to thank the following for p3(tablet), Getty/Halfdark p33(bl), Getty/Jetta Productions
permission to reproduce their photographs: p33(tl), Getty/Howard Kingsnorth p3(laptop), Getty/Stephen
permission to reproduce their photographs: p33(tl), Getty/Howard Kingsnorth p3(laptop), Getty/Stephen
permission to reproduce their photographs: p33(tl), Getty/Howard Kingsnorth p3(laptop), Getty/Stephen Krow
p27(ii), Getty/Ryan McVay p31(bl), Getty/Edgaras Marozas secondary storage differ? 14 How is storage capacity
Krow p27(ii), Getty/Ryan McVay p31(bl), Getty/Edgaras Marozas
measured? 14 Types of primary storage devices 16
Krow p27(ii), Getty/Ryan McVay p31(bl), Getty/Edgaras Marozas
pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), Getty/Greg Secondary storage media 18 Comparing secondary
pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), Getty/Greg storage media 23
pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), Getty/Greg
Nicholas p39(b), Getty/Neustockimages p130(tl), Getty/nullplus 3 Input and output devices 28 Data collection basics 29 Input,
Nicholas p39(b), Getty/Neustockimages p130(tl), Getty/nullplus
input devices and input media 29 Input devices in the
Nicholas p39(b), Getty/Neustockimages p130(tl), Getty/nullplus
p34(blb), Getty/Oktaydegirmenci p33(b), Getty/George Pchemyan home 31 Input devices in the retail trade 32 Output
p34(blb), Getty/Oktaydegirmenci p33(b), Getty/George Pchemyan devices 37
p34(blb), Getty/Oktaydegirmenci p33(b), Getty/George Pchemyan
p27(iii), Getty/Chris Pritchard p95, Getty/Rouzes p39(t), Getty/ 4 The Internet and communications technology 47 Data
p27(iii), Getty/Chris Pritchard p95, Getty/Rouzes p39(t), Getty/
communication and networks 48 The World Wide Web
p27(iii), Getty/Chris Pritchard p95, Getty/Rouzes p39(t), Getty/
Baris Simsek p48, Getty/Thinkstock Images p115(tr), Getty/Tsuji (WWW) 55 Communicating globally using network-based
Baris Simsek p48, Getty/Thinkstock Images p115(tr), Getty/Tsuji tools 57
Baris Simsek p48, Getty/Thinkstock Images p115(tr), Getty/Tsuji
p31(br); Macmillan Education pp36(t), p115 (bl); NPG- a 5 Data storage and manipulation 62 Number systems 63
p31(br); Macmillan Education pp36(t), p115 (bl); NPG- a
Binary addition 67 Binary subtraction 69 Representing
p31(br); Macmillan Education pp36(t), p115 (bl); NPG- a
division of Macmillan Publishers Ltd p58(cr); Science Photo integers 69 Storing text data 73
division of Macmillan Publishers Ltd p58(cr); Science Photo
division of Macmillan Publishers Ltd p58(cr); Science Photo
6 System programs and application programs 77 The
Library p51, Science Photo Library/CHASSENET p37(blt), difference between system programs and
Library p51, Science Photo Library/CHASSENET p37(blt),
applications programs 78 System software 78 Functions
Library p51, Science Photo Library/CHASSENET p37(blt),
Science Photo Library/DAVID PARKER p129, Science of an operating system 79 Processing modes 83
Photo Application programs 84
Science Photo Library/DAVID PARKER p129, Science Photo
Science Photo Library/DAVID PARKER p129, Science Photo 7 Information processing 91 Data, information and information
Library/MARTIN RIEDL p232(a); Superstock/Corbis p36(bl),
processing 92 Data: Sources, verification and validation
Library/MARTIN RIEDL p232(a); Superstock/Corbis p36(bl),
Library/MARTIN RIEDL p232(a); Superstock/Corbis p36(bl), 95 File organisation and access 100
SuperStock/Cusp pp33(a), 46(fig3), 128(tl); Thinkstock p108;
SuperStock/Cusp pp33(a), 46(fig3), 128(tl); Thinkstock p108;
SuperStock/Cusp pp33(a), 46(fig3), 128(tl); Thinkstock p108;
Theyummytruth.com – a great combination of eye-grabbing
Theyummytruth.com – a great combination of eye-grabbing
Theyummytruth.com – a great combination of eye-grabbing
imagery and easy-to-navigate functionality p58(cl).
imagery and easy-to-navigate functionality p58(cl).
imagery and easy-to-navigate functionality p58(cl).
These materials may contain links for third party websites. We 8 Data security 107 Introduction to data security 107 Common
vulnerabilities and threats 109 Data misuse 111 Protecting
These materials may contain links for third party websites. We
your computer system 114 Operational procedures 118
These materials may contain links for third party websites. We
have no control over, and are not responsible for, the contents of 9 The impact of ICT on jobs, skills and careers 124 The impact
have no control over, and are not responsible for, the contents of
have no control over, and are not responsible for, the contents of of Information Technology on jobs 124 Computer-related
such third party websites. Please use care when accessing them. professions 125 Career opportunities for hardware
such third party websites. Please use care when accessing
support
them.such third party websites. Please use care when professionals 125 Career opportunities related to the
accessing them. Internet 127 Career opportunities in IT-related industries
127 Computer applications in business and industry 127
iii
Part 3: Productivity tools 17 Information integration 336 Using data from Microsoft
Access in Microsoft Excel 336 Using data from Microsoft
12 Mastering word processing 195 Introduction to word
Excel in Microsoft
processing 196 Creating a document 199 Columns and
PowerPoint 338 Perform a mail merge using an external
tables 203 Working with graphics 206 Document editing
data source 338
208 Formatting 216
13 Mastering presentations 231 Presentations 232 Creating a
The School-Based Assessment
presentation 235
18 Mastering the School-Based Assessment 345
14 Mastering web page design 243 Introduction to web page
Requirements of the School-Based Assessment 345 Mark
design 244 Creating simple web pages 244 Creating and
allocation 346 Some tips to help you master the SBA 346
hosting your own website 248
Practice your way to a high SBA score 346 Key skills and
15 Mastering spreadsheets 250 Introduction to spreadsheets mark allocation 353
251 Features of spreadsheets 252 Creating and setting up
your workbook 254 Data extraction 279 Answers to multiple-choice questions 356
16 Mastering database management 292 Introduction to
databases 293 Creating and populating a database 295
Glossary 357 Index 363
iv
Page finder
nder gives you Syllabus sections
es from
o e s
g
n n o
a e
i i e a
a
on in the
s r g
t
v n b
l n h
l a i
g s s
®
Information
a a
a
e o
o
s t
n d
t i m
s
syllabus at
o p t
r
o r s a
t a
-
a n r i
n e n
ps.
o
t e
a
g f r D
e T b
P
m c
t a e
w i n p
e
C :
t s I
: c S
e o
m
n 8
f I
l r m
i :
e 3 g :
w
a e
o l e
b 7
5 p
d f n
s n
d n p g
i d
o m n
o
o
s d
n r o p a
n o
e n
d i
m i
i s r
P s t
u l
a t
o n
n t A
a e o
c c
F p n i
: a
a c
r c e
:
t n e
2 e o
W S
: g c S
m 4 m
i o o
e S
i
o e :
1 t r i
r n
a t
r S
n p 6
a o
n c
p a
i o
o i t
w i
t n
i l
n
d t
t c n
d
p o
e c e
r
n i
c
e g
a S t
a m
e s
S i
i
S
h c
s
e
e
r
e
S
p
d
e
e
v
s
i
Objective 4 15 140 184 107 97 221 270 295
s
t
e
b
j
b
a
l
Objective 6 18 141 174 127 100 210 262 298
l
o
y
Objective 7 29 145 175 128 100 203 266 319
c
s
fi
e
Objective 8 37 157 180 126 216 267 302
i
t
e
i
Objective 10 8 183 338 262 313
S
i
Objective 11 78 172 213 274 321
w
(
Objective 12 80 201 279
Objective 16 236
Objective 17 236
Objective 18 236
Objective 19 239
Objective 20 237
Objective 21 237
Objective 22 239
Objective 23 239
Objective 24 244
Objective 25 244
Objective 26 246
Objective 27 247
Objective 28 247
v
About this book
This book isn’t just words on a page.
This book contains a range of different features to introduce, teach and highlight key
information throughout the course. These pages explain how to use them. The larger column
contains the main text and diagrams; you can read straight down it without interruption.
The smaller column contains other useful facts, so make sure you use it to check your
understanding. You should remember to spend time studying the fi gures and diagrams as well as
the text.
each chapter tells you what topics you will defi ne what a computer is
be covering. They will help you to plan describe a general-purpose computer system
and measure your learning.
identify the major components that make up a typical
Concept map
computer system explain the function of the central
processing unit General-purpose
Computer Systems
explain the function of memory
The concept maps represent knowledge interpret the hardware specifi cations of a computer system.
organisation visually to help you learn
as tools to help connect prior knowledge
with new information.
perform major
functions examples
disk
flash drives
storage CPU:
control unit
ALU
input/output devices
output
processing
general-purpose:
desktops
memory
cards
you to extend
laptops
notebooks
netbooks
smartphones
primary memory: ROM
output devices: printers
monitors input devices: keyboard
RAM speakers mouse
PROM multimedia projectors microphone
scanner
The expanded IT bar code readers
Group activities
1 This is a small-group activity for 3–4 people.
a Each group member should collect at least TWO source documents generated in each of the
A wide assortment of following scenarios: • a classroom environment
game-based and • a home
• a micro or small business (ask the Principles of Business teacher at your school what this is)
real-world problems • a meeting of a sports team or co-curricular activity (Cadet, Key Club, etc.)
is presented for b Compare the documents collected from each area. Note their similarities and differences. c
small groups to complete. You and your classmates can improve Classify all the documents as either human-readable or machine- readable.
d Suggest which device(s) are ideal for reading the documents categorised as
on ideas as you share in fi nding solutions in an environment machine-readable. e Paste the documents in your portfolio and record your findings next to
where the group evaluates its own success. each of them.
1 This activity will explore the concepts related to data communications and networking.
(B) Storage
(C) Input
(D) O
currently being executed is:
This is the style of question you may come (A) arithmetic logic unit
across in your exam. Your teacher will (B) floppy diskette
(C) main memory
suggest how you can use them, but (D) secondary storage
they will measure what you have learnt
Examination-style questions Multiple-choice and help to identify any gaps in your 8 Which of the rows in the following table does NOT
contain the correct information?
questions knowledge so you can revisit the relevant
Computer Hardware
TEST BANK
sections of the book. specificatio component
Instructions: Each of the following questions has n
four suggested responses labelled (A), (B), (C) or
7 The component that stores the program and data
(D). Read each question carefully then select the
most suitable response.
1 ____________ is an area of a computer that
temporarily holds data that is waiting to be
processed, stored, or output. I lk d
(A) Memory
vi
There are a wide an important new word appears in the text, it is
variety highlighted at the side. Sometimes a short defi
of activities to nition is given in the main text. An in-depth
complete so explanation is provided in the glossary at the
that you can reinforce back of the book.
and
extend your knowledge
and
skills that are covered in
each chapter. 8 • Data security
8 • Data security
archive ❯
Archiving data
Sign in to Online Banking
An archive comprises the files created or received by an institution or
User ID: organisation during the course of routine business that are stored because of
Password: their value.
Sign In >
Depending on the nature of the data, some companies may archive data
Figure 8.12 Passwords are a sequence monthly, others quarterly or annually. These files are usually stored on
of letters, numbers and special removable media such as DVDs or magnetic tapes and kept in a secure
characters that must location. Files in an archive will be kept for a period of time and then
destroyed. practice to copy data to another storage device or media. internal consistency of the data stored in a database.
