An algorithm is a well-defined, precise, finite set of steps for solving a problem.
© 2020 Vedesh Kungebeharry. All rights reserved.
An algorithm is a well-defined, precise, finite set of steps for solving a problem.
© 2020 Vedesh Kungebeharry. All rights reserved.
A search engine is website application that allows users to search for information on the world wide web.
Search engines are mainly accessed by their website address. When a user visits a search engine’s website address, they can input their search criteria (also known as a search query) so that the search engine may produce a list of website pages which contain information related to the search criteria.
e.g, a user may visit http://www.google.com and proceed to input the search criteria funny videos :

Now they can click on the search button –

And now you can view and visit web pages from various websites which contain related results:

© 2019 Vedesh Kungebeharry. All rights reserved.
A modem converts a computer’s digital signal to an analogue signal for transmission over a network; and converts analogue signals from a network back to digital signals.
Converting digital to analogue is called modulation.
Converting analogue to digital is called demodulation.
The word modem is short for modulator demodulator.
© 2019 Vedesh Kungebeharry. All rights reserved.
Text can be formatted to improve the appearance and readability of a document. See the example below:
James told Sally, “The quick brown fox jumped over the lazy dog.”
It is imperative that we let James know that his sentence contains all the 26 letters in the alphabet.
James told Sally, “The quick brown fox jumped over the lazy dog.”
It is imperative that we let James know that his sentence contains all the 26 letters in the alphabet.
Other times text is formatted to meet standards and conventions. e.g the equations shown below

| Task | Description | How to accomplish | Example |
| Bold | Increase the weight or thickness of text, i.e. embolden text | 1. Select the text
2. Press Ctrl+B or Click the Icon shown below in the red circle on the home ribbon:
|
This text is not bold.
This text is bold. |
| Italicize | Gives text a slanted appearence | 1. Select the text
2. Press Ctrl+I or Click the Icon shown below in the red circle on the home ribbon:
|
This text is straight.
This text is slanted. |
| Underline | Underlines text. | 1. Select the text
2. Press Ctrl+U or Click the Icon shown below in the red circle on the home ribbon:
|
This text is underlined |
| Changing
Font |
Changes the style of the written text | 1. Select the text
2.Use the dropdown shown below to select a different style:
|
Some text Some Text |
| Font Size | Changes the size of the written text. | 1. Select the text
2.Select a size from the box shown below:
|
SmallLarge |
| Font Colour | Changes the colour of the written text | 1. Select the text
2.Select a new colour from the box shown below on the home ribbon:
|
RED
Blue GREEN |
| Text Highlight | Changes the background colour of text | 1. Select the text
2. Select a new colour from the box shown below on the home ribbon:
|
![]() |
| Subscript and Superscript | Lowers and Raises text respectively | 1. Select the text
2. press Ctrl + = for subscript, Ctrl + Shift + for super OR Select the desired script modifier shown below on the home ribbon:
|
Subscript
Normal Superscript |
© 2018 Vedesh Kungebeharry. All rights reserved.
Computer systems require routine maintenance for their data and software to ensure efficiency and prevent breakdowns.
The maintenance tasks are outlined in the following sections.
New secondary storages need to be formatted before use.
Disk formatting refers to preparing a secondary storage medium for use by the computer system.
This includes structuring the initial data on the disk so that new data can be stored and managed effectively.
A computer virus is malicious software that is harmful to computer programs and data.
They are usually created to damage or disrupt the functioning of computer systems for malicious purposes.
Protective antivirus software prevents infections from computer viruses and can remove existing viruses in computer systems.
Antivirus software removes existing viruses via scanning or searching through computer software and data for virus infections.
Both system software (including the operating system) and application software may require updates from the manufacturers for improvement to features and to fix existing issues. This process is sometimes automatic or may require intervention from the computer user.
Examples include Windows updates, MS Office updates.
A backup is a duplicate or copy of data. Computer systems are backed up to recover from accidental or malicious data loss or corruption.
Reasons for data loss include
Usually the backup is stored off-site in another physical location to the computer system.
Backups can be scheduled automatically or performed manually by the user.
Files stored on a computer may not be stored in continuous blocks of data. A computer is most efficient when reading data that is stored in large continuous blocks.
Over time, files stored in computer system can become increasingly fragmented, beaning that they are stored in discontinuous blocks over the file system.
Defragmenting is the process by which files are re-joined into continuous blocks.
Defragmentation tasks are usually scheduled and managed by the operating system, but can be manually performed by the user.
Disk cleanup refers to the process of removing redundant and useless files from computer storage to increase the free space capacity for new files.
Files are cleaned from the recycle bin and other temporary storage locations.
Windows operating system provides a utility that performs this task that is usually managed by the computer user.
2024/1/9 – Added table of contents
© 2018 Vedesh Kungebeharry. All rights reserved
Definition: A file contains data of a specific type, which is denoted by a file extension.
E.g a picture file “image.jpg”


