SlideShare une entreprise Scribd logo
1  sur  19
Lanie P. Palad
Instructor
Word Processing is a term coined to emphasize
the manipulation of certain types of data- characters
combined to form words, sentences, paragraphs,
memos, letter and reports.
1964- the beginning of widespread use of word

processing.

Word processing system comprises equipment,

procedure and people whereby thoughts and ideas
are expressed and distributed in hardcopy or
softcopy.
Capabilities of Word Processing
1. Automatic Functions
2. Storage Functions
3. Display Functions
4. Communication Functions
5. Sophisticated Functions
6. Programming Functions
Programming Cycle
1. Defining the problem
2. Planning a solution to the problem
3. Coding the solution
4. Checking out the program by debugging and

testing
5. Documentation
Documentation
1. Complete statement of the problem
2. Description of the program logic and copies of

the flow charts
3. Final source listing
4. List and description of error tests along with
the disposition of these errors
5. Operating instructions, including program and
data structures and test data used
6. Input and output specifications
7. Schedules to be maintained
Programming Languages
Computers accomplish their task only when properly
instructed by programs. In writing program
instructions, the programmer uses a languages which
can be understood by computer.
Categories of Programming Languages
1. Machine Languages – Every computer has its own
machine language and this only language it
understands. With earlier computers, were all
written in machine language. Coding a program in
machine language is not an easy task; writing
instructions in a binary notation.
2. Symbolic Languages – Because of the difficulties
involved in writing and testing a machine-language
program, several symbolic programming languages
have been developed. Symbolic languages permit the
programmer to use convenient symbols or
mnemonics when writing a program.
3. High -Level Language-High – level language
statements closely resemble English language
statements. The mathematical symbols are for the
most part, the symbols of traditional mathematics.
Advantage of high – level language
1. It is easily learned and understood being almost

English.
2. Lesser time is required to write programs.
3. They are standardized and can be accepted by any
computer which has a compiler for a particular
language
4. They provide better documentation and are much
easier to maintain
5. Availability of diagnostic error detection allows the
compiler to check program statements for syntactical
errors
Number System
The number system that we now use has provided
mathematician, engineers and scientists with a great
advantage over those of previous civilization.
The earliest numerals which have been found consist of
either vertical or horizontal marks. The decimal number 1
is an example of this sort of symbol.
We have always been accustomed to working primarily
with the decimal system. It is important to note that there
are many other system for numerical calculation and some
are far better suited to the capabilities of digital
computers.
Unitary System
In counting, the simplest system, the simplest system
is not the decimal system, but a one-to-one
comparison between the objects to be counted and
the count or tally, A long series of tallying marks is
simplified by breaking up the long series of tallying
marks into group of five, by making a diagonal stroke
through each set of mark, marks as ______.
Decimal System
The decimal system for counting has been so widely
used from time immemorial. It is based upon the ten
fingers of man. This system is nothing more than a
code where each distinct quantity is assigned a
symbol. In the decimal system the following digits
are used: 0,1,2,3,4,5,6,7,8 and 9. These symbols are
called the Arabic numerals.
Scientific and Engineering Notation

In Scientific and Engineering Notation , we
frequently encounter very large or very small
numbers. For example the distance of Mars from the
sun is 226, 400, 000 kms the speed of light is 300
000 000 meters per second, the distance in terms of
meter for one light year is approximately 9 240 000
000 000 000 meters. Scientific notation provide
convenient scheme for representation of such quality.
Rounding off values
Rounding of values is the process of dropping or
eliminating one or more of the final digits on the
right so that the value contains only significant
figures required for further computation or for
reporting in the final result.
Truncating
The process of deleting a certain digit rather than
rounding off the number is called truncating or
chopping.
Data Representation in Computers

In computer, data is recorded as electronic signals or
indications. The presence or absence of these signals
in specific circuitry represents data in the computer
just as the presence or absence of punched holes
represent data on a punched card.
The binary method of notation can be used to

describe the setting of binary components. The
system is the positional numeration system to the
base 2. Binary notation uses only two symbols 0 and
1.

