Category Archives: Teachers’ Resources

Free pdf download for Grade 3 Assignments and Home Work

Are you in need of the latest grade 3 assignments and home work papers in pdf free downloads? Well. These and many more resources for primary and high schools are available here. Download all these resources at no cost.

You can equally search for notes, exam papers, marking schemes, schemes of work, lesson plans, past papers, revision materials and many more in this site. All these resources are available at no cost. Try today.

GRADE 3 FREE HOLIDAY LATEST ASSIGNMENTS

READING ALOUD ASSIGNMENTS

MATHEMATICS ASSIGNMENTS 

MATHS ASSIGNMENTS

READ ALOUD ASSIGNMENTS

KISWAHILI ASSIGNMENTS 1

KISWAHILI ASSIGNMENTS 2

ENVIRONMENTAL ACTIVITIES ASSIGNMENTS 1

ENVIRONMENTAL ACTIVITIES ASSIGNMENTS 2

ENGLISH ACTIVITIES ASSIGNMENTS 1

ENGLISH ACTIVITIES ASSIGNMENTS 2

DOWNLOAD FREE HIGH SCHOOL MATERIALS


FREE UPDATED NOTES

FORM ONE NOTES

FORM TWO NOTES

FORM THREE NOTES

FORM FOUR NOTES

FREE LATEST EXAMS WITH MARKING SCHEMES

FORM ONE EXAMS

FORM TWO EXAMS

FORM THREE EXAMS

FORM FOUR EXAMS

FORM 1-4 FREE EXAMS

SCHEMES OF WORK

KCSE REVISION MATERIALS

FREE PRIMARY SCHOOL RESOURCES

FREE CLASS 8 RESOURCES

LOWER PRIMARY (PP1 & 2)

LOWER PRIMARY (GRADE 1-6, PP1-2)

POPULAR

FORM 3 BIOLOGY PP2 END TERM 2 EXAMS PLUS MARKING SCHEMES

FORM 3  BIOLOGY PAPER 2 

END OF TERM 2

Answer all the questions in SECTION A in the spaces provided.

  • In section B answer question 6 (Compulsory) in the spaces provided and either question 7 or 8 in the space provided after question 8.

 

SECTION A (40MKS)

  1. The two cells shown below are obtained from two different potato cylinders which were immersed in two different solutions P and Q.

 

  • (i) Name the structures labelled A and C     (2mks)

 

A         –

 

B         –

 

 

(ii)       State the function of structure B. (1mk)

 

 

 

 

  • Suggest the identity of the solution Q (1mk)

 

 

 

  • Account for the change in Cell 1 above (2mks)

 

 

 

 

  • State two importance of the physiological process being demonstrated above in living organisms. (2mks)

 

  1. Study the following food web and answer the questions that follow.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  • (i) Name the organisms that occupy the second trophic level (2mks)

 

 

 

(ii)       What is the other name for the second trophic level (1mk)

 

 

 

  • Write down two food chains from the web that
  • End with hawks as tertiary consumer (1mk)

 

 

 

  • End with hawks as Quaternary consumer. (1mk)

 

 

 

 

  • Giving reasons state;
  • The organism with largest biomass (1mk)

 

 

 

 

  • The organism with least biomass (1mk)

 

 

 

 

 

  • Name the source of energy in the above ecosystem. (1mk)

 

 

 

  1. The diagram below represents a longitudinal section through the ileum wall.

 

 

 

 

 

 

 

 

 

 

 

 

  • Identify the structure labeled A and B (2mks)

 

A         –

 

B         –

 

  • State one function of A and B (2mks)

 

A         –

 

B         –

 

  • State two functions of the ileum. (2mks)

 

 

 

 

  • Explain the role of the liver in digestion. (2mks)

 

 

 

 

  1. The equation below represents a metabolic process that occurs in a certain organ in the mammalian body.

 

Ammonia                  enzymes                                    Organic compound Q + water

Carbon (IV) Oxide

 

 

  • Name the process represented in the equation. (1mk)

 

 

 

  • Name the organ in which the process occurs. (1mk)

 

 

 

  • Why is the process important to the mammal? (1mk)

 

 

 

 

  • Identify the organic compound Q. (1mk)

 

 

 

 

  • What happens to organic compound Q ? (1mk)

 

 

 

 

  • A person was found to pass large volume of dilute urine frequently. Name the;      (3mks)

 

  • Disease the person was suffering from.

 

 

 

  • Hormone that was deficient.

 

 

 

  • The gland that secretes the above hormone.

 

 

 

 

  1. Some glucose was boiled and cooled in a boiling tube. Some yeast was added and a layer of oil put on top. The set up below was used.

 

 

 

 

 

 

 

 

 

 

 

 

 

  • Why was the glucose solution boiled before the experiment. (1mk)

 

 

 

 

 

 

  • What is the use of the oil film in the experiment ? (1mk)

 

 

 

 

  • Name the process being investigated by the above experiment. (1mk)

 

 

 

 

  • State what happens to the lime water as the experiment proceeds to the end. (1mk)

 

 

 

 

  • Explain what would happen if the temperature of glucose and yeast was raised beyond 450 (2mks)

 

 

 

 

 

  • State two industrial applications of the process being investigated above in the experiment. (2mks)

 

 

 

 

 

 

 

SECTION B (40MKS)

Question 6 (Compulsory) and either question 7 or 8.

 

  1. In an ecological study, a locust population and that of crows was estimated in a grassland area over a period of one year. The results were tabulated as shown below:-

 

Months J F M A M J J A S O N D
Number of locusts 90 20 11 25 200 450 652 15 10 35 192 456
Number of crows(birds) 4 2 0 1 8 16 22 2 1 1 5 15
Amount of rainfall 20 0 55 350 520 400 350 10 25 190 256 350

 

  • Draw a graph of population of locusts and crows (birds) against time. (8mks)

 

 

  • (i) State the relationship between rainfall and locust population. (1mk)

 

 

 

 

(ii) Account for the relationship you have stated in (b) (i) above (1mk)

 

 

 

 

  • What happens on the populations of locusts and crows in the months of January to

March ? Give a reason. 2mks)

 

 

 

 

 

  • State one method used to estimate the population of locust. (1mk)

 

 

 

 

  • (i) State the trophic level of the;             (2mks)

 

Locusts           –

 

 

 

Crows              –

 

 

 

(ii)       Construct a simple complete food chain involving these organisms (2mks).

 

 

 

 

 

 

 

 

 

  • If the locusts were removed from the food chain, what would be its effect ? (1mk)

 

 

 

 

 

  • Define the following terms (2mks)

 

(i)Biomass

 

 

 

(ii)Ecosystem

 

 

 

 

 

 

  1. Describe how hydrophytes and xerophytes are adapted to deal with environmental problems in the regions where they grow. (20mks)

 

 

  1. Describe how the mammalian skin regulates body temperature.(20mks)



 

FORM 3  BIOLOGY PP 2  MARKING SCHEME

END OF TERM 2

 

1(a)(i) A         –           Nucleus

C         –           Cell wall

 

(ii)       –    Maintain the shape of the cell;

  • Providing support to herbaceous plants; (any 1)
  • Stores sugar and salts;

 

(b)       Hypotonic solution / dilute solution / dilute sugar / salt solution.

 

(c)       The potato cell sap was lowly concentrated than the surrounding solution; hence lost

water molecules by osmosis (through semi-permeable membrane) to become plasmolysed.

 

(d)       –           Opening and closing of stomata.

–           Absorption of water by root hairs.

–           Absorption of water in intestines.

–           Reabsorption of water in kidney nephron.   (any 2)

–           Feeding in insectivorous plants.

–           Movement of water from cell to cell.

–           Osmoregulation.

 

2(a)     Cartepillars

  • Aphids

Mice                      each (1/2 mk)

Slugs

 

  • Primary consumers

 

(b)(i)   Plants              Cartepillars                 Insectivorous                          hawks ;

Birds

 

(ii)   Plants              Slugs                           Frogs               Snakes             Hawks           (any 1)

 

 

Plants              Aphids                        Beetles                        Insectivorous              Hawks

Plants

 

(c)(i)   Largest Biomass  –    plants

Directly obtain energy from the sun.

 

(ii)       Least biomass  –   Hawks

  • Loss of energy in form of heat, respiration, defaceation, excretion.

 

  • Sun / solar energy.

 

 

 

 

3(a)     A  –   Villus

B  –   Lacteal

 

(b)       A  –  Increases surface area for maximum digestion and absorption.

B  –  Absorption of fatty acids and glycerol.

 

(c)       –           Final digestion of food.

–           Absorption of soluble products of digestion.

 

(d)       Produces bile juice which contain bile salts that emulsify fats; and neutralizes the acidic chyme from the stomach;

 

4(a)     Deamination

 

(b)       Liver

 

(c)       –           Removal of excess amino acids.

–           Availing of energy in the body.                       (any 1)

–           Formation of glycogen / fats for storage.

(award any one)

(d)       Urea

 

(e)       It is transported to the kidney where it is excreted.

 

(f)        (i)        Diabetes inspidus

 

(ii)       Antidiuretic Hormone / Vasopressin

 

(iii)      Pituitary gland.

 

5(a)     To remove / expel dissolved air from the glucose solution.

 

(b)       To prevent entry of oxygen into the yeast – glucose solution.

 

(c)       Anaerobic respiration.

 

(d)       Becomes white precipitate.

 

(e)       High temperature kills the yeast cells; hence the reaction stops;

 

(f)        –           Making of beer / Brewing / Ethanol / Alcohol.

–           Baking industry / Raising of the dough.                        (any 2)

 

 

6(a)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  • Axes labelling (2mks)

Scale (x and y – axis)  (2mks)

Curve plotting  – each (1mk)  total 2mks

Curve labeling  –  each (1mk)  total 2mks

 

(b)(i)The population of locusts increase with increase in the amount of rainfall.

 

(ii)Increased amount of food;

Improved breeding conditions;

 

  • The population of both decreases;

Less food availability to locusts and crows.

 

  • Capture – Recapture method.

 

  • (i) Locust – Primary consumers

 

Crows – Secondary consumers

 

(ii)       Grass              Locusts               Crows

 

  • Grass would increase

crows would reduce

 

  • (i) Biomass – The total dry weight of organisms at a particular trophic level.

 

  • Ecosystem – A natural unit composed of abiotic and biotic factors whose

interactions lead to a self-sustaining system.

 

  1. Xerophytes
  • Have thick cuticle to prevent cuticular transpiration.
  • Have reduced stomata on lower leaf surface to lower transpiration.
  • Fold or curl leaves in dry weather to protect stomata from direct sunlight.
  • Have reversed stomatal opening rhythm where they open at night to reduce water loss.
  • Have succulent stems and leaves to store water for use in dry season.
  • Some have superficial roots to absorb light showers of rain.
  • Some are deep rooted to absorb water from water table.
  • Shedding of leaves during dry season.
  • Some have short life cycles and survive as underground perennating structures or seeds during drought.
  • Hairy leaves.
  • Sunken stomata 1 x 10 = 10mks.

 

Hydrophytes

  • Submerged plants have dissected leaves to increase surface area for maximum light absorption.
  • Emerged plants have broad leaves with stomata on upper surface to increase transpiration.
  • Have aerenchyma tissue to increase buoyancy and for gaseous exchange.
  • Floating water plants have raised flower for pollination.
  • Poorly developed roots that lack root hairs to reduce absorption of water.
  • Some submerged plants have sensitive chloroplasts that photosynthesise in low light intensities. 5 x 2 = 10mks

 

 

  1. High body temperature above normal:
  • Sweat glands; Produce sweat; water in the sweat evaporates / sweat evaporates; absorbing latent heat of vaporization producing a cooling effect;
  • Hairs lie flat; due to relaxation of erector pilli muscles; no / little air is trapped; hence increased heat loss from the body;
  • Blood vessels / arterioles; vasodilate / dilate; more blood flow to the skin hence loss of heat from the body, by radiation and convection;

When body temperature is low below normal:

  • Sweat glands produce less / no sweat; no latent heat is absorbed; more heat retained in the body;
  • The hairs stand upright / erect; to trap air between them; that insulate the body against heat loss; more heat retained in the body.
  • Blood vessels / arterioles vasoconstrict / constrict;

Less blood flow to the skin; reduces heat loss / more heat is retained in the body;

 

(20mks)

 

(;) means a marking point.

 

Form One Comprehensive Mid & End term Exams for all subjects

Computer Studies KCSE Mock Exams and Answers {Latest Best Collections}

 

MOCKS 1 2023

 

COMPUTER STUDIES

PAPER 1 MARKING SCHEME

FORM FOUR

Answer ALL questions in the spaces provided

  1. Differentiate between embedded computer and dedicated computer             (2mks)
  • Embedded computers are special purpose computer used inside another device and usually dedicated to specific functions.
  • Dedicated computer is a general purpose computer designed to perform a specific task.
  1. The current monitor technology use LED back lit technology. Give two advantages of using TFT monitors over CRT monitors                         (2mks)
  • Images formed in TFT do not suffer from angle distortion
  • TFT have low power consumption than CRT
  • TFT have a higher resolution than CRT
  1. A Form four student wants to send a large document to a printer.
  2. State the name for the area of memory that the document is sent to immediately from RAM             (2mks)
  • Input buffer
  • As the printer runs out of paper during printing, the operating system sends a signal back to the computer to stop temporarily. Name this function of the operating system Interrupt handling                                                                                           (1mk)
  1. a) Differentiate between a flash memory and compact disk as used in computer storage devices                                                                                                             (2 mks)
Flash memory Compact disk
ü  Solid state device ü  Optical media
ü  Plugs directly to the USB port ü  Requires a disk drive
ü  Fast access of data ü  Slow access of data
ü  Uses circuitry access ü  Has moveable read and write head

 

  1. b) People like using a DVD over a compact disk yet they are of the same physical size, state three reasons that justifies this                                                             (3mks)
  • A DVD has a higher storage capacity
  • A DVD offers a better sound and picture quality than a CD
  1. For a monitor to display images, it must be connected through video port to a video adapter or controller mounted on the mother board. What is the role of a video adapter                                                                                                             (2mks)
  • It determines the resolution and clarity of the monitor
  1. Name four categories of input devices             (2mks)
  • Keying in devices
  • Pointing devices
  • Scanning devices
  • Automated method
  1. Name any two physical measures taken to protect a computer lab from unauthorized access.(2mks)
  • Burglar proofing the room
  • Use of alarms
  • Use of padlocks
  • Use of special cards
  • Employing security guards

 

  1. Most word processors have some automated features such as word wrap and type over modes. Describe these features             (2mks)
  • A wordwrap is a feature that enables the cursor to move automatically to the start of a new line/page
  • Type over mode (overwrite mode) enables the user to edit an individual character of a word in a text document
  1. Differentiate between proofreading and formatting a document as used in word processing                                                                                                                (2mks)
  • Proofreading is the process of checking whether the document has typographical or grammatical errors
  • Formatting a document refers to enhancing the appearance of a document to be attractive and appealing to the eye of the reader
  1. Most computerized systems in different organizations face a lot of unauthorized access such as Eavesdropping, Surveillance and Industrial espionage. State a control measure against each vice                                                                                                 (3mks)
  • Eavesdropping: refers to tapping or listening into a communication channel to get information
  • Surveillance: Refers to monitoring use of computer system and networks using background programs such as spyware and cookies
  • Industrial espionage: it involves spying on competitor to get information that can be used to cripple the competitor
  1. A world wide web is a vast virtual space in the internet where information is made available such as web portals and blogs. Different between a web portal and a blog                                                                                                                         (2mks)
  • Web portal: it is a specialized websites that offer restricted services such as e-learning, searching, e-mail, and sports to registered user updates, financial news and links to selected websites.
  • Blog: It is a website that contains personal information which can easily be updated

 

 

  1. Differentiate between filtering and hiding of rows/columns as used spreadsheets(2mrks)
  • Filtering is the process of finding and working with a subset of related worksheet. This will display only the rows that meet the condition or criteria specified.
  • Hiding columns: its the process of making a column not be shown on the display or printed when you print the worksheet. The columnis not deleted.
  1. Industrial plants use computer systems in different ways such as Computer Aided design, manufacturing, Simulation and process control. Explain how computers are used in the mentioned areas above                                     (4mks)
  • Computer Aided design: it is an integrated system that allows products that have been designed using design application software
  • Simulation: it allows some activities that would otherwise be expensive and dangerous in real life to be put under test
  • Process control: it refers to the use of a computer system to control an ongoing physical process.
  1. a) Differentiate between Job displacement and Job replacement                        (2mks)
  • Job replacement implies that the employees who are computer illiteratelose their jobs and replaced by computer literate people
  • Job displacement is where the computer illiterate workers are moved from a department with computers to another place which does not require computer literacy.
  1. b) State three advantages of using automated production in manufacturing plants(3mks)
  • Increased efficiency due to the balancing of workload and production capacity
  • Improved customer service
  • Efficient utilization of resources such as raw materials
  1. Due to high demand and dynamic nature of computers and information systems, there is need for qualified computer trainers are required. What are the roles of computer trainers(3mks)
  • Training people on how to use a computer and various application programs
  • Developing training reference materials
  • Guide learners on how to acquire knowledge through carrying out research
  • Advising the learners on the best career opportunities in the field of ICT
  • Preparing learners for ICT examinations

 

SECTION B.

Condition?
yes
No
statement
WHILE..DO Loop
Condition?
statements
Yes
No
REPEAT… UNTIL Loop
  • . a) By use of a Flowchartconstruct, differentiate between a while loop and Repeat… Until loop             (4mks)

 

 

 

 

 

  • In the WHILE Loop, the condition is tested before the execution of statements while REPEAT loop statements are executed before the condition is tested
  • In WHILE loop, statements are executed until the condition becomes FALSE the you exit while in REPEAT loop, you exit when the statement is true
  • In WHILE loop,statementsmay exit without any statement being executed while in REPEAT loop atleast one execution of statements must be done

 

b)Angela deposits 3500 shillings in a microfinance company at an interest rate of 20% per annum.At the end of each year, the interest earned is added to the deposit and the new amount becomes

the deposit of that year.       

  1. Write an algorithm for a program that would track the growth of the deposits over a period of six years.                (5mks)

Start

Input initial deposit

            Input interest rate

                                                Set deposit to initial deposit

Set year to 0

                                                While year £ 6 Do

                                                Interest = Deposit x Interest rate

                                                Total = Deposit + interest

                                                Deposit = Total

                                                Year = Year + 1

                                    END WHILE

                                                Print, deposit, year

                        STOP

 

 

 

 

 

(b)       Draw a flowchart for above algorithms.                                                                    (7mks)

Start
 
Input Deposit
Input interest rate
Principal = initial deposit year = 0
Print deposit
Total = deposit + interest
Deposit = total

Year = year + 1

Interest = deposit X interest rate
Print year
Stop
Is year £

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. . a) Differentiate between a primary key and a foreign key as used in Database (2mks)
  • Primary key is a special index that enforces uniqueness in a table
  • Foreign key is a field in a table that matches the primary field in another table
  1. b) State four factors to be considered when designing a good database (4mks)
  • Carefully study the requirements of the user in order to define all the data inputs, outputs and relationships required
  • Design a draft database on the paper to determine the number of files or tables required
  • Divided the information into separate fields, records and tables to allow flexibility in manipulating the database
  • Define a field for each table that will be used to identify each record uniquely
  • Give the most important fields the first priority
  • Design data entry forms needed for the database
  1. c) Explain the use of each of the following field datatypes as used in database (3mks)
  2. OLE object
  • It is used for storing graphical objects such as pictures
  1. Look up wizard
  • It is a field displays the data as a drop down list so that the user can select the desired value from the list
  • Memo
  • It is a field in database that contain alphanumeric data and can accommodate a maximum of 32000 characters
  1. d) kamau has been experiencing a lot of problems in his computer. As a result, he decided to format his computer and re-installed a new operating system.
  2. What is Formatting in relation to the above context       (2mks)
  • It is the process of preparing a new storage media by imprinting empty sectors and tracts on the surface of the disk so that the operating system can recognize and make it accessible
  1. What precaution must kamau observe before formatting his computer (1mk)
  • Make a backup of all the documents to avoid losing them
  1. e) You are required to purchase an operating system. State three factors that you should consider before acquiring the software                                     (3mks)
  • Hardware configuration
  • The type of computer in terms of of size and make
  • The application software intended for the computer
  • User-friendliness
  • Documentation available
  • Cost of the operating system
  • Reliability and security provided by the operating system

 

18.Virtual realityis a condition in which a person becomes psychologically immersed in an artificial setting generated by a computer system

  1. b) Application areas of virtual reality

-represents any three dimensional real objects such as buildings, landscape

-represent any three dimensional abstract objects

-entertainment

-training of medics, military among others

-assistance to the physically challenged people in the society

  1. c) Head gearit is equipment made up of two tiny displays and sound systems. These help to direct images and sound from the source to the eyes or ears, enabling the wearer to look through the virtual setting

Body suitethis is made up of conductor wires wound in a rubber suit. The wires sense the body movement and convey the data into the system which in turn changes the position of the user in the virtual world.

  1. d) Artificial Intelligenceis a branch of computer science that is concerned with developing artifacts with the ability to perform the same kind of functions that characterize human thought and actions (award 1mk for correct definition)
  2. e) Components of an experts system
  • User interface-display screen that enable the user to interact with the system
  • knowledge base- expert system’s data base of knowledge about a particular subject
  • inference engine- software that controls search for knowledge in the knowledgebase and produce conlusions.
  1. a) Binary systems has been used to develop most electronic devices. Give three advantages of using binary                                                                   (3mks)
  • It is difficult to develop devices that can understand or process natural languages directly it is easier to develop electrical circuits based on binary ON/OFF
  • All forms of data can be represented in binary system format
  • Binary devices are more reliable
  • They became smaller in size
  • They use less energy

 

  1. b) Convert the following number systems (4mks)
  2. 62510 to binary

 

Using long division get the binary of 3710 =1001012

get the binary of the decimal by multiplying repeatedly by two i.e 0.62510=0.1012

Add the binary of the whole number and the decimal

1001012+0.1012=100101.1012

  1. EF16to Octal
HEXADECIMAL B C D E F
BINARY 1011 1100 1101 1110 1111
Group In terms of three 101,111,001,101.111,011,110

 

 

To octal 5715.7368

  1. c) Using twos complement, perform the following arithmetic opration leaving your answer in decimal notation (4mks)

3910 – 1910

using long division get the binary of:

3910 = 1001112

1910= 100112

write  the binary of 1910 in 8-bits 1910= 000100112

ones complement of the binary of 1910=11101100

twos complement ones complement   =11101101

add the binary of 3910 to the twos complement of 1910

 

11101101

+0100111

(1)00010100   ignore the overflow

 

(1×24)+(1×22)=2010

  1. d) one of the student in the Diocese was developing a file. List any four attributes that the student must consider in the development process             (2mks)

e). downloading – is a process of transferring infor mation from a remote computer to a local storage.

Hyperlink– is a link infor m of text on a web page that causes onother web pages to open when the link is clicked.

  • Key field
  • The data type
  • The lenghth of each field
  • Back up and recovery strategies
  1. a)(3mks)
  • To enable the analyst to test the system in phases
  • The operations and results of both systems are compare and evaluated
  • Errors can be identified and corrected before the old system is abandoned
  1. b) State three reasons why an organization may change an information system(3mks)
  • New opportunities
  • Incase of problems in the current system
  • New directives

 

 

 

 

  1. c) Different students were asked to state the characteristics of a system. The responses were as follows:
  2. i) They are holistic
  3. ii) They are open or closed systems
  • They have a boundary and environment.

Explain each of the above responses                                                                                   (3mks)

  • Holistic system: the different components of a system are grouped together to make a whole
  • Open or Closed: open system receives input from and gives out to the environment and can adopt to changes in the environment.
  • Boundary and Environment: it is a space within which the component operates.
  1. e) Explain the following data collection stages as used in data processing             (3mks)
  2. i) Data preparation
  • It is the process of converting data from source documents to machine readable format
  1. ii) Media conversion
  • This is where the data is converted from one medium to another

 iii) Input validation

  • It is the process taken during data entry to prevent wrong data from being processed by subjecting to validity checks
  1. f) State three ways a data entry clerk may use to reduce the threat to data integrity(3mks)
  • Back up data
  • Control access to data by enforcing security measures
  • Design user interfaces that minimizes chances of invalid data entry
  • Using error detection and correction software when transmitting data
  • Using devices that directly capture data from the source

NAME: ……………………………………. INDEX NUMBER: ………….………………….. SCHOOL……………………………. SIGNATURE: …………………DATE:……………….

451/1

COMPUTER STUDIES

PAPER 1

TIME: 2½ HOURS

MOCKS 1 2023

KENYA CERTIFICATE OF SECONDARY EDUCATION

COMPUTER STUDIES

PAPER I

INSTRUCTIONS TO CANDIDATES

  • Write your name and index number in the spaces provided.
  • This paper consist of two sections A and B.
  • Answer all questions in section A.
  • Answer question 16 (Compulsory) and any other THREE questions in section
  • All answers should to be written in the spaces provided in the question paper

For Official use only.

 

Section

 

Question

 

Max. Score

 

 

Candidates Score

A 1 – 15 40  
 

B

16 15  
17 15  
18 15  
19 15  
Total Score 20 15  

This paper consists of 14 Printed pages.

Candidates should check the question paper to ensure that all the

Papers are printed as indicated and no questions are missing

 

SECTION A (40 MARKS)

Answer all the questions in this section

  • Differentiate between embedded computer and dedicated computer (2 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  • The current monitor technology uses LED backlight technology. Give two advantages of using TFT monitors over CRT monitors             (2 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  • A form four student wants to send a large document to a printer.
  1. State the name for the area of memory that the document is sent to immediately from RAM                                     (1 mark)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. As the printer runs out of paper during printing, the operating system sends a signal back to the computer to stop temporarily. Name this function of the operating system                                         (1 mark)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

 

 

  • a) Differentiate between a flash memory and a compact disk as used in computer storage devices             (2 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. b) People like using DVDs over compact disks yet they are of the same physical size. State three reasons that justifies this (3 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  • For a monitor to display images, it must be connected through video port to a video adapter or controller mounted on the motherboard. What is the role of a video adapter?

(2 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  • Name four categories of input devices (2 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

 

  • State any two physical measures taken to protect a computer laboratory from unauthorized access (2 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  • Most wordprocessors have some automated features such as word wrap and type over mo Describe these features (2 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  • Differentiate between proofreading and formatting a document as used in wordprocessing (2 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  • Most computerized systems in different organizations face a lot of unauthorized access such as Eavesdropping, surveillance and industrial espionage. State a control measure against each vice (3 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

 

 

  • A world wide web is a vast virtual space in the internet where information is made available such as webportal and blogs. Differentiate between a web portal and a blog.

(2 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  • Differentiate between filtering and hiding of rows /columns as used in spreadsheets

(2 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  • Industrial plants use computer system in different ways such as computer aided design, manufacturing simulation and process control, explain how computers are used in the mentioned areas above (4 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  • a) Differentiate between job displacement and job replacement (2 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. State three advantages of using automated production in manufacturing plants

(3 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  • Due to high demand and dynamic nature of computers and information systems, there is need for qualified computer trainers. What are the roles of computer trainers? (3 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

 

 

 

SECTION B (60 MARKS)

Answer question 16 (COMPULSORY) and any other THREE questions from this section

  • a) By use of a Flowchart, differentiate between a while loop and Repeat……..Until loop

(4 marks)

 

 

 

 

 

 

 

  1. Angela deposits 3500 shillings in a microfinance company at an interest rate of 20% per annum.At the end of each year, the interest earned is added to the deposit and the new amount becomesthe deposit of that year.
  2. Write an algorithm for a program that would track the growth of the deposits over a period of six years. (5mks)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

(b)       Draw a flowchart for above algorithms.                                                        (6mks)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  • a) Differentiate between a primarykey and a foreign key as used in database (2 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. b) State four factors to be considered when designing a good database (4 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. c) Explain the use of each of the following field datatypes as used in database (3 marks)
  2. i) OLE object

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. ii) Lookup wizard

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

iii)Memo

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

 

 

  1. d) Kamau has been experiencing a lot of problems in his computer. As a result, he decided to format his computerand re-installed a new operating system.
  2. What is formatting in relation to the above context (2 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. What precaution must Kamau observe before formatting his computer (1 mark)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. e) You are required to purchase an operating system. State three factors that you should consider before acquiring the software (3 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

 

 

 

 

 

 

  • (a) What is Virtual reality? (1 mark)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

(b)       Explain three application areas of virtual reality                              (3 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

 

c). Explain the following interactive sensory equipment used in virtual reality.                                                                                                                                        (2 marks)

  • Head gear.

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  • Body suit.

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

(d)       What is Artificial Intelligence?                                                         (1 mark)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

e).  State and explain three components of an experts system.                    (6 mark)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

(d)       Most computerized security systems make use of Biometric analysis, name two physical features of human beings that can be considered in this analysis.(2mks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  • a) Binary system has been used to develop most electronic devices. Give three advantages of using binary (3 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. b) Convert the following number systems (4 marks)
  2. 37.62510 to binary

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. BCD.EF16 TO octal

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. Using Two’s compliment, perform the following arithmetic operation leaving your answer in decimal.

3910-1910                                                                                                                                                                     (4 marks)

 

 

  1. One of the students in the Diocese was developing a file, list any four attributes that the student must consider in the development process (2 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. Define the following terms in relation to internet (2 marks)
    i). Downloading

……………………………………………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………

ii).             Hyperlink

……………………………………………………………………………………………………………………………………………………………………………………

  • a) A system analyst in Mukumu preferred using phased changeover to implement a new system. State three reasons for this preference (3marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. b) State three reasons why an organization may change an information system (3marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. c) Different students were asked to state the characteristics of a system. The responses were:
  2. they are holistic
  3. they are open or closed systems
  • they have a boundary and environment

Explain each of the following responses                                           (3 marks)

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………’……………………………………………………………………………………………………

  1. Explain the following data collection stages as used in data processing (3 marks)
  2. data preparation

………………………………………………………………………………………’……………………………………………………………………………………………………

  1. media conversion

………………………………………………………………………………………’……………………………………………………………………………………………………

  • Input validation

………………………………………………………………………………………’……………………………………………………………………………………………………

  1. State three ways a data entry clerk may use to reduce threats to data integrity

(3 marks)

………………………………………………………………………………………’……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………

 

THIS IS THE LAST PAGE PRINTED

NAME: ……………………………………. INDEX NUMBER: ………….………………….. SCHOOL……………………………. SIGNATURE: …………………DATE:……………….

451/2

COMPUTER STUDIES

PAPER 2

FORM 4                                                                                                         

TIME: 2½ HOURS

 

MOCKS 1 2023

KENYA CERTIFICATE OF SECONDARY EDUCATION

COMPUTER STUDIES

PAPER 2

INSTRUCTIONS TO CANDIDATES

 

  1. Type your name and index number at the top right hand corner of each printout.
  2. Write your name and index number on the CD provided
  3. Write the name and version of the software used for each question on the answer sheet.
  4. Passwords should not be used while saving in the CD
  5. Answer all questions.
  6. All questions carry equal Marks.
  7. All answers must be saved in the CD
  8. Make a printout of the answers on the answer sheets provided.
  9. Hand in all the printouts and the CD

 

 

 

This paper consists of 4 printed pages.Candidates should check the question paper to ensure that all pages are printed as indicated and no questions are missing.

 

 

 

 

 

 

 

 

 

Question One

The following data is an extract of data obtained from Movers Transport company records. Study the data and answer the questions that follow.

AREA PRODUCER

ID

NAME QUANTITY DELIVERED (KG) TOTAL COST TRANSPORT COST GROSS COST DEDUCTION NET PROFIT
101B 115 Selina Mwao 4562          
79A 145 Yvonne Kibet 1254          
79A 012 Dorothy Namulungu 235          
79A 561 Tiffany Wangui 8954          
101B 016 Asha Waningu 9658          
20Z 123 Ruth Mellanie 7895          
20Z 458 Afif Mumtaz 456          
101B 654 Pelah Wonder 421          
20Z 758 Christabel Simbauni 7895          

 

  1. a) Enter the data shown above into a spreadsheet giving it an appropriate title, center and bold across the worksheet. Save the workbook as WORK01. Rename the worksheet as Jan records                                                                                                 (10 Marks)
  2. b) Copy the data to a new worksheet and add the details of producer Valence Masitsa of area 101B, ID 452 with quantity of produce of 2,700kg in an appropriate row.             (1 Mark)
  3. c) Insert double borders around every cell and every row.                         (2 Marks)
  4. d) Use a function to calculate the Total cost for the producer with ID number 115 given that the price per KG of the produce is Sh.41 .00                         (2 Marks)
  5. e) Use the formula for Total cost obtained for producer Selina Mwao and use it to calculate the gross cost for all the farmers                         (2 Marks)
  6. f) Use if function to calculate transport cost for all the producers given that transport is charged per Kg is as follows             (5 Marks)
AREA Price per kg
101B 5.00
20Z 3.50
 79A 4.00

 

  1. g) Insert the value 20% in cell E14. Using absolute cell referencing calculatedeductions, given that the deduction is 20% of the Total cost.                         (4 Marks)
  2. h) Using a function calculate the Net cost, given that Net cost is Gross cost minus deductions and gross cost is Total cost plus Transport cost                         (4 Marks)
  3. i) Format the columns containing currency values to currency with 2 decimal places and prefix Ksh. Rename the worksheet PRODUCE PAY.                         (3 Marks)
  4. j) Arrange the records in ascending order of the producer ID. (2 Marks)
  5. k) Copy the contents of worksheet Jan records to a new worksheet and rename it as Filtered. By applying suitable filter condition, display records for all producers except those from area 79A.                                                                         (4 Marks)

1)         Use subtotals function to calculate subtotals for the quantity delivered, gross pay and net pay from each area.                                                                                                       (3 Marks)

  1. m) Create an embedded pie chart showing the total quantity of produce delivered for each area .The chart should have the following details.
  2. Chart title: Area Total produce delivered
  3. Legend Position: Right

Save it as CHART 1                                                                                          (5 Marks)

  1. n) Print Jan records, Produce Pay and Filtered in landscape orientation.             (3 Marks)

 

Question 2

You are part of a wedding committee of your friend and you have a vast knowledge of using a computer; you are tasked to be in charge of the wedding cards. Using a desktop publishing software, design the wedding card as it appears. Name the file as W-Card.                     (24marks)

 

  • Prepare the page layout specifications as follows:
  • Paper size: A4 portrait             (2mks)
  • Grid guides             (3mks)
  • Column guides: 1
  • Row guides: 2
  • Spacing: 3”
  • Margins guides             (2mks)
  • Left and right: 24”
  • Top and bottom: 25”

 

 

  • Format the Outer heart shape in the middle part of the design to the following specifications:             (4marks)
    1. Color: Red
    2. Outline: Light blue
  • Height:2.64”
  1. Width: 2.84”
  • Perform the following formatting on the rectangle of the first part of the design.
    1. Apply an outlineshadow.                                                                                                                 (1mark)
    2. Background Texture fill – Newsprint.            (2Marks)
  • Add a glow (Accent 1, 18pt glow), glow size 25pts, and 57% transparency.   (4marks)
  • Change the paragraph text starting from “Request the blessings…” to color coldwith line spacing of 75sp.                                                                                           (2marks)
  • Format the names of the bride and bridegroom to have a strikethroughand a dotted underline.             (2marks)
  • Group all objects in the design. (2marks)
  • Insert a page header “LOVE IS A GOOD THING”.                         (1mark)
  • Print the publication.                                                                                                                                     (1mark)

 

a Title , centre, bold, save rename @2 each  max 10 marks
b Copy  new worksheet

 

add details

c Double boarders for each cell and row formatted max 2marks

 

d Function (observe equal sign and product of cell with 41 by kgs )

=PRODUCT(d2:d11)       =187042

Assuming 41 is entered in cell d11

2marks
e Correct formula  copied to all cells =(D2*D11)+G2 2 marks
f Correct Function =if(A2=101B,D2*5, IF(A2=20Z, D2*3.5, IF(A2=79A, D2*4)))

ASSUNG A STUDENT TYPED 101 B IN A2 THEY CAN USE THE CELL ADRESS AS WELL AS 5 IN CELL LETS SAY E12

5marks
g Use of dollar sign in absolute e.g. =($E$14*$E$2$) @2 each max 4
h Function =SUM(E2:F2:-H2)

Copy to other cells

3 marks

1 mark

i Currency 2 decimal places

Ksh

Rename to PRODUCE PAY

1 mark

1 mark

1 mark

j Arrange from smallest number to the largest (012-758) 2 marks
k Copying to another worksheet

Rename as filtered filter conditions

Display excluding area 79A

1 mark

2  marks

2  marks

l Check sort criteria  by area code( since it’s the only column that will be used to isolate data)

Check formula for subtotals

3  marks
m.i Chart –with title: area total produce delivered 2 marks
 ii Legend position: right 1  mark
   iii Saved chart as CHART 1 2 marks
n Print records-jan

Produce pay

Filtered landscape orientation

 

1  mark

1  mark

1  mark

     

 

 

PAPER 2 MARKING SCHEME

 

QUESTION 1

 

 

 

 

 

Designing and typing

 

Save as W-Card 2marks
Design the heart 4 marks
Fully typed text and bolded on the names 9 marks
Word art 4 marks
  Text  added and formatted in rectangles 3 marks
  Boarders 2 marks
a.      i) Paper size A4 2marks
   ii Gridlines –column guide: 1

-row guides :2

-spacing 0.3

@1  total 3marks
    iii Margin guides –left and right 0.24

–        Top and bottom 0.25

@ total 2 marks
b Format color red

Outline light blue

Height 2.64

Width 2.84

@ 1 total 4
c Applying shadow

 

Background texture fill-newsprint

 

Add glow(accent 1, 18pt glow), glow size 25pts and 57% transparency

1

 

2

 

4

d Color gold of specified paragraph

Line spacing 0.75sp

1

1

e Format by strike through

dotted underline

1

1

f Grouping  all objects 2
g Header 1
h printing 1

QUESTION 2

FREE GRADE 9 SOCIAL STUDIES NOTES

JUNIOR SCHOOL

 

STUDIES

 

CRE NOTES

FIRST EDITION |                       PUBLISHED NOVEMBER 2024

STRAND 1: CREATION

SUBSTRAND:WORK

Definition of Terms

Work

  • Use of energy, physical or mental, for the purpose of improving human life.
  • It is any activity that requires expenditure of energy or application of skills e.g. studying, teaching, cooking, farming etc.

Vocation

  • Work can be described as a vocation, profession, trade, craft, career or a job.
  • Vocation is from a Latin word “Vocare” which means call.
  • Christians believe that every individual has been called of God to various duties.
  • Vocation is work that requires special skills, special training or a unique call or a special mission in society.

Profession

  • Work that is characterized by a code of ethics, lengthy specialized training, advance knowledge and self – disciple.
  • Professionals have their own set standards.
  • The professionals determine entry requirements for new members and usually have machinery for dealing with errant members. E.g. Law, medicine, architecture etc

A Trade

  • Refers to an occupation, a way of making a living.
  • Some trades require specialized training examples hairdressing

A Craft

  • An occupation which requires manipulative skills or use of the hands e.g. woodcarving, pottery, weaving.
  • A craft may be a trade depending on the nature of occupation.

A Career

  • An occupation that one chooses to pursue in his/her life.
  • It’s the general way of earning a living.

Job

  • Refers to tasks performed, services rendered in return for payment of wages.
  • Most jobs are temporary others casual and others permanent and pensionable.

 

 

What Determines One’s Career, Vocation?

  • Available opportunities for future development in a particular job
  • The need to serve others especially the church and the needy
  • Interests, strengths, talents, abilities
  • Inclination or attraction to a certain kind of work
  • Pressure from parents, peers etc

General Reasons why People Work

  • It’s an essential element of life
  • God ordained work. Humans work for their food
  • Work contributes to the development of the community
  • Work is personal. It defines a person
  • People work to earn a living
  • People work for enjoyment, leisure
  • To assist and give to the needy
  • To get luxuries
  • People work to raise their standards of living
  • For self satisfaction and fulfillment
  • For personal development
  • To keep a person occupied and not idle
  • To acquire wealth and status in the society
  • To socialize with other members of the society
  • To attain independence and not depend on someone else

Traditional African Attitude to Work

  1. Importance of Work
  • Work is essential to the well being of the individual and survival of the community
  • Work ensured basic needs such as food, shelters etc were provided.
  • In traditional African society work was divided according to the age, gender, and status e.g. chief, elder of the individual.
  • Everyone was a worker. Boys assisted in herding, fishing, girls assisted in cooking fetching firewood. Women cooked, took care of babies constructed houses (maasai) etc.
  • Works among the traditional African societies included pastoralist, farmers, livestock keeping, fishing, bee keeping etc
  • Work was a communal affair; people would work together and assist each other
  • Work was not for a wage (Money). The rewards of work-included food, communal unity, acquisition of moral values etc
  • Hard work was emphasized, laziness was condemned
  • There were some specific works for specialization e.g. herbal medicine men, divination, prophecy, rain making, pottery etc.
  • Work involved giving prayers, offerings, and sacrifices to God
  • Through work, the basic needs of the individual, community were fulfilled
  • Through work potentials; talents and skills were explored, acquired and utilized.
  • Work had a religious dimension as well as a social dimension. It brought people together improving their relations

Christian Teaching on Work

  • The Christian teaching on work is based mainly on the interpretation of the bible, the teachings of Jesus and the teachings of the apostles.
  • Some of the teachings are: –
    • God himself instituted work. He created the heavens and the earth and all in it. Since God worked man should work. (Gen. 2:1)
    • God’s work of creation is good (Gen. 1:31) Christians should endeavor to produce good works
    • Work is a duty, an obligation, a command Christians are responsible for God’s creation (Gen.2: 15). They are to protect it – animals, birds, plants, marine life are all under the
      care of man.
    • Human beings should work to acquire their basic needs (Genesis. 1:29 – 30, 3:19) God blesses the work of our hands
    • Human beings are co – creators with God (Gen.1: 28) God continue to create through human beings. Human beings glorify God through their work.
    • God reveals himself through his work of creation. God had a purpose for his creation. He is orderly, source of life, Almighty etc.
    • Work is a co – operative undertaking. Eve was created to be Adam’s helper (Gen. 2:20) Christians should co – operate in their undertakings
    • Hard work is praised and laziness is looked down upon. (Proverbs 31:27). Christians should work for their daily needs and not become a burden to others.
    • Work should be accompanied with rest (Gen.2: 2) God rested on the 7th day from all his work. God commanded the Israelites to rest on the 7th day.
    • People should enjoy what they have worked for (Ecc.3: 22)
    • Work should be done for the glory of God and for the good of the society.
    • People should work honestly not steal but work to earn an honest living (Eph.4: 28)
    • Those who do not work should not eat. They should always work since God is always at a work (John 15:17)

Roles of Professional Ethos, Ethics and Codes in the Society

Definitions

  • Professional ethics –: principles of behavior / conduct that guide members of a particular profession.
  • What workers are allowed to do and not to do.

Professional Ethos

  • The group identity of members of a profession, their unique custom or character e.g. what identifies doctors, lawyers etc.
  • Profession codes or code of ethics Collection of laws arranged systematically according to major concerns and core functions of the profession.

Roles

  • To regulate the behavior of professional (workers)
  • Enables professionals to understand their role
  • Ensures professionals provide quality of services to their clients
  • To encourage respect among professionals
  • Give guidance on how professionals should relate to one another
  • They safe guard professionals against being compromised / misused
  • They determine expected level of performance
  • They serve as a measure of competence
  • Act as a measure of quality service
  • They protect the professionals
  • They provide a reference point for disciplining (used to discipline the errant professional)
  • They inspire respect and high esteem for professionals
  • Through professional codes, ethics, ethos, professional earn public trust

Virtues Related to Work

Definition

  • A virtue is a good human habit. It’s a moral principle, moral quality or goodness of character and behavior.
  • Examples of virtues related to work
    1. Diligence – hardworking
    2. Honesty, integrity – ability to be relied upon (Integrity) Honest is being truthful.
    3. Faithfulness – being trustworthy and loyal
    4. Responsibility – ability to make decisions and take action independently. Being mindful of other people’s welfare
    5. Tolerance – ability to bear with others or with difficult situations

Moral Duties and Responsibilities of Employers and Employees

  • Employers include government, non – governmental organization, private sector, individuals, company, self-employment.
  • Employers have several duties and responsibilities towards their employees.
  • They are:
    • To organize and conduct business efficiently for the benefit of the institution, employer, community
    • To respect the employee, treat them with dignity
    • Pay a fair wage to the employee
    • Ensure good healthy and safe working conditions
    • Provide social welfare for the employees e.g. time off, leave days, time for recreation
    • Grant leave as required by law or the terms of contract
    • Take care of the welfare of the employees give medical cover, pension scheme etc
    • To motivate their employees
    • To reward employees
    • Compensate employees made redundant

Rights of the Employer

  • Employers have a right to / are entitled to
    • Get profits from their businesses
    • Carry out their businesses without unfair taxation
    • Form association with other employers
    • Obtain and conduct business
    • Hire, dismiss employees in accordance with the requirements of their firms and contract
    • Demand a fair day’s work
    • Conduct business without subjection to unfair conditions and competitions

Moral Duties of the Employees

  • Carry out their duties to the best of their ability without supervision
  • Respect and protect the property of the employer
  • Encourage peaceful solutions to any problems encountered in their work place
  • To work diligently for self – fulfillment and development
  • To respect their employer and fellow employees
  • Observe terms of contract with employer
  • Be loyal, honest, respect to the employer

Rights of the Employees

  • To receive fair wages
  • To have a reasonable work load
  • Have reasonable hours of work
  • Have safety and protection at work
  • Right to join a labor union
  • Right to further individual training and development education
  • Rights to retirement, terminal benefits
  • Rights to a fair opportunity for provision
  • A right to time for rest
  • Right to Favorable working conditions

Christians Approaches to Issues Related to Employment

Wages and Industrial Action (Strikes)

  • A wage is payments for work done.
  • Payment is in modern times done according to hours, weeks or days that one works.

Christian Teachings on Wages

  • Human beings have the right to work for a decent living (Matt.20:1 – 16) they should be paid for their work.
  • Workers should be paid wages to the amount and value of their work (1 Timothy 5:18)
  • Wages should be paid as agreed upon (Mathew 20:13)
  • Employers should not take advantage of the poverty of the employee (Deuteronomy 24: 14 – 15)
  • Human beings should not be enslaved to work (Ex.5:22 – 23)
  • Employers who degrade their workers in wages are condemned (Deut.24:14 – 15, Jer.22:13)
  • Oppression is condemned (Amos 5:18, 8; 4)
  • Workers wages should never be withheld (James 5:4)

Industrial Action

  • Also commonly called ‘Strike’ this is an effort by workers to stop work in protest by boycott go-slow sit – ins or refuse to work.
  • There has been increase of industrial action in the recent past in most countries of the world.

Reasons for Industrial Actions

  • Due to increased awareness of workers’ rights
  • Exposure to global trends through the media
  • Formation of trade unions that fight for the rights of workers
  • Due to poor working conditions
  • Underpaying workers
  • Threatening workers with unjustified dismissals
  • Suspending the workers / interdiction – unjustly
  • A hostile working environment

Results of workers strikes (industrial / action)

  • Pay cuts
  • Demotions
  • Loss of jobs
  • Employers suffer losses
  • Inflation
  • Injuries even death when confronted by police
  • Victimization of some individuals
  • Bitterness among the workers and employers

Christian approaches towards strikes

  • Christians recommend a peaceful co – existence between workers and employers
  • There should be fairness, justice, love among workers, employees
  • There should be an open communication channel across the ranks from top to bottom
  • Employees should not destroy property
  • Working conditions should be better and improved
  • Employees to be human when dealing with employees

Child Labour

  • A child is a person below 18 years. A child does not have an identity card, does not vote (in Kenya).
  • According to International Labor Organization the minimum employment age is 14 years.
  • Child labor is engaging a person below the age of 14 years in wage / paid employment.

Reasons why children are Employed

  • To provide cheap labor
  • They cannot fight for proper terms
  • They are easily hired and fired

Disadvantages of Child Labor

  • Children are not yet mentally and physically prepared to do adult jobs.
  • This leads to
    • Exploitation of children
    • Children paid less, taken advantage of
    • It inhibits the growth of a child and denies them a chance to enjoy their childhood
    • It deprives them of their right to basic education
    • It exposes children to hazards (dangers) from machines, chemicals
    • Heavy workload deprives children of social educational, moral, psychological, physical rights

Places where Children are Employed

  • Plantations – coffee, tea
  • Domestic services – homes
  • Tourism sector
  • Industries
  • Children are trafficked and employed as commercial sex workers

Causes of Child Labor – Reasons why Children Work

  • Lack of money / poverty
  • Death of parents
  • Dropping out of school due to pregnancy, indiscipline, (truancy), poor academic performance or lack of school fees.
  • Those who never went or taken to school
  • Lack of good role models e.g. coast province Mombasa; Malindi has several of the financially stable people being school dropouts, engaged in drug trafficking, commercial sex etc.
  • Influence of cultural values e.g. circumcision of boys in some communities is done later in life and one is declared an adult e.g. the kikuyu circumcising at 13 years, or 12 years
  • Children being lured by employers
  • Greed for material benefits
  • Being homeless ending up as a street child

Position of Church in Dealing with Child Labor

  • The church condemns it
  • It has put up homes for poor children (orphanages)
  • It provides guidance, counseling to both parents and children
  • Children are blessing from God hence should be loved and cared for
  • Parents have the responsibilities to protect their children from harm.

Unemployment and Self-Employment

Unemployment

  • When people are capable and willing to work but are unable to find a viable income or occupation it is referred to as unemployment.

Causes of unemployment

  • Preference for prestigious white collar jobs (Office jobs, non – manual jobs)
  • Corruption, tribalism, nepotism, bribery denying jobs to the qualified in preference for the unqualified.
  • Unequal distribution of wealth – some regions are more resourceful than others. Industries, good infrastructure concentrated in some areas.
  • Inadequate resources for self – employment (lack of capital, skills)
  • Limited job opportunities – probably due to high population growth
  • Few international investors in Kenya, probably due to high crime rate, insecurity

Response of Christians to issues of unemployment

  • They encourage self – employment in cases of unemployment
  • They have set up vocational training, polytechnics to train people towards jobs that are for self – employment

Christians condemn idleness

Self-employment

  • Self-employment is an economic activity initiated, controlled by an individual.
  • It is an occupation in which a person initiates a personal enterprise and manages it with the help of others.

Examples

  • Small businesses enterprises, Jua kali sector, music industry, entertainment (e.g. comedians), community work, agriculture etc

Problems / Challenges

  • Some lack sufficient capital to start a business and keep it running
  • Lack of necessary skills to run the business
  • High taxation leading to some business closing down
  • Small scale traders face undue competition from larger firms

 

 

 

 

 

 

 

 

 

STRAND 2: THE BIBLE

SUBSTRAND: CHRISTIAN MORAL VALUES

  1. a. Human Sexuality and responsibility
  • This is a sacred gift from God.
  • It was given to Adam and Eve.
  • Human sexuality is that which makes us male or female.
  • It is our biological or physiological differences associated with the state of being male or female.
  • It is part of our biological make up.
  • Males and female have different body structures, features, appearances and biological characteristics.
  • In terms of physical strength more men are stronger than females.
  • Besides the biological make up, we have an emotional side, which includes our attitudes, and feelings.
  • Females are said to be more emotional and talkative than males.
  • Human sexuality is also in our brain and mind and it is what makes us human beings.
  • If you look at animals they also have different physiological features based on sexual differences.
  1. Christian Teaching on Human Sexuality.
  • Males and females are God’s creation.
  • Men and women were created for many reasons.
  • These are
    1. to be fruitful and to multiply;
    2. for companionship.
  • In Genesis we learn that men and women share the image of God because God intended man and woman to play complementary roles and both are equal before God.
  • Sex in marriage is a sign of love and it is sacred.
  • In marriage man / and woman become one flesh.
  • Both of them have the ability to control their sexual desires.
  • Christian teaching forbids: sex before marriage, adultery or unfaithfulness, and other unnatural sexual behaviors like lesbianism, homosexuality or being gay, and incest.
  • God created human body and it is to be kept holy.
  • Chastity is encouraged while unfaithfulness in marriage is discouraged.
  • Husbands / wives are to respect one another and give to each other in mutual love.
  1. Traditional African understanding of Human Sexuality.
  • Human sexuality is highly valued in traditional African communities.
  • It is understood in terms of marriage and parenthood.
  • Procreation was the sole purpose of sex.
  • Sex was to be practiced in marriage and it was regarded as another sacred duty.
  • Adultery was discouraged and offenders punished.
  • Irresponsible sexual relationships were forbidden.
  • Virginity before marriage was highly valued.
  • If a girl lost her virginity before marriage, she was treated with scorn and punishment.
  • If a boy impregnating a girl, he was fined.
  • In traditional African society it was a taboo to discuss openly sex matters.
  • Grandparents taught sex education to their grandchildren.
  • Sex education was taught during initiation stages.
  • Free mixing of girls and boys was not allowed except under supervision.
  • Girls were married off immediately after initiation to avoid temptation of engaging in pre-marital sex.
  • To reinforce self – discipline in relationships between the opposite sexes the African traditional society instilled the fear of supernatural curses through myths, marital status.
  • Husbands and wives were expected to relate to each other, their parents, and in laws according to the community customs.
  • Conflicts between a husband and a wife were resolved through intervention of relatives.
  1. Gender Roles.
  • There are specific chores and duties for either male or female in African traditional societies.
  • Roles were therefore according to gender.
  • Boys went hunting, herding, while girls fetched firewood, and helped in cooking.
  • At an early age, girls and boys would mix freely as they played together.
  • Mature boys and girls however, were restricted from mixing freely without supervision by elders.
  • But there was gender identification.
  • The boys identified with their fathers and other male adults, while girls identified themselves with their mother and other female adults.

Education

  • Children belonged to the community and not just to their biological parents.
  • At the adolescent stage; 13 – 18 years education was given to the adolescents and intensified at initiation stage.
  • Boys and girls were taught traditional rules and secrets of the society during initiation.
  • Learning was informal.
  • Knowledge was communicated through songs, stories and riddles among other forms of presentations.
  • All adults acted as parents to the young ones.

Socialization:

  • Men were socialized to be superior, while women were socialized to accept their subordinate position and role.
  • Everyone knew and accepted what he/she was culturally supposed to do.
  • Division of labor was based on sex.
  • In the African communities, despite their differences, there were many common customary roles, rules, regulations, taboos and beliefs that governed the practices related to male – female relationships from early childhood to old age.
  • These traditional African practices relating to male – female relationships existed at various levels.
  • In all of them, man held superior positions when compared to those of women.

Age:

  • Old women and men were accorded respect.
  • They were consulted for advice and counsel.
  • Kinship system was emphasized.
  1. Christian Teaching on Male- female Relationships
  • We learn that the husband is the head of the house and should love his wife like Christ loved the church.
  • Once a wife is loved, she should submit to her husband.
  • We also learn that both male and female are equal and co–creators with God.
  • Adam and Eve were created to complement each other.
  • Likewise men and women should love each other.
  • Jesus taught that each man should have one wife and vice versa.
  • Once married, the husbands’ body belongs to the wife and hers belong to him.
  • If that is the case, wife and husband should avoid immorality.
  • Males and females are to relate freely.
  • But the youth are to avoid the passions of youth.
  • These are sexual sins.
  • There are no specific chores or duties for either male or female.
  • Relationship between sexes should be governed by love, chastity, respect, self-control, and self-discipline.
  • Parents are to love their children, while children are to obey and honor their parents.
  • Parents are asked to bring up their children in a Godly way.

 

Christian Teaching about Human Sexuality

  1. Christian Teaching on Responsible Human Sexuality
  • Christianity teaches us about responsible sexual behavior.
  • Being responsible means that one is exercising self control or self-discipline in matters of sexual behavior.
  • Self-discipline is necessary when we have a relationship with the opposite sex (Read, 1 Cor.7: 9 1 Peter 5:8).
  • It is called responsible sexual behavior, which is obedience to God’s commands.
  • Christians promote healthy social relationship between boys and girls, men and women, and husbands and wives.
  • Responsible sex is between male and female.
  • Sexual intercourse is allowed only between married couples (1 Cor.7: 3 – 5).
  • Married couples are obliged to be sexually faithful to one another (Heb.13: 4) adultery is condemned (exodus 25:14).
  • Relationship between a husband / wife should be one of respect faithfulness, love, care, mercy, submission, tolerance, and forgiveness
  1. Christian Teaching on Irresponsible Sexual Behavior
  • There is much irresponsible sexual behaviour.
  • They include among others all acts and forms of: perversion, misuse, and abuse of sex, incest, rape, fornication, adultery, homosexuality, lesbianism or gay, prostitution, concubine, masturbation, bestiality and child marriages among others.
  • These irresponsible sexual behaviors are against God’s will for humanity.
  • Christians are to shun irresponsible sexual behavior.
  • This is because their bodies are the temples of the Holy Spirit, thus whatever Christians do with their bodies, it should be for the glory of God.
  • Let us now discuss in brief some of the irresponsible sexual behaviors

(I) Incest

  • Which is a sexual relationship between people who are closely related by blood.
  • For example, sex between a brother/sister, father / daughter.
  • Incest is condemned in the Bible.
  • It was punishable by death in the Old Testament. Read Leviticus 18:6 – 8.
  1. ii) Rape
  • Rape cannot be justified and it is condemned in The Bible.
  • Rape is an act of forcing another person to have sexual intercourse without his or her consent.
  • It is sexual violence and a crime against humanity.
  • It is also a denial, and a violation of human rights of the victims who are sexually assaulted.
  • Victims of rape include boys, men, girls, women, and babies especially girls.
  • Rape is an expression of hatred toward the opposite sex.
  • In traditional African society rape was abhorred and culprits were punished by death.
  • In Kenya rape is punishable by 20 years imprisonment.
  • Indecent assaults or sexual abuses such as touching a person of the opposite sex without their permission or use of vulgar language are both punishable by up to 5 years imprisonment.

