CONDITION
CONDITION PSEUDOCODE
CONDITION IN PYTHON
draw.io
Python 3
Flow chart
5/9
- Data set
- Linear search
- Data item
ALGORITHMS are used to plan a wide range of programs. One type of it
is searching algorithms.
Searching algorithms are used with large data sets to find a particular
data set.
The data set doesn’t need to be used for the search algorithms to be
carried out.
One more type of searching algorithm is linear search. Linear search aims
to look at each item in turn, from left to right, to find the item being
looked for.
- Iterate: to do (something) over again or repeatedly.
- Iterations: the process of doing something repeatedly, usually to
improve it, or one of the times you do it.
- Reiterate: to repeat something, once or several times.
12/09
BOOLEAN OPERATORS
What is a micro:bit?
- The micro:bit is a microprocessor with multiple inputs, suitable for block-
based and text-based programming.
Boolean Operators:
-In programming , a single condition contains one input that returns a value of
TRUE/FALSE.
-You can extend the use of one input as part of a condition of two inputs by
using BOOLEAN OPERATORS.
- The micro:bit uses MicroPython as the Python programming language.
- MicroPython is a smaller version of Python and it is specific to the
micro:bit
- MicroPyhton cannot be used outside of its use of the micro:bit
NOTE:
- Boolean operators are AND,OR ,NOT
19/09
More than one output can be sent to another micro:bit by building up the
sequence of outputs , e.g. adding two and having different strings inside the
bracket.
Micro:bit and sound
- Let’s demonstrate how sound can be used on the micro:bit and how it
can tell the person receiving the message that the first letter is complete
before the next one is displayed.
my name code: is 01101000.01110101.01101111.01101110.01100111
23/9 GO FURTHER - Unit: Pseudocode and algorithms
Creating a program is an iterative process
Iteration means REPETITION
Plan (create an algorithms) > Implement > test > evaluate > improve
Sometimes our code may not work
In those case, we should look for errors in our code. We call this DEBUGGING
If you send a program with a bug to the micro:bit, it will display a sad
face and the line that contains the error
NOTE: The software highlights an error with a red line.
Checklist helps to find errors:
- Spelling
- Brackets in the correct place
- Open and close brackets
- ….
It’s important to test, evaluate and debug, as we work on our program.
In those cases, we should look for errors in our code.
We call this DEBUGGING.
26/9
10/10
System software
Application software
Definition: It runs as per user request.
Soft ware:
- Application
- System soft:
-
24/10/2024
Denary is also known as base 10 due to it contains 10 digits and all the number
being based in power as 10
7/11/2024
Deep learning vs machine learning
Machine learning: Machine learning (ML) is a subset of artificial intelligence (AI)
that focuses on building systems that learn—or improve performance—based on
the data they consume. Artificial intelligence is a broad term that refers to
systems or machines that mimic human intelligence.
Deep learning: Deep learning is a type of machine learning that uses artificial
neural networks to learn from data. The human brain inspires artificial neural
networks, which can be used to solve various problems, including image
recognition, natural language processing, and speech recognition.
Augmented reality: a simulation that superimposes digital images on the user’s
real-world environment and allows the user to interact with those images.
14/11 Managing Data
21/11 Data validations and input masks
- Data-captured form: A predefined document (electronic or paper-based)
that contains headings and instructions to collect appropriate data for a
specific purpose.
- Input mask: A special input or layout that controls how data is entered
into a database or data-capture form, e.g., a drop-down box.
- Validation / Data validation: An automatic check to reduce the chance of
errors being made when data is entered into a computer system.
- Field length: The number of characters a field in a database application
allows to be stored.
- Validation rule: A rule that specifies the characteristics of a valid data
item in a database
field.
2/1 ICT- Network
Following terms to your document
network
network topology
high bandwidth
router
network switch
server
A computer network is a system that connects two or more computing devices
for sending and receiving data and sharing information.
Here are the types of computer networks:
PAN (Personal Area Network)
LAN (Local Area Network)
MAN (Metropolitan Area Network)
WAN (Wide Area Network)
Advantages of PAN
Convenient communication among personal devices
Flexible, wireless connection
Cost-effective using low-cost technologies
Disadvantages of PAN
Limited range of communication
Only a limited number of devices can be linked
Slower data transfer speeds compared to wired connections.
LANs
Local Area Networks are a type of network where devices communicate over a
small geographical area. You could think of this as a single building or a school
site, for example. Devices within this network range can access services
offered by the server on the same network, which is ideal for sharing files,
printing, or sharing a single internet connection connection.
Advantages of LAN
- Fast and reliable communication among devices.
- A cost-effective way to share resources such as printers and files.
- Easy to set up and manage.
Disadvantages of LAN
- Limited geographical coverage.
- High set-up cost for wired LANs.
- Limited mobility for wired devices.