Division
139/2
69/2
34/2
17/2
8/2
4/2
2/2

Quotient
69
34
17
8
4
2
1

Remainder
1
1
0
1
0
0
0
Binary – Decimal Conversion
101 = 1x2² + 0x2¹ 1x2º
= 4 + 0 + 1
= 5
1100= 1x2³ + 1 x2² + 0x2¹ + 0x2º
= 8 + 4 + 0 + 0
= 12
Lecture 3
Lecture 3
Lecture 3

Contenu connexe

En vedette

E-Governance in Srilanka
E-Governance in SrilankaE-Governance in Srilanka
E-Governance in SrilankaNalin Adhikari
 
AS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing booklet
AS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing bookletAS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing booklet
AS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing bookletChristos Demetriou
 
The uses of ict in our society
The uses of ict in our societyThe uses of ict in our society
The uses of ict in our societyBencelle_16
 
Data and information
Data and informationData and information
Data and informationAnne Perera
 
The use of ICT tools to involve students in their learning/assessment process
The use of ICT tools to involve students in their learning/assessment processThe use of ICT tools to involve students in their learning/assessment process
The use of ICT tools to involve students in their learning/assessment processCristina Palomeque
 
Ch 4 ict in-day2_day_life
Ch 4 ict in-day2_day_lifeCh 4 ict in-day2_day_life
Ch 4 ict in-day2_day_lifeCANOSSAMAHIM
 
Ict pers sliceshare
Ict pers sliceshareIct pers sliceshare
Ict pers slicesharegalluda5
 
Usage of ict in daily life
Usage of ict in daily lifeUsage of ict in daily life
Usage of ict in daily lifeTina Lokman
 
Uses of ict in society
Uses of ict in societyUses of ict in society
Uses of ict in societyAnne Perera
 
Introduction to ICT and its application to Instructional Materials Development
Introduction to ICT and its application to Instructional Materials DevelopmentIntroduction to ICT and its application to Instructional Materials Development
Introduction to ICT and its application to Instructional Materials DevelopmentOnasanya2014
 
Tata kelola Teknologi Informasi dan Komunikasi
Tata kelola Teknologi Informasi dan KomunikasiTata kelola Teknologi Informasi dan Komunikasi
Tata kelola Teknologi Informasi dan Komunikasiputra sutimin
 
Usage of ICT in daily life
Usage of ICT in daily lifeUsage of ICT in daily life
Usage of ICT in daily lifepanitiaict
 
Top 10 I C T Tools 4 Education
Top 10  I C T  Tools 4  EducationTop 10  I C T  Tools 4  Education
Top 10 I C T Tools 4 EducationDr.Kumuda Gururao
 
Grade 10 ICT Short Notes in Sinhala(2015)
Grade 10 ICT Short Notes in Sinhala(2015)Grade 10 ICT Short Notes in Sinhala(2015)
Grade 10 ICT Short Notes in Sinhala(2015)Mahesh Kodituwakku
 
K-12 Module in TLE - ICT Grade 10 [All Gradings]
K-12 Module in TLE - ICT  Grade 10 [All Gradings]K-12 Module in TLE - ICT  Grade 10 [All Gradings]
K-12 Module in TLE - ICT Grade 10 [All Gradings]Daniel Manaog
 

En vedette (20)

Ict
IctIct
Ict
 
Ict grade 10
Ict grade 10Ict grade 10
Ict grade 10
 
E-Governance in Srilanka
E-Governance in SrilankaE-Governance in Srilanka
E-Governance in Srilanka
 
AS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing booklet
AS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing bookletAS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing booklet
AS ICT (OCR) G061 3.1.1 Data, Information, Knowledge & Processing booklet
 
grade 10 ict New syllabus
grade 10 ict New syllabusgrade 10 ict New syllabus
grade 10 ict New syllabus
 
E-Government
E-GovernmentE-Government
E-Government
 
The uses of ict in our society
The uses of ict in our societyThe uses of ict in our society
The uses of ict in our society
 
Data and information
Data and informationData and information
Data and information
 
The use of ICT tools to involve students in their learning/assessment process
The use of ICT tools to involve students in their learning/assessment processThe use of ICT tools to involve students in their learning/assessment process
The use of ICT tools to involve students in their learning/assessment process
 
Ch 4 ict in-day2_day_life
Ch 4 ict in-day2_day_lifeCh 4 ict in-day2_day_life
Ch 4 ict in-day2_day_life
 
Ict pers sliceshare
Ict pers sliceshareIct pers sliceshare
Ict pers sliceshare
 
Usage of ict in daily life
Usage of ict in daily lifeUsage of ict in daily life
Usage of ict in daily life
 
Uses of ict in society
Uses of ict in societyUses of ict in society
Uses of ict in society
 
E government
E governmentE government
E government
 
Introduction to ICT and its application to Instructional Materials Development
Introduction to ICT and its application to Instructional Materials DevelopmentIntroduction to ICT and its application to Instructional Materials Development
Introduction to ICT and its application to Instructional Materials Development
 