 

iii. Fornication

  • This is consensual sexual intercourse between unmarried people.
  • It is condemned by both African and Christian teachings and punishment in African traditional society was by either payment of fines, stoning, and ritual cleansing.
  • In the Old Testament, men were forced to marry the girl.
  • Jesus said that fornication was due to people’s evil thoughts.
  • Abstinence for the youth is encouraged and preached.
  • Reasons why youth engage in premarital sex include:
    • sexual curiosity
    • proving manhood
    • human weakness,
    • lack of self control
    • testing fertility
    • fear of being jilted / rejected;
    • commercial sex for money
    • copying acts in the print and electronic media.
    • frustrations
    • drug abuse
    • bribe to get a job
    • permissiveness in the society.
  1. Adultery
  • Is committed by adults who have extra marital affairs; between “married partner and another party”.
  • Adultery is having sex outside marriage with a person with whom one is not married to.
  • Adultery is caused by lack of self – control, sexual dissatisfaction, and long periods of wife and husband separation, sexual dysfunction and vengeance by an initially faithful spouse who wants to be even with the unfaithful spouse.
  1. Prostitution
  • This is the practice of giving sexual pleasure for money or other material benefits.
  • A prostitute can either be male or female.
  • Prostitutes are referred to as commercial – sex workers.
  • There are factors leading to prostitution. These are
    • economic reasons such as unemployment,
    • poverty
    • rejection of a girl at home
    • drug abuse
    • stress
    • anger
    • anxiety
    • frustrations in the family
    • pornography.
  • The church condemns prostitution because it defiles the body, which is a temple of the Holy Spirit.
  • It’s sexual immorality. Read Gal 5: 19 – 21.
  1. Homosexuality/ Gay/ Lesbianism
  • This is sex between people of the same sex for example; man and man (homosexuality), woman and woman (lesbianism).
  • Homosexuality is a common practice in modern world.
  • It is also a church problem.
  • The Anglican Church in USA, and Canada have accepted homosexuality.
  • The Anglican Church has gay bishops.
  • African Anglican churches are opposing this practice.
  •  The Christian view is that homosexuality is a sign of a lack of Christian moral values.
  • It may also be due to confinement in a prison and permissiveness in society.
  • If it is allowed to continue, it shall disintegrate traditional African values.
  • Because of its threat to God’s people, the Church condemns homosexuality.
  • Other reasons for condemning it is because
    • God created a male and a female. Read, Genesis 1:28.
    • sex is sacred. Homosexuality is an unnatural relationship, which lowers human dignity.
    • It does not provide sexual fulfillment (as traditionally).
    • Homosexuality is illegal in Kenya.

Vii. sexually transmitted Diseases (STDs )

  • There are many diseases passed from one person to the other through sex.
  • These are gonorrhea, syphilis, herpes genitalis is, hepatitis B, Chlamydia, trichonomiasis, HIV/AIDS.

HIV / AIDS,

  • This is human immune deficiency virus (HIV) that causes acquired immune deficiency syndrome (AIDS) condition.
  • Syndrome refers to many symptoms.
  • HIV is transmitted largely through sex with an infected partner; through blood transfusion; sharing sharp objects with infected persons; and from an infected mother to the unborn child.
  • The HIV virus destroys the white blood cells, and weakens the body‘s immune system.
  • When the body is weak, it is not able to fight, and defend itself against infections.
  • Persons with the virus are vulnerable and susceptible to opportunistic infections.
  • The signs / symptoms of AIDS are manifestations of symptoms of the opportunistic infections.
  • Some symptoms include persistent coughs, loss of weight, oral thrush, loss of appetite, and diarrhea.
  • Churches encourage Christians to be compassionate to HIV/AIDS affected people, and to support the infected and the affected individuals like the orphans, widows, and widowers.
  • It also teaches against sexual immorality and against all forms of discrimination.

Gonorrhea

  • -is caused by a bacterium called “Neisseria gonorrhea”.
  • Its symptoms appear 4 days after infection.
  • Its symptoms are burning sensation when passing urine; pain or discomfort in the genitals; sticky discharge or pus in the vagina or through the urethra.
  • The good news is that Gonorrhea is curable if treated early.

Syphilis

  • Primary syphilis may show up in the form of a sore or a wound in the genitals a few days after infection.
  • The wound heals by itself without treatment after some time.
  • Syphilis infection may take several years about 7 years before its symptoms re appear.
  • The symptoms of syphilis are a painless sore or pimple on the man’s penis or woman’s vulva; and swelling of the glands in the groin.
  • Other symptoms, which may appear later, are skin rashes and sores either in the face armpits, under breasts, mouth or throat.

Herpes genital

  • -is a sexual disease caused by a virus.
  • It creates wounds in the genitals.
  • A pregnant woman can transmit the infection to her newborn baby during delivery.
  • This disease can be controlled although there is not an effective treatment.

Hepatitis B.

  • Hepatitis B virus causes Hepatitis B
  • It is transmitted through sex, injections by unsterilized needles and contact with contaminated blood.
  • The infection does not show on the genitals.
  • The signs and symptoms of Hepatitis B include yellowness of the eyes (jaundice) due to liver damage and pain around the upper abdomen.
  1. The Effects of Irresponsible Sexual Behavior
  • There are many effects of irresponsible sexual behavior.
  • They include among others HIV / AIDS, sexually transmitted infections (STI), abortion; family separations and divorces, deaths, unplanned pregnancies; children living in the streets; school drop outs and psychological problems.
  1. i. Effects of incest
  • incest undermines the healthy relationships between members of a family as it brings shame and guilt among the parties involved.
  • incest destroys relationships within the family and can lead to breaking up of a marriage.
  • incest destroys self-esteem, self – respect, and dignity of the victim. We find that abused boys and girls end up having problems when trying to establish healthy relationship
    with members of the opposite sex.
  • incest can lead to pregnancy, and abortion.
  • it can lead to infections with sexually transmitted diseases (S.T.I.’s) and HIV / AIDS.

ii .Effects of Rape.

  • This crime has very serious consequences and harmful effects on the victim.
  • Rape may result in pregnancy and can lead to physical, psychological, social, and spiritual side effects.
  • The victim may suffer
    • serious physical injuries and
    • may contract the STI’s, and HIV / AIDs.
    • The victim is traumatized, and ashamed of self.
    • The victim suffers from guilt, loneliness, humiliation, posttraumatic stress disorders, and depression among others psychological manifestations.
    • Young rape victims in particular may lose trust in the opposite sex.
    • All these sufferings can lead to suicide and death.

 

iii. Effects of Fornication

  • Some of these are having children out of wedlock; feelings of distrust, guilt, and hurt; contracting STI’s and HIV/AIDS; loss of self-respect; early and forced marriage and abortion.
  1. Effects of Adultery
  • Christians teach against adultery because it is against God’s commandments
  • can lead to divorce
  • abortion
  • STI, HIV/AIDS
  • domestic violence
  • murder (death)
  • psychological problems.
  1. Effects of Prostitution.
  • It can lead to break up of marriage, and family.
  • It lowers a person’s dignity
    can lead to unplanned pregnancies
  • school dropouts
  • infections such as STI’s and HIV /AIDS
  • improper use of family resources.
  1. Effects of Homosexuality
  • It is a threat to procreation.
  • It promotes loose short-term informal relationships and therefore promotes HIV / AIDS.
  • Homosexual couples are prone to HIV/AIDS infections because of having many partners; although this is changing in USA where homosexual couples are being married in churches.

vii. Effects of Sexually Transmitted Diseases

HIV / AIDS

  • recurrent illness due to opportunistic infections.
  • There is also stigmatization.
  • Some individuals have feelings of guilt, anger, denial and depression.
  • The sick persons have to look for extra finances to care for their health.
  • They have the burden for medications, and special diet.
  • HIV/AIDs has no cure and leads to death like many other diseases.
  • Parents die and leave their children as orphans.

Gonorrhea

  • The disease damages a woman’s fallopian tubes leading to infertility; and a man’s epidydymis leading to sterility.
  • An infected expectant mother can infect her newborn baby with gonorrhea
  • The disease may affect the eyes of the unborn child causing blindness.
  • Gonorrhea can also cause inflammation of joints, the heart and liver.

Syphilis

  • damage to the heart, brain and the nervous system.
  • This disease can lead to madness and death of the victim.
  • If a child is infected while in the womb, or during birth, the brain maybe damaged.
  • The child may have either physical deformities or the infected mother may give stillbirths.

Herpes genitals.

  • Infection can cause severe brain damage; cancer of the neck of the womb.
  • If a woman is pregnant, the disease can cause death of the baby.
  • The wounds and sores expose the sick person to HIV /AIDS infections.

Hepatitis B.

  • This disease damages the liver and may lead to death of the infected person.
  • It has a vaccine, but not treatment.

viii. Other Consequences of Irresponsible Sexual Behaviors

  • unplanned pregnancies
  • children living in the streets
  • school dropouts
  • psychological problems These include among others:
    • stress,
    • depression,
    • self – pity,
    • withdrawal,
    • aggressiveness,
    • violence.

Stress

  • is the response of the body and mind to any situation that exerts pressure or makes demands on a person.
  • The intensity or pressure experienced determines the level of stress.
  • Some of the signs of stress are:
    • anxiety,
    • worry, and drop in performance,
    • chest pains
    • mood swings
    • rebellion
    • ulcers
    • heart palpitations
    • fatigue
    • guilt feelings.

Solutions

  • To avoid stress, it is suggested that individuals should accept that one is stressed;
  • identify sources of stress, rest, exercise, listening to therapeutic music and talk to a counselor.

Depression

  • This is an acute mental disorder.
  • It is also a state of hopelessness and low spirits.
  • Depression can be mild or severe.
  • It has physical, emotional and behavioral signs and symptoms.
  • Let me caution you that it is only a medical doctor who can know if one has a depression or not.
  • We are told by doctors that signs of a depression are:
    • persistent headaches and chest pains;
    • loss of appetite;
    • too much appetite;
    • loss of memory;
    • insomnia i.e. lack of sleep;
    • weight loss or gain;
    • nervousness and mood swings;
    • low self-confidence;
    • suicidal tendencies and self-pity.
    • loss of libido (sexual desire);
    • poor performance in school and in work places;
    • hopelessness;
    • loss of interest in ones activities;
    • hypertension
    • high blood pressure
  1. d. Irresponsible Social and Human Behavior
  • There are social and human behaviors that are contrary to Christian life.
  • These unacceptable behaviors are abortion, and divorce.

Abortion

  • Abortion is termination of pregnancy before the foetus is capable of independent life.
  • There are two types of abortions.
  • One is spontaneous abortion or miscarriage.
  • The other is induced abortion, which is deliberate and illegal in Kenya.
  • Induced abortion has been debated in Kenya.
  • The main question is should abortion be legalized or not.
  • This is because abortion is legal in some European countries.

Reasons why mothers seek abortion

  • pregnancy due to rape and incest.
  • if the mother believes that the unborn child will be a burden. This may be because the baby is conceived outside wedlock and the mother lacks economic resources to take care of the baby.
  • mother is in school and she cannot look after the baby and continue with her education.
  • medical personnel may abort a deformed foetus or in order to save the life of the mother if it is in danger.

Reasons why abortion is considered a sin

  • Christian’s view of abortion as murder (Exodus20: 13).
  • This is because abortion interferes with the mother’s body, and destroys the baby.
  • Christian view is that the body is the temple of the Holy Spirit.
  • God is the giver of life and He alone has the right to take it away.
  • Abortion carries with it stigma and the effects mentioned above make Christians condemn abortion.

 

  1. Effects of Irresponsible Social and Human Behavior.
  • Effects of abortion are:
    • infertility,
    • ectopic pregnancy,
    • destruction of a woman’s body parts;
    • fetal malformation;
    • risk of the mother bleeding to death and destruction of uterus.
    • mother may experience in future still births
    • miscarriages
    • risk of barrenness
    • failed abortions leading to deformed babies
    • stress
    • depression.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

SUBSTRAND:KING DAVID AND KING SOLOMON

Introduction

Yahweh remained the God of Israel and the sovereign ruler of his people.

Leadership refers to the manner in which a community’s way of life is ruled or controlled. When Israelites settled in Canaan, Judges ruled them for the first 200 years. Some of the judges were

  1. Othniel
  2. Ehud
  3. Samson
  4. Deborah
  5. Gideon
  6. Shamgar
  7. Samuel
  8. Barak

Duties of Judges

  1. Leading Israelites to war against their enemies
  2. Settling disputes among the people
  3. Acting as religious leaders and leading Israelites in worship –
  4. Offering sacrifices on behalf of the people.
  5. Some of the judges acted as God’s prophets
  6. They anointed kings, for example Samuel anointed King David.

 

Demands for a King in Israel

After Israelites settled in Canaan, the Promised Land, they started demanding for an earthly king to rule over them. These demands for a king rulers were brought about by:

  1. Samuel’s sons Joel and Abijah were corrupt and took bribes. The sons of Samuel, who were judges, lacked his good leadership qualities.
  2. The Israelites wanted a warrior king who could lead them to war against their enemies.
  3. The Israelites wanted to be like the other nations around them who had kings.
  4. The Israelites wanted a human leader whom they could see, approach, and talk to him face to face.
  5. The Israelites wanted security, which could be provided by a stable political government ruled by law and order.
  6. They wanted a government that had a regular army,
  7. They also wanted an established law court system.

Reasons against Kingship in Israel (Samuel 8:10 – 20)

By demanding for a king, the Israelites were seen as rejecting Yahweh – their unseen ruler. Two, there would be danger of hereditary kingship which would lead to oppression / dictatorship. God told Samuel to give Israelites strict warnings against Kingship by explaining how the king would treat them. A king would: –

  1. Recruit Israelites sons forcefully into the army.
  2. Grab peoples land.
  3. Force people to pay taxes to the government
  4. Turn people into slaves.
  5. Introduce forced labour.
  6. Force their daughters to work for his wives, sons, and for the royal house in general.

The people of Israel were distinct from other nations. Asking for a king meant rejecting God as their unseen king. Further to this, Israel could become like other nations, which did not worship Yahweh.

Then the covenant with God and the people of Israel would cease.

Achievements and Failures of King Saul (Samuel 13:8 – 14; 15:7 – 25)

Samuel was directed by God to choose and anoint Saul as the king of Israel. Saul was from the tribe of Benjamin. He became the first human king of the nation of Israel. He accomplished several things.

Successes of King Saul

  1. He was anointed by God; as king to rule the Israelites
  2. He was chosen even though it was not God’s idea for a king over his people.
  3. He was a great warrior. He led the Israelites to war and defeated their enemies

Failures of King Saul

  1. God told Saul through Samuel to destroy the Amalekites completely. Saul however disobeyed God. He spared the king and the fat livestock. He claimed to have spared the fat animals for sacrifice to God. Because of this disobedience, God rejected Saul as king.
  2. The Israelites were faced with many enemies. The worst were the Philistines. It was a custom for the king of Israel to enquire from God whether to go to the battle or not. The priest/prophet gave permission to the king to go to war. When Saul was faced with the dilemma whether to fight or not, Samuel enquired from God. Saul did not wait for permission to go to war from Samuel the priest. He decided to bypass Samuel by offering a sacrifice to God before going to war. This action displeased God because it was not his work to offer sacrifice to God. It was the work of priests.
  3. After God rejected Saul as the king of Israel, Samuel was guided by God to go to Bethlehem. He was asked to go to the home of Jesse who had eight (8) sons. In that home, God was to show Samuel the next king of Israel. Samuel would then anoint the chosen son of Jesse. Seven of Jesse’s sons were brought before Samuel one by one. God told Samuel that he had not chosen any of them. When David, a shepherd, was brought before Samuel God said to him ’this is the one – anoint him!” (1 Samuel 16:12).
  4. David was anointed (poured oil on) as the next king of Israel. However he had to wait until Saul died before he could take over kingship. After Samuel anointed David to become the next king of Israel, Saul was jealous and plotted many times to kill him. David was employed to serve Saul. He played the harp, lyre wherever an evil spirit possessed Saul.
  5. When Samuel died; the Philistines gathered to fight Israel. Saul was filled with terror. Saul enquired from God whether he should go to war, but did not get an answer. Saul disobeyed God by asking a medium (witch) to consult the dead for him. This act led to the death of Saul together with his son Jonathan in battle.
  6. Saul was concerned with what people thought of him than pleasing God. He wanted to please people and not God. He was disobedient with God (1 Samuel 15:24)

Lessons which Christians can Learn from King Saul’s Failures

  1. Value of being patient.
  2. Christian should obey God, follow His commands and not be afraid of people.
  3. Christian should obey religious leaders placed over them by God.
  4. Christian leaders should be humble
  5. It is against the teachings of God, against the will of God to consult the spirits of the dead through mediums.
  6. Without faith, it is impossible to please God. God desires sincere worship.
  7. Political leaders should consult and listen to religious leaders.
  8. Christians should not turn against their enemies or rivals. They should not plot to have them destroyed and killed.

Importance of David (1 Samuel 16: 1 – 23, 2 Samuel 6:1 – 15)

David took over kingship of Israel though some people resisted his rule. At first he ruled the house of Judah. Later on the other tribes rallied behind him.

Importance of King David

David became king after the death of Saul. He ruled for over 40 years as king of Judah and Israel.

Achievements of David

  1. He was a brilliant military commander
  2. He captured the old fortress of Jerusalem from the Jebusites and made it his capital city.
  3. He removed the ark of covenant from the house of Abinadab in Shiloh and brought it to Jerusalem.
  4. He expressed great faith in God. Through his faith in God, he was able to kill Goliath, the great Philistine warrior.
  5. He was a skilled musician and composed marry psalms that were used and are still being used in temple and church worship.
  6. David respected the prophets of God and always consulted them whenever he wanted to do anything.
  7. He expanded the geographical boundaries of Israel through conquests.
  8. He was a great diplomat and established good political relations with the neighboring kings.
  9. He was a shrewd administrator who chose wise elders and counselors to advice him.
  10. God promised to establish an everlasting kingdom for David
  11. David ruled over Israel, administering law and justice to all people.
  12. He took a census of the Israelites and used the information to
    1. recruit young men into military service and
    2. decide on the policy of taxation.
  13. David had remarkable leadership qualities. He was kind. He spared mephibosheth, Saul’s grandson.
  14. David was humble. He was ready to accept sins he had committed and repent e.g. he repented after committing adultery with Bathsheba. David as an ancestor of Jesus Christ (2 Samuel 1 – 29, LK 1:26 – 33) David intended to build a splendid temple for God in Jerusalem. He felt it was not fair for the Ark of the Covenant to continue dwelling in a tent while he himself lived in a magnificent palace. To achieve this goal, David consulted Nathan, the prophet on whether to build the temple. The prophet approved the idea. But that night, Nathan received a revelation form God that stated that David was not to build a house (temple) for God. David’s son would build the temple of God (2 Samuel 7:5 – 6). Prophet Nathan gave David God’s message to David. The message was that:
    1. His son will build the temple
    2. God would give David’s descendants a place to settle
    3. God promised to raise up an heir from the house of David to sit on the throne
    4. God promised to make David’s name great or famous among all other leaders of the earth.

Reasons why God Rejected David’s offer to Build him a Temple

  1. David had been involved in a lot of wars with the Israelites’ enemies and had thus shed a lot of blood.
  2. God was a God of the people and could not be confined to a house.
  3. It was the will of God to establish the house of David (build David a house) rather than David builds a house for him (God). The human body is the temple of God. God dwells in the hearts of people.
  4. David had grown old. God wanted him to rest.
  5. God had planned that David’s son would build a house for him – a place to house the Ark of the Covenant. King Solomon, David’s son built the temple and fulfilled God’s promises to David. Solomon’s rule was peaceful and prosperous.

The New Testament is a fulfillment of God’s promises to David

  1. The gospel writers tell us that Jesus was born in the family of David (Luke 1:26 – 27)
  2. The angel of God during the annunciation of the birth of Jesus said that He will be like his ancestor David (Luke 1:32 – 33)
  3. Jesus was born in Bethlehem which was also the birthplace of David (Luke 2:4)
  4. Bartimaeus the blind man of Jericho hailed Jesus as the son of David
  5. During his triumphal entry to Jerusalem, Jesus was hailed by the crowd as the messiah descended from David.
  6. In his genealogy, Saint Mathew says that Jesus was a descendant of David (Matt.1: 1)

Failures of King David

Although David had many virtues:

  1. He ordered Uriah to be placed at the battle forefront so that he can be killed.
  2. Uriah was the husband of Bathsheba. David had committed adultery with her.
  3. He took Bathsheba as his wife

Leadership of King David

David showed:

  1. Courage and bravery. David was courageous and brave. Modern leaders should be ready to die with and for their subjects.
  2. Gratitude – thankful and grateful. David always thanked God for any success or favors he received. Good leaders should be thankful and grateful to God as well as to their fellow human beings.
  3. Loyalty. David was loyal to God and to the Israelites. A good leader should be loyal, and never betray his people.
  4. Justice. David administered justice to all his subjects without favoring anyone. No tribalism or nepotism. A leader should be fair to all (2 Samuel 8:15).
  5. God – fearing, having faith. David was God fearing. He expressed his total trust in God. Modern leaders need to emulate this quality.
  6. Humility. A leader should be a humble person. Though David had been appointed as the king, he continued to serve Saul until Saul died. He accepted his failures and asked for forgiveness
  7. Kind. David was a kind leader. Leaders should be kind. David spared the life of Saul twice yet Saul wanted to kill him.
  8. Wisdom. David was careful when choosing legal advisors to assist him in his rule. He was also wise. He reduced tribal jealousies by choosing Jerusalem; a neutral spot for administrative purposes.
  9. Delegation – a shrewd administrator. A good elder should be able to delegate duties. David delegated duties. He involved others in advising, and administering

Achievements and Failures of King Solomon (1 KING 3 – 12)

After David died, his son Solomon became the next king. Kingship in Israel was hereditary. Solomon was chosen by David to be his successor. He took over from David at a time of peace and security established by David.

Achievements

  1. He made Israel rich by establishing trade with other countries
  2. He was a good trader and a successful merchant. He traded in copper, horses, timber, silver and gold. He established international trade with the neighboring countries. For example, he traded with Tyre in cedar and pine logs.
  3. He established a well equipped large army for Israel
  4. He was a builder. He built a magnificent temple for God in line with God’s promise to David. He also constructed other cities (Megiddo) and a palace for himself.
  5. He is remembered for his amazing administrative skills. He had 550 officials in charge of labour force.
  6. He was a diplomatic ruler. He established friendly ties with his neigh-bours. This ensured continued peace. For instance he married the daughters of the kings of Egypt, Moab, Eden and Sidon so as to establish strong ties with those nations.
  7. He had great wisdom. He judged a difficult case between two women who were claiming ownership of the same child. He composed many wise sayings known as the proverbs of Solomon. He also composed songs like Song of Solomon and Song of Songs and poems in Ecclesiastes.
  8. He dedicated the temple of God with great rejoicing.
  9. He brought the Ark of the Covenant to the temple of Jerusalem.

Failures of King Solomon

  1. He married women from many foreign countries. These actions made Solomon break the Torah as Israelites were not supposed to marry forei-gners. Through these marriages, idol worship started in Israel. This was because he allowed his wives to worship their gods, build temples and altars for them. This led to introduction of idolatry in Israel.
  2. Solomon constructed his palace for 13 years. He then built God’s temple for 7 years. This showed that he probably loved himself more than God.
  3. He killed his own half brotherAdonija on suspicion that he could be a rival to the throne.
  4. Solomon lived lavishly, and expensively. He thus burdened the Israelites with high taxes.
  5. He used forced labour. This was the same as enslaving the Israelites.
  6. He worshipped idols. Solomon’s heart was turned to such other gods as Ashtoreth / ashitarte – goddess of Sidon and Molech – the god of the Ammonites. This was breaking God’s commandments
  7. He sold part of Israelite territory to the king of Tyre
  8. He used pagan skills when designing, decorating, and furnishing the temple.
  9. He made treaties with other nations in spite of the fact that God had forbidden Israel from making treaties
  10. He was extravagant. He used a lot of state wealth to entertain and please his many wives and concubines.

Importance of the Temple in Israel

Definition of a Temple

This is a building dedicated to the worship of God. Solomon built the temple as a fulfillment of the promises that God gave to David, that his son would build a house for him.

Importance and Uses of a Temple

  1. It was a centre of worship. Prayers and sacrifices were offered to God from the temple.
  2. It symbolized the presence of God among the Israelites.
  3. The Ark of the Covenant was kept in the temple as a symbol of God’s presence among his people.
  4. The temple acted as a symbol of unity in Israel. Every year all the Israelites had to go to Jerusalem to celebrate such feasts as the Passover, feast of tabernacles’ Day of Atonement. This led to the unity of the Israe-lites.
  5. Dedication of children and purification were done in the temple.
  6. It was a residence for the priest.
  7. It was a business centre where people bought and sold animals needed for sacrifice.
  8. The temple acted as a school to the scribes, rabbis and others who studied and interpreted the Mosaic Law.
  9. The temple also acted as the judicial court of Israel. Judges worked from the temple
  10. It is where religious ceremonies like naming and circumcision of baby boys took place.
  11. It was a house of prayer.

 

 

 

 

 

WOMAN JUDGE:DEBORAH

Deborah, a wife, prophetess, and judge of Israel, was chosen by God to serve His people at a very challenging time. Deborah showed her belief in God and her strength through God as she quietly and obediently stepped into her role.

Christian women leaders can learn quite a bit about leading others through an in-depth study of Judges 4 and 5. In this post, I’ve shared 7 leadership traits reflected in Deborah’s leadership.

I also believe Deborah reflected many of the leadership qualities of the Proverbs 31 woman found in verses 10-31 because Deborah served with honor, strength, and dignity. She quietly went about her role as a wife and leader. She was a humble and noble servant known as “a Mother in Israel.” A referent title bestowed upon her by the people she led. Let’s dive into the 7 leadership qualities emulated in her leadership.

Leadership Traits of Deborah

  1. Deborah was courageous.

She was called by God to lead at a difficult time. Deborah stepped forward with bravery in obedience to God to lead the Israelites in times of challenge and oppression.

Judges 4:1-4 (NIV)“Again the Israelites did evil in the eyes of the Lord, now that Ehud was dead. So the Lord sold them into the hands of Jabin king of Canaan, who reigned in Hazor. Sisera, the commander of his army, was based in HaroshethHaggoyim. Because he had nine hundred chariots fitted with iron and had cruelly oppressed the Israelites for twenty years, they cried to the Lord for help. Now Deborah, a prophet, the wife of Lappidoth, was leading Israel at that time. ”

  1. Deborah served with wisdom and knowledge.

She exhibited great listening skills, which were evident in her obedience to God. Deborah listened well, and when she spoke, she added value due to her wisdom.

Judges 4:5 (NIV)“She held court under the Palm of Deborah between Ramah and Bethel in the hill country of Ephraim, and the Israelites went up to her to have their disputes decided.”

  1. Deborah supportedthe people God called to lead.

She encouraged Barak and acknowledged his role in leading the Israelites to victory. Deborah’s confidence in God’s power gave the Israelites assurance God was with them.

Judges 4:6-7 (NIV)“She sent for Barak son of Abinoam from Kedesh in Naphtali and said to him, The Lord, the God of Israel, commands you: Go, take with you ten thousand men of Naphtali and Zebulun and lead them up to Mount Tabor. I will lead Sisera, the commander of Jabin’s army, with his chariots and his troops to the Kishon River and give him into your hands.”

  1. Deborah was trusted.

She earned her position due to her belief and faith in God. Her strong faith earned her the respect of the people, which allowed her to influence and motivate Barak and his men.

Judges 4:8 (NIV)“Barak said to her, If you go with me, I will go; but if you don’t go with me, I won’t go.”

  1. Deborah was direct.

She spoke the word of God and no other. It was clear to the Israelites Deborah shared God’s message and not her own agenda.

Judges 4:9 (NIV)“Certainly I will go with you, said Deborah. But because of the course you are taking, the honor will not be yours, for the Lord will deliver Sisera into the hands of a woman. So Deborah went with Barak to Kedesh.”

  1. Deborah was confident.

She placed her confidence in God. Deborah never hesitated to fulfill God’s commands. Her reassurance and strong beliefs led the Israelites to victory.

Judges 4:14 (NIV)“Then Deborah said to Barak, Go! This is the day the Lord has given Sisera into your hands. Has not the Lord gone ahead of you? So Barak went down Mount Tabor, with ten thousand men following him.”

  1. Deborah was humble.

She gave praise and glory to God because the victory was God’s. Deborah and Barak sang a song of thanksgiving and praise to God and the followers. And, they had peace for forty years due to their belief and obedience.

Judges 5:5 (NIV)“On that day Deborah and Barak son of Abinoam sang this song…”

A Mother in Israel

Deborah was chosen by God to serve as the Mother of Israel and lead His people to victory. Deborah’s success was due to her faith in God. She served God by utilizing her values and Spiritual gifts. Due to her faith, God called her, a woman, to lead His people to victory.

As in the Song of Deborah, Judges 5:31 (NIV), those who love and obey the Lord will be renewed in strength and shine bright like the majestic sun.

Lessons learnt from the story of Deborah

1. Prosperity Should Never Lead to Complacency

Although Israel’s servitude at the hands of the Canaanites, Midianites, Philistines, and other nations was a result of their sin and idolatry, the Israelites had not done themselves any favors by refusing to remove these nations and their influence from the land, as God had instructed in the book of Joshua.

Instead, the temptation of foreign gods and the presence of false worship remained, slowly reshaping the culture and turning the hearts of the people away from God in the process.

The Israelites’ prosperity following the days of Joshua should have solidified their faith. However, instead of being grateful and humble, the people became complacent and self-indulgent. Matthew Henry writes, “thus the prosperity of fools destroys them.”

Because the people of Israel neglected to glorify God in good times, they were forced to seek Him in times of trouble.

The same is true for believers today.

God uses tough times and anointed leaders like Deborah to wake His people and break them of the habit of sin and complacency when necessary.

2. God Calls for Obedience

Among the judges of Israel, Deborah was unique in that she not only led by example, but she was also bold, assertive, and obedient in both her personal and public life.

Deborah’s calling as a judge was not her sole occupation. She was also a wife, a warrior, a prophetess, and a songwriter, and in all things, she proved faithful.

The lesson here is that God’s ultimate call for His creation is obedience.

We all wear many hats and fulfill many roles in life, but whether it’s in our jobs, our relationships, or our families, God calls us to be faithful and obedient in all areas of life, big and small, public and private.

3. Leaders Lead

Though Deborah called upon Barak to lead Israel’s army into battle, her delegation should not be seen as an attempt to shake responsibility or “pass the buck.” On the contrary. Barak insisted Deborah accompany him, and Deborah committed to going. She would not send him somewhere she was not willing to go herself.

Like any good leader, Deborah led the way. She stepped up when called (Judges 5:8) and did not hesitate to act; what she called Israel to do in public, she committed to do in her personal relationship with God.

Sadly, the later kings of Israel did not follow suit; as their hearts went, so went the nation of Israel. Deborah, however, led by example and modeled courage, swift action, obedience, and a willingness to speak the truth, standing behind those she called to action. “Those who in God’s name call others to their duty, should be ready to assist them in it” (Matthew Henry).

Deborah modeled this aspect of leadership better than most.

4. When God Goes Before Us, What Have We to Fear?

Although Deborah’s courage is legendary, her confidence did not come from her abilities or Israel’s army. In fact, the armies of Israel were largely outnumbered by Sisera and his many chariots. But where Sisera trusted in the might of his army, Deborah trusted in God’s power and provision (Psalms 20:6-9).

Knowing that God was not only for Israel but had gone before them was all the strength she needed to take action, get the job done, and inspire others to step out in faith as well (Judges 5:14).

For Christians today, Matthew Henry offers this powerful reminder: “be not dismayed at the difficulties thou meetest with in resisting Satan, in serving God, or suffering for him; for is not the Lord gone before thee?”

5. God Deserves Swift Gratitude and Praise

Following their victory over Sisera and the Canaanites, Deborah and Barak did what Israel had failed to do since the days of Joshua: ascribe all glory, honor, and praise to the Lord (Judges 5). And like most things in life, Deborah and Barak did not hesitate to worship.

In this way, complacency and self-adoration had been momentarily overcome by Israel’s leadership. They recognized that, no matter what they or the army had done, God deserved the credit.

Believers today would be wise to imitate this behavior and not waste time giving credit and praise to the Lord when it is due.

6. Look to the Past, But Look Beyond to the Promise of the Future

In the Song of Deborah and Barak, the songwriter(s) remind the people of the cost of their disobedience and the reasons they had gotten into trouble with the Canaanites in the first place.

Here we find an honest reckoning with the past and a charge for Israel to “wake up” and return to their God. However, in acknowledging the sins of Israel’s past, Deborah also looks to the joy of their present salvation and hope for an even better future. This is vital to the survival of any civilization.

As Eric Metaxas writes in his book If You Can Keep It: The Forgotten Promise of American Liberty, “seeing the sins and failing (of the past) is not fatal and fatalistic. We see them, but we see beyond them to the possibilities of goodness and forgiveness and redemption. We recognize that the ‘story’s not over.’ We see the hope on the other side of where we are” (231).

Deborah reminded the people that, though they had betrayed God and broken covenant with Him, He had remained faithful. Knowing this, the children of Israel could look forward to even better days if they would cast aside their idols and return fully to the Lord.

7. God Elevates Those He Chooses

It is no coincidence that the great Canaanite general Sisera was brought down by a girl and a single iron nail. In this way, God demonstrates His tendency to use the “weak things of the world to confound the mighty” (1 Corinthians 1:27). The apostle Paul would continue, “God chose the lowly things of this world and the despised things—and the things that are not—to nullify the things that are, so that no one may boast before him” (1 Corinthians 1:29).

In this way, as Deborah had promised, Jael was given a special honor for her role in killing an enemy of God’s people. “Most blessed of women is Jael,” Deborah sings (Judges 5:24). Furthermore, a lot has been written about Deborah’s role as a woman in the Old Testament, and it is true; it was not common for women to hold positions of such power and influence in that culture at that time. However, as we see throughout Scripture, God does not hesitate to raise up, equip, empower, and promote His faithful servants, regardless of their social status, abilities, or lack thereof. As Matthew Henry writes, “Though He needs no human help, yet he is pleased to accept the services of those who improve their talents to advance his cause.”

In the end, God elevates those He chooses. Deborah sings, “thus let all your enemies perish, O Lord; but let those who love Him be like the rising of the sun in its might” (Judges 5:31).

“Such shall be the honour, and joy of all who love God in sincerity, they shall shine forever as the sun in the firmament.” (Matthew Henry)

Deborah would play an incredible role in the history of Israel and has gone on to become one of the most influential women in all of Scripture. However, it is not Deborah or Barak, or Jael who deserves glory or praise. They are not worshipped because they are not the ultimate heroes of this story or the ultimate saviors of Israel. That role is reserved for God and God alone, before whom “the mountains quaked at the presence of the Lord” (Judges 5:5).

STRAND 4: THE LIFE AND MINISTRY OF JESUS CHRIST

SUBSTRAND:RAISING OF THE WIDOW’S SON NAIN

Luke 7:11-17.

Ø  Jesus went to a city called Nain together with his disciples, and a great crowd went with him.

Ø  As he drew near the gate, he met people carrying a dead man.

Ø  The dead man was the only son of the widow.

Ø  The widow was accompanied by a large crowd.

Ø  When the lord saw her, he had compassion on her.

Ø  He told the widow to stop weeping.

Ø  Jesus touched the bier/coffin and the bearers stood still.

Ø  He ordered the dead man to arise.

Ø  The dead man sat up and began to speak.

Ø  Jesus gave the man to his mother.

Ø  Fear seized them all.

Ø  They glorified God, saying a great prophet had risen among them.

Ø  The report concerning him spread through the whole of Judea and all the surrounding country.

Virtues Christians can learn from the raising of the widow’s son at Nain.

  • Love/kindness.
  • Unity/cooperation.
  • Thankfulness/praise/gratitude.

 

 

 

 

 

HEALING OF THE 10 LEPPERS

The Story of Jesus Healing the 10 Lepers

Jesus was on His way to Jerusalem and was walking along the border between Samaria and Galilee. It’s significant to note that Jesus was on His way to the cross. He knew what lie before Him in Jerusalem, the greatest most horrific sacrifice of His ministry. Yet, Jesus was able to look beyond His own horror to give hope to ten lepers who approached Him.

 

Leprosy is a horrendous illness that affects the skin, eyes, nose, and peripheral nerves. Highly contagious, those who were diagnosed with leprosy were quarantined and isolated from the rest of society. Jewish law required that those with leprosy shout, “Unclean, unclean” when people approached, to avoid contaminating others. At the time of Jesus, there was no known cure which left those with leprosy without hope.

 

Jesus saw and heard the lepers crying out, “Jesus, Master, have pity on us!” (Luke 17:13). Moved with compassion, Jesus responded with “Go, show yourselves to the priests” (Luke 17:14). Instead of healing them immediately, Jesus asked them to go to the priests. It was the priests who would make the determination whether or not they were healed and declared clean. What’s interesting is that Jesus didn’t heal them first! He gave them a command which would test their faith in Him. “As they went, they were cleansed” (Luke 17:14b).

 

One out of the ten realized he had been completely healed and filled with gratitude ran back to Jesus, praised God in a loud voice, and threw himself at the feet of Jesus to thank Him (Luke17:15-16). Interestingly enough, he was a Samaritan. The Jews hated the Samaritans and considered them to be half-breeds and very unspiritual! At this point in the story, Jesus asked a profound question, “Were not all ten lepers cleansed? Where are the other nine? Has no one returned to give praise to God other than this foreigner?” (Luke17:17-18).

 

What Can We Learn from the 10 Lepers Encounter with Jesus?

While there are many lessons, there are three primary lessons that stand out.

 

God Values the Least

In our culture of platform building and rising celebrity status, we forget that God values the least. He places honor on the poor, the broken, the messy, and the marginalized. The 10 Lepers were outcasts of society. Beyond just having leprosy at least one was from Samaria which would have made him the lowest of the low. He had absolutely no status and was looked down on as an untouchable. Yet, Jesus treasured each one, even the Samaritan, heard their cries, and healed them.

 

God Honors Faith

The 10 lepers weren’t healed until they acted in faith and turned to head to the priest. Did they have lots of faith or just a little faith? We don’t know. What we do know is they acted on the faith they had and started out on the journey to show themselves to the priests. In your life and mind, God will never let us off the hook of faith. As the writer of Hebrews wrote, “And without faith, it is impossible to please God, because anyone who comes to him must believe that he exists and that he rewards those who earnestly seek him” (Hebrews 11:6). God rewarded the 10 lepers’ faith by healing them.

 

God Cherishes Gratitude

Even more than the measure of our faith, God cherishes gratitude. Only one of the 10 lepers turned back, fell at Jesus’ feet, and thanked Him with a loud voice. Though Jesus was Almighty God, He was sensitive. His sensitivity didn’t make Him weak. It was a powerful gift. Since Jesus came to reveal the Father to us, we can assume that our heavenly Father is also sensitive. I believe we offend Him when we take His gifts for granted and forget to say, “Thank you.” The Apostle Paul alluded to this when He wrote to the church in Thessalonica, instructing them to “give thanks in all circumstances; for this is God’s will for you in Christ Jesus” (1 Thessalonians 5:18). Gratitude is a core discipleship issue for the believer and it’s God’s will that we learn to be grateful in every situation.

 

Practical Ways to Thank God Daily

  1. Keep a blessing journal at the dinner table. Tuck a thin journal in the napkin holder on your dinner table and get in the habit of listing your top three blessings of every day. By writing down your blessings every day, gratitude will grow in your heart. Not all blessings are huge. Perhaps a blessing is beautiful weather or a hug from a friend. Perhaps it’s that a baby slept through the night, or you got a bonus at work. Maybe the blessing is a delicious warm cup of coffee or an encouraging phone call. Whatever the blessing, practice writing it down as a form of giving thanks. In this way, you will be strengthening your gratitude muscle so that you, like the 1 of the 10 lepers will remember to say thank you.

 

  1. Develop a daily rhythm of thanking God for His love every morning and His faithfulness every evening. Our early church fathers had rhythms to their days so that Christ would be central in their gratitude. Develop a morning and evening rhythm of giving thanks so that it becomes a lifelong pattern. The Psalmist wrote, “It is good to praise the LORD and make music to your name, O Most High, proclaiming your love in the morning and our faithfulness at night” (Psalm 92:1-2). Before you even get out of bed in the morning, thank God for His deep love for you.Before you fall asleep at night whisper a prayer, thanking God for His faithfulness that you experienced during your day.

 

  1. Set an alarm on your phone to remind you to thank God for His gifts. The Psalmist wrote, “Seven times a day I praise You” (Psalm 119:164). What a beautiful pattern. In our day and age, we have the benefit of alarms on our phones. We can set reminders on our phones so that at specific hours of the day we can pause and give thanks. Wouldn’t it be beautiful if we followed the example of the Psalmist and paused seven times a day to give thanks?

 

  1. Forgive those who have hurt you. What does forgiveness have to do with gratitude? Everything. God has forgiven you for all the times you’ve hurt Him. Out of gratitude for His forgiveness, forgive those who have hurt you (Ephesians 4:32). When you realize the depth of your own sinfulness and the depth of God’s grace, gratitude wells up inside you and it becomes far easier to forgive those who have hurt you.

 

PARABLE ON PRAYER

A FRIEND AT MIDNIGHT

  1. Listen to worship music to prompt your thanksgiving. Worship music is a great tool to prompt our praise and thanksgiving. As you listen, ask the Holy Spirit to stir up gratitude in your heart for all the Lord has done. You don’t have to sing your thanksgiving (although you could), the point is to allow the music to remind you of all the ways God has been good to you. As you are reminded of His goodness, thank Him. A great song to get you started is, “How Good He Is” by Vertical Worship. You can find the song on YouTube. Listen and allow the words to prompt your thanksgiving.

 

The story of the 10 lepers is one of the most profound stories found in the gospels. We can learn that God values the least, He honors faith, and He cherishes gratitude. As you seek to offer Him gratitude daily, try one or more of these practical ideas; Keep a blessing journal, develop a morning and evening rhythm, set an alarm on your phone, forgive those who have hurt you, or learn to use worship music to prompt your thanksgiving. Above all, ask the Holy Spirit to help you develop a heart of gratitude. This pleases God so very much.

 

 

After Jesus told the disciples how to pray, He told them a parable to reinforce how to pray. Let’s follow Jesus’ example and tell the same parable. Read the parable of the friend at midnight, or the parable of the persistent neighbor, from Luke 11:5-13.

In the parable, a man had a friend that was visiting while on a long journey. The man wanted to feed his guest, but he had no food. The man went to his neighbor’s house at midnight and asked for bread to serve the guest. At first, the neighbor didn’t want to give away any food. But the man kept knocking on the door and asking for bread. The neighbor got back up and gave food to the man since he kept knocking.

Jesus continues, “And I tell you, ask, and it will be given to you; seek, and you will find; knock, and it will be opened to you. Then, it seems that He gives another, smaller parable: “What father among you, if his son asks for a fish, will instead of a fish give him a serpent; or if he asks for an egg, will give him a scorpion? If you then, who are evil, know how to give good gifts to your children, how much more will the Heavenly Father give the Holy Spirit to those who ask him!”

Here are some lessons from the parable:

  • Pray without giving up

People should pray to God with confidence, even at late hours, and continue to pray until they get an answer.

  • God expects people to come to him

God is not annoyed when people knock on his door in the middle of the night, he expects it.

  • God gives more than people ask for

God gives people more than they ask for when they approach him.

  • God can handle shameless audacity

People do not have to approach God in a certain mood, style of speech, or form of address.

The parable is similar to the Parable of the Unjust Judge.

 

According to the Bible, Nicodemus, a Pharisee and member of the Jewish ruling council, met Jesus at night and had a conversation with him:

  • Nicodemus’s approach

Nicodemus came to Jesus and said, “Rabbi, we know that you are a teacher who has come from God. For no one could perform the miraculous signs you are doing if God were not with him”.

  • Jesus’s response

Jesus replied, “Truly, truly, I say to you, unless one is born again he cannot see the kingdom of God”.

  • Nicodemus’s questions

Nicodemus asked, “How can a man be born when he is old? Can he enter a second time into his mother’s womb and be born?”.

  • Jesus’s further explanation

Jesus answered, “Truly, truly, I say to you, unless one is born of water and the Spirit, he cannot enter into the kingdom of God”.

The story of Jesus and Nicodemus teaches that people must be born again through a relationship with Jesus to enter the Kingdom of God:

  • Nicodemus’s visit

Nicodemus, a Pharisee and member of the Sanhedrin, visited Jesus at night to avoid being seen by the Jewish authorities.

  • Jesus’s teaching

Jesus explained that people must be born again of water and the Spirit to enter the Kingdom of God. This is thought to refer to the Sacrament of Baptism.

  • Eternal life

Jesus taught that eternal life is a gift from God, not something that can be earned. It comes through God’s Spirit, not through a person’s own efforts.

  • Faith in God’s word

Jesus taught that people must believe in God’s word, not understand everything about it.

  • Following Jesus

Jesus taught that following him means starting over and learning to do everything in a new way.

Some lessons from the story of Jesus and Nicodemus include:

  • Choose life
  • Walk as Jesus walked
  • Be aware of spiritual pride and showmanship

 

 

THE BRONZE SERPENT

In the Bible, Jesus referenced the bronze serpent story in John 3 to Nicodemus, a Pharisee and Jewish ruler, to explain that a person must be born again to enter the kingdom of God. Jesus used the bronze serpent as an analogy to his crucifixion, saying that the Son of Man must be lifted up, just like the bronze serpent.

Here are some details about the bronze serpent story:

The bronze serpent was a divinely given means of life and healing

The bronze serpent was a divinely given means of life and healing, in contrast to the serpent, which was an image of death.

The bronze serpent was made from copper or bronze

The Hebrew word for “snake,” nahash, resembles the word for “copper” or “bronze,” nehoshet.

The bronze serpent was made by Moses

In the Bible, God commanded Moses to make a bronze serpent and lift it up on a pole after the Israelites rejected the gift of manna from heaven.

The Israelites worshiped the bronze serpent

For 800 years, the Israelites worshiped a replica of the bronze serpent, burning incense to it. In the 600s BC, King Hezekiah broke the bronze snake into pieces.

 

 

THE JERUSALEM MINISTRY

Luke, 19: 28 – 21: 38

The Triumphant Entry of Jesus to Jerusalem Lk. 19:28 – 40

a. The Triumphant Approach to Jerusalem. Luke 19: 28- 40.

  • Jesus death had to happen in Jerusalem.
  • Hence Jesus went to Jerusalem.
  • He sent two disciples to a place where there was a colt (young donkey) that no person had ever ridden.
  • They took it to Jesus.
  • They threw their garments on the colt, and Jesus sat on it.
  • As Jesus rode, people spread their clothes on the road.
  • As Jesus neared Jerusalem, a “large crowd of his disciples began to” praise God (vs37).
  • The crowd said ‘blessed be the king who comes in the name of the lord’.
  • The Pharisees told Jesus to rebuke the disciples.
  • Jesus told them if the disciples kept quiet the stones would start shouting.
  • Jesus made his entry into Jerusalem in a royal (kingly) procession.
  • He was Israel’s humble king who came with peace and not a political leader.
  • He rode on a donkey – a symbol of peace.
  • This was unlike the political kings who rode on the horses during that time.

b. Jesus weeps over Jerusalem. Read, Luke 41- 44

  • When Jesus was near Jerusalem he wept.
  • He then foretold the coming destruction of Jerusalem due to its rejection of the messiah.
  • The rejoicing of his triumphant entry to Jerusalem turned to mourning as he foretold the destruction of Jerusalem by Romans in 70 A.D.

c. Jesus goes to the Temple. Read Luke 19:45 – 48.

  • Jesus went to Jerusalem temple and evicted traders.
  • He told them that the house of God is a house of prayer not a den of thieves.
  • Jeremiah spoke these same words during his temple sermon.
  • The chief priests and scribes began planning how to kill Jesus.

Pharisees, Scribes Question Jesus Luke 20: 1-47

a. The question about Jesus’ Authority. Read Luke, 20:1 – 8.

  • The Jewish leaders wanted to know from Jesus by whose authority he was doing all the things he was doing.
  • In response Jesus asked them “did John’s right to baptize come from God or from human beings?” (Vs4).
  • They discussed among themselves and decided not answer.
  • Jesus told them “neither will I tell you”.
  • In response to his authority being questioned he told a parable.

b. The parable of the Tenants in the Vineyard.

  • Read the parable in Luke, 20: 9 – 18.
  • The tenants refused to pay the owner of the vineyard his share of the harvest.
  • They threw out the servants he sent to collect his share of the harvest.
  • When he sent his son, they killed him so that they can own the vineyard.
  • Jesus asked the people… “What will the owner of the vineyard do to the tenants?”

c. The Question about Paying Taxes. Read Luke 20:19-28

  • Pharisees, and scribes (teachers of the law) and chief priests planned to arrest Jesus but they were afraid of the people.
  • They sent spies to trick Jesus by asking this question -” …is it against our law for us to pay taxes to the Roman Empire, or not?
  • Jesus used the currency and told them “pay the Emperor Caesar what belongs to him and pay God what belongs to God.” (Verse 25)
  • This was a tricky question.
  • Jesus here teachers people to obey the rules of the land and to obey God’s rules.

d. The Question about Resurrection

  • The Sadducees who did not believe in resurrection tempted Jesus with another question.
  • They wanted to know this.
  • When resurrection comes, who shall be the husband to a woman who was married to the first brother and inherited as a widow by the other six brothers?
  • Jesus told them the men and women who shall be worthy of resurrection shall not marry.
  • They shall be like angels and cannot die (verse 34 to 38)

e. Jesus warns against the Teachers of the Law

  • Jesus warned his disciples.
  • Be careful and guard yourselves against teachers of the law, the scribes.
  • They were hypocritical.
  • They wore long robes, said long prayers, looked for positions of honor and exploited the widows.

f. The Widow’s Offering. Luke, 21: 1- 4

  • When people were giving offerings in the temple, a widow gave “two little copper coins”.
  • Jesus said the poor widow had given all she had.
  • Likewise Christians should give to God not to be seen but from their hearts.
  • It is not the quantity of the gift that matters but the attitude of the giver.

The Teachings of Jesus about Eschatology Lk. 21: 5 – 38

  • Eschatology is from two Greek words, ‘eschatus’ and ‘logos’.
  • Eschatus means end, Logos means study.
  • Eschatology means the study of the end times or in CRE the last days of Jesus.
  • For biblical information, read Luke 21:5-38 and Mathew 24: 1 – 36 and Mark 13:1-31.

a. Signs of the End Times.

  • Jesus gave many signs that will inform Christians that end of the time has come.
  • These were to happen at different times.
  • The signs were:
    1. Destruction of the temple of Jerusalem by invading armies which shall surrounded it
    2. Hatred of disciples and Christians because they were followers of Christ
    3. Rejection of disciples by families because they were followers of Christ
    4. Betrayal of the followers of Christ
    5. Prosecution and imprisonment of Christians.
    6. Many false messiahs. People would come claiming to be the Messiah, the Son God
    7. Wars as nation rise against nations
    8. Eruption of natural calamities such as plagues, earthquakes, famines, great fear among people.
    9. Disruption in the sky and seas. Fall of strange heavenly beings from the sky and rise of seas.
    10. Natural calamities such as earthquakes, plagues, famines bringing despair and distress in all nations
    11. The times shall be announced by signs in the stars, moon, sun and sea
    12. Appear of the ‘Son of man ‘ in power and glory at the end of times.

b. Uses of the Temple during the time of Jesus

  • During the time of Jesus, the temple was used for
    1. Child dedication
    2. Circumcision
    3. Purification
    4. Trading and business centre
    5. Worshiping and prayer
    6. a place for celebrating festivals such as the Passover and other major feasts
    7. a learning centre or school for religious purposes. For example disciples of the scribes learnt law in the temple.
  • The destruction of the temple symbolized the birth of Christianity.
  • From that time Christians became the new temple of God.

c. The Parable of the Fig Tree Lk.21: 29 – 33

  • Jesus used the parable of the fig tree to explain more about the end times.
  • Appearance of leaves in the fig tree and other trees inform us that summer will soon come.
  • When Christians see signs of the end times, they should know that the kingdom of God is about to come.
  • Jesus told disciples to be watchful, alert, and praying for strength to endure the coming tribulations.
  • See the previous teachings on watchfulness and readiness.
  • Christians are to watch out and be ready for the end times.

d. Relevance of Jesus’ Teachings on Eschatology

  • These teachings assure and continue to tell Christians these messages from Jesus:
    1. There is life after death
    2. Christ will return to receive the faithful
    3. Christians are to be watchful, prayerful, and hopeful despite trials and tribulations
    4. Christians are assured of God’s protection from evil.
    5. Christians should prepare for the coming of Christ by leading a righteous life
    6. Do not lose hope
    7. Do not be pre occupied with the cares of this would for they never end
    8. Preach and spread the word of God
    9. Obey God’s commandment
    10. Help the needy

THE PASSION, DEATH AND RESURRECTION OF JESUS

LK. 22 – 24 –

The Plot against Jesus

  • The Jewish religious leaders were determined to ensure that Jesus was either arrested or killed (Lk.22: 1 – 6)
  • They were helped by Satan who entered into Judas Iscariot one of the twelve disciples of Jesus.
  • Judas decided to betray Jesus.
  • He communed with the Jewish leaders who agreed to pay him money to betray Jesus.
  • He searched for a way to betray Jesus without knowledge of Jesus.
  • He forgot who was Jesus.
  • Judas agreed to betray Jesus probably because:
    1. He belonged to the party of Zealots who wanted political changes
    2. He was probably frustrated by Jesus’ approach to the Kingdom of God which was establishing a peaceful spiritual kingdom
    3. He expected Jesus to establish a political kingdom
    4. He was greedy for money
    5. Satan entered him

The Lord’s Supper / The Last Supper LK 22: 7 – 13

  • The last supper was the lost Passover meal that Jesus took before his arrest.
  • Passover is celebrated in obedience to God’s command to Moses.
  • It is a remembrance of Israel’s deliverance by God from slavery in Egypt.

a. The Passover Meal

Preparations for the Passover, Read Luke 22: 7 – 23.

  • Peter and John were sent by Jesus to go and prepare the Passover meal.
  • They were to do so in a house in the city.
  • They were taken to the house by, a man who was carrying a vessel of water.
  • They were given a big furnished upper room upstairs.
  • They prepared the Passover meal as instructed by Jesus.

Passover meal

  • During the meal with the 12 disciples / apostles Jesus told them that this was going to be his last meal with them before his death.
  • He took a cup of wine gave thanks to God and said “Take this and share it among yourselves.
  • I tell you that from now on I will not drink this wine until the Kingdom of God comes.”
  • The cup of wine was his blood that he was going to shed for them.
  • Wine therefore symbolized the blood of Jesus, shed for the purification of humankind and forgiveness of sins.
  • This blood is the New Testament and covenant with Christians.
  • After drinking of wine, He “took a piece of bread, gave thanks to God “ and shared it and told them that the piece of bread represented his body which is “given for them”.
  • He presented his death as a sacrifice whose blood sealed the new covenant.
  • His death replaced the sacrifices of the Old law, those of animals, which sealed the Sinai covenant.
  • The new covenant will be for all people including Gentiles.
  • This is to fulfil God’s promise of salvation for all people.
  • Jesus and disciples ate Passover together so that henceforth Christians would eat the meal together in remembrance of Jesus.
  • Passover was initially taken to remind them of the deliverance from Egypt.
  • But during the last supper, Jesus gave the Passover a new meaning.
  • As they ate, Jesus foretold of his betrayal by one of his disciple.

Comparisons of the Lord’s Supper and the Passover

  1. The Passover commemorates the divine act of redemption of the Jews from their bondage in Egypt while the Last Supper commemorates the deliverance of human kind from sin.
  2. The Passover feast reminded the Israelites that they were free, redeemed people while the Lords Suppers is to remind Christians of their forgiveness of sins. The death of Jesus set Christians free from sins.
  3. Passover was followed by the Old covenant of Mount Sinai. The Lords suppers is a new covenant based on the death of Jesus for sins of humankind
  4. Passover (Old testament) was sealed by the blood of Lambs while New Covenant (Lords suppers) is sealed by the blood of Jesus on the cross.
  5. Items for celebrating in Passover (old testament) are different from the cup of wine and pieces of bread used by Jesus to celebrate his last supper with the disciples.

Relevance of the Lord’s Supper Today

  • Christians celebrate the Lords supper.
  • This celebration is called the Eucharist, the Lords suppers, or Lords meal.
  • Christians celebrate it as an act of repentance; through which they receive assurance of forgiveness of their sins.
  • The presence of Jesus becomes a reality when Christians share bread and wine
  • Bread and wine are symbols of heavenly feast, which Christians will partake in God’s kingdom.
  • The Lords supper is also a sacrifice of praise and thanksgiving to God.
  • It is a time for rededication to Christ and self-renewal.
  • Through the celebration of the Lords supper, Christians anticipate the second coming of Jesus and the establishment of Gods Kingdom.
  • It is also a time to remember the death and resurrection of Jesus and reflect on God’s love for humankind.

b. The Argument about Greatness. Read Luke, 22: 24 – 30

  • A question arose among the disciples.
  • They wanted to know who among them was the greatest?
  • Jesus told them that they do not belong to the world system of authority given on the basis of wealth and fame.
  • The authority among the disciples will be determined on the basis of their service to others.
  • The greatest is the servant.
  • Jesus likened himself to a servant hence disciples are called to serve.
  • By sharing in trials and sufferings of Jesus, the disciples will share in his ruling power over the new Israel.
  • Leadership in church should be understood in terms of service – being a servant of people.
  • In the community of Christians, all people who are followers of Jesus are all equal.

c. Jesus Predicts Peters’ Denial. Read Luke, 22: 31 – 38

  • Jesus told peter that Satan had received permission to test or tempt all the disciples but Jesus had prayed for Peter’s faith not to fail.
  • Jesus told Peter that he shall deny Jesus three times before the cock crows.
  • Jesus was telling his disciples that they will encounter hostility in their evangelism hence they should be prepared for suffering and opposition because of Him as Isaiah 53:12 says ‘he shared the fate of evil men.’
  • Jesus death was imminent inevitable. The disciples were expected to be strong

Prayer, Arrest of Jesus and Denial by Peter

a. Prayer on the Mount of Olives. Read Luke. 22: 39 – 46

  • After celebrating the last supper, Jesus went to the Mount of Olives with his disciples to pray to resist temptation.
  • Jesus went ahead of his disciples, knelt down and prayed.
  • Jesus left them to pray by himself. He said” Father if you will, take this cup of suffering away from me. Not my will, however, but your will to be done” (42).
  • An angel came to strengthen him. He prayed earnestly, in agony and turmoil great than the physical pain. He sweated great drops of blood.
  • After praying, Jesus found his disciples asleep “worn out by their grief” vs. 45).
  • Jesus asked them to wake up and pray to avoid temptation.

