KEMBAR78
ICT Notebook | PDF | Computer Network | Wireless Lan
0% found this document useful (0 votes)
60 views29 pages

ICT Notebook

The document covers various topics related to programming, algorithms, and computer networks, including searching algorithms like linear search, the use of Boolean operators in programming, and the differences between machine learning and deep learning. It also discusses network types, data validation, and error detection in data transmission, emphasizing the importance of debugging and iterative development processes. Additionally, it highlights security concerns and common cyber attacks, providing a comprehensive overview of foundational concepts in computer science.

Uploaded by

huong066437
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views29 pages

ICT Notebook

The document covers various topics related to programming, algorithms, and computer networks, including searching algorithms like linear search, the use of Boolean operators in programming, and the differences between machine learning and deep learning. It also discusses network types, data validation, and error detection in data transmission, emphasizing the importance of debugging and iterative development processes. Additionally, it highlights security concerns and common cyber attacks, providing a comprehensive overview of foundational concepts in computer science.

Uploaded by

huong066437
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

CONDITION

CONDITION PSEUDOCODE

CONDITION IN PYTHON

draw.io
Python 3

Flow chart
5/9
- Data set
- Linear search
- Data item
ALGORITHMS are used to plan a wide range of programs. One type of it
is searching algorithms.
Searching algorithms are used with large data sets to find a particular
data set.
The data set doesn’t need to be used for the search algorithms to be
carried out.

One more type of searching algorithm is linear search. Linear search aims
to look at each item in turn, from left to right, to find the item being
looked for.
- Iterate: to do (something) over again or repeatedly.
- Iterations: the process of doing something repeatedly, usually to
improve it, or one of the times you do it.
- Reiterate: to repeat something, once or several times.
12/09
BOOLEAN OPERATORS
What is a micro:bit?
- The micro:bit is a microprocessor with multiple inputs, suitable for block-
based and text-based programming.

Boolean Operators:
-In programming , a single condition contains one input that returns a value of
TRUE/FALSE.
-You can extend the use of one input as part of a condition of two inputs by
using BOOLEAN OPERATORS.

- The micro:bit uses MicroPython as the Python programming language.


- MicroPython is a smaller version of Python and it is specific to the
micro:bit
- MicroPyhton cannot be used outside of its use of the micro:bit

NOTE:
- Boolean operators are AND,OR ,NOT
19/09
More than one output can be sent to another micro:bit by building up the
sequence of outputs , e.g. adding two and having different strings inside the
bracket.
Micro:bit and sound
- Let’s demonstrate how sound can be used on the micro:bit and how it
can tell the person receiving the message that the first letter is complete
before the next one is displayed.

my name code: is 01101000.01110101.01101111.01101110.01100111

23/9 GO FURTHER - Unit: Pseudocode and algorithms

Creating a program is an iterative process

Iteration means REPETITION


Plan (create an algorithms) > Implement > test > evaluate > improve

Sometimes our code may not work


In those case, we should look for errors in our code. We call this DEBUGGING

If you send a program with a bug to the micro:bit, it will display a sad
face and the line that contains the error
NOTE: The software highlights an error with a red line.

Checklist helps to find errors:


- Spelling
- Brackets in the correct place
- Open and close brackets
- ….
It’s important to test, evaluate and debug, as we work on our program.
In those cases, we should look for errors in our code.
We call this DEBUGGING.

26/9

10/10
System software

Application software
Definition: It runs as per user request.
Soft ware:
- Application
- System soft:
-

24/10/2024
Denary is also known as base 10 due to it contains 10 digits and all the number
being based in power as 10

7/11/2024

Deep learning vs machine learning

Machine learning: Machine learning (ML) is a subset of artificial intelligence (AI)


that focuses on building systems that learn—or improve performance—based on
the data they consume. Artificial intelligence is a broad term that refers to
systems or machines that mimic human intelligence.

Deep learning: Deep learning is a type of machine learning that uses artificial
neural networks to learn from data. The human brain inspires artificial neural
networks, which can be used to solve various problems, including image
recognition, natural language processing, and speech recognition.

Augmented reality: a simulation that superimposes digital images on the user’s


real-world environment and allows the user to interact with those images.
14/11 Managing Data
21/11 Data validations and input masks
- Data-captured form: A predefined document (electronic or paper-based)
that contains headings and instructions to collect appropriate data for a
specific purpose.
- Input mask: A special input or layout that controls how data is entered
into a database or data-capture form, e.g., a drop-down box.
- Validation / Data validation: An automatic check to reduce the chance of
errors being made when data is entered into a computer system.
- Field length: The number of characters a field in a database application
allows to be stored.
- Validation rule: A rule that specifies the characteristics of a valid data
item in a database
field.

2/1 ICT- Network


Following terms to your document
network
network topology
high bandwidth
router
network switch
server
A computer network is a system that connects two or more computing devices
for sending and receiving data and sharing information.
Here are the types of computer networks:
PAN (Personal Area Network)
LAN (Local Area Network)
MAN (Metropolitan Area Network)
WAN (Wide Area Network)

Advantages of PAN
Convenient communication among personal devices
Flexible, wireless connection
Cost-effective using low-cost technologies
Disadvantages of PAN
Limited range of communication
Only a limited number of devices can be linked
Slower data transfer speeds compared to wired connections.
LANs
Local Area Networks are a type of network where devices communicate over a
small geographical area. You could think of this as a single building or a school
site, for example. Devices within this network range can access services
offered by the server on the same network, which is ideal for sharing files,
printing, or sharing a single internet connection connection.