Tata kelola Teknologi Informasi dan Komunikasi
Tata kelola Teknologi Informasi dan KomunikasiTata kelola Teknologi Informasi dan Komunikasi
Tata kelola Teknologi Informasi dan Komunikasi
 
Usage of ICT in daily life
Usage of ICT in daily lifeUsage of ICT in daily life
Usage of ICT in daily life
 
Top 10 I C T Tools 4 Education
Top 10  I C T  Tools 4  EducationTop 10  I C T  Tools 4  Education
Top 10 I C T Tools 4 Education
 
Grade 10 ICT Short Notes in Sinhala(2015)
Grade 10 ICT Short Notes in Sinhala(2015)Grade 10 ICT Short Notes in Sinhala(2015)
Grade 10 ICT Short Notes in Sinhala(2015)
 
K-12 Module in TLE - ICT Grade 10 [All Gradings]
K-12 Module in TLE - ICT  Grade 10 [All Gradings]K-12 Module in TLE - ICT  Grade 10 [All Gradings]
K-12 Module in TLE - ICT Grade 10 [All Gradings]
 

Similaire à Lecture 3

GE3151 PSPP _Unit 1 notes and Question bank.pdf
GE3151 PSPP _Unit 1 notes and Question bank.pdfGE3151 PSPP _Unit 1 notes and Question bank.pdf
GE3151 PSPP _Unit 1 notes and Question bank.pdfAsst.prof M.Gokilavani
 
Smart pen(by ankit)
Smart pen(by ankit)Smart pen(by ankit)
Smart pen(by ankit)rankitreddy
 
Introduction to Computer Programming
Introduction to Computer ProgrammingIntroduction to Computer Programming
Introduction to Computer ProgrammingProf. Erwin Globio
 
Java@intro to programming
Java@intro to programmingJava@intro to programming
Java@intro to programmingArvin Buendia
 
Algorithm for computational problematic sit
Algorithm for computational problematic sitAlgorithm for computational problematic sit
Algorithm for computational problematic sitSaurabh846965
 
Software development slides
Software development slidesSoftware development slides
Software development slidesiarthur
 
Program concep sequential statements
Program concep sequential statementsProgram concep sequential statements
Program concep sequential statementsankurkhanna
 
Application of discrete mathematics in IT
Application of discrete mathematics in ITApplication of discrete mathematics in IT
Application of discrete mathematics in ITShahidAbbas52
 
What is algorithm
What is algorithmWhat is algorithm
What is algorithmmshoaib15
 
employee turnover prediction document.docx
employee turnover prediction document.docxemployee turnover prediction document.docx
employee turnover prediction document.docxrohithprabhas1
 
Program logic and design
Program logic and designProgram logic and design
Program logic and designChaffey College
 
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docxDue 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docxjacksnathalie
 

Similaire à Lecture 3 (20)

6272 cnote
6272 cnote6272 cnote
6272 cnote
 
C progrmming
C progrmmingC progrmming
C progrmming
 
Problem solving methodology
Problem solving methodologyProblem solving methodology
Problem solving methodology
 
GE3151 PSPP _Unit 1 notes and Question bank.pdf
GE3151 PSPP _Unit 1 notes and Question bank.pdfGE3151 PSPP _Unit 1 notes and Question bank.pdf
GE3151 PSPP _Unit 1 notes and Question bank.pdf
 
Smart pen(by ankit)
Smart pen(by ankit)Smart pen(by ankit)
Smart pen(by ankit)
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
C with lab
C with labC with lab
C with lab
 
Introduction to Computer Programming
Introduction to Computer ProgrammingIntroduction to Computer Programming
Introduction to Computer Programming
 
Java@intro to programming
Java@intro to programmingJava@intro to programming
Java@intro to programming
 
Algorithm for computational problematic sit
Algorithm for computational problematic sitAlgorithm for computational problematic sit
Algorithm for computational problematic sit
 
computer Unit 1
computer Unit 1computer Unit 1
computer Unit 1
 
Basic Terminology of Data Structure.pptx
Basic Terminology of Data Structure.pptxBasic Terminology of Data Structure.pptx
Basic Terminology of Data Structure.pptx
 
Software development slides
Software development slidesSoftware development slides
Software development slides
 
01CHAP_1.PPT
01CHAP_1.PPT01CHAP_1.PPT
01CHAP_1.PPT
 
Program concep sequential statements
Program concep sequential statementsProgram concep sequential statements
Program concep sequential statements
 
Application of discrete mathematics in IT
Application of discrete mathematics in ITApplication of discrete mathematics in IT
Application of discrete mathematics in IT
 
What is algorithm
What is algorithmWhat is algorithm
What is algorithm
 
employee turnover prediction document.docx
employee turnover prediction document.docxemployee turnover prediction document.docx
employee turnover prediction document.docx
 