Significance

  • The disciples fell asleep.
  • This was a sign of moral and physical exhaustion.
  • Jesus expressed inner struggle about the fulfillment of his messianic mission.
  • He prayed for God’s help.
  • Christians should always pray to avoid temptation and seek God’s help.

b. Betrayal and arrest of Jesus. Read Luke, 22: 47 – 53

  • Jesus was arrested by: the chief priest, elders, officers of the temple guard, and a crowd of people as he talked to his disciples.
  • He was taken to the house of the high priest.
  • Judas had identified Jesus with a kiss.
  • Jesus asked Judas” him “Judas, is it with a kiss that you betray the Son of man?”
  • Jewish religious leaders had come to arrest Jesus as they arrested other criminals.
  • Jesus told his disciples not to resist his arrest.
  • He rejected armed resistance refusing the role of a political messiah.
  • Peter followed him from a distance.

c. Peters Denies Jesus. Read Luke, 22: 54 – 65

  • After Jesus was arrested he was taken to the house of the High Priest.
  • As Peter sat warming himself with others, a maid identified Peter.
  • She said, “This man too was with Jesus. Peter denied knowing Jesus three times.
  • After the third denial, the cock crowed just as Jesus predicted.
  • Jesus turned and looked at Peter who remembered the words of Jesus.
  • “Peter went out and wept bitterly” (Vs. 62).
  • Weeping was a sign of repentance

The Trials and Crucifixion of Jesus

a. Trials of Jesus by the Various Authorities

i. Trial by the Sanhedrin Lk.22: 66 – 71

  • After being taken to the house of the High Priest, the next morning Jesus was taken to the Jewish religious council or court; called the Sanhedrin.
  • They all asked him if he was the messiah.
  • Jesus said they wouldn’t believe whatever he says. But “ the Son of Man will be seated on the right hand of Almighty God.” (Vs. 69).
  • Jesus told them he was the Son of God.
  • The Sanhedrin accused Jesus of blasphemy, a sin punishable by death.

ii. Trial before Pilate. Read Luke 23: 1 – 5

  • The second court was the Roman court.
  • The judge was Pilate, the Roman Governor.
  • In this court the Sanhedrin accused Jesus of:
    • Inciting people to revolt, and rebelling against Roman authority
    • Forbidding people to pay taxes to the Emperor
    • Claiming to be the king, a Messiah,
  • They could not accuse him of blasphemy before Pilate since this offence was not acceptable under the Roman law.
  • Pilate asked Jesus if he was the king, Jesus replied, “ So you say”. (vs.3). Pilate found no fault with Jesus so he sent him to Herod.

iii. Trial by Herod. Read Luke, 23: 6 – 12

  • Herod was in Jerusalem.
  • When Jesus was brought before him, he expected Jesus to perform miracles to impress him.
  • He asked Jesus many questions and Jesus kept quiet.
  • Herod and his soldiers mocked Jesus, and ridiculed him.
  • They put on him royal clothes; then sent Jesus back to Pilate.

iv. Jesus is sentenced to Death. Read Luke 23: 13 – 25

  • Jesus was brought back to Pilate a second time.
  • Pilate repeated that Jesus was not guilty (innocent) of any crime.
  • Pilate offered to have Jesus beaten and then released.
  • The crowds, leaders and chief priests gave their judgment. “Kill him!” and release Barabbas, who was a rioter and a murderer.
  • Pilate did not find Jesus guilty, but he did what they wanted.
  • He released Barabbas and “handed Jesus over for them to do as they wished” (vs. 25).

v. The crucifixion of Jesus. Read Luke 22: 26-43

  • Jesus was led away to be crucified.
  • Solders forced Simon of Cyrene to carry the cross for Jesus.
  • Women followed Jesus and weeping.
  • Jesus told them not to weep for Him but for themselves and their children.
  • Jesus was then crucified at a place called Golgotha (place of skull) or Calvary together with two male
    criminal; one on His right and the other on His Left.
  • Jesus asked God to forgive them (persecutors) for they did not know what they were doing.
  • The Jewish leaders, said “He saved others; let him save himself if he is the Messiah whom God has chosen” (vs. 35);
  • Solders mocked Jesus and said “Save yourself if you are the king of Jews” and one criminal hanged with Jesus mocked Jesus and told Him “Aren’t you the Messiah? Save yourself and me”.
  • The other thief rebuked him saying they deserved the punishment for their deeds but Jesus had done nothing.
  • This thief repented and told Jesus, “Remember me, Jesus, when you come as King”.
  • Jesus told him that he would be in paradise with Jesus on that day (vs. 42 – 43).
  • On top of the cross, Jews wrote, “This is the King of the Jews” (vs. 38).

Death of Jesus. Read Luke. 23: 44 – 50

a. The Death of Jesus.

  • There was darkness from 12 o’clock until thee o’clock.
  • The veil/curtain of the temple tore into two.
  • Jesus cried out with a loud voice “ Father, into they hands I commit my spirit”.
  • At this shout Jesus died.
  • The Roman centurion saw and praised God.
  • He declared, “Certainly this was an innocent man”.
  • The multitude that watched the crucifixion and death went home beating their breasts, a sign of repentance.
  • The women, who knew Jesus from Galilee, stood at a distance watching all these things.

b. The Burial of Jesus. Read Luke 23: 50 – 56.

  • Joseph from Arimathea, a town in Judea sought permission from Pilate to bury the body of Jesus.
  • He was waiting for the coming of the Kingdom of God, a likely secret disciple of Jesus.
  • He was a good and honorable man.
  • The body of Jesus was laid in a sepulchre (Tomb) where nobody had ever been laid.
  • Jesus’ burial in Joseph’s tomb fulfilled Isaiah’s prophecy that the suffering servant of Yahweh was buried in a rich man’s tomb (Isaiah 53:9)
  • The Galilean women and Joseph saw where the body of Jesus was laid.
  • They went home, and prepared spices to use to wash Jesus’ body.
  • They rested on the Sabbath.

c. Relevance of the Suffering and Death of Jesus Christ to Christian Life Today

  • Christians today should practice or do the following activities.
    1. Pray in times of sorrow, pain, trials and temptations.
    2. They should not give up when rejected.
    3. They should be aware of hypocrites and traitors amongst them.
    4. They should be willing to suffer for the sake of the Kingdom of God.
    5. They should be ready to fight for a just cause
    6. They should never condemn the innocent.
    7. They should go through their suffering bravely.
    8. They should know and accept suffering as a part of the Christian calling
    9. They should not be afraid of rejection by people l
    10. They should be encouraged that Jesus suffered for them.

d. In which Ways can Christians Prepare for theirDeath?

  • Death is inevitable.
  • Hence, Christians should at all times: live a holy life, repent sins, forgive those who have wronged them, make a will, accept death as inevitable, and read the word of God

The Resurrection of Jesus. Read Luke 24: 1 – 53

a. The Resurrection

  • Resurrection refers to the event of Jesus rising from the dead
  • After the Sabbath day, on Sunday morning; Mary Magdalene, Mary the mother of James, Salome (Joanna) and other women, went to the tomb with the spices they has prepared.
  • They found the entrance open.
  • The stone covering the tomb was rolled away.
  • The tomb was empty.
  • The body of Jesus was not in the tomb.
  • Suddenly, two men, who were angels, appeared dresses in dazzling and shining clothes.
  • They said “ Why are you looking among the dead for one who is alive? He is not here; he has been raised. ”
  • The women went and told the 11 disciples, who did not believe them.
  • Peter ran to the tomb and found it empty.
  • Women were the first to witness the resurrection of Jesus Christ.
  • This is significant as they (women) were empowered to become witnesses of Christ as evangelists beyond the Jewish culture.

b. Witnesses of the Resurrection of Jesus

The Disciples en route to Emmaus

  • Two disciples were traveling to Emmaus, which was 11 km from Jerusalem discussing Jesus suffering, death and the empty tomb.
  • Jesus met them but their eyes were blinded and they did not recognize him.
  • The disciples explained to Jesus the events that had taken place and how they had hoped that Jesus would liberate Israel from the Roman rule.
  • Jesus explained to them the scriptures concerning the messiah.
  • When they got to Emmaus, they invited him to dine with them for it was evening.
  • When Jesus, “took the bread and said the blessings; then he broke the bread and gave it to them”, the disciples recognized Jesus but he vanished out of their sight (vs. 30-31).
  • They returned to Jerusalem and told the 11 disciples that Jesus has risen.

c. Jesus appears to his Disciples. Read Luke 24: 36 – 49.

  • As the two disciples explained the event that happened on the journey to Emmaus, Jesus came and said to them ‘Peace be with you’ (vs. 36).
  • Disciples were terrified and frightened.
  • He asked them to look and touch his hands, and feet.
  • He was not a ghost.
  • He has flesh and bones unlike ghosts, which do not have.
  • He explained to the apostles his mission, which was prophesied by prophets, and written in the Law of Moses, and Psalms (v.44).
  • He commissioned the disciples to preach repentance and remission of sins and be his witnesses.
  • He also promised to send them the promise of the father (Holy Spirit)

d. The Ascension of Jesus, Luke, 24: 50 – 53

  • From Jerusalem, Jesus took his disciples to Bethany, a town outside Jerusalem.
  • He lifted his hands and blessed them.
  • As he blessed them, he was lifted up and carried to heaven.
  • The disciples worshipped him and returned to Jerusalem with great joy.
  • They continued to go to the temple to praise and give thanks to God.
  • The disciples were now confident about their mission and who Jesus was

e. The Importance of the Resurrection of Jesus to Christians

  • Resurrection is the foundation of Christian faith.
  • Christianity is based on the fact that Jesus resurrected and was taken up to heaven.
  • Further to this:
    1. Resurrection proved that Jesus is the Son of God.
    2. Through resurrection, Christians have hope of eternal life
    3. Through resurrections, Christians are assured of a new life in Christ
    4. Sin and death were conquered by resurrection, giving hope of victory to Christians over death and sin.
    5. Resurrection is a fulfillment of the writings of the prophets. It fulfilled Old Testament prophesies by Moses, Elijah, Elisha and others.
    6. It is a proof that there is life after death.
    7. Through resurrection, man was reconciled to God.
    8. Jesus has power over death, over Satan and his Kingdom of darkness
    9. It led to the coming of the Holy Spirit.

 

STRAND 4: THE CHURCH

Paul and Silas

What Is the Context of Paul and Silas in Prison?

Paul and Silas ended up in prison because they were being followed by a female slave possessed by a spirit. She earned money for her owners by fortune-telling. Even though she was stating truth regarding Paul and Silas, and others with them, Paul was put out with her and cast the spirit from her in the name of Jesus Christ.

Her owners were angry because they lost their ability to make money using the female slave to predict the future.

They seized Paul and Silas and brought them before the authorities claiming they were Jews and advocating customs unlawful for Romans. Even though Paul and Silas were both Roman citizens, they didn’t argue and try to use a ‘get out of jail free’ card.

They were stripped, beaten, and thrown into prison.

Lessons We Can Learn from Paul and Silas in Prison

  1. They praised God while in prison. Even though they’d been beaten and thrown in prison with their feet shackled, they sang hymns and prayed. Their praise in such a bad situation caused those around them to take notice and listen to them.

About midnight Paul and Silas were praying and singing hymns to God, and the other prisoners were listening to them. Acts 16:25

  1. Their praise not only helped them but also those who listened. An earthquake shook the prison, and the doors flew open. Everyone’s chains came loose.

Suddenly, there was such a violent earthquake that the foundations of the prison were shaken. At once all the prison doors flew open, and everyone’s chains came loose. Acts 16:26

  1. What they didn’tdo was important. Roman law required jailers to take personal responsibility for prisoners.

If Paul and Silas (and other prisoners) had bolted when their chains came loose, the jailer would have possibly been put to death. This is why he placed them into the inner prison and fastened their feet in stocks. By not escaping, they saved the life of the jailer.

The jailer woke up, and when he saw the prison doors open, he drew his sword and was about to kill himself because he thought the prisoners had escaped. But Paul shouted, “Don’t harm yourself! We are all here!” Acts 16:27-28

  1. Their example changed lives eternally. Paul and Silas chose to stay in the difficult circumstance they were in (prison) when they could have easily escaped suffering. That example drew the jailer to realize there was something different about them and he wanted whatever they had.

The jailer called for lights, rushed in and fell trembling before Paul and Silas. He then brought them out and asked, “Sirs, what must I do to be saved?” Acts 16:29

In an incredible act of discernment, Paul knew they must not run when the chains came loose, and the prison doors swung open. He knew God was working and using the bad situation for something good.

The jailer was saved along with his family.

They replied, “Believe in the Lord Jesus, and you will be saved – you and your household.” Then they spoke the word of the Lord to him and to all the others in his house. At that hour of the night the jailer took them and washed their wounds; then immediately he and all his household were baptized. The jailer brought them into his house and set a meal before them; he was filled with joy because he had come to believe in God – he and his whole household. Acts 16:31-34

How to Apply These Lessons to Our Lives

There are many lessons to learn from Paul and Silas in prison and they’re applicable to our Christian lives today.

  1. It’s all good.

When we’re suffering in a bad situation, our instinct is to escape. We don’t want to experience pain if we can get out of it.

But our praise to God in times of trouble is genuine. Because we’re doing it knowing He’s allowing the suffering for our good. Or the good of others.

It’s easiest to praise God when we get the promotion, proposal, or a long-awaited fulfilled promise. It’s much harder when we’re suffering. Maybe we’re in a situation where we don’t see a good ending. We’ve lost someone we love. Or we’re letting go of something we want to keep.

Raise the praise when trouble comes into our lives because it’s all good.

And we know that in all things God works for the good of those who love him, who have been called according to his purpose. Romans 8:28

  1. Authentic worship is powerful.

Like a supernatural earthquake at just the right time, God moves powerfully in our lives when our worship is authentic. (No truer can it be than when we’re in pain.) We trust Him with every part of our lives. The good and the bad.

When we surrender our suffering to Him – knowing it’s part of His plan – we will find rest in His work.

God sets us free from our own prisons. He loosens our feet from shackles even when we’re unaware we’re bound. He heals what can only be healed by Him.

I trusted in the LORD when I said, “I am greatly afflicted.” Psalm 116:10

  1. What we don’tdo can be important.

Our flesh may desperately want to act, but when we stay still, we may impact someone else’s life.

Christians are judged by the world. They look to see how we will act and what we’ll do when we’re in a bad situation. Will we bust out the door and head for the hills when times get tough? Or will we seek God and search for His purpose in the circumstances we find ourselves in?

What we don’t do can be important to a lost person keeping tabs on Christian behavior. We all make mistakes and sin, but we need to remember we’re called to a higher standard than the world and what we don’t do is important.

  1. A good example may change lives.

Paul and Silas set an incredible example of Christianity by staying in prison when they could have easily escaped their suffering.

Their behavior in prison affected other prisoners and the jailer.

Consider the example set by Paul and Silas in prison and remember our behavior may also affect other people. What another sees in us in times of trouble can have a deep impact. They may see how we handle a situation and use us as their example to follow.

Paul didn’t plan to go to prison yet he was willing to submit to God, continuing to praise Him even in shackles. His willingness to suffer and yet find joy in the moment is something we all can apply to our lives.

THE GIFTS OF THE HOLY SPIRIT

Introduction

  • The Holy Spirit is the third person in the trinity.
  • There is the power of Christ, the power of God, and the Holy Spirit who gives gifts such as prophecy and healing.
  • The Holy Spirit is mentioned several times in the Bible;
    1. during creation in Genesis,
    2. at the annunciation of the birth of Jesus,
    3. at the beginning of the ministry of Jesus,
    4. during baptism,
    5. revelation of Jesus in the temple
    6. Jesus spoke of the Holy Spirit during his mission or ministry, after resurrection and before ascension

a. The role of Holy Spirit in Church and in Christian lives today JOHN 14:15-26 and JOHN 16: 5-15, ACTS 1: 7- 8

  • The Holy Spirit has many roles in the church and in Christian lives today.
  • These roles are to:
    • Teach Christians on a daily basis messages of Jesus
    • Live in the hearts of believers of Christ
    • Be an advocate, a counselor, helper and a comforter to those who love Jesus Christ and obey God’s commandments
    • He would remind the disciples the words said by Jesus Christ and introduce them to their deeper meanings.
    • Interpret the deeper meaning of the messages of Jesus Christ
    • Reveal the truth and mysteries of and about God
    • Affirm the right of Jesus as the Son of God
    • Reveal the glory of Jesus death
    • Reveal what is right and wrong
    • Give the disciples of Jesus power to become witnesses of Christ.
    • Give courage to the disciples of Jesus and modern Christians to face prosecution on the account of following Jesus
    • Enable the disciples to expose the secret lives and heart of sinful people
    • Guide Christians; help believers to cast away evils spirits, to heal, to preach the word of God, to encourage, and to condemn evil in the society.

b. Paul teaching about the Gifts of the Holy Spirit. 1 Corinthians chapters 12, 13, and 14

  • Spiritual gifts are extra-ordinary favors, talents, abilities, and dispositions given to Christians by God for the benefit of all believers.
  • The gifts are used for the service of others and not for self-glorification and gratification.

The message of Peter on the day of the Pentecost

  • Peter told the disciple that what was happening was the fulfillment of Jesus’ prophecy.
    • He said that Jesus of Nazareth was the Son of God.
    • He said that the suffering and death of Jesus was according to God’s plans.
    • Death was the fulfillment of the Old Testament prophecy.

Gifts of the Holy Spirit

  1. Gift of wisdom : – having deep understanding of issues- ‘seeing far’, being perceptive.
  2. Gift of knowledge : – ability to understand the basic facts about Jesus, His mission and knowledge about spiritual issues.
  3. The gift of faith : – refers to the confidence in God’s help. It is deep trust in God.
  4. The Gift of healing : – ability, and power to heal all forms of sickness by calling upon the name of Jesus Christ.
  5. The gift of performing miracles : – gift of healing miracles, creative miracles for example, dead legs becoming alive.
  6. The gift of preaching
  7. The gift of prophecy : – the ability to interpret God’s word. The ability to foresee what will happen in the future as revealed by God.
  8. The gift of distinguishing spirits or discernment: – the ability to know whether a spiritual gift is from God, the Holy Spirit or from the evil spirit
  9. The gift of speaking in tongues . The ability to utter, speak in a tongue, language unknown to the believer. Tongues are used when addressing God for self-edifications. It is personal growth.
  10. The gift of interpretation of tongues : – the ability to understand and interpret the messages of those speaking in tongues.
  11. The gift of love. (Read 1 Corinthians 13)
  • Paul stressed that all the gifts of the Holy Spirit are to be demonstrated with love.
  • He stressed that love, a fruit of the Holy Spirit is supreme over other spiritual gifts possessed by Christians.
  • It’s the greatest of all.
  • Speaking in tongues, preaching, and martyrdom without love is useless.

Components of Love

  • Love is patient, kind, not jealous or boastful, not arrogant or rude, is not ill mannered or selfish, and does not insist on its own way.
  • It is not disrespectful.
  • It is not irritable or resentful.
  • It does not rejoice at wrong but rejoices in truth.
  • It bears all things.
  • Love believes all things, hopes all things, and endures all things.
  • Love is eternal.
  • Love never fails.
  • The other gifts are temporary but love, faith and hope are eternal.

c. Manifestation of the Holy Spirit in the Church and Christians Today

  • Gifts of the Holy Spirit have been manifested in churches today.
  • We see this manifestation through people possessing the gifts of the Holy Spirit.
  • For example, leaders in church have displayed the gift of wisdom.
  • Preachers and Christian’s ministers have been casting out demons and performing healing.
  • There are reported cases of interpretation of tongues and gift of prophecy in churches today.
  • When Christians display the gifts of the Holy Spirit such as speaking in tongues the Holy Spirit is manifested.
  • Other manifestations of the Holy Spirit are:
    • Through healing, prophecy, gifts of discernment, boldness in preaching, and casting out demons among others
    • Christians helping the poor by giving generosity and in kindness
    • Through singing, dancing, shouting (fruit of joy)
    • Through unity of believers and fellowships
    • Through praying,
    • Christian’s persecutions/temptations

d. Criteria for Discerning the Gifts of the Holy Spirit.

  • Christians who have the Holy Spirit and are guided by Jesus have certain characteristics.
  • These are:
    • They will confess that Jesus is Lord
    • They cannot say a curse.
    • They speak the truth. They worship God and behave in accordance with Jesus teaching.
    • They led by the Holy Spirit and are known by the fruits of the Holy Spirit. These fruits are love, joy, peace, and patience.
    • Such persons serve all Christians without discrimination and strife.
    • They do not do sinful acts such as sexual immorality.
    • They do not practice idolatry, and sorcery.
    • They do not have in their hearts and minds hatred, and jealously or any other negative feelings and actions.

e. The Fruits of the Holy Spirit (Galatians 5:16-26)

  • Paul taught that the fruit of the spirit are:
    • Love
    • Joy
    • Patience
    • Long suffering
    • Goodness or Generosity
    • Faith and faithfulness
    • Peace
    • Meekness and kindness
    • gentleness
    • self- control and temperance.

Answer these questions after reading – JOHN 14:15-26 and JOHN 16: 5-15, ACTS 1: 7- 8 and 1 Corinthians chapters 12, 13, and 14.

  1. What is the role of the Holy Spirit among Christians? (Read a)
  2. Discuss the gifts of the Holy Spirit
  3. Write a talk about the Holy Spirit
  4. Define love?
  5. Describe the different types of love
  6. Why do Christians need the Holy Spirit today?
  7.  State the role of love in church and in Christian lives today.
  8. How has the gift of the Holy Spirit been manifested in Christian lives?
  9. Which activities show that the Holy Spirit is working among Christian in Kenya.
  10. How have the gifts of the Holy Spirit been misused in the church today?

Answers are also in the text. Read sections with answers

  1. The role of the Holy Spirit
    • An advocate, a counselor and a comforter.
    • He would remind and introduce the disciples to the deeper meaning of the word of Jesus Christ. To reveal the myth and mysteries of God.
    • He would affirm the right of Jesus as the Son of God.
    • He would reveal the glory of Jesus’ death.
    • He would enable the disciples to discern and expose the secret heart of sinful men.
    • The gift of the Holy Spirit has been misused today by pride and public manifestation of the gift as a way of show off.
    • Some Christians have misused the gift of Holy Spirit of prophecy by prophesying for money.

Peter’s Message on the Day of Pentecost. Read Acts 2: 14-41

Introduction

  • Jews commemorate Pentecost day.
  • This is the day that God gave Moses his laws on Mount Sinai.
  • It is also referred to as the festival of weeks.
  • Pentecost day was celebrated 50 days after the Passover.
  • It was compulsory for all Jews.
  • On this day, Jews brought offering, the first fruits of harvest, to the temple in Jerusalem.

a. Pentecost Day

  • On the Pentecostal day, the disciples were gathered in Jerusalem awaiting the promise of the Holy Spirit.
  • And as promised, the Holy Spirit came in the form of a strong wind, and tongues of fire.
  • The Holy Spirit rested on the head of each disciple.
  • The disciples received the gift of the Holy Spirit.
  • They spoke in new tongues.
  • Some of the observers mistook this experience.
  • They thought that the disciples were drunk with wine.
  • Peter stood up to explained what was happening and defend the disciples.
  • He told those who saw the experience that the disciples were not drunk. It was in the morning.

b. Peter’s Message. Read Joel 2: 28 – 32

  • Peter told the onlookers that; what was happening is fulfillment of Joel’s prophesies about the outpouring of Gods spirit.
  • He said that Jesus of Nazareth was the Son of God.
  • This was proved by the miracles that Jesus performed.
  • He emphasized that the suffering and death of Jesus was according to God’s plans.
  • Jesus is a descendant of David.
  • Death and the resurrection of Jesus fulfilled prophesies in the Old Testament.
  • God raised Jesus from the dead.
  • He taught that Jesus had both the nature of God and Man.
  • The apostles are the living witnesses of the resurrection of Jesus.
  • Jesus has been exalted and sits on the right hand of God where He is Lord and Judge.
  • They holy Spirit is a gift from Jesus
  • Peter then invited the listeners to repentance so that they could be forgiven and receive the gift of the Holy Spirit.
  • Three thousand souls accepted salvation message and were added to the fellowship of the disciples.

c. After the Holy Spirit Infilling.

  • The disciples sold their possessions and goods and assisted the needy.
  • They did many wonders and signs.
  • They continued to live in unity, worshiping God, fellowshipping together, and breaking the bread.

d. Lessons Christians learn from Leadership of Peter.

  • Christians should be:
    1. Courageous and stand up for Jesus Christ all the times.
    2. Ready to spread the Gospel of Christ.
    3. Win new converts to Jesus by inviting them to repentance.
    4. Have faith in the risen Christ.
    5. Pray to be filled with the Holy Spirit like Peter and those in church leadership should take their roles seriously.
    6. Relevance of the Pentecostal Experience
  • Speaking in diverse tongues signified that Christianity is a universal religion.
  • It pointed out the importance of all languages when communicating to God.
  • There were no specific languages for speaking with God, as it was when Latin was the language of literacy and Christianity.
  • Christians should be bold in their preaching.
  • They should not be afraid as they have the counsel and helper, the Holy Spirit.
  • Christians should understand that God chooses anyone as a leader, preacher, and witness of Christ.
  • Pentecostal experience signifies that Christians need to receive and be filled with the Holy Spirit.

STRAND 5:CHRISTIAN LIVING TODAY

COURSHIP AND MARRIAGE

  1. Definition of Marriage.
  • Marriage is a binding legal union between a man and a woman who agree to have a lasting relationship as husband / wife.
  • Marriage partners choose each other.
  • In some cases, senior member of the family and church influence the choice of a marriage partner.
  • When marrying partners agree to marry, they are joined in church and they become husband and wife.
  • Marriage is thus a covenant in which the partners give themselves to one another.
  • Marriage involves other members of the community hence it is a social and community affair.
  • Marriage is a permanent union.
  • Marriage is a community requirement in which everyone in the community participates.
  • Each person is expected to undergo marriage because it is a rite of passage.
  • Marriage gives a person, a high social status and prestige in the community.
  • Marriage is also a covenant between a man and a woman that should not be broken.
  • Two people are joined in marriage in order to procreate and perpetuate the community.
  • Once married, a couple is allowed to have sexual relationship, and companionship.
  • Marriage is an expression of and fulfillment of mutual love and comfort.
  • It enhance unity; social prestige, and respect in society.
  • Purpose of marriage is sexual fulfillment; cultural and social requirement; obligation to build a family; and procreation although children are a gift from God.

Forms of Marriages

  • There are many forms of marriages.
  • There is a marriage ceremony organized as a symbol or mark of the union between a man and a woman.
  • These marriages ceremonies are either civil, or religious.
  • The main religious ceremonies are Christian, Islamic, Hindu, and Sikh among others.
  • We also have African customary ceremonies many of which are polygamous.
  • Christianity does not allow polygamous marriage.

Secular Approaches to Marriage.

  • In the modern world, some people choose not to marry for personal reasons.
  • Some people have children without getting married while others opt to have a marriage without children.
  • Husband and wife are equal.
  • Monogamy is practiced for economic reasons.
  • In some families’ women are the heads of the family.
  • Choosing a partner is an individual act and not communal.
  • In marriage traditional qualities of a good wife such as industrious, honesty, and hospitality are not considered.
  • The modern society values external beauty, financial status and social status.
  • As a result, there is a high rate of marriage, separation, and divorce.
  • At times young people fail to be married in church.
  • There is no formalization of marriages.
  • These marriages are called “Come-we-stay” arrangements.

Gender Issues in Marriage

  • The wife is subordinate to the husband but had rights.
  • Marriage did not end with death of the husband.
  • The wife was inherited by one of her husband’s brother.
  • This is widow inheritance / Levirate marriage.
  • She could also refuse to be inherited but remained married to that man even in death.
  • The wife could not marry outside the family because of dowry.
  • There was dowry payment to parents.
  • If a wife died, the man would marry the sister of his dead wife.
  • This is surrogate marriage.
  • Those who did not marry were considered “lesser humans”.
  • Young people were prepared for marriage during initiation, which was witnessed in a public ceremony.
  • During marriage, couple makes vows to each other.
  • The ancestors are invoked to bless the marriage.

Factors that Lead to a Stable, Healthy and Successful Marriage

  • People are different and they understand their roles differently.
  • Factors which can lead to a healthy marriage include:
    • mutual responsibility by the couple. This occurs if there is mutual consultation with each other in decision-making.
    • forgiveness of each other.
    • good treatment of each other especially with equal respect.
    •  sharing scriptures together.
    • giving love and respecting each other.
    • having a faithful sexual relationship
    • being open and honest.
  • African traditional qualities of a good wife who is described as:
    • hardworking
    • fertile
    • morally upright
    • generous
    • kind
    • obedient
    • humble
    • clean
    • beautiful
    • polite
    • warm hearted
    • hospitable.
  • Qualities of a good husband, which are described as:
    • being able to provide good leadership in the family
    • being aggressive
    • wise,
    • brave
    • courageous
    • responsible
    • good property manager.
  1. Christian Teaching about Marriage.
  • Christians teach that marriage is sacred and that it is a divine institution, which is ordained God.
  • God started it when he created Adam and Eve.
  • Marriage should therefore be monogamous and permanent as God protects marriages.
  • The woman should submit to the husband who is told to love the wife as Christ loved the church.
  • Church teaches respect of each other.
  • Marriage is complete even without children as it is between a male and a female.
  • Marriage is not obligatory and it ends when one partner dies.

Christian’s preparation and approach to marriage

  • Christians organize youth seminars, and rallies to teach the youth how to
    • choose marriage partners and how to treat wife / husbands;
    • care for the children;
    • behave towards in laws;
    • acquire wealth (men);
    • and head a family.
  • Youth are taught to avoid sexual intimacy before marriage.
  • Those intending to marry are encouraged to go for pre marital counseling.
  • During counseling, they are informed that love is the most important bond of unity in marriage.
  • Church encourages partners to go for HIV /AIDs test before.
  • Marriage ceremony is conducted in church

Choice of a marriage partner

  • There are many ways of identifying a marriage partner.
    • arrangement by parents. If not one can make an individual decision and choose a wife or husband.
    • through an intermediary or third party.
  • In African traditional polygamous marriages, the first wife identified a wife for her husband.
  • Girls would be given out to a chief as a gift
  1. Courtship in African Traditional Society (A.T.S).
  • Courtship varied from community to community.
  • Courtship is the period between engagement and wedding ceremony.
  • During courtship premarital sex is forbidden.
  • Girls and boys dressed with bracelets and rings.
  • Courtship was important in A.T.S.
  • This was because the man and woman who were girls and boys got to know each other better before marriage.
  • It was a period when girls/boys were instructed in family life education.
  • It was also a period for linking the two marrying families.
  • The couple had time to learn about one another’s character, and know their families.
  • It is a symbol (sign) of the girl’s presence in her home (maternal home).
  • She continues to live with her own people.
  • The families and clan had an opportunity to check if the marrying couple was related and if their clans were acceptable to the parents.
  • Courtship gives time to the two families to negotiate and pay the bride wealth or dowry.
  • Bridal Wealth, dowry, bride price are all expressions of partnership.
  • The family of the man pays dowry to the family of the woman.
  • Some churches disregard bride wealth, while others encourage it.
  • Dowry is paid in different forms.
  • The girl’s family decides what it wants.
  • Will it be livestock (poultry, pigs, camels, cows, goats, and sheep), beer, grain, jewellery and clothes among others?

Importance of dowry

  • It acts as a compensation for the girl’s labor and seals the marriage covenant.
  • It is a public expression of appreciation for the coming of a new wife/mother into the man’s family.
  • It promotes friendship and cements relationship between families.
  • It shows commitment and seriousness of the future husband.
  • After dowry payment, the woman belongs to her husband.
  • A ceremony is carried out depending on the community.
  • Bride price payment is accompanied by marriage ceremonies.
  • Lastly dowry helps in maintaining peace

Traditional African approaches to marriage preparation

  • Polygamy is one husband, married to many wives.
  • Polygamy is allowed by the African traditional religion because it occurs if the first wife is barren; ensures that all women have husbands; prevents infertility; provides extra labor in
    farms.
  • A polygamous man has a higher status because many wives symbolize wealth.
  • Children are important in a marriage because they promote social status of their parents.
  • They cement a bond of unity between husband / wife.
  • They are a source of labor, and wealth.
  • They are heirs to the family wealth
  • They provide security to the family.
  1. Divorce
  • is legal dissolution of marriage
  • Christians allow divorce because of specific grounds.
  • Divorce was rare in African traditional societies.
  • Divorce is granted under circumstances of: adultery, witchcraft, laziness, cruelty and disrespect of wife.
  • In the contemporary society, divorce is sought after or allowed because of: unfaithfulness in marriage or adultery; domestic violence; misuse of family resources; childlessness; in-law interference and alcohol abuse.

Legal reasons for divorce

  • According to the laws of Kenya, divorce is allowed under the following reasons;
    • adultery;
    • if a man deserts his wife for more than 3 years;
    • if a partner becomes insane;
    • domestic violence for example, physical, and psychological torture.

Christian teaching about divorce

  • Christians discourage divorce because marriage is a permanent status.
  • There is no room for divorce.
  • Church discourages divorce because of its adverse effects.
  • Some denominations allow divorce if there is adultery.
  • God hates divorce.
  • Married couples should remain faithful to each other
  • Effects of divorce are
    • strained relationships
    • children suffering psychologically,
    • experiences of rejection.
  • A divorcee faces social stigma, rejection, and isolation.
  • If parents separate, they create single parent families.
  • These families suffer from economic hardships and feelings of failure and inadequacy.
  1. Celibacy as an Alternative to Marriage.
  • Celibacy is a Latin word “Coelebes” meaning bachelor.
  • Why do some people fail to marry? There are many reasons.
    • Some of these are to pursue education leading to delayed marriage; and career demands (workaholic).
    • Other people are discouraged by examples of failed marriages.
    • economic independence
    • poor health
    • HIV /AIDS
    • mental illness
    • parental interference
    • disappointment from past failed relationships. This happens if parents do not approve a partner.

 

 

 

 

RESPONSIBLE PARENTHOOD

The Family

Introduction

  • As society grows and changes, the family grows and changes.
  • As a result, there are several types and practices of the family.
  • Family is the basic social unit of human society.
  • This basic unit is extended to include relatives bound together by blood, marriage, friendship, and adoption.
  • They are all members of the family.
  • In Kenya, there are many types of families.
  1. Types of Families
  2. i) Nuclear family
  • is parents and their children.
  • It is father, mother, and children.
  • There is an increase of monogamous families or nuclear because of urbanization as rural youth come to towns in search of white-collar jobs.
  • Migration to cities by people of different tribes has led to pluralism.
  • Education, high cost of living has led to the death of the African culture, which required men and women to marry many partners to produce many children to defend their tribe.

Advantages of nuclear families

  • the man is able to give undivided attention to one wife and children.
  • there is sharing of mutual love, and peace in the home.
  • it is economical to manage one family.
  • there is little competition for attention, less strife, quarrels and stress.
  • it is easier to monitor the behavior of a few children.
  1. Polygamous family
  • Father, mothers, children.
  • These types of family have disadvantages in modern Kenya.
  • Modern society is a cash economy.
  • Thus if a man has many wives and children, they may lack basic necessities like food, shelter, education and clothes.

iii. Single parent family

  • one parent, and children.
  • Single – parent families are created by several circumstances.
    • parents separating. Separation of parents is due to several reasons. These are for example, one partner going to another country and failing to return to his or her country and family.
    • a single family is created by divorce. Divorced parents may decide not to marry again.
    • when one parent refuses to marry. This happens when a girl gets pregnant and the boy does not marry her.
    • because of death of a spouse. The remaining parent may decide not to remarry.
    • when some mothers decide to have children without marriage. This may not be correct as there is no research to suggest it.
    • is imprisonment of one partner for a long time. One parent is left looking after children because one is in jail.
  1. Extended family
  • father, mother, children, uncles, aunts, and cousins.
  • This is the common family type in traditional African communities.

v . Children led family

  • This happens when parents die and the 1st born takes care of brothers and sisters including cousins.
  1. Grandparent headed family
  • The HIV/AIDs epidemic has introduced this type of family where grandparents take care of their grandchildren due to the death of both parents especially the mother due to HIV / AIDS
    disease.
  • This scourge has made many children orphans.
  • In other cases parents go for further studies abroad and leave their children with their parents.
  1. Traditional African Family Values and Practices
  • In African societies creation of a family is through marriage, and subsequent procreation.
  • Family is viewed as a sacred institution in African society.
  • The African traditional family includes the dead (ancestors), the unborn children and the living.
  • An African traditional family has obligations and duties. These were
    • offering sacrifices to ancestors,
    • Pouring libations; and
    • Giving the dead decent burials
    • Providing basic needs to their children
    • Bringing up children to be morally upright individuals.
  • Further to this, the African traditional family is responsible for the upbringing, caring, and protection of its children.
  • This is demonstrated by the nuclear family, which provides necessities required to meet and satisfy the economic needs of its members.
  • The African traditional family is expected to participate in communal activities.
  • Work in the family was divided according to age, gender and social status.
  • Each family member worked for its basic needs as well as the welfare of the community.
  • The African family had well-stated and practiced values. There were
  1. respect for family members
  2. Providing responsible parenthood, which is the process of bringing up children to become all round or self reliant persons
  • Educating children in all aspects of life. Parents and the extended family members helped their children to develop intellectually and cognitively.
  • The family taught children physical skills.
  • It also gave children confidence to appreciate their physical strength.
  • Children were taken through a rigorous physical curriculum of games such as wrestling, swimming and running to develop their physical strength.
  • Children’s bodies were nourished thoroughly.
  • They were served good and nutritious food, which improved their muscle strength.
  • Children were taught social skills.
  • They learnt how to behave towards adults, peers and grandparents.
  • They developed social skills since parents allowed them to socialize and interact with other children, grandparents and the community.
  • This made them grow socially, emotionally and psychologically.
  • They had a curriculum for teaching and training in traditional African religious values, family matters, moral and social values.
  • This teaching of children started from an early age.
  • The teaching method used was observation and practice.
  • Parents taught by being good role models.
  • They were expected to model desired values and family practices.
  • Children were taught how to relate with one another as brothers and sisters.
  • Parents were to show tolerance to children.
  • These values show that African parents understood their parental roles and responsibilities.
  • These values were sometimes; exploited by the irresponsible family members or specific individuals.
  • This exploitation encouraged dependency, leading to conflicts, competition, hatred, and jealousy.
  • Christian parents are expected to train their children to
    • o know God;
    • o be self-disciplined, and follow the Christian way of living.
  • Another duty is to provide basic needs to their children.

Christian Understanding of the Family

  • Among Christians, family is sacred and instituted by God.

Role of Children in the Christian Family

  • A Christian child is expected to
    • obey parents
    • honor them,
    • respect parents.
  • This is one of the Ten Commandments given to Moses by God.

Parenting styles

  1. Dictatorship /authoritative / autocratic – the parents is the final authority, imposes decisions
  2. Permissive or liberal style – also referred to as “Laissez faire” the children do as they want
  3. Democratic style – parents discuss with their children on family issues. This is the best style.

Problems Related to Family Life Today

  • Families are faced with numerous problems such as
    1. Children abuse – sex assault, beating
    2. Domestic violence – abusive language, frequent fights, emotional abuse
    3. Diseases e.g. HIV / AIDS epilepsy, autism.
    4. Children with special needs, blindness, deafness or those with mental challenges, motor co – ordination (Autism)
    5. Separation, divorce
    6. Childlessness
    7. Single parent families – economic hardships
    8. Misuse of family resources, economic crisis
    9. Affluence – a lot of wealth
    10. Unemployment, underemployment
    11. Retrenchment – lying off of some employees in order to reduce the workforce
    12. Mismanagement of family finances
    13. Alcohol and drug abuse
    14. The generation gap
    15. Poor relations with in-laws
    16. Cultural and religious differences

Traditional African Approaches to Problems Related to Family Life Today

  1. Individuals were prepared for challenges of family life right from childhood
  2. Adolescents, initiates were given family life education
  3. People entered marriage knowing that it’s a lifelong union
  4. Rules were clear to govern marriage relations
  5. Polygamy helped reduce unfaithfulness
  6. There were no single parent families. Members lived together reducing loneliness
  7. Widows / widowers were encouraged to marry again
  8. Traditional brew was taken in moderation

Christian’s Approaches to Problems Related to Family Life Today

  1. Christian families are obliged to live according to Christian principles and values such as mutual respect, self discipline, understanding, honesty, faithfulness, love and forgiveness
  2. Premarital counseling is carried out
  3. Church holds regular seminars and conferences on family life matters. Love and respect for each other. Christian wife to submit to husband who is head of the family. They are taught to take each other as complementary and equal partners.
  4. Women are encouraged to form participate in church organizations e.g. mothers union, women’s guild where they learn roles of being a wife, mother, and a woman.
  5. Some churches offer advice to families on management of their families. They are encouraged to have investments.
  6. Breadwinner is encouraged to write a written will
  7. To improve the parent – child relationship churches offer guidance and counseling to the youth Christian parents are advised to set positive role models to their children
  8. Parents are encouraged to be open and promote effective communication with their children
  9. Churches in case of serious family conflicts such as child abuse, domestic violence, advise legal action.
  10. Churches organize youth seminars where they talk about drug abuse, premarital sex, negative peer pressure and media influence etc.
  11. Relevant information is passed through books, pamphlets, magazines, media FM, TV etc.
  12. Some churches welcome unwed mothers
  13. Churches provide health services, guidance on HIV / AIDS
  14. Some churches care for widows, orphans widowers and the needy

CHRISTIANS APPROACHES TO LEISURE

Meaning of Leisure

  • Work is an obligation – however people cannot work 24 hours.
  • They need to rest.
  • God rested on the 7th day after work.
  • Work and rest are complementary elements of human life.

Definition of Leisure

  • This is the time when one is free from work or other duties.
  • Time at one’s own disposal, which can be utilized in a productive manner depending on one’s interests and abilities.
  • Leisure provides mental, physical relaxation, spiritual, emotional relaxation and enrichment

Forms of Leisure

Passive

  • Passive involves use of mental energy
  • Examples of activities of passive leisure are
    • Watching television
    • Reading story books
    • Playing video games
    • Chatting with friends

Active

  • there is use of physical energy
  • Examples of activities of active leisure are
    • Jogging
    • Mountain climbing
    • Gardening
    • Dancing
    • Tree planting
    • Playing football

Leisure is used for

  • Enjoyment
  • Entertainment – song, dance, watching movies etc
  • Relaxation – exercises
  • Socialization – sharing, education
  • Religious engagement – wedding ceremonies, visiting the sick, worship
  • In passive leisure others entertain while in active leisure the person is active, whole body is involved.

Active leisure enables a person to

  • Develop his/her body
  • Build stamina
  • Strengthen relationships etc
    • Some leisure activities are dangerous e.g. boxing, motor racing; while others are expensive e.g. golf.
    • Other leisure activities are addictive while others are unproductive.
  • Leisure activities should be planned for
  • Leisure activities can also be economic, income generating activities.
  • In traditional African society leisure permeates all aspects of life.
  • Leisure activities accompany work.
  • Leisure and work were entertainment.
  • Work was accompanied by singing, reciting stories sharing past events.
  • Examples of leisure activities in traditional African society include
    • Wrestling
    • Running
    • Playing ajua
    • Mock fighting
    • Swimming
    • Spear throwing
    • Poetry
    • Music and dance etc
  • Leisure activities that were communal include
    • Bull fighting
    • Tongue – twisters
    • Poetry recitation
    • Telling of myths legends
    • Dancing
    • Brain teasers
    • Riddles etc
  • Work in African society included fishing, tilling the land, herding, hunting, harvesting o most leisure activities in traditional African society were active form of leisure, communal, not individualistic and not for monetary gains
  • All forms of leisure had an educational value.
  • Folk stories had a moral value.
  • People were taught not to be selfish, greedy jealousy etc
  • Myths and legends tell of the origin of the community and its history of important people as well as history of the community.
  • In African traditional society, leisure led to acquisition of values or virtues such as co – operation, sharing, solidarity, love, bravery, empathy, endurance, tolerance etc.
  • Most activities were linked to the worship of God and, veneration of the ancestors
  • Leisure activates were organized along gender and age group season (E.g. harvest – dancing, singing); wet rainy seasons – boat swimming
  • Rites of passage e.g. initiation, marriage, birth and naming provided leisure activities
  • Leisure activities were planned for

Christian Teaching on Leisure

Christian teach that:

  • Work and leisure are of divine origin. God rested on the 7th day after working
  • Leisure is a gift from God leisure should be put to good use. Its not be wasted
  • Leisure provides us with the opportunity to worship God. Leisure should be used to serve God.
  • Christians associate leisure with personal growth and fellowship
  • Jesus recognized the need for rest by withdrawing his disciples from their active ministry. It’s good to have time alone for reflection, rest, visit friend etc.
  • Leisure should be used to seek God and help others e.g. Jesus prayed, helped the needy restored people’s health.
  • Ways Christian use their leisure time – activities
    • Worshipping God
    • Visiting the sick
    • Caring for the needy
    • Resting
    • Watching television
    • Chatting with family members
    • Retreat – time spend away with a group of people to be alone with God
    • Visiting friends, relatives
    • Reading the bible
    • Praying etc

Importance, Use and Misuse of Leisure

Importance of Leisure

  • Leisure is necessary. It’s important in various ways
    • It is a good time to assess the work we have done (Reflection time)
    • It brings people together leading to self – growth and fulfillment (Social function of leisure)
    • Leisure helps individuals to discover their hidden talents
    • Leisure relaxes the mind – a change of activity, relieves the mind
    • Leisure refreshes the body – restores lost energy
    • Leisure enables Christians to offer charity to those in need
    • Leisure provides time for worship and spiritual renewal
    • Leisure gives one time to rest
    • It’s time for recreation
    • Give one time to attend social occasions
    • Allows people to travel and visit friends and relatives
    • Leisure can be used to enhance and acquire new skills and knowledge
    • It’s a time to develop and discover ones talents

Uses of Leisure – Proper use of Leisure

  • Leisure can be used for
    • Religious experience
    •  A time for rest
    • Leisure is used to provide us with time to help others
    • Leisure can be used to spread the word of God
    • Development of talents
    • It’s an opportunity for individual growth
    • Leisure strengthens social relationships
    • Leisure can be used for reflection on one’s decision; actions etc leisure activities reveal who we are.
    • Leisure can be used for educative and economic purposes
  • Proper use of leisure is when leisure time is spent doing activities that add value to us.

Misuse of Leisure Today

  • Leisure time can be misused through various activities e.g.
    • Spending too much time in passive activities e.g. pornography watching, watching films that are violent
    • Spending leisure time in idle talk – gossip-leading to conflicts
    • Spending time in gambling, casinos making bets on horses playing Ajua games etc
    • Alcohol and drug taking – when a person over drinks alcohol, spends time drinking at the expense of family, abusing drugs is misuse of leisure time.
    • Leisure can also be misused by engaging in dangerous activities.
    • Night dancing, disco dancing has become a common form of leisure worldwide.

Drug Abuse and its Effects – Alcohol, Soft and Hard Drugs

  • A drug is any substance which when taken may alter or cause changes in the normal functioning of the body.

Drug abuse

  • Improper use of drugs. Using a drug for another purpose than what it is intended for

Drug use

  • Proper use of drugs
  • Drugs are taken in various forms namely
    • Liquid
    • Lotions
    • Ointments
    • Powders
    • Cake form,
  • Drugs are classified as legal and illegal

 

Ways of Administering Drugs

  • Drugs are taken /administered in various ways
    • Infecting
    • Inhaling / smoking
    • Chewing
    • Swallowing
    • Drinking
    • Sniffing / snuffing

Categories of Drugs

  1. Medicinal
  2. Soft drugs
  3. Hard / narcotic drugs

Types of Drugs

  1. Preventive drugs e.g. drugs to prevent polio, cholera, yellow fever
  2. Curative drugs – drugs that cure diseases
  3. Sedatives , palliatives – drugs that alleviate pain, put patients to sleep e.g. drugs for diabetes, heart diseases, asthma, painkillers
  4. Tranquillizers – drugs that relieve tension induce sleep e.g. piriton, valium
  5. Stimulants – drugs used to increase physiological activity of a particular organ. They arouse the activity of the central nervous system / senses.
  6. Volatile drugs – these drugs intoxicate the user, they are derived from petroleum products paint thinners dry cleaning fluids glue etc. stimulants and volatile drugs classified as soft drugs.
  7. Hard drugs or narcotic drugs. These are highly addictive drugs. The body forms dependence on these drugs. These drugs affect the mind causing drowsiness; sleep, stupor and they are the most commonly abused drugs. Examples are

Hard Drugs

Cocaine

  • From coca leaves
  • Its highly addictive
  • Causes mental problems
  • Can lead to death on overdose
  • A very expensive drug
  • Other side effects are confusion, Convulsions, circulatory collapse and rapid heart beat

Bhang / Marijuana

  • A plant of Indian hemp
  • Also called marijuana, Hashish, Cannabis, and Sativa depending on which part of the plant is taken i.e. leaves, stem, or roots.
  • Users become aggressive excited or high
  • Bhang changes perception of space, time and reality
  • It causes drowsiness and irresponsible behavior
  • Its side effects causes people to be engaged in criminal activities e.g. robbery with violence as it gives changes in perception

Morphine

  • It’s used to suppress pain clinically
  • Its addictive
  • Its derived from cocaine
  • Used as local aesthetic

Heroine

  • Its pain relieving
  • Highly addictive
  • Powder heated in foil paper, vapor forms hence smoked referred to as” chasing the dragon”
  • Also called brown sugar
  • Its injected and inhaled
  • An overdose can lead to death
  • Its expensive
  • It causes respiratory problems
  • Its depressive
  • Withdrawal symptoms when heroine is not available are nausea, vomiting, diarrhea and severe anxiety

Soft Drugs

  • Cigarette
  • Alcohol
  • Miraa / khat

Cigarette

  • Made from tobacco
  • Cigarettes contain
    • Nicotine – a highly addictive substance.
    • Carbon monoxide, which damages arteries heart and lungs
    • Tar – black substance which promotes cancer of the throat, heart and lungs
  • Cigarettes are legal drugs in Kenya.
  • Pregnant women may miscarry or terminate the pregnancy if they smoke.
  • Leads to chest respiratory diseases poor blood circulation
  • Leads to destructive fires due to carelessness

Miraa / khat

  • Plants / legally in Kenyan, and other parts of the world
  • They are chewed
  • Causes temporary excitement
  • Makes one loose appetite for food and sex
  • The juice in miraa causes temporary excitement in the user when ingested
  • Miraa makes the user to be irritable

Alcohol

  • Alcohol is a drug made through fermentation
  • It’s a drink used in social ceremonial occasions
  • It’s in form of beer wines, traditional brew (e.g. busaa, muratina, mnazi ) and spirits e.g. whisks, brandy, gin, chang’aa
  • Alcohol is prepared by fermentation or distillation – heating to a certain degree.
  • In African traditional society, alcohol was fermented and used for:
    • Medicinal value
    • Entertainment
    • Marriage celebrations
    • Beer parties given to visitors
    • Excessive drinking was discouraged
    • Drunk people were scorned or scolded
    • Young people were not allowed to drink alcohol
    • When alcohol is taken excessively it is abused

Alcohol abuse

  • Alcohol can lead to body dependence or addiction
  • Consequences of abusing alcohol are such as
    • Squandering family resources
    • Health deterioration
    • Lack of concentration leading to poor quality of work
    • Family break-ups due to frustrations. A man experiences a desire for sex but lacks the ability to perform leading to break ups
    • Deformed foetus if a mother abuses alcohol when pregnant
    • Alcohol destroys brain cells
    • It leads to unruly behavior such as fights, violence
    • One is vulnerable to risky behavior – a drunken person is unable to make proper decisions hence vulnerable to sexual infections such as HIV / AIDS
    • Can make a person cause accidents if driving under the influence of alcohol or staggering on the road.

Causes of Alcohol and Drug Abuse (Reasons why People Abuse Alcohol and Drugs)

  • Frustration due to unemployment, inability to perform well and meet set standards or other personal frustrations.
  • Idleness – when idle some turn to alcohol and drug use
  • Addiction
  • Boredom
  • Bad examples from adults
  • Availability of drugs in the Kenyan market
  • Negative peer pressure
  • Experimentation then addiction
  • Media influence
  • Societal permissiveness
  • Urbanization
  • Pressure of work
  • Financial stress
  • Globalization – foreign world influences

Effects of Drug Abuse

  • Drug abuse poses danger to the health of a person, affects family, society in general. Effects of drug abuse are:

Psychological Problems

  • drugs are addictive.
  • The body becomes dependant on them.
  • It cannot perform without the drugs.
  • It leads to depression, irritability, aggressiveness, paranoia, one becoming afraid to face reality etc.

Crime

  • Robbery, theft, people abusing drugs will rob, steal so as to get money to buy the drugs.
  • Drugs have led to students setting schools on fire,
  • killing their fellow students

Illusion

  • users do not face reality

Health Problems

  • one is prone to diseases because of frequent use of drugs.
  • Drugs weaken the body’s system e.g. alcohol leads to liver Cirrhosis, stomach ulcers.
  • One is susceptible / prone to HIV / AIDS infection STI’s lung cancer, still birth etc

Economic Problems

  • Drugs are expensive.
  • Abuse leads to depletion of family resources leading to poverty

Loss of job and income

Social problems

  • Abuse of drugs leads to family conflicts,
  • leading to separation,
  • divorce, family quarrels fights and even murder (domestic violence)

Accidents

Frustrations

Poor performance in school work

Death

  • People die out of drug abuse.
  • An over dose of heroin, cocaine kills.
  • Alcohol can lead to a blackout, this affects the brain

Remedies of Drug Abuse

  • Drug abuse has become a global problem. Remedies or solutions include:

Law enforcement

  • Through bodies such as UNDCP United Nations International Drug Control ProgrammeAnti Narcotics Police Units, NACADA National Agency for the Campaign against Drug Abuse so as to control abuse of Narcotics and other drugs.

Education

  • People to be educated on the effects of drugs.
  • The curriculum from primary to secondary to include topics on drug abuse.

Guidance and counseling

Religious teachings

  • all religious condemn the abuse of drugs

Family values to be promoted

  • Parents should set good examples to their children
  • Every individual to cultivate individual values. Respect their body and take care of their bodies

-Rehabilitation of drug users / abusers

Christian Criteria For Evaluating the Use of Leisure

  • Criteria – criterion – a principle or standard for judging something.
  • criteria for evaluating the use of leisure
    • Christians, should engage in leisure activities which promote their respect and dignity they should socialize with people who are morally upright (bad company corrupts good morals)
    • God ordains leisure hence it should serve God’s purpose.
    • Leisure should come after work
    • Leisure should be used for the good of others. The activities that are harmful to others should be avoided
    • Activities chosen should enrich their knowledge of God
    • Activities should provide service to others
    • Leisure doesn’t mean laziness.
    • A Christian should not engage in a harmful activity to self but those that promote respect and dignity
    • Christians to avoid activities that lead to sin or to addiction
    • They should perform an activity which develop their physical emotional social and spiritual well being
    • Leisure should be enjoyed with moderation
    • Activities for leisure should be moral, within the laws of God and pleasing to good.

CHRISTIAN APPROACHES TO WEALTH, MONEY AND POVERTY

Definition of the Concepts: Wealth, Money and Poverty

a) Wealth:

  • Accumulation of materials owned by an individual, family or a group of people.
  • Wealth is property that has economic value e.g. land, animals, money, valuable possessions such as jewellery, commercial and residential buildings etc.

Ways of acquiring wealth

  • Inheritance
  • Business
  • Commercial farming
  • Salaried Jobs
  • Investment of money in financial institution
  • Provision of commercial services

b) Money

  • It’s the medium of exchange that functions as a legal tender.
  • It is something that is generally accepted as a medium of exchange, a means of payment.
  • It is usually in form of coins or notes.
  • Good monetary media(money) has certain qualities.

Qualities of money

  • It should be acceptable
  • It should be fairly stable
  • Easy to divide into small units
  • Easy to carry
  • Should be relatively scarce
  • It should be durable
  • Its value should be maintained through proper control of its circulations
  • Money is a measure of wealth.
  • What it can purchase is the value.
  • Money is used to buy services, goods, pay debts etc.
  • Examples of currencies in the world are Ksh. (Kenya), Rand (South Africa) US & Dollar, Pound (Britain) Euro (Europe), Yen (Japan) Etc

c) Poverty

  • State of being without adequate basic necessities of life e.g. food, shelter, clothing
  • It’s a state of helplessness.
  • It is characterized by poor health, hunger, and lack of education facilities, uncared for environment.

Causes of poverty

  • Adverse climatic conditions (Geographical factors)
  • Poor family background (historical and social factors)
  • Political instability leading to civil wars
  • Poor governance
  • Regional imbalance of natural resources
  • Low level of technology
  • Laziness
  • Over dependence on foreign aid

The Traditional African Understanding of Wealth and Poverty

Wealth

  • In African traditional societies wealth was measured in terms of the amount of land, livestock, grains, and wives, children possessed by an individual or the community.
  • Wealth was acquired in various ways.
    • As a gift from God. Most Africans believe that wealth is a blessing from God.
    • Inheritance. In cases where the head of the family is dead, the eldest son becomes the custodian of the estate. The clan and community elders give direction on how the wealth is to be shared out.
    • Bride wealth
    • Farming
    • Exploitation of natural resources – honey, wood for carving, building materials etc
    • Trade. African communities were involved in barter trade where they exchanged good and services
    • Raids – wealth was also acquired by raiding other communities – goats, sheep, Cattle.
  • People were encouraged to work hard to acquire wealthy honesty
  • Wealthy people were highly regarded and were considered for leadership position
  • Wealth was incomplete without a family

Poverty

  • Poverty was viewed as punishment or curse for wrongdoing.
  • Other causes of poverty according to African Traditional Society were: –
    • Laziness
    • Lack of inheritance
    • Raids by other communities
    • Famine
    • Natural calamities
    • Sickness – rendering the individual weak to acquire wealth
  • In acquiring wealth, principles such as value for human life, mutual responsibility, and sharing, communal ownership were emphasized.
  • Places that were communal include grazing land, rivers, and watering places
  • Laziness was ridiculed through songs, riddles and proverbs.

Impacts of the Introduction of Money Economy in Traditional African Society

Introduction

  • Money was introduced to Africa by the Europeans
  • Before colonial period, Africans practiced barter trade – actual goods exchanged with other goods e.g. animals would be exchanged with food grains, millet, sorghum, cowpeas, children exchanged for food during famine.
  • Trade merchants from Asia had introduced into Africa forms of currency such as the cowry shells, gold and the Indian rupees.
  • Europeans introduced currency still used today

Economy

  • careful management of resources, finances, income and expenditure of a family, a business enterprise, community or a country.
  • The economy of a country is to be well managed if it has the ability to meet the social economic needs of her members.

Development

  • It’s measured by the health of its economy in the provision of health, education, housing, sanitation, employment, and longevity of life, decrease of material and child mortality.

Money Economy:

  • Use of money as a means of exchange in economic activities e.g. banking, investment, insurance, payment of goods and services.

Reasons for money introduction

  • Colonization brought a lot of changes such as unoccupied land declared ‘Crown land’ for colonialists.
  • Tax introduction. Africans were supposed to pay taxes to the government. Taxes were paid in form of money.
  • Introduction of formal education School fees was introduced. Fees were paid in form of money.
  • Introduction of modern medical services. People paid medical services using money.
  • Emergence of new lifestyles. Converts to Christianity were emphasized on to have materials, hence had to work to improve their living standards. They built houses, took their children to schools practiced modern family techniques hence had to use money.