Adopting a regular backup system such as the Grandfather-Father-Son • Physical access restrictions can prevent unauthorised personnel from
System means that if disaster should strike the organisation can recover damaging the computer hardware. • Access to IT systems can be restricted
almost all of its data quickly and business can continue as usual. It is by requiring all legitimate users to input a valid username and password
important to keep each generation of backup separate from the rest. The before being able to gain access to the system.
Figure 8.11 Windows Firewall is implemented as a software-only file son can be kept in the computer room, the father in a fireproof cabinet and
• A firewall acts as a barrier between a computer system and an external
security mechanism and is a component of the operating system. the grandfather in another building. For a fast-moving business backups network.
may be taken every day rather than every week. If a hard disk drive fails the
• Encryption, overwrite protection, password, and making a file read-only
ITQ15 most recent backup, the son, can be used to restore the data. In the event of
access are mechanisms that may be used to help maintain file integrity.
List THREE potential threats to a backup media? a fire in the computer room destroying the son backup and the computer
system, the father backup can be used to restore the company data. In the • Individual files can be protected using encryption techniques that require
worst case, a whole building may be flooded but the grandfather backup can the reader to have a correct password to decrypt the file.
still be used to restore the data. • Viruses, Trojans and worms are malicious program that may infect and do
A backup is a safety copy of files that can be used to recover data in case of an event harm to a computer system and its data; up-to-date antivirus software can
that causes data damage or loss.
• Data security is all about identifying and assessing computer security
risks. protect computer systems from virus attacks.
Backing up data
• A computer security risk is any event, action or situation – intentional or • Computer fraud involves the use of computers to illegally obtain money,
It is unwise to rely on a single storage device for storing important data. The not – that could lead to the loss of computer systems and the data they goods or services. There are many types of computer fraud including
device and the data it contains may fall prey to one of the accidental or contain. identity theft, credit card fraud, electronic eavesdropping and surveillance.
deliberate actions or events mentioned earlier. To safeguard data, it is good
• Data integrity is concerned with ensuring the accuracy, completeness and
accidental deletion or computer fraud whereas an archive comprises the files created, received and accumulated
(a) (b)
• Backups are copies of files that can be restored in the event that the original files are lost through hardware failure, over time and retained for historical use.
failure caused by intermittent power
outages causes partial data loss; (b)
hard disk failure caused by a power
surge causes total data loss; (c) laptop
containing the data is stolen from a
parked motor vehicle; (d) the file with
the data is copied by an unauthorised
person without the knowledge of the
owner; (e) an employee copies data
from the file for his/her personal use.
ITQ2 (a) The file containing the credit card details OR the file containing the
student’s assignment. (b) The file with credit card details may have been
accidentally selected and copied to the USB drive; the file with the assignment
Figure 8.13 (a) The may have been intentionally copied to the USB flash drive by the accounting
Backup or Restore tool is one of the Windows operating system accessories. (b) clerk. (c) Any reasonable explanation consistent with the answer in (b).
A user may choose what to back up and also what device to store the data on.
118 119
Answers to ITQs
ITQ1 The following are SOME possible situations: (a) hard disk
vii
1 The
computer
system
computer system.
perform
major
functions include major components
examples
storage
input/output devices
secondary storage:
CD-ROM
output DVD
processing
hard disk
flash
drives such as
input
general-purpose:
memory cards
desktops
ROM printers
RAM monitors
PROM
laptops
notebooks
netbooks input devices:
smartphones keyboard
speakers mouse
multimedia microphone
projectors scanner
bar code readers
2
1 • The computer system
What is a computer?
The computer has become an indispensable tool in the world of work and play.
Organisations depend on them for communication, document preparation,
record keeping, and a host of other tasks. Whether at school, home or the library,
students use laptops, netbooks and tablets to access interactive content online,
play educational games and conduct research. Computers are also widely used for
leisure activities such as reading, playing games, watching movies and engaging
with friends on different social media platforms (such as Facebook and Twitter).
Figure 1.1 As computer technology has advanced, larger cumbersome machines have made way for lightweight
desktop and laptop computers and today we see a wide range of handheld computers in the form of Kindles, tablets
and smartphones.
Activity 1.1 1 Copy the following table to your notebook.
Application How is it used
area
Business
Education
Leisure
2 Visit the website of Apple Inc. (www.apple.com) and browse through the
product offerings.
3 In your notebook, complete the table by making a list of one product from each
category that is of interest to you.
Figure 1.2 QR Code for Apple Inc. website.
• A student studying in Scotland uses her
computer ❯ magicJack phone service to call her relatives
A computer is a machine capable of in the Caribbean.
executing instructions on data. Consider the • A parent receives an SMS (text) message
following ways in which computers are now from her child’s school advising that the
used to communicate on an everyday basis. child’s Easter term report is available for
• A homeowner directs his web browser to his viewing online. • One smartphone user sends
home security provider’s website and makes a WhatsApp message to three of her friends to
changes to the settings of his home security confirm the details of their movie date.
system whilst travelling overseas.
3
1 • The computer system
• An international business traveller gets a text message from the car rental
company the minute he steps off the airplane to advise him of the location
of his assigned car.
These days, most computing devices are connected to the Internet and
common household appliances such as television sets and refrigerators are
web-enabled. Computers are all around us and are an indispensable part of
modern life.
Activity 1.2 Describe ONE scenario in which computers may be used by EACH of the
following people for record keeping or document preparation.
organisation’s front desk
1 A form 5/grade 11 student
5 A FedEx package delivery
preparing an SBA (School-based
person 6 A dentist
assessment) 2 A primary school
teacher 7 A world-famous
entertainer 8 A
3 A school principal
professional athlete
4 The receptionist at an
A computer system may be categorised as either a
general-purpose or a special purpose computer based
on the extent of its capabilities.
A general-purpose computer consists of hardware
and software suitable for undertaking a wide range of
tasks.
A special-purpose computer is one which performs a
small range of tasks and contains features uniquely
designed for use in a particular industry or application.
Industry experts further classify computing devices into
categories such as those listed in Table 1.1. These
categories tend to change over time. For example, we
computer system ❯ have excluded minicomputers as these are no longer in
use. A computer categorised in one category today
may have to be placed in a new category 10 years
later. A computer’s size, speed, processing power and
price determine the category it best fits into.
Special-purpose Gene
general-purpose computer ❯ special-purpose computer ❯ computers
4
1 • The computer system
ITQ2
ITQ1
List TWO OTHER consumer devices that are likely to
contain an embedded computer.
2 Download and save the images of EACH of the four
Regardless of size, speed and processing power, all
general-purpose computer systems solve problems by
getting some input, doing some processing and producing
some output. These four functions are explained in
Table1.2 and is also summarised in the block diagram
shown in Figure 1.4.
General-purpose computer systems
computer systems.PROCESSOR
CONTROL data
UNIT information
ARITHMETIC
LOGIC UNIT
(ALU)
instructions
MEMORY OUTPUT
INPUT
storage devices are temporary storage information
data
in constant location whilst the
communication with computer is in information
STORAGE
Figure 1.5 The CPU, each other; memory operation. DEVICES
instructions
input, output and serves as a DEVICES DEVICES
data
6
A peripheral device is any hardware component
that is connected to and controlled by a computer,
hardware ❯ but is external to its CPU.
We will now explore each of the four major
peripheral device ❯
1 • The computer system
components in a little more detail. DVD drive
motherboar
mouse
d floppy disk
keyboard
ITQ4
ITQ1
State TWO functions of EACH of the components of the
CPU.
Figure 1.6 The primary input device is a keyboard and the
primary output device is a monitor. The system unit
contains the CPU, main memory and secondary storage
devices (CD-ROM, DVD and hard disk drives). The CPU
central processing unit (CPU) ❯ processor ❯ and main memory are both attached to the motherboard
which is enclosed in the system unit and so are not
usually visible from the outside.
ITQ3
ITQ1
In some ways a person is like a computer, with the brain
being the CPU. (a) What parts of the body act as input The central processing unit
devices and output devices? (b) List TWO other hardware
The central processing unit (CPU), also called the
components that are likely to be attached to a computer
processor, interprets and carries out the basic instructions
system used in a school.
that operate a computer. A processor contains a control
unit and an arithmetic logic unit (ALU), both of which work
Arithmetic logic unit •P
to perform processing. The processor is usually housed on
e
a chip (as pictured in Figure 1.7). In personal computers,
a
mobile devices and gaming devices the CPU is popularly
•
referred to as a microprocessor because of its small size.
ch
Component
Control unit
7
1 • The computer system ITQ1
Suggest ONE non-visual format by which an output device
may provide output or feedback to an end user.
main memory ❯
Main memory
immediate access storage ❯ Like humans, computers are equipped with both short- and
long-term memory.
ITQ5 Main memory is the space within a computer where data
ITQ1 and information is stored while being actively worked on.
State THREE specific functions of main memory. Main memory is also known as immediate access
storage and is installed in computers as RAM (random
secondary storage❯ access memory). We discuss main memory in more detail
in the next chapter. Main memory has two main functions:
1 it stores data;
2 it stores program instructions.
8
1 • The computer system
NGS Platinum What the specifications mean
Performance Series
PPS – 1504
Notebook Computer
Summary
• A computer may be either general-purpose or special-purpose.
• All general-purpose computers usually comprise four major components: CPU, main memory,
secondary storage and input/output devices.
• Computer systems carry out four major functions: input, processing, output and storage.
• The central processing unit (CPU) interprets and carries out the basic instructions that operate
a computer; it contains a control unit and an arithmetic logic unit (ALU), both of which work
together to perform processing. • The control unit directs and coordinates the operations in the
computer; the ALU performs arithmetic, comparison and other operations.
• Computers operate on the machine (fetch–execute) cycle. They fetch the instructions of a
program and execute each instruction in turn.
• Main memory stores data being processed by the CPU, data being retrieved from secondary
storage and data being transferred in and out of the computer via I/O devices.
• Secondary storage holds data, instructions and information that are not currently being
processed by the CPU. • Input devices facilitate the entry of data and instructions whereas output
devices produce the results of processing.
speaker.
ITQ4 Control unit: (a) fetches
Answers to ITQs ITQ1 (a) mobile devices; (b) instructions from main memory;
supercomputers. (b) decodes instructions fetched from main memory. ALU:
ITQ2 (a) DVD player, digital photo (a) performs arithmetic operations (b) performs
frame; (b) microwave, home security comparison-type operations. ITQ5 (a) store operating
system. system programs (b) store program
instructions (c) store data being processed by the CPU.
ITQ3 (a) The eye, ear and skin
act as input whereas the mouth act ITQ6 (a) data; (b) results of processing (information).
as output; (b) Mouse, microphone, ITQ7 Audible output (sound).
9
1 • The computer system
IT portfolio
1 Sketch a picture of a desktop computer system you frequently use at home or school or the one you researched in
Activity 1.4. Correctly label the system unit and all attached peripherals. Place the completed sketch in your portfolio.
2 Visit an office, perhaps the school office, and find out about the ways computers are used there. Record the results in
your portfolio.
3 Think about solving a jigsaw problem. Record the inputs, the outputs and the processing in your portfolio.
4 Get hold of a calculator and try the example 5 + 8. Think carefully about what keys you press and what the processor
does in response to your input. Try
5 + 8 – 2. Do you think the processor remembered all three numbers or did it work out the answer to the addition
before going on to the subtraction? Record your thoughts in your portfolio.
5 Interview family and friends and find out the clock speed of their computers. Record the details in your portfolio under
the headings Computer Model, Clock Speed. Hint: if you are using a Windows-based computer, go to Start, All
Programs, Accessories, System Tools, System Information to view this information.
Group activities
1 This activity is for groups of 4–5 students. Each group member is to interview at least three other group members to find
out how they use their computer systems for entertainment. Record these answers in your portfolio. Do any of the
responses surprise you? If so, explain why in your portfolio.
