DC014 Computer Science 1 Session 2021/2022
Hour 22 - 25
2.0 HARDWARE AND SOFTWARE
2.4 Input and output device
2.4.1 Identify the input and output device
2.4.2 Explain the functions of input device
1 Define the terms below :
a) Input : ___________________________________________________________
b) Input device : ___________________________________________________________
2 List eight (8) types of input devices.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
3 State three (3) types of keyboards.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
4 Explain the benefit of using ergonomic keyboard.
__________________________________________________________________________
__________________________________________________________________________
5 Explain ‘Pointing Devices’.
__________________________________________________________________________
__________________________________________________________________________
6 Describe two (2) examples of pointing devices.
__________________________________________________________________________
__________________________________________________________________________
10
DC014 Computer Science 1 Session 2021/2022
7 Explain ‘Touch Screen’.
__________________________________________________________________________
__________________________________________________________________________
8 Give one (1) example of device that use touch screen.
__________________________________________________________________________
9 Explain the function of a scanner.
__________________________________________________________________________
__________________________________________________________________________
10 List four (4) types of scanners.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
11 Identify and explain two (2) examples of pen input.
Example of Pen Input Explanation
12 Explain the purpose of voice input.
__________________________________________________________________________
__________________________________________________________________________
13 Give an example of voice input device.
__________________________________________________________________________
14 Describe ‘Biometric Input’ device.
__________________________________________________________________________
__________________________________________________________________________
11
DC014 Computer Science 1 Session 2021/2022
15 Identify and explain three (3) examples of biometric technology input devices.
Example Explanation
16 Give two (2) examples of devices that utilize ‘touch motion’ as biometric input.
__________________________________________________________________________
__________________________________________________________________________
17 State two (2) input devices that usually use for surfing the internet using smartphone.
__________________________________________________________________________
__________________________________________________________________________
18 Define the terms below :
a) Ouput : ___________________________________________________________
b) Output device : ___________________________________________________________
12
DC014 Computer Science 1 Session 2021/2022
19 State the function of output devices given.
Output Device Function
a) Display device
b) Printer
c) Speaker
d) Head phones and
earbuds
e) Data projectors
f) Interactive
whiteboards
g) Force-feedback
game controllers
20 List three (3) types of output devices that can be used to enjoy playing computer games.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
21 Explain CRT Monitor.
__________________________________________________________________________
__________________________________________________________________________
22 Differentiate between LED Monitors and Plasma Monitors.
LED Monitors Plasma Monitors
23 Differentiate between impact printers and non-impact printers
impact printers non-impact printers
13
DC014 Computer Science 1 Session 2021/2022
24 Give one (1) example of :
a) Impact Printer : _____________________________________________________
b) Non-impact Printer : _____________________________________________________
25 Give an advantage of using impact printer.
__________________________________________________________________________
__________________________________________________________________________
26 Suggest one (1) organization that usually use impact printer in daily tasks.
__________________________________________________________________________
27 Differentiate between headphone and earbuds.
headphone earbuds
28 A virtual reality headset is a head-mounted device that provides virtual reality for the
wearer.
a) State two (2) output devices that can be found in this virtual reality headset.
________________________________________________________________________
________________________________________________________________________
b) Explain one (1) output device mentioned above.
________________________________________________________________________
________________________________________________________________________
29 Explain the benefit of using interactive whiteboard.
__________________________________________________________________________
__________________________________________________________________________
14
DC014 Computer Science 1 Session 2021/2022
30 State the most suitable device according to the situation given:
Situation Device
a) The input device that rolls on a desktop and controls the position
of the cursor on then on the screen.
b) The most popular input device for computer games.
c) The most common device of entering text and numerical data into
a computer system.
d) Input device that contains keys that users can press to enter data
and instructions into a computer.
e) Pressure-sensitive pointing device shaped like a pencil eraser that
is positioned between keys on a mobile computer keyboard
f) Light-sensing input device that reads printed text and graphics and
then translates the result into a form the computer can process.