Impact of the introduction of money economy in traditional African society

  • Introduction of wage – labor
  • Break up of family ties as people migrated from rural to urban areas in search of employment
  • African land taken by the colonialists, reducing people to squatters hence need to work
  • There was creation of a gap between people – the rich and the poor
  • Emergence of vices e.g. corruption, bribery, prostitution, robbery
  • Deterioration of cherished African values e.g. bride wealth has become commercialized, customs lost etc.
  • Loss of African human dignity. Africans had to pay taxes to the colonial government. They were forced to work in European farms so as to get money. They worked under dehumanizing conditions.
  • Production of traditional food crops declined replaced by cash crops.
  • Individual ownership of land was emphasized. Land could be sold at will
  • There was increase of rural – urban migration leaving the rural people less educated.
  • Exploitation of the poor by the rich – poor wages, overcharging prices on foods.
  • Destruction of the natural environment to create room for building projects, urban centers
  • The cost of living increased. Almost everything is acquired by money.

The Christian Teaching on Wealth, Money, Poverty

Teaching on Wealth

  • Wealth is a blessing from God
  • Those who obey God’s laws, teachings of the prophets are promised blessings by God Deut28: 1 – 4
  • Wealth has duties associated with it e.g. 10% tithe, alms to the poor, and an aspect of stewardship.
  • Wealth should be used wisely. People are not owners of their property but are stewards. Should share with the poor and needy.
  • Wealth is not permanent e.g. parable of the rich fool. When people die, they take nothing with them. Naked into the world, naked out of the world. Job. 1:21
  • Wealth can create a false sense of independence feeling of self reliance no need for God
  • Wealth should be obtained justly – no happiness for a person who gets riches in the wrong way.
  • Wrong attitude to wealth can lead to idolatry and other dangers. Matt.19: 23 – 24 danger of materialism – making riches their God, the love of money is the root of all evil (1 timothy 6:10)
  • It is wrong to discriminate against others on the basis of material possessions. Jesus associated with the rich, the poor, the sick etc.
  • Seek spiritual wealth, which is permanent and more fulfilling than material wealth, which is transitory – temporal. Matt 6:19 – 20)
  • Acknowledge God as the source of one’s riches
  • Use wealth to help the needy
  • Wealth is an instrument to enable us live decently.
  • Obsession with money and wealth leads to sin
  • Church leaders should avoid greed for wealth (1 Timothy 3:3)
  •  God will judge rich exploiters.

Christian Teaching on Poverty

  • Christian teachings discourage irresponsible behavior and habits e.g. laziness, idleness and negligence. Some people became poor because of such.
  • Some people become poor because of misfortunes
  • Others are poor because of judgment due to disobedience to God
  • God cares for the poor
  • Those with more should share with the poor
  • People should work to alleviate poverty in the society
  • Jesus helped the poor so should we.
  • The poor in spirit will be blessed

Christian Approaches/Response to Issues Related to Wealth and Money

  • Christians can respond by:
    • Insistence on fair distribution of wealth
    • Fighting against bribery and corruption
    • Using life skills
    • Practicing Christian values

Introduction

  • Affluence – having a lot of material possessions and a luxurious standard of living. Poverty is a state of lack of the basic necessities.
  • Illegal means of acquiring wealth include fraud, grabbing public land, selling narcotic drugs etc

Factors that have Contributed to Poverty

  • Political instability
  • Lack of formal education
  • Laziness
  • Negative attitude towards work – choosing jobs
  • Historical factors – colonization lack of land
  • Exporting unprocessed agricultural products cheaply then sold back expensively.

Fair Distribution of Wealth / Resources

  • Christians to promote the value of justice, fairness, social responsibility. How? By having anti – corruption crusades, be role models, teach or import skills, advocate for cancellation of foreign debts, taxation to all etc.
  • Fair salaries
  • Promotion of affordable and decent housing
  • Favorable terms of loans
  • Encourage Jua Kali artisans
  • Christians to demand transformation of society through implementation of just economic policies that can ensure fair distribution of wealth.
  • Encourage foreign investors through good infrastructure, incentives e.g. shorter process to register business, security.
  • Christian to encourage investments by churches and inculcate in people the values of hard work, proper time management free education free health care for the poor or needy.
  • Fair distribution of wealth / resources refers to jobs, infrastructure, hospitals, water, agricultural products etc.

Bribery and Corruption

Fighting against Bribery and Corruption

  • Bribery and corruption are related terms.
  • Corruption: – practice of giving a bribe in the form of money, goods or privileges in return for a service.
  • Bribery: – act of giving money, material goods or services to someone to influence the recipient to give underserved favor. It is aimed at influencing a decision to favor.
  • Bribery is a form of corruption.
  • Corruption is some kind of moral degeneration. A practice whereby someone uses his/her influence in an activity that is not morally acceptable.
  • Example of corruption include promotion by a senior for a favor, colluding to miss work, use of government vehicles to attend to personal matters.
  • In Kenya, Kenya Anticorruption commission KACC is a national body formed to fight corruption.

Factors Leading to Bribery and Corruption

  • Unemployment – one will bribe to secure employment
  • Greed for money – caused by peer pressure, poor moral values, wrong ethical foundation about money etc.
  • Fear – fear of being imprisoned
  • Ignorance – giving bribes in form of gifts
  • Disintegration of traditional African values
  • Lack of moral integrity – no Christian values, one having no spiritual basis
  • Frustration in the place of work
  • A perverted conscience

Consequences of Corruption and Bribery

  • Leads to injustice
  • Leads to incompetent supplies of goods or services being awarded hefty contracts – leads to poor services e.g. road construction
  • Poor infrastructure, poor public service delivery
  • Leads to undermining moral fabric of society – leading to social hopelessness and despair
  • Has led to lack of trust in public servants, and the government
  • Discontentment among people.
  • Degrades the personality of an individual
  • Can lead to imprisonment and lose of job

Christian Attitude towards Bribery and Corruption

  • It is condemned as an evil practice (a social evil) Ex. 23:8
  • Bribes cause injustice proverbs 17:23
  • Seen as morally wrong as they negatively affect one’s family
  • Jesus drove out merchants from the temple. They had started exploitation of the poor.
  • Condemned because it degrades the personality of an individual
  • Amos condemned taking and giving of bribes
  • Bribes blinds the eyes. In the parable of John the Baptist condemned soldiers from taking bribes. Corrupt judge and the widow, corruption is condemned
  • Christians are to live righteously and not give bribes or receive. They are the light of the world.
  • Money gained from corruption is not acceptable before God.

Using Life Skills

  • Life skills are abilities, which enable a person to face the challenges of life in an effective way they are
    • Decision making
    • Critical thinking
    • Creative thinking
    • Self esteem
    • Assertiveness

a. Decision making

  • Process of identifying the best alternative to overcome a challenge encountered.
  • Often decisions we make do not only affect us but those around us.
  • Steps to decision – making
    1. Identify the challenge (problem) what’s the problem? What is bothering you?
    2. Understand the challenge / problem: – What is really bothering you?
    3. Find out possible solutions
    4. Find out the possible options and alternatives
    5. Consider the possible consequences for each option
    6. Select the best option
    7. Implement
    8. Evaluate the outcome of the action

b. Critical Thinking

  • Ability to examine and assess a given situation impartially or objectively.
  • It involves reasoning carefully.
  • Getting detailed information, consider the option before making a decision.
  • Critical thinking makes a person responsible for their actions.

c. Creative Thinking

  • This is the act or practice of using ideas imaginatively to solve a problem

d. Self-Esteem

  • This is the regard one has about himself or herself.
  • Self-esteem can be low or high, positive or negative.
  • A positive or high self-esteem person has confidence, is outgoing, social, appreciates self, realistic and independent.
  • A person with low, negative self-esteem is naïve, withdrawn, shy, feels inadequate, and no self-confidence.

e. Assertiveness

  • Ability to express ones feelings and wishes without hurting others.
  • Assertive people are confident; direct in dealing with others assertive people have a high self-esteem.

Christian Values Related to Wealth, Money and Poverty.

  • Values – Beliefs, which guide people on what is right and wrong.
  • There are
    • Social values
    • Cultural values
    • Moral values
  • Values related to wealth are: –
    • Love
    • Honesty
    • Reliability
    • Fairness
    • Justice
    • Respect
    • Faithfulness
    • Humility
    • Persistence
    • Chastity
  • Love – intense emotion of attachment, affection, warmth, fondness, regard for a person or something
  • Honesty – quality of being truthful, fair trustworthy, sincere, genuine. The opposite of honesty is dishonesty.
  • Reliability – being dependable, faithful, predictable, unfailing. The ability of being relied upon and keeping promises
  • Fairness – condition of being unbiased, free from discrimination.
  • Justice – fair dealings with the people, as they deserve according to the law. Being fair, giving people what’s due to them. Opposite of justice is injustice.
  • Respect -Quality of having high regard for somebody or something.
  • Politeness. It’s important to respect other people’s property.
  • Humility – quality of not thinking that you are better than others. Being humble. Opposite of humility is pride, being proud. Those who humble themselves shall be exalted.
  • Faithfulness – quality of remaining loyal or true to someone. Christians should be faithful at their places of work and in allocating their wealth to God’s work. Those who are entrusted with public resources to manage on behalf of the people should show a high degree of faithfulness.
  • Persistence – quality to persevere. Quality to continue steadfastly, unrelentingly despite opposition e.g. the unjust judge and widow, job =, Jeremiah are people who persisted.
  • Chastity – a state of being pure, holy, innocent modest. It is abstinence from actions that may make one impure before God. Christians should strive hard not to defile their bodies in search of wealth. Christians should strive to live holy lives, avoid prostitution, drug abuse; corruption, people use sexual favor to get jobs or promotion. Christians should thus avoid such.

THE END

knec english syllabus pdf

ENGLISH SYLLABUS  101

FORM 1

  1. LISTENING AND SPEAKING
  2. Pronunciation
  3. English sounds: vowel and consonant sounds.
    2. Distinction between English sounds and mother tongue and Kiswahili.
    3. Identification of problematic sounds.
    4. Mastery of problematic sounds in meaningful contexts e.g. through use of tongue twisters, songs and poems.
  4. Listening Comprehension and note-taking
  5. Listening and responding to oral narratives
    (trickster and ogre stories) and riddles.
    2. Features of trickster and ogre stories, and riddles.
    3. Listening and responding to information/articles on
    children\’s rights, child labour, environment, HIV/AIDS and on
    moral values.
  6. Mastery of Content
    1. Debate4. Etiquette
  7. Use of courteous language e.g. thank you, excuse
    me, sorry, please.
    5. Non-verbal cues that enhance listening and speaking
    1. Importance of respecting personal space2. GRAMMAR
  8. Parts of speech-Nouns
    1. Common nouns
    2. Proper nouns
    Non-count- Count -3. Concrete nouns
    4. Abstract nouns
    5. Number – Regular and irregular nouns
    6. Articles – Definite and indefinite articles –
    Functions of pronouns2. Pronouns
    1. Personal pronouns
    2. Possessive pronouns
    3. Reflexive pronouns
    4. Functions of pronouns

    3. verbs
    1. Lexical – Regular – Irregular verbs
    2. Tenses – Simple present tense – Simple past tense

    4. Adjectives
    1. Comparative and superlative forms
    2. Regular and irregular adjectives
    3. Gradable and non-gradable adjectives

    5. Adverbs
    1. Adverbs of manner time and frequency

    6. Prepositions
    1. Simple prepositions e.g. in, of at

    7. Conjunctions
    1. Co-ordinating conjunctions (and, but, or)

  9. Phrases
    1. Constituents and examples of the noun phrase9. Simple sentences
    1. Sentence structure (subject, predicate)
    2. Types of sentences – Interrogative – Imperative –
    Exclamatory – Declarative/ affirmative – Negative

    3. READING

  10. Reading Skills
    1. Identification of the learner\’s reading problems
    in silent reading e.g. moving lips, verbalizing words, use of
    fingers and moving the head.
    2. Development of good reading habits in: – Silent
    reading – Reading aloud – Speed reading
    3. Using a dictionary
    4. Using the library2. Intensive Reading
    1. Study of poems, plays and short stories.
    2. Focus on plot and literary language.
    3. Extensive Reading
    1. Literary and non-literary materials on contemporary
    issues such as: – Children\’s rights – Child labour –
    Environment – HIV/AIDS – Moral values
    2. Adventure stories
  11. Fairy tales
    4. Poem
    5. Plays
    6. Novels
    7. Short stories
    8. Newspapers / Magazines / Periodicals4. Comprehension Skills
    1. Recall, comprehension and application
    2. Summary and note-making

    4. WRITING

  12. Handwriting
    1. Legibility and tidiness2. Spelling
    1. Spelling rules

    3. Building sentence skills and paragraphing
    1. Writing clear and correct sentences
    2. Structure of the paragraph. – Topic sentences
    supporting – Sentences – Clincher sentences – Sequencing of
    ideas – Unity in paragraphs

    4. Punctuation
    1. Capitalization
    2. Final punctuation marks
    3. Commas

    5. Personal writing
    1. Diaries
    2. Addresses
    3. Packing lists

    6. Social Writing Informal letters

    7. Study Writing
    1. Making notes
    2. Taking notes

    8. Creative Writing
    1. Imaginative compositions
    2. Poems

    9. Institutional Writing
    1. Public notices
    2. Inventories

    * FORM 2

  13. LISTENING AND SPEAKING
  14. Pronunciation
    1. Further practice on problematic sounds
    2. Stress and intonation
    3. Rhyme in poetry
    4. Word play (puns)
  15. Listening Comprehension and Note-taking
    1. Listening and responding to 6.2 myths, legends and songs.
    2. Features of myths, legends and songs.
    3. Listening and responding to information on issues of social responsibility, drug and substance abuse equal role of men and women Integrity/anti corruption education information technology
    4. Skills of attention and turn taking through use of dialogues.
  16. Mastery of content
    1. Interviews4. Etiquette
    1. Telephone etiquette

    5. Non-verbal skills in listening and speaking
    1. Facial expressions, gestures and eye contact.
    2. Bowing/curtsying.

  17. GRAMMAR
  18. Nouns
    1. Collective nouns
    2. Compound nouns
    3. Use of phrasal quantifiers e.g. a piece of advice
    4. Possessives2. Pronouns
    1. Number and person in pronouns.
    2. Indefinite pronouns.
  19. Verbs
    1. Auxiliary verbs -primary and modal
    2. Aspect – perfective and progressive
    3. Future time4. Adjectives
    1. Order of adjectives

    5. Adverbs
    1. Adverbs of place and degree
    2. Comparative and superlative forms of adverbs

    6. Prepositions
    1. Complex prepositions e.g. in spite of

    7. Conjunctions
    1. Subordinating conjunctions e.g. because, when, that, which

    8. Interjections
    1. Identification and usage in sentences

    9. Phrases
    1. Constituents of verb and adverb phrases and examples

    10. Clauses
    1. Independent and subordinate clauses (relative and
    adverbial clauses).
    2. Compound sentences.
    3. Complex sentences.
    4. Active and passive voice.

  20. READING
  21. Reading Skills
    1. Scanning and skimming.
    2. Using reference materials (library, encyclopedia
    and the internet).
    3. Interpretive reading.
  22. Intensive reading
    1. Study of novels, plays and poems.
    2. Focus on characterization and themes.
    3. Aspects of style.
  23. Extensive reading
    1. Literary and non literary materials on contemporary
    issues such as: Social responsibility Gender responsiveness Drug and substance abuse Human rights
    2. Biographies
    3. Novels
    4. Plays
    5. Poems4. Comprehension Skills
    1. Recall, comprehension, application and analysis.
    2. Summary and note-making.
  24. WRITING
  25. Spelling
    1. Commonly misspelt words
  26. Building sentence skills and paragraphing
  27. Sentence variety; using simple, compound and complex sentences
    2. Devices of developing paragraphs Giving reasons/examples comparing and contrasting Using idiomatic expressions Using facts/statistics Using rhetorical questions3. Punctuation
    1. Quotation marks
    2. Apostrophe
    3. Hyphen

    4. Study Writing
    1. Summaries
    2. Descriptive essays

    5. Creative Writing
    1. Imaginative compositions
    2. Dialogues

    6. Institutional Writing
    1. Business letters
    2. Posters
    3. Advertisements

    7. Personal Writing
    1. Personal journals
    2. Shopping lists

    8. Social Writing
    1. Invitations

    9. Public Writing
    1. Telephone messages
    2. Filling forms
    3. Letters of apology

    * FORM 3

  28. LISTENING AND SPEAKING
  29. Pronunciation
    1. Stress and intonation in sentences
    2. Rhythm in poetry
    3. Alliteration and assonance in poetry2. Listening Comprehension and Note-taking
    1. Listening and responding to information on:
    HIV/AIDS Rights and responsibilities of citizens
    2. Listening and responding to dilemma and aetiological oral narratives
    3. Features of dilemma and aetiological stories
    4. Receiving and giving instructions
    5. Giving directions.
  30. Mastery of Content
    1. Discussion
    2. Speeches4. Etiquette
    1. Appropriate choice of register

    5. Non-verbal cues that enhance listening and speaking
    1. Appearance and grooming

    2. GRAMMAR

  31. Parts of Speech-

 Nouns
1. Typical noun derivations
2. Gender – sensitive language

2. Pronouns
1. Pronoun case Subjective and objective
2. Demonstrative pronouns

3. Verbs
1. Transitive and intransitive verbs
2. infinitives
3. Phrasal verbs and idiomatic expressions
4. Participles

4. Adjectives
1. Quantifiers – few, a few, little, a little
2. Predicative and attributive adjectives i.e.
position of adjectives

5. Adverbs
1. Formation of adverbs
2. Functions of adverbs (modifiers)

  1. Prepositions
    1. Distinguishing prepositions from connectors and adverb particles.
  2. Conjunctions
    1. Correlative conjunctions, e.g. both……and not only….. but also neither…. nor either…. or8. Phrases
    1. Prepositional and adjectival phrases

    9. Clauses
    1. Conditional and adjectival clauses
    2. Noun clauses
    3. Compound-complex sentences
    4. Direct and indirect speech Form and usage

    3. READING

  3. Reading skills
    1. Study reading
    2. Note-making
    3. Critical reading
    4. Recognizing attitude and tone
    5. Distinguishing facts from opinions
    6. Interpretive reading
    7. Close reading2. Intensive reading
    1. Study of novels, plays, poems and short stories
    2. Focus on critical analysis of three prescribed
    texts: 1 novel I play I play/novel/anthology of short stories
    3. Focus on oral literature

    3. Extensive reading
    1. Literary and non- literary materials on contemporary issues such as: Good governance integrity HIV/AIDS Technological advancement
    2. Newspapers, Journals and magazines on a variety of subjects
    3. Reports
    4. Novels
    5. Plays
    6. Poems
    7. Short stories

    4. Comprehension Skills
    1. Recall, comprehension, application, analysis, synthesis and evaluation
    2. Summary and note making

    4. WRITING

  4. Building Sentence Skills and Paragraphing
    1. Cohesion in paragraphs
    2. Using transitional words and phrases
    3. Choice of words
    4. Recurrent words (different words that refer to the same idea in the paragraph)
  5. Punctuation
    1. Colon
    2. Semi-colon
    3. Dash
    4. Parenthesis3. Personal writing
    1. Reminders
    2. Personal journals

    4. Social writing
    1. Notes of thanks, congratulations and condolences
    2. Telegrams

    5. Public writing
    1. Letter application

    6. Study writing
    1. .Synopsis
    2. Argumentative essays

    7. Creating writing
    1. Imaginative compositions
    2. .Plays
    3. .Short stories

    8. Institutional Writing
    1. Notification of meetings
    2. Agenda and minute writing
    3. Memoranda

    * FORM 4

  6. LISTENING AND SPEAKING
  7. Pronunciation
    1. Distinguish word class on basis of stress
    2. Use of tone to reveal attitude2. Listening Comprehension and Note-taking Listen and respond to:
    1. Oral poetry
    2. Proverbs
    3. Features of oral poetry and proverbs
    4. Information on poverty eradication

    3. Mastery of content
    1. Oral reports

    4. Etiquette
    1. Interrupting and disagreeing politely
    2. Negotiation skills
    3. Turn-taking
    4. Paying attention (listening)

  8. GRAMMAR
  9. Parts of Speech – Nouns
    1. Functions of nouns in sentences e.g. subject, object, complement2. Pronouns
    1. Interrogative pronouns
    2. Relative pronouns

    3. Verbs
    1. Participle phrases
    2. Gerunds

    4. Adjectives
    1. Typical endings of adjectives (e.g. – ful, – less,-ous)
    2. Functions of adjectives

    5. Adverbs
    1. Position of adverbs in sentences
    2. Typical endings of adverbs e.g. -ly, -wards, -wise)
    6. Prepositions
    1. Functions of prepositions in sentences

    7. Conjunctions
    1. Functions of conjunctions in sentences

    8. Clauses
    1. Inversions
    2. Sentence connectors
    3. Substitution and ellipsis

    3. READING

  10. Reading Skills
    1. Note-making
    2. Study reading
    3. Critical reading
    4. Interpretive reading
    5. Responsive reading
    6. Recognising attitude and tone
    7. Distinguishing facts from opinions2. Intensive Reading
    1. Focus on critical analysis of prescribed texts: I novel play 1  play/novel/anthology of short stories
    2. Focus on oral literature

    3. Extensive Reading
    1. Literary and non literary materials on contemporary issues such as: Poverty Eradication Drug and Substance abuse
    2. Journals and magazines on different subjects
    3. Novels
    4. Short stories
    5. Plays
    6. Reports

    4. Comprehension Skills
    1. Summarising and note-making

    4. WRITING

  11. Building sentence skills and paragraphing
    1. Paraphrasing2. Punctuation
    1. Devices for presenting quotations and headings

    3. Personal writing
    1. Recipes

    4. Social writing
    1. E-mails
    2. Fax
    3. Instructions to family and friends

    5. Public writing
    1. Letters of inquiry
    2. Letters of request

    6. Study writing
    1. Reviews
    2. Expository writing
    3. Questionnaires

    7. Creative writing
    1. Imaginative compositions
    2. Autobiographies
    3. Biographies

    8. Institutional writing
    1. Curriculum vitae
    2. Speeches

KPSEA 2024 Exam Papers Free Downloads

KPSEA 2024 Exam Papers Free Downloads

Access high-quality KPSEA 2024 exam papers for free. Enhance your study materials and excel in the upcoming exam. Get an edge now! Download all the KPSEA papers here at no cost.

 

 

 

 

 

Computer Studies Paper 2 Revision Papers {Practical Exams Papers}

NAME: ________________________________________________________ADM NO: ___________

SCHOOL: ____________________________________________________SIGNATURE: _________

DATE: ______________________

451/2

COMPUTER STUDIES

PAPER 2 (PRACTICAL)

TIME: 2½ Hours

 

DIOCESE OF KAKAMEGA

MUKUMU DEANERY JOINT EXAMINATION

FORM THREE

JULY 2021

Term 3

 

INSTRUCTIONS TO CANDIDATES

  1. Create a folder on the desktop of the PC you are using and label it using your Name or Adm No.
  2. Save all your work in the folder created
  3. Answer ALL questions
  4. All questions carry equal marks
  5. DO NOT USE PASSWORDS

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This paper consists of 4 printed pages. Pre-candidates should check the question paper to ascertain that all the pages are printed as indicated and that no questions are missing.

 

 

QUESTION ONE

  1. Using a word processing program reproduce the work below and save the document as Geometry One       [32 Marks]

History of Geometry

Egyptians c. 2000 – 500 B.C.

A

ncient Egyptians demonstrated a practical knowledge of geometry through surveying and construction projects. The Nile River overflowed its banks every year, and the river banks would have to be re-surveyed. See a PBS Nova unit on those big pointy buildings. In the Rhind Papyrus, pi is approximated.

 

Babylonians c. 2000 – 500 B.C.

Ancient clay tablets reveal that the Babylonians knew the Pythagorean relationships. One clay tablet reads“4 is the length and 5 the diagonal. What is the breadth? Its size is not known. 4 times 4 is 16. 5 times 5 is 25. You take 16 from 25 and there remains 9. What times shall I take in order to get 9? 3 times 3 is 9. 3 is the breadth”.

 

Greeks c. 750-250 B.C.

Ancient Greeks practiced centuries of experimental geometry like Egypt and Babylonia had, and they absorbed the experimental geometry of both of those cultures. Then they created the first formal mathematics of any kind by organizing geometry with rules of logic. Euclid’s (400BC) important geometry book The Elements formed the basis for most of the geometry studied in schools ever since.

 

The Fifth Postulate Controversy c. 400 B.C. – 1800 A. D.

 

There are two main types of mathematical (including geometric) rules: postulates (also called axioms), and theorems.Postulates are basic assumptions – rules that seem to be obvious and are therefore accepted without proof. Theorems are rules that must be proved.

Euclid gave five postulates. The fifth postulate reads: Given a line and a point not on the line, it is possible to draw exactly one line through the given point parallel to the line.

 

 

Geometry Today

Today geometry has a wide range of applications. Amongst the applications it is used for includes: Building and construction, Mechanical plant engineering, Art and design. For example, the drawings below have been reproduced using geometry.

 

 

 

 

  1. Change the top most title into size-20, colour – red, double underline, upper case and font type-Goudy Stout, shading colour-green       [3 Marks]
  2. Align the headings of the first three paragraphs and the last to the right       [2 Marks]
  3. Apply a border to each of the headings just aligned in (c) above       [2 Marks]
  4. Group the sets of objects used to create each of the shapes above [2 Marks]
  5. Save the document with the name Geometry Two [2 Marks]
  6. Indent the third paragraph from both left and right margins by 1” [2 Marks]
  7. Adjust the page margins of the document as instructed below [2 Marks]

Top – 0.7”             Bottom – 0.7”

Left – 0.8”            Right – 0.7”

  1. Insert a continuous page break between the third and the fourth paragraph [1 Marks]
  2. Save the document with the name Geometry Three [2 Marks]

 

 

QUESTION TWO

  1. Create a database with the name School Work [2 Marks]
  2. Create the table given below and assign the appropriate data types for the fields. Save the table with the name Students       [6 Marks]
Student No First Name Surname Stream ID
1013 Afaf Salih LION
1030 Alfred Wambui BUFFALO
1033 Amos Gichuki LION
1032 Anthony Ngugi BUFFALO
1037 Bethuel Obonyo LION
1014 Charles Kariuki LION
1006 Cyrus Wangila BUFFALO
1039 David Nabwire LION
1005 Francis Wamalwa BUFFALO
1025 George Kibera BUFFALO

 

  1. Set the primary key of the table to be Student No field [1 Marks]
  2. Create a second table given below and assign appropriate data types for the fields. Save the table with the name Marks       [9 Marks]

 

RecNo Student No Exam Type ENG KISW MATH BIO
1 1013 E1 95 95 75 84
2 1013 E2 59 58 59 35
3 1030 E1 91 65 34 67
4 1030 E2 58 76 35 85
5 1033 E1 65 65 84 68
6 1033 E2 59 95 48 59
7 1032 E1 72 95 56 74
8 1032 E2 78 88 76 49
9 1037 E1 72 89 59 58
10 1037 E2 66 45 85 75
11 1014 E1 85 75 84 75
12 1014 E2 75 65 75 48
13 1006 E1 36 45 26 75
14 1006 E2 84 56 69 95
15 1039 E1 89 83 75 95
16 1039 E2 84 65 35 64
17 1028 E1 90 90 68 43
18 1028 E2 57 32 68 86
19 1025 E1 89 45 66 64
20 1025 E2 75 59 85 59

 

  1. Create a relationship and enhance referential integrity between the two tables       [2 Marks]
  2. Create a form for the table Students and save it as frmStudents       [2 Marks]
  3. Use the form created in (f) above to enter records in the respective table [5 Marks]
  4. Create a second form and for the table Marks and save it as frmMarks       [2 Marks]
  5. Use the form created in (h) above to enter records in the respective table [10 Marks]
  6. (i) Create a query from the two tables above and add the fields Student No, First Name, Surname, Exam Type, ENG, KISW, MATH, BIO. Create a calculated field Total and accumulate the marks for the four subjects. Save the query with name qryResults                                          [6 Marks]
  7. Create a report from the query qryResults and from the report show the sums and averages of all the subjects and the Total.                               [5 Marks]

 

 

 

BIOLOGY FORM 3 END TERM EXAMS PLUS ANSWERS IN PDF

Name____________________________________Class_______________AdmNo:__________

Date__________________________________________Sign_______________

END OF TERM EXAMINATION

FORM THREE

 

BIOLOGY

TIME: 2 HOURS

INSTRUCTION TO THE CANDIDATES.

  • Write your name and admission number in the spaces provided
  • Sign and write the date of examination in the spaces provided
  • Answer all questions in section A and In section C, answer questions 11 (compulsory) and either 12 or 13 in the spaces provided.
  • Answer all the questions in the spaces provided.
  • Candidates should answer all the questions in English.

FOR EXAMINERS USE ONLY

Question/section Maximum score Candidates score
Section A 40

 

 
Section B 40

 

 
Total score 80

 

 

 

 

SECTION A:                                                                                                                                       (34MKS)

Answer all the questions

  1. a) What is transpiration                                                                                                                     1mk

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. b) Give the importance of transpiration in green plants                         3mks

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. Name three mechanisms that hinder self-fertilization in green plants                                             3mks

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. Name two classes of phylum Arthropoda that has cephalothorax                                                    2mks

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. a) Give two roles of testes in humans                                                                                                2mks

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. b) Name two organs that produce the hormone progesterone in female                         2mks

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. a) Give two reasons why an electron microscope cannot be used to view live specimens                   2mks

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

 

 

  1. b) State the function of eye piece tube in a light microscope                         1mk

………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. Name the organelle that is involved in each of the following                                                          2mks
  1. manufacture of lipids

…………………………………………………………………………………….

  1. formation of lysosomes

………………………………………………………………………………………………………………

 

 

 

Process X

 

 

Large fat droplets                                                        small fat droplets

 

  1. a) Name process X                                                                                                                 1mk

 

………………………………………………………………………………………………………………………

  1. State the significance of the process named above       2mks

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. State the use of the following apparatus used in collection of specimens.                          3mks
  1. pooter…………………………………………………………………………………………………………………………………………………………………………………………………………..
  2. Baittrap

……………………………………………………………………………………………………………………………………………………………………………………………………..

  1. Fishnet

……………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. The diagram below shows how gaseous exchange occurs across the gills of a fish
  1. According to the diagram, water and blood flows in opposite directions across the gills
  2. Give the term used to describe the flow                                                               1mk

……………………………………………………………………………………..

  1. Explain the advantage of the flow named above             2mks

……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………… ……………………………………………………..

  1. What difference would be observed if water and blood flowed across the gills in the same direction 2mks

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….. ………………………………………………………

  1. Name two organs in man which displays the flow system named in a) i) above                                      2mks

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..

  1. How are the gill rakers found in the gills of a fish adapted to perform their function                         1mk

…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

 

 

 

 

  1. The temperature of a person was taken before during and after bath. The results are shown in the graph below

 

 

 

37

36                         Before                                                after

Temps                                                                     during

 

35

Time in minutes

 

  1. Explain why the temperature decreased during the bath                                                               3mks

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. What changes occurred in the skin that enabled the body temperatures to return back to normal .4mks

……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. Name the specific part of human brain that controls body temperature                                        1mk

………………………………………………………………………………………………..

 

 

 

 

 

 

SECTION B : Answer question 11(compulsory) and either Question 12 or 13.

  1. In an experiment, a mixture of starch and salivary amylase solution was uniformly mixed in a beaker. 5ml of the mixture was drawn using a syringe and transferred into a visking tubing after which both ends were tightly tied ensuring there is no leakages. Six such viskingtubings were prepared. They were rinsed with distilled water on the outside then transferred at once to water bath maintained at 370c in a beaker. From time 0 and every 5 minutes interval, one visking tubing was removed from the water bath and analyzed for starch. At the same time, the contents of the water bath in the beaker were also analyzed for reducing sugars for each time intervals.

The table below shows the results

 

Timer in minutes Concentration of the food substances
  Starch in the visking tubing mg\L Simple sugars in the beaker mg/L
0 100

 

0
5 92

 

8
10 66

 

34
15 36

 

64
20 16

 

84
25 8

 

88

 

 

 

 

 

  1. Using a suitable scale represent the data on the grid provided below 8mks

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. At what time was there an equal concentration of starch and simple sugars    1mk

…………………………………………………………………………………….

  • Using the graph paper indicate the times when the concentrations of starch and simple sugars were 70mg/L                                                             2mks

………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. Why was the temperature maintained at 370c                         2mks

………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. Name the enzyme that was used in the experiment                   1mk

……………………………………………………………………….……………………………

  1. State and explain the results that will be observed if the water in the beaker was tested for starch 3mks

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

  1. What are the digestive roles of saliva in the mouth                                                                  3mks

……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

  1. a) Describe the structural features of the leaves that decreases the rate of transpiration in plants     10mks

 

  1. b) Describe the mechanism of transport of carbon IV oxide in the mammalian blood             10mks
  2. a) What is pollution                2mks
  3. b) Describe various causes and effects of air pollution and for each cause state its control method

18mks

…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………



 EXAM MARKING SCHEME

231/1

MARKING SCHEME

  1. a) transpiration is the process by which plants lose water inform of water vapor to the atmosphere through the stomata or lenticels.
  2. b)
  • brings about turgor in plants
  • helps to remove excess water especially to the aquatic plants
  • serves to cool plants in hot environment
  • helps in transport of mineral salts/ions and water in the plant
  • protandry
  • progyny
  • heterostyly
  • monoecious/ dioecius
  • incompatibility/self sterility
  • arachnida
  • crustacea
  1. a)
  • secretion of androgens/testosterone rej. Hormone
  • manufacture of sperms/male gametes rej. Gamete alone
  1. b)
  • ovary
  • placenta
  1. a)
  • specimen is mounted in a vacuum
  • specimen is illuminated by beam of electrons which would kill cells
  • dyes used are obtained from heavy metals which are toxic to cells
  1. b)
  • hold the eye piece lens( in position)

 

  1. a) smooth endoplasmic reticulum
  2. b) golgi bodies /apparatus
  3. a) emulsification
  4. b) used to increase surface area for enzymatic activity
  5. a) used for sucking small animals from rock surfaces or bark of trees eg ants
  6. b) for attracting and trapping small animals eg rats
  7. c) used for trapping small fish and other small aquatic aninmalseg crabs
  8. a) i) counter current flow
  9. ii) it maintains a steep concentration gradient hence increases the efficiency of oxygenation of the blood as well as diffusion of carbon iv oxide from the blood to water,.
  10. b) the diffusion gradient would be low leading to low rate of gaseous exchange; equilibrium between water and blood would be reached ; beyond which no further diffusion can take pklace
  11. c)
  • kidney/ nephron
  • placenta
  1. d) its rake like/ saw like/teeth like to trap solid particles (which may damage delicate gills filaments)
  2. a) heat was lost by conduction/ convection fro the body/skin to cold water; the cooler blood leaving the skin enter the general circulation cooling the body
  3. b)
  • vasocontriction thus less blood flowing to the skin surface reducing heat loss;
  • sweating stops
  • shivering
  1. c) hypothalamus

11.a)  plotting – 2mks

Scale – 2mks

Labelling- 1mk

Identifying curves- 2mks

Curve -1mk

  1. b) i) 12.5min ± 0.5
  2. ii) starch; 16min ± 5

reducing 9.5 min ±  0.5

iii) to provide a suitable optimum temperature for the activity of the enzymes

  1. c) amylase( salivary/pancreatic) ; diastase
  2. d) brown color of iodine is retained; because starch is still absent; the starch molecules are too larhe and cannot pass through the tiny poress of the visking tubing membrane into the water in the beaker

OWTTE

  1. e) saliva contains salivary amylase ; that breaks down starch into maltose; and bicarbonate ions that provides a suitable alkaline ph for the activity of salivary amylase during digestion

12 a)

  • Leaves are modified into spines/ thorns ; to reduce surface are over which transpiration can occur
  • Shed their leaves during dry seasons; to reduce surface area exposed to the atmosphere
  • Leaves have thick waxy cuticle; to minimize rate of cuticular transpiration
  • Some of leaves with hinge cells hence can roll or fold to reduce rate of transpiration by exposing fewer stomata to the environment hence reducing chances of transpiration
  • Have sunken stomata which accumulates moisture in substomatal spaces hence low diffusion gradient thus reducing transpiration rate
  • Have reduced number of stomata hence low rate of transpiration since the surface area for water loss is reduced
  • Some have reversed stomatal rhythm to prevent excessive water loss by transpiration
  • Have parenchyma cell in swollen leaves for storage of water eg cactus
  1. b)
  2. i) a weak carbonic acid in the red blood cells/ bicarbonate ions;

carbon iv oxide on entering the red blood cells reacts with water forming carbonic acid; this process is usually enhanced by catalytic activity of enzyme carbonic anhydrase in the red blood cells; being unstable, the carbonic acid dissociates to hydrogen ions and bicarbonate ions; which acts as buffer; the bicarbonate ions diffuses into the blood plasma and transported to the lungs; on reaching the lungs, they undergo chemical processes(accept explanation of the process) resulting to the formation of the carbon iv oxide which is then exhaled

  1. ii) when physically dissolved in plasma/ weak carbonic acid in blood plasma

carbon iv oxide is transported when physically dissolved in plasma to form a weak carbonic acid; the weak carbonic acid being unstable, dissociates to form hydrogen ions bicarbonate ions/ hydrogen carbonate ions; the hydrogen carbonate ions are transported to the lungs ; where they dissociates to water and carbon iv oxide ; from where carbon iv oxide is exhaled; the hydrogen ions remains in the blood plasma and are mainly secteted into the kidney tubules for excretion when in excess; this method is slow and hence inefficient

iii. when bound to haemoglobin in red blood cells

carbon iv oxide binds to the haemoglobin to form carbominohaemoglobin; being somewhat stable it does not dissociate and carbon iv oxide is transported in thuis form from tissues to lungs; because of high partial pressure of oxygen in the lungs the haemoglobin detaches from the carbon iv oxide; and picks up oxygen; the free carbon iv oxide is then exhaled out of the body .

 

  1. a) pollution is the release of substance or forms of energy; in quantities whose effect is harmful or unpleasant to organisms
  2. b) Sulphur based chemicals( Sulphur iv oxide, hydrogen sulphide)

produced by industries, decomposing organic matter and fumes; affects gaseous exchange ; makes acidic rain and damage leaves affecting photosyntheasis

control method– titration, dissolution and use of chemicals to remove harmful gases

smoke and fumes ; produced in areas with heavy industries, motorvehicles and contain carbon ii oxide; carbon ii oxide combines with haemoglobin to form stable carboxyhaemoglobin which is a respiratory poison; affects visibility;

control– factories should be erected far away from residential areas

dust– produced from cement, gfactories and quarries; it settles on leaves limiting photosynthesis  and causes poor visibility

control– government to enact laws on environmental pollution

sound/ noise– produced by machines aeroplanes  and heavy vehicles and affects heasring in animals

control– ear muffs should be used in industries and jua kali workshops that generates noise

aerosols– consist of fire particles, suspended gases in hebicides, insecticides and sprays; they contain copper metal- when copper is inhaled causes irritation and respiratory diseases, depletion of ozone layer and its non- biodegradable

control– used biological methods of pests control

oxides of nitrogen( nitrogen ii oxide, nitrogen iv oxide)

produced from burning petroleum fules and industries

nitrogencmpounds dissolves in rain water to form acidic rain , its carcinogenic; causes poor visibility on road users

control – use of public means of transport

311 HISTORY AND GOVERNMENT SYLLABUS FORM 1-4 IN PDF

311 HISTORY AND GOVERNMENT
GENERAL OBJECTIVES

By the end of the course the learner should be able to:

1. recognize and appreciate the importance of studying History and Government;
2. acquire knowledge, ability and show appreciation for critical historical analysis of socio-economic and political organization of African societies;
3. understand and show appreciation of the rights, privileges and obligations of oneself and others for promotion of a just and peaceful society;
4. promote a sense of nationalism, patriotism and national unity;
5. encourage and sustain moral and mutual social responsibility;
6. identify, assess and appreciate the rich and varied cultures of the Kenyan people and other peoples;
7. promote a sense of awareness and need for a functional democracy of the Kenyan people and other nations;
8. promote an understanding and appreciation of intra-national and international consciousness and relationships;
9. derive through the study of History and government an interest in further learning;
10. appreciate the importance of interdependence among people and among nations
11. identify, assess and have respect for different ways of life influencing development at local, national and international levels;
12. demonstrate the acquisition of positive attitudes, values, and skills for self reliance;
13. acquire appropriate knowledge, skills and attitudes as a basis for technological and industrial development;
14. promote patriotism and national unity.
1.0.0 INTRODUCTION TO HISTORY AND GOVERNMENT
1.1.0 Specific objectives
By the end of the topic, the learner should be able to:
a) explain the meaning of the term ‘History’;
b) explain the meaning of the term ‘Government’;
c) identify the sources of information on History and Government;
d) explain the importance of studying History and Government.
1.2.0 Content
1.2.1 The meaning of History 1.2.2 The meaning of Government. 1.2.3 Sources of information on History and Government. 1.2.4 Importance of studying History and Government. 2.0.0 EARLY MAN 2.1.0 Specific Objectives By the end of the topic, the learner should be able to:
a) explain the origin of man;
b) identify the stages through which man evolved during the Stone Age Period;
132
c) Describe the cultural and economic practices of early man (old, middle and new stone Age).
2.2.0 Content
2.2.1 Origin of man.
2.2.2 Evolution of man.
2.2.3 Cultural and economic practices of early man (old, middle and new stone age) 3.0.0 DEVELOPMENT OF AGRICULTURE 3.1.0 Specific Objectives By the end of the topic, the learner should be able to:
a) identify the factors that led to the development of early agriculture;
b) explain the development of agriculture in Egypt and Mesopotamia;
c) describe the Agrarian Revolution in Britain and the USA;
d) identify the causes of food shortages in Africa and the interest of the Third World;
e) discuss the effects and remedies of food shortages in Africa and the rest of the Third World.
3.2.0 Content
3.2.1 Development of early agriculture.
3.2.2 Early agriculture in:
a) Egypt
b) Mesopotamia.
3.2.3 The Agrarian Revolution in:
a) Britain
b) U.S.A.
3.2.4 The food situation in Africa and the rest of the Third World.
4.0.0 THE PEOPLES OF KENYA UP TO THE 19TH CENTURY
4.1.0 Specific objectives
By the end of the topic, the learner should be able to:
a) state the origins of the Bantu, Nilotes and Cushites;
b) trace and describe the migration and settlement of the Bantu, Nilotes and Cushites;
c) discuss the results of the migration and settlement of the people of Kenya;
4.2.0 Content
Origin, migration and settlement of the people of Kenya
a) Bantu
i. Western Bantu ii Eastern Bantu
b) Nilotes
i River – Lake Nilotes ii Plains Nilotes iii Highland Nilotes
c) Cushites
i Eastern Cushites ii Southern cushites
133
4.2.1 Results of the migration and settlement of the people of Kenya.
5.0.0 SOCIAL, ECONOMIC AND POLITICAL ORGANIZATION OF KENYAN SOCIETIES IN THE 19TH CENTURY.
5.1.0 Specific objective:
By the end of the topic, the learner should be able to discuss the Social, Economic and Political organisation of the Bantu, the Nilotes and the Cushites.
5.2.0 Content
5.2.1 Bantu: Agikuyu, , Ameru, Akamba, Abagusii, Mijikenda.
5.2.2 Nilotes: Luo, Nandi, Maasai,
5.2.3 Cushites: Borana, Somali
6.0.0 CONTACTS BETWEEN EAST AFRICA AND THE OUTSIDE WORLD UP TO THE 19TH CENTURY.
6.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) identify the origin of the early visitors to the East African Coast;
b) explain the development of trade between the East African Coast and
outside World;
c) discuss the effects of the contact between the East African Coast and
outside world;
d) identify reasons for the coming of the Portuguese
e) trace the portuguese conquest of the East African Coast;
f) discuss the decline and effects of the portuguese rule; g) discuss the establishment and impact of Omani rule; h) explain the reasons for the coming of the Christian misssionaries; i) describe missionary activities and challenges; j) discuss the effects of missionary activities. 6.2.0 Content 6.2.1 Early visitors to the East African Coast up to 1500. 6.2.2 Trade between the East African Coast and the outside World
a) Development of the trade
b) Organization of the trade
c) Impact of the trade on the peoples of East Africa.
6.2.3 The coming of the Portuguese
a) Reasons for their coming to East Africa.
b) Their conquest and rule.
c) The decline of Portuguese power.
d) Impact of Portuguese rule.
6.2.4 Establishment and impact of Omani rule.
a) Seyyid Said and the development of plantation agriculture
b) Development, organization and consequences of:
i) Long distance trade
ii) International trade.
6.2.5 The spread of Christianity:
134
a) Reasons for the coming of Christian missionaries
b) Missionary activities and challenges
c) Effects of missionary activities.
7.0.0 CITIZENSHIP
7.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) state ways of becoming a Kenyan citizen;
b) state the rights and responsibilities of a Kenyan citizen;
c) discuss the elements of good citizenship.
7.2.0 Content
7.2.1 Kenyan citizenship.
7.2.2 Rights of a citizen.
7.2.3 Responsibilities of a citizen.
7.2.4 Elements of good citizenship.
8.0.0 NATIONAL INTERGRATION
8.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) explain the meaning and importance of national integration;
b) describe factors promoting and limiting national unity;
c) describe the process of resolving conflicts.
8.2.0 Content
8.2.1 National Integration.
a) Meaning.
b) Importance.
8.2.2 National Unity
a) factors promoting national unity.
b) factors limiting national unity.
8.2.3 Conflict Resolution
a) Meaning of the term ‘conflict’.
b) Methods of resolving conflicts.
c) Processes of resolving conflicts.
9.0.0 TRADE
9.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) define the term ‘trade’;
b) explain methods of trade;
c) identify types of trade;
d) discuss the origin, development, organisation and impact of different types of trade.
9.2.0 Content
9.2.1 Definition of trade.
135
9.2.2 Methods of trade: (a) Barter (b) Currency.
9.2.3 Types of Trade
a) Local trade: i ) Origin, ii) Development, iii) Organization, iv) Impact.
b) Regional trade (Trans Saharan Trade): i) Origin, ii) Development, iii) Organization,
iv) Impact.
c) International Trade (Trans-Atlantic Trade): i) Origin, ii) Development,
iii) Organization, iv) Impact.
1.0.0 DEVELOPMENT OF TRANSPORT AND COMMUNICATION
Specific Objectives
By the end of the topic, the learner should be able to:
a) define the terms trade and communication;
b) explain the traditional and modern means of transport;
c) describe the traditional and modern means of communication;
d) analyse the impact of modern means of transport and communication.
10.2.0 Content
10.2.1 Definitions of transport and communication.
10.2.2 Traditional forms of transport: land and water.
10.2.3 Developments in modern means of transport: Road transport, Rail transport, Water transport, Air transport, Space exploration
10.2.4 Impact of modern means of transport.
10.2.5 Traditional forms of communication: Smoke signals, Drum beats, Messengers, Horning,
Written messages on scrolls and stone tablets
10.2.6 Development in modern means of communication
a) Telecommunication : Telephone and cellphone, , television, Radio, Telegraph, Electronic mail (E-mail), Facsimile transceiver (fax), Telex, Pager, Internet.
b) Print media: Newspapers, Magazines, Journals, Periodicals.
11.0.0 DEVELOPMENT OF INDUSTRY
11.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) identify early sources of energy;
b) explain the uses of metals in Africa;
c) trace and describe the development of the Industrial Revolution in Europe;
d) discuss the Scientific Revolution and its effects on agriculture, industry and medicine;
e) describe the emergence of selected world industrial powers;
f) explain the development of industrial in the Third World.
11.2.0 Content
11.2.1 Early sources of energy: Wood, wind , water .
11.2.2 Uses of metal in Africa: Bronze, Gold, Copper, Iron.
11.2.3 The Industrial Revolution in Europe.
a) Uses of various sources of energy: Coal, Oil, Steam, Electricity.
b) Uses of iron and steel
c) Industrialization in Britain
136
d) Industrialization in Continental Europe
e) Effects of the Industrial Revolution in Europe
11.2.4 The Scientific Revolution
a) Scientific inventions
b) Impact of scientific inventions on Agriculture, Industry and Medicine
11.2.5 Emergence of selected World industrial powers: USA, Germany, Japan.
12.0.0 URBANISATION
12.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) define the term ‘Urbanization’;
b) describe Early Urbanisation in African and Europe;
c) describe the emergence of modern urban centres in Africa;
d) discuss the impact of agrarian and industrial developments on urbanisation.
12.2.0 Content
12.2.1 Meaning of urbanization.
12.2.2 Early Urbanization in:
a) Africa – Cairo, Merowe/Meroe and Kilwa.
a) Europe – London and Athens
12.2.3 Emergency of modern urban centers in Africa: Nairobi and Johannesburg
12.2.4 Impact of agrarian and industrial development on Urbanization
13.0.0 SOCIAL, ECONOMIC AND POLITICAL ORGANISATION OF AFRICAN SOCIETIES IN THE 19TH CENTURY.
13.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) describe the social and economic organization of African societies in the 19th
century.
b) discuss the political organization of African societies in the 19th century.
13.2.0 Content
The Social, Economic, and Political organization of African societies with reference to:
13.2.1 The Baganda
13.2.2 The Shona
13.2.3 The Ashanti/Asante.
14.0.0 CONSTITUTION MAKING
14.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) identify the difference between written and unwritten constitutions.
b) discuss the features of the Independence Constitution of Kenya
c) trace and describe the constitutional changes in Kenya since independence.
14.2.0 Content
14.2.1 Types of constitutions: Written and Unwritten.
137
14.2.2 The Independence Constitution of Kenya.
14.2.3 The Kenya constitution
a) Constitution making process
b) Features of the Kenya constitution
c) Constitutional amendments since independence.
15.0.0 DEMOCRACY AND HUMAN RIGHTS
15.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) define the terms’Democracy’ and ‘Human Rights’;
b) identify types of democracy;
c) discuss the principles of democracy;
d) identify the rights of a child;
e) classify and discuss Human Rights.
15.2.0 Content 15.2.1 Democracy: Definition ,types and Principles of democracy 15.2.2 Human Rights
a) Definition of Human Rights
b) The Bill of Rights
c) U. N. Charter on Human Rights
d) The rights of the child
e) Classification of Human Rights
16.0.0 EUROPEAN INVASION OF AFRICA AND THE PROCESS OF
COLONIZATION.
16.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) define the terms ‘scramble’ and ‘partition’;
b) identify the methods used by Europeans to acquire colonies in Africa;
c) discuss the factors that led to the scramble for colonies in Africa in the 19th Century
d) describe the process of partition;
e) analyse the impact of the partition;
f) discuss the African reaction to European colonization;
16.2.0 Content
16.2.1 The Scramble for and Partition of Africa
a) Definitions of the terms ‘scramble’ and ‘partition’
b) Methods used by Europeans to acquire colonies in Africa
c) Factors that led to the scramble for colonies in Africa
d) The process of partition
e) Impact of partition
16.2.2 African reactions to European colonization
a) Resistance: Maji Maji, Mandinka – Samori Toure, Ndebele – Lobengula.
b) Collaboration: Baganda, Lozi-Lewanika
138
17.0.0 ESTABLISHMENT OF COLONIAL RULE IN KENYA 17.1.0 Specific Objectives By the end of the topic, the learner should be able to:
a) explain factors for European invasion of Kenya;
b) describe the process of British occupation of Kenya;
c) explain African response to British invasion;
d) identify the method of administration in Kenya.
17.2.0 Content
17.2.1 Background to the Scramble and Partition of East Africa.
17.2.2 British occupation of Kenya.
17.2.3 The response of the peoples of Kenya to the British invasion and occupation
a) Resistance: Nandi, Agiryama, Busuku, Somali
b) Collaboration: Maasai, The wanga
c) Mixed Reactions: Akamba, Agikuyu, Luo
18.0.0 COLONIAL ADMINISTRATION
18.1.0 Specific Objectives
By the end of the topic, the learner should be able to identify and analyse the colonial systems of administration with special reference to:
a) Indirect rule;
b) Direct rule;
c) Assimilation.
18.2.0 Content
18.2.1 Indirect rule: The British in Kenya, The British in Nigeria.
18.2.2 Direct Rule: The British in Zimbambwe (Southern Rhodesia)
18.2.3 Assimilation: The French in Senegal
19.0.0 SOCIAL AND ECONOMIC DEVELOPMENTS DURING THE COLONIAL
PERIOD IN KENYA.
19.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) explain the social changes that took place in Kenya during the colonial
period;
b) identify and explain the main economic developments in Kenya during the colonial period.
19.2.0 Content
19.2.1 The Uganda Railway
19.2.2 Settler farming in Kenya
19.2.3 Colonial land policies
19.2.4 Devonshire White Paper
19.2.5 Urbanization
139
20.0.0 POLITICAL DEVELOPMENTS AND THE STRUGGLE FOR INDEPEDENCE IN KENYA (1919 – 1963)
20.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) identify and explain the origins, organization and effects of political movements in Kenya up to 1939;
b) trace the origins of the independent churches and schools;
c) discuss political organisations and movements up to 1945;
d) describe the role of trade unionism in the struggle for independence;
e) discuss the role of women in the struggle for independence;
f) describe the constitutional changes leading to independence.
20.2.0 Content
20.2.1 Early Political Organizations in Kenya up to 1939
a) East Africa Association
b) Kikuyu Central Association
c) Kavirondo Tax Payers and Welfare Association
d) Ukamba Members Association
e) Coast African Association
f) Taita Hills Association.
20.2.2 Emergence of Independent Churches and Schools.
20.2.3 Political organisations and movements after 1945
a) Kenya African Study Union (K.A.S.U)
b) Kenya African Union (K.A.U)
c) Mau Mau
d) Kenya African National Union (K.A.N.U)
e) Kenya African Democratic Union (K.A.D.U)
f) African Peoples Party (A.P.P)
20.2.4 Trade Union Movement: African Workers Federation and Kenya Federation of Labour 20.2.5 Role of women in the struggle for independence. 20.2.6 Constitutional changes leading to independence
a) African representation in the Legco
b) Lyttleton Constitution
c) Lennox-Boyd Constitution
d) Lancester House Conferences
21.0.0 RISE OF AFRICAN NATIONALISM
21.1.0 Specific Objectives
By the end of the topic, the learner should be able to discuss the rise and growth of African Nationalism in selected African countries.
21.2.0 Content
21.2.1 Rise and growth of African Nationalism in Ghana, Mozambique and South Africa.
140
22.0.0 LIVES AND CONTRIBUTIONS OF KENYAN LEADERS 22.1.0 Specific Objectives By the end of the topic, the learner should be able to analyse the lives and contributions of selected Kenyan leaders.
22.2.0 Content
22.2.1 Jomo Kenyatta
22.2.2 Daniel Arap Moi
22.2.3 Oginga Odinga
22.2.4 Tom Mboya
22.2.5 Ronald Ngala
23.0.0 THE FORMATION, STRUCTURE AND FUNCTIONS OF THE GOVERNMENT OF KENYA 23.1.0 Specific Objectives By the end of the topic, the learner should be able to:
a) describe the electoral process in Kenya;
b) state the functions of the Electrol Commission of Kenya;
c) explain the process of the formation of government;
d) describe the structure and functions of the three arms of the Government of Kenya;
e) state the functions of the Armed forces, police and prisons departments in Kenya;
f) analyse the challenges facing the police and prisons departments in Kenya;
g) analyse the concepts of the ‘Rule of Law’ and ‘Natural justice’.
23.2.0 Content 23.2.1 Electrol process. 23.2.2 Functions of the Electoral Commission of Kenya. 23.2.3 Formation of Government. 23.2.4 Structure and Functions of the Government of Kenya
a) Legislature: Composition, Functions , Process of law making, Parliamentary Supremacy.
b) The Executive
i. Powers and functions of the President
ii. Composition and functions of the Cabinet
iii. Composition and functions of the Civil Service
iv. Provincial administration
v. Functions of the armed forces, police and prisons department
vi. Challenges facing the police and prisons departments in Kenya
c) The judiciary
i. Chief Justice
ii. Attorney General
iii. Structure and functions of the Court Systems in Kenya
iv. Importance of the Independence of the Judiciary
v. The rule of law
141
vi. The concept of Natural Justice
24.0.0 WORLD WARS
24.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) explain the causes, of the First and the Second World Wars;
b) describe the course of the First and the Second World Wars;
c) discuss the results of the First and the Second World Wars;
d) explain the reasons for the formation of the league of Nations;
e) describe the organisation of the league of Nations;
f) analyse the performance of the league of Nations.
24.2.0 Content
24.2.1 The First World War (1914 – 1918) – Causes, Course and Results.
24.2.2 The league of Nations – Formation, Organization, Performance. 24.2.3 The Second World War (1939 – 1945) – Causes, Course and Results. 25.0.0 INTERNATIONAL RELATIONS International organizations
25.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) analyse the reasons for the formation of major international organizations;
b) describe the structure of major international organizations;
c) discuss the functions of major international organizations;
d) analyse the performance of major international organisations;
e) discuss the effects of the cold war.
25.2.0 Content
International Organization
25.2.1 The United Nations – Formation, Organisation, Performance and challenges.
25.2.2 The commonwealth – Formation, Membership, Functions and Challenges
25.2.3 The Non-Aligned Movement – Formation, Performance and Challenges.
25.2.4 The cold War (Vietnam, Cuba, Europe and Angola) – Cause, Course and Effects.
26.0.0 CO-OPERATION IN AFRICA
26.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) explain the origin and development of selected regional organizations in Africa;
b) discuss the performance and challenges of the respective organisations.
26.20 Content
26.2.1 Pan-Africanism – Origin, Development and Performance.
26.2.2 Organization of African Unity (OAU) – Formation, Charter, Performance and challenges.
142
26.2.3 African Union – Formation , Charter, Performance and Challenges.
26.2.4 Rebirth of the East African Community – 2001 – Formation, Organization, Performance and challenges. 26.2.5 Economic Community of West African States (ECOWAS) – Formation, Organization Performance and challenges.
26.2.6 The Common Market for Eastern and Southern Africa (COMESA) – Formation, Function, Performance and challenges.
27.0.0 NATIONAL PHILOSOPHIES (KENYA)
27.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) explain the origin and development of National philosophies;
b) analyse the impact of National Philosophies.
27.2.0 Content
27.2.1 African Socialism
27.2.2 Harambee
27.2.3 Nyayoism
27.2.4 Impact of National Philosophies.
28.0.0 SOCIAL, ECONOMIC AND POLITICAL DEVELOPMENTS AND CHALLENGES IN KENYA SINCE INDEPENDENCE
28.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) discuss the political developments in Kenya since independence;
b) discuss the social and economic developments in Kenya since independence;
c) analyse the political, social and economic challenges in Kenya since Independece.
28.2.0 Content
28.2.1 Political developments
a) Developments from 1963-19991
b) Multi – party democracy in Kenya
c) Challenges of multi-party democracy
d) The role of political parties in Government and nation building.
28.2.2 Economic developments and challenges: Land policies, Industry.
28.2.3 Social developments and challenges: Education, Health, Culture and sports.
29.0.0 SOCIAL, ECONOMIC AND POLITICAL DEVELOPMENTS AND
CHALLENGES IN AFRICA SINCE INDEPENDENCE
29.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) discuss the political, social and economic developmnets in selected African countries since independence;
b) analyse the political, social and economic challenges in Africa since independence.
143
29.2.0 Content
29.2.1 Social Economic and Political developments in selected African countries
a) Democratic Republic of Congo – DRC
b) Tanzania .
29.2.2 Social, Economic and Political challenges in Africa since independence.
30.0.0 LOCAL AUTHORITIES IN KENYA
30.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) describe types of local authorities in Kenya;
b) discuss the functions of local authorities;
c) analyse the relationship between local authorities and the Central Government;
d) discuss the challenges facing local authorities in Kenya.
30.2.0 Content
30.2.1 Types of local authorities.
30.2.2 Functions of local authorities.
30.2.3 Relationship between local authorities and the central government.
30.2.4 Challenges facing local authorities.
31.0.0 GOVERNMENT REVENUE AND EXPENDITURE IN KENYA
31.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) identify and discuss sources of government revenue;
b) explain the expenditure of government revenue;
c) discuss how the government controls public finance.
31.2.0 Content
31.2.1 National budget.
31.2.2 Sources of government revenue.
31.2.3 Control of public finance.
32.0.0 THE ELECTORAL PROCESS AND FUNCTIONS OF GOVERNMENT IN OTHER PARTS OF THE OWRLD.
32.1.0 Specific Objectives
By the end of the topic, the learner should be able to:
a) explain the electoral process of governments in selected countries;
b) discuss the functions of governments of the respective countries.
32.2.0 Content
32.2.1 USA.
32.2.2 Britain.
32.2.3 India.
144
312 – GEOGRAPHY
GENERAL OBJECTIVES By the end of the course, the learner should be able to: 1. appreciate the importance of studying Geography; 2. recognize different types of environments and manage them for individual, national and international development; 3. identify and explain weather phenomena and their influence on the physical environment and human activities; 4. explain land-forming processes and appreciate the resultant features and their influence on human activities; 5. acquire knowledge of available natural resources and demonstrate ability and willingness to utilize them sustainably; 6. identify and compare economic activities in Kenya and the rest of the world; 7. state, interpret, analyse and use Geographical principles and methods to solve problems of national development; 8. apply field-work techniques in studying Geography; 9. acquire knowledge and skills necessary to analyse population issues of Kenya and the world; 10. appreciate the importance of interdependence among people and among nations; 11. identify, assess and have respect for different ways of life influencing development at local, national and international levels; 12. demonstrate the acquisition of positive attitudes, values and skills for self reliance; 13. acquire appropriate knowledge, skills and attitudes as a basis for technological and industrial development; 14. promote patriotism and national unity. 1.0.0 INTRODUCTION 1.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define the terms Geography and Environment;
(b) describe the branches of Geography;
(c) explain the importance of studying Geography;
(d) explain the relationship between geography and other disciplines.
1.2.0 Content 1.2.1 Definition of: (a) Geography and (b) Environment. 1.2.2 Branches of Geography: (a) Physical geography and (b) Human Geography. 1.2.3 Importance of studying Geography. 1.2.4 Relationship between geography and other disciplines. 2.0.0 THE EARTH AND THE SOLAR SYSTEM 2.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define the solar system;
145
(b) explain the origin of the earth;
(c) explain the effects of rotation and revolution of the earth;
(d) describe the structure of the earth.
2.2.0 Content. 2.2.1 Definition and composition of the solar system. 2.2.2 Origin, shape, size, and position of the earth in the solar system 2.2.3 Rotation and revolution of the earth and their effects. 2.2.4 Structure of the earth – (a) the atmosphere, (b) the hydrosphere, (c) the lithosphere/crust, (d) the asthenosphere/mantle and (e) the barysphere/centrosphere (outer and inner core). 3.0.0 STATISTICAL METHODS 3.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define the term statistics;
(b) identify types and sources of statistical data;
(c) identify and describe methods of collecting and recording data;
(d) analyse, interpret and present statistical data using appropriate graphical methods;
(e) explain the advantages and disadvantages of each method of data presentation.
3.2.0 Content 3.2.1 Definition of statistics. 3.2.2 Types of statistical data. 3.2.3 Sources of statistical data 3.2.4 Methods of collecting data. 3.2.5 Methods of recording data. 3.2.6 Analysis of data by working out arithmetic mean, median, mode, percentage, range. 3.2.7 Statistical analyses, interpretation and presentation by use of Line graphs, Bar graphs, Polygraph (combined line and bar graphs), Wind rose, Comparative/group line and bar graphs, cumulative bar graphs, proportional circles, pie charts, divided bars/rectangles, population pyramids and Age-Sex pyramids. 3.2.8 Analysis and interpretation of dot and choropleth maps. 3.2.9 Discussion of the advantages and disadvantages of each method of data presentation. 4.0.0 FIELD WORK 4.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define the term field work;
(b) state different types of field work;
(c) explain the importance of field work;
(d) explain the procedure to be followed during field work;
(e) identify possible problems during field work;
(f) carry out field work within the local environment.
4.2.0 Content 4.2.1 Definition of field work.
146
4.2.2 Types of field work. 4.2.3 Importance of field work. 4.2.4 Field work procedure. 4.2.5 Problems likely to be encountered during fieldwork. 4.2.6 Field work within the local environment. 5.0.0 MINERALS AND ROCKS 5.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define minerals and rocks;
(b) state the characteristics of minerals;
(c) classify rocks according to mode of formation;
(d) state the characteristics of rocks;
(e) account for the distribution of major types of rocks in Kenya;
(f) explain the significance of rocks;
(g) identify major types of rocks and their use within the local environment.
5.2.0 Content 5.2.1 Definition of (a) minerals and (b) rocks. 5.2.2 Characteristics of minerals. 5.2.3 Classification of rocks according to mode of formation. 5.2.4 Characteristics of rocks. 5.2.5 Distribution of major types of rocks in Kenya. 5.2.6 Significance of rocks 5.2.7 Field work – Identification of major types of rocks and their uses within the local environment. 6.0.0 INTERNAL LAND FORMING PROCESSES 6.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define earth movements;
(b) explain the causes of horizontal and vertical earth movements;
(c) explain the theories of Continental Drift and Plate Tectonics;
(d) define folding, faulting, vulcanicity and earthquakes;
(e) explain the processes of folding, faulting, and vulcanicity;
(f) describe types of folds, faults and forms of vulcanicity;
(g) explain features that result from folding, faulting and vulcanicity;
(h) explain the causes of earthquakes;
(i) describe how earthquakes are measured;
(j) account for the world distribution of earthquake zones, fold mountain systems and features due to faulting and vulcanicity;
(k) explain the significance of the resultant features of folding, faulting, vulcanicity and effects of earthquakes.
6.2.0 Content 6.2.1 Earth Movements (a) Definition
147
(b)Types of earth movements – horizontal and vertical movements. (c) Causes of earth movements 6.2.2 Theories of the origins of
(a) Continental drift and
(b) Plate tectonics
6.2.3 Folding
(a) Definition, and processes of folding.
(b) Types of folds
(c) Features resulting from folding.
(d) World distribution of fold mountain systems.
(e) Significance of folding to human activities. 6.2.4 Faulting
(a) Definition, and processes of faulting.
(b) Types of faults.
(c) Features resulting from faulting.
(d) A study of the Great Rift Valley.
(e) World distribution of features formed through faulting.
(f) Significance of faulting to human activities.
6.2.5 Vulcanicity
(a) Definition of vulcanicity.
(b) Types of vucanicity and the resultant features.
(c) World distribution of features formed through vulcanicity.
(d) Significance of vulcanicity to human activities.
6.2.6 Earthquakes
(a) Definition of earthquakes.
(b) Measurement of earthquakes.
(c) Distribution of the major earthquake zones of the world.
(d) Effects of earthquakes.
7.0.0 EXTERNAL LAND-FORMING PROCESSES 7.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define weathering, mass wasting, hydrological cycle, river systems, lakes and glaciation.
(b) distinguish between oceans and seas;
(c) describe water movement in oceans and seas;
(d) explain the factors that contribute to the sculpturing of the earth;
(e) explain external land-forming processes and the resultant features;
(f) identify the sources of underground water;
(g) discuss the significance of the resultant physical features to the environment;
(h) carry out field-work of the landforms within the local environment.
148
7.2.0 Content 7.2.1 Weathering
(a) Definition of weathering.
(b) Agents of weathering.
(c) Types and processes of weathering.
(d) Significance of weathering to physical and human environments.
7.2.2 Mass Wasting
(a) Definition of mass wasting.
(b) Factors influencing mass wasting.
(c) Types and processes of mass wasting.
(d) Effects of mass wasting on the physical and human environments.
7.2.3 Hydrological cycle
(a) Definition of hydrological cycle.
(b) Process of the cycle.
(c) Significance of the cycle
7.2.4 Action of rivers
(a) Definition of rivers
(b) River erosion, transportation and deposition and the resultant features.
(c) Development of cross and long river profiles.
(d) River capture and rejuvenation.
(e) Drainage patterns.
(f) Significance of (i ) rivers and (ii) river formed features.
7.2.5 Lakes
(a) Definition of the term lake.
(b) Formation and classification of lakes.
(c) Significance of lakes.
7.2.6 Oceans, seas and types of coasts
(a) Distinction between oceans and seas.
(b) Nature of ocean water.
(c) Water movement: meaning , causes and significance of (i) vertical movements and (ii) horizontal movements – ocean currents, tides and waves.
(d) Wave erosion, transportation and deposition, and resultant features.
(e) Types of Coasts.
(f) Significance of oceans, seas, coasts and coastal features.
7.2.7 Action of wind and water in arid areas.
(a) Processes of wind erosion and transportation in arid areas.
(b) Features formed by wind erosion and deposition.
(c) Features formed by water in arid areas.
(d) Significance of features found in arid areas.
7.2.8 Action of water in limestone areas
(a) Sources of underground water.
(b) Formation of features by surface and underground water in limestone areas.
149
(c) Significance of the features.
7.2.9 Glaciation
(a) Definition of the term glaciation, glaciers, ice sheets, ice caps and icebergs.
(b) Processes of glacial erosion, transportation and deposition in highland and lowland areas and the resultant features.
(c) Significance of glaciation.
7.3.0 Field work Study of significant land-forming processes within the local environment. 8.0.0 WEATHER AND CLIMATE 8.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) distinguish between weather and climate;
(b) state the elements of weather;
(c) explain the conditions necessary for the sitting of a weather station,
(d) use instruments to measure elements of weather;
(e) analyse and interpret data on weather conditions,
(f) describe the structure and composition of the atmosphere;
(g) explain the factors that influence weather and climate;
(h) describe the characteristics of climatic regions of Kenya;
(i) describe the characteristics of major climatic regions of the world;
(j) account for the causes of aridity and desertification;
(k) explain the effects and possible solutions to aridity and desertification, discuss the causes and impact of climate change on the physical and human environment;
(l) carry out field study on a weather station. 8.2.0 Content 8.2.1 Distinction between weather and climate. 8.2.2 Elements of weather. 8.2.3 Factors to consider in siting a weather station. 8.2.4 Instruments for measuring weather elements. 8.2.5 Recording and calculating weather data. 8.2.6 Structure and composition of the atmosphere. 8.2.7 Weather forecasting. 8.2.8 Factors influencing weather. 8.2.9 Factors that influence climate. 8.3.0 Distribution and characteristics of climatic regions of Kenya and the world. 8.3.1 Causes, effects and possible solutions to aridity and desertification. 8.3.2 Causes and impact of climate change on physical and human environment. 8.2.9 Field work – a study based on a weather station. 9.00 SOILS 9.10 Specific objectives By the end of the topic, the learner should be able to:
(a) define soil, soil profile, soil catena, soil degeneration/degradation and soil erosion;
150
(b) discuss the composition of soil and the processes of soil formation;
(c) describe the properties and characteristics of soil;
(d) describe soil profile and soil catena;
(e) explain soil degeneration/degradation;
(f) classify soils according to soil orders;
(g) discuss the significance of soils;
(h) discuss ways and means of managing and conserving soil;
(i) identify different types of soils and their uses within the local environment
9.2.0 Content 9.2.1 Definition of soil. 9.2.2 Composition of soil. 9.2.3 Soil forming processes. 9.2.4 Properties and characteristics of soil. 9.2.5 Soil profile and catena. 9.2.6 Soil degeneration/degradation, including soil erosion. 9.2.7 Classification of soils: zonal, intrazonal and azonal. 9.2.8 Significance of soils. 9.2.9 Management and conservation of the soil. 9.3.0 Field work – identification of different types of soils and explanation of uses within the local environment. 10.0.0 VEGETATION 10.1.0 Specific Objectives By the end of the topic, the learner should be able to:
(a) define vegetation;
(b) discuss the factors that influence the distribution of vegetation;
(c) identify and describe the characteristics of major vegetation regions of Kenya and the world;
(d) discuss the significance of vegetation;
(e) identify different types of vegetation and explain their uses within the local environment.
10.2.0 Content 10.2.1 Definition of vegetation. 10.2.2 Factors that influence the distribution of vegetation. 10.2.3 Characteristics of major vegetation regions of Kenya and the World. 10.2.4 Significance of vegetation. 10.2.5 Fieldwork on identification of different types of vegetation and explanation of their uses within the local environment. 11.0.0 MAPS AND MAP WORK 11.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define pictures, plans and maps;
(b) explain the relationships between pictures plans, and maps;
(c) identify types of maps and state their uses;
(d) identify and use marginal information on maps;
(e) identify types and uses of scales;
151
(f) determine distances and areas using scales;
(g) distinguish between direction and bearing;
(h) identify traditional and modern methods of locating places and features;
(i) locate places and features on maps using various methods,
(j) describe the different methods of representing relief on topographical maps;
(k) identify and describe physical features and human activities on topographical maps;
(l) enlarge and reduce parts of topographical maps;
(l) draw cross-sections from topographical maps;
(m) calculate and interpret vertical exaggeration and gradient
(n) determine points of intervisibility.
11.2.0 Content 11.2.1 Definition of pictures, plans and maps. 11.2.2 Relationship between pictures, plans and maps. 11.2.3 Types of maps e.g. Atlas maps, topographical maps, and sketch maps. 11.2.4 Uses of maps. 11.2.5 Marginal information. 11.2.6 Map scales:- types of scales, conversion of scales, sizes of scales. 11.2.7 Uses of scales:- estimation and measurement of distance and calculation of areas of regular and irregular shapes. 11.2.8 Distinction between direction and bearing. 11.2.9 Traditional and modern methods of showing direction. 11.3.0 Calculation of bearing 11.3.1 Location of places and features using compass direction, bearing, distance, place names, latitudes and longitudes, grid reference. 11.3.2 Methods of representing relief on topographical maps. 11.3.3 Identification and description of the following in topographical maps:- landforms, vegetation, drainage, economic activities and settlement. 11.3.4 Enlargement and reduction of maps. 11.3.5 Drawing of cross-sections. 11.3.6 Calculation and interpretation of (a) vertical exaggeration and (b) gradient. 11.3.7 Determining intervisibility. 12.0.0 PHOTOGRAPH WORK 12.1.0 Specific objectives. By the end of the topic, the learner should be able to:
(a) identify types of photographs;
(b) describe parts of a photograph;
(c) estimate sizes of features appearing on photographs;
(d) draw sketches from photographs;
(e) identify and interpret features from photographs.
12.2.0 Content 12.2.1 Types of photographs. 12.2.2 Parts of a photograph. 12.2.3 Interpretation of photographs by estimation of actual sizes of features, sketching from photographs, studying and describing natural and human features and activities on photographs.
152
13.0.0 FORESTRY 13.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define forest and forestry;
(b) discuss the factors that influence the distribution and types of natural forests;
(c) discuss the significance of forests and forest products to Kenya;
(d) identify and explain the problems facing forestry in Kenya;
(e) discuss ways and means of managing and conserving forests in Kenya;
(f) compare and contrast softwood forests in Kenya and Canada;
(g) demonstrate the ability to manage and conserve forests and forest resources.
13.2.0 Content 13.2.1 Definition of forest and forestry. 13.2.2 Factors influencing the distribution and types of natural forests. 13.2.3 Importance of forests and forest products to Kenya. 13.2.4 Problems facing forestry in Kenya. 13.2.5 Management and conservation of forests – with specific emphasis on Kenya. 13.2.6 Related study on softwood in Kenya and Canada. 14.0.0 MINING 14.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define the term mining;
(b) explain the factors that influence the occurrence of minerals and mining activities;
(c) describe methods of mining;
(d) state the location of the major minerals of East Africa and show them on a map;
(e) explain the significance of locally available minerals in Kenya;
(f) state and account for the problems facing the mining industry in Kenya;
(g) explain the effects of mining on the environment;
(h) describe the occurrence of specific minerals and their exploitation in selected countries.
14.2.0 Content
14.2.1 Definition of mining 14.2.2 Factors influencing the occurrence of minerals and their exploitation 14.2.3 Methods of mining. 14.2.4 Distribution of major minerals in East Africa 14.2.5 Significance of minerals in Kenya. 14.2.6 Problems facing the mining industry in Kenya. 14.2.7 Effects of mining on the environment. 14.2.8 Study of (a) Trona on Lake Magadi in Kenya (b) Gold and diamonds in South Africa and (c) Petroleum in the Middle East.
153
15.0.0 AGRICULTURE 15.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define agriculture;
(b) discuss the factors that influence agriculture;
(c) explain types of agriculture;
(d) locate the major cash crop growing areas in a map of Kenya;
(e) discuss the growing of selected cash crops in different countries;
(f) compare and contrast farming practices for selected cash-crops in Kenya and other countries;
(g) discuss pastoral farming in Kenya;
(h) compare and contrast (i) dairy farming in Kenya and Denmark (ii) beef farming in Kenya and Argentina;
(i) carry out fieldwork on agricultural activities in the local environment.
15.2.0 Content 15.2.1 Definition of agriculture. 15.2.2 Factors that influence agriculture. 15.2.3 Types of agriculture. 15.2.4 Crop farming – (a) distribution of major cash crops in Kenya, (b) a study of tea, sugar-cane and maize in Kenya , (c) a study of cocoa in Ghana and oil palm in Nigeria and (d) comparative studies of coffee in Kenya and Brazil, wheat in Kenya and Canada and horticulture in Kenya and the Netherlands. 15.2.5 Livestock farming – (a) pastoral farming in Kenya (b) comparative study of dairy farming in Kenya and Denmark and beef farming in Kenya and Argentina. 15.2.6 Field work – collect, record, analyse, and present data on agricultural activities in the local environment. 16.0.0 LAND RECLAMATION AND REHABILITATION 16.1.0 Specific objectives By the end of the topic, the learner should be able to;
(a) define land reclamation and rehabilitation;
(b) discuss the factors that influenced the location of selected irrigation schemes in Kenya, the significance of the schemes and the problems that are experienced in carrying out irrigation farming in Kenya;
(c) describe the methods that are used in land reclamation and rehabilitation in Kenya;
(d) compare the methods of land reclamation in Kenya and the Netherlands,
16.2.0 Content 16.2.1 Meaning of the terms land reclamation and rehabilitation. 16.2.2 A study of Mwea-Tebere and Perkerra irrigation schemes. 16.2.3 Importance of irrigation farming in Kenya. 16.2.4 Problems experienced in irrigation farming in Kenya. 16.2.5 Methods of land reclamation and rehabilitation in Kenya. 16.2.6 Comparative study of land reclamation in Kenya and the Netherlands.
154
17.0.0 FISHING 17.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define the terms fishing and fisheries;
(b) explain the factors that influence fishing;
(c) account for the location of the major fishing grounds of the world;
(d) identify types and names of fish and describe methods of fishing;
(e) discuss fresh water and marine fisheries in East Africa;
(f) assess the significance of the fishing industry in Kenya;
(g) discuss the problems that face the fishing industry in Kenya and their possible solutions;
(h) compare and contrast fishing activities in Kenya and Japan;
(i) explain ways and means of managing and conserving fresh water and marine fisheries.
17.2.0 Content 17.2.1 Definition of fishing and fisheries 17.2.2 Factors that influence fishing. 17.2.3 distribution of the major fishing grounds of the world. 17.2.4 Types and names of fish. 17.2.5 Methods of fishing. 17.2.6 Fresh water and marine fisheries in East Africa. 17.2.7 Significance of the fishing industry in Kenya, 17.2.8 Problems facing fishing in Kenya and their possible solutions. 17.2.9 Comparative study of fishing in Kenya and Japan. 17.3.0 Management and conservation of fresh water and marine fisheries. 18.0.0 WILDLIFE AND TOURISM 18.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define the terms wildlife, tourism and eco-tourism;
(b) distinguish between (i) game reserves, national parks and sanctuaries (ii) domestic tourism and international tourism;
(c) explain the factors that influence the distribution of wildlife in East Africa and tourism in Kenya;
(d) locate national parks, major game reserves and sanctuaries on a map of East Africa;
(e) identify and discuss tourism attractions in Kenya;
(f) discuss the significance of wildlife and tourism in Kenya;
(g) discuss (i) the problems facing wildlife is East Africa and (ii) those facing and associated with tourism in Kenya;
(h) discuss the management and conservation of wildlife in East Africa;
(i) discuss the future of tourism in Kenya;
(j) compare and contrast tourism in Kenya and Switzerland.
18.2.0 Content 18.2.1 Definition of the term wildlife, 18.2.2 Factors influencing the distribution of wildlife in East Africa. 18.2.3 Distinction between game reserves, national parks and sanctuaries and their
155
distribution in East Africa. 18.2.4 Location of National Parks, major game reserves and sanctuaries in East Africa. 18.2.5 Significance of wildlife in East Africa. 18.2.6 Problems facing wildlife in East Africa. 18.2.7 Management and conservation of wildlife in East Africa. 18.2.8 Definition of the terms tourism and eco-tourism, 18.2.9 Distinction between domestic and international tourism. 18.2.10 Factors influencing tourism in Kenya. 18.2.11 Significance of tourism. 18.2.12 Problems facing and associated with tourism in Kenya. 18.2.13 Comparative study of tourism in Kenya and Switzerland. 18.2.14 The future of tourism in Kenya. 19.0.0 ENERGY 19.10 Specific objectives By the end of the topic, the learner should be able to:
(a) define energy;
(b) discuss sources and types of energy;
(c) discuss the development of electric power projects in Kenya and Uganda;
(d) identify and locate other hydroelectric power projects in Africa;
(e) explain the significance of energy;
(f) explain the impact of the energy crisis in the world;
(g) discuss ways and means of managing and conserving energy;
(h) identify sources and uses of energy within the local environment.
19.2.0 Content 19.2.1 Definition of energy. 19.2.2 Sources and types of energy. 19.2.3 Hydroelectric power projects in Kenya and Uganda. 19.2.4 Geothermal power projects in Kenya. 19.2.5 Location of hydroelectric power projects elsewhere in Africa. 19.2.6 Management and conservation of energy. 19.2.7 Significance of energy 19.2.8 The energy crises. 19.2.9 Fieldwork on identification of sources and uses of energy within the local environment. 20.0.0 INDUSTRY 20.1.0 Specific objectives By the end of the topic, the leaner should be able to:
(a) define industry and industrialization;
(b) explain the factors that influence the location and development of industries;
(c) describe types of industries;
(d) account for the distribution of industries in Kenya;
(e) explain the significance of industrialization to Kenya,
(f) discuss the problems of industrialization and suggest possible solutions;
(g) compare and contrast aspects of industrialization in selected countries;
156
(h) carry out fieldwork on an industry in the local area.
20.2.0 Content 20.2.1 Definition of industry and industrialization. 20.2.2 Factors influencing the location and development of industries. 20.2.3 Types of industries. 20.2.4 Distribution of industries in Kenya. 20.2.5 Significance of industrialization to Kenya. 20.2.6 Problems of industrialization and their possible solutions 20.2.7 A study of (a) the cottage industry in India, (b) iron and steel industry in the Ruhr region in Germany and (c) car manufacture and electronic industry in Japan. 20.2.8 Field work on identification of industries within the local area and a detailed study of one of them. 21.0.0 TRANSPORT AND COMMUNICATION 21.1.0 Specific Objectives By the end of the topic, the learner should be able to:
(a) define transport and communication;
(b) identify modes of transport and types of communication;
(c) locate the major lines of transport in Africa;
(d) outline the role of transport and communication in the economic development of Africa;
(e) discuss the problems facing transport and communication in Africa and the efforts being made to solve them;
(f) explain the role of the Great lakes and the St. Lawrence Seaway in the economies of the USA and Canada.
21.2.0 Content 21.2.1 Definition of, and distinction between transport and communications. 21.2.2 Modes of transport and types of communication. 21.2.3 Distribution of major lines of transport if Africa. 21.2.4 The role of transport and communication in the economic development of Africa. 21.2.5 Problems facing transport and communication in Africa and the efforts being made to solve them. 21.2.6 A study of the Great Lakes and the St. Lawrence Seaway. 22.0.0 TRADE 22.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define trade;
(b) identify types of trade;
(c) discuss the factors that influence trade;
(d) identify the major exports and imports of Kenya;
(e) assess the significance of trade to Kenya;
(f) discuss the problems facing trade in Kenya;
(g) assess the future of international trade in Kenya;
(h) outline the role played by selected blocs in the economies of their respective countries.
157
22.2.0 Content 22.2.1 Definition of trade. 22.2.2 Types of trade. 22.2.3 Factors that influence trade. 22.2.4 Major exports and imports of Kenya. 22.2.5 Significance of trade to Kenya. 22.2.6 Problems facing trade in Kenya. 22.2.7 The future of international trade in Kenya. 22.2.8 The role played by the (a) Common Market for Eastern and Southern Africa (COMESA), (b) Southern African Development Cooperation (SADC), (c) Economic Community of West African States (ECOWAS) and (d) European Union (EU) in the economies of their respective regions. 23.0.0 POPULATION 23.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define population;
(b) explain the factors influencing the distribution of population is East Africa;
(c) explain the factors influencing population growth;
(d) describe population structure;
(e) analyse the consequences of population growth and structure;
(f) compare and contrast population trends between Kenya and Sweden;
(g) present population data using relevant statistical graphs.
23.2.0 Content 23.2.1 Definition of population. 23.2.2 Factors influencing the distribution of population in East Africa. 23.2.3 Factors influencing population growth with specific reference to the fertility, mortality and migration. 23.2.4 Population structure. 23.2.5 Consequences of population growth and structure. 23.2.6 Comparative studies of the populations of Kenya and Sweden. 24.0.0 SETTLEMENT 24.10 Specific objectives By the end of the topic, the learner should be able to:
(a) define settlement and urbanization;
(b) explain the factors that influence settlements and settlement patterns;
(c) account for the distribution of major urban centres in East Africa;
(d) explain the growth and functions of selected towns in Kenya;
(e) compare and contrast selected urban centres in Kenya with those of other part s of the world;
(f) discuss the effects of urbanization.
24.2.0 Content 24.2.1 Definition (a) settlement and (b) urbanization. 24.2.2 Factors that influence settlement and settlement patterns. 24.2.3 Distribution of major urban centres in East Africa.
158
24.2.4 Factors influencing the growth of major urban centres ins East Africa. 24.2.5 A study of (a) an industrial town in Kenya (Thika), (b) a lake port (Kisumu) and (c) an agricultural collection centre (Eldoret). 24.2.6 Comparative studies of (a) Nairobi and New York and (b) Mombasa and Rotterdam ports. 24.2.7 Effects of urbanisation. 25.0.0 MANAGEMENT AND CONSERVATION OF THE ENVIRONMENT 25.1.0 Specific objectives By the end of the topic, the learner should be able to:
(a) define (i)management and (ii) conservation;
(b) explain the importance managing and conserving the environment;
(c) name environmental hazards;
(d) assess the impact of selected environmental hazards and suggest measures of combating them;
(e) discuss measures taken in managing and conserving the environment.
25.2.0 Content 25.2.1 Definition of (a) management and (b) conservation. 25.2.2 The need for environmental management and conservation. 25.2.3 Environmental hazards. 25.2.4 Problems associated with, and measures of combating floods, lightning, windstorms, pests and diseases and environmental pollution. 25.2.5 Environmental management and conservation measures in Kenya. 25.2.6 Field work on any aspect of environmental pollution.

Integrated English Schemes of Work Form 4, Term 1-3

Looking for free English Schemes of work using Integrated reference Book ? Download them below.

Download a pdf and editable copy of the schemes of work here;

Free updated schemes of work for all subjects (Secondary)

Schemes of work for all subjects, free updated downloads

FORM 4 ENGLISH SCHEMES OF WORK FOR TERM 1-3 (INTEGRATED)

 
SCHEME  OF WORK               FORM  FOUR ENGLISH            TERM  ONE 
 
WK NO

 

L/
NO
TOPIC
 
 
SUBTOPIC
LESSON / SPECIFIC
OBJECTIVES
TEACHING/ LEARNING
ACTIVITIES
MATERIALS       /
RESOURCES
REFERENCES
1  

 

1

 

 

Listening and speaking.

 

 

Etiquette.

Paying attention.

By the end of the lesson, the learner should be able to:

Highlight importance of paying attention.

Identify some attention detractors.

Suggest ways of improving skill in paying attention.

 

 

 

Listening.

Speaking.

Discussion.

 

 

 

 

Class readers.

Integrated English Bk IV

 

Pg 1-3

 

 

 
2 Reading.

 

 

Comprehension. Answer questions and make sentences using vocabulary learnt.

 

Silent reading.

Reading aloud.

Discussion.

Writing.

Dictionary.

 

Integrated English Bk IV

Pg 3-4

 
3 Grammar.

 

 

Nouns as subjects. State whether a noun has been used as a subject or object in a sentence.

 

Reading.

Writing.

Listening.

Detailed discussion.

Extracts from set books.

 

Integrated English Bk IV

Pg 7-8

 
4 Grammar.

 

 

Nouns as objects / complements. Identify nouns used as direct or  indirect objects.

Identify nouns used as complements.

Reading.

Writing.

Listening.

Detailed discussion.

Written exercise.

Extracts from set books.

 

Integrated English Bk IV

Pg 9-11

 
5 Writing.

 

 

 

Paraphrasing. Paraphrase a given passage.

State differences between a paraphrase and a summary.

 

Review summary writing;

Reading.

Writing.

Discussion.

Extracts from set books.

Chart.

 

Integrated English Bk IV

Pg 12-14

 
6 Speaking.

 

 

Verbal and non- verbal cues that enhance listening & speaking. Demonstrate ability to use verbal and non-verbal skills in narrating a story.

 

Role-play.

Speaking.

Guided discussion.

Group competitions.

Readers. Readers.  
7

&

8

Reading.

 

Intensive reading:

Set book.

 

Read some chapters and analyse language and literally appreciation. Detailed discussion.

Reading.

Written exercises.

 

Set book guide. Set book.  
2 1 Listening and speaking.

 

 

Stress to distinguish word class. Use stress to distinguish word class. Guided practice & supervision.

Group work.

Flash cards.

 

Integrated English Bk IV

Pg 15-16

 
2 Reading.

Poetry- mood.

 

Reading skills:

 

Study reading.

Define mood as used in poetry.

Identify adjectives used to describe mood.

Reading.

Listening.

Answering questions. Discussion.

 

Extracts from literature set books.

Charts.

 

 

Integrated English Bk IV 16-17

 

 
3 Reading.

 

Comprehension.

 

Answer comprehension questions on the set passage correctly. Reading.

Speaking.

Writing.

Guided discussion.

 

Readers.

Charts.

Dictionary.

Integrated English Bk IV

Pg 18-21

 
4 Writing. Debate. Write points for and against a motion on a given subject. Speaking.

Writing.

Guided discussion.

 

 

  Integrated English Bk IV

Pg 21-22

 
5 Grammar. Relative pronouns. The learner should be able:

Identify and use relative pronouns.

Form and use compound relative pronouns.

 

Listening & speaking

Answer questions.

Written exercises.

 

Extracts.

From set books.

Integrated English Bk IV

Pg 22-26

 
6 Writing. Public writing. Write formal and informal requests.

Decline a request politely.

Reading.

Discussion.

Written exercise.

 

  Integrated English Bk IV

Pg 26-32

 
7 & 8 Reading.

 

 

Intensive reading of Set book.

 

Read analytically and identify themes style and character traits.

 

Reading.

Answering probing questions.

Detailed discussion.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Set book guide. Set book.  

 

3 1 Writing. Dictation. Take a dictation taking note of punctuation marks. Reading aloud.

Writing.

Reviewing.

 

 

Integrated English Bk IV

Pg 33

 
2 Reading. Interpretive reading. Bring out meaning that is not explicitly stated in a given text. Reading aloud.

Discussion.

Readers.

Newspapers.

Journal.

Integrated English Bk IV

Pg 33-34

 
3,

 

 

 

4

Grammar. Interrogative pronouns.

 

 

Compound interrogative pronouns.

Identify interrogative pronouns.

Use interrogative pronouns correctly.

Form compound interrogative pronouns.

 

Listening & speaking

Answer questions.

Written exercises.

 

Readers.

 

Integrated English Bk IV

Pg 35-39

 
5,6 Writing. Personal writing.

 

Recipes.

Define a recipe.

Identify words used in recipes.

Write a recipe of a dish for preparing a meal for an occasion.

 

 

Listening.

Reading.

Answer questions.

Writing.

Review exercise.

 

 

  Integrated English Bk IV

Pg 40-43

 
7

&

8

Reading. Intensive reading:

Set book.

Read the assigned chapters and discuss language aspects as well as literally devices.

 

Reading.

Detailed discussion.

Written exercises

 

.

Set book guide. Set book.  

 

 

 

 

 

 

 

 

 

 

4 1,2 Listening and speaking.

 

Polite interruption and disagreeing. Demonstrate the etiquette of interrupting and disagreeing politely.

 

Silent reading.

Group work.

Guided discussion.

 

Readers.

 

Integrated English Bk IV

Pg 44-45

 
3 Reading.

 

 

Comprehension. Answer comprehension questions on a passage and use vocabulary correctly.

 

Reading aloud.

Silent reading.

Writing.

Guided discussion.

 

 

Readers.

Charts.

Dictionary.

Integrated English Bk IV

Pg 48-49

 
4 Grammar. Relative pronouns II. Use relative pronouns as interrogative pronouns and interrogative adjectives. Discussion.

Oral exercise.

Written exercise.

 

 

  Integrated English Bk IV

Pg 50-51

 
5,6 Reading.

 

 Reading skills:

Critical reading.

 

Telestiches.

The learner should be able:

Apply critical reading skills to analyse a given text.

 

 

Review acrostic poetry.

Reading.

Guided discussion.

Group writing.

  Integrated English Bk IV

Pg 51-52

 
6 Reading.

 

 

Intensive reading:

Poetry:

Atmosphere

 

 

Read a poem & identify the prevailing atmosphere projected. Oral exercise: reciting.

Written exercises.

Presentation.

Anthologies of poem. Poem extracts.  
7 & 8 Reading.

 

 

Intensive reading:

Set book.

Read the assigned sections and discuss grammar & literally devices. Read paragraphs and Identify the devices

Guided discussion.

Assignment: common devices.

 

Set book guide. Set book.  

 

 

 

 

 

5 1 Listening & Speaking. Use of tone to reveal attitude. The learner should be able:

Interpret and express attitude using tone.

Listening.

Guided discussion.

Group work.

Readers.

Charts.

Integrated English Bk IV

Pg 53-54

 
2 Writing.

 

E-mail.

 

Use e-mail efficiently in communication. Oral exercise:

Written exercise.

Discussion.

 

Newspapers.

Magazines.

Computers.

 

Integrated English Bk IV

Pg 51-52

 
3 Reading. Responsive reading. Relate what is in a text to own experiences. Reading.

Discussion.

  Integrated English Bk IV

Pg 54-58

 
4 Grammar. Parts of speech – revision. Write correct form of verbs.

Complete sentences according to instructions given.

 

 

Review parts of speech.

Oral and written exercises.

  Integrated English Bk IV

Pg 58-59

 
5 Writing. Public writing.

 

Letter of inquiry.

Write a letter of inquiry in the correct format. Reading aloud.

Discussion.

Newspapers. Integrated English Bk IV

Pg 59-60

 
6 Reading. Intensive reading:

Poetry.

Figurative language.

Read a poem and identify metaphors, similes, and hyperbole. Listening & writing an exercise.

Reciting poems.

Guided discussions.

Anthologies of poems for further reading. Poems from East Africa by Cook and Rubadiri.  
7 & 8 Reading. Intensive set book reading:

 

Read the assigned sections and discuss grammar & literally devices. Reading. Discussion.

 

Video& Audio tapes.

Prescribed set books guides

 

 

Prescribed set books.

 

 

 

6 1 Listening & speaking.

 

Oral poetry –

 

Recitations.

 

 

 

 

Analyse a poem that is in form of a recitation. Reading aloud.

Exposition.

Guided discussion.

Writing.

 

 

Readers.

Charts.

Dictionary.

Integrated English Bk IV

Pg 63-64

 
2 Reading. Critical reading. Identify literal, implied and inferred meanings in a text.

 

Reading texts.

Writing.

Listening.

Discussion.

 

Extracts from Prescribed set books.

 

Integrated English Bk IV

Pg 64-66

 
3 Reading. Comprehension. Answer comprehension questions correctly. Guided practical activity.

Reading.

Inferring meanings of given words.

 

 

Readers.

Charts.

Integrated English Bk IV

Pg 63-64

 
4 Grammar.

 

Verbs – participle phrases. Rewrite sentences using participle phrases. Q/A to review participle tenses. Discussion.

Reading.

Listening.

Dictionary.

Audio tapes.

Integrated English Bk IV

Pg 67-69

 
5 Writing. Advertisement. Highlight details that should be included in advertisements.

 

Discussion.

Group work.

Group resentations.

 

Sample adverts. Integrated English Bk IV

Pg 70-71

 
6 Reading. Intensive reading:

Poetry:

 

Critically analyse issues raised, style, and themes in a given poem. Listening.

Speaking.

Reading.

Writing.

 

Poetry book.    
7 & 8 Reading. Intensive reading:

Set book.

Critically analyse plot, characters, themes, and style in the novel. Guided discussion.

Probing questions.

Dramatization.

Written exercise.

 

set book guide.

 

Selected set book.  
7 1 Listening & speaking.

 

Tongue twisters. State functions of tongue twisters.

Translate tongue twisters to other languages.

Reading aloud.

Discussion.

Formulating tongue twisters.

  Integrated English Bk IV

Pg 70-71

 
2 Reading. Reading skill:

Facts and opinions.

Distinguish facts from opinions.

 

Reading.

Discussion.

  Integrated English Bk IV

Pg 73-75

 
3 Grammar.

 

 

Verbs –the gerund. Identify a gerund used as a subject or object. Discussion.

Oral and written exercises.

  Integrated English Bk IV

Pg 75-76

 
4 Writing. Institutional writing.

 

Speeches.

Outline points to be highlighted in a speech.

Write a sensible speech.

Exposition.

Discussion.

Written exercise.

 

  Integrated English Bk IV

Pg 77-80

 
5 & 6 Reading.
Intensive reading:

 

Set book.

 

Critically analyse plot, characters, themes and style in a novel. Guided discussion.

Probing questions.

Dramatization.

Written exercise.

 

Set book guide,

Audiotapes.

 

One of the set books.  
7-8
TEST & MID-TERM BREAK
         

 

 

 

 

 

 

 

 

8 1 Listening & speaking.

 

 

Ogre narrative. Identify features of style used in a given narrative.

Cite moral lesson(s) from a given narrative.

Silent reading.

Role playing.

Practise oral renditions.

Discuss characters, moral lessons.

 

Readers.

 

 

Integrated English Bk IV

Pg 84-86.

 
2 Reading.

 

 

Study reading.

 

Textual information.

Interpret textual information. Exposition.

Oral and written exercises.

  Integrated English Bk IV

Pg 77-80

 
3 Reading.

 

 

Reading comprehension. Answer comprehension questions correctly.

Infer meanings of given words and phrases.

 

Reading.

Inferring meanings of given words.

Look words from the dictionary.

 

 

Dictionary. Integrated English Bk IV

Pg 87-89

 
4 Grammar.

 

 

Adverbs. Identify types of adverbs.

Form adverbs from adjectives.

Q/A to review parts of speech.

Oral and written exercises.

  Integrated English Bk IV

Pg 89-93

 
5-6 Writing.

 

 

Writing reviews. Write a review of a narrative. Guided discussion.

Reading.

Listening

Group presentations.

 

  Integrated English Bk IV

Pg 93-96

 
7 & 8 Reading. Reading

Intensive reading

Set book.

Critically analyse plot, themes, characters and style in a set book. Guided discussion.

Reading.

Listening & speaking.

 

 

Video & and audiotapes, Set book guide.

 

Selected set book.  
9 1 Listening and speaking. Proverbs. Complete proverbs and interpret them. Group competitions.

Discussion.

Essay writing to illustrate a given proverb.

  Integrated English Bk IV

Pg 97

 
2 Reading and writing. Reading

Comprehension.

Answer questions based on a passage.

 

Reading aloud.

Writing.

 

 

Readers.

Dictionary.

 

Integrated English Bk IV

Pg 98-100

 
3 Writing and speaking.

 

 

Persuasive speech. Write short speeches and present them to class.

 

Individual and group reflections.

 

Readers. Integrated English Bk IV

Pg 101

 
4 Writing. Study writing.

 

Questionnaires.

 

 

Structure questionnaires.

Fill in questionnaires.

 

 

Exposition.

Individual and group reflections.

 

 

 

Sample questionnaires.

Integrated English Bk IV

Pg 105-110

 
5-6 Grammar.

 

 

Typical endings of adverbs. Form adverbs using typical endings. Discussion.

Oral exercise.

Written exercise.

Exercise review.

  Integrated English Bk IV

Pg 101-104

 
7 & 8 Reading. Intensive reading

Set book.

 

Evaluate the plot, characters, styles, and themes in the novel. Oral & written exercises.

Dramatization.

Guided discussion.

 

Audio tapes.

Set book guide.

 

Prescribed set book.

 

 

 

 

 

 

 

 

 

 

 

 

 

10 1-2 Intensive reading.

 

Background and setting of a story. Describe the background and setting of a story.

Identify the time-span of events in a story.

Brain storming.

Probing questions.

Discussion.

  Integrated English Bk IV

Pg 111-4

 
3 Intensive reading.

 

Character and characterization. Analyse characters in literary texts. Probing questions.

Oral questions.

Guided discussion.

Extracts.

 

Integrated English Bk IV

Pg 115-6

 
 4

 

Listening & speaking.

 

 

Themes. List down themes revealed in a story.

Arrange themes in order of  prominence.

Brain storming.

Probing questions.

Discussion.

  Integrated English Bk IV

Pg 116-7

 
5-6 Intensive reading.

 

Style. Identify stylistic devices used in stories / narratives.     Integrated English Bk IV

Pg 117-9

 

 
7 & 8 Intensive reading:

 

 

Contextual questions. Answer context questions on set books. Guided tasks.

Written exercise.

Review of the exercise.

Set book guide. Set book.  
11 1 Listening & speaking.

 

 

Features of proverbs. Describe features of proverbs.

Translate proverbs to English.

 

Exposition of new concepts.

Give examples of proverbs.

Discussion.

 

  Integrated English Bk IV

Pg 120-2

 
2 Study reading.

 

Non-textual information. Derive non-textual information from diagrams.

 

 

Examine diagrams.

Probing questions.

Discuss derived information.

  Integrated English Bk IV

Pg 123-4

 
3
Grammar.
Prepositions. Identify prepositions in given sentences.

Use simple and complex prepositions correctly.

Identify words that serve as prepositions and adverbs.

 

Q/A to elicit preposition of time, place, direction.

Oral and written exercises.

 

  Integrated English Bk IV

Pg 124-7

 
11 4 Reading. Comprehension. The learner should be able to answer questions based on a comprehension. Reading.

Writing.

Marking.

Infer meanings of new words.

  Supplementary readers.

 

 
5 Writing. Writing reviews. Review a short story using the 5W and H technique. Probing questions.

Discussion.

Supplementary readers.

 

Integrated English Bk IV

Pg 127-9

 
6 Reading. Vocabulary. The learner should be able to use new words in sentences correctly.

 

Reading.

Listening.

Q/A.

Speaking.

Take an exercise.

Dictionary.

Flash cards.

Group competitions.

Supplementary readers.

 

 
7-8 Reading. Intensive  reading.

 

The learner should be able to analyse characters and themes in a given text.

 

Reading.

Discussion.

Writing.

Set book guide. Set book.  
12-13 END  OF  TERM  ONE EXAMS  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

    SCHEME  OF WORK               FORM  FOUR ENGLISH            TERM  TWO   
WK NO

 

L/
NO
TOPIC
 
 
SUBTOPIC
LESSON / SPECIFIC
OBJECTIVES
TEACHING/ LEARNING
ACTIVITIES
MATERIALS       /
RESOURCES
REFERENCES
REMARKS
1 1 Grammar. Short and long vowels. Pronounce short and long vowels. Reading.

Writing.

Review exercise.

  Integrated English Bk IV

Pg 130

 
2-3 Reading. Comprehension:

 

 

Answer questions on a text and analyse theme, style, and issues raised. Expressive reading.

Detailed discussion.

Writing an exercise.

Extracts from readers and

supplementary readers.

Integrated English Bk IV

Pg 131-2

 
4 Writing and speaking. Duality of words. Spell words backwards.

Give meanings of new words formed.

Group competitions.

Group presentations.

  Teacher’s choice.  
5-6 Writing. Social writing.

 

Emails and faxes.

Write informal and formal emails / faxes. Guided practical activities. Computers /mobile phones, telephone lines, modem. Integrated English Bk IV

Pg 134-6

 
7 & 8 Reading. Intensive   Reading:

Set book.

Analyse plot, themes, characters, and style. Role-play.

Listening.

Writing.

Set book guide. Set book.  

 

 

 

 

 

 

 

 

2 1 Reading. Intensive   Reading

 

Tone and attitude.

 

Identify tone and attitude in a given poem. Silent reading.

Reading aloud.

Guided discussion.

Anthologies of poems.

 

Poems of East Africa / Teacher’s choice/ Integrated English Bk IV

Pg 137-9

 

   
2-3 Grammar. Inverted sentences. Write inverted sentences.

Give reasons for sentence inversion.

Oral exercise.

Discussion.

Written exercise.

Exercise review.

 

  Integrated English Bk IV

Pg 140-2

   
4-5
Writing.
Report writing. Identify sections of a report.

Write a sensible report.

  Sample reports. Integrated English Bk IV

Pg 143-5

 
6 Reading. Comprehension:

 

 

The learner should be able to:

Answer questions from a given passage.

Q/A: discussion.

Expressive reading.

Writing.

Supplementary readers.

Dictionary.

 

Teacher’s choice.  
7 & 8 Reading. Intensive reading:

 

Set book.

Analyse themes and style in a novel. Examples.

Oral exercise.

Written exercise.

Dramatization.

 

Set book guide. Prescribed set book.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

3 1 Listening and speaking. Etiquette.

 

Turn- taking.

Demonstrate proper turn-taking skills in discussions, presentations and speeches.

 

Reading.

Listening.

Simulations.

Discussion.

 

  Integrated English Bk IV

Pg 148-9

 
2 Grammar. Sentence connectors. Identify some sentence connectors.

Join sentences using connectors.

Brain storming.

Oral and written exercises.

  Integrated English Bk IV

Pg 152-4

 
3 Writing. Writing a confidential report. Write a confidential report / reference letter. Q/A to review a formal letter format.

Read a sample report.

Written exercise.

  Integrated English Bk IV

Pg 155-6

 
 

 

 

 

 

 

 

4
Speaking.
Discussion.

 

The learner should be able to:

Initiate and sustain a discussion on a given topic.

 

Read a passage.

Deduce the implications of the words used by the speakers.

  Teacher’s choice.  
5 Listening & speaking. Giving and receiving instructions. The learner should be able to:

Give instructions in given situations.

Oral examples.

Written exercise.

Guided discussion.

Set of instructions.

Magazines.

Newspapers.

Teacher’s choice.  
6 Reading. Intensive reading:

Characterization.

The learner should be able to:

Discuss characters in specific contexts.

Expressive reading.

Discuss characters.

Assignments & their review.

  Literature set books.

Readers.

 

 
7 & 8 Reading. Intensive reading:

 

Set book.

The learner should be able to:

Analyse plot, themes, and style in a novel.

Brain storming.

Discussion.

Written exercise.

Set book guide. Set book.  

 

 

 

 

 

 

4 1-2 Reading. Comprehension. The learner should be able to:

Answer questions on a given passage correctly.

Reading a passage.

Answer questions.

Review the exercise.

 

Supplementary readers.

Dictionary.

 

Integrated English Bk IV

Pg 157-161

 
3 Grammar. Sentence and paragraph connectors (review) Rewrite sentences adding sentence and paragraph connectors appropriately. Oral and written exercises.

Discussion.

  Integrated English Bk IV

Pg 164

 
4 Writing. Essay writing. Write an application letter with reference to an advertisement. Reading.

Writing.

Discussion.

  Integrated English Bk IV

Pg 161

 
5 Reading. Reading skills.

 

Note-making.

Make notes based on a given passage.   Supplementary readers.

 

Integrated English Bk IV

Pg 162-3

 
6 Writing. Creative writing.

 

Autobiography.

Differentiate between a biography and an autobiography.

Outline important aspects of an autobiography.

 

Exposition.

Reading.

Writing.

Discussion.

 

Supplementary readers.

 

Integrated English Bk IV

Pg 165-8

 
7 & 8 Reading. Intensive reading:

 

Set book.

The learner should be able to:

Analyse  themes and style in a novel.

Brain storming.

Discussion.

Written exercise.

Set book guide. Set book.  

 

5 1 Listening & speaking. The vowel sound. Write down words that have the same vowel sound. Reading.

Writing.

Discussion.

  Integrated English Bk IV

Pg 169

 
2 Reading. Comprehension. The learner should be able to:

Answer questions on a given passage correctly.

Reading a passage.

Answer questions.

Review the exercise.

 

Dictionary.

 

Integrated English Bk IV

Pg 170-4

 
5 3 Grammar. Conjunctions. Outline functions of conjunction. Oral exercise.

Written exercise.

Exercise review.

  Integrated English Bk IV

Pg 175-7

 
4-5 Writing. Institutional writing.

 

Curriculum vitae.

Write a C.V. in the correct format. Reading.

Writing.

Discussion.discussion.round to the writing.wel sound.

Supplementary readers.

 

Integrated English Bk IV

Pg 178-180

 
6 Reading. Institutional writing.

Curriculum vitae.

The learner should be able to:

Write a CV from a passage.

Expressive reading.

Guided discussion.

Written exercise.

Supplementary readers.

 

Integrated English Bk IV

Pg 181-2

 
7 & 8 Reading. Intensive reading:

Drama:

Introduction to the play.

 

List characteristics of a particular play and give the background to the writer. Written exercise. Expressive reading.

Guided discussion.

  Prescribed

Set books.

 

 

 

6 1-2 Listening and speaking. Role play.

Negotiation skills.

Demonstrate proper negotiation skills. Reading.

Guided discussion.

  Integrated English Bk IV

Pg 183-7

 
3 Reading. Comprehension. The learner should be able to:

Answer questions on a given passage correctly.

Reading a passage.

Answer questions.

Review the exercise.

 

Dictionary.

 

Integrated English Bk IV

Pg 188-190

 
4 Grammar. Revision exercise. Answer questions correctly. Written exercise.

Exercise review.

     
5-6 Writing. Argumentative essay. Write an argumentative essay based on a given topic. Discussion in groups.

Writing.

Guided discussion.

 

  Integrated English Bk IV

Pg 191

 
7 & 8 Reading. Intensive reading:

Set book.

Analyse plot, characters, themes and style in the play. Oral questions & written exercise.

Dramatizing.

Set book guide.

Audio and video tapes.

Set book guide. Set book.
7 1 Listening & speaking. Study skill. Answer questions from a read- out passage.

 

Listening.

Writing.

Answering questions.

Selected set book Integrated English Bk IV

Pg 192

 
2 Reading. Comprehension. Answer questions on a given passage correctly. Written exercise.

Oral exercise.

Mixed exercise.

 

Supplementary readers.

 

Integrated English Bk IV

Pg 192-5

 
3 Grammar. Punctuation. Use punctuation marks correctly. Written exercise.

Exercise review.

  Integrated English Bk IV

Pg 195

 
4 Writing. Devices for presenting titles, quotations and headings. Present titles of publications, quotations and headings in the correct format. Exposition.

Supervised practice.

  Integrated English Bk IV

Pg 195-9

 
5 & 6 Reading. Intensive reading:

Set book.

Analyse plot, characters, themes and style in a given play. Oral questions. Written exercise.

Dramatizing.

Set book guide.

Audio and video tapes.

Set book.  
7-8 TEST  & MID-TERM BREAK        

 

8 1-2 Listening & speaking. Oral reports.

Discourse markers.

The learner should be able to:

Explain functions of discourse markers.

Exposition.

Brain storming.

Oral exercise.

  Integrated English Bk IV

Pg 200-1

 
3 Listening & speaking. Oral reports.

 

Signposting.

Give examples of signposting as used in oral presentations. Exposition.

Brain storming.

Oral exercise.

  Integrated English Bk IV

Pg 202-3

 
4-5 Reading. Reading comprehension. Answer questions on a given passage correctly. Written exercise.

Mixed exercise.

 

Supplementary readers.

 

Integrated English Bk IV

Pg 208-9

 
6 Writing. Clauses. Rewrite sentences according to instructions given. Written exercise.

Mixed exercise.

 

  Integrated English Bk IV

Pg 205-8

 
7-8 Writing. Creative writing.

 

Biography.

Describe components of a biography. Exposition.

Reading.

Group work.

  Integrated English Bk IV

Pg 209-214

 

 

9 1
Listening and speaking.
Debate.
Give points for  / against a given subject in a motion. Group debate.

Inter-group debate.

  Integrated English Bk IV

Pg 221

 
2-3 Reading. Reading comprehension. Answer questions on a given passage correctly. Written exercise.

Mixed exercise.

 

Supplementary readers.

 

Integrated English Bk IV

Pg 221-3

 
4 Grammar. Typical endings of adjectives. Form adjectives from nouns and verbs. Discussion.

Oral questions.

Written exercise.

 

  Integrated English Bk IV

Pg 223-8

 
5-6 Writing. Expository writing. Plan and present expository essays. Exposition.

Discussion.

Written exercise.

  Integrated English Bk IV

Pg 229-231

 
7 & 8 Reading. Intensive reading:

 

Set book.

Analyse plot, characters, themes, and style of the play. Oral and written exercises.

Discussion on the set books.

 

 

Set book guide. Selected set book.  

 

10 1 Listening & speaking.
Etiquette.

 

Table manners.

 

Cite bad habits that may be exhibited at the table. Reading aloud.

Open discussion.

  Integrated English Bk IV

Pg 232-3

 
2-3 Reading. Reading comprehension. Answer questions on a given passage correctly. Written exercise.

Mixed exercise.

 

Supplementary readers.

 

Integrated English Bk IV

Pg 234-6

 
4 Grammar. Adjectives. Outline functions of adjectives in sentences. Discussion.

Oral questions.

Written exercise.

  Integrated English Bk IV

Pg 236-8

 
10 5 Writing. Summary. Write a cohesive summary on a section of a given subject. Read a passage.

Make a summary as guided.

Prescribed literature set books.

 

 

Teacher’s resources.

 

 
6 Writing. Public writing.

Letter of application.

 

Write a letter of application for a job. Reading an advert.

Letter writing.

 

 

  Integrated English Bk IV

Pg 240

 
7-8 Reading. Intensive reading:

 

Set book.

Analyse plot, characters, themes, and style of the play. Oral and written exercises.

Discussion on the set books.

 

Set book guide. Selected set book.  
11 1 Listening & speaking. Stress in words. Write down sentences that bring out two meanings of a given word. Oral and written exercises.

Guided discussion.

  Integrated English Bk IV

Pg 241

 
2 Reading. Comprehension. The learner should be able to:

Answer questions on the passage correctly.

 

Read a passage.

Answer questions.

Infer meanings of new words.

Supplementary readers.

Dictionary.

 

Integrated English Bk IV

Pg 241-3

 
3 Grammar. Cloze and indirect speech. Fill gaps with suitable prepositions.

Rewrite questions in indirect speech.

Oral and written exercise;

Exercise review.

Extracts from set books. Integrated English Bk IV

Pg 245-6

 
4
Writing.
Summary.
The learner should be able to:

Write a summary of a passage.

Written exercise.

Reading a passage.

Marking exercises.

Newspapers.

Magazines.

Reports.

Integrated English Bk IV

Pg 243-5

 
5-6 Social Writing. Giving instructions to family and friends. The learner should be able to:

Give instructions to family and friends in point form.

Oral and written exercises.

Listening & speaking.

Prescribed set books.

 

Integrated English Bk IV

Pg 246-7

 
7 & 8 Reading. Intensive reading:

Set book.

Analyse plot, characters, themes and style of a given  play. Oral exercises.

Discussion on the set books.

Dramatization.

 

Prescribed literature set books. Literature set book guides.  
  END  OF  TERM  TWO  EXAMINATIONS  
  SCHEME  OF WORK               FORM  FOUR ENGLISH            TERM  ONE   
WK NO

 

L/
NO
TOPIC
 
 
SUBTOPIC
LESSON / SPECIFIC
OBJECTIVES
TEACHING/ LEARNING
ACTIVITIES
MATERIALS       /
RESOURCES
REFERENCES
REMARKS
1 1 Listening & speaking.

 

 

Poetry. Answer questions based on a poem that has been read out. Listening;

Oral and written exercises.

Detailed discussion.

 

Readers.

Resource persons.

Integrated English Bk IV

Pg 249-250

 
2
Reading.
Comprehension.
Answer questions on the set passage correctly.

 

Written exercise.

Reading a passage.

Listening & speaking.

Section of a set book. Integrated English Bk IV

Pg 245-6

 
3
Writing.
Composition based on a set book. Write a composition based on a set book. Written exercises;

General review.

 

 

Section of a set book. Integrated English Bk IV

Pg 253

 
4-5 Writing. Essay writing. Write an essay using new terms illustrated in a tree diagram. Look up terms in the dictionary;

Writing;

General review.

Dictionary. Integrated English Bk IV

Pg 254

 
6 Grammar. Indirect speech and idioms. The learner should be able to:

Rewrite sentences in indirect speech.

Explain the meanings of idioms / phrases.