2 This activity is for groups of 3–4 students. Each member of the group is to roll a die (or pair of dice) and the member with
the highest score is to be the group leader. Conduct research and create a list of areas in which robots are used in
life-threatening situations. The group leader is to assign each member a topic at random. (Hint: place the topics on slips
of paper in a box.) Conduct further research and prepare a 3-minute presentation for the rest of the group. Make sure
that you show pictures or videos of the robot in action!
3 This is a group activity for up to six people. This game is called What Am I?
a All members: compare birthdays and select as group leader the member whose birthday is farthest away. b
Group leader: On different slips of paper, write each of the six types of general-purpose computers discussed
earlier.
c Each member: Select one slip of paper and write three clues describing the identity of that particular general
purpose computer.
d Group leader: Determine the order of the players.
e Each member: When instructed by the leader, read your first clue and field answers from the other group
members. If no correct response is received, give the next clue. Continue this process until a group member
answers correctly or until all three clues are read.
4 This group activity will allow students to demonstrate creative thinking, construct knowledge, and develop innovative
products and processes using technology.
Research how the local police service in your country as well as their counterparts in North America, Europe and
Asia currently access information whilst in the field. Summarise the state of knowledge about a challenge related to
that topic. Analyse existing knowledge and develop an innovative method of accessing information in the field
using tablets and wireless technology. Discuss the feasibility of implementing this method of information access in
your country.
10
1 • The computer system (D) ATA
6 What is a computer’s main internal backing store?
Examination-style questions (A) CD-ROM
TEST BANK (B) ROM
(C) hard disk
Multiple-choice questions (D) processor
Instructions: Each of the following questions has four 7 The component that stores the program and data
suggested responses labelled (A), (B), (C) or (D). currently being executed is:
Read each question carefully then select the most (A) arithmetic logic unit
suitable response. (B) floppy diskette
1 ____________ is an area of a computer that temporarily (C) main memory
holds data that is waiting to be processed, stored, or (D) secondary storage
output.
8 Which of the rows in the following table does NOT
(A) Memory contain the correct information?
(B) Storage
(C) Input Computer Hardware component
(D) Output specification
2 The microprocessor’s ____________ unit fetches each I 2.4 GHz Clock speed
instruction.
(A) instruction II 2 GB DDR Memory speed and
(B) integrated type
(C) circuit
(D) control 500 GB Hard drive capacity
3 Which of the following is likely to have the LEAST III
processing power?
5,400 RPM Hard drive speed
(A) game consoles
I
(B) mobile computers
V
(C) mobile devices
(D) servers
4 In what order do ICT systems deal with data?
(A) process, input, output (A) I and II
(B) input, output, process (B) II ONLY
(C) input, process, output (C) II and III
(D) input, process, save. (D) IV ONLY
5 The ____________ is dedicated to perform arithmetic 9 Specialised computer hardware can be used for home
operations, such as addition and subtraction. (A) entertainment. Which one of the following is NOT
CPU specialised gaming hardware?
(B) CU (A) Wii
(C) ALU (C) Xbox
(B) PlayStation
(D) Super Mario Cart Computers only store small amounts of
information whereas books store a large amount
10 Carefully consider the following statements about
of information.
printed books and netbook-type computers. Which of
(A) I and III ONLY
these statements are UNTRUE?
(B) II and III ONLY
I A computer and a netbook both store (C) II and IV ONLY
information. (D) I, II and IV ONLY
II Books are portable, netbooks are not. III
Computers are programmable, books are not. IV
11
1 • The computer system
Structured questions
1 The diagram in the following fi gure illustrates the b For EACH place identifi ed in part 4a, describe
major hardware components of a computer system. TWO tasks that a computer system might be used
for in that environment. [8] c State TWO other
industries or places where
Stores D:
programs
currently in use G:
E: people are opting to work from home.
State TWO ways that a home PC might
be used to:
Stores data/instructions
a do offi ce-related tasks; [2] b do
school-related tasks; [2] c 6 Computers are binary devices, the are binary devices’. [2] b Expand the
communicate with the outside world. ‘brain’ of which is a CPU. acronym CPU. [1] c Name the TWO
[2] components of the CPU. [2]
a Explain the statement ‘computers
in part 6c. [4] e Briefl y describe the relationship
a Name EACH component labelled A–G in the between the components named in part 6c. [3] 7 The
above fi gure. [6] b State TWO examples of the type of execution of a program by a computer involves a number
device that may be used at EACH of the locations of components and processes.
labelled: i A [1] ii B [1] iii F [1] c State whether data,
a Briefl y describe the machine cycle (also known
information or instructions fl ow from the component G
as the instruction cycle or fetch and execute
to E. Justify your answer. [2] 2 A general-purpose
cycle). [2]
computer system is said to have four major functions.
b Explain the role of EACH of the following
a Describe what a general-purpose computer components in the machine cycle.
system is. [1] b List the FOUR major functions of a i secondary storage [2] ii main memory [2] iii
general purpose computer system. [4] input/output devices [2]
3 Computers are made up of different components and 8 Consider the following specifi cations for a computer
the names of the components are often written as system:
acronyms. Write the meaning of EACH of the following
Line1: 2nd Generation Intel® Core™ i5-2467M
computer acronyms and state ONE function that is
processor (1.60 GHz)
performed by the component identifi ed.
Line 2: 4GB Dual Channel DDR3 1333MHz
a ALU [1] b CPU [1] c CU [1] d RAM [1] Line 3: 128GB Solid State Drive
4 General-purpose computers are used in a number of Line 4: Silver Anodized Aluminium and 13.3’ HD
(720p) Truelife WLED Display
places to accomplish a wide variety of tasks. a List
Line 5: 1.3MP HD Webcam
FOUR places where a general-purpose
a Which line number refers to EACH of the
computer system is likely to be utilised on a day
following components
to-day basis. [4]
i Secondary storage [1] ii RAM [1] iii CPU [1]
b What is the size of the display? [1] c What is the
speed of the processor? [1] d What is the speed of
the memory? [1]
12
d State TWO functions of EACH component named
2 Primary
and
secondary storage
megabytes, gigabytes, terabytes outline the
functions of primary storage devices such as
By the end of this chapter you should bistables, ROM, RAM, PROM and EPROM
be able to:
outline the uses of primary storage devices
defi ne what primary and secondary storage are
correctly use terms that are associated with
differentiate between primary and secondary
storage devices such as read/ write head, tracks,
storage sectors, buffers, cylinders, access time, device
interface and direct access
manipulate units of storage: bits, bytes, kilobytes,
Concept
identify common secondary storage media such
as magnetic tape, diskette, hard disk, optical
map
disks, fl ash drive and fl ash memory cards Storage
may be differ
in terms of
primary memory: bistable
devices ROM
RAM
types has is
measured in include
PROM
EPROM
speed
magnetic media:
gigabyte
capacity
magnetic tape read/written
floppy disk
hard disks
using
data
terabyte
laser
is read using is organised using
read/write head
fixed moving
2 • Primary and secondary storage
storage medium ❯
primary storage ❯
retains the stored information (such as the magnetic
material on the surface of a hard drive). Primary and
secondary storage differ in a number of ways, as described
in Table 2.1.
Cost Relatively
Function Stores da
instructio
processe
Speed Fast in re
processo
Read/Write Some de
capability limited w
14
location and manipulated by the processor in one
instruction cycle.
word ❯ The word size is the number of bits that make up a word.
For example, the AMD Turion™ 64 processor manipulates
word size ❯ an 8-byte word and, as such, has a word size of 64.
Megabyte and gigabyte are popular units used to measure
storage capacities
ITQ2 Briefly explain the relationship between a byte and a word.
ITQ1
2 • Primary and secondary storage
15
2 • Primary and secondary storage
Activity 2.1 Manipulate the units in the scenario below to solve the problem outlined.
Alexia is shopping online for a 2 MB storage device. She has
identified two
devices from the same manufacturer with the following description, capacities and
prices and needs your help to determine which device is the most economical to
purchase.
Description Price
each
RAM
RAM (random access memory) is the main memory
in a computer that stores instructions that are being
executed by the CPU as well as the data needed for
the current operations. RAM is also called immediate
access storage. Whilst a computer is in operation,
the CPU can read and write to RAM. However, all of
RAM’s contents are lost when the computer is shut
down. RAM is thus said to be volatile. Computing
devices are now sold with varying amounts of RAM.
random access memory ❯
Some devices are sold with as little as 2 GB installed
A bistable is an electronic circuit that has two stable
memory whereas others are supplied with as much
states. These states are 0 and 1, making it suitable
as 12 GB installed. Most devices are upgradable so a
for storing a binary digit. The power button on a
user may purchase additional memory and install it
computing device is an example of a bistable device.
as the need arises.
A group of eight bistables may be used to store one
byte of data.
ROM, PROM and EPROM
Table 2.3 lists the four common primary storage
devices. There are four basic ROM types:
1 ROM
Device Description 2 PROM
RAM Random acc3 EPROM
4 EEPROM (used to develop flash memory)
ROM Read-only m
PROM Programma
16
2 • Primary and secondary storage
Desktop
Laptop
Tablet
Ultrabook
Each type has unique characteristics but they are all types
17
2 • Primary and secondary storage
Type of memory Can be written to by user? Erasable? User programmable?
RAM yes no no
ROM no no no
RAM Large capacity, volatile storage Primary memory in electronic devices. Smartphones,
device. washing machines, motor vehicles and computers all have
some form of primary memory.
ROM Storage device for BIOS chip which contains basic information about your computer,
permanently storing binary such as the types of input/output devices attached; also stores
data and programs. bootstrapping program (the first program to run when a computer
is switched on).
PROM A blank ROM microchip for Used in various design operations for prototyping (testing) the
storing data and programs. data for a ROM before committing to the costly ROM
Once written the data and fabrication process.
programs CANNOT be
changed.
EPROM A blank ROM microchip for EPROM is used in equipment such as satellite receivers
storing data and programs. that needs scheduled reprogramming.
The data and programs can be Variants of EPROM are used to manufacture flash memory cards
erased so the chip can be and flash drives.
reused.
RAM
ROM
PRO
M
EPRO
M
2 Conduct research to determine some of the more common uses of the primary
storage devices listed in Table 2.5.
3 Record your responses.
18
2 • Primary and secondary storage
(a) (c)
(d)
(b)
medium of choice for transferring fi les.
Media organisation
Magnetic media needs to be formatted before
use. Some magnetic media are sold
pre-formatted, whereas others are sold
unformatted and as such need to be formatted
by the user.
Formatting is a process, facilitated by the
operating system, during which a storage
medium is prepared for data storage. A
formatted disk has an arrangement of tracks
and sectors.
formatting ❯ A track is one of the many concentric rings that
are encoded on the disk during formatting and
that defi ne distinct areas of data storage on the
a track ❯ disk. A sector is one of the segments of the
concentric tracks encoded on a diskette or
sector ❯ hard disk during formatting.
A cylinder is a unit of storage in a disk system
cylinder ❯ consisting of the set of tracks that occupy the
Figure 2.3 The external hard drive (a), DVD (b), same position on opposite sides of each platter
CD-ROM (c) and fl ash drive (d) are four of the (disk surface).
most common storage units in use today. USB
fl ash drives have replaced fl oppy disks as the
19
2 • Primary and secondary storage
Figure 2.4 A disk platter is divided into tracks (brown) and
tracks are divided into sectors (yellow).
ITQ5
ITQ1
With reference to a hard disk ITQ6
arrangement, state the relationship between a track and a ITQ1
cylinder. Explain how seek time and latency time affect the
performance of a hard disk drive.
direct access ❯ Figure 2.5 Inside a hard disk drive, showing the platters
and moving read/write heads. This disk has four platters,
each made of a core of glass or aluminium, covered with a
sequential access ❯ thin layer of magnetic material.
20
defragmentation ❯
device interface ❯
buffer ❯
2 • Primary and secondary storage
Defragmentation
During normal operations, the files on a hard disk
eventually become fragmented as parts of a file are written
over multiple spaces on the drive. This slows retrieval
Technology
operations because an increase in latency leads to an
Attachment
increased access time. Defragmentation improves access
time as it tends to reduce latency. SCSI Small Comput
Defragmentation is a procedure in which all the files on a Interfa
hard drive are erased and rewritten on the disk so that all
parts of each file are written to neighbouring sectors.