g) A device that measures unique physical characteristic of a person.
h) Farhan wants to make a digital copy of his Information
Technology notes.
i) Pointing device that fits under the palm of your hand.
j) Technology of authenticating a person’s identity by verifying a
personal characteristic.
k) An output device that produces text and graphics on a physical
medium such as paper.
l) An output device that visually conveys text, graphics and video
information.
m) A device that gives users more real feeling and experience while
playing games.
n) Zara would like to record her voice in the slide’s presentation
o) Diana wants to control a pointer on her screen monitor.
p) Mr. Hamzah plans to install a security system in his office
31 Give two (2) devices that can play a role as an input and output devices at the same time.
__________________________________________________________________________
__________________________________________________________________________
15
DC014 Computer Science 1 Session 2021/2022
Hour 26
2.0 HARDWARE AND SOFTWARE
2.4 Input and output device
2.4.4 Identify the assistive technology input and output device
1. What are the differences between conventional and assistive technologies?
Conventional Assistive
2. What types of disabilities would cause an individual to need AT for mouse input on a
computer? Identify the AT options for people who cannot use a standard mouse.
Disabilities Assistive Technologies
3. What types of disabilities would cause an individual to need AT for keyboard input on a
computer? Identify the AT options for people who cannot use a standard keyboard.
Disabilities Assistive Technologies
4. What types of disabilities would cause an individual to need AT to access computer output?
Identify AT options for people who cannot access standard computer output.
Disabilities Assistive Technologies
5. Speech recognition is an important tool for many people with disabilities. How would one
maximize the ability of speech recognition software?
__________________________________________________________________________
__________________________________________________________________________
6. Explain one (1) benefit of assistive technology input and output device
__________________________________________________________________________
__________________________________________________________________________
7. Suggest two (2) assistive technology devices that can help people who are suffering from
hearing lost.
__________________________________________________________________________
__________________________________________________________________________
16
DC014 Computer Science 1 Session 2021/2022
Hour 27
2.5 STORAGE
2.5.1 Differentiate various storage capacity
1 Define the following terms :
a) storage device :
___________________________________________________________________________
b) storage capacity :
___________________________________________________________________________
2 Describe the function of computer storage.
___________________________________________________________________________
___________________________________________________________________________
3 Convert the following storage capacity :
a) 4 bytes into bits
________________________________________________________________________
________________________________________________________________________
b) 1 kilobyte (KB) into bytes
________________________________________________________________________
________________________________________________________________________
c) 2 megabytes (MB) into bytes
________________________________________________________________________
________________________________________________________________________
d) 7168 kilobytes (KB) into megabytes (MB)
________________________________________________________________________
________________________________________________________________________
17
DC014 Computer Science 1 Session 2021/2022
e) 56320 megabytes into gigabytes
________________________________________________________________________
________________________________________________________________________
f) 10 terabytes into gigabytes
________________________________________________________________________
________________________________________________________________________
g) 1 megabyte into bits
________________________________________________________________________
________________________________________________________________________
h) 1048576 gigabytes into petabyte(s)
________________________________________________________________________
________________________________________________________________________
i) 3 terabytes into megabytes
________________________________________________________________________
________________________________________________________________________
j) 5242880 kilobytes into gigabytes
________________________________________________________________________
________________________________________________________________________
18
DC014 Computer Science 1 Session 2021/2022
Hour 28-29
2.5 STORAGE
2.5.2 Identify types of storage media
2.5.3 Explain the functions of storage media
1 Define storage media.
__________________________________________________________________________
2 Describe the function of computer storage.
___________________________________________________________________________
3 State five (5) types of storage media
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
4 Identify the most appropriate storage media to be used based on the given scenarios.
Scenarios Storage Media Reason
a) A school is planning to
provide every student with a
portable storage device so they
can take their homework home.
b) A publisher wants to
distribute a new encyclopedia
using a storage media. It
contains 500MB of data and
they want to distribute it to
10,000 people.