Program logic and design
Program logic and designProgram logic and design
Program logic and design
 
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docxDue 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
 

Dernier

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Dernier (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Lecture 3

  • 2. Word Processing is a term coined to emphasize the manipulation of certain types of data- characters combined to form words, sentences, paragraphs, memos, letter and reports. 1964- the beginning of widespread use of word processing. Word processing system comprises equipment, procedure and people whereby thoughts and ideas are expressed and distributed in hardcopy or softcopy.
  • 3. Capabilities of Word Processing 1. Automatic Functions 2. Storage Functions 3. Display Functions 4. Communication Functions 5. Sophisticated Functions 6. Programming Functions
  • 4. Programming Cycle 1. Defining the problem 2. Planning a solution to the problem 3. Coding the solution 4. Checking out the program by debugging and testing 5. Documentation
  • 5. Documentation 1. Complete statement of the problem 2. Description of the program logic and copies of the flow charts 3. Final source listing 4. List and description of error tests along with the disposition of these errors 5. Operating instructions, including program and data structures and test data used 6. Input and output specifications 7. Schedules to be maintained
  • 6. Programming Languages Computers accomplish their task only when properly instructed by programs. In writing program instructions, the programmer uses a languages which can be understood by computer. Categories of Programming Languages 1. Machine Languages – Every computer has its own machine language and this only language it understands. With earlier computers, were all written in machine language. Coding a program in machine language is not an easy task; writing instructions in a binary notation.
  • 7. 2. Symbolic Languages – Because of the difficulties involved in writing and testing a machine-language program, several symbolic programming languages have been developed. Symbolic languages permit the programmer to use convenient symbols or mnemonics when writing a program. 3. High -Level Language-High – level language statements closely resemble English language statements. The mathematical symbols are for the most part, the symbols of traditional mathematics.
  • 8. Advantage of high – level language 1. It is easily learned and understood being almost English. 2. Lesser time is required to write programs. 3. They are standardized and can be accepted by any computer which has a compiler for a particular language 4. They provide better documentation and are much easier to maintain 5. Availability of diagnostic error detection allows the compiler to check program statements for syntactical errors
  • 9. Number System The number system that we now use has provided mathematician, engineers and scientists with a great advantage over those of previous civilization. The earliest numerals which have been found consist of either vertical or horizontal marks. The decimal number 1 is an example of this sort of symbol. We have always been accustomed to working primarily with the decimal system. It is important to note that there are many other system for numerical calculation and some are far better suited to the capabilities of digital computers.
  • 10. Unitary System In counting, the simplest system, the simplest system is not the decimal system, but a one-to-one comparison between the objects to be counted and the count or tally, A long series of tallying marks is simplified by breaking up the long series of tallying marks into group of five, by making a diagonal stroke through each set of mark, marks as ______.
  • 11. Decimal System The decimal system for counting has been so widely used from time immemorial. It is based upon the ten fingers of man. This system is nothing more than a code where each distinct quantity is assigned a symbol. In the decimal system the following digits are used: 0,1,2,3,4,5,6,7,8 and 9. These symbols are called the Arabic numerals.
  • 12. Scientific and Engineering Notation In Scientific and Engineering Notation , we frequently encounter very large or very small numbers. For example the distance of Mars from the sun is 226, 400, 000 kms the speed of light is 300 000 000 meters per second, the distance in terms of meter for one light year is approximately 9 240 000 000 000 000 meters. Scientific notation provide convenient scheme for representation of such quality.
  • 13. Rounding off values Rounding of values is the process of dropping or eliminating one or more of the final digits on the right so that the value contains only significant figures required for further computation or for reporting in the final result. Truncating The process of deleting a certain digit rather than rounding off the number is called truncating or chopping.
  • 14. Data Representation in Computers In computer, data is recorded as electronic signals or indications. The presence or absence of these signals in specific circuitry represents data in the computer just as the presence or absence of punched holes represent data on a punched card.
  • 15. The binary method of notation can be used to describe the setting of binary components. The system is the positional numeration system to the base 2. Binary notation uses only two symbols 0 and 1. Division 139/2 69/2 34/2 17/2 8/2 4/2 2/2 Quotient 69 34 17 8 4 2 1 Remainder 1 1 0 1 0 0 0
  • 16. Binary – Decimal Conversion 101 = 1x2² + 0x2¹ 1x2º = 4 + 0 + 1 = 5 1100= 1x2³ + 1 x2² + 0x2¹ + 0x2º = 8 + 4 + 0 + 0 = 12