Windows 8 includes a tool named Optimize Drives (called USB Universal Seri
Disk Defragmenter in earlier versions of Windows) that
may be used to defragment disks.
Device interfaces
A device interface is a connection between two systems
through which information is exchanged.
Considering that storage devices are peripherals, they need
Table 2.8 Common device interfaces.
a means of communicating with the CPU. Various device
interfaces exist that allow secondary storage to
communicate with the CPU via the motherboard. The Buffers
motherboard is the main circuit board of the computer and Storage devices are slow when compared with the speed of
is home to the CPU and RAM. These are fitted directly a modern processor. In order to prevent the processor from
onto the motherboard via special-purpose slots. Secondary continually waiting for the storage devices, a buffer is used.
storage devices such as hard disks, CD-ROM, DVD and The CPU writes data to the buffer very quickly; it is then
tape drives are each equipped with an interface. One end free to perform other tasks.
of a cable is plugged onto this device interface and the A buffer is a portion of main memory given the task of
other end onto the motherboard. holding information temporarily, especially while waiting for
slower components to catch up. The disk drive reads the
data from the buffer and writes it onto the platters,
Acronym Interface name Comments
depending on the speed of the disk drive. Buffers are useful
IDE Integrain many areas of life where there is a transfer between a
Electronfast device and a slower device. A rainwater tank is a
buffer, it fills up very quickly in a short rainstorm but it
empties slowly as water is used throughout the following
SATA Serial Adays.
21
2 • Primary and secondary storage
moving-head disk ❯
Both moving-head and fixed-head hard disks are installed in
a system unit’s drive bay. A drive bay is a rectangular
opening inside a system unit that holds a hard disk. Both of
these drives may be referred to as internal hard disks and
are connected to the CPU via a device interface (IDE, SATA
or SCSI).
diskette ❯
Diskettes
ITQ7 A diskette is a removable flexible magnetic disk on which
ITQ1 computer programs and data can be stored.
Perform the necessary computations to prove that the The alternative term, floppy disk, has gone out of fashion
capacity of a diskette is 1.4 megabytes. because present day diskettes have rigid shells, unlike the
A fixed-head disk is a disk storage device in which the 5¼-inch version which was flexible. The rigid shell houses a
read–write heads are fixed in position, one to a track, and single flexible, magnetisable platter. Both sides are usable
the arms to which they are attached are immovable. and when formatted, has 80 tracks per side. Each of these
A moving-head disk is a disk storage device in which one tracks is further divided into 18 sectors, each having a
or more read– write heads are attached to a movable arm capacity of 512 bytes (0.5 kilobytes). The capacity of a
that allows each head to cover many tracks of information. diskette is 1.4 megabytes (MB).
22
flash memory ❯
computer, yet the data stored in them is retained for an
indefinitely long time or until it is rewritten.
Their high capacity, fast data transfer rate, low cost and
extremely high portability are reasons for their popularity.
Flash memory cards come in different physical sizes so
you need a special reader to be able to access the data
stored on them. It is common to find flexible devices that
accept a variety of size of memory cards built into modern
computers or attached to the computer via USB
connection.
The memory card in your smartphone or the memory in
your 8GB or 16GB iPhone are both relevant examples of
flash memory.
Magnetic tape
Magnetic tape is a magnetically coated ribbon of plastic in a
small rectangular plastic housing that is capable of storing
Figure 2.9 Magnetic tape.
large amounts of data at a low cost. Tape is sequentially
accessed and is used by organisations primarily for backing
up and archiving data.
Portable
Table 2.9 Comparison of characteristics for various types of secondary storage media.
Summary
• Computers store data and instructions on both primary and secondary
storage devices. • Primary storage is volatile, secondary storage is
non-volatile.
• Primary storage media are randomly accessed; secondary storage media are accessed
either directly or sequentially.
• RAM, ROM, PROM and EPROM are types of memory.
• RAM (also known as immediate access storage) is the computer’s main memory.
• Hard disk, CD-ROM, DVD, diskette and flash drives are examples of secondary storage media. •
Magnetic disks, optical disks (CD-ROM and DVD) and diskettes are direct access devices whereas
magnetic tape is sequential access storage.
• Units of storage are byte, kilobyte, megabyte, gigabyte and terabyte.
• Magnetic hard disks may be internal or external. Internal hard disks are of two types: fixed-head
or moving-head. • Read/write heads in disk and tape drives transfer data and instructions from
storage media to a computer system’s memory and vice versa.
• IDE, SATA, SCSI and USB are device interfaces and allow secondary storage devices to
communicate with the computer.
• Secondary storage media can be compared with respect to portability, speed and capacity. •
Magnetic tape is a high-capacity, sequential storage device ideal for backup and archiving
applications. • Flash drives and flash memory cards are small, convenient, removable storage
devices with capacities ranging in the gigabytes.
24
1 In this activity you will create a storage media photo essay.
2 • Primary and secondary storage
Answers to ITQs ITQ1 A computer needs fast, randomly
accessible read/write
ITQ4 (a) ROM is supplied with its data already ‘burnt in’
storage to support the processor as it
whereas PROM is supplied blank and its contents may be
executes programs. Primary storage
programmed by its user; (b) PROM may be programmed
fills this need. Computer users need
once whereas EPROM may be reprogrammed. ITQ5 A
long-term storage for programs, data
track is the area between two concentric circles on one
and documents which is provided by
disk surface only whereas a cylinder is all the tracks in the
secondary storage.
same position on all disk surfaces.
ITQ2 A byte is a group of 8 bits
ITQ6 An increase in seek time and/or latency increases a
and is the basic unit of measurement
disk’s access time thereby degrading its
for computer storage. A word is a
group of two or more bytes and is the performance, whereas a decrease in either seek time or
latency reduces access time, causing improved
basic unit of data manipulated by the
performance.
processor.
ITQ3 Since 8 bits = 1 byte, 30-pin ITQ7 Capacity in bytes = bytes per sector × sectors per
track × tracks per platter × no. of read/write heads; 512 ×
memory provides 8 bits at a time
18 × 80 × 2 = 1,474,560 bytes or 1.4 MB (since 1,024
to the CPU. Considering that a 32-
bytes = 1 kilobyte and 1,024 kilobytes = 1,024
bit machine has a word size of 32,
megabytes).
and that a word is the unit of data
manipulated by the CPU, this means ITQ8 CD-ROM and DVD.
that the CPU must be provided with ITQ9 Highest – hard disk, lowest – floppy disk.
all 32 bits of data at once. If we have
four memory modules working
together as a single bank, then we will
be able to provide the CPU with the
data needed.
IT portfolio
a Start off by creating a list of the different types of removable storage media available in your school.
b Locate (or take your own) photographs or images of each of the devices listed.
c Paste the pictures/images in your portfolio along with a brief (20 words or less) narrative about how this device is
used at your school.
2 In this activity you will explore two different access methods. You will need a CD player (as an example of a direct
access device) and an old cassette tape player (as an example of a serial access device).
a Time how long it takes to find and start playing track 2 on each device and make a note of the times.
b Determine which method is the faster one to find a particular track?
c Record the result in your portfolio.
3 In this activity you will explore the capacity of a common storage device – the flash drive. a Calculate the number of
characters on this page by counting the number of characters in a typical line and multiplying by the number
of lines.
b Since one byte can hold one character, determine how many pages of this book will fit on a 1GB USB flash
drive. Remember to manipulate your units correctly.
c Record the result in your portfolio.
25
2 • Primary and secondary storage
Group activity
1 Work on this activity in pairs.
a Arrange with your teacher, computer technician, relatives or friends for you to have
access to secondary storage devices and media that are no longer in use. b Use the
necessary tools to dismantle the items.
c Use a digital camera to take photographs of EACH component.
d Upload the image to your computer and rename them (for example, change the
name 20130504_041.jpg to deviceInterface.jpg).
e Import the images into a new word-processing document; add suitable captions and
lines for labelling the various components. Print two copies of the document as
worksheets.
f With the help of your teacher, label each component. Paste the completed worksheet
in your portfolio.
(A) the operating system and other system
software (B) application programs that carry out
a specific task
Examination-style questions (C) the data being processed and the
resulting information
Multiple-choice questions (D) all of the above
TEST BANK 2 Ten megabytes (10 MB) is equivalent to:
(A) 1,024 kilobytes
(B) 0.1 gigabyte
6 A ____________ is a concentric circle on a disk or
(C) 0.1 terabyte
Instructions: Each of the following questions has (D) 0.01 gigabyte
four suggested responses labelled (A), (B), (C) or
3 A bistable is a:
(D). Read each question carefully then select the
most suitable response. (A) very small peripheral device
(B) unit of measurement similar to bytes
1 Memory stores:
(C) device that may be connected to a computer
(D) device that may exist in one of two stable states (D) SDI
4 ____________ is a primary storage device that may 8 Which of the following is LEAST likely to have
be programmed once by the user. multiple read/write heads, a buffer and an IDE
(A) RAM interface? (A) CD drive
(B) ROM (B) flash drive
(C) PROM (C) hard disk drive
(D) EPROM (D) magnetic tape drive
5 In relation to storage devices, the acronym IDE 9 A ____________ is the largest unit of storage of all
refers to: the items in the list below.
(A) device interface (A) kilobyte (KB)
(B) access mechanism (B) megabyte (MB)
(C) type of read/write head (C) terabyte (TB)
(D) arrangement of tracks and sectors (D) gigabyte (GB)
10 Three storage media – a magnetic tape, a hard disk
26 and a DVD – have capacities of 1 terabyte, 512
parallel path on a tape on which data is megabytes and 4.7 gigabytes respectively. Which
of the following statements are NOT true?
stored. (A) buffer
(A) the hard disk has the smallest capacity
(B) track
(B) the capacity of the magnetic tape is twice that
(C) sector
of the hard disk
(D) cylinder
(C) the capacity of the magnetic tape is 200
7 Which of the following device interfaces is MOST times that of the hard disk
likely to be found in a new desktop computer? (D) the capacity of the DVD is larger than the
(A) IDE hard disk but smaller than the magnetic tape
(B) SATA
(C) SCSI
2 • Primary and secondary storage
Structured questions
explain ONE difference between magnetic tape and
1 Rhianna bought a notebook computer with the
CD-ROM as
following specifi cations:
media for storing data. [2] b A colleague from St
Intel® Core™ i3-2350M processor (2.30 GHz, 3 Luago is about to visit you and wants to bring a set
M cache,with Turbo BoostTechnology 2.0) of digital
photographs to show you. There are 300
15.6 inches HD (1,366x768) Anti-Glare photographs and each is 100 KB. He plans to
LED-backlit use a diskette. What advice would you give to
your friend as to the suitability of using a
2 GB DDR3 SDRAM at 1333 MHz diskette? [2]
c Suggest TWO alternative removable media
250 GB 5,400 rpm Moving-head SATA HDD
that might be more suitable.
Justify your recommendations. [4] 3 Hard disks are
8X DVD
the most popular secondary storage media.