Written exercise;

Exercise review.

 

  Integrated English Bk IV

Pg 253

 
7 & 8 Reading Intensive reading:

 

Set book.

Analyse plot, characters, themes, character, plot and style of the play. Oral exercises.

Discussion on the set books.

Dramatization.

 

 

Prescribed literature set books.  

Literature set books.

 

 

 

 

 

 

 

 

2 1

 

 

 

2

Listening & speaking Features of oral poetry.

 

 

 

Read a passage and answer questions based on it.

 

Translate an oral poem from a given community into English.

Silent reading;

Writing.

 

Reading an oral poem;

Writing translations;

Group reflections.

 

  Integrated English Bk IV

Pg 256

3 Writing Summary writing. The learner should be able to:

Write a summary based on a text.

Reading;

Writing;

General review.

  Integrated English Bk IV

Pg 259

4 Grammar. Clauses; Substitution. Define substitution as used in clauses.

Identify aspects of substitution in sentences.

Reading examples;

Oral exercise;

Written exercise.

  Integrated English Bk IV

Pg 259-260

5 Reading.
Comprehension
Answer questions on a given passage.

 

Written exercise.

Reading a passage.

Listening & speaking.

Readers.

 

Integrated English Bk IV

Pg 257

6 Writing. Writing reviews.

 

Film writing.

Review a film using various techniques. Guided practical activities;

Group reflections;

General review.

  Integrated English Bk IV

Pg 261-2

7 & 8
Reading
Intensive reading:

 

Set book.

Analyse plot, characters, themes, character, plot and style of the play. Oral exercises.

Discussion on the set books.

Dramatization.

 

 

Set book guides.  

Literature set books.

 

 

 

3 1 Reading
Comprehension.
Answer questions on the set passage correctly.

 

Reading aloud.

Guided discussion.

Readers.

 

Integrated English Bk IV

Pg 265-6

2

 

 

 

3

Grammar.
Clauses;

 

Illipsis.

Read a dialogue and identify where illipsis has been used.

Provide the missing words.

 

Identify instances of illipsis and supply words that have been omitted.

Rewrite sentences using illipsis.

 

Guided discussion; Oral and written exercises.

 

 

  Integrated English Bk IV

Pg 267-270

 

 

 

 

4-5 Writing. Report writing. The learner should be able to:

Write a report base on graphs and diagrams.

Oral and written exercises.

Listening & speaking.

Graphs,

Diagrams, charts.

Integrated English Bk IV

Pg 271-2

 

 

 

 

6 Listening & speaking. Poetry games I. Compose poems using same-start-letter style. Reading a poem aloud;

Guided discussion;

Group writing;

General review.

  Integrated English Bk IV

Pg 264-5

 

 

 

 

7 & 8
Reading.
Intensive reading:

 

Set book.

Answer questions based on set books. Guided revision;

Answer review questions.

 

Set book guide. Literature set book.

 

 

 

 

4 1 Listening & speaking. Poetry games II. Compose poem using same-end-letter style. Reading a poem aloud;

Guided discussion;

Group writing;

General review.

  Integrated English Bk IV

Pg 273-4

 

 

 

 

2

 

 

 

 

 

3

Reading. Poetry.

 

Alliteration and assonance.

 

 

Metaphors, irony and contrast.

Define the terms alliteration and assonance.

Identify instances where Alliteration and assonance are used.

 

Describe use of metaphors, irony and contrast and provide textual evidence from a text.

Reading a poem aloud;

Guided discussion;

Writing;

General review.

  Integrated English Bk IV

Pg 276-7

 

 

 

 

4-5 Institutional Writing. Notification of a meeting, memo and CV writing. The learner should be able to:

Write a notification of a meeting, memo and CV correctly.

Writing.   Integrated English Bk IV

Pg 279-280

 

 

 

 

6 Grammar. Rewriting sentences to convey same meaning. The learner should be able to:

Rewrite sentences to convey same meaning.

Oral and written exercises.

 

  Integrated English Bk IV

Pg 278-9

 

 

 

 

7 & 8
Reading
Intensive reading:

 

Set book.

Answer questions based on set books. Guided revision;

Answer review questions.

 

Set book guide. Literature set book.
5-6   EXAMINATION-TYPE  QUESTIONS  
6-10   K.C.S.E. EXAMINATIONS  

 

Grade 8 Rationalized Schemes

Free Grade 8 Rationalized Schemes of Work downloads:

Grade_8_Rationalised_Creative_Arts_and_Sports_Schemes_of_Work_Term 2

GRADE_8_TERM_2_AGRI_NUTRITION_SCHEMES

GRADE_8_TERM_2_CRE_SCHEMES

GRADE_8_TERM_2_INTEGRATED_SCIENCE_SCHEMES_mentor

GRADE_8_TERM_2_KISWAHILI_SCHEMES_klb

GRADE_8_TERM_2_MATHEMATICS_SCHEMES_klb

GRADE_8_TERM_2_PRETECHNICAL_SCHEMES

GRADE_8_TERM_2_SOCIAL_STUDIES_SCHEMES 

 

COMPUTER STUDIES NOTES FREE PDF FORM 3

DATA REPRESENTATION IN A COMPUTER

Chapter outline

1.1 Introduction

1.2 Concepts of data representation in digital computers

1.3 Bits, bytes, nibble and word

1.4 Types of data representation

1.5 Binary arithmetic operations

DOWNLOAD COMPUTER STUDIES NOTES IN PDF IN THE LINKS BELOW;

COMPUTER STUDIES NOTES FORM 1-4 PDF

Free Computer Studies notes, revision questions, KCSE past Papers, Exams, Marking Schemes, Topical revision materials, Syllabus and Many more

Form 3 notes for all subjects; free pdf & word downloads

Introduction

In Book 1 of this series, we learnt that computers are classified according to functionality, physical size and purpose. We saw that when classified according to functionality, computers can be analog, digital or hybrid. Digital computers process data that is in discrete form while analog computers process data that is continuous in nature. Hybrid computers, on the other hand can process both discrete and continuous data.

In digital computers, the user input is first converted and transmitted as electrical pulses that can be represented by two distinct digits’ l’ and ‘0’ before processing. These two digits are referred to as binary digits or in short bits.

Although two graphs can look different in their appearance, they may repeat themselves at equal time intervals. Electronic signals or waveforms of this nature are said to be periodic. Generally, a periodic wave representing a signal can be described using the following parameters.

  1. Amplitude (A)
  2. Frequency (f)
  3. Periodic time (T)

Amplitude (A): Amplitude is the maximum value a wave can attain. For example, the amplitude of waves in Figure 1.1 is 1.

Frequency (f): Frequency of a wave is the number of cycles made by the wave in one second. It is measured in units called hertz (Hz). 1Hz is equivalent to 1 cycle/second.

Periodic time (T): The time taken by a signal to complete one cycle is called periodic time. Periodic time, T, is given by the formula T = 1/f where f is the frequency of the wave.

When a digital signal is to be sent over analog telephone lines e.g. e-mail, it has to be converted to analog signal. This is done by connecting a device called a modem to the digital computer. This process of converting a digital signal to an analog signal is known as modulation. On the receiving end, the incoming analog signal is converted back to digital form in a process known as demodulation.

Concepts of data representation in digital computers

Since digital computers are the most widely used, this book seeks to explain in details how data is represented in digital form.

Data and instructions cannot be entered and processed directly into computers using human language. Any type of data be it numbers, letters, special symbols, sound or pictures must first be converted into machine readable form i.e. binary form. Due to this reason, it is important to understand how a computer together with its peripheral devices handle data in its electronic circuits, on magnetic media arid in optical devices.

Data representation in electronic circuits

Electronics components, such as the microprocessor, are made up of millions of electronic circuits. The availability of a high voltage (on) in these circuits is interpreted as ‘I’ while a low voltage (off) is interpreted as a ‘0’. This concept can be compared to switching on and off of an electric circuit. (Figure 1.3). When the switch is closed, (Figure 1.3 (a)), the high voltage in the circuit causes the bulb to light (‘ l’ state). On the other hand, when the switch is open (Figure 1.3 (b)), the bulb goes off (‘0’ state).

Data representation on magnetic media

The presence of a magnetic field in one direction on magnetic media is interpreted as ‘I’, while the field in the opposite direction is interpreted as ‘0’. Magnetic technology is mostly used on storage devices which are coated with special magnetic materials such as iron oxide. Data is written on the media by arranging the magnetic dipoles of some iron oxide particles to face in the same direction and some others in the opposite direction. Figure 1.4 shows how data is recorded on the surface of a magnetic disk. Note that the dipoles on the track are arranged in groups facing opposite directions.

Data representation on optical media

In optical devices, the presence of light is interpreted as ‘1’ while its absence is interpreted as ‘0’. Optical devices use this technology to read or store data. Take an example of a CD-ROM. If the shiny surface is placed under a powerful microscope, the surface can be observed to have very tiny holes called pits. The areas that do not have pits are called land (Figure 1.5).

In Figure 1.5 (a) the laser beam reflects from the land which is interpreted as ‘1’ while in Figure 1.5 (b) the laser beam enters a ‘pit’ and is not reflected. This is interpreted as ‘0’. The reflected pattern of light from the rotating disk falls on a receiving photoelectric detector that transforms the patterns into digital form.

 

Reason for use of binary system in computers

It has proved difficult to develop devices that can understand or process natural language directly due to the complexity of natural languages. It is, however, possible to develop devices that can understand binary language. Devices that read, process and output data in digital form are used in computers and other digital devices such as calculators. Binary logic has therefore simplified the technology needed to develop both hardware and software systems. Other reasons for the use of binary are that digital devices are more reliable, small in size and use less energy as compared to analog devices.

 

Bits, bytes, nibble and word

The terms bits, bytes, nibble and word are used widely in reference to computer memory and data size. Let us explain each term.

Bits: A bit can be defined as binary digits that can either be 0 or 1. It is the basic unit of data or information in digital computers.

 

Byte: A group of bits (often 8) used to represent a character is called a byte. A byte is considered as the basic unit of measuring memory size in computers.

A nibble: Half a byte, which is usually a grouping of 4 bits is called a nibble.

 

Word: Two or more bytes make a word. The term word length is used as a measure of the number of bits in each word. For example a word can have a length of 16 bits, 32 bits, 64 bits etc.

 

Types of data representation

Computers not only process numbers, letters and special symbols but also complex types of data such as sound and pictures. However these complex types of data take a lot of memory and processor time when coded in binary form. This limitation necessitates the need to develop better ways of handling long streams of binary digits. Higher number systems are used in computing to reduce these streams of binary into manageable form. This helps to improve the processing speed and optimise memory usage.

 

Number systems and their representation

As far as computers are concerned, number systems can be classified into four major categories:

  1. Decimal number system.

2, Binary number system

  1. Octal number system.
  2. Hexadecimal number systems.

 

Let us now consider each number system and its representation.

 

Decimal number system

The term decimal is derived from a Latin prefix deci which means ten. Decimal number system has ten digits ranging from 0-9. Because this system has ten digits, it is also called a base ten number system or denary number system,

 

A decimal number should always be written with a subscript 10 e.g. XIO

But since this is the most widely used number system in the world, the subscript is usually understood and ignored in written work. However, when many number systems are considered together, the subscript must always be put so as to differentiate the number systems.

 

The magnitude of a number can be considered using three parameters.

  1. Absolute value.
  2. Place value or positional value.
  3. Base value.

The absolute value is the magnitude of a digit in a number. For example, the digit 5 in 7458 has an absolute value of 5 according to its value in the number line as shown in the Figure 1.6.

 

The place value of a digit in an number refers to the position of the digit in that number i.e. whether “tens”, “hundreds”, “thousands” etc. as shown in Table 1.1.

 

Table 1.1

 

Thousands, 103 Hundreds, 102 Tens, 101 Ones, 10°
7 4 5 8

 

The total value of a number is the sum of the place value of each digit making the number. For example, the total value of the digits in Table 1.1 can be worked out by as shown below:

 

7 x 1000 = 7 000

4x 100     = 400                                                                                                                      400

5 x 10    =         50

8  x   l     =          8

Total =           7458

 

The base value of a number also known as the radix, depends on the type of number system that is being used. The value of any number depends on the radix. For example the number 10010 is not equivalent to 1002,

 

Binary number system

Binary number system uses two digits namely, 1 and 0 to represent numbers. Unlike in decimal numbers where the place values go up in factors of ten, in binary system, the place values increase by factors of two. Binary numbers are written as X2. Consider a binary number such as 10112. The right most digit has a place value of 1 x 2° while the left most has a place value of 1 x 23 as shown in Table 1.2.

 

Table 1.2

 

Place values (2n) Eights 23 =8 Fours 22 =4 Twos 21 = 2 Ones 2° = 1
Binary digit 1 0 1 1

The decimal equivalent of 10112 can be worked out as shown below.

1 x 8 = 8   Ox4 = 0   1 x 2 = 2   l  x  l =1      Total = 11

 

;Octal number system

The octal number system consists of eight digits running from 0 – 7. The place value of octal numbers go up in factors of eight from right to left as shown in Table 1.3. For example to represent an octal number such as 724\, we proceed as follows:

Table 1.3

 

Place values 83 =512 82 =64 81 = 8 8° = 1
Octal digit 7 2 4 5

The decimal equivalent can be worked out as follows:

7 x 512 = 3 584     2 x 64 = 128    4 x 8=32 5xl = 5    Total = 3749

 

Hexadecimal number system

This is a base sixteen number system that consist of sixteen digits ranging from 0 – 9 and letters A – F where A is equivalent to 10, B to 11 up to F which is equivalent to 15 in base ten system. The place value of hexadecimal numbers goes up in factors of sixteen as shown in Table 1.4. Table 1.5 gives digits for base 10 and base 16.

 

Table 1.4

 

Place value 162= 256 161 = 16 16° = 1
Hexadecimal digit 9 4 6

 

Table 1.5

 

Base 10 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Base 16 0 1 2 3 4 5 6 7 8 9 A B C D E F

 

A hexadecimal number is usually denoted using 16 as a subscript or capital letter H to the right of the number. For example, 94B can be written as 94BI6 or 94BH.

The decimal equivalent of94BI6 can be worked out as shown below.

 

9 x 256 =2304     4 x 16 = 64    11xl =11  total = 2379

 

Further conversion of numbers from one number system to another

So far, we have looked at the four types of number systems and introduced their basic concepts in a general and limited way. However, in this section, we shall have a detailed look at how to convert numbers from one system to another. The following conversions will be considered.

  1. Conversion between binary and decimal numbers.
  2. Converting octal numbers to decimal and binary form.
  3. Converting hexadecimal numbers to decimal and binary form.

 

Conversion between binary and decimal numbers

 

Converting binary numbers to decimal numbers

To convert a binary number to decimal number, we proceed as follows:

  1. First write the place values starting from the right hand side.
  2. Write each digit under its place value.
  3. Multiply each digit by its corresponding place value.
  4. Add up the products. The answer will be the decimal number in base 10.

Converting decimal numbers to binary                                                    

To convert a decimal number to binary, there are two possible methods, the long division method and the place value method.

In long division method, the decimal number is continuously divided by 2. However, at each level of the division, the remainder which is either a 1 or 0 is written to the right of the quotient. Starting from bottom upwards, read the series of the remainder digits. The series of 1 ‘s and O’s obtained represent the binary equivalent of the number.

To convert a decimal number to a binary number using place value method proceed as follows:

Write down the place values in factors of 2 up to the value immediately larger or equal to the number being considered. For example, to convert 24710 into binary, we write” down the place values up to 28 i.e.256. Similarly to convert 25810‘ write down the place values up to 29 i.e. 512. If the number being considered is itself a factor of 2 such as 64, 128, 256 etc., then place values should be written up to the number itself.

Let us now convert 24710 to binary. Starting from the left as shown in Table 1.6, subtract the place value from the number being converted. If the difference is a positive number or a 0, place a 1 in the binary digit row. If the difference is negative, place a Zero.

 

In Table 1.6, a 0 is placed in the binary digits row of the first column because 247 – 256 gives a negative value. The number 247 is then carried forward to the next lower place value i.e. 128.

 

Table 1.6

 

Place value 28 27 26 25 24 23 22 21
Difference 247 – 256 247 – 128              
Binary digit 0                

 

Since 247 – 128 gives a positive difference of 119, the digit 1 is placed in the second column of the binary digit row and the difference is carried forward to the next lower place value as shown in Table 1.7.

Table 1.7

 

256 128 64 32 16 8 4 2 1
247 – 256 247 – 128 119 – 64            
0 1              

 

Table 1.8 shows the completed operation.    Table 1.8

 

256 128 64 32
247 – 256 247 – 128 119 – 64 55 – 32
0 1 1 1

 

16 8 4 2 1
23 – 16 7-8 7-4 3-2 1 – 1=0
1 0 1 1 1

 

Converting a binary fraction to decimal number

A decimal number which has both an integral and fractional part is called a real number. The weight of the integral part of a real number increases from right to left in factors of I 0 while that of the fractional part decreases from left to right in factors of 10-x. Table 1.9 shows how a real number 87.537 can be represented using the place values.

Table 1.9

 

Place value 101 10° . 10-1 10-2 10-3
Decimal digit 8 7 . 5 3 7
Value 80 7 . 0.5 0.03 0.007

 

For a binary number, the same approach as in Table 1.9 can be used, only that the place values (weight) are based on factors of 2. For example, the binary number 11.110112 can be represented as shown in Table 1.10.

Table 1.10

 

Place value 21 . 2-1 2-2 2-3 2-4 2-5
Binary digit 1 1 . 1 1 0 1 1
Value in base ten 2 1 . 0.5 0.25 0 0.0625 0.03125

 

NB: When converting a real number from binary to decimal, work out the integral and fractional parts separately then combine them.

 

Converting a decimal fraction to binary

Remember that to convert a decimal integer to its binary equivalent we continuously divide the number by 2. In real decimal numbers, we do the same for the integral part. However to convert the fractional part to its binary equivalent, we proceed as follows:

  1. Multiply the fractional part by 2 and note down the product.
  2. Take the fractional part of the immediate product and multiply it by 2 again.
  3. Continue this process until the fractional part of the subsequent product is 0 or starts repeating the value of the original fractional part of the number being converted:
  4. The binary equivalent of the fractional part is extracted from the products by reading the respective integral digits from the top downwards as shown by the arrow in
  5. Combine the two parts together to get the binary equivalent.

 

Converting octal numbers to decimal and binary numbers

 

Converting octal numbers to decimal numbers

To convert a base 8 number to its decimal equivalent we use the same method as we did with binary numbers. However, it is important to note that the maximum absolute value of an octal digit is 7. For example 982 is not a valid octal number because digits 8 and 9 are not octal digits, but 7368 is valid because all the digits are in the range of 0 – 7. Example 1.13 and 1.14 show how to convert an octal number to a decimal number.

 

Converting octal numbers to binary numbers

To convert an octal number to binary, each digit is represented by 3 binary digits because the maximum octal digit i.e. 7 can be represented with a maximum of 3 digits. See Table 1.11.

 

Table 1.11

 

Octal digit Binary equivalents
0 000
1 001
2 010
3 011
4 100
5 101
6 110
7 111

 

Examples 1.15, 1.16 and 1.17 show how to convert octal numbers to binary numbers.

 

Converting hexadecimal numbers to decimal and binary numbers

 

Converting hexadecimal numbers to decimal number

To convert a hexadecimal number to its base ten equivalents, we proceed as follows:

  1. First write the place values starting from the right hand side.
  2. If a digit is a letter such as an ‘A’ write its decimal equivalent.
  3. Multiply each hexadecimal digit with its corresponding place value and then add the products.

The following examples illustrate how to convert a hexadecimal number to a decimal number.

Converting hexadecimal numbers into binary numbers

Since F is equivalent to a binary number 11112, the hexadecimal numbers are represented using 4 digits as shown in Table 1.12.

 

Table 1.12

 

Decimal. Hexadecimal Binary
equivalent digit equivalent
00 00 0000
01 01 0001
02 02 0010
03 03 0011
04 04 0100
05 05 0101
06 06 0110
07 07 0111
08 08 1000
09 09 1001
A 10 1010
B 11 1011
C 12 1100
D 13 1101
E 14 1110
F 15 1111

 

The simplest method of converting a hexadecimal number to binary is to express each hexadecimal digit as a four bit binary number and then arranging the groups according to their corresponding positions as shown in Example 1.21.

 

Symbolic representation using coding schemes

In computing, a single character such as a letter, a number or a symbol is represented by a group of bits, the number of bits per character depends on the coding scheme used.

The most common coding schemes are the Binary Coded Decimal (BCD), Extended Binary Coded Decimal Interchange Code (EBCDIC) and American Standard Code for Information Interchange (ASCII).

 

Binary Coded Decimal

Binary Coded Decimal is a 4-bit code used to represent numeric data only. For example, a number like 9 can be represented using Binary Coded Decimal as 10012, Binary Coded Decimal system is mostly used in simple electronic devices like calculators and microwaves. This is because it makes it easier to process and display individual numbers on their Liquid Crystal Display (LCD) screens.

 

A standard Binary Coded Decimal, an enhanced format of Binary Coded Decimal, is a 6-bit representation scheme which can represent non­numeric characters. This allows 64 characters to be represented. For example, letter A can be represented as 1100012 using the standard Binary Coded Decimal. A set of Binary Coded Decimal and standard Binary Coded Decimal code are provided in Appendix II.

 

Extended Binary Coded Decimal Interchange Code (EBCDIC)

Extended Binary Coded Decimal Interchange Code (EBCDIC) is an 8­bit character coding scheme used primarily on IBM computers. A total of256 (28) characters can be coded using this scheme. For example, the symbolic representation of letter A using Extended Binary Coded Decimal Interchange Code is 110000012, See Appendix II for a detailed scheme.

 

American Standard Code for Information Interchange (ASCII)

American Standard Code for Information Interchange (ASCII) is a 7-bit code, which means that only 128 characters i.e. 27 can be represented. However manufacturers have added an eighth bit to this coding scheme, which can now provide for 256 characters. This 8-bit coding scheme is referred to as an 8-bit American Standard Code for Information Interchange. The symbolic representation of letter A using this scheme is 10000012, See Appendix II for more details,

 

»Binary arithmetic operations

In mathematics, the four basic arithmetic operations applied on numbers are addition, subtraction, multiplication and division. In computers the same operations are performed inside the central processing unit by the arithmetic and logic unit (ALU). However the arithmetic and logic unit cannot perform binary subtraction directly. It performs binary subtraction using a process known as complementation. For multiplication and division, the arithmetic and logic unit uses a method called shifting before adding the bits; however, because the treatment of this method is beyond the scope of this book, we shall only explain how the computer performs binary addition and subtraction.

 

Representation of signed binary numbers

In computer technology there are three common ways of representing a signed binary number.

  1. Prefixing an extra sign bit to a binary number.
  2. Using ones complement.
  3. using twos complement.

 

Prefixing an extra sign bit to a binary number

In decimal numbers, a signed number has a prefix “+” for a positive number e.g. +2710 and “-” for a negative number e.g. -2710 However in binary, a negative number may be represented by prefixing a digit 1 to the number while a positive number may be represented by prefixing a digit O. For example, the 7-bit binary equivalent of 127 is 11111112, To indicate that it is positive, we add an extra bit (0) to the left of the number i.e. (0) 11111112, To indicate that it is a negative number we add an extra bit (1) i.e. (1) 11111112, The problem of using this method is that the zero can be represented in two ways i.e. (0)00000002 and (1 )00000002,

 

Ones complement

. The term complement refers to a part which together with another makes up a whole. For example in geometry two complementary angles add up to one right angle (90°). The idea of complement is used to address the problem of signed numbers i.e., positive and negative.

In decimal numbers (0 to 9), we talk of nine’s complement. For example the nines complement of 9 is 0 that of 5 is 4 while that of 3 is 6. However, in binary numbers, the ones complement is the bitwise NOT applied to the number. Bitwise NOT is a unary operator (operation on only one operand) that performs logical negation on each bit. For example the bitwise NOT of 11002 is 00112 i.e. Os are negated to Is while I’s are negated to O’s. Likewise the bitwise NOT of 00 1 0 11 0 1 is 110100102 which represents -4510‘ The bitwise NOT of 8-bit zero 000000002 is 111111112, Looking at the two numbers, the most significant digit shows that the number has a sign bit “0” for “+0″ and” 1″ for “-0”. Like in the method of using an extra sign bit, in ones complement, there are two ways of representing a zero.

 

Twos complement

Twos complement, equivalent to tens complement in decimal numbers, is the most popular way of representing negative numbers in computer systems. The advantages of using this method are:

  1. There are no two ways of representing a zero, as is the case with the other two methods.
  1. Effective addition and subtraction can be done even with numbers that are represented with a sign bit without a need for extra circuitries to examine the sign of an operand.

The twos complement of a number is obtained by getting the ones complement then adding a 1. For example, to get the twos complement of a decimal number 4510‘ first convert it to its binary equivalent then find its ones complement. Add a 1 to the ones complement i.e.

4510 = 001011012

Bitwise NOT (00101101) = 11010010

 

Two’s complement = 110100112

 

Binary addition

The five possible additions in binary are:

  1. 0+0=0
  2. 0 + 12= 12
  3. 12 + 0 = 12
  4. 12 + 12 =102 (read as 0, carry 1)
  5. 12 + 12 + 12 = 112 (read as 1, carry 1)

 

Binary subtraction

 

Direct subtraction

The four possible subtractions in binary are:

  1. 0-0=0
  2. 12-0= 1
  3. 12 – 12 = 0
  4. 102 – 12 = 12 (Borrow 1 from the next most significant digit to make 0 become 102, hence 102 – 12 = 12)

The following examples illustrate binary. Subtraction using the direct. method.

 

Subtraction using ones complements

The main purpose of using the ones complement in computers is to perform binary subtractions. For example to get the difference in 5 – 3, using the ones complement, we proceed as follows:

  1. Rewrite the problem as 5 + (-3) to show that the computer performs binary subtraction by adding the binary equivalent of 5 to the ones complement of 3.

2.Convert the absolute value of 3 into 8-bit equivalent i.e. 000000112,

3.Take the ones complement of 000000 112 i.e. 111111002 which is the binary representation of -310

  1. Add the binary equivalent of5 to the one’s complement of3 i.e.

000000101

+  111111000

(1)00000001

 

Looking at the difference of the two binary numbers, you will observe that:

  1. It has a ninth bit. The ninth bit is known as an overflow bit.
  2. The result show that the difference between the two numbers is 00000001. This is not true! We know that it should be 00000010.

To address this problem in a system that uses ones complement, the overflow digit is added back to the magnitude of the 8-bit difference. Therefore the difference becomes 00000001 + 1 = 00000010, which is the correct answer.

Subtraction using twos complements

Like in ones complement, the twos complement of a number is obtained by negating a positive number to its negative counterpart. For example to get the difference in 5 – 3, using the two’s complement, we proceed as follows:

  1. Rewrite the problem as 5 + (-3).
  2. Convert the absolute value of 3 into 8-bit binary equivalent i.e. 00000011.
  3. Take the ones complement of 000000 11 i.e. 11111100.
  4. Add a 1 to the ones complement i.e. 11111100 to get 11111101
  5. Add the binary equivalent of 5 to the twos complement of 3 i.e.

000000101

+ 111111001

(1 )000000 1 0

  1. Ignoring the overflow bit, the resulting number is 00000010 which is directly read as a binary equivalent of +2.

 

DATA PROCESSING

 

Chapter outline

 

2.1 Introduction

2.2 Data processing cycle

2.3 Description of errors in data processing

2.4 Data integrity

2.5 Data processing methods

2.6 Computer files

2.7 Types of computer processing files

2.8 File organisation methods

2.9 Electronic data processing modes

 

Introduction

Data refers to the raw facts that do not have much meaning to the user and may include numbers, letters, symbols, sound or images. Information, on the other hand, refers to the meaningful output obtained after processing the data.

 

Therefore the data processing refers to the process of transforming raw data into meaningful output i.e. information. Data processing can be done manually using pen and paper, mechanically using simple devices like typewriters or electronically using modem data processing tools such as computers. Electronic data processing has become so popular that manual and mechanical methods are being pushed to obsolescence.

 

Data processing cycle

Data processing cycle refers to input-process-output stages that data goes through to be transformed into information. It is often referred to as a cycle because the output obtained can be stored after processing and may be used in future as input. The four main stages of data processing cycle are:

  1. Data collection
  2. Data input
  3. Processing
  4. Output

 

 

Data collection

Data collection is also referred to as data gathering or fact-finding. It involves looking for crucial facts needed for processing.

 

Methods of data collection

Some methods of data collection include interviews, use of questionnaires, observation etc. In most cases, the data is collected after sampling. Sampling is the process of selecting representative elements (e.g. people, organisations) from an entire group (population) of interest. Some of the tools that help in the data collection include source documents such as forms, data capture devices such as a digital camera etc.

 

Stages of data collection

The process of data collection may involve a number of stages depending on the method used. These include:

Data creation: This is the process of putting together facts in an organised format. This may be in form of manually prepared document or captured from the source using a data capture device such as a bar code reader.

Data transmission: This will depend on whether data need to be transmitted via communication media to the central office.

 

Data preparation: This is transcription (conversion) of data from source document to machine-readable form. This may not be the case for all input devices. Data collected using devices that directly capture data in digital form do not require transcription.

 

. Media conversion: Data may need to be converted from one medium to another e.g. from a floppy disk to hard disk for faster input.

Input validation: Data entered into the computer is subjected to validity checks by a computer program before being processed to reduce errors at the input.

Sorting: In case the data needs to be arranged in a predefined order, it is first sorted before processing.

 

Data input

Data input refers to a process where the collected data is converted from human readable form to machine-readable form (binary form). The conversion takes place in the input device.

 

Processing

This is the transformation of input data by the central processing unit (CPU) to a more meaningful output (information). Some of the operations performed on data include calculations, comparing values and sorting.

 

Output

The final activity in data processing cycle is producing the desired output also referred to as information. The information can then be distributed to the target group or stored for future use. Distribution is making the information available to those who need it and is sometimes called information dissemination. This process of dissemination may involve electronic presentation over radio or television, distribution of hard copies, broadcasting messages over the Internet or mobile phones etc.

 

Description of errors in data processing

The accuracy of computer output is very critical. As the saying goes, garbage in, garbage out (GIGO), the accuracy of the data entered in the computer directly determines the accuracy of the information given out.

 

Some of the errors that influence the accuracy of data input and information output include transcription, computation and algorithm errors.

 

Transcription errors

Transcription errors occur during data entry. Such errors include misreading and transposition errors.

 

Misreading errors

Incorrect reading of the source document by the user and hence entering wrong values bring about misreading errors. For example, a user may misread a hand written figure such as 589 and type S86 instead i.e. confusing 5 for S.

 

Transposition errors

Transposition errors results from incorrect arrangement of characters i.e. putting characters in the wrong order. For example, the user may enter 396 instead of369.

 

Transcription errors can be avoided by using modem data capture devices such as bar code readers, optical character readers, and digital cameras etc., which enter data with minimum user intervention.

 

Computational errors

Computational errors occur when an arithmetic operation does not produce the expected results. The most common computation errors include overflow, truncation and rounding errors.

 

Overflow errors

An overflow occurs if the result from a calculation is too large to be stored in the allocated memory space. For example if a byte is represented using 8 bits, an overflow will occur if the result of a calculation gives a 9-bit number.

 

Truncation errors

Truncation errors result from having real numbers that have a long fractional part that cannot fit in the allocated memory space. The computer would truncate or cut off the extra characters from the fractional part. For example, a number like 0.784969 can be truncated to four digits to become 0.784. The resulting number is not rounded off.

 

Rounding errors

Rounding errors results from raising or lowering a digit in a real number to the required rounded number. For example, to round off 30 666 to one decimal place, we raise the first digit after the decimal point if its successor is more than 5. In this case, the successor is 6 therefore 30.666 rounded up to one decimal place is 30.7. If the successor is below 5, e.g. 30.635, we round down the number to 30.6.

 

Algorithm or logical errors

An algorithm is a set of procedural steps followed to solve a given problem. Algorithms are used as design tools when writing programs. Wrongly designed programs would result in a program that runs but gives erroneous output. Such errors that result from wrong algorithm design are referred to as algorithm or logical errors.

 

Data integrity

Data integrity refers to the accuracy and completeness of data entered in a computer or received from the information system. Integrity is measured in terms of accuracy, timeliness and relevance of data.

 

Accuracy

Accuracy refers to how close an approximation is to an actual value. As long as the correct instructions and data are entered, computers produce accurate results efficiently. In numbers, the accuracy of a real number depends on the number. For example 72.1264 is more accurate than 72.13.

 

Timeliness

Timeliness of data and information is important because data and information have a time value attached to them. If received late, information may have become meaningless to the user. For example, information on the newspaper that is meant to invite people for a meeting or occasion must be printed prior to the event and not later.

 

Relevance

Data entered into the computer must be relevant in order to get the expected output. In this case, relevance means that the data entered must be pertinent to the processing needs at hand and must meet the requirements of the processing cycle. The user also needs relevant information for daily operations or decision making.

 

Threat to data integrity

 

Threats to data integrity can be minimized through the following ways:

 

  1. Backup data preferably on external storage media.
  2. Control access to data by enforcing security measures.
  3. Design user interfaces that minimize chances of invalid data entry.
  4. Using error detection and correction software when transmitting data.
  5. Using devices that directly capture data from the source such as bar code readers, digital cameras, optical character readers etc.

 

Data processing methods.

As mentioned earlier, data can be processed manually, mechanically or electronically.

Manual data processing

In manual data processing, most tasks are done manually with a pen and a paper. For example in a busy office, incoming tasks (input) are stacked in the “in tray”. The processed tasks are then put in the “out tray” (output). The processing of each task involves a person using the brain in order to respond to queries. The processed information from the out tray is then distributed to the people who need it or stored in a file cabinet.

 

Mechanical data processing

Manual processing is cumbersome and boring especially when processing repetitive tasks. Mechanical devices were developed to help in automation of manual tasks. Examples of mechanical devices include the typewriter, printing press and weaving looms. Initially, these devices did not have any electronic intelligence.

 

Electronic data processing

For a long time, scientists have researched on how to develop machines or devices that would simulate some form of human intelligence during data and information processing. This was made possible to some extent with the development of electronic programmable devices such as computers.

The advent of microprocessor technology has greatly enhanced data processing efficiency and capability. Some of the microprocessor-controlled devices include computers, cellular (mobile) phones, calculators, fuel pumps, modem television sets, washing machines etc.

Computer files

A file can be defined as a collection of related records that give a complete set of information about a certain item or entity. A file can be stored manually in a file cabinet or electronically in computer storage devices. Computerized storage offers a much better way of holding information than the manual filing systems, which heavily rely on the concept of the file cabinet. Some of the advantages of computerized filing system include:

  1. Information takes up much less space than the manual filing.
  2. It is much easier to update or modify information.
  3. It offers faster access and retrieval of data.
  4. It enhances data integrity and reduces duplication.

 

Elements of a computer file

A computer file is made up of three elements namely: characters, fields and records.

 

Characters A character is the smallest element in a computer file and refers to a letter, number or symbol that can be entered, stored and output by a computer. A character is made up of a set of seven or eight bits depending on the character-coding scheme used.

 

Fields

A field is a single character or collection of characters that represents a single piece of data. For example, in a student’s record, the student’s admission number is an example of a field.

 

Records

A record is a collection of related fields that represent a single entity. For example, in a class score sheet, details of each student in a row such as admission number, name, total marks and position make up a record.

 

Logical and physical files

Computer files are classified as either logical or physical.

 

Logical files

A logical file is a type of file viewed in terms of what data items it contains and details of what processing operations may be performed on the data items. It does not have implementation specific information like field, data types, size and file type. Logical files are discussed in system design later in the book.

 

Physical files

As opposed to a logical file, a physical file is one that is viewed in terms of how data is stored on a storage media and how the processing operations are made possible. Physical files have implementation specific details such as characters per field and data type for each field. Physical files are discussed later in system implementation and operation in this book.

 

Types of computer processing files

There are numerous types of files used for storing data needed for processing, reference or backup. The main common types of processing files include master files, transaction, reference, backup, report and sort file.

 

Master file

A master file is the main file that contains relatively permanent records about particular items or entries. For example a customer file will contain details of a customer such as customer ID, name and contact address.

 

Transaction (movement) file

A transaction file is used to hold input data during transaction processing. The file is later used to update the master file and audit daily, weekly or monthly transactions. For example in a busy supermarket, daily sales are recorded on a transaction file and later used to update the stock file. The file is also used by the management to check on the daily or periodic transactions.

 

Reference file

A reference file is mainly used for reference or look-up purposes. Look­up information is that information which is stored in a separate file but is required during processing. For example, in a point of sale terminal, the item code entered either manually or using a bar code reader looks up the item description and price from a reference file stored on a storage device.

 

Backup file

A backup file is used to hold copies (backups) of data or information from the computers fixed storage (hard disk). Since a file held on the hard disk may be corrupted, lost or changed accidentally, it is necessary to keep copies of the recently updated files. In case of the hard disk failure, a backup file can be used to reconstruct the original file.

 

Report file

A report file is used to store relatively permanent records extracted from the master file or generated after processing. For example you may obtain a stock levels report generated from an inventory system while a copy of the report will be stored in the report file.

 

Sort file

A sort file is mainly used where data is to be processed sequentially. In sequential processing, data or records are first sorted and held on a magnetic tape before updating the maste file.

 

File organization methods

File organization refers to the way data is stored in a file. File organization is very important because it determines the method of access, efficiency, flexibility and storage devices to be used. There are four methods of organizing files on a storage media. This includes: sequential, random, serial and indexed-sequential

Sequential file organisation

In sequential file organisation, records are stored and accessed in a particular order sorted using a key field. Retrieval requires searching sequentially through the entire file record by record from the beginning to the end. Because the records in the file are sorted in a particular order, better file searching methods like the binary search technique can be used to reduce the time used for searching a file. Since the records are sorted, it is possible to know in which half of the file a particular record being searched is located. Hence this method repeatedly divides the set of records in the file into two halves and searches only the half in which the record is found. For example, if the file has records with key fields 20, 30, 40, 50, 60 and the computer is searching for a record with key field 50, it starts at 40 upwards in its search, ignoring the first half of the set.

 

Random or direct file organisation

In random or direct file organisation, records are stored randomly but accessed directly. To access a file stored randomly, a record key is used to determine where a record is stored on the storage media. Magnetic and optical disks allow data to be stored and accessed randomly.

 

Serial file organisation

With serial file organisation, records in a file are stored and accessed one after another. The records are not sorted in any way on the storage medium. This type of organisation is mostly used on magnetic tapes.

Indexed-sequential file organisation method

This method is almost similar to sequential method, only that an index is used to enable the computer to locate individual records on the storage media. For example, on an magnetic drum, records are stored sequentially on the tracks. However, each record is assigned an index that can be used to access it directly.

 

Electronic data processing modes

There are several ways in which a computer, under the influence of an operating system is designed to process data. Examples of processing modes are:

 

  1. Online processing
  2. Real-time processing
  3. Distributed processing
  4. Time-sharing.
  5. Batch processing
  6. Multiprocessing
  7. Multitasking
  8. Interactive processing

 

On-line processing

In online data processing data is processed immediately it is received the computer is connected directly to the data input unit via a communication link. The data input may be a network terminal or an online input device attached to the computer.

 

Real-time processing

In a real-time data processing, computer processes the incom111g data as soon as it occurs, up-dates the transaction file and gives an immediate response that would affect the events as they happen. This is different from online in that for the latter an immediate response may not be required. The main purpose of a real-time processing is to provide accurate, up-to-date information hence better services based on a true (real) situation. An example of real-time processing is making a reservation for airline seats. A customer may request for an airline booking information through a remote terminal and the requested information will be given out within no time by the reservation system. If a booking is made, the system immediately updates the reservations file to avoid double booking and sends the response back to the customer immediately.

 

Distributed data processing

Distributed data processing refers to dividing (distributing) processing tasks to two or more computers that are located on physically separate sites but connected by data transmission media. For example, a distributed database will have different tables of the same database residing on separate computers and processed there as need arises. The users of the distributed database will be completely unaware of the distribution and will interact with the database as if all of it was on their computer.. This distribution of processing power increases efficiency and speed of processing. An example is in the banking industry where customers’ accounts are operated on servers in the branches but all the branch accounts can be administered centrally from the main server as if they resided on it. In this case, we say that the distributed database is transparent to the user because the distribution is hidden from the user’s point of view.

 

Time-sharing

In a time-sharing processing, many terminals connected to a central computer are given access to the central processing unit apparently at the same time. However in actual sense, each user is allocated a time slice of the CPU in sequence. The amount of time allocated to each user is controlled by a multi-user operating system. If a user’s task is not completed during the allocated time slice, he/she is allocated another time slice later in a round robin manner.

 

Batch processing

In batch processing, data is accumulated as a group (batch) over a specified period of time e.g. daily, weekly or monthly. The batch is then processed at once. For example in a payroll processing system, employees’ details concerning number of hours worked, rate of pay, and other details are collected for a period of time, say one month. These details are then used to process the payment for the duration worked. Most printing systems use the batch processing to print documents.

 

Multiprocessing

Multiprocessing refers to the processing of more than one task at the same time on different processors of the same computer. This is possible in computers such as mainframes and network servers. In such systems, a computer may contain more than one independent central processing unit, which works together in a coordinated way. At a given time, the processors may execute instructions from two or more different programs or from different parts of one program simultaneously. This coordination is made possible by a multiprocessing operating system that enables different processors to operate together and share the same memory.

 

Multiprogramming

Multiprogramming, also referred to as multi-tasking refers to a type of processing where more than one programs are executed apparently at the same time by a single central processing unit. It is important to note that, as opposed to multiprocessing. In multiprogramming, a computer has only one central processing unit. The operating system allocates each program a time slice and decides what order they will be executed. This scheduling is done so quickly that the user gets the impression that all programs are being executed at the same time.

 

Interactive processing

In interactive data processing, there is continuous dialogue between the user and the computer. As the program executes, it keeps on prompting the user to provide input or respond to prompts displayed on the screen.

 

ELEMENTARY PROGRAMMING PRINCIPLES

 

Chapter  outline

 

3.1 Introduction

3.2 Computer programming

3.3 Description of terms used in programming

3.4 Levels of programming languages

3.5 Advantages and disadvantages of low level and high-level languages

3.6 Program development

3.7 Program documentation

3.8 Development of algorithms

3.9 Program control structures

3.10 Designing more complex algorithms

 

Introduction

Human beings have evolved from the Stone Age to a highly sophisticated and advanced society by inventing things like the wheel, fire, transistors and today’s ultra modem devices like computers. The idea of computers started way back in the nineteenth century.

The first generation computers called Electronic Numeric integrator and Calculator (ENIAC 1) were operated by plugging wires into a control panel that resembles the old telephone switchboards

Computer programming

A computer works by executing a set of instructions known as a program. The term programming refers to the process of developing computer instructions (programs) used to solve a particular task. It involves use of special characters, signs and symbols found in a particular programming language to create computer instructions. A programming language is a special set of symbols that can be translated into machine-readable form by the computer when arranged in a particular sequence or order. Each language has a special sequence or order of writing characters usually referred to as syntax.

It was John von Neumann of Princeton University (USA) who first came up with the proposition to store programs in the computer memory. Perhaps, this was one of the most dramatic developments in the computer history. Why? Because not only did the new stored-program way of computing increase-processing speed but also allowed easy and flexible methods of editing and updating the program.

 

Description of terms used in programming

Before we go further with programming, it is important to define some common terms used in computer programming.

 

Source program

The term source program refers to the program code that the programmer enters in the program editor window that is not yet translated into machine-readable form. The source program is usually created using a particular programming language as discussed later.

 

Object code

The term object code refers to the program code that is in machine-readable. A source code that is not in machine-readable form must be translated into object code.

 

Translators

The term translator is used to refer to language processors such as assemblers, interpreters and compilers that convert the source program into object code.

 

Assembler

An assembler translates assembly language into machine language that the computer can understand and execute.

 

Interpreter

An interpreter translates the source program line-by-line, allowing the CPU to execute one line before translating the next. The translated line is not stored in the computer memory. It means that every time the program is needed for execution, it has to be translated. This method of translating programs was very common in early computers that did not have enough memory to store the object code as a file that can be executed later

 

Compiler

A compiler translates the entire source program into object code: The object code file can be made into a fully executable program by carrying out another process known as linking which joins the object code to all the other files that are needed for the execution of the program. After the linking process, an executable file (application file) is generated. This file is stored on a storage media such as a disk with a name that has a unique extension (.EXE). Examples of executable files are WINWORD.EXE and PM70.EXE used to start Microsoft Word and Adobe PageMaker 7.0 respectively.

 

The difference between the interpreters and compilers are summarised below:

 

Interpreters Compilers
1. Translates the source program

one statement at a time

1. Translates the entire source code

at once before execution

2. Translates the program each

Time it is run hence slower than

Compiling

2. Compiled program (object code) can be saved on a storage media and run as required, hence

Executes faster than interpreted

Programs.

3. Interpreted object code takes

Less memory compared to

Compiled program.

3. Compiled programs require

More memory as the object file

Are larger.

 

Levels of programming languages

Many programming languages have been developed over the years. These languages are classified into two major levels namely:

  1. Low-level languages
  2. High-level languages

 

These levels are further subdivided into five generations. The first and second generations consist of low-level languages while the third to the fifth generation consist of high-level languages.

 

Low-Level languages

Low-level languages are classified as low because the computer can easily understand them directly or they require little effort to translate into computer understandable form. These languages are hardware oriented and therefore they are not portable i.e. a program written for one computer cannot be installed and used on another. Two types of low level languages are the machine languages and assembly languages.

 

Machine languages (First generation languages)

In machine languages, instructions are written using binary logic. Given that data and instructions are in binary form, many lines of code are needed to accomplish even a simple task like adding two numbers. A program written in machine language might look like this:

It is evident from the above code that it is hard for a person to guess what the program is all about unless they have special knowledge in machine level programming. Furthermore, different CPU’s have different machine codes e.g. those for the Intel Pentium processors may differ from Motorola or Cyrix processors. Therefore before decoding the meaning, a programmer has to know for which CPU the program was written. Obviously, such programs are hard to understand from the programmer’s point of view, but very easy to execute from the computer’s perspective.

 

Assembly languages (Second generation languages)

Assembly languages were developed in order to overcome the difficulties of understanding and using machine languages. These languages represented the first successful attempt to make computer languages readable. The languages allowed programmers to write programs as a set of symbolic operation codes called mnemonics. Mnemonics are basically shortened two or three letter words.  Programs written in assembly language require an assembler in order to convert them into machine language that the computer can understand. Just like the machine languages, assembly languages are also machine dependent and therefore a program written for one computer cannot be used on another.

 

High-level languages

High-level languages are very close to the human language (English like) and they can be read and understood even by people who are not experts in programming. There are many types of high-level languages and each of them was developed to address a particular problem-solving domain while others came about due to advancement in technology. These languages are machine independent. This means that a programmer concentrates on problem solving during a programming session rather than how a machine operates.

High-level languages can be classified into five groups:

  1. Third generation languages. (3 GLs)
  2. Fourth generation languages. (4 GLs)
  3. Fifth generation languages. (5 GLs)
  4. Object oriented languages. (OOPs)
  5. Web scripting languages.

 

Third generation languages (3 GLs)

Third generation languages (3 GLs) are also called structured or procedural languages. A procedural language makes it possible to break a program into components called modules each performing a particular task. This is referred to as structured programming. The structured programming approach emphasizes the following:

  1. Large programs can be broken down into smaller sub programs each performing a single task.
  2. Use of a few simple control structures in problem solving. These control structures include sequence, selection and iteration as covered later in this book.

Structured programming offers many benefits because it is flexible, easier to read and modify. Examples of third generation programming languages include:

Pascal: Pascal was initially developed as an academic language, to help in the teaching and learning of structured programming.

FORTRAN: (FORmula TRANslator): This language was developed for mathematicians, scientists and engineers. It enables writing of programs with mathematical expressions.

COBOL: (Common Business Oriented Language): This language is designed for developing programs that solve business problems e.g. developing data processing applications such as computer-based inventory control systems.

BASIC: (Beginners All-purpose Symbolic Instructional Code): This language was mainly developed to enable students to easily learn programming. Basic is a simple general-purpose language used for developing business and educational applications. Because of its simplicity, it is a powerful tool for students who wish to learn programming. It was the first high-level language that was available for microcomputer users.­

C: This is a programming language mainly used for developing system software such as the operating system. It is one of the most popular and powerful high-level languages in the business world because of its ability to provide the programmer with powerful features of low-level languages and at the same time easily understandable as a high level language.

Ada: This language was named after the first lady programmer, Ada Lovelace. Ada is suitable for developing military, industrial and real­ time systems. .

A sample program written in Pascal language

Imagine the task of developing a program that would solve the equation of a straight line given by the algebraic expression:

Y = MX + C.

To enter the program code below in Pascal, proceed as follows:

  1. From Windows explorer, locate a folder called TP and open it.
  2. From the TP folder select BIN
  3. From BIN window, double click a file named turbo.EXE. Pascal program window is displayed on the screen.
  4. Enter the program code exactly as it is but ignore the numbering.
  5. Program Straight Line (Input, Output);
  6. Var
  7. y, m, x, c: Integer;
  8. Begin
  9. Writeln (‘Input the value of m‘);
  10. Readln (m);
  11. Writeln (‘Input the value of x’);
  12. readln (x);
  13. Writeln (‘Input the value of c ‘);
  14. Readln (c);
  15. Y: = m * x + c;
  16. Writeln (The value of y is:’, y);
  17. End.

Explanation

Line 1: This is the program header. The word “Program” indicate the beginning of the program whose name is Straight-Line. The (input, output) statements shows that the program will expect some input from the keyboard and display the output on the screen.

Line 2: Var is short form for variable. A variable is a location for data in the computer memory. This statement tells the computer that variables are about to be declared. When a variable is declared, the computer sets aside some memory space to store a value in the variable.

Line 3: F our variables have been declared of type integer. This means that the memory spaces that will be set aside can only hold values that are whole numbers.

Line 4: The Begin statement shows that this is the start of the program body. The computer executes statements in this section. For example, the execution starts by asking the user to input the value of m.

Line 5: The writeln statement displays whatever is in the brackets on the screen. Notice that the statements in brackets are written between inverted commas. The string will be sent to the screen exactly the way it appears in the brackets. If you wish to display the value held in a variable on the screen, then you have to remove the inverted comma’s and write the name of the variable in the brackets e.g. writeln (y) will display the value held in the variable y.

Line 6:The read or readln statement reads a value and stores it in a variable. When the program is running, a read/readln statement in the code will display a blinking cursor that indicates to the user where to type the input.

Line 11: Calculates the value of y. Notice the symbol’: =’. In Pascal! This is called the assignment statement. The values on the righ1 are calculated then stored in the variable y, which is on the left of the assignment symbol.

Line 12: The writeln displays the value stored in yon the screen. Notice that y is not within the inverted commas. If you gave the value of m as 10, x as 2 and c as 20 then the following should appeal on your screen: The value of y is: 40.

This is because the statements between the inverted comma’ are meant to make the output readable on the screen. Otherwise: only the value 40 would have been displayed.

Line 13: The ‘End.’ statement shows the end of a program.

 

Fourth generation languages (4 GLs)

Fourth generation languages make programming an even easier task that the third generation languages because they present the programmer with more programming tools. Examples of such tools include command buttons, forms etc. With the advent of these languages, gone are the days when a person had to write lines upon lines of code. Instead, the programmer selects graphical objects on the screen called controls then uses them to create designs on a base form. The programmer may also use an application generator that works behind the scenes to generate the necessary code; hence the programmer is freed from the tedious work of writing the code. Examples of fourth generation languages are: Visual Basic, Delphi Pascal and Visual COBOL.

 

A sample form designed using Visual basic programming language

The programmer in this case simply picks a tool from the toolbox and uses it to create objects such as command buttons, textboxes etc. on the form by dragging the mouse pointer on the form during design.

Fifth generation languages (5 GLs)

Fifth generation languages are designed around the concept of solving problems by enabling the computer to depict human like intelligence. These programs are designed to make the computer solve the problem for the programmer rather than the programmer spending a lot of time to come up with the solution. With such languages, the programmer only worries about what problem needs to be solved and what conditions need to be met without worrying about how to implement an algorithm to solve them. Examples of these languages are those used in artificial intelligence like PROLOG, Mercury, LISP and OCCAM.

 

Object-oriented programming languages (OOP)

The idea behind object-oriented programming (OOP) was developed in the 1960’s but its significance was not appreciated until lately. The concept behind object oriented programming languages is to look at a program as having various objects interacting to make up a whole. Each object has specific data values that are unique to it (called state) and a set of the things it can accomplish called (functions or behavior). This process of having data and functions that operate on the data within an object is called encapsulation. Several objects can then be linked together to form a complete program. Examples of object-oriented languages include Simula, which was developed in the 1960’s. However, C++, Java and SmallTalk are contemporary languages in this range. Although Java is sometimes associated with development of web sites it can be used to create whole application programs that do not need a web browser to run. OOP has contributed greatly to the development of graphical user interface operating systems and application programs.

I

Web Scripting languages!

Web scripting languages are used to develop or add functionalities on web pages. Web pages are hypertext documents created in a language called Hypertext Markup Language (HTML). The language simply consists of tags that are interpreted by the web browser software to display text when the HTML file is opened on the screen by a web browser software. A tag is a special word enclosed between the less than and greater than (<>) symbols and the browser can interpret it as a command. For example, to start a HTML page, one must use the <HTML> tag at the very top of the document. Other languages like Extended HTML (XML) have been derived directly from HTML with the only difference being that XML allows the user to define their own tags instead of using the standard HTML tags.

Unlike other programming languages, HTML does not have the declaration part and control structures (to be covered later in the book). Due of this reason, it is not considered as a true programming language.

Due to its simplicity, HTML has many limitations and cannot be used alone when it comes to developing functional websites. Some special blocks of code known as scripts may be inserted in HTML pages using scripting languages like JavaScript, VBScript and Hypertext Preprocessor (PHP) in order to add functionality to the HTML page. A script is a small program fragment, written in a different language other than HTML but inserted into the HTML program.

Most HTML tags have an opening tag and a closing tag. An opening tag is enclosed between < > while a closing one between </ >. Text that is to be displayed on the screen is enclosed between an opening and closing tag. For example, the statement <B> Hello </B> will display the word “Hello” in boldface on the screen. Table 3.1 shows examples of HTML tags and their meanings:

 

 

 

1

Table 3.1

Tag Meaning
1. <HTML></HTML> Marks the beginning and end of a HTML

document. All other tags and text fall

between these two tags.

2. <HEAD> </HEAD> Marks the header part of the document.
3. <TITLE> </TITLE> Gives title of the web page. Text between

this tags appears in the title bar when the

page is browsed.

4. <BODY></BODY> Marks the body part of the document.
5. <CENTER></CENTER> Centres text and objects on the web page.
6. <B></B> Bolds the text on the web page.
7. <1></1> Italicise the text.
8. <Hl></Hl> Sets size of text on the web page with H6

displaying the smallest and H1 the largest

Size.

Creating a script using Javascript

Javascript is a popular scripting language. Before writing your HTML program with a script inserted, make sure that you have the latest browser software installed on your computer. Older browsers may not have support for Javascript. If you are using Internet Explorer, it should be version 5.0 and above.

Open Notepad and key in the following program. Do not write the numbers to the left of each line of code.

  1. <HTML>
  2. <HEAD>
  3. < TITLE> Scripting Example </TITLE>
  4. </HEAD>
  5. <BODY>
  6. <HI> < CENTER. <B> We are the world </B> </CENTER> </HI>
  7. <SCRIPT LANGUAGE = ‘JavaScript’>
  8. Document. Write (‘My name is strongman’);
  9. alert (‘congratulations for succeeding to run this script’);
  10. </SCRIPT>
  11. </BODY></HTML>

After typing the entire program, save your file on the desktop as Example.html and then close the notepad. Notice that the icon to your file on the desktop look like that of the default web browser in your computer.

To view the web page, double click the icon of the file Example .htm1 on the desktop. Figure 3.3. shows an open webpage.

 

 

 

Fig. 3.3: A web page with a script.

Explanations

Line I: The tag <HTML> marks the beginning of the HTML document.

Line 2: The <TITLE> </TITLE> tags show the title of the web page. The text between this tags will appear in the title bar of the running HTML document as can be seen in Figure 3.2. Notice that the title is written in the header section i.e. between <HEAD> and </HEAD> tags.

 

Line 5: It marks the beginning of the body section. Anything between <BODY> and </BODY> will be executed and displayed when the webpage starts running.

Line 6: This line will display the text “We are the world” on the screen. The text will be large i.e. size HI and it will be centred on the screen. The text will also be bolded.

 

Line 7: It marks the start point of the script. Notice the line LANGUAGE = ‘JavaScript’ which tells the browser that the script will be written in JavaScript language.

Line 8: The statement Document. Write tells the browser using JavaScript to write whatever is in the brackets. Notice that in JavaScript, the end of a statement is marked by a semicolon (;).

Line 9: The word alert displays a message box on the screen with an OK button. Clicking the button makes the message box to disappear. The text in the brackets appears in the dialog box. Line 10: Closes the script.

Line 11: Marks the end of the body and the HTML code.

Practical activity 3.1

  1. Open a text editor program on your computer like NotePad or WordPad. I
  2. Type the following program exactly the way it is in the editor:

<HTML>

<HEAD><TITLE> This is my first webpage</TITLE></HEAD> <BODY bgcolor = “red” >

<H l><CENTER><B>Hello World</B></CENTER></HI>

</BODY> </HTML>

  1. Save your work as webpage.html on the desktop. Make sure that the Save As Type box reads “All Files” before clicking the save button in order to avoid saving a text file with two extensions i.e. webpage.html. txt
  2. Close your text editor. Notice that your file on the desktop has the icon of the default web browser installed on your computer. Double click it to view the web page! Figure 3.4 shows a sample of the display expected when the file is loaded to the browser. If you have a colour monitor, it should look as below only that it will have black bold text on a red background!
  3. Check your program and change your background to blue, save then click the refresh button. What happens?

 

 

Fig. 3.4: Sample web page

Advantages and disadvantages of low-level and high-level languages

Having looked at the various programming languages, it is important to identify the advantages and disadvantages associated with each level of programming languages.

Advantages and disadvantages of low level languages

Advantages

  1. The CPU understands machine language directly without translation.
  2. The processor executes them faster because complex instructions are already broken down into smaller simpler ones.
  3. Low level languages are stable and hardly crash or break down once written.

Disadvantages

  1. Low level languages are difficult and cumbersome to use and learn.
  2. They require highly trained experts both to develop and maintain programs.
  3. Removing errors (debugging) in low level language programs is difficult.
  4. Low level programs are machine dependent i.e. they are not transferable from one hardware or software platform to another.

Hence we say they are not portable.