5 State two (2) advantages of SSD?
___________________________________________________________________________
___________________________________________________________________________
19
DC014 Computer Science 1 Session 2021/2022
6 State two (2) disadvantages of SSD?
___________________________________________________________________________
___________________________________________________________________________
7 State two (2) advantages of hard disk?
___________________________________________________________________________
___________________________________________________________________________
8 State two (2) disadvantages of hard disk?
___________________________________________________________________________
___________________________________________________________________________
9 State two (2) advantages of thumb drive?
___________________________________________________________________________
___________________________________________________________________________
10 State two (2) disadvantages of thumb drive?
___________________________________________________________________________
__________________________________________________________________________
11 Suggest one reason that makes SSD the most reliable type of storage.
___________________________________________________________________________
___________________________________________________________________________
12 Give two (2) examples of optical disc
___________________________________________________________________________
___________________________________________________________________________
13 Give the advantage of cloud storage.
___________________________________________________________________________
___________________________________________________________________________
20
DC014 Computer Science 1 Session 2021/2022
Hour 30
2.5 STORAGE
2.5.4 Differentiate between volatile memory and storage
1. Give one (1) example of volatile memory.
___________________________________________________________________________
2. Give two (2) examples of storage.
___________________________________________________________________________
___________________________________________________________________________
3. State two (2) differences between volatile memory and storage?
Volatile memory Storage
21
DC014 Computer Science 1 Session 2021/2022
Hour 31-36
2.0 HARDWARE AND SOFTWARE
2.6 Adapter Card
2.6.1 Identify types of adapter cards
2.6.2 Explain the functions of adapter cards
1 Define adapter cards.
__________________________________________________________________________
__________________________________________________________________________
2 State three (3) examples of peripherals.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
3 Discuss one (1) advantage of plug and play technology.
__________________________________________________________________________
__________________________________________________________________________
4 List five (5) examples of adapter cards and describe its functions.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
5 Give two (2) examples of Bluetooth-enabled devices.
__________________________________________________________________________
__________________________________________________________________________
6 Describe network adapter cards.
__________________________________________________________________________
__________________________________________________________________________
22
DC014 Computer Science 1 Session 2021/2022
7 Two popular adapter cards are sound card and video card. Describe its functions.
a) Sound card : _______________________________________________+_____________
_____________________________________________________________
b) Video card : _____________________________________________________________
______________________________________________________________
8 Describe USB adapter cards.
___________________________________________________________________________
___________________________________________________________________________
9 Give one (1) input devices and one (1) output devices that can be connect to USB cards.
a) Input device:
_______________________________________________________________
b) Output device:
______________________________________________________________
10 Identify types of adapter cards given.
Types of Adapter Cards
23
DC014 Computer Science 1 Session 2021/2022
11 Identify adapter cards used by following devices.
24
DC014 Computer Science 1 Session 2021/2022
Hour 37
HARDWARE AND SOFTWARE
2.7 System Software
2.7.1 Operating System
2.7.1.1 Identify types of operating system
1 Define software.
__________________________________________________________________________
__________________________________________________________________________
2 Differentiate between proprietary software and open source software.
Comparison Proprietary Software Open Source Software
Definition
Access
Flexibility
3 State two (2) examples of proprietary software and open source software.
Proprietary software : ____________________________________________________
____________________________________________________
Open source software : ____________________________________________________
____________________________________________________
4 Define system software.
_________________________________________________________________________
_________________________________________________________________________
5 State two (2) types of system software.
__________________________________________________________________________
__________________________________________________________________________
25
DC014 Computer Science 1 Session 2021/2022
6 Microsoft Windows 10 is an example of proprietary software for operating system.
a) Define operating system.