Wireless 802.11g Mini Card a On a disk’s surface, what is the relationship
between a track and a sector? [1] b A hard disk
24 WHr Lithium-Ion Battery system has six disk surfaces, with one moving head
for EACH surface. A certain track has ten sectors
forming a ring, each sector carrying ½ KB. How
many KB are there in the entire cylinder? [2]
a Using the computer specifi cations listed above, c In reading data from a disk, what are the TWO
state the specifi cations of each of the following main components of access time? [2] d Explain how a
components: fi xed-head system on a hard disk unit can reduce the
i Capacity and speed of the hard drive [2] ii access time for a device. [2] 4 Computer systems are
Memory capacity [1] iii Type of optical drive [1] usually equipped with a range of secondary storage
b Indicate the type of interface used to connect the media.
hard disk drive. [1] c Explain why the access time for a a Name ONE direct-access secondary storage
moving head disk drive is GREATER than the access device. [1] b Explain why magnetic tape is a
time for a fi xed-head disk drive. [2] 2 Computer users sequential access medium. [2] c Name ONE
have a wide range of options from which to choose for storage device most suitable for use in EACH of the
their data storage needs. a In relation to capacity, following situations:
i transferring a small word-processing
document from one microcomputer to
another [1] ii storing a 2-hour digital quality a Identify EACH of the devices labelled (i)–(iv). [1] b
movie [1] iii recording a medley of songs for a Which is a primary storage device? [1] c Which of
dance the devices are non-volatile? [1] d Which device is
recital [1] iv backing up all the records in an likely to have the largest
accounting department [1] capacity? [1] 6 Your microcomputer has a 10 GB
5 Computers rely on a range of devices and media for hard disk of which only 100 MB is empty. You wish to
storing data and instructions. replace that drive with a 30 GB drive. You want to save all
the information stored on the hard drive on 3½″ fl oppy
disks while the conversion is made. Is this practical?
Explain your answer. [3]
(i) (ii)
(iii)
(iv)
27
3
Input and output
devices
copy, human readable and machine-readable
which are used to refer to output devices and
By the end of this chapter you should output media
be able to:
state the functions of specifi ed output devices.
defi ne the terms input, input device
and input media
human-readable:
homes
home
offices
bar schools
soft-copy: codes retail stores
audio restaurants display
lights factories
offices output devices:
visual displays functions earphones
headphones
impact printers
different formats data
non-impact printers
entry
plotters
data
speakers
marks visual display units
hard-copy: magnetic ink
printouts collection audio
output printing
such as
input devices:
keyboard
light-pen
mouse
pads
and
tablets
machine-readable: point
bar codes of sale
marks (POS)
magnetic ink
joystick
The typical computer system at school or in an offi ce is very useful, but by
adding extra components, it can be transformed into an amazing tool – a tool
that is more useful and more fl exible across a variety of industries. In this
chapter, we look at a broad range of input and output devices that can be
attached to a computer. We will also interpret the specifi cations of computer
systems so we can understand all the seemingly cryptic numbers and letters.
Users have the option of purchasing and attaching
additional input devices depending on the function for
which the computer system is intended.
Web browsing
Retail sales
29
3 • Input and output devices
ITQ2
ITQ1
A source document is an original document that contains
input. An example of a source document is an attendance
register used by a homeroom teacher to record daily
attendance.
A human-readable document is one that may be read by
a human but is not in a form that a computer can
automatically accept as input. An example is a handwritten
list.
A machine-readable document is one that can be read
directly and understood by the computer.
Manual data entry is a process during which data is ITQ4
entered into a computer by a user. Devices such as a ITQ1
keyboard, mouse, joystick, light-pen and tablet are used in
Name ONE other device that is an automated data
this process.
capture device.
Automated data capture is a process during which data is
directly entered into a computer with little or no user
intervention. Microphones, barcode readers, document
scanners and sensors are examples of devices that
facilitate this process. Data capture usually increases the
speed and accuracy of the data collection exercise.
(a) (b)
devices. We have categorised the devices into four groups
based on where they are most likely to be used (Table
3.3). A device that is used in the home may also be used
in industry, but in different ways. Ensure that you
understand how input devices are actually used in the real
world.
30
Home/Home office
Keyboard
Mouse
Web camera
Digital camera
Microphone
Joystick
Figure 3.3 A corded 2-button mechanical mouse.
Document scanner
Touchscreens
Keyboard
The keyboard is the standard input device attached to
general-purpose computer systems. Some modern
keyboards have keys for launching Internet applications
and multimedia control.
Joystick
A joystick is a point-and-click input device that moves the
pointer on the screen according to the movement of the
lever by the user. It is used mainly for games.
Specialised Keyboard
Braille keyboards are used by computer users with visual
impairments. A standard keyboard would be useless, as
the labels on the keys would not be seen. These special
keyboards have raised dots on the key caps, allowing users
with visual impairment to enter data.
Mouse
A mouse is an input device used to manipulate data and
31
3 • Input and output devices camera to research for and prepare a History or Visual Arts
SBA.
ITQ6
ITQ1
Suggest TWO ways in which a student could use a web
memory cards. Cameras may be connected to the
computer directly via a USB connection. Memory cards can
be removed from the camera and the data transferred to
the computer using a card reader. This allows still images
and video to be captured or transferred. Webcams are
commonly used in Internet telephony (Skype, MSN and
Google Hangout) and teleconferencing.
Microphone
Figure 3.6 Digital camera.
A microphone (mic) is a device for inputting audio data into
the computer. A microphone may exist as a stand-alone
ITQ7 device or it may be integrated into another device such as
ITQ1 a webcam, monitor or headset. A stand-alone mic connects
to your computer via the ‘mic’ or ‘line in’ port on the
Suggest THREE ways in which a microphone may be used
computer system’s sound card or front panel of the system
in the home as an input device.
unit. Microphones are used for real-time person-to-person
conversations during online chats and teleconferencing.
They are also used in recording audio clips for webcasts,
broadcasting, advertising and filmmaking.
Document scanner
Document scanners are used to input text, diagrams and
pictures into the computer. Document scanners are often
used in conjunction with specialised software. For example,
a scanner combined with optical character recognition
(OCR) software makes an optical character reading system.
Scanners are available in many shapes, sizes and types
and range from small portable business card scanners to
larger desktop scanners with automatic document feeders.
Business travellers sometimes carry portable scanners that
ITQ8 enable them to scan source documents directly into their
ITQ1 laptop computers.
Suggest ONE way how a primary school Language Arts
teacher could use a scanner: Input devices in the retail trade
(a) to prepare for a lesson
(b) during a lesson Businesses like supermarkets, restaurants and bookstores
(c) after a lesson that sell goods and services to customers use devices such
as touchscreens, barcode readers and magnetic stripe
Retail business readers.
These input devices allow the business operators to
Touchscreen perform more efficiently since data can be captured
Barcode reader automatically from a product that has a barcode or
Electronic signature magnetic stripe.
capture device Magnetic
stripe reader
Specialised keyboard
Point-of-sale
32
touchscreen ❯ ITQ9
3 • Input and output devices
Barcode reader
Touchscreen A barcode reader (or barcode scanner) is a specialised
optical mark reader that ‘visually’ interprets barcodes. This
A touchscreen is a computer screen that is sensitive to
data capture device scans barcodes and, with specialised
touch, so that the user can point to things on it by touching
the screen itself, without using a mouse. Touchscreens are software, converts them into machine-readable data.
Barcodes are the black and white stripes found on many
used extensively in fast food restaurants, supermarkets
and cinemas. They are commonly integrated into products sold in retail. Barcode readers are now found in
many supermarkets as part of a point-of-sale (POS)
automated banking machines (ABMs) and in self-service
kiosks used in photo labs, phone credit vending system. Barcode readers allow customers’ purchases to be
processed quickly and because the barcode identifies the
State TWO ways in which a barcode can be used in a product, a receipt showing full details of the item can be
warehouse. produced.
ITQ10
Suggest TWO applications of magnetic stripe card
readers in a school setting.
Specialised keyboards
Some applications require specialised keyboards with
pre-assigned function keys. Specialised keyboards
generally consist of a flat grid of unmarked buttons and
each key can be programmed with a wide range of different
functions. After the keyboard is programmed, a sheet,
called an overlay, is placed over the unmarked keys to
identify each key. The overlay can consist of any
combination of words, symbols, or even pictures.
Keyboards that are components of point-of-sale systems
(discussed later in this chapter) usually require specially
labelled keys for particular products. Data entry is quicker
for product codes or quantities without having to press
multiple keys. For example, a point-of-sale system used
for selling movie tickets at the
(b)
33
3 • Input and output devices
Olympus Theatre in Barbados would have keys for regular priced adult tickets,
discounted adult tickets and so on.
Specialised keyboards are used in retail establishments such as restaurants
as they reduce data entry time and errors. Specialised keyboards are used in
education, particularly in institutions offering special education.
Business
Education
Leisure
Digital scales
Keypad
Receipt printer
Touch terminal
Display monitor
Figure 3.12 A
traditional point-of-sale terminal requiring manual input of
data.
2 Direct your browser to www.overlaykeyboard.com Table 3.6 Components of a typical point-of-sale system in
3 Conduct research to determine how specialised
a supermarket. Input devices in industry
keyboards, using overlays, are used in each of the
application areas listed in the table above.
Nutcracker Gadget Store depends on package delivery
4 Write your findings in the table in the spaces provided. companies such as FedEx, UPS and DHL for delivery of
supplies from Taiwan. Its purchasing manager is able to
Point-of-sale (POS) systems track shipments using a voice response unit that
automatically provides him with status updates via
A point-of-sale system is a bundled hardware–software
telephone. Incoming shipments are received at the
solution that accepts transaction data from a variety of
warehouse at Warrens in Barbados. Each carton
sources and completes the processing of the transaction
34
Large business/industry
Voice response unit
Graphic pad
OCR
OMR
MICR
stylus ❯
3 • Input and output devices
35
3 • Input and output devices
Architectural
draughtsman
Newspaper cartoonist
ITQ14
Describe ONE similarity and ONE difference between Optical character reader (OCR)
OCR and OMR. Both OCR and OMR are data capture devices. In fact, an
OCR is really a specialised OMR. Instead of just reading
marks, it reads the shapes of the characters (letters,
numbers and special symbols) and tells the computer what
the characters and numbers are.
OCR can be used to scan whole pages of text into the
computer. Organisations with large amounts of typed
paper documents use OCR to convert paper documents
into electronic documents. In a school setting, an English
teacher is able to use OCR technology to scan and convert
a handwritten essay to editable text. As a learning activity,
the spelling and grammar feature of a word-processing
package can be used to correct errors in the document.
36
Specialised applications
Biometric systems
Light-pen
Remote control
Sensors
Biometric systems
Biometric systems are specialist input devices that measure
physical characteristics of the human body and use this to
identify an individual for security purposes. Biometric
devices include fingerprint readers, eye retina scanners
Figure 3.17 An operator using a light-pen and monitor.
and facial recognition systems.
Biometric systems are heavily utilised at airports to screen
incoming passengers. Border control agents (immigration
officers) use fingerprint readers as an input device to
collect data about travellers entering their country. Some
laptops are now manufactured with built-in fingerprint
readers. A few years ago, the Miami International Airport
commenced testing of a new biometric system that
incorporated intelligent video analysis and other technology
to detect intruders at the perimeter.
Figure 3.18 A blood pressure measuring sensor.
Light-pen
A light-pen is in the form of a light-sensitive wand used in
conjunction with a computer monitor. It senses light when
placed near the surface of the monitor and its position is
calculated by the software. Because the user was required facilities.
to hold his or her arm in front of the screen for long
periods, the light-pen never became popular as an input Sensors
device. Since the current version of the game show Sensors are devices used to measure physical
Jeopardy! began in 1984, contestants have used a characteristics such as temperature, pressure or wind
light-pen to write down their wagers and responses for the speed. For example, a sensor connected to a computer
Final Jeopardy! round. could allow the temperature of a furnace to be automatically
monitored. In a hospital, a blood pressure sensor can be
Remote control linked via a wireless connection to a computer so that the
Computers can be used to control digital and analogue patient’s blood pressure can be continuously monitored
devices from a distance. Using a seamless mix of sensors, and alarms automatically sounded if the blood pressure
communication devices and communication media, a falls below a safe level.
computer can control devices remotely. Devices such as
cameras, traffic signals and complex equipment such as Output devices
robots can be controlled in this way.
In law enforcement, remote controlled equipment is useful Information produced by a computer must be presented in
in activities such as bomb detection and intelligent remote a useful form to be of value to the user. We will discuss
surveillance. Web cameras and microphones can be four types of output devices – visual display unit,
remotely controlled using private or public network printers, plotters and audio output devices.