WANs
Wide Area Networks are a type of network where devices communicate over
larger geographical areas. An example of this would be a company with a few
offices on opposite sides of town, or even offices in different countries.
These networks usually connect via the internet,.
9/1 Network
Switch- Used to connect a device to form a network
Router- Used to connect multiple networks
WLAN- Wireless Area Network
Network Interface Controller
A network Interface Controller (NIC) must be present in a device to enable it to
communicate with other devices over a network. Sometimes these are physical
cards that can be plugged into a PC , but often they are built into a device
using smaller electronic curcirity.
Peer to peer:
(Internet ngang hang=))
difference between wire and wireless network:
- While wired networks rely on physical connections, wireless networks allow
devices to connect and communicate without the need for cables
Wireless Access Point
A Wireless Access Point (WAP) allows devices to connect to a network using
Wifi.
13/01 Data Transmission Echo
Unit 4 - Building networks: Network Building Structure and security
keyword:
- Binary, transmission
- ASCII
- Power surge
Network devices transmit binary data, which consist of 1s and 0s. Eight bits of
1 or 0 make up a byte
We use an ASCII
It is a 7-bit character set consisting of 128 different letters, numbers or
punctuation symbols. In ASCII, every character has a corresponding number, or
ASCII code.
Dta transmission:
- Data transmission is the movement of data (bits) between at least two
digital devices.
In parallel transmission is a method of conveying multiple binary digits
smultanoesly using multiple conductors.
16/01 Data transmission echo : Error in data transmission
Some common problem wuld be data transmission error:
- Physical connectivity issues
- Interferences in the wireless network
- Network congestion
- Packet loss
- Network device failures
- Bit flip
- Power surge
Serial communication:
Parallel communication:
Errors over transmission
Flip and power surge are common reasons for data errors over a
transmission.. For example, bit flip can occur due to cosmic rays or other
environmental factors. A power surge can occur due to lightning strikes or other
electrical disturbances.
Cosmic rays are high-energy particles that originate from space.
Temperature changes can cause electrical components to malfunction.
hOW CAN ERROR BE DETECTED?
When a computer receives data, it immediately returns it to the sending
computer for comparison.
The sender then compares the two sets to check whether they match.If they
match, there is no error. However, if they don’t match, then the data sent again.
Flowchart- echo function
Flowchart symbol
20/1 Building network
Keyword:
Unauthorised
Program
Operating system
Brute-force attack
Cyber-attack
Copper wire : Copper wire, also known as ethernet cable.
23/1 Security concerns
Criminals are constantly trying to gain unauthorized access to devices and data
13/2 cyber attack
1. The WannaCry Ransomware Attack (2017)
( ransomware)
2. The NotPetya Virus (2017)
(virus)
3. DarkHotel (2014)
(spyware)
20/2
maliciously intended to cause damage to a computer system, or to steal private
information from a computer system
database, an organized collection of structured information, or data, typically stored
electronically in a computer system.
Quarantine is a term used to describe the process of isolating potentially malicious
files to prevent them from harming a system or network.
Adware the term used for various pop-up advertisements that show up on your
computer or mobile device.
Trojans a type of malware that downloads onto a computer disguised as a legitimate
program.
27/2 Iterative- development processes & Making choices
Iterative development- a software development approach that breaks the process of
developing a large application into smaller parts
algorithm- a set of commands that must be followed for a computer to perform calculations or
other problem-solving operations
flowchart- a diagram that depicts a process, system or computer algorithm
iteration- a computational process in which a series of operations is repeated several times
selection (if, else)
condition
conditional operator (AND, OR, NOT)
pseudocode
Yesterday I uploaded my second file, in that time, my home internet is very
bad, I have done submit my work, but the google classroom website keeps
loading make me can’t patient anymore, so I have done submit it and close the
website ( but it stills lagging).
Iterative development/process
✅ algorithm
✅ flowchart
✅ iteration
✅ selection (if-else)
✅ condition
✅ conditional operator (AND, OR, NOT)
✅ pseudocode
What is an Iteration 13/03
UNIT 6
lists that need to be remembered:
- evolving: to develop gradually, or to make someone or something change and develop
gradually
- iterative process: an approach to continuously improving a concept, design, or
product
- program: a specific set of ordered operations for a computer to perform
- initial: if your full name is Michael Dennis Stocks, your initials will be M. D. S
- requirements: something that's mandatory or necessary
- client: any computer hardware or software device that requests access to a service
provided by a server
- decomposition: to break down the problem
- ..
In the Develop stage, we will code.
When will we check the error in our program?
In summary, developers ought to check for errors at various stages of the program lifecycle
- during compilation, runtime, and while interacting with external dependencies or user
input. Proper error handling is crucial for ensuring the programme's reliability and stability.
Form model: used to simplify the process of passing values between the workflow variables
and the form.