__________________________________________________________________________
__________________________________________________________________________
b) Give three (3) types of operating system.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
c) Define each type of your answer in 6(b).
__________________________________________________________________________
__________________________________________________________________________
d) Give two (2) examples of proprietary software for each operating system in 6(b).
__________________________________________________________________________
__________________________________________________________________________
7 Based on the information given, suggest one (1) example of OS they should install in their
computer.
a) Rahman is thinking of buying a computer, which will use Microsoft’s version.
________________________________________________________________________
b) Zahid bought Apple Mac notebook for his son.
________________________________________________________________________
c) Junid is a power user. He likes to use this operating system because of its flexibility and
power. Besides, he wants to use his laptop and his computers in his office, which connect
to each other.
________________________________________________________________________
d) Aina does not have enough money to buy operating system for her notebook. She is looking
for popular, free, multitasking UNIX-type operating system
________________________________________________________________________
26
DC014 Computer Science 1 Session 2021/2022
Hour 38-39
HARDWARE AND SOFTWARE
2.7 System Software
2.7.1 Operating System
2.7.1.2 Explain the functions of operating system
1 Manage program is one of the functions of operating system.
a) List the other seven (7) functions of operating system.
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
b) Describe any three (3) functions of operating system mentioned in 1(a).
operating system functions
2 Most operating system performs similar functions that include booting, providing user
interface, managing program, managing memory and certain utility programs.
a) Define user interface.
_____________________________________________________________________
_____________________________________________________________________
27
DC014 Computer Science 1 Session 2021/2022
b) State types of user interfaces and differentiate between types of user interfaces.
user interfaces user interfaces
1:___________________ 2:___________________
c) Discuss managing programs.
________________________________________________________________________
________________________________________________________________________
d) Explain the function of managing memory.
________________________________________________________________________
________________________________________________________________________
e) One of operating system’s functions is known as booting. There two types of boots, which
are warm boot and cold boot. Differentiate between warm boot and cold boot.
warm boot cold boot
3 State three (3) tools related to managing computer.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
4 Discuss one (1) advantage of controlling a network.
__________________________________________________________________________
__________________________________________________________________________
28
DC014 Computer Science 1 Session 2021/2022
Hour 40-41
HARDWARE AND SOFTWARE
2.7 System Software
2.7.2 Utility Program
2.7.2.1 Identify types of utility programs
1 Define utility program.
__________________________________________________________________________
__________________________________________________________________________
2 List seven (7) types of utility program.
__________________________________________________________________________
__________________________________________________________________________
_________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
3 Discuss any three (3) types of utility program mentioned above.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
29
DC014 Computer Science 1 Session 2021/2022
4 State the utility program based on the given function:
Function Utility Program
a) Performs functions related to file management such as displaying
a list of files on a storage medium, organizing files in the folders,
copying, renaming, deleting, moving, and sorting files and folders;
and creating shortcuts.
b) Copies selected files or the contents of an entire storage medium
to another storage location
c) Shrink the size of file(s)
d) detects and deletes spyware and other similar programs
e) protects a computer against viruses by identifying and removing
any computer viruses found in memory, on storage media, or on
incoming files
5 Maisarah wants to attach a document to her friend via e-mail. The size of the document is
12MB, but the maximum capacity to upload any attachment is limited to 10MB.
a) Suggest one (1) type of utility program for Maisarah to resolve her problem.
________________________________________________________________________
b) State two (2) examples of utility program mentioned in 5(a).
________________________________________________________________________
________________________________________________________________________
6 Ahmad does not know how to do preventive maintenance for his computer. As a good friend,
suggest to him the system tools that he can use to maintain his computer:
Function Utility Program
a) To reorganize files and unused space on hard disk so programs run
faster.
b) To check hard drive for errors. If it finds an error, it attempts
(usually successfully) to fix it.
c) To detect and correct problems on hard disk or floppy disk.