37
3 • Input and output devices
ITQ19
Some CRTs contain a substance that is harmful to the
Figure 3.20 A CRT monitor and a modern LCD monitor.
38
3 • Input and output devices
Figure 3.21 Measuring the size of a laptop screen. The size is measured as the diagonal distance
of the viewable area. Some VDUs are now available in wide-screen versions.
Printers
Nutcracker Gadget Store has four different types of printers installed at their
head office. Heather is responsible for public relations and marketing. She has
two printers connected to her desktop computer – a laser printer and an
inkjet printer. Both of these printers print vibrant colour documents that
illustrate objects very realistically. Tiffany is responsible for the accounting
department and uses a line printer to print thousands of invoices and
statements each month. Alexia in the customer service department has a very
noisy dot matrix printer attached to her PC.
Whilst all printers produce hard copy, they differ in the mechanisms used to
produce it. This forms the basis for classifying printers as impact or non-impact.
These are discussed in the sections that follow.
Impact printers
impact ❯
ITQ21
Suggest why a laser printer may be preferred for printing
legal documents.
ITQ20 ITQ22
Impact printers produce output by employing a striking or
Which of EACH of the following pairs of print jobs prints
hammering mechanism. Because of this, they are noisy
faster and why? (a) a full page of text only or a half page
but are able to produce multiple identical copies at the
graphic
same time. Some impact printers produce their output a
(b) a colour printout or a black-and white printout.
character at a time whilst others do so a line at a time.
Most impact printers print on fan-fold paper (or continuous
forms). Dot matrix and chain printers are two types of
impact printers.
A dot matrix printer produces one character at a time. It ITQ23
does so by striking an inked ribbon on paper to create the Name a type of printer whose output is measured using
impression. These printers are relatively inexpensive to EACH of the following: (a) characters per second
purchase and operate, and very reliable. A dot matrix
(b) lines per minute
Suggest TWO types of commercial business that would
(c) pages per minute.
use dot matrix printers for producing multi-copy output.
printer is suitable for use in situations that require multiple
non-impact ❯ copies of the same document.
Non-impact printers
Non-impact printers create output on media (paper or
plastic) using a range of different technologies such as:
• laser: a technology used in photocopy machines that
utilises heat, light and photoconductivity
page-printers ❯ • inkjet: nozzle-like print heads spray ink onto paper to form
characters and images
inkjet printers ❯ • thermal transfer and dye sublimation: both beyond the
scope of this book. Most non-impact printers are
page-printers as they print on cut sheet paper. Lasers
and inkjets are two types of non-impact printers. Inkjet
printers are inexpensive to buy but expensive to operate
as the ink needs replacing regularly. These printers are
laser printers ❯
very versatile and can produce a range of documents
Resolut The sharpness o
including high-quality photographs, school projects and
ion printer’s resolutio
business presentations. Inkjet printers can produce colour
number of dots p
photographs (on glossy paper) of a quality similar to those
produced by a professional photo studio. Print measured in pag
Laser printers are flexible as they: speed or characters pe
• print both text and graphics
• are available in monochrome (black and white) or colour Memor Colour images a
models • can print on paper of varying sizes and plastic y more memory; so
improve printing
(transparencies). They produce high-quality output, are
very fast, and operate quietly. Whilst laser printers are Paper Sheet-feed printe
expensive to buy, they are usually less expensive to tray may hold 50–250
operate than inkjets. capac additional paper
ity you can do witho
Features of printers
Printers differ in resolution, print speed, memory and paper
capacity. Table 3.9 Description of printer features
Feature Description
40
3 • Input and output devices
Characteristics
Type How output Speed Max. resolution (dots per Print buffer memory
Mechanis produced inch) capacity
m
Plotters
plotter ❯
produces high-quality graphical output on different types of
materials, commonly paper and vinyl. A plotter may be
more suitable in some situations than a printer. As plotters
are able to handle output media the size of a large outdoor
billboard, they are invaluable to architects and designers
for the production of blueprints and architectural designs.
ITQ24
Differentiate between a plotter and a printer.
add-on card ❯
Summary
Audio output devices
Audio output devices include a range of peripherals that
enable the user to play and hear sounds. These include
speakers, earphones, headphones, and headsets. Most
computer systems come with a built-in speaker that is used Speakers are useful in situations where:
to provide system feedback. • the user has a disability and cannot depend on sight to
The output from an audio output device is temporary and receive information produced by a computer system
cannot be kept for later use, thus making the speaker a
• verbal output is used to provide emergency notices in
soft-copy output device. Audio output devices depend on a
hazardous environments (for example, an evacuation
device interface called a sound card to work. These sound
notice in a school in the event of a fire).
cards are either integrated with the motherboard or
installed as a separate add-on card. Computer systems • the sound output is essential to the application, such as
provide one or two different ports that allow users to plug computer gaming, Internet telephony and
in their speakers, earphones or headphones. videoconferencing.
42
be read and recognised using OCR
technology, (b) Multiple-choice
Answers to ITQs ITQ1 (a)Any two of: keyboard, mouse, answer sheets – read using OMR
microphone, scanner, technology
webcam, joystick. (b) Any two of: ITQ4 MICR
keyboard, mouse, microphone, ITQ5 Any TWO of: (a) scan the
webcam, fingerprint reader. product boxes, attach and e-mail the
ITQ2 (a) an essay, (b) a speech, images (b) do a live video chat using
(c) a grocery list, (d) a traffic ticket. the microphone and web camera
ITQ3 (a) handwritten list – can (c) take pictures with the digital
camera, attach and e-mail the images ITQ12 Any ONE of the following: (a) more accurate billing
ITQ6 Any TWO of the following: as products are correctly identified (b) faster checkout
(a) conduct video interviews; means customer spend less time in line (c) improved
(b) record questions to send to customer service as a result of faster and more accurate
information providers; and checkout
(c) discussions with fellow classmates; ITQ13 They can be easily read and understood by both
(d) discussions with teacher. people and machines.
ITQ7 Any THREE of: (a) audio ITQ14 Both are devices that sense input using sight. OCR
recordings (b) Internet telephony recognises characters whereas OMR recognises marks.
(c) typing with voice recognition
ITQ15 Both sense input using character recognition. OCR
software (4) PC control
‘sees’ the input whereas MICR ‘feels’ the input. ITQ16
ITQ8 Any ONE from each of the Both are pointing devices. A light-pen uses sight
following: BEFORE (a) scan images technology, a mouse senses touch.
for inclusion in a print-based activity
1TQ17 Any ONE of: (a) faster than a mouse (b) picking up
(b) scan pictures for projection using
a light-pen and pointing it to where you want the cursor to
a multimedia system; (c) scan a map,
go is a more intuitive way to interact with the computer
reduce it, print note-sized versions of
it and paste in students’ book for easy ITQ18 (a) Automatic standby. (b) Accessed from the
reference; AFTER (a) Scan handwritten display properties, activated by checking a box.
student work for discussion; (b) Scan ITQ19 (a) Mercury or arsenic. (b) Follow guidelines issued
student work and keep in an electronic by solid waste agencies and health authorities. ITQ20
portfolio Hardware store, computer retailer
ITQ9 (a) to identify storage ITQ21 Print speed, quality of output ITQ22 (a) a full page of
locations such as shelves and bins text – text usually prints faster than graphics; (b)
(b) to identify specific items being black-and-white – prints faster than colour
warehoused
ITQ23 (a) dot matrix printer (b) chain printer (c) laser or
ITQ10 Any TWO of: (a) access inkjet printer
library services (b) lunch card ITQ24 A plotter produces large format output whereas a
(c) identification card that allows door printer does not.
access
3 • Input and output devices
43
3 • Input and output devices
IT portfolio
1 In this activity you will explore printers.
a Interview at least five persons and find out the make and model of the printer they use. For example, if you
interviewed me, I would tell you I use a Samsung ML-2165W.
b Conduct research to get more details about each of the printers based on the make and model supplied. c
Copy the following table in your portfolio and complete it. Note that I have completed the first row based on
research done about my printer.
Make & Model Impact or Print Print Resolution
Non-Impact Typ Speed (dpi)
e
Group activities
1 This is a small-group activity for 3–4 people.
a Each group member should collect at least TWO source documents generated in each of the following
scenarios: • a classroom environment
• a home
• a micro or small business (ask the Principles of Business teacher at your school what this
is) • a meeting of a sports team or co-curricular activity (Cadet, Key Club, etc.)
b Compare the documents collected from each area. Note their similarities and differences.
c Classify all the documents as either human-readable or machine-readable.
d Suggest which device(s) are ideal for reading the documents categorised as
machine-readable. e Paste the documents in your portfolio and record your findings next to each
of them.
2 Your local police station has just received a donation of a digital camera and US$800 to purchase a printer suitable for
printing crime-scene photos. The officer in charge of the station has sought your help to select a suitable printer. You
have to co-opt two of your classmates to undertake this task. You are required to:
a Assess the needs of the police station and make a list of the TWO types of printers that the group believe are
most suitable.
b For EACH type, identify TWO named printers available for sale at a local computer store or online retailer.
Complete the table below.
Type 1 Type 2
Brand
Model
Resolution
Print speed
Memory
capacity
Price
46
4 The
Internet
and
communications
technology
By the end of this chapter you should be
able to:
Concept map
facilitates features
duplex VOIP
types:
telnet
uploads
voice over Internet
private (intranet & extranet)
public (Internet)
ownership:
hosted
XHTML
on
unique URL
web server
website
In this chapter, we will explore how computers facilitate the exchange of data
in all its forms: text, images, sound and video. We will look at how computers
can be connected to transfer data from one point to another. Additionally, we
will explore a range of computer-based tools used by individuals to
communicate personally and professionally.
4 • The Internet and communications technology
uploading ❯
downloading ❯
network ❯
Types of networks
ITQ1 The three main types of computer networks are local area
ITQ1 networks (LANs), metropolitan area networks (MANs) and
Data communication is the transfer of information from wide area networks (WANs).
one computer to another.
In data communications, one computer (the sender or Type Description
transmitter) transfers data to another computer (receiver)
LAN A network that uses
over a communication channel or communication link.
more computers in a
This channel or link may be wired or wireless. Where the
one building or a gro
receiving computer is located some distance away from the
sending computer, we say that the receiving computer ‘is MA Regional computer
remotely located’. Two common terms that are used in N covered by an avera
data communications to describe the action of transferring example of a MAN.
data are upload and download.
Transferring a file from one computer to another computer WA A data communicat
on a network using data communication links is known as N network) outside its
uploading. wirelessly, to link to
Transferring a copy of a file from a distant computer to a is an example of a W
disk in one’s local computer using data communication
links is known as downloading. When computers are
connected via communication channels so that users can
share hardware resources, data files and programs we
Answer the following telecommunications provider
questions. a What is WiMax? in the Caribbean that offers
b Name ONE WiMax service.
c Suggest TWO ways in which
WiMax service is
advantageous to specific user
groups.
48
ITQ2
ITQ1
What is the difference between EACH of the following pairs
of devices:
(a) hub and switch
(b) switch and router.
4 • The Internet and communications technology
Networking hardware
A range of hardware devices are used to connect computers
together to create networks. These include network cards,
hubs, switches and routers. Each network card has a socket
into which a special cable fits. A hub is just a device that
connects many cables together and transfers network
messages between those cables. Many homes are now
equipped with both a modem and a wireless router.
Figure 4.2 A four-computer local area network using a hub.
49
4 • The Internet and communications technology
ITQ3
(a)
ITQ1
Which of the cable types mentioned do
you believe
(a) has the greatest bandwidth;
(b) is the most costly to
purchase and
(b)
install;
(c) is the most common in
local area
networks?