Advantages and disadvantages of high level languages

Advantages

  1. High level languages are portable i.e. they are transferable from one computer to another.
  2. High level languages are user friendly and easy to use and learn.
  3. High level languages are more flexible; hence they enhance the creativity of the programmer and increase productivity in the workplace.
  4. High level languages are far much easier to correct errors (debug).

 

Disadvantages

  1. Their nature encourages use of many instructions in a word or statement hence the complexity of these instructions causes slower program processing.
  2. They have to be interpreted or compiled to machine readable form before the computer can execute them.

(Review questions 3.1)

  1. Define the term computer program.
  2. What is programming?
  3. State three advantages of high level languages over low level, languages.
  4. List four examples of high level languages and for each state its most appropriate application area.
  5. Why is an executable file unique as compared to any other file?
  6. Differentiate between a compiler and an interpreter. Why did early computers work well with interpreters?
  7. List the various examples of programming languages per generation.
  8. State one advantage of machine language over all the other languages.
  9. Write the following in full:

(a) HTML                        (b) OOP

  1. Distinguish between source program and object code in programming.
  2. Define the term encapsulation as used in object oriented programming.

Program development

The process of program development is not an easy task. Remember that in our definition of programming, we said that the program must solve a particular problem or accomplish a task. Hence, before developing a program, the requirements of the eventual users and its expected functions should be fully understood.

Program development can be broken into the following stages:

  1. Problem recognition.
  2. Problem definition.
  3. Program design.
  4. Program coding.
  5. Program testing and debugging.
  6. Implementation and maintenance.

The completion of one stage leads to the beginning of the next. At the same time, some stages have to be continuously reviewed in light of the step just before them to make sure that they meet the requirements. For example, after coding, the code has to be compared to the design to see whether it meets the design specification. Therefore, this method becomes very expensive if the correct requirements are not identified at each stage before the next is initiated.

It is important to note that although some people consider documentation as an independent stage, it is done at all stages of the program development lifecycle as shown in Figure 3.5. This is important so that the facts are recorded when they are still fresh and in the required detail by the programmer.

 

Problem recognition

Problem recognition refers to the understanding and interpretation of a particular problem. In order to understand a problem you need to look for the key words such as compute, evaluate, compare etc. You can then rewrite the problem in a more simplified way using the keywords.

A programmer identifies problems in the environment and seeks to solve them by writing a computer program that would provide the solution. Many of the privileges of automation that we enjoy today are as a result of people who wrote computer programs to do the tasks. For example, the intelligent control of traffic lights, the autopilot in aircraft and the use of robots in industry are good examples where problems were recognised and the computer was used as a tool to solve them. Think of the person who after seeing the tedious nature of typing using a manual typewriter decided to develop a word processor program!

In any given circumstance, the following three situations can cause the programmer to identify a problem that is worth solving:

  1. Problems or undesirable situations that prevent an individual or organisations from achieving their purpose.
  2. Opportunity to improve the current program. It can be argued that any unexploited opportunity is a problem.
  3. A new directive given by the management requiring a change in the status quo.

Sample problem

Consider a mathematical problem such as calculating the area of a circle. In this case, the problem is finding the area of a circle. As a programmer, it will be your interest to develop a program that can be used to calculate the area of any circle. The equation for calculating the area of a circle is given by A = лr2.

Problem definition

In problem definition, also referred to as problem analysis, the programmer tries to determine or define the likely input, processing activities and the expected output using the keywords outlined at the problem recognition stage.

At the end of this stage, the boundaries of the expected program will have been established i.e. a clear view of what the program needs to accomplish must be in place. In case, several methods are identified that can be used to solve the same problem, then the best alternative should be chosen.

In our problem of calculating the area of a circle, an investigation reveals that the parameters needed to determine the area of any circle are:

  1. Input: (a) Pie (л) which is a constant.

(b) The radius of the circle.

  1. Process: The formula of calculating area of a circle which is л x radius x radius.
  2. Output: The area of the circle (A).

The problem definition stage ends with the writing of a requirements report or document for the new program. It is this document that enables a programmer to come up with a program design that meets the needs at hand.

Program design

Program design is the actual development of the program’s processing or problem solving logic called the algorithm. An algorithm refers to a limited number of logical steps that a program follows in order to solve a problem. It is the programmer who will usually come up with the algorithm after carefully analysing the requirements specification. Many programs are not usually made up of one large block of code i.e. they are not monolithic. Instead, several units called modules work together to form the whole

In modular programming, each module performs a specific task. This approach makes a program flexible, easier to read and carry out error correction.

The design phase enables the programmer to come up with models of the expected program. The models show the flow of events and data throughout the entire program from the time data is input to the time the program gives out expected information. The development of algorithms is covered later in the chapter.

Program coding

Program coding is the actual process of converting a design model into its equivalent program. This is done by creating the program using a particular programming language. The end result of this stage is a source program that can be translated into machine readable form for the computer to execute and solve the target problem. Programs can be written in many different languages but the general trend in the world today is to use programs that are easy to learn and understand such as, Pascal, C++, Visual Basic and Java. Below is a comparison of the same program written in Pascal and C++ used to calculate the area of a circle.

Program in Pascal Program in c++
Program AreaCircle (input, output);

Const Pi = 3.142;

Var

Radius, Area: real;

Begin

Writeln (‘Enter the radius’);

Readln (radius);

Area: = Pi *Radius *Radius;

Writeln (‘The area is’, Area)

End.

#include<iostream.h>

main ( )

{

double radius, area;

const double pi = 3. 142;

cout«”Enter the radius”« “\n”;

cin»radius;

area = pi *radius * radius;

cout«”The area is”« area «”\n”;

return 0;

}

NB: Use lowercase when coding using C++.

Going through the two programs, you will realise that they are fairly similar, irregardless of the language that was used to code them. The table below explains the program codes.

Pascal code C++ code Explanation  
Program AreaCircle

(input, output);

#include<iostream.h» The header of the programs. The statements in ( ) and < > shows that the user inputs data via the keyboard and the program display information on the screen.  
Const Pi = 3.142; double pi = 3.142; A constant has been

declared with a name pi

and value 3.142.

Var

radius, area:real

double area, radius; Real variables with fractional

parts have been declared.

Begin { Marks the beginning of the

program body or c++

function

Writeln (‘Enter

the radius’);

cout< <“Enter radius”; Displays on the screen the

string between inverted

commas

Readln (Radius) cin> >radius; Displays a blinking cursor

that tells the user that an

input is needed before the

program can continue.

Area: = Pi*Radius

*Radius;

area = pi*radius

* radius;

Calculates the area. Notice

the assigment statement in

Pascal is : = while in C++ it

IS =

Writeln (‘The area

is’ Area)’

, ,

cout< <“The area

is” area « “\n”;

Display the value stored in

the variable Area.

End. return 0;

}

Marks the end of the

program

NB: “\n” is a C++ syntax of directing the character to a new line. It is equivalent to PASCAL’s “In” used in writeln and readln.

Program testing and debugging

After coding, the program has to be tested and the errors detected corrected (debugged).

There are two types of errors (bugs) that can be encountered when testing a program. These are:

1 Syntax errors: These errors emanate from improper use of language rules e.g. grammar mistakes, punctuation; improper naming of variables and misspelling of user defined and reserved words. Reserved words are those words that have a special meaning to the programming language and should not be used by the programmer for anything else. These errors are detectable by the translator and must be corrected before the program runs.

  1. Logical errors: They are not detectable by the translator. The program runs but gives wrong output or halts during execution. Such errors that occur during program execution are sometimes called runtime or execution errors.

Methods of error detection

There are several methods of testing the program for errors. These include:

  1. Desk checking (Dry-run)

It involves going through the program while still on paper before entering it in the program editor. This helps the programmer to detect the most obvious syntax and logical errors.

  1. Using debugging utilities

After entering the program in the program editor, you can run the debugging utilities during translation to detect syntax errors in order to correct them before execution.

  1. Using test data

The programmer carries out trial runs of the new program. At each run, the programmer enters various data variations and extremes including data with errors to test whether the system will grind to a halt. For example, if the input required is of numeric type, the programmer may enter alphabetic characters to see whether the program will grind to a halt unexpectedly. A good program should not crash due to incorrect data entry but should inform the user about the anomaly and request for the entry of the correct data.

Implementation and maintenance

Implementation

Implementation refers to the actual delivery and installation of the new program ready for use. New programs will obviously change the way things are done when implemented hence the need for review and maintenance.

Review and maintenance

Review and maintenance is important because of the errors that may be encountered after the program has been implemented or exposed to extensive use. A program may also fail not because of poor development but also due to poor use. Therefore proper training and post implementation support of users will always reduce the chances of having them entering invalid data that can crash the program.

 

Program documentation

Program documentation is the writing of support materials explaining how the program can be used by users, installed by operators or modified by other programmers. All stages of program development should be documented in order to help during future modification of the program.

Documentation can either be internal or external. Internal documentation, is the written non-excutable lines (comments) in the source program that help other programmers to understand the code statements. External documentation refers to reference materials such as user manuals printed as booklets. User manuals are common examples of external documentation There are three target groups for any type of documentation:

  1. User oriented documentation. These type enables the user to learn how to use the program as quickly as possible arid with little help from the program developer.
  2. Operator oriented documentation. It is meant for computer operators such as the technical staff. It helps them to install and maintain the program.
  3. Programmer oriented documentation. It is a detailed documentation written for skilled programmers. This documentation provides necessary technical information to help in future modification of the program. In this type of documentation, all stages of the program development should be documented because.

(a) There may come a need to revise or modify the program.

(b) Other programmers may think of ways of improving your program.

Development of algorithms

As defined earlier an algorithm can be defined as a limited number of logical steps that a program follows in order to solve a problem. In most cases, algorithms can be depicted using a number of tools such as decision tables, decision tree’s, flowcharts and pseudocodes. In this book, we shall mainly discuss program flowcharts and pseudocodes because they are the most widely used by programmers.

Pseudocode

As mentioned earlier, a pseudocode is a set of statements written in a readable language (usually English-like phrases) but expressing the processing logic of a program. Some of the words used in a pseudocode may be drawn directly from a programming language and then mixed with English to form structured statements that are easily understood by non-programmers and also make a lot of sense to programmers. However pseudocodes are not executable by a computer.

Guidelines for designing a good pseudocode

  1. The statements must be short, clear and readable
  2. The statements must not have more than one meaning i.e. should be unambiguous
  3. The pseudocode lines should be clearly outlined and indented clearly.
  4. A pseudocode should show clearly the start and stop of executable statements and the control structures (to be discussed later in the section).
  5. The input, output and processing statements should be clearly stated, using keywords such as PRINT, READ, INPUT etc. Below are some examples that demonstrate how to write a pseudocode.

Example 3.1

Write a pseudocode that can be used to prompt the user to enter two numbers, calculate the sum and average of the two numbers and then display the output on the screen.

 

Solution

START

PRINT “Enter two numbers”

INPUT X, Y

SUM = X + Y

AVERAGE = SUM/2

PRINT SUM

PRINT AVERAGE

STOP

Example 3.2

Write a structured algorithm that would prompt the user to enter the length and width of a rectangle, calculate the area and perimeter then display the result.

Solution

(i) First draw the rectangle of length (L) and width (W)

(ii) Write down the pseudocode

START

PRINT “Enter length and width”:

READ L, W

AREA = L * W

PERIMETER = 2(L + W)

PRINT AREA

PRINT PERIMETER

STOP

Example 3.3

Write a pseudocode for a program that can be used to classify people according to age. If a person is more than 20 years; output “Adult” else output “Young person”

Solution

START

PRINT “Enter the age” INPUT AGE

IF AGE> 20 THEN

PRINT “Adult”

ELSE

PRINT “Young person”

 

Program flowcharts

Unlike a pseudocode which expresses ideas in form of short statements, a flowchart does the same using both statements and special symbols that have specific meaning. Therefore, a flowchart is a diagrammatic representation of a program’s algorithm. The symbols are combined with short text clues which are a form of shorthand understood by programmers. The special symbols used to draw program flowcharts vary but the most common ones are as outlined below:

 

Ellipse: denotes the beginning and end of the program algorithm.

 

 

 

 

 

  1. Parallelogram: used to denote an input or output operation. For example, READ A, B, PRINT SUM.
Process

 

 

 

 

  1. Rectangle: Indicates that a processing or data transformation is taking place. For example SUM=A+B.

 

 

 

 

 

 

  1. Rhombus: Used to specify a condition. A condition must evaluate to a boolean value (True or false) for the program to execute the next instructions.

 

 

 

 

 

                                             

 

 

 

  1. Connector: Used as a connecting point or interface for arrows coming from different directions.

 

 

 

Arrow: Used to indicate the direction of flow of the program logic.

 

 

 

Guidelines for drawing a flowchart

  1. There should be only one entry/starting point and one exit point of the program algorithm.
  2. Use the correct symbol at each stage in the flowchart. For example, it is wrong to use a decision symbol where input is required.
  3. The logical flow should be clearly shown using arrows.

 

Comparison between a pseudocode and a flowchart

Taking our example of calculating the area of a circle mentioned in the earlier subtopic the algorithm by both methods are shown below.

 

 

 

Program control structures

Program control structures are blocks of statements that determine how statements are to be executed. In structured programming languages, there are three control structures namely; sequence, selection and iteration (looping).

Sequence

In sequence control structure, the computer reads instructions from a program file starting from the first top line and proceeding downwards one-by-one to the end. This is called sequential program execution.

Therefore, sequential program execution enables the computer to perform tasks that are arranged consecutively one after another in the code. However, most programs that solve real world problems need to enable the computer either to repeat tasks or to make decisions when certain conditions are true or false hence the need for selection and iteration.

Selection

In selection control, execution of statements depends on a condition that returns true or false. The condition must be a boolean expression. One example of a boolean expression is x > = 20. In such a case the condition is true if x is equal to or greater than 20. Any other value that is less than 20 is therefore false.

Generally, the four types of selection controls used in most high-level programming languages are:

  1. IF… THEN.
  2. IF … THEN … ELSE.
  3. Nested IF.

4 CASE selection.

In this book, we shall demonstrate how to implement these controls by using both pseudocodes and flowcharts.

IF … THEN

IF … THEN selection is used if only one option is available. In this case, all other options are ignored. For example, in a school environment, the administration may decide to reward only those students who attain a mean mark of 80% and above. Therefore, if a students attains 80% and above, he or she is rewarded while the rest are ignored. The following pseudocode and flowchart illustrate this condition:

 

IF … THEN… ELSE

IF … THEN… ELSE selection is suitable when there are two available options. For example, in a football match, if a player does a mistake which is considered serious by the rules of the game, he/she is given a red card. Otherwise, he/she is given a yellow card. The algorithms below illustrates this situation using the IF … THEN… ELSE selection.

 

Nested IF selection

Nested IF selection is used where two or more options have to be considered to make a selection. For example, in an Olympics track event, medals are awarded only to the first three athletes as follows:

(a) Position  1.Gold medal

(b) Position 2: Silver medal

(c) Position 3: Bronze medal

The pseudocode segment and flowchart extract below shows the structure of the Nested IF selection.

Pseudocode segment

IF position = 1 THEN

medal = “Gold”

ELSE

IF position = 2 THEN

medal = “silver”

ELSE

IF position = 3 THEN

medal = “bronze’

ELSE

medal = “nil”

END IF

ENDIF

ENDIF

Flowchart extract

 

 

 

The general format of the Nested IF is

IF < condition> THEN

statements

ELSE

     IF < condition> THEN

statements

ELSE

IF < condition> THEN

statements

ELSE

statements

              END IF

     END IF

ENDIF

CASE Selection

CASE selection is an alternative to the Nested IF especially where there are several options to choose from. This selection is preferred to the Nested IF in order to reduce the many lines of code. However, it is important to note that the boolean expression for the case selection can only be expressed using integers and alphabetic characters only. Generally the boolean expression should be CASE integer OF or CASE Char OF as illustrated in the example below. In this case, average must be an integer.

Pseudocode

CASE average OF

80..]00: Grade = ‘A’

70.. 79: Grade = ‘B’

60.. 69: Grade = ‘C’

50.. 59: Grade = ‘D’

40 .. 49: Grade = ‘E’

ELSE

        Grade = ‘F’

ENDCASE

Flowchart extract

General format of case

CASE x OF

Label: statement

Label 2: statement 2

Label 3: statement 3

                   Label n: statement n -1

ELSE

statementn

ENDCASE

Note that the flowchart is not different from that of the Nested IF construct-­

Iteration ( looping)

Iteration, also referred to a looping or repetition is designed to execute the same block of code again and again until a certain condition is fulfilled. Iteration is important in situations where the same operation has to be carried out on a set of data many times. For example, assume that you are writing a program that will use the same formula to calculate the average marks of three subjects for each student in a class and that the student records are stored in a computer file.

To calculate the average score for each student in a class, the program should repeatedly read record by record from the file, and then use the formula after each read operation to calculate the average.

Generally, the three main looping controls are:

( a) The WHILE loop

(b) The REPEAT. .. UNTIL loop

(c) The FOR loop

The WHILE loop

The ‘WHILE’ loop is used if a condition has to be met before the statements within the loop are executed. Therefore, this type of loop allows the statements to be executed zero or many times. For example in banking, to withdraw money using an automated teller machine (ATM) a customer must have a balance in his/her account.

This scenario can be represented as follows using an algorithm

Pseudocode segment

WHILE balance> 0 Do

Withdraw cash

Flowchart extract

Update account

END WHILE

Withdraw cash Update account

In our case above,

  1. The condition balance> 0 is first tested.
  2. If it is true, the account holder is allowed to withdraw cash.
  3. The program exits the loop once the balance falls to zero.

In general, the WHILE loop can be represented using a pseudocode and a flowchart extract as shown below.

Pseudocode segment

WHILE < condition> DO

statements

ENDWHILE

The REPEAT … UNTIL loop

Unlike the ‘WHILE’ loop, REPEAT… UNTIL allows the statements within it to be executed at least once since the condition is tested at the end of the loop. For example, consider the ATM cash withdrawal case discussed under the ‘WHILE’ loop. If the REPEAT … UNTIL is used, then the client will be able to withdraw the cash at least once since availability of balance is tested at the end of the loop as shown below.

Pseudocode

REPEAT

Withdraw cash

Update account

UNTIL balance > 0;

The general format of the REPEAT. .. UNTIL loop is;

Pseudocode

REPEAT

statements

UNTIL < condition>

The FOR loop

The FOR loop is used in circumstances where execution of the choosen statements has to be repeated a predetermined number of times. For I

example, consider a program that can be used to calculate the sum of ten numbers provided by the user. The ‘FOR’ loop can be used to prompt the user to enter the 10 numbers at most ten times. Once the numbers have been entered, the program calculates and displays the accumulated sum. The loop is predetermined because it has to be repeated 10 times as shown by the algorithms below.

Pseudocode

FOR count = 1 to 10 DO

PRINT “Enter a number (N)”

INPUT N

Sum=Sum+N

END FOR

Display SUM

Explanation

The FOR loop in the problem above functions as follows:

  1. The loop variable (count) is first initialised to the lower limit, in this case a value of 1.
  2. The lower limit is then tested against the upper limit whose value is set at 10.
  3. If the lower limit is less than or equal to 10, the program prompts the user to enter a number N, otherwise the computer exits the loop.
  4. After the last statement in the loop has been executed, the loop variable count is incremented by a 1 and stored in the lower limit i.e. lower limit = count + 1.
  5. The lower limit is then stored in count and step (2) is repeated

The FOR loop can also be used to count downwards from the upper limit to the lower limit. For example, in the above problem, the upper limit 10 can be tested against the lower limit 1 as follows.

FOR count = 10 DOWN TO 1 DO

Therefore the general format of the FOR loop can be represented using two sets of algorithms.

  1. Pseudocode for ‘FOR’ loop that counts from the lower limit

      FOR loop variable = lower limit To upper limit DO.

      statements

ENDFOR

  1. Pseudocode for a ‘FOR’ loop that counts from the upper limit down to the lower limit

FOR loop variable = Upper limit DOWN TO Lower limit DO

statements;

ENDFOR.

Designing more complex algorithms

The following examples demonstrates how to design more complex algorithms based on what has been covered previously. This is aimed at helping a beginner programmer understand how control structures are used to design logically correct algorithms.

Example 3.7

With aid of a pseudocode and a flowchart, design an algorithm that:

(a) Prompt the user to enter two numbers X and Y.

(b) Divide X by Y. However, if the value of Y is 0, the program should display an error message “Error: Division by zero”.

Solution

Using a pseudocode

START

PRINT “Enter 2 numbers X and Y”

INPUT X, Y

IF Y = 0 THEN

PRINT “Error: Division by zero”

ELSE

Quotient = X/Y

PRINT X, Y, Quotient

ENDIF

STOP

Example 3.8

Tusaidiane Savings Society (TSS) pays 5% interest on shares exceeding 100 000 shillings and 3% on shares that do not meet this target. However no interest is paid on deposits in the member’s TSS bank account. Design an algorithm for a program that would:

(a) Prompt the user for shares and deposit of a particular member.

(b) Calculate the interest and total savings.

(c) Display the interest and total savings on the screen for a particular member of the society.

Solution

Using a pseudocode

START

PRINT “Enter member name, share and deposit”

INPUT Name, Shares, Deposit

If shares> 100 000 THEN

Interest = 0.05 x shares

ELSE

Interest = 0.03 x shares

ENDIF

 

 

Total savings = Deposit + shares + Interest PRINT Name, Total Saving, Interest

STOP

Example 3.9

In an athletics competition, an athlete is rewarded as follows:

1 st position: Gold

2nd position: Silver

3rd position: Bronze

Draw a flowchart for a program that would be used to determine the type of medal to be rewarded to each athlete.

Example 3.10

The class teacher of Form 3W in a secondary school requested a programmer to design for her a simple program that would help her do the following:

(a) Enter the names of students and marks obtained in 8 subjects – Mathematics, English, Kiswahili, Biology, Chemistry, Business studies, Computer studies and History.

(b) After entering each subject mark, the program should calculate the total and average marks for each student.

(c) Depending on the average mark obtained, the program should assign grade as follows:

(i) Between 80 and 1 00 – A

(ii) Between 70 and 79 – B

(iii) Between 60 and 69 – C

(iv) Between 50 and 59 – D

(v) Below 50                  – E

 

(d) The program should then display each student’s name, total marks and the average grade. Using both a flowchart and a pseudocode, write an algorithm that shows the design of the program.

Solution

Using pseudocode

START

REPEAT

PRINT “Enter name and subject marks”

INPUT Name, Mathematics, English, Kiswahili, Biology, Chemistry, Business, Computer, History

SUM = Mathematics + English + Kiswahili + Biology + Chemistry +Business + Computer + History

AVG = SUM/8

IF (AVG <80) AND (AVG<100) THEN

Grade = ‘A’

ELSE

IF (AVG >70) AND (AVG > 79) THEN

Grade = ‘B’

ELSE

IF (AVG >60) AND (AVG >69) THEN

Grade = ‘c’

ELSE

IF (AVG >50) AND (AVG >59) THEN

Grade = ‘D’

ELSE

Grade = ‘E’

ENDIF

ENDIF

ENDIF

ENDIF

PRINT Name, Sum, AVG, Grade UNTIL Count = Number of students

STOP.­

 

 

Example 3.11

The gross salary of employees in KARU BOOKS ENTERPRISE is based on basic salary and additional benefits as follows:

(a) Employees who have worked for the company for more than 10 years receive an additional pay of 10% to their basic salary.

(b) Monthly salary bonus based on monthly sales of books as follows:

Monthly sales Bonus Rate (%)
Above 500 000 15
Between 250 000 and 500 000 10
Below 250 000 5

Draw a flowchart for a program that would be used to calculate the gross salary then output each employee’s basic salary, gross salary and all benefits.

 

 

 

SYSTEM DEVELOPMENT

Chapter outline

Introduction

Description of a system

Information system

Theories of system development

Stages of system development

System documentation

 

Introduction

The concept of a system emerged from early psychologists who believed that the mind was a whole unit, rather than a collection of psychological parts as the belief was by that time. However, it was Ludwig von Bertalanff, a German biologist, who gave the name “general systems theory” to the discipline that devoted itself to coming up with principles that apply to all systems.

A system is a set of organised components which interact in a given environment and within a specified boundary to achieve collective goals and objectives that are emergent. Emergent characteristics are those that result from interaction of various components and may not exist in the individual component. Therefore, once the components come together, they become interrelated and generate new goals and objectives. For example, a bicycle system has all the components working together to provide motion when ridden. The individual components cannot provide these services to a rider when on their own!

 

Description of a system

A system can be described as being either soft or hard.

Soft systems

Human activity systems are said to be soft systems. They are described as soft because of three main reasons:

  1. Their boundaries may be fluid or keep on changing.
  2. Their goals and objectives usually conflict and may not be captured clearly at anyone time because they are based on human factors like attitudes and preferences.
  3. It is difficult to precisely define exact measures of performance for them.

One example of a soft system is the political system. It is very difficult for instance to model a system that will predict the political mood in a country over a period of time. Another example is a sales tracking and prediction system in an organisation. Sales in an organisation depend on human factors like attitude in the market place.

Hard systems

Hard systems are systems whose goals and objectives are clearly defined and the outcomes from the systems processes are predictable and can be modeled accurately. Such systems are based on proven scientific laws like mathematical formulas or engineering solutions.

An example of a hard system would be a stock management system in a supermarket. It is possible to know exactly the stock levels, cost and sale price and to predict accurately the profit if all the stock is sold.

A good system incorporates both hard and soft aspects of a system. For example, a stock management system should be able to show when the demand for a certain item rises so that a decision can be made to stock more. New demand is driven by soft aspects in people’s lives like attitude and seasons!

 

Characteristics of systems

All systems have some common characteristics. Some of these characteristics are explained below.

Holistic thinking

In holistic thinking a system is considered as a whole. Aristotle, a Greek philosopher, once said that the whole is more than the sum of the parts. The various components that make up a system may be simple in nature and process but their combination creates a complex whole, whose overall goals are more sophisticated than those of the individual components. Hence, a system should be considered as a whole unit rather than considering its parts individually.

 

Subsystems

A system is made up of different components (subsystems). Therefore a system does not exist in solitude but it may be a component of larger a system. For example, the classroom system is part of a school system, which is part of the Ministry of Education. The Ministry of education is part of the Government which is part of the global system!

Boundary and environment

Each system has a space (boundary) within which the components operate. Any entity that falls outside the boundary but interacts with the system is part of the system environment. Such entities are called external entities. They provide the inputs and receive the outputs from the system. For example, the external entities to a school system may include the parents, various suppliers and the society at large.

Purpose

The purpose of each system is to perform a particular task or achieve a goal. The objectives that a system is supposed to achieve enable system developers to measure the performance of a system during its operation. One main objective for a school system for instance is to enable the students to excel in national examinations.

Process

A system usually will transform or process data from one state to another.

System entropy

The word entropy means decay. Systems “decay” naturally over time. This means that a system slowly becomes useless to the user either due to improvement in technology, new management policies or change in user requirements. Therefore a system must be reviewed in order to

improve it or to develop a new one.                                 .

Inputs and outputs

A system communicates with its environment by receiving inputs and giving outputs. For example, a manufacturing firm can be considered as a system that gets raw materials (inputs) from the environment and transforms them into finished products (outputs) released into the environment.

Open and closed systems

A system can be described as being open or closed. An open system receives input from and gives output to the environment while a closed system does not. Open systems normally adapt to changes in the environment.

Control

Control can be defined as the method by which a system adapts to changes in the environment in order to give the expected output or to perform to the expected level. Control is achieved through feedback which involves having outputs from the process of the system being fed back to the control mechanism. The control mechanism in turn adjusts control signals that are fed to the process which in turn makes sure that the output meets the set expectations. Fig. 4.1 depicts a typical system that has feedback to the control function. Imagine a motor vehicle manufacturing company that is producing several vehicles per day. Assuming that the demand rises, then feedback would show that the company is underperforming. Hence, control signals that would speed up movement of units on the assembly line can be issued to increase production.

 

Information system

An information system is an arrangement of people, data processes and information that work together to support and improve the day-to-day operations in a business and the decision making process. The main purposes of an information system in an organisation are:

  1. Supporting information processing by enhancing tasks such as data collection, processing and communication.
  2. Helping in decision making by collecting operational data, analyzing it and generating reports that can be used to support the decision making process. This process is referred to as on-line analytical processing.

 

  1. Enable sharing of information. Perhaps, this is one of the greatest powers of information systems. For example, any departments in a given organisation can now share the same electronic information stored in a central database at the click of a mouse button.

 

Why develop new information systems?

The need for developing information systems is brought about by three circumstances:

  1. New opportunities: A chance to improve quality of internal processes and service delivery in the organisation.
  2. Problems: These are undesirable circumstances that prevent the organisation from meeting its goals.
  3. Directives: These are new requirements imposed by the government, management or external influences.

Role of information system analyst

A system analyst is a person who is responsible for identifying an organisation’s needs and problems then designs and develops an information system to solve them. The system analyst does this by:

  1. Reviewing the existing system and making recommendations on how to improve or implement an alternative system.
  2. Working hand in hand with programmers to construct a computerized system.
  3. Coordinating training of the new system users and owners.

Project management

The system analyst is the overall project manager of the information system being implemented. His project management skills like assuring quality, keeping within schedule and budget determine whether the system will be successfully implemented or not. For example, a project that does not stick to its schedule will most likely overshoot its budgeted cost leading to unsuccessful completion.

 

Theories of system development

Several theories or methods are used in system development. The aim of all these theories and methods is to identify business requirements and to develop information systems that effectively meet them. This helps to support the day to day operations and decision making processes in an organisation.

Some of the most common system development theories include:

  1. Traditional approach.
  2. Rapid application development (RAD).
  3. The structured approach.

At this level, we will concern ourselves mostly with the structured approach. However, we shall briefly discuss the other two methods of system development.

Traditional approach

Traditional approach relies mostly on the skills and experience of individual staff members carrying out the project. This means that there is no formal documented methodology to be followed by all system developers in the organisation. This obviously presents a chaotic scene in system development especially where more than one persons are involved in the development effort. In most cases, success depends on the heroic efforts of an individual. This means that all other projects heavily rely on a particular person for their success.

In this approach, the manual system is replaced with a computerised one without change in overall structure of the former system. Hence the weaknesses of the former system are not addressed and are carried forward to the new system. For example, in a banking hall, a manual system is characterised by long queues and poor controls. If the traditional approach is followed, each cashier will simply be given a computer. The long queues might remain and lack of controls increase because no value was added to the former information system. This method is not recommended for today’s business environment.

Rapid application development (RAD)

Rapid application development (RAD) model evolved from the theory that businesses today heavily rely on information technology. Many information’ systems that were manual in nature are now fully computerised. Therefore, development and implementation of information systems needs to be quick enough for the organisation to maintain a competitive advantage in the market place.

Recent developments in programming software have seen the release of fourth generation languages (4GL’s) which are user-friendly because of their graphical interfaces. Rapid application development makes it possible for system developers to quickly capture user requirements by designing system interfaces in the presence of the user. This rapid application development technique is known as prototyping, and assumes that the user knows what they want when they see it. A prototype is a smaller working model of a real world system. Other approaches used in rapid application development include small team with advanced tools (SWAT) and joint application development (JAD).

The main disadvantage of rapid application development is that the working system may have oversights and weaknesses due to the quick Development. For example, a system may be working well but lack the necessary inbuilt security mechanisms. This would be undesirable in today’s insecure operating environment.

The structured approach

Structured approach to system development defines a set of stages that should be followed when developing a system. Each stage is well documented and specifies the activities to be carried out by the system analyst and his team while developing a system.

Stages of system development

The main stages in system 4evelopment as depicted by the structured approach include:

  1. Problem recognition and definition.
  2. Information gathering.
  3. Requirements specification.
  4. System design.
  5. System construction (coding).
  6. System implementation.
  7. System review and maintenance.

Figure 4.2 is a diagrammatic representation of the seven stages of the system development lifecycle (SDLC).

The stages of developing a system are also called the system development lifecycle. Each stage serves a role in the problem solving process. The lifecycle divides the life of an information system into two major parts namely:

  1. The development stage.
  2. The operation and support stage.

To demonstrate how to undertake each stage, we shall consider a case study.

Case study

Computer-based library management system

Mutito high school library has 3000 text books. Each book is identified by its author, ISBN number, book ID and title. The books are arranged on the shelves using their book ID. Card catalogues are maintained for all the books. There are two types of catalogues, one arranged according to the author’s names while the other is arranged according to the titles of the books. Each member is issued with three borrower cards that have a registration number and name of the member. To locate a book for borrowing, a member checks in the card catalogue for its classification then moves to the shelve to retrieve it. The member surrenders a borrower’s card .at the issue counter where the staff gives out the book and stamps the date of return. A member is not allowed to borrow more than three books at anyone time. Members are charged for overdue books at a fixed rate multiplied by the number of days delayed.

We now look at each of the stages of system development in more detail with this case study in mind.

Problem recognition and definition

Problem recognition is done during the preliminary investigation. During the recognition phase, the system analyst seeks to answer two questions. The first is whether the proposed project is worth looking at while the second is if the project is worth pursuing. After this, the system analyst has to define the scope of the project and establish the constraints, budget and schedule. The most common constraints are usually lack of finance, lack of enough expertise and/or lack of appropriate technology to develop the system.

Problem definition, also called problem analysis is the process of identifying the problem, understanding the problem and finding out any constraints that may limit the solution. This stage requires the analyst to find out as much as possible about the current system in order to draw up a good and relevant proposal for the new system. Remember that there is always an existing system whether manual or computerised. After this, several alternative solutions are modeled. The main question asked at this point is whether the proposed solution is the right one.

Looking at our case of the school library management system, the problem at hand is to replace the inefficient manual operations such as cataloguing with an efficient computerised system. The system analyst tries to answer the following questions.

  1. What are the shortcomings of the current systems?
  2. What types of records are used for books and students in the library?
  3. What procedure is followed to borrow/lend books?
  4. How are overdue books handled when returned?

In this first stage, a special study will be carried out to establish the costs and benefits of a new system. This study is called a feasibility study. A new system will only be developed if its benefits are more than its costs. The end of this stage is marked by presentation of a feasibility report to the management.

The feasibility of a system is assessed in four ways:

Operational feasibility: This establishes the extent to which the users are comfortable or happy with the proposed or new system.

Schedule feasibility: This establishes whether the development of the proposed system will be accomplished within the available time.

Technical feasibility: This establishes whether the technology available is sufficient or can be upgraded for the new system. It also seeks to find out whether the staff has relevant technical skills to develop and use the new system.

Economic feasibility: This establishes whether developing the new system is cost effective by analysing all the costs and benefits of the proposed system.

 

Information gathering

After the feasibility study report has been approved by the management, the system analyst can then proceed to the next stage referred to as information gathering or fact finding. Some of the methods used to collect or gather data include:

  1. Study of available documents.
  2. Interviews.
  3. Questionnaires.
  4. Observation.
  5. Automated methods.

 

Studying available documentation

The available documentation describes the current system and all its procedures. It forms a rich source of information for the analyst. Examples of such documents are card catalogues, receipts, reports, technical manuals, organisational charts and archival or backup files.

 

Interviews

Interviews should be carried with the relevant stakeholders in order to get views about the current system and gather information about the requirements for the proposed system. The interview method is powerful because it enables the analyst to have face to face contact with the interviewee.

Therefore in executing an interview, the following guidelines should be followed:

  1. The interviewee must be informed in good time and the topic of discussion communicated accordingly to allow for adequate preparation.
  2. Avoid personal biases in your questions and perspectives.
  3. Be careful about body language and proxemics. Proxemics refers to things like sitting arrangement, body closeness and how people react when their private distance is violated.

Figure 4.3 shows a verbatim introduction of sample interview with the library manager.

INTERVIEW TITLE

BRIEF INTRODUCTION         Interviewer: ……………

Interviewee:… .

Interviewer: Hello…………

Interviewee: Hello. Welcome to my office.

Interviewer: Thank you. Please call me Pat. I would like to ask you a few questions about the system that we are developing

Interviewee: …………………………………………………

…………………………………………………

…………………………………………………

Fig. 4.3: Example of an interview

 

Advantages of interviews

  1. Non-verbal communication like facial expressions can be used and observed.
  2. Questions can be rephrased instantly for clarification and to probe the interviewee further.

 

Disadvantages of interviews

  1. It is difficult to organise interviews and they are time consuming.
  2. The interviewee may not fully open up on some issues that may be personal or sensitive.

 

Questionnaires

A questionnaire is a special purpose document that allows a person to collect information and opinions from the people who receive and respond to it. The main advantage of using this method is that the questionnaires give the respondents privacy when filling them and they can do so at their own pleasure. This may enhance the sincerity of the information given.

Figure 4.4 below shows an extract of a questionnaire used to gather data from library attendants.

QUESTIONNAIRE

BRIEF INTRODUCTION                Date: …,………….

.

………………………………………………………………………

QUESTIONS

  1. How long have you worked as a library attendant:

1 yr.       2yrs.       over 2 yrs.

  1. How long does it take to rearrange books on the shelves?

days        weeks        months

Fig. 4.4: An example of a questionnaire

 

Advantages of questionnaires

  1. Since they are filled and returned in privacy, more sincere responses are possible.
  2. The respondent can fill the questionnaire at their own pace.

 

Disadvantages of questionnaires

  1. Good questionnaires are difficult to prepare.
  2. The respondent may not fully understand the questions because of ambiguity of language hence give erroneous responses.

 

Observation

Observation requires the observer to participate or watch closely as a person performs activities in order to learn about the system. This method gives the analyst first hand experience about the problems and exposes him/her to the system requirements. The main advantage of observation is that concepts that are too difficult for non-technical staff to explain can be observed. However, this method has some drawbacks too. These include:

  1. The person being observed might alter behaviour leading to wrong equirements being observed.
  2. The need to be on-site consumes a lot of time.

 

Automated methods

Automated data collection is mostly used when actual data is required but difficult to get through interviews, observation or questionnaires. Such data may be collected using devices that automatically capture data from the source such as video cameras, tape recorders etc.

 

Preparing and presenting the fact finding report

At the end of the information gathering stage, the analyst must come up with a requirements definition report that has the following details:

  1. Cover letter addressed to the management and IT task force written, by the person who gathered the facts.
  2. Title page which includes the name of the project, name of analyst and the date the proposal is submitted.
  3. Table of contents.
  4. Executive summary which provides a snapshot of how the new system is to be implemented. It also includes recommendations of the system analyst because some people will only have to read the summary to make decisions.
  5. Outlines of the system study which provides information about all the methods used in the study and who and what was studied.
  6. Detailed results of the study which provide details of what the system analyst has found out about the system such as problems, constraints and opportunities that call for an alternative.
  7. Summary which is a brief statement that mirrors the contents of the report? It also stresses the project’s importance.

This report is then presented to the management for evaluation and further guidance.

fig 4.5 shows a sample general outline of the fact finding report presented to the management of the school library and the head of the I

 

Library management information system

Fact finding report

1.0 Table of contents.

2.0 Executive summary.

2.1 Objectives: The new computerised system is intended to improve efficiency in the library by:

(a) Keeping an inventory of all the books in the library and automatically updating the stock hence eliminating the tedious physical counting         process.

(b) Reducing the time needed to seek for a book by 60%.

(c) Tracking overdue and lost books.

2.2 Recommendation:

This system could result in efficient processing of library transactions. It will replace the tedious manual system.

3.0 Methods used to study the system

3.1 Interviews: Used when seeking facts from management.

3.2 Questionnaires: Circulated to user staff.

3.3 Observation: Observed book search and issue.

4.0 Detailed results

4.1 Problems: Duplication of records, delays and book loss.

4.2 Opportunities: Efficiency, stock management etc.

4.3 Alternatives: Enforce controls in current system, more staff etc.

5.0 Summary.

The new system is highly recommended because the other alternative of enforcing controls and employing more staff will add operating costs with little additional value.

Fig. 4.5: A sample outline of a fact finding report

NB: The sample report is simplified for purposes of instruction at this level and should not be taken as a complete report. A complete report lay comprise of several bound pages.

 

Requirements specification

Requirement specification, the system analyst must come up with the detailed requirements for the new system. Remember that in the long run the hardware and software used to develop the system mainly depends on input, output and file requirements. For example, if one of the input requirements is that the system would require data in picture format then one input device that cannot be avoided is an image capturing device such as a digital camera or a scanner. At this stage the following requirements specifications are considered:

  1. Output specification.
  2. input specification
  3. File/data stores.
  4. Hardware and software requirements.

 

Output specifications

As opposed to data processing cycle where we follow the input-process-output m­odel in system development, consideration is given to the output requirements of the new system first. This is because; the main interest from a system is information (output). For example the management of the library in our case study is interested in whether the system can generate reports on overdue books, charges on late return, inventory etc.

The quality of system output depends on how well management and user requirements were identified. The Output is usually in the form of reports either in hardcopy or softcopy form.

The following factors should be put into consideration when designing the output

  1. The target audience. For example, top management would require a summary of overall performance in the organisation while a user report may show only the transactions carried out or transactions at hand
  2. The frequency of report generation. Some reports are required daily, others weekly, monthly or annually. However, some are required in an ad hoc manner i.e. at random.
  3. Quality and format: The quality and format of information to be generated should be put into consideration.

For our case study outlined earlier, the following outputs are needed from the library management system:

  1. A report about all the overdue books showing charges against each borrower.
  2. A search report for a particular book showing its classification and whether its on the shelve or not.
  3. A search report about a particular member showing which books he/she is currently holding. Table 4.1 below shows a sample report expected to be generated from the computerised library system showing all the overdue books.

       Table 4.1

  OVERDUE BOOKS    
ISBN Number Title Member

Name

Date

Issued

Date Due Overdue Days
1.9966495746

2. 9966 49 600 x

3. ……………

4. ……………

5. ……………

Computer studies

Mathematics 1

………………

………………

………………

James L. Wak

Linda Were

……………

……………

……………

10/01/2005

12/01/2005

……………

……………

……………

24/01/2005

26/01/2005

……………

……………

……………

6

4

……

……

……

 

Input specifications

Once the system analyst has identified the information (output) requirement of the new computerised system, he/she goes ahead to identify the input needed to obtain the relevant information from the system. In our case of the library, the following inputs can be deduced from the output specification:

  1. The type of data needed to add a book to the books file or database in the library. For example in the library database the following data items may be entered:

(a) Title of the book.

(b) Names of the author(s) of the books.

(c) The ISBN number of the book.

(d) Book ID

  1. Determine data that is needed for someone who wishes to borrow a book.

 

After identifying all the inputs, the analyst designs the user interface by designing data entry forms or screens. An example of an input form is the new member registration form as shown in Figure 4.6.

New member registration

Surname:

Registration number:

First name:

Gender:

Save
exit

 

 

 

Fig. 4.6: Data entry form design

The user interface is an important determinant of whether the system will be happily accepted by the users or not. Hence, it must be designed with a lot of care. The following guidelines should be observed:

  1. Objects placed on forms like text boxes, labels and command buttons must be neatly aligned and balanced on the form.
  2. The size of the form must not be too small for user legibility or too big to fit on the screen
  3. The colour for the interface must be chosen carefully to avoid hurting the eye. Avoid colours that are too bright.

 

File/data stores

File requirements specification involves making an informed decision on files required to store data and information in the system. The system analyst should identify the number of files that will be needed by the system and determine the structure of each of the files. For example, will the files allow direct access? Will the files be sequential files stored on a magnetic tape?

The attributes of the records in a file should also be identified. An attribute is a unique characteristic of a record for which a data value can be stored in the system database. If it is a student, one attribute can be the name and the other is the student’s registration number. For a book record, the attributes that can be identified include: Book ID, international serial book number (ISBN), the title, publisher, year of publication, date of issue and date of return.

However, only those attributes that are of importance to the system will be picked and used to store data for each record. In our case study for instance, we only need the Book ID, title, author, ISBN number, date of .issue and return.

These attributes will form the basis for table design in the database. Each attribute will become a field in the table. For example, there will be a Books table that will have fields for each record.

 

Factors to consider when designing a file

In order to design a good file, you need to consider the following aspects:

  1. The key attribute or field: This is usually an attribute that is unique for each record.
  2. The type of data: Each field has a data type. Book titles can be stored as data of type “text” while the date of borrowing a book as of the type “date” in the database.
  3. The length of each field: This is important because the longer the field, the slower the system takes to process transactions. A name field can be specified to be 30 characters long while the integer field can be 10 characters long. However, these vary depending on the system developer’s perception of how the system should store the data.
  4. Back up and recovery strategies: The updated copies of data and information files need to be stored in a different place other than the location of the current system. This makes sure that even if the current file gets corrupted or crashes, the backed up data can be used to recover or reconstruct the original file.

 

Hardware and software requirements

The system analyst should specify all hardware and software requirements for the new system. Some of the factors to consider in hardware and software specification are:

  1. Economic factors such as price and acquisition method.
  2. Operational factors e.g. reliability, upgradeability and compatibility with the existing resources.
  3. User-friendliness.

 

System design

There are several tools for designing an information system. Examples of such tools are flowcharts, data flow diagrams, entity relationship models and structured charts. In this book, we shall concentrate on the use of the system flowcharts as the primary tool for system design.

A system flowchart is a tool for analysing processes. It allows one to break process down into individual events or activities and to display these in shorthand form showing the sequential or logical relationships between them.

After drawing the system flowchart, other algorithm design tools like pseudo codes and program flowcharts can be used to extract the processing logic for each module in the system before system construction.

 

The system flowchart has many similarities to the program flowchart covered earlier in the book. However, it has its own set of symbols and it seeks to depict the whole system rather than the individual program modules. Figure 4.8 shows some common system flowchart symbols.

Other symbols that are of great importance at this level are as follows:

Rectangle with rounded corners: represents an event which occurs automatically and usually triggers a chain of other events. For example, the book lending process is triggered by a student request!

Kite: represents the sort operation.

Designing a system flowchart

Designing system flowcharts gives a concise picture of the way particular processes are done within the business organisation. After this has been achieved, the next logical step of making changes to the processes for the better can be handled easily.

Although there is no formal approach for designing a system flowchart, the following guidelines are important:

  1. Start by writing the title of the flowchart. For our case study, the title “Library Books Management Information System” could be sufficient.
  2. If possible, start drawing the flowchart with the trigger event. In this case, our trigger would be a student request to borrow a book or to return an overdue book.
  3. Note down the successive actions taken in their logical order until the event or process is concluded. Use few words to describe the actions.
  4. When there are many alternatives at the decision stage, follow the most important and continue with it. Other significant but less important alternatives can be drawn elsewhere and reference made to them by using the on/or off page connectors. Figure 4.9 shows the system flowchart for the proposed computerised library management system for the school.

Explanation

From the system flowchart, we observe that:

  1. A member e.g. a student requests for a particular book.
  2. The system checks for the students record in the system. If the student has more than three books, a message to this effect is displayed and cannot borrow an extra book.
  3. If the student has less than three books, then the book can be given out to him/her.

From the system flowchart, a program flowchart for a particular task can be extracted. Figure 4.10 illustrates the book lending process extracted from the library management system flowchart.

 

System construction

System construction refers to the coding, installation and testing of the modules and their components such as outputs, inputs and files.

The purpose of the construction phase is to develop and test a functional system that fulfils the business and design requirements. Indeed, programmers come in at this stage and are briefed on the system requirements as illustrated using various design tools in order for them to construct a computerised working model of the same.

System construction methods

There are a number of programming techniques that can be used to construct a designed system. These include:

  1. Using the high-level structured language such as Pascal, COBOL etc
  2. Using fourth generation languages (4GL) – These are easy to use programming languages. Some of the fourth generation languages            are Visual Basic, Visual COBOL, Delphi Pascal etc.
  3. Customising the standard packages – This involves the use of a ready made software package mostly a database software, financial package or enterprise management system.

Due to the varied approach to system construction available, Chapter 5 in this book introduces you to Visual Basic programming while Appendix I explains how a database package can be customised to construct a system. Figure 4.11 shows a data entry form constructed to enable entering a new book record into the library information database.

Testing the system

After construction, the system is tested by entering some test data to find out whether its outputs are as expected. The system is tested using the requirements specifications and the design specifications to find out whether it meets all requirements specified.

For example, if one of the requirements of the computerised library management system is to ensure that no member is allowed to borrow more than three books at the same time, it must do that without fail. Figure 4.12 shows a message box to this effect.

 

System implementation

System implementation is the process of delivering the system for use in day to day operating environment for the users to start using it. The areas to be addressed during system implementation include file conversion, staff training, and changeover strategies.

File conversion

Every time a new system is implemented, the format of data files might require modification or change. This process is referred to as file conversion. A new system may require a change in file format e.g. from manual to computerised. The factors to consider at this point are:

  1. Whether the new system requires a new operating system and hardware. The best practice today is to develop systems that do not need hardware change unless it is very necessary.
  2. Whether you need to install new application software. For example if you have developed a new system by Customising a database application software, you need to install that software if it is not installed.
  3. Whether you need to create new database files for the new system. For example, where files are manual, electronic ones will have to be made. However, remember that we strive to develop systems that are data independent too. That means that the systems can be changed without affecting the organisational data structures in the databases.

Staff training

Availability of appropriate documentation like user manuals goes a long way to make staff training easy, quick and effective. System implementation can fail if the staff are not trained properly leading to great loss of company resources.

Changeover strategies

Changeover simply means how to move from the old system and start using the new. Most businesses especially those that are driven by information technology need as smooth a changeover as possible. Some of the system changeover strategies are:

Straight changeover

In straight changeover, the old system is stopped and discarded and the new system started immediately. This sudden change of old to new means that the project faces higher risks in case the new system faces problems. This is because the old system would not be there to fall back to. The advantage of this method is that it is cheaper because you do not have to run the two systems in parallel. Figure 4.13 shows the straight changeover strategy diagramatically. At a time t, a switch is made from the old to new system.

Parallel changeover

In parallel changeover, both the old and new system are run parallel to each other for some time until users have confidence in the new system then the old system is phased out. This method is a bit costly because extra resources have to be engaged to run the two systems in parallel.

However, its lower risk to business operations and thorough testing of the new system are some of its advantages. This method is not suitable for large systems because of the high operational costs during changeover. Figure 4.14 depicts a parallel changeover process.

Phased changeover

In phased changeover, a new system is implemented in phases or stages. A good example is the way the education system is changed from the old to the new curriculum. Each year at least one class level changes over to the new syllabus.

Sometimes, one phase may run a new system for testing before it is implemented into all the other phases. This is called piloting. The main”, disadvantage of phased changeover is the danger of incompatibility between various elements i.e. hardware or software of the same system. However, its advantage is that it ensures slow but sure changeover.

 

Security control measures

Information and data security have become some of the most important aspects of information systems. A lot of careful planning has to be done in order to have what is called inbuilt security in the system. This is because information is under constant threat of being illegally accessed or disclosed to unauthorised parties. Therefore, the system implementers must make sure that the security features built in the system are properly configured during the implementation stage.

System maintenance and review

System maintenance is the adjustment and enhancement of requirements or correction of errors after the system has been implemented. Regardless of how well the system is constructed and tested, errors may be detected when the system is in use.

System review is a formal process of going through the specifications and testing the system after implementation to find out whether it still meets the original objectives. This act is sometimes called review and audit. If the system does not meet the stated objectives, system development might start all over again.

System documentation

System documentation is a life long process in the system development lifecycle. After a system has been implemented, any maintenance work must be documented in order to update the existing documentation. In this chapter, we have constantly provided sample documentation in every stage of system development using the school library management system case study. Generally comprehensive system documentation consists of the following:

  1. Report on fact finding
  2. Requirement specification
  3. System and module flowcharts
  4. Table/file structures description
  5. Sample test data and expected output
  6. Output reports

Reports on fact finding

At the end of fact finding stage, the system analyst should prepare a well detailed report that mainly outlines:

  1. The methods used to collect data.
  2. Weaknesses of the current system as evidenced by the collected data.
  3. Recommendations: Why there is a need to replace or upgrade the current system.

Figure 4.5 on page 104 shows a sample fact finding report for the school library system.

Requirement specification

The report on requirement specification outlines mainly the:

  1. Output requirements for the new system such as reports.
  2. Input requirements.
  3. Hardware and software required to develop the new system.

Table 4.1 on page 106 gives a sample report expected from a computerised library system, while Figure 4.6 on page 107 gives a simple illustration of an input form for new library members.

System flowchart

The system flowchart shows the overall functionality of the proposed information system. Therefore at the end of the designed phase, the system analyst should write a report that contains:

  1. The system flowchart or data flow diagrams that shows the processing logic of the information system.
  2. Any module flowchart that may help programmers in construction of the required subsystem or modules. a sample module flowchart.

Table file structures description

Depending on approach used in system construction, the report should contain file or table structure definitions. For example, if you opt to construct a system using customisation approach, details on table structures should be well documented (see Appendix I). Figure 4.15 shows a sample table structure of the Books table in a library system.

Sample test data

To test whether the new computerised information system is working as expected, you need to use test data for every module (subsystem). For example, in our library case study, we need to test sample data for books entry, book borrowing etc. Table 4.2 shows a sample test data that can be entered in the database whenever a book is borrowed.

Table 4.2

Last name Middle name Class Stream Book Date Return
        borrowed borrowed date
Mburu James 3 C Maths Form I 8/6/2005 26/6/2005
Janet Achieng 3 A Kamusi sanifu 23/6/2005 30/6/2005
Helen Mutua 4 B Elementary

chemistry

6/6/2005 24/6/2005
Ali Mohamed 2 A Computer

studies

6/5/2005 23/5/2005
Kerich Dennis I A Biology

form I

6/6/2005 24/6/2005
James Kamau 3 B Computer

studies

7/6/2005 25/6/2005

Output reports

To prove that the system is working and giving the desired result, you should provide a number of sample output from various system modules. Figure 4.16 shows a sample report showing a list of members who have borrowed books.

 

User manual

User manuals are supposed to help a person to use the system with as little guidance as possible. Therefore, the manual must contain information such as:

  1. How to install, start and run the system.
  2. How the system appears when running (interface).
  3. How to carry out various tasks e.g. in our case study, this would include new books entry, lending/borrowing, data entry etc.
  1. Error correction and how to get help when faced by exceptions. This would be in a troubleshooting guide.

Figure 4.17 shows a sample main menu screen switchboard from which the user can access other modules.

 

PROGRAMMING WITH VISUAL BASIC

Chapter outline

5.1 Introduction

5.2 Starting Microsoft Visual Basic

5.3 Features of Visual Basic Integrated Development Environment (IDE) window

5.4 Saving a Visual Basic project

5.5 Opening an existing project

5.6 Visual Basic fundamental concepts

5.7 Control structures

5.8 Working with graphical objects

5.9 Modules and procedures

5.10 Creating menus, messages and dialog boxes

5.11 List boxes and combo boxes

5.12 Visual Basic data structures

5.13 Linking Visual Basic forms to a database

5.14 Creating a Visual Basic executable file

Introduction

In the previous chapter, we studied how to develop a system using some system analysis and design methods without necessarily referring to any particular programming language. Therefore, we have been looking at what a system analyst ought to do rather than how a particular task should be done. In this chapter, we shall learn how to develop programs using Visual Basic programming language. Note that any other programming language can be used to develop programs. Therefore, as a leaner, you are at liberty to select any other programming language and learn how to use it to construct systems.

Definition of Visual Basic

Visual Basic (VB) is a graphical user interface programming language for creating software systems that run under Microsoft Windows environment. It is modeled in line with BASIC language which was originally created to help students learn how to program.

Visual Basic has the following features:

  1. It is an event driven programming language. An event is a response generated by the program when the user performs an action e.g. a mouse click. The response depends on the code held in an event procedure. An event procedure is a group of self contained statements that are executed by the computer when a trigger action is performed. For example, a mouse click may cause a menu to be displayed on the screen.
  2. It has a collection of tools that are used by programmers. These tools are called controls. The controls can be accessed easily by clicking their icons on the toolbox to select them.
  3. It has special objects called forms that have a title bar at the top. The programmer can then add controls such as a menu bar, status bar, toolbars, buttons, and slide bars to the form when creating an application.

Starting Microsoft Visual Basic

You can start Visual Basic from the Programs menu by pointing to Microsoft Visual Studio and then selecting Microsoft Visual Basic. Depending on the way the application has been setup, you may see the New Project dialog box

This dialog box allows you to set up a new project. You can set up several types of projects as shown by the different icons in this dialog box. However, for the purposes of learning, let us select the Standard.EXE project found on the New tab. Click the Open button. The application window will appear. This is the Visual Basic Integrated Development Environment (IDE).

Features of Visual Basic Integrated Development Environment (IDE) window

The Visual Basic application window (Figure 5.2) has many similarities to common windows based applications.

The following is a summary of the various features identified in the window:

The standard toolbar

Like in many other applications, the standard toolbar has the standard icons that are shortcut commands to the menu bar commands. Simply point to an icon and a text tip will appear telling you the name of the icon. Of great interest to us this time are the three commands of Start, Break and End.

To execute a Visual Basic project, simply click the Start button or select Start1from the Run menu. Execution of the program can be temporarily suspended by clicking the Break button. Resume the run by selecting Continue from the Run menu. Finally, the execution can be stopped by clicking the End button.

Forms and controls

Forms and controls are generally called objects. An object is usually associated with an event hence most objects have their own properties and methods. The properties define the appearance of the object while the method is a predefined action that can be set to occur or affect the object. For example show method makes a form visible on the screen.

The form design window is the place where the programmer does the actual design of the user interface for the program. This is accomplished by selecting the relevant control icons from the toolbox then placing them on the form design window. The control can then be moved and resized as desired by the programmer.

The entire form can be moved around on the screen by holding the title bar of the project container window then dragging it to the required position.

Project window

The project window displays a hierarchical list of files associated with a particular project. The files represent forms and program modules in the project. For example, Figure 5.2 shows a form whose title is Form 1.

Properties window

The properties window displays a set of various characteristics unique to each active object in the project. Some examples of properties include name, caption, colour, height etc.

When a new project starts, it is most likely that the form design window is active. In this case, the properties for the form will be displayed and can be changed by the programmer as appropriate. For example, we can change the caption of the form by clicking on the Alphabetic tab in the properties window then changing the value associated to Caption property from Form.l to say “Book Data Form”. Notice that the caption in the title bar of the active form changes simultaneously as you type the new name in the properties window.

 

 

Code editor window

Figure 5.2 shows that the project window has three icons at the top left hand comer. One of them is called the code view icon. Point to the icon with the mouse pointer and a tool tip will appear showing its name. If you click it, the code editor window opens displaying the code of the object that is currently selected. Alternatively, double click the object on the form for which you want to edit its code. The code editor window will open (Figure 5.4). In this case, we double clicked the form.

Form layout window

The form layout window allows you to specify the screen location of the form when the project is Executed. This can be done by dragging the form in this window to the desired location.

The Visual Basic toolbox

Visual Basic tool box has controls that enable a person to design and customise forms. Figure 5.5 depicts the toolbox.

Pointer: This is not actually a control but a tool used to select an object or objects to be worked on.