30
DC014 Computer Science 1 Session 2021/2022
Hour 42
2.7 System Software
2.7.2 Utility Program
2.7.2.2 Explain the functions of utility program
1 Farhan has been using his computer for a few months. He would like to perform a few
maintenance-type operations on his computer to optimize its performance.
a) List two (2) types of utility programs that he may use for this purpose.
________________________________________________________________________
________________________________________________________________________
b) State the function of the utility programs mentioned in 1(a).
________________________________________________________________________
________________________________________________________________________
2 Answer the following questions by referring to the table below.
Types of Utility Description
Program
A A program that shrinks the size of a file(s).
A program that reorganizes the files and unused space on a computer’s
B
hard disk.
Antivirus A program that protects, deletes and remove malicious code that affects
Program a computer without the user knowledge or permission.
A program that allows users to copy, or back up, selected files or an
C
entire hard disk to another storage medium.
Spyware A program that detects and deletes spyware and other similar programs
Remover on a user’s computer.
A restore utility reverses the process and returns backed up files to their
D
original form.
a) Identify the types of utility programs in the table.
A : ________________________________________________________________
B : ________________________________________________________________
C : ________________________________________________________________
D : ________________________________________________________________
b) Give two (2) examples for each software mentioned in 2(a):
A : ________________________________________________________________
B : ________________________________________________________________
C : ________________________________________________________________
D : ________________________________________________________________
31
CHAPTER 3
3.0 INTERNET
TECHNOLOGIES
DC014 LECTURE NOTE
UNIT SAINS KOMPUTER
KOLEJ MATRIKULASI KEDAH
3.1 Internet principles of operation
• Learning Outcomes:
3.1.1 Explain the role of the browser
3.1.2 Describe the role of an Internet service
Provider (ISP)
3.1.3 Differentiate between hypertext transfer
protocol (IP) address, uniform resource
locator (URL)
3.1 Internet principles of operation
• Learning Outcomes:
3.1.1 Explain the role of the browser
3.1.2 Describe the role of an Internet service
Provider (ISP)
3.1.3 Differentiate between hypertext transfer
protocol (IP) address, uniform resource
locator (URL)
3.1.1 Role of the browser
• Web browser is an application software that
allows users to access and view webpages.
• Used to:
–locate,
–retrieve and
–display
content on the World Wide Web
3.1.1 Role of the browser
• Web browser is an application software that
allows users to access and view webpages.
• Used to:
–locate,
–retrieve and
–display
content on the World Wide Web
Web Browser
• Examples of Web browser:
– Google Chrome
– Mozilla Firefox
– Internet Explorer
– Opera
– Apple Safari
– Microsoft Edge
Web Browser
• Examples of Web browser:
– Google Chrome
– Mozilla Firefox
– Internet Explorer
– Opera
– Apple Safari
– Microsoft Edge
The Internet
• The Internet is a worldwide collection of
networks that connects millions of
businesses, government agencies,
educational institutions, and individuals.
• It is a global system made of thousands of
privately and publicly owned computers and
networks.
• Users connect to the internet through ISP.
The Internet
• The Internet is a worldwide collection of
networks that connects millions of
businesses, government agencies,
educational institutions, and individuals.
• It is a global system made of thousands of
privately and publicly owned computers and
networks.
• Users connect to the internet through ISP.
Internet Service Provider (ISP)
• Internet Service Provider (ISP) is an
organization that provides Internet access to
individuals and organizations.
• Also provide related services such as:
–Websites hosting and development
–Email hosting
–Domain name registration
Internet Service Provider (ISP)
• Internet Service Provider (ISP) is an
organization that provides Internet access to
individuals and organizations.