(c)
50
bandwidth ❯
narrowband, voiceband ❯
broadband ❯
point-to-point ❯
4 • The Internet and communications technology
Bandwidth
Each transmission media has a characteristic that
determines the speed at which data is carried. This
characteristic is called bandwidth. A number of terms have
been coined to refer to bandwidth such as narrowband,
voiceband and broadband.
51
4 • The Internet and communications technology
Simplex transmission
Half-duplex transmission
52
Internet ❯
ITQ5
ITQ1
Suggest THREE ways in which an extranet may typically intranet ❯
be used by an organisation.
data.
An intranet is a private computer network designed to
meet the needs of a single organisation or company that is
extranet ❯ based on Internet (TCP/IP) technology. It is not necessarily
4 • The Internet and communications technology open to the external Internet and defi nitely not open to
outside users. It utilises familiar facilities such as web
The Internet, intranet and extranet pages and web browsers.
An extranet is an intranet that has been selectively opened
Some organisations rely on the Internet, intranet and an to specially selected individuals or organisations (including
extranet to meet their data communication needs. Whilst customers, suppliers, research associates). An online
all three have similarities, they all have features that make banking application is an example of an extranet.
them different.
The Internet is a public, global (wide area) network based
on the TCP/ IP protocol. The TCP/IP protocol assigns
Firefox
every connected computer a unique Internet address, also Mozilla Firefox Start Page Add-ons Manager
called an IP address, so that any two connected
computers can locate each other on the network and locate
Google
https://slb.slbnetbank.com/Login.asp
User ID:
<PHOTO>[INSERT IMAGE 063]
Password:
Sign In >
Bank website please email us at: support@slbbank.com
HTTP
Hyper Text Transfer Protocol (HTTP) is a
protocol used to request and transmit fi les,
especially web pages and web page
HTTP ❯ FTP ❯ components, over the Internet or other
computer networks.
FTP
File Transfer Protocol (FTP) is a protocol
Figure 4.7 Online banking is a service
used to transfer fi les between FTP servers
facilitated by an extranet and provides
and clients. An FTP site is like a large fi ling
customers with around-the-clock access to
cabinet. With a
their accounts.
53
4 • The Internet and communications technology
traditional filing cabinet, the person who does the filing has the option to
label and organise the files as well as deciding which files to keep in locked
drawers and which files remain available for public access. When using an FTP
A protocol is an agreed set of rules that specifies the format of
data as well as the rules to be followed to transmit it.
Skype mobile
File sharing
Instant messaging
Multi-person video
conference
Multi-person voice
conference
Screen sharing
Other
54
data over short distances from fixed and
mobile devices, using radio waves. Bluetooth
capability is enabled in a device by means of
an embedded Bluetooth chip and supporting
Bluetooth ❯ Wi-Fi ❯
software. The chip enables Bluetooth to be
built into a wide range of devices such as
cellular phones and PDAs. Some of the current
uses of the Bluetooth protocol include:
• wireless control of and communication
between a mobile phone and a handsfree
headset;
• wireless control of and communication
between a mobile phone and a Bluetooth
compatible car stereo system;
• wireless Bluetooth headset and intercom;
• wireless networking between PCs in a
confined space and where little bandwidth is
required;
• wireless communication with PC input and
output devices, the most common being the
mouse, keyboard and printer;
• transfer of files, contact details, calendar
4 The Internet and communications technology
• appointments, and reminders between
smartphones.
Bluetooth
Wi-Fi
Bluetooth is a wireless protocol for exchanging
Wi-Fi is a marketing term created by the Wi-Fi Figure 4.9 A web page being viewed in a web
Alliance, a non-profit industry group that tests browser. Each of the items in the red box on
products to ensure that they comply with the left are hyperlinks to other pages on the
particular industry wireless standards. These Macmillan Caribbean website.
standards relate to a range of protocols
governing wireless LAN communications.
55
4 • The Internet and communications technology
web page ❯
web browser ❯
web site ❯
home page ❯
hyperlink ❯
web server ❯
A web server is special-purpose application software that
accepts requests for information, framed according to the
Hyper Text Transport Protocol (HTTP), processes these
requests and sends the requested document.
A web browser is special-purpose application software that
runs on an Internet- connected computer and uses the
HTTP to connect with web servers. All web browsers can
decode web pages that have been written (marked) with
HTML. A web browser is needed for a web page to be
requested, downloaded,
decoded and displayed on a user’s local machine. The
most common web browsers are Internet Explorer, Firefox,
Chrome, Safari and Opera. A uniform resource locator
(URL) is a string of characters that uniquely identifi es an
Internet resource’s type and location. Consider the following
URL: http://www.amazon.com/Apple-iPad-Mini-Black-16GB/
• http:// – identifi es a World Wide Web protocol.
• www.amazon.com – www. indicates a resource on the
World Wide Web, amazon indicates the Internet domain
name and .com indicates the domain suffi x. •
Apple-iPad-Mini-Black-16GB/ – fully describes the directory
structure (where the document is stored) and includes the
document’s name and extension. Many companies use
their company name as part of their Internet domain name.
This makes it easier for users to fi nd the website using
search engines. A top-level domain name is the last part
of an Internet domain name, that is, the group of letters
that follow the fi nal dot of any Internet domain name, ‘com’
in our example above.
ITQ6
Give THREE other examples of top-level domain names.
smartphones and tablets, tweets, Facebook inbox
messages and instant messages are now much more
popular than e-mail. We will now discuss a range of tools
available for communicating today.
E-mail
Electronic mail (e-mail) applications allow users to send
an electronic message over a network to anyone with an
e-mail address and access to a computer system. An
e-mail address is always in the form
username@domain_name, for example,
electronic mail ❯ info@macmillan-caribbean.com.
Common desktop e-mail application programs include
Evolution Mail, Outlook and Outlook Express. Many users
have free web-based e-mail accounts with Gmail, Hotmail
and Yahoo Mail provided by Google, Microsoft and Yahoo
respectively.
An e-mail message is usually text-based but may include
images, sounds and video clips as attachments. Unlike
e-mail message ❯
regular surface mail (snail mail), we cannot send physical
objects using e-mail. E-mail applications have similar
functionality including the ability to read and store received
messages, create and send new messages. Messages
can be sent to one or more recipients. Facilities to maintain
an address book or contacts list are also usually provided.
This makes it quicker and easier to send e-mail to the
correct recipients. The delivery of e-mail usually takes a
matter of seconds, and, in the situation where delivery
fails, the sender is advised accordingly.
57
4 • The Internet and communications technology
Blogging
blog ❯
A podcast is an audio broadcast using the Internet that
can be played back on an iPod or similar device.
Podcasts have become very popular with radio
broadcasters, making their programs available online so
listeners can catch up with any programs they might have
missed. Podcasts have now expanded, with smaller
organisations producing their own podcasts only available
on the Internet.
podcast ❯
Summary
A blog or web log is a diary maintained by its author on the
World Wide Web. It allows people to comment on the
posts.
Blogging has become very popular in recent years. People
who used to maintain a diary of their daily activities started
to make these entries, or posts, on their websites. You do
not have to have a website to maintain a blog as free blog Figure 4.12 Nature Publishing Group offers podcasts on a
hosting sites are available on the Internet. wide range of Science topics. The URL is
http://www.nature.com/podcast/index.html/
Podcasts
• Networks can be categorised as LAN (Local Area Network) for computers in close proximity,
MAN (Metropolitan Area Network) for computers connected within a town or city, WAN (Wide
Area Network) for computers geographically separated.
• Network cabling can be coaxial, twisted pair or fibre optic.
• Computers and computer devices can be connected using Wi-Fi, microwave, Bluetooth and
satellite technologies. • Broadband, voiceband and narrowband define the speed of network
connections.
• Broadcast communication is messages sent from one computer to many whereas point-to-point
communication is a one-to-one link.
• Modes of communication are simplex, half-duplex and duplex.
• The Internet facilitates a wide range of services including the World Wide Web, e-mail, IRC,
and bulletin boards. • E-mail (electronic mail) applications allow messages to be sent over a
network.
• Internet relay chat (IRC) is interactive text chat between people with access to computers
on a network. • Web browsers are programs for viewing web pages made available on the
World Wide Web. • Newsgroups and bulletin boards are older technologies that allow
viewers to post and read comments. The
interactive nature of newsgroups and bulletin boards has now largely been replaced by
online forums. • Blogging refers to maintaining an online diary. Blogging software allows
readers to comment on diary entries. • FTP (File Transfer Protocol) is a method of uploading
files from a local computer to a remote computer and downloading files from a remote
computer to a local computer.
• Telemarketing and teleconferencing refer to using computer networks, particularly the
Internet, to market goods and services, and to hold meetings, respectively.
58
4 • The Internet and communications technology
computer networks.
Answers to ITQs ITQ1 (a) A telecommunications
technology providing wireless data,
voice and video over long distances;
(b) Digicel; (c) (i) facilitates more
commercial activities as e-commerce
facilities can be made available in
places not served by wired telephone
IT portfolio
ITQ3 (a) Fibre optic; (b) fibre optic; (c) twisted pair.
service or wired network; (ii) provides
opportunities for the development of ITQ4 To download multimedia content such as music and
more innovative products/services. movies. ITQ5 Any THREE of: (a) to communicate using
electronic data interchange (b) to publish catalogues for
ITQ2 (a) A hub is a passive device,
wholesalers and trade partners (c) to share training
switch is intelligent; (b) switch
programmes (d) to provide team collaboration
forwards data packets between
environments.
computers on one network, router
forwards data packets between ITQ6 Any THREE of: .biz.com, .info, .net, .org, .pro
1 This activity will explore the concepts related to data communications and networking.
a Check out the computer lab at school (make sure to get permission from your teacher before you do so); ask the
following questions:
i Are the computers networked?
ii What types of cabling are used?
iii Is there a server?
iv Is the central connecting device a hub, switch or router?
v Is there Internet access?
b Record your findings in your portfolio.
2 In this activity you will explore concepts related to Wi-Fi and the Internet. Conduct research (read books, use search
engines on the Web and interview people) and record your findings in your portfolio:
a What is the name of the organisation that owns the Wi-Fi trademark?
b When was the term ‘Wi-Fi’ first used commercially?
c What wireless networking standard is used by Wi-Fi?
d Describe the THREE most recent variations of the Wi-Fi standard. Ensure that you make mention of distance
limitations.
e What does the logo look like? Have you ever seen the logo on a product or its packaging? Paste an image of the
logo in your portfolio.
f Visit your local Internet café and find out if they offer VoIP telephone calls. What hardware and software
components are required?
g Download Skype and make a VoIP telephone call. How does the cost and call quality compare with a call made
via a fixed line or mobile telephone?
59
4 • The Internet and communications technology
Group activities
1 This activity should be done at the same time as three other classmates using Google’s Gmail. a Create an e-mail
account using your firstname and lastname as username: For example, danielle.sterling@ gmail.com.
b Use the address book to add contact details for at least three of your friends.
c Compose a new e-mail to the first person in your address book. Cc (carbon copy) the second person in your
address book. Bcc (blind carbon copy) the third person in your address book.
d In the body of the e-mail message, distinguish among Internet, intranet and extranet. Attach a text file
containing the definition of ‘data communication’.
e Send the e-mail to all three recipients.
f Retrieve and read the e-mail received from your friends. Observe the names in the To and Cc fields. Why is
there no mention of the person who was blind carbon copied?
g Print copies of all three e-mails and place them in your portfolio.
2 Help your teacher to organise a field trip to your local government (parish council) office. Ask your parent, guardian or a
relative to help, as they may know someone responsible for the network there.
a What type of network is installed there?
b Are the computers within the offices networked?
c Can any of the computers communicate with the regional or national government computers? What type of
network is this?
d Discuss with the staff the advantages of government sharing information and communicating using computers.
Record your findings in your portfolio.