Advantages of LAN
- Fast and reliable communication among devices.
- A cost-effective way to share resources such as printers and files.
- Easy to set up and manage.
Disadvantages of LAN
- Limited geographical coverage.
- High set-up cost for wired LANs.
- Limited mobility for wired devices.

WANs
Wide Area Networks are a type of network where devices communicate over
larger geographical areas. An example of this would be a company with a few
offices on opposite sides of town, or even offices in different countries.
These networks usually connect via the internet,.

9/1 Network

Switch- Used to connect a device to form a network


Router- Used to connect multiple networks
WLAN- Wireless Area Network

Network Interface Controller


A network Interface Controller (NIC) must be present in a device to enable it to
communicate with other devices over a network. Sometimes these are physical
cards that can be plugged into a PC , but often they are built into a device
using smaller electronic curcirity.
Peer to peer:

(Internet ngang hang=))


difference between wire and wireless network:
- While wired networks rely on physical connections, wireless networks allow
devices to connect and communicate without the need for cables
Wireless Access Point
A Wireless Access Point (WAP) allows devices to connect to a network using
Wifi.

13/01 Data Transmission Echo

Unit 4 - Building networks: Network Building Structure and security


keyword:
- Binary, transmission
- ASCII
- Power surge
Network devices transmit binary data, which consist of 1s and 0s. Eight bits of
1 or 0 make up a byte
We use an ASCII
It is a 7-bit character set consisting of 128 different letters, numbers or
punctuation symbols. In ASCII, every character has a corresponding number, or
ASCII code.
Dta transmission:
- Data transmission is the movement of data (bits) between at least two
digital devices.
In parallel transmission is a method of conveying multiple binary digits
smultanoesly using multiple conductors.

16/01 Data transmission echo : Error in data transmission


Some common problem wuld be data transmission error:
- Physical connectivity issues
- Interferences in the wireless network
- Network congestion
- Packet loss
- Network device failures
- Bit flip
- Power surge

Serial communication:

Parallel communication:
Errors over transmission
Flip and power surge are common reasons for data errors over a
transmission.. For example, bit flip can occur due to cosmic rays or other
environmental factors. A power surge can occur due to lightning strikes or other
electrical disturbances.
Cosmic rays are high-energy particles that originate from space.
Temperature changes can cause electrical components to malfunction.

hOW CAN ERROR BE DETECTED?


When a computer receives data, it immediately returns it to the sending
computer for comparison.
The sender then compares the two sets to check whether they match.If they
match, there is no error. However, if they don’t match, then the data sent again.

Flowchart- echo function


Flowchart symbol

20/1 Building network

Keyword:
Unauthorised
Program
Operating system
Brute-force attack
Cyber-attack

Copper wire : Copper wire, also known as ethernet cable.

23/1 Security concerns


Criminals are constantly trying to gain unauthorized access to devices and data

13/2 cyber attack

1. The WannaCry Ransomware Attack (2017)

( ransomware)
2. The NotPetya Virus (2017)
(virus)
3. DarkHotel (2014)
(spyware)
20/2
maliciously intended to cause damage to a computer system, or to steal private
information from a computer system
database, an organized collection of structured information, or data, typically stored
electronically in a computer system.
Quarantine is a term used to describe the process of isolating potentially malicious
files to prevent them from harming a system or network.
Adware the term used for various pop-up advertisements that show up on your
computer or mobile device.
Trojans a type of malware that downloads onto a computer disguised as a legitimate
program.
27/2 Iterative- development processes & Making choices
Iterative development- a software development approach that breaks the process of
developing a large application into smaller parts
algorithm- a set of commands that must be followed for a computer to perform calculations or
other problem-solving operations
flowchart- a diagram that depicts a process, system or computer algorithm

iteration- a computational process in which a series of operations is repeated several times

selection (if, else)


condition
conditional operator (AND, OR, NOT)
pseudocode
Yesterday I uploaded my second file, in that time, my home internet is very
bad, I have done submit my work, but the google classroom website keeps
loading make me can’t patient anymore, so I have done submit it and close the
website ( but it stills lagging).

Iterative development/process

✅ algorithm

✅ flowchart

✅ iteration

✅ selection (if-else)

✅ condition

✅ conditional operator (AND, OR, NOT)


✅ pseudocode

What is an Iteration 13/03


UNIT 6
lists that need to be remembered:
- evolving: to develop gradually, or to make someone or something change and develop
gradually
- iterative process: an approach to continuously improving a concept, design, or
product
- program: a specific set of ordered operations for a computer to perform

- initial: if your full name is Michael Dennis Stocks, your initials will be M. D. S

- requirements: something that's mandatory or necessary

- client: any computer hardware or software device that requests access to a service
provided by a server
- decomposition: to break down the problem

- ..
In the Develop stage, we will code.
When will we check the error in our program?
In summary, developers ought to check for errors at various stages of the program lifecycle
- during compilation, runtime, and while interacting with external dependencies or user
input. Proper error handling is crucial for ensuring the programme's reliability and stability.
Form model: used to simplify the process of passing values between the workflow variables
and the form.

You might also like