• Also provide related services such as:
–Websites hosting and development
–Email hosting
–Domain name registration
3.1.2 Role of an ISP
• Provide and maintain a connection to the
Internet
• Provide hardware and software support to the
connection
• Protect against external threats such as
viruses, hackers and other illegal activities
• Provide 24-hour customer service and
technical support
3.1.2 Role of an ISP
• Provide and maintain a connection to the
Internet
• Provide hardware and software support to the
connection
• Protect against external threats such as
viruses, hackers and other illegal activities
• Provide 24-hour customer service and
technical support
Examples of the ISP in Malaysia
• TM
• Maxis
• Celcom
• DiGi
• YTL
• REDtone
* The ISP uses the internet protocols to make
computer-to-computer connections possible and transmit
data between them.
Examples of the ISP in Malaysia
• TM
• Maxis
• Celcom
• DiGi
• YTL
• REDtone
* The ISP uses the internet protocols to make
computer-to-computer connections possible and transmit
data between them.
HTTP
• An application protocol for data
communication for the World Wide Web,
where hypertext documents include hyperlink
to other resources that the user can easily
access by a mouse click or by tapping the
screen in the web browser.
HTTP
• An application protocol for data
communication for the World Wide Web,
where hypertext documents include hyperlink
to other resources that the user can easily
access by a mouse click or by tapping the
screen in the web browser.
HTTP
Communication between clients and servers is done
by requests and responses:
• A client (a browser) sends an HTTP request to the
web
• An web server receives the request
• The server runs an application to process the
request
• The server returns an HTTP response (output) to
the browser
• The client (the browser) receives the response
HTTP
Communication between clients and servers is done
by requests and responses:
• A client (a browser) sends an HTTP request to the
web
• An web server receives the request
• The server runs an application to process the
request
• The server returns an HTTP response (output) to
the browser
• The client (the browser) receives the response
HTTPS
• An extension of the Hypertext Transfer
Protocol (HTTP).
• It is used for secure communication over a
computer network, and is widely used on the
internet.
• In https, the communication
protocol is encrypted using
Transport Layer Security (TLS)
HTTPS
• An extension of the Hypertext Transfer
Protocol (HTTP).
• It is used for secure communication over a
computer network, and is widely used on the
internet.
• In https, the communication
protocol is encrypted using
Transport Layer Security (TLS)
HTTPS
• HTTPS uses an encryption protocol to encrypt
communications.
• The protocol is called Transport Layer Security
(TLS), although formerly it was known as
Secure Sockets Layer (SSL).
• This protocol secures communications by
using what’s known as an asymmetric public
key infrastructure.
HTTPS
• HTTPS uses an encryption protocol to encrypt
communications.
• The protocol is called Transport Layer Security
(TLS), although formerly it was known as
Secure Sockets Layer (SSL).
• This protocol secures communications by
using what’s known as an asymmetric public
key infrastructure.
HTTPS
• This type of security system uses two different
keys to encrypt communications between two
parties:
• The private key - this key is controlled by the
owner of a website and it’s kept, as the reader
may have speculated, private. This key lives on
a web server and is used to decrypt
information encrypted by the public key.
HTTPS
• This type of security system uses two different
keys to encrypt communications between two
parties:
• The private key - this key is controlled by the
owner of a website and it’s kept, as the reader
may have speculated, private. This key lives on
a web server and is used to decrypt
information encrypted by the public key.
HTTPS
• The public key - this key is available to
everyone who wants to interact with the
server in a way that’s secure. Information
that’s encrypted by the public key can only be
decrypted by the private key.
HTTPS
• The public key - this key is available to
everyone who wants to interact with the
server in a way that’s secure. Information
that’s encrypted by the public key can only be
decrypted by the private key.
3.1.3 Differences between http and https
INDEX HTTP HTTPS
1 It is not secure and It is secure and reliable
unreliable
2 It is subject to main-in- It is designed to withstand
the-middle and such attack and is considered
eavesdropping attacks secure againts such as
attacks
3 HTTP Works at HTTPS works at Transport
Application Layer Layer
4 Encryption is absent Encryption is present
5 Does not require any Needs SSL Certificates
certificates