(D) users to access and view web pages on the
Internet
Examination-style questions 3 A network that allows staff and customers to securely
access data is known as a
Multiple-choice questions
(A) extranet (C) outernet
TEST BANK (B) Internet (D) intranet
4 A blog is an example of
5 Which of the following Internet-based services is NOT (A) an online diary
(B) an audio broadcast on the Internet
Instructions: Each item in this test has four suggested (C) a text-based ‘chatting’ system
responses labelled (A), (B), (C) or (D). Read each
(D) a place online where you can post and read
question carefully then select the most suitable messages with people of similar interests
response. suited for text- based communication?
1 The process of sending a file from a local computer to a (A) bulletin board (C) FTP
remote computer is called (B) e-mail (D) podcasting 6 Which of the following is
(A) downloading (C) updating the most appropriate type of network for connecting
(B) uploading (D) inputting computers in a single building?
2 An e-mail program allows (A) CAN (C) MAN
(A) real-time exchange of messages or files with (B) LAN (D) WAN
another online user 7 Which of the following types of cable should be used
(B) geographically separated people to transfer for a very fast network?
audio and video (A) coaxial (C) copper
(C) transmission of messages and files via a network (B) twisted pair (D) fibre optic
such as the Internet
8 An international company needs to transfer large (A) broadband router
amounts of data around the countries where it has (B) hub
offices. Which communication technology is best (C) local area network
suited to this task? (D) coaxial router
(A) microwave (C) infra red 10 Which is NOT a mode of communication? (A)
(B) Bluetooth (D) satellite complex (C) full duplex (B) simplex (D)
9 The device that is used to connect many computers half-duplex
together is a
60
4 • The Internet and communications technology
Structured questions
Explain ONE drawback or limitation of linking
1 Networks provide a range of facilities for data computers in a network via each of the following
communication.
media:
a What is a network? [1] b In what way does a blog i satellite [1] ii microwave [1] iii infrared [1] iv
differ from a bulletin board? [1] c What is telnet? [1] d fibre optic [1] v coaxial [1]
Describe the operation of the Internet Relay Chat
6 The following questions refer to the illustration below. a
facility. [2] 2 Businesses are expanding their activities to
Name the THREE types of cabling illustrated. [3] b
exploit opportunities made possible by Internet, intranet
and extranet technologies. Identify which cable is most likely used to connect a
modem to a wireless router. [1]
a Clearly distinguish between the Internet and an
intranet. [2] b Suggest TWO ways in which a company
may benefit from using an extranet. [2] c Suggest A
TWO drawbacks in using electronic mail as compared
with using normal mail for day-to-day business
communication. [2] 3 A network is a communications,
data exchange and resource-sharing system created by
linking two or more computers and establishing
standards, or protocols, so that they can work together. B
5
Data storage and
5 • Data storage and manipulation
manipulation
for representing integers describe the BCD
floating point
subtracted using ASCII integers may be
added
manipulated using
binary
including hexadecimal
decimal octal
representation schemes:
unsigned binary
sign and magnitude
Binary Coded Decimal
(LSD).
Consider the base 10 number 132.
We readily recognise this number as one hundred and
thirty-two since the first digit, the ‘1’ has a value of 100, the
‘3’ has a value of 30 and the ‘2’ has a value of 2.
The value of the LSD in the base 10 number 132 is two (2)
and the value of the MSD is one hundred (100).
We will now consider three other number systems. These
use the numbers 2, 8 and 16 as their base and are called
binary, octal and hexadecimal respectively.
1 3 2
binary ❯
5 • Data storage and manipulation
Number systems
Humans count in the base 10 using what is called the
decimal (or denary) system. The decimal number system
uses 10 digits: 0 through 9. The most important feature of
a number system is the concept of positional value – the
value of a digit in a number depends on its position or
place. Recall from mathematics that the leftmost digit in
any number is called the most significant digit (MSD)
and the rightmost digit is called the least significant digit
MSD LSD
Place values
27 26 25 20
letter ‘A’ or the word ‘Love’).
63
5 • Data storage and manipulation
Step 2: Multiply each digit in the bit string by its place value, giving the value of each
column.
MSD ← LSD Work from right to left
23 22 21 20 Place values
Step 3: Sum the values obtained in step 2, giving the decimal value being sought.
23 22 21
8 4 2
1 0 0
(1 × 8) (0 × (0 ×
4) 2)
ITQ2 8 0 0
ITQ1
Convert 111 0012 to decimal.
8+0+0+1=9
Activity 5.1 Visit khanacademy.org and watch the video ‘Understanding how numbers
are represented’.
1 Write the web page address (URL) of the YouTube video in your portfolio.
2 Complete the following statements in your portfolio:
a One new concept I learned was …
b It is important for us to understand how numbers are represented because …
64
Our conversion is now complete: 6710 = 1 000 0112
ITQ6
ITQ1
Convert 5910 to binary.
5 • Data storage and manipulation
6710 67 ÷ 2 = 33 remainder 1
33 ÷ 2 = 16 remainder 1
16 ÷ 2 = 8 remainder 0
8 ÷ 2 = 4 remainder 0
4 ÷ 2 = 2 remainder 0
Remainder
2 ÷ 2 = 1 remainder 0 2 67
1 ÷ 2 = 0 remainder 1 2 33 1
2 16 1
∴ 6710 = 1 0 0 0 0 1 12
40 2 20
Step 1
2 80 2 2 10 01 Step 3
Octal is a number system whose base is 8. It uses the
digits 0 through 7. The place values increase in powers of
8.
octal ❯
6910 69 ÷ 8 = 8 remainder 5
ITQ7
8 ÷ 8 = 1 remainder 0
ITQ1
1 ÷ 8 = 0 remainder 1
Convert 7510 to octal.
Step 1: Perform successive divisions, each time recording ∴ 69 = 1 0 5
10 8
the remainder. Step 2: Stop after you perform the division
‘1 divided by 2 equals zero remainder one’. Our conversion is now complete: 6910 = 1058
Step 3: Your answer is the bit string read from bottom to
top. Our conversion is now complete: 6710 = 1 000 0112
64 + 16
group if necessary.
Grouped binary 001
digits
ITQ11
Convert 11 110 011 101 1012 to octal. Our conversion is now complete: 1 010 011 001 1002 = 12
Example 5.11 Convert 1 010 011 001 1002 to octal. 3148
Look at each group of three binary digits, working from
Example 5.12 Convert 5410 to binary via octal.
right to left. Add extra zeros to the left of the rightmost
6 ⎟ 8 = 0 remainder 6 Octal 6 6
∴ 5410 = 668
Binary (from 110 110
Figure 5.1 Conversions between table)
decimal and binary are often quicker
via octal.
ITQ12
Convert 12710 to binary via octal. Hexadecimal (hex) Our conversion is now complete: 5410 =
Step 1: Convert 5410 to octal. Step 2: Convert 668 to binary. 110 1102
5410 54 ⎟ 8 = 6 remainder 6
base 10) and the letters A–F (which are the
equivalent of 10–15 in decimal). The place
values increase in powers of 16. A group of
binary digits can represent any value between 0
hexadecimal ❯
and 15.
Hexadecimal is a number system whose base
is 16. The symbols used are the digits 0–9 (like
66
1 1 1
2 10 2
3 11 3
4 100 4
5 101 5
6 110 6
7 111 7
ITQ13
Convert 12710 to binary via octal. 8 1000 8
9 1001 9
ITQ14
Convert 7E16 to decimal. A 1010 10
0 0 0 D 1101 13
E 1110 14 0 + 128 +
F 1111 15
Binary addition
Addition of binary numbers is similar to the addition of
decimal numbers. Consider how you would do the
∴ 9110 = 5B16 following decimal sum.
Conversio (0
n 2
67
5 • Data storage and manipulation
1 0+0 0
2 1 + 0 or 0 + 1 1
3 1+1 0 carry
1
4 1+1+1 1 carry
1
(carry)
Set out the sum, taking care to align the bits to the
68
column from the right: 1, 1 and 1.
Apply rule 4: 1 + 1 + 1 = 1 carry 1. 1110
Write 1 in the same column and +110
carry 1 to the leftmost column. 100
Step 4: Add the digits in the leftmost (carr 1 1
column: 1 and 1. Apply rule 3: 1 + 1 y) 1
= 0 carry 1. Write 0 in the same
column and carry 1 to the leftmost
column.
1 110
ITQ17
Step 5: Bring down the 1 that was + 110
Add together the following pairs of carried over as there is nothing to 0100
binary numbers, giving the add
answers in 5 • Data storage and manipulation
(carr 1 1
y) 1
(carr 1
y) 1
Step 3: Add the digits in the 3rd
binary form.
(a) 11012 and 00112
(b) 10112 and 11102
(c) 11 1002 and 1112
(d) 110 0112 and 10 0012.
ITQ19
Express 63 as a binary-coded decimal.
to it.1110 + 110
ITQ18 10100
Using the rules for binary subtraction, subtract 10112 from
Our computation is now complete: 11102
11 1102.
+ 1102 = 10 1002
Binary subtraction
Binary subtraction has a set of rules that are more
complicated than addition.
Rul What we Re
integer ❯ e subtract
negative integer ❯
1 0 from 0 0
2 1 from 1 0
3 0 from 1 1
4 1 from 0 We can’t unless we borrow 10 from the next because we can’t perform binary addition on the numbers
column Table 5.5 Rules for binary subtraction. • sign and magnitude representation – developed to try to
overcome the limitations of BCD; works well for storing
Fortunately, computer systems have a simple method of negative numbers but it is not suitable for adding numbers
subtracting called complementation. We discuss • two’s complement – the method computers use to
complementation later in this chapter. After we learn how
to do complementation, we will perform binary subtraction. represent signed integers. We will work through each of
these schemes in turn.
Representing integers
Binary-coded decimal (BCD)
Recall that an integer is a whole number that is either
greater than zero, zero or less than zero. In the case BCD is the simplest way of storing data in a computer
where it is less than zero we call it a negative integer. We where each decimal digit from 0 to 9 is given a binary
code. This code is a representation of each digit’s own
will discuss three schemes for representing integers: •
binary sequence. BCD’s biggest selling point is that it
binary-coded decimal (BCD) – an early suggestion for
allows easy conversion to decimal digits for printing or
storing decimal display and faster decimal calculations.
numbers using the binary number system; not very useful
69
5 • Data storage and manipulation There are many binary-coded decimal schemes, however,
we will use BCD 8421, a scheme where a digit is usually
represented by four bits which, in general, represent the
Digit BCD values/digits/characters 0–9. The bit pattern ‘1010’ and
8421 ‘1011’ represent the ‘+’ and ‘–’ signs respectively. Even
though we have been given the code for ‘+’, it is not
00 common practice to use it.
11
2 10 Example 5.18 Express 37 as a binary-coded decimal.
Step 1: Retrieve the code for first digit in the number
3 11
Step 2: Write down this code followed by a space 0011
4 100
the digits in the number are 0011 0111BCD
5 101 6 110 processed 0011 0111
Step 3: Repeat steps 1 and 2 until all The process is now complete: 3710 =
37
Step 3: Place the code for negative (1011) to the left of the
–37
Sig Magnitude
n
1 0 0 1 0 1
70
Sig Magnitude
n
Step 4: Write either a 1 or a 0 to
indicate the sign of the number. 0 0 1 0 0 1 0 1
71
5 • Data storage and manipulation
Step 3: Flip the bits
1111 1000
11111000
+1
11111001
=–
ITQ22
Using 8-bit 2’s complement arithmetic, compute 11 1112 =–
MINUS 1510.
=–
00001111
ITQ23
+1 1 1 1 1 0 0 1
Using 4-bit 2’s complement arithmetic, compute 01112
MINUS 710. Step 3a: Perform the computation on the column with the
0000111 1
+1 1 1 1 1 0 0 1
ITQ24
Using 8-bit 2’s complement arithmetic, compute 11 1112
MINUS 1510.
Positional values
Two’s complement
number
Step 3b: Perform the computations on the next six
columns.
(carry) 1 111111
0 000111 1
+ 1 111100 1
0001000
72