Definition: A folder can store many files and even other folders.
Definition: Sub-folders are folders within another folder.
Class demo: Use Mycomputer /windows explore/File Explorer to gain access to files and folders during this demo
Note that on windows computers, if you hold the shift key when deleting a file, it is permanently deleted, it is not sent to the recycle bin.
© 2018 Vedesh Kungebeharry. All rights reserved

We say text is justified when the line(s) of text touch the vertical margins and all words within the first and last for each line are evenly spaced.
An example is shown below:

© 2018 Vedesh Kungebeharry. All rights reserved
Definition: Telecommunication means communication at a distance (tele means “at a distance”). Modern telecommunication is usually timely and employs electronic devices.
Definition: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication[1]. It can be thought of as the electronic version of traditional mail.
Teacher demonstrates the sending of email:
An email attachment is a digital file that is added to an email message for delivery to the recipient.e.g. a picture, audio file , program file etc
Each user has a unique email address specified by their username at the mail server in the following format:
username@server.topLevelDomain
e.g. JimBob@yahoo.com
Internet email messages consist of two major sections:
The message header must include at least the following fields:
The email address of the originator of the message. This field is sometimes formatted to include a first name and last name, or other alternative formats
The geographical local time and date when the message was sent. This field is almost exclusively generated by the email service provider (e.g Gmail, Hotmail etc)
The email address(es) OF the messages’ main recipient(s).
Carbon Copy. Recipients in this field receive a copy of the email between the sender in From: and the main recipients in To:. The recipients can see all recipients in the and To: and Cc: fields.
This term originated from the use of traditional carbon paper to produce copies of hand written pages.
Short for Blind Carbon Copy. Recipients in this field receive a copy of the email between the sender in From: and the main recipients in To: as well as Cc:. The main difference here is that recipients in the To: and Cc: fields WILL NOT see any recipients specified in Bcc:
A brief summary of the topic of the message. Certain abbreviations are commonly used in the subject, including “RE:” (concerning) and “FW:” (forwarded message).
A forwarded message is a copy of an email sent to a recipient at a later time than the original email.
Updates:
2023 Jan 7th
-Added section for email address format.
[1] https://whatis.techtarget.com/definition/e-mail-electronic-mail-or-email
© 2018 Vedesh Kungebeharry. All rights reserved
Comparison of computer systems

© 2018 Vedesh Kungebeharry. All rights reserved
Definition: A problem is a required change from the current state of things to a desired future state.
Definition: Computational thinking is use of ideas in a structured manner to solve a problem, such that it can be eventually used to instruct a computer.
Building applications or programs is essential to aiding computer users to perform tasks.
We use computational thinking to analyze problems in order to build applications that solve those problems.
There are four principles that are used to solve problems computationally.
They are:
© 2018 Vedesh Kungebeharry. All rights reserved