Picture box: A picture box is used to display graphical objects or text and to initiate event actions. It is similar to an image box but has more properties, redraws slower and cannot be stretched.

Label: A label displays text on a form. The text cannot be reassigned during program execution though its appearance can be altered.

Text box: A text box provides a means of entering or displaying text. The text may be already available or can be entered during the program execution.

Frame: A frame is a tool rather than a control used as a container for a group of controls.

Command button: A control used to activate an event driven procedure.

Check box: As opposed to the option buttons a check box is used if more than one selection are to be made.

Option button: Option buttons are used when one selection must be made before an action is carried out. For example, if you want to turn off a computer running on Microsoft Window 9x, check the shut down option button then click Yes/OK.

Combo box: A combo box is a special type of list box that combines the capabilities of a text box and a list box. It provides a list of text items for selection by the user during program execution. Items can also be added during program execution.

List box: The list box control provides a list of text items for selection by the user.

Horizontal scroll bar: A horizontal scroll bar is used for drawing horizontal scroll bars on a form.

Vertical scroll bar: A vertical scroll bar is used for drawing vertical scroll bar on a form.

Timer: Timer control allows timed events to occur repeatedly at a specific time intervals.

Drive list box: A drive list box provides a means of selecting a drive from a list of existing drives.

Directory list box: A directory list box provides a way of selecting a directory from a list.

File list box: A file list box provides a way of selecting files within a group of files.

Shape tool: A shape tool is used to draw circles, ellipses, squares and rectangles within forms.

Line tool: A line tool is used when drawing straight lines within forms.

Image box: An image box control is used to display graphical objects.

Data control: A data control when placed on a form provides a means of displaying information from an existing database.

NB The number of tools available on the tool box depends on the edition and release of Visual Basic you are using

Saving a Visual Basic project

Saving a project in Visual Basic is a bit different compared to other applications. This is because Visual Basic operation involves saving multiple files.

( a) To save a new Visual Basic project for the first time, select the Save project As command from the File menu. The Save File As dialog box of Figure 5.6 (a) appears. You will first have to enter a form name e.g. bookdata and then click the Save button. The form is saved as a file with extension .frm.

(b) After this, the Save Project As dialog appears. Type the name of the project and it will be saved as a file with extension. vbp (Visual Basic project

Opening an existing project

You can open a project when Visual Basic starts or from the file menu. To open a project during startup, from the New Project dialog box that appears when Visual Basic is starting, click the Existing tab. A list of existing projects will be displayed as shown in Figure 5.7

(a). Alternatively, if Visual Basic is already running, close all other projects then click the Open Project command on the File menu. The Open Project dialog box appears from which you can select the Existing tab. (Figure 5.7 (b)). Type the name of/or select the project to open.

Visual Basic fundamental concepts

Before going further into detailed discussion on how to develop programs in. Visual Basic, it is important to highlight some of the fundamental concepts used in Visual Basic.

Data types

Table 5.1 shows the data types supported by Visual Basic:

Table 5.1

Data type Description
Integer A whole number with no fractional part. Integers range

from -32768 to 32767.

Long integer Numbers which are integers but have a bigger value and

range. They range from -2,147,483,648 to 2,147,483,647.

Single

 

A single precision real constant includes a fractional part. The largest value is 3.4 x 1038
Double

 

It includes a fractional part but has far much larger magnitude than the single real number constant. However, it cannot be larger than l.2x 1 0308
String

 

Characters enclosed in quotation marks
Boolean

 

Data types that have only two logical states i.e. true or false.

 

 

­Constants

In programming, a constant is a value that remains the same. It does not change during the execution of the program. There are three types of constants: string, numeric and named constants.

String constants

A string constant can be defined as a sequence of characters enclosed in quotation marks. They are used to write non-numeric values like telephone numbers, addresses and names. The following are examples of string constants: “Holiday season”, “345678”, “Why don’t you call”, “$72.10”

Numeric constants

Numbers are usually referred to as constants in Visual Basic. In most cases, the numeric constants are either whole numbers (integer) or double or single. Some examples of numeric constants are:

0, 3, 6000 +70,   1.4E+2, 1.674,  -.00456,

Named constants

A named constant is identified by name rather than its actual value. In Visual Basic, the reserved word Canst is used to declare this type of constants e.g. Canst Price As Integer = 20, means that an integer value 20 is identified using the name price.

Variables

A variable is a memory location referred to by name used to hold a value that is subject to change during program execution. When a variable is declared in a program, the computer sets aside memory space to hold a value in the variable. The variable may be a numeric constant, a character, a string or any other data item.

In Visual Basic, the following rules should be followed when declaring variables:

  1. The variable name must not have more than 255 characters.
  2. The variable name must start with a letter.
  3. The letter case is not important when declaring variables.
  4. A variable name must not be a reserved word. A reserved word is a special word that Visual Basic understands as a command, internal function name or simply set aside for use by the program. Examples of reserved words are Case, Else, Dim, etc.
  5. Variable names should not have spaces.

A variable is declared using the reserved word Dim. Dim is the short form of the word dimension (size). It is used to associate a variable with a specific data type. For example to declare a variable that will store the first name of a student in a program, the following declaration can be used:

Dim FirstName As String

This means that the variable FirstName is of the type string.

Variants

A variant is a variable whose data type has not been explicitly declared by the programmer. In this case, the variable type will be determined by the value held by the variant. These types of variables are called variant type because their data type keeps on changing with the values they hold. Although this may sound okay, it is not a good programming practice. All variables should be explicitly declared.

Scope

The word scope refers to the level of the program that a variable, a constant or a procedure is recognised. The scope of a variable constant is said to be global or local. The scope of a procedure variables or constants is set by declaring it as either private or public. The following terms are used in this regard:

  1. Private subprocedure.
  2. Public subprocedure.
  3. Global variables/constants.
  4. Local variables/constants.

A public procedure can be accessed from any module or form in the program. However, a private procedure is accessed in the module or form within which it is declared.

A variable or constant that is declared within a procedure is said to be local. This means that it can only be accessed within that procedure. However, a variable or constant that is declared outside the standard module but within the same project is said to be global. Such variables can be accessed by all procedures within the project.

If a public procedure is to be accessed from a module or a form other than the one it is contained in, the form or module name must be preceeded by the module containing the definitions i.e. GlobalModuleName.Active FormName (Arguments).

In Visual Basic, to declare variables as either private or public use the syntax:

  1. Private X As Integer
  2. Public Y As String

In the first declaration, the private variable X can only be accessed in the module within which it is declared. In the second example, it can be accessed by other subroutines in the same project.

User defined data types

Sometimes, a programmer may want to have a single variable that can store several data types as a unit. Such a data type whose individual components are standard data items are referred to as user defined data types. Some examples of user defined data types are records, arrays, enumerated types, lists etc. They are user defined because it is the programmer who creates them in the program. Each element or member can be accessed individually by using a period between the user defined variable and the member name e.g. if a record known as schoolrecord has a name field, then to access the name field, a programmer will type schoolrecord.name in the code.

Using suffixes to declare variables and constants

Suffixes are special symbols appended to the end of a variable or constant name in order to associate them with a particular data type. It makes programming easier and faster. Table 5.2 summarises some common

suffixes.                                     Table 5.2

    Examples  
Suffix Data type Long declaration Short declaration
% Integer Dim A As Integer A%
! Single Dim X As Single X!
$ String Dim Q As String Q$
& Long integer Dim C As Long Integer C&
# Double Dim P As Double P#

Mathematical operators

In order to write correct mathematical expressions, you need to understand some of the operators used in Visual Basic. These include arithmetic, relational and logical operators.

Arithmetic operators

Arithmetic operators are special symbols that are used to write arithmetic expressions like addition, subtraction, division and multiplication. However, it is also possible to carry out other mathematical operations using other operators. Table 5.3 shows a summary of symbols used in arithmetic operations:

Table 5.3

Symbol Name Operation
+ Plus sign Addition
Minus sign Subtraction
* Asterisk Multiplication
/ Slash Division
/\ Caret Exponentiation
Back slash Integer division
MOD Modulus Integer remainder

NB: The last two rows in the table can be explained as follows:

  1. In an integer division, each of the numbers being divided is first rounded to become an integer then the quotient is truncated to an integer. For example, 2.4/3.5 will result in 2/4 being evaluated.
  2. The MOD operator returns the remainder of an integer division. For example, 4 MOD 3 returns 1 and 5MOD3 returns 2.

Operator precedence/hierarchy

Arithmetic operators in Visual Basic have the following order of precedence when used in a program. Notice that the order may not be the same as that of algebra in mathematics. Table 5.4 illustrates how to carry out operations.

Table 5.4

precedence symbol Explanation
1 Exponentiation All exponential expressions are performed first
2 Multiplication/division Carried out after exponentiation; left to right In an expression.
3 Integer division Done after all multiplication and normal division operations
4 Integer remainder Done after integer division
5 Addition and subtraction Are carried out last, left to right.

For example write down the order of evaluation of the following expression:

(b /\ 2 – 4 * a * c )/2 * a.

Relational operators

A relational operator is used in an expression that returns a true or false value when evaluated. The operators can compare numeric variables, constants or expressions. Table 5.5 shows a summary of relational operators used in Visual Basic.

Table 5.5

Operator Name
= Equal to
<> Not equal to
> Greater than
< Less than
<= Less than or equal to
>= Greater than or equal to

 

The following are examples of relational expressions:

  1. Y < > 100 2. Y> 60    3. S< = sqr(G + V) 3. Loss = (Expenses – Profit)

The expression in 1 will evaluate to true if y is not equal to 100 otherwise it will evaluate to false.

A decision construct in a program based on a relational expression would make a decision depending on the outcome of the evaluation.

Logical operators

Logical operators are used to combine expressions to form compound expressions. Table 5.6 summarises some common logical operators used in Visual Basic.

Table 5.6

Operator Operation
And Results in a condition that is true if both expressions are true.
Or Results in a condition that is true if one of the conditions is true or both are true.
Xor Results in a condition that is true if one of the conditions is true and the other is false.
Not Negates the value of a logical expression.

For example:

  1. (x = 30) AND (student = “John”)
  2. IF (x = 20) OR (y = 30) THEN
  3. IF x NOT 0 THEN

The assignment statement

An assignment statement is an executable statement that assigns whatever is on the right of the assignment operator to the variable on the left. In Visual Basic, the assignment operator is the equal sign (=). A variable can be assigned a value as follows:

Variable = Expression

Examples of assignment statements are:

  1. P = 0.25 2. E = M*C”2                3. Area = 1/2 * base* height 4. X = X + I

NB: The last statement on the right (X = X + I) does not make mathematical sense. Yet, this is the beauty of the assignment statement in programming. The statement can be interpreted as follows:

Add 1 to the original value of X and assign the sum to X.

The Print statement

The Print statement displays data on the active form of your Visual Basic project. It can be used to display processing results of a program. If you run the project, you will notice that the result of the Print statement starts being displayed in the top left comer of the form. The structure of the Print statement is:

Print VariableName (this prints out the value held in a variable).

or

Print “String”

(this prints out the string between the two quotation marks. If there is nothing between the two quotation marks, a blank line will be the output)

The skeletal code listing below shows a sample code that displays the values stored in the variables StudentName, TotalMarks and AverageMark on a form.

Private sub Form_Load ( )

Dim StudentName As String, TotalMarks As Single, AverageMark As Single

…………

StudentName = “Edward”

 TotalMarks = 1000

AverageMark = 200

……………

Print, StudentName, TotaIMc;zrks,AverageMark

End sub

The following output will be displayed on the form: Edward 1000 200

NB: The use of a comma to separate the various elements to be output by the Print statement makes them to be widely spaced on the screen. To have a compact display with the various outputs close to each other, then use a semicolon to separate the various elements e.g. Print StudentName; TotalMarks AverageMark would display

Edward       1000           200

Library functions

Library functions are modules that have been pre-written and included in the Visual Basic language. A function performs a single task like calculating a mathematical expression then returns a value. A function will usually have a name and can be called when needed to perform a particular task. Visual Basic has many library functions. A library function is accessed by stating its name followed by the information that must be supplied to the function enclosed in parenthesis. This process is called calling a/unction. The values held in the parenthesis are called arguments. When the function is called, it uses the supplied arguments to perform an operation and return a value. Table 5.7 shows a summary of some the library functions used in Visual Basic.

Table 5.7

Function Call Description
Date z = Date ( ) Returns the current date
Exp z = Exp(w) Returns the value of eW
Sqr z = Sqr(w) Returns the square root of w
Log z = Log(w) Returns the natural logarithm of w
Str z = Strew) Returns a string whose characters are w e.g.

Str(6.80) = “6.80”

Cos z = ‘Cos(w) Returns the cosine of w
Abs z = Abs(w) Returns absolute value ofw e.g. Abs(-8) = 8
U case z = Ucase(w) Returns the upper case equivalent of w
Int

 

 

z = Int(w) Returns the largest integer that is algebraically less than w e.g. Int(2.2) = 2
Time z = Time Returns the current system time.
Format z = Format Formats the output to appear as stated.

Using the format function

The format function helps the programmer to display data in many different formats. Table 5.8 below shows how data can be formatted.

Table 5.8

EXPRESSION SAMPLE FORMATTED OUTPUT
Print format(16.778994,”##,##”) 16.78(notice the rounding)
Print format(now, “mm-dd-yyyy”) 1-20-2006
Print format (15678, “##,###.00”) 15,678.00
Label1.caption=format$(sprice, “##,###,##”) 10,630.75

 

NB: The dollar sign may be used with the format function depending on the type of output required. In the last row of the table, the formatted output is displayed on a label control.

Program comments

Comments are English statements included in the code to document a program. The comments are not executed when the program is running. In Visual Basic, a comment starts with a single apostrophe (‘) followed by the comment statement. For example:

X = Sin(p) ‘find the sine of p and store it in X

Print X        ‘display the value ofX on the screen

Converting a numeric string to a value

If you enter a number in a text box, the best way to convert it into a value is to use the Val function This is because the computer treats anything typed in the textbox as a string. The Val function operates on the string and returns a numerical value.

Hence, if the name property of a text box is set to txtLength, then the number typed in it can be read as a value into a variable x as follows:

x = Val(txtLength.Text)

Converting a value to a string

Assuming a particular variable has a numeric value and you wish to display the value in a text box, then you have to convert the value to a string first. Suppose that the name of the text box is txtArea and the integer variable is x then:

txtArea.Text = Str(x) ‘ display the value in x as a string in txtArea.

 

Project 5.1

Create a program that can be used to calculate the area of a rectangle. The program should prompt the user to enter the length and width of the rectangle. Figure 5.8 shows an overview of such a program.

 

 

To create the project, proceed as follows:

  1. Open Visual Basic and select the Standard.EXE from the New Project dialog box. A blank form will be displayed as shown in Figure 5.9.

 

  1. Place the necessary controls on the form. We need three text boxes and two command buttons. Double click the text box tool on the toolbox then the command button. The controls are automatically placed on the form and are given default names like Text! and Commandl. Add another command button. Use the shape tool to place a rectangle on the form. Drag the controls to the desired location on the form and repeat the process until you have the interface as shown in Figure 5.10.
  2. The next step is to define the set of properties for each control. To do this, right click the control then click properties. Set each control properties in the properties window as shown in the Table 5.9 below:

Table 5.9

Object Property Value
Label1 Caption

Name

“Rectangle”

IblRectangle

Text1 Font

Name

Text

Arial

txtLength

(blank)

Text2 Font

Name

Text

Arial

txtWidth

(blank)

Text3 Font

Name

Text

Arial

txtArea

(blank)

Shape Shape

Border Width

FillStyle

FillColor

0- Rectangle

2

4-Upward Diagonal

Blue

Commandl Caption

Name

Font

Exit

cmdExit

Arial

Command2 Caption

Name

Font

Calculate

cmdCalculate

Arial

 

 

NB: The conventional way of setting the name property of any object in Visual Basic is to use object prefixes such as txt for text or boxes, lbl for labels, cmd for command buttons etc.

  1. After setting the properties, we can now write the event procedures that calculate the area of the rectangle once values are entered in the txtLength and txtBreadth text boxes. To write the code, double click calculate button and add the code listing between Private sub cmdCalculate click and the End sub.

Dim L As Single, W As Single, A As Single

 L= Val(txtLength. Text)

W= Val(txt Width. Text)

A=L*W

txtArea= Str( A)

For the cmdExit button, just write End between Private sub cmdExit click and the End sub.

Figure 5.11 shows how your code should look like in the code window.

 

 

 

  1. Run the project. Enter a value in the txtLength and another in the txtWidth text boxes then click the Calculate button. Notice that the area of the rectangle is displayed as shown in Figure 5.12.

 

Explanation

  1. The first line declares the variables needed for the program to run and store values.
  2. The second and third lines assign the values in the text boxes called txtLength and txtWidth variables Land W respectively.
  3. The second last statement calculates the area of the rectangle while the last uses a function Str to display the result as a string value in the textbox named txtArea.

Adding more forms to a project

Sometimes a Visual Basic project may require the use of more than one form. To add a form to a project, the following procedure is followed:

  1. Click the Project menu then select Add Form command.
  2. In the dialog that appears, select the type of form you want to add from the New tab then click Open button.

 

Control structures

In Chapter 3, we introduced the three control structures that determine the execution of statements in a program. In this topic we shall discuss how these controls are implemented in Visual Basic.

Selection

The most common selection controls used in Visual Basic are:

  1. IF…… THEN.
  2. IF…. THEN…… ELSE.
  3. Nested IF.
  4. CASE selection.

The IF…THEN selection

The IF. . . THEN selection is used to execute a single statement or a group of statements that represent only one alternative or option. This means that some circumstances have only one option for selection depending on whether a condition evaluates to true or false. For example IF y = 80 THEN

Print (“……..”)

END IF

The statements in the If…Then…End If will be executed if the value of y is equal to 80 otherwise the whole block will be bypassed and the statements after END IF will be executed.

IF…THEN…ELSE selection

The IF… THEN.. . ELSE allows the execution of two alternatives or options depending on whether the test returns a true or false. Consider the following example:

IF average> 80 THEN

Print(“Excellent work! Congratulations”)

ELSE

Print(“Work harder next time”)

END IF

In this case, the statements starting with  ‘Excellent Work!….. ‘ will be displayed on the screen if the average is greater than 80. Otherwise, if average is less than 80, the statement “Work harder next time” will be displayed on the screen.

Nested IF selection

Nested IF selection is used if there are more than two available options to choose from. The general format of Nested IF is

IF <condition> THEN

Statements

ELSE IF <condition> THEN

Statement

ELSE IF <condition> THEN

Statement

ELSE <condition> THEN

Statement

 

Project 5.2

Write a program that can be used to find the roots of a quadratic expression.

ax2 + bx + C = 0

The formulas to solve the values of x in this expression are:

 

Xl = -b -sqr(b2 – 4ac)

2a

X2 = -b -sqr(b2 – 4ac)

2a

X=-b

2a

i.e.b2 – 4ac = 0 or b2 = 4ac

To create the project, proceed as follows:

  1. Test whether b2 is larger than or equal to 4*a*c. If it is true, then:
  2. Create a new project that would be used to calculate the values of x, Xl and X2 also called roots of the quadratic equation.
  3. In the appropriate event procedure e.g. the calculate button, add the code listed below:

‘Calculating roots of a Quadratic Equation

Dim a,b,c As Integer

Dim z,X,X1,X2 As Double

z=(b^2-4*a*c)

IF z> 0 THEN

X1=(-b+Sqr(d)) / (2*a)

x2 –x1=(-b-Sqr(d)) / (2*a)

ELSE IF z= 0 THEN

       x = -b / (2*a)

ELSE IF z= 0 THEN

Print (“This quadratic equation is not soluble”)

END IF

ENDIF

ENDIF

 

Explanation

  1. The expression b/\2-4*a*c is first assigned to a variable z.
  2. z is then tested if it is greater than zero. If greater, the program calculates the values of Xl, X2 and x. Otherwise a message “This quadratic equation is not soluble” is displayed.

The Case construct

As discussed earlier in control structures of chapter 3, the Case construct is used to reduce the tedious work of coding associated with the nested IF… construct. Let us look at a case statement that can display the name of a weekday when its number is provided.

‘Display weekday

Dim D As Integer

SELECT CASE D

CASE 0

       Print(“Sunday”)

CASE 1

       Print(“Monday”)

CASE 2

       Print(“Tuesday”)

CASE 3

      Print(” Wednesday”)

CASE 4

      Print(“Thursday”)

CASE 5

      Print(“Friday”)

CASE 6

       Print(“Saturday”)

CASE ELSE

       MsgBox(“Error -That is not a day in the week”)

End SELECT

Looping construct

In Visual Basic looping instructs the computer to execute the same block of code many times before a particular condition is met. Common looping constructs used in Visual Basic are:

  1. DO loop.
  2. WHILE…Wendloop.
  3. FOR loop.

DO loop

There are four ways of writing the Do loop. Two of the constructs require the condition to be tested first while the other two require that the condition be tested after the statement within the construct is executed at least once. The general formats of the four Do constructs are:

  1. DO WHILE <condition>

Statements

Loop

 

2.DO Until <condition>

Statements

Loop

  1. DO

Statement,

Loop UNTIL <condition>

 

  1. DO

Statements

Loop WHILE <condition>

 

Explanation

The Do While. ..Loop in 1 continues to execute as long as the condition is true. The Do Until. ..Loop in 2 continues to execute as long as the condition remains false. The loop in 3 executes the statements at least once as long as the condition is not true. Lastly, the loop in 4 executes the statements within the construct at least once as long as the condition remains true. for the first two DO statements, the test of the condition is done at the beginning of the loop hence avoiding execution of any statements in the loop as long as the condition required is not met. On the other hand, the last two loops allow a pass through the loop at least once before the condition is tested.

example 5.1

Write a program using the DO loop that will write numbers between 1 and 20 on the screen then stop. Save the project as Example 5.1.

Solution

  1. Double click the form to display its code window
  2. Add the following code listing between the Private sub form-load and

End sub.

x=O

Counter=O

DO WHILE counter<=20

x=x+1

Counter=counter+ 1

Print x

Loop

NB: All the other DO loops can be easily implemented with little effort following the general format provided.

Looping with While-Wend

The While..Wend construct can be used in place of a Do While loop. The general format of this construct is:

While <condition>

Statements

Wend

As with the Do While loop, this loop executes the statements within the construct as long as the condition is true.

Practical activity 5.1

Open the project for Example 5.1 and replace its code with the code below.

Dim x As Integer, Counter As Integer

x=O

Counter = 0

While counter<=20

x=x+1

counter=counter+1

Print x

Wend

Save the project as Example 53.

The FOR – NEXT loop

The FOR – NEXT Loop executes the statements within the construct a predetermined number of times. The general format of the FOR – NEXT

Loop is:

For index = lower limit To upper limit                         ‘sets upper and lower limits

statements

Next index                                                  ‘increments index by 1.

You can set the STEP value of the index as follows:

For index = lower limit To upper limit STEP 2

statements

Next index                                        ‘STEP increments index by 2.

The FOR construct is very suitable for accessing values in a list or array because of their sequential nature.

 

Practical activity 5.2

Open the project for Example5.3 and replace the code with the listing below:

Dim Number As Integer, Counter As Integer

Number= 0

For counter= 1 TO 20 STEP 2

Number= Number +  counter

Print Number

Next counter

 

Working with graphical objects

To add a picture or object on to a form, simply click the picture box or the image tool on the toolbox and then drag to define the area where you want the picture to be placed. Right click the object and then click properties. Set the Name and Path properties. The Path property tells the control where the picture is located.

Notice that after setting the properties, the picture is displayed on the form. If it is lying on top of other controls and you want it to be the background, right click it then select Send to Back.

Modules and procedures

Large projects must be made modular in nature to enhance maintenance and independence of the various blocks of code. The three main modules used in Visual Basic are explained in Table 5.10.

Table 5.10

Module Definition
Standard modules Their declarations and procedures can be accessed

by other modules. They are usually stored in files

that have the extension. bas You can create a standard

module by clicking Project then Add Module.

Form module Are stored as files with extension frm Each form

may have many procedures and controls. To add a

form to the project, click the Project menu then

Add Form.

Procedures These are events or self contained blocks of code

or commands that can be accessed and used by

programmers. The called procedure will normally

carry out a specific function it was designed to do. Subroutines and functions are examples of procedures.

Declaring general subroutines

So far, we have mainly discussed event driven procedures. Visual Basic also lets the programmer create general procedures that can be called within another procedure (subroutine). The general format of a general purpose subroutine is:

Sub SubroutineName( )

statements

End Sub

Example 5.2

Write a general subroutine that would solve y = xn , given that the values of n are integers.

Solution

Sub Power of Number ( )

Dim x As Single, y As Single, n As Integer y = x^n

Print y

End Sub

Explanation

The above general subroutine is given the name PowerofNumber. To call the subroutine in another procedure such as an event procedure, simply use the call statement. For example, to call the subroutine in the cmdCalculate _Click event procedure, type:

Call PowerofNumber () or Power Of Number ()

The code is executed once the command button for the cmdCalculate click event procedure is clicked.

Project 5.3

Consider a subroutine that will determine the largest of two numbers. Use the code listing below to create a proj ect that can be used to determine the lagest value once the user clicks a command button.

Sub Largest ( )

Dim Larger As Integer, x As Integer, y As Integer

If (x>y) Then

Larger = x

Print (“The larger number is: “,x)

Else If (x<y) Then

Larger = y

Print (‘The larger number is “,y)

Else

       Print(“Both numbers are equal”)

   End If

 End If

End Sub

To create the project, proceed as follows:

  1. Open a new project and save it as LargerNumber.vbp. Save the form as LargerofTwo.frm. Set the objects properties for the three labels (Tabe 5.11) and design the interface as shown in Figure 5.13.

Table 5.11

Control Properties Settings
Labell Name

Caption

lblLarger

Larger between

Label 2 Name

Caption

lblx

x

Label 3 Name

Caption

 

y

Text! ,2,3 Name

Text

txtLarger, txtx, txty

(blank)

Command 1 Name

Caption

cmdExit

Exit

Command2 Name

Caption

cmdCompare

Compare

 

Double click the Calculate and Exit buttons and add the codes as shown:

 

Option Explicit

Dim x As Single, y As Single

Private sub cmdCompareXY- Click ()

X = Val (txtX Text)

Y = Val (txt Y. Text)

        call Largest                  ‘calls a procedure named Largest that

End Sub                                      passes the values of x and ythe

                                                          procedure.

  1. Create a general subroutine called Largest and write the code listing below:

Sub Largest ( )

Dim Larger As Single

If (x > y) Then

Larger = x

txtLarger = x

ElseIf (x < y) Then

Larger = y

txtLarger. Text = y

Else

txtLarger. Text = “The numbers are equal” End If

End Sub

Private Sub cmdExit Click()

End                                                 ‘code for the  exit button

End Sub

This code will appear as shown in Figure 5.14. The call statement in the cmdCalculate makes the Largest Sub procedure to be executed once the End sub is encountered, the control is returned back to the next statement often the procedure call.­

 

  1. Click the run button and enter a value in the text box labelled X and the other in Y. Figure 5.15 shows that the value of Y i.e. 50 is larger than that of X.

Creating menus, message and dialog boxes Menus enable the users to quickly select commands while dialog boxes enable the user to enter values and make selections when working with the computer.

Drop down menus

Drop down menus are the most common menus found in applications. When a menu is selected, a drop down list of commands is displayed.

For example to create a menu bar with the menu items File, Edit and Format with commands for each menu item as shown in the Table 5.12 below.

Table 5.12

Menu File Edit Format
Commands open

Save as

Exit

copy

Cut

Paste

font

Background

Cells

Proceed as follows:

  1. Click the Menu editor command on the toolbar. Alternatively, from Tools click the Menu Editor command. The menu editor window opens.
  2. Under caption, type the word File. This is the screen name of the menu item.
  3. In the Name box enter mnuFile. This is the name that will be used to refer to the File item when coding.
  4. Under Shortcut, select a shortcut key combination. This is optional.
  5. Click Insert button and notice that the cursor moves to the next line.
  6. Type Open in the Caption box and mnuFileOpen in the Name box.
  7. Click the flush right button to insert four dots to the left of Open i.e.

File

………. Open

This means that Open is an item of the File menu. Repeat steps 1 to 4 for all the items then click the OK button. Your complete set up should appear as shown in Figure 5.16 below.

  1. Click OK to close the menu Editor window and go to form design. You will notice that your form now has a menu bar at the top as shown in Figure 5.17 below. Clicking the File menu displays a list of the options that you defined.

It is now possible to activate the menu commands by adding code in their event procedures. To do this, simply click a menu option while in design view and the code window opens in which you can add its code.

 Message boxes

A message box is a special type of dialog box used to display a message to the user. To display a message box, use the syntax:

MsgBox “Message string”, Button/icon, “Title bar Caption”.

For Example: MsgBox(“Drive not Ready. Retry?”, vbRetryCancel + vbQuestion, “Drive Error”)

Displays a message box (Figure 5.18) that tells user that the drive is not ready. Note the Retry and Cancel buttons, the Question mark in the dialog box and “Drive Error” on the Title bar.

Table 5.13 outlines some of the buttons/icons used in Visual Basic

Table 5.13

button Constant
OK vbOKonly
Critical message icon vbCritical
Critical query icon vbQuestion
Warning message icon vbExclamation
Information message icon vbInformation

Dialog boxes

A dialog box enables the user to have a “dialog” with the computer i.e. to exchange information with the computer. You have seen these many times when you try to open or save a file; a dialog will always pop up asking you to fill or select some options. A dialog box is a special purpose form. It is usually accessed when a menu item is selected. Most dialog boxes have common controls like option buttons, list boxes and command buttons.

Simple dialog boxes

Visual Basic enables the user to create forms that can be used as dialog boxes. However, they are secondary to the primary form that is used to access them. Such a form is referred to as a modal form. This means that the form remains on top of the active form until the user clicks the OK or cancel button. To add a modal form to your project, use the Load form command. For example, if the name of the form is Form3 then the Load Form3 command will display the form into the current project. To stop the form from executing, use the unload command i.e. Unload Form3.

In most cases, a form that is loaded may not even be visible in the project window. To make it visible, simply use the Show method. Remember that a method carries out actions on objects. For example to display Form 3, use the syntax Form3.Show. To show the form as modal, use Fonn3.Show l or Form3.Show vbModal.

Project 5.4

Open a project on which you created the menu bar and do the following:

  1. From the project menu click Addform then click New from the Add Form dialog box.
  2. Select dialog A form with two command buttons ie Ok and Cancel is added to your project. Notice in the Project Explorer window that a new form called Form2 is placed hierarchically below the first form.

Change the form caption and name appropriately.

  1. From your main form file menu click the Open command.
  2. In the menuFileOpen code window that opens add the code as shown in Figure 5.19.
  3. Close the code editor window and run project. Notice that when you click File then Open the dialog box you created is displayed on top of Form 1 (Figure 5.20). Because of the Show 1 method, you cannot access the main form until you click ok or cancel button on the dialog box.

Directory list box

You can also add a directory list box on a form. To do this, proceed as follows:

  1. In the Project Explorer window, double click Form2 to open it in design view.
  2. Double click the DirListBox on the toolbar to place it on the form.
  3. Run the project and select the Open command from the File menu, you will be able to browse all the directories on your computer using the dialog box that you just created.(Figure 5.21).

Common dialog box control

Microsoft common dialog control is a component used to add dialog’ boxes such as Save As and Open onto a form. The common dialog control I is not available on the toolbox unless it is added. To add it, click Project then Components. The components dialog box as shown in Figure 5.22 will appear. Select the option Microsoft common dialog control as shown, then click the Apply button. Close the components dialog and check your toolbox for the new icon called common dialog.

Project 5.5

Using the common dialog box control, create a project that can be used to display the open and save As dialog boxes. To create the project, proceed as follows:

  1. On the form, create a menu bar with menu items File, Edit and Format and two command buttons with captions open and save as shown in Figure 5.23.
  2. Right click the common dialog control on your form to display its properties window. Set the name property e.g. commonDiagl.
  3. Double click Open from the File menu or the Open Command button on the design form then add the statement below between the Private sub and End sub.

CommonDiagl.ShowOpen

  1. Double click the mnuSaveAs or the Save Command and type the code CommonDiag I. Show Save

Save the project and run the form. Notice that if you click the Open command or button when the form is running, the Open dialog box opens as shown in Figure 5.24.

In the same way a Print dialog box can be called by adding the following to a menu or button event: CommonDiag 1.ShowPrint

Other dialog boxes supported by common dialog box are Show Color

and Show Font.

List boxes and combo boxes

List boxes and combo boxes are used to display a list of items the user can select from.

List boxes

A list box enables the user to select an item from a list of entries. Selecting an item on a list during runtime causes the value of the selected item to be assigned to the ListIndex property. The ListIndex is an integer with a range of 0 to n-I where the second item corresponds to index 1. Items can be added to a list using the AddItem method or using the list function.

Project 5.6

Create a project that leads a list of items into a list box when the form is loaded.

To create the project, proceed as follows:

  1. Place the list box on the form and then drag it to the expected size.
  2. Double click the Form and add the following code window in the Form_Load() event procedure:

Listl.List(O) = “Nairobi”                    Listl.Addltem(“Nairobi”)

Listl.List(1) = “Kisumu”                     Listl.Addltem(“Kisumu”)

Listl.List(2) = “Mombasa”                 Listl.Addltem(“Mombasa ”)

Listl.List(3) = “Bungoma”         or      Listl.Addltem(“Bungoma”)

Listl.List(4) = “Nyeri”               Listl.Addltem (“Nyeri”)

Listl.List(5) = “Nakuru”            Listl.Addltem(“Nakuru ”)

Alternatively you can add the items in the list property of the list box. To do this, display the list properties window, in the list property, enter the items. To move to the next line, during item entry, press Ctrl + Enter. Figure 5.25 shows the item list assigned to a list box using the properties window.

  1. Run the project. You will notice that the list builds dynamically as you click in the box when the form is running.

NB: The ListIndex and ListCount properties are very important. ListIndex can be used in CASE selection construct to point to the most recently selected list entry. For example,

Select Case Listlndex

       Case 0           ‘first entry in list corresponds to 0, not 1

“Nairobi”

Case 1

“Kisumu

Case 2

       “Mombasa”

Case 3

……….. ”          ..

End Select

On the contrary, the ListCount property shows the number of entries in a list and it starts from 1, not O.

Combo boxes

As opposed to a list box, a combo box allows the user not only to select but also make a new entry into the list of items.

Project 5.7

Create a project that loads a list items into a combo box when the form is loaded.

To create the project, proceed as follows:

  1. Place the combo box control on the form.
  2. Open its properties window and in the List property add the following items:

“Red”

“Yellow”

“Green”

“White”

“Black”

  1. Run the project to load the form. Click the down arrow on the combo box to view the list of item as shown in Figure 5.26 below.

Visual Basic data structures

Apart from using simple data structures such as Integer, Single, Double etc., Visual Basic comes with features that allow the programmer to create complex data structures. These include arrays, records and files.

Arrays

An array is a data structure that stores several data items of the same type hence it is called a homogeneous data structure. Table 5.14 shows how data of type Integer is stored in an array.

The array has cells. The numbers 0 to 5 are called array indices or subscripts. In Visual Basic, an array starts from cell 0 as shown in the table.

Declaring an array

To declare an array, use the statement Dim ArrayName (n), where n stands for the number of elements in the array. For example:

Dim Scores (4) is an array that holds five elements. An element is an item in an array that can be accessed using the array variable name and a subscript. For example, consider an array of 5 elements called Scores. To display the 4th element use:

Score4 = scores(3)

Print Score4

The value stored in the variable score4 is printed on the form. To store a value in an array variable, use the statement ArrayVariable (index). For example, to assign a numeric constant 90 to the fifth cell use

scores( 4) = 90

This statement will assign a value 90 in the cell 4th of the array.

NB: If the array was very large and you wish to read or enter values in it,

it would be very tedious entering a value cell by cell i.e. Score(O) = 10

Score( 1) = 20

Score(3) =30

Score(n) = x

To avoid this, the For.. loop can be used. Remember that this loop is used where the number of iterations are pre-determined hence its suitability for use with arrays.

For example, if you wish to request the user to enter six values in array named A, the following FOR loop can be used:

Dim A(5) As Integer

Dim index As Integer

Private Sub EnterArrayValues()

       For index= 0 To 5

       A(ifldex) = Val(Textl.Text)

       Next index

End Sub

Notice that the array is declared this time outside the Subroutine in order to make it a general procedure that can be accessed by other subroutines. To Display values of the array on the form the following statement can be used:

Private Sub Display Array Values ()

 For index = 0 To 5

Text2. Text= Str(A(index))

Next index

End Sub

Two dimensional arrays

A two dimensional array is a data structure in which elements are arranged in rows and columns. Two subscripts are used to identify an item. For example Dim Score(2,4) means that the element is in the 3rd row, 5th column. This is because the array was declared to start from row 0 column 0 same as Dim Score (0 to 2, 0 to 4). To manipulate elements stored in a

two dimensional array, we use the nested For.. Next or For Each.. Next

loop as shown below:

Dim iRow As Integer

Dim jColumn As Integer

For iRow = 1 T03

     For jColumn = 1 to 5

 Score(iRow, jColumn)

      Next jColumn

Next iRow

 

Records

A record comprises of a series of related data items (fields). They differ from arrays in that whereas all elements in an array are of the same data type, data items in a record may differ in type. For example, when you want to store a students record with the fields Name, Registration number and date of birth in a file as a unit, then you can define a record that

would hold all this data items in one structure. For example the following declaration will create StudentDetails record:

Type StudentDetai/s

Name As String 15

RegistrationNumber As String 10

DateofBirth As Date

…………        .

End Type

The first line in the type declaration gives the name of the data structure i.e. StudentDetails. The other three lines define fields in the data type. Notice that each field has its own data type and that the string data types are of fixed length. The last line i.e. End type marks the end of the record definition. A record is defined in a standard code module or the General Declaration section of a form module.

It is not possible to access the elements of a data structure directly. This is why after defining data structure, you must declare a variable that will be used to hold the records. This is done by declaring a variable whose type is the data structure. The general format of such a declaration is:

Dim RecordVariablelVame As RecordName

For example, the StudentDetails record can be declared as a variable using the statement:

Dim Student As StudentDetails

This means that the variable Student is of type StudentDetails. To access an element in the structure, the following syntax have to be used:

RecordVariable.FieldName e.g. Student.Name

Array of records

An set of user-defined data types can be stored and accessed in arrays too. Consider the record declared below:

Type Student

RegistrationNumber As Integer Name As String * 20

End Type

An array of the student record can then be declared as follows: Dim StudentArray(39) As Student

This means that the array can store fourty student records. To access a field in the array of records use the statement: Arrayname(index).FieldName e.g. StudentArray(20).Name will return the name of the student whose record is in the 20th cell.

Data files

A file can be defined as a storage location of related information or records. Visual Basic recognises three types of files namely: text (sequential) files, random access files and binary files. Sequential files consist of data made of text strings. A random access file contains data records each of equal length with each record having a unique identifier. Remember that a record is a data structure that has several related data items about a particular entity. In random files, a record can be accessed directly by specifying its corresponding record number or location. A binary file contains information expressed as a stream of bytes. Such files store graphics, sound files or compiled code.

Sequential files

A sequential file stores data items one after another in sequence. The keywords used in manipulating a sequential file include Output, Input, Write, Read and Close. Table 5.15 gives a summary of the keywords used in manipulating sequential files.

Table 5.15

Keyword Description
Output Data is written on the storage media at the beginning

of the file, overwriting any existing data.

Input Opens the sequential file for reading if data is to be

retrieved.

Append Data is added at the end of the last item in a file.
Write Data is output into the sequential file.
Read Reads data from the sequential file.  
Close Terminates the processing of a disk file and writes

the last partially filled buffer onto the storage media.

 
EOF(Filenumber) End of File marker. When reading data from a disk,

EOF tells the program when to stop. Attempt to read

past the EOF causes a run-time error.

 

The following statements are very important when working with this type of files:

( a) Open filename For Output As #n

(b) Open filename For Input As #n

(c) Close #n

where n refers to the file number (n is usually an integer value).

Manipulating data in a sequential file

To manipulate a text file you can use the tools that corne with Visual Basic such as the common dialog box. For example, to open a file for input, use the showOpen method of the common dialog box. The skeletal code below shows that when the user enters the name of the file in the open dialog box, it is assigned to a string variable TargetFile ready for input.

Private Sub mnuOpen _Click

Dim TargetFile As String, x As Integer, item As string

 CommonDialogl.ShowOpen

TargetFile= CommonDialog I.FileName

Open TargetFile For Input As #1

x= 0

Do Until EOF(I)

input # 1, item

‘Write a code that reads each data

‘Item from the TargetFile until the end-of file-condition is true

x=x+l

Loop

Close #1

End Sub

 

Likewise, you can write data to a new file by operating it in Output mode as shown in the skeletal code listing below. Note that the file number used is #2 to avoid overwriting the first file.

Private Sub mnuSaveAs Click

Dim NewFile As String, x As Integer, item As string

CommonDialog 1.ShowSave

NewFile= CommonDialogl.FileName

Open NewFile For Output As #2

n= 30

For x = 1 TO n

‘Write a code that writes each data item into the NewFile Next x

Close #2

End Sub

When you write to a file, all the original data in the file is lost. To avoid losing the content of a file open it in Append mode as shown in the skeletal code below.

Private Sub mnuSaveAs Click

Dim TargetFile As String, x As Integer, n As Integer

CommonDialog 1.ShowSave

TargetFile= CommonDialog.FileName

Open TargetFile For Append As #1

n= 20

For x = 1 TO n

‘write each data item at the end of an existing file Next x

Close #1

End Sub

Project 5.8

Using Visual Basic programming, develop a simple sequential file processing program that would read data from a file called ReaderFile.txt and write the contents to another file called Receive. txt . The system should be menu driven. The project should use the Open and Save as dialog boxes to access the two files on the disk.

To create the project, proceed as follows:

  1. Create a new project and save the default fonn as sequentialForm. Save the project as SequentialFiles. vbp
  2. Create a File menu having menu commands as shown in Figure 5.27 below: i.e. Click the tools then menu editor command.
  3. Place the Common dialog control, a combo box and a label on the form.
  4. Double click the form then add the code listing below.

Private Sub Form_Load()

Form I. Caption = “Text File I”

Labell. Caption = “Learning to work with text files”

mnuSave As. Enabled = False

Combo 1. Text = ” ”

End Sub

  1. Double click the Open command and type the code below:

Private Sub mnuOpen Click()

Dim TargetFile As String, Item As String

Dim x As Integer

CommonDialog I.Filter = “Text files (*. txt)/*. txt” ‘open only text files CommonDialog1.ShowOpen

TargetFile = CommonDialog1.FileName

Open TargetFile For Input As #1

x= 0

Do Until EOF(1)

Input #1, Item

ComboI.List(x) = Item  ‘Assign items to the list property of combo box

ComboI.Tag = x ‘Assign the index x to the tag property that represent the number of items read from the file.

x= x+ 1

Loop

Combo 1. Text = “Contents”

Combo I.Locked = True

mnuSave As.Enabled = True     ‘enable command after file open

Close #1

End Sub

Private Sub mnuSave _As Click()

Dim NewTargetFile As String

Dim x As Integer, m As Integer

CommonDialogI.Filter = “Textfiles (*.txt)/*.txt”

CommonDialog I.ShowSave

NewTargetFile = CommonDialogI.FileName

Open NewTargetFile For Output As #2

n = Val (Combo 1. Tag)              ‘Assign the value of the tag to n

For x = 0 To n

Print #2, ComboI.List(x)

Next x

Close #2

End Sub

 

Explanations

1.on running the program, a form is displayed on which is a combo box and a file menu.

  1. On clicking the open command in the File menu, the open dialog box is displayed from which the user can select or type the file name.The file is assigned to a variable TargetFile.
  2. Minimise the Visual Basic IDE Window and start a text editor program such as Notepad. In the window, write the text: we are the world.
  3. After saving the text file, close the program and now return to your project. Click File then Open on your running project. In the Open dialog box, locate your text file and open it. Notice now that the words “We are the World” are displayed in the Combo box as shown in Figure 5.28. You can now use the Save_As command to save the file elsewhere with another name.

NB: If we alter the text and separate the words in the sentence with commas or quotes each word will be read into the computer separately. In such a case the words will be displayed in a drop down list in the combo box.

  1. The reason why the text is displayed in the combo box is because we used the Print statement for output and directed the output to the combo box. However, to write the content into the file, use the Write #n statement instead of Print #n.

Project 5.9

Laura, a proprietor of Laura Refreshment Cafe has requested you to create a program that stores her products in a sequential file. The data entry form should display beverages in a combo box while juice flavours should be displayed in a list box. These two controls are populated with data stored in a sequential file. Using a command button, the user should be able to add more beverages in the combo box.

To create the project, proceed as follows:

  1. Create a new project with one form and add appropriate controls on the form as shown in Figure 5.29.

 

  1. Display each control properties window and set the properties of each control such as:­

(a) Name and caption of add beverages command button.

(b) A combo box with items such as Tea, Coffee, Cocoa, Beans etc.

(c) A List box with items such as Orange, Passim)., Mango etc.

(d) A menu bar with File and Edit Menus. The commands in the

File menu include Save and Exit while those in the Edit menu includes Delete an item, Clear the list and add an item

3, Write a code for each event procedure as shown by the listing below.

(a) Double click the Add Beverages command button and type the code below:

Option Explicit

Dim mbUnsaved As Boolean

Private Sub cmdAddBevarage Click()

‘Add new Beverage If cboBeverages.Text <> “” Then

       With cboBeverages

       .Add/tem cboBeverages

       .Text= “”

End With

mbUnsaved = True

Else

MsgBox “Enter the name of Beverage”, vbExclamation, “Missing Data”

End If cboBeverages.SetFocus

End Sub

 

(b) Double click the form to open the code editor window and enter the code listing below:

      Private Sub Form_Load()                .

‘Load the list

Dim stBeverages As String

On Error GoTo HandleErrors ‘Turn on the error handling routine

Open “a:BevFile.Dat” For Input As #1

Do Until EOF(1)

Input #1, stBeverages

      cboBeverages.AddItem stBeverages

Loop

Close #1

Form Load exit:

Exit Sub

HandleErrors:

                                    ‘The code below raises any type of error encountered during the file open operation

Dim iResponse As Integer

Select Case Err.Number

Case 53, 76 ‘ Invalid path or file name

  iResponse = MsgBox(“Create a new file?”, vbYesNo + vb Question, “File Not Found”) Display a message box

If iResponse = vb Yes Then

  Resume form_Load _exit ‘Exit the Procedure

Else

  mnuFileExit Click ‘Exit the program

End If

Case 71

iResponse = MsgBox(”Drive not Ready. Retry?”, .

vbRetryCancel + vbQuestion, “Drive Error”) display a message box

If iResponse = vbRetry Then

  Resume

Else

       mnuFileExit Click ‘Exit the program

End If

 

Case Else

.

Err.Raise Err display a message for any other type of error

End Select

End Sub

Private Sub mnuEditAdd Click()

‘Add a new beverage list cmdAddBevarage _Click

End Sub

(c) Double click the Add command from Edit menu and type the code below:

Private Sub mnuEditdelete Click()

‘Delete a selected item If cboBeverages.ListIndex <> -1 Then

cboBeverages.RemoveItem cboBeverages.ListIndex

mbUnsaved = True

Else

MsgBox “Select an item you want to delete”, vbInformation, – I

“Select an Item”

 End If

End Sub

(d) Double click the Exit command in the file menu and type the code listing below:

Private Sub mnuFileExit Click()

‘Exit from the program and save changes

Dim iResponse As Integer

If mbUnsaved = True Then

iResponse = MsgBox(“Save changes?”,vb YesNo + vbQuestion, “Save Changes”)

If iResponse = vb Yes Then

mnuFileSave Click

End If

End If

End

End Sub

(e) Double click the save command in the file menu and type the code listing below:

Private Sub mnuFileSave Click()

‘Save the combo box content into a sequential file

Dim iIndex As Integer

Dim iMax As Integer

Open “a:BevFile.Dat” For Output As #1

iMax = cboBeverages.ListCount – 1

For iIndex = 0 To iMax

Write #1, cboBeverages.List(iIndex)

Next iIndex

Close #1

mbUnsaved = False

End Sub

Explanation

  1. On running the program, the form is loaded and you can add a beverage item in the combo box as shown in Figure 5.30.

 

  1. When the user clicks the save command on the File menu, the Beverages list is saved on the floppy disk. You can view the items using Microsoft Windows NotePad or any Text Editor. Below is a list of items saved in the file BevFile.Dat.

“Chocolate”

       “Tea”

       “Coffee”

       ”Milo”

       “Plain Coffee”

“Soya”      I

“Cocoa”

  1. On error statement have been used in the Form Load procedure. This code ensures that the program does not halt in case the user forgets to insert a floppy disk. On error statement and the err objects are therefore used to trap run-time errors. The correct syntax of the On Error statement is: I

On Error GoTo LineLabel e.g. On Error GoTo ErrorHandler I

The lineLabel refers to the error handling code that begins with a line label such as HandleErrors:

The resume statement tells the program to resume back to the statement that caused the error. Resume Next option can also be used I to tells the program to execute the statement immediately following the line that caused the error.

The Err object holds information about an error that has occurred. The name of the application that caused the error is stored in the source property. The Number property contains error numbers ranging from 0 to 65,535. Examples of Err.Number are shown in Table 5.16.

Table 5.16

Number Err.Description Number Err.Description
7 Out of memory 58 File already Exists
11 Division by zero 61 Disk full
13 Type mismatch  71 Disk not ready
53 File not found 76 Path not found

You can use the raise method to set the error code, effectively turning on an error. This is necessary if the error that has occurred is not the one of the anticipated. The statement Err.Raise Err in the form load procedure therefore tells the program to display an error message for any other unhandled error.

Random access files

Random access files consists of fixed length records each assigned a unique identification number. The keywords use in random file manipulation are summarised in Table 5.17 below:

                                                  Table 5.17

Keyword Description
Random Records can be input or output and accessed in any,

order.

Get # FileNumber Reads data from a random disk file and place data

into the record name variable. The variable must

be a user-defined data type e.g. a record variable.

Put # FileNumber Writes the content of a record on the disk. The record

number determines the relative location within the

file. If the record number is omitted, the record will

be placed in the next location from the last Get or

Put operation.

Len Len refers to the length of a single record. For

example Len(EmployeeRecord) retUrns the size of

the employeeRecord in bytes.

LOF(FileNumber) Rather than using EOF, LOF is used to find the end

of a random file. This function returns the size of

the file in bytes. FileNumber is the file number

from the currently open file. To determine the highest

record number, divide the return value of LOF by

the size of one record. For Example

 Number _of_records = LOF(1)/

Len (EmployeeRecord).

Seek(FileNumber) Returns the current location of the file pointer. For

a sequential file the current byte number is returned

while in randof!! files, seek returns the position of

the next record. For example

NextRecord = seek (1)

To open a random file for input or output use the syntax: The following statement:

Open filename For Random As #n Len = record length

Reading records from a random file

Records are read one at a time using the following procedure

Get #n,record number, data item

Sometimes, you may ignore the record number but instead put two commas I.e.

Get #n”data item

The computer in this case will look for the record following the last’Get operation.

Writing to a random file

The statement below can be used to write records to a file.

Put #n,record number, data item or put #n”data item

The latter statement would write a record next to the last Put operation.

NB: Random files will accept data records only.

Project 5.10

You have been requested to develop a program that can store employees contact details. Create a project that has two forms namely the main form and a data form that can be used to manipulate employees records and store them in a random file. The forms should have the following controls:

Main form

  1. A List box where the names of the employees are displayed.
  2. Command buttons for Adding, Deleting, Updating and browsing employee’s records.
  3. Menu bar with File and View menus.

Data form

  1. Labels and Text boxes for LastName, FirstName, Address and City/Town
  2. Navigation buttons i.e. First, Next, Previous and Last.
  3. OK and Cancel buttons.

To create the project, proceed as follows:

  1. Create a project that has two forms namely the main form and a data form and add controls as shown in Figure 5.31 (a) and (b).

 

  1. Open the properties window and set the properties of each control such as:­

(a) Name and caption of each form controls

(b) Command buttons for both forms.

(c) A combo box with items such as Tea, Coffee, Cocoa Soya etc.

  1. Create a menu bar with File and View menus. The File menu should include at least one command e.g. Exit while the View menu should have at least View Records command.
  2. Write codes for each event procedure and standard procedure as shown by the listing below.

      Standard(Global) Procedure

Enter this code in a standard module code editor window.

Option Explicit

Type employeesRecord               ‘Define a record with five fields.

stLastName As String * 15

stFirstName As String * 15

stAddress As String * 10

stCity As String * 12

       stDeleted As String * 1

End Type                                     ‘End of record defination

Public gEmployee As employeesRecord

Public gstFileAction As String

Main form Procedures

Private Sub cmdAddNew Click()

‘Display a blank record in order to add a new employee

gstFileAction = “A”

frmFile.Show vbModal

End Sub

Private Sub cmdBrowse Click()

‘Browse the File

    gstFileAction = “B”

frmFile.Show vbModal End Sub

Private Sub cmddelete Click()

    ‘Delete an employee from the list

    iflstEmployee.ListIndex <> -1 Then

    gstFileAction = “D”

    frmFile.Show vbModal

    Else

    MsgBox “Select a record to be deleted!”, vbOKOnly + vbInformation, “Delete!”

End if

End Sub

Private Sub cmdUpdate ClickO

 ‘Update an employee record

    iflstEmployee.ListIndex <> -1 Then

    gstFileAction = “u”

    frmFile.Show vbModal

    Else

    MsgBox “Select a record to update”, vbOKOnly + vbInformation, “Update”

End if

End Sub

Private Sub Form_Load()

‘Store the details of the list box in a random file

 Dim iIndex As Integer

Dim iResponse As Integer

On Error GoTo HandleErrors

Open “a:Employee.Dat” For Random As #1 Len = Len(gEmployee)

 IfLOF(l) / Len (gEmployee) > 0 Then ‘Iffile not empty

  For ilndex = 1 To LOF(1) / Len (gEmployee)

  Get #1, ilndex, gEmployee

  If gEmployee.stDeleted <> “Y” Then

  AddtoList (iIndex)

  End If

  Next iIndex

Else

iResponse = MsgBox(“Create a new file?”, vb YesNo + vb Question, “File Not Found”)

If iResponse = vbNo Then

mnuFileExit _Click ‘Exit the program

End If

End If

form_Load exit:

Exit Sub

HandleErrors:

If Err.Number = 71 Then

     iResponse = MsgBox(“Drive not Ready. Retry?”, vbRetryCancel + vb Question, “Drive Error”)

     If iResponse = vbReiry Then

     Resume

        Else

        mnuFileExit _Click ‘Exit the program

       End If

Else

On Error GoTo 0 ‘Turn error trap off

End If

End Sub

Private Sub mnuFileExit Click()

 ‘End the program

Close #1

End

End Sub

Public Sub AddtoList(iIndex As Integer)

‘Add an employee in the list box

Dim stName As String

stName = Trim(gEmployee.stLastName) & “, “& gEmployee.stFirstName

IstEmployee.AddItem stName

IstEmployee.ItemData(lstEmployee.NewIndex) = iIndex

End Sub

Private Sub mnu ViewEmployee Click()

    ‘Display the employees file

    gstFileAction = “B”      ‘Browse

frmFile.Show vbModal

 End Sub

Data form Procedures

Option Explicit

Dim miIndex As Integer

Private Sub cmdCancel- Click()

    ‘Switch to the main form

frmFile.Hide

 End Sub

Private Sub DisplayRecords()

    ‘Display record fields in the form text controls

     txtLastName. Text = gEmployee.stLastName

      txtFirstName. Text = gEmployee.stFirstName

    txtAddress. Text = gEmployee.stAddress

    txtCity. Text = gEmployee.stCity

End Sub

Private Sub SaveRecords()

gEmployee.stLastName = txtLastName. Text

gEmployee.stFirstName = txtFirstName. Text

gEmployee.stAddress = txtAddress. Text

gEmployee.stCity = txtCity. Text

End Sub

Private Sub cmdFirst Click()

     ‘Display the first record

    frmMain!lstEmployee.ListIndex = 0

    Readrecords

End Sub

Private Sub cmdNext_Click()

    ‘Display the next record

    If frmMain! IstEmployee.ListIndex <

   frmMain!lstEmployee.ListCount -1 Then

   jrmMain!lstEmployee.Listlndex = jrmMain!lstEmployee.Listlndex + 1

   Readrecords

   Else

   cmdFirst Click

   End If

End Sub

Private Sub cmdLast Click()

     ‘Display the last record

   frmMainflstEmployee.Listlndex =

   frmMain!lstEmployee.ListCount -1

Readrecords

End sub

Private Sub cmdOK Click()

‘Select the action to perform then click OK

Dim stName As String

Select Case gstFileAction

Case “A”

         milndex = LOF(1) / Len (gEmployee) + 1

        gEmployee.stDeleted = “N”

        SaveRecords

        WriteRecords

        frmMain.AddtoList (milndex)

frmMain!lstEmployee.ListIndex = frmMain!lstEmployee.Newlndex

Case “D”

miIndex =frmMain!lstEmplayee.ItemData(frmMain!lstEmployeeListIndex)

gEmployee.stDeleted = “Y”

WriteRecords

frmMain!lstEmployee.RemoveltemfrmMain! IstEmployee.Listlndex

  Case “U”

       SaveRecords

milndex= frmMain!lstEmployee.ItemData(frmMain!lstEmplayeeListIndex)

WriteRecords

 frmMain!lstEmployee.Removeltem frmMain! IstEmployee.Listlndex

frmMain.AddtoList (miIndex)

Case “B”

End Select

frmFile.Hide ‘Return to the main form

End Sub

Private Sub ClearTextBoxes()

    txtLastName.Text = “”

    txtFirstName. Text = “”

    txtAddress. Text = “”

txtCity. Text = “”

End Sub

    Private Sub NavigationEnabled()

   cmdFirst.Enabled = True

   cmdNext.Enabled = True

    cmdPrevious.Enabled = True

cmdLast.Enabled = True End Sub

Private Sub NavigationDisabled()

cmdFirst.Enabled = False

cmdNext.Enabled = False

cmdPrevious.Enabled = False

cmdLast.Enabled = False

End Sub

Private Sub cmdPrevious Click()

If frmMain!lstEmployee.Listlndex < 1 Then

cmdLast Click

    Else

    frmMain!lstEmployee.ListIndex = .frmMain!lstEmployee.ListIndex – 1

    Readrecords

End If

End Sub

Private Sub Readrecords()

    ‘Read data from a random file

    miIndex= frmMain!lstEmployee.itemData(frmMain!lstEmployee.ListIndex}

   Get #1, miIndex, gEmployee

DisplayRecords

End Sub

 Private Sub WriteRecords()

   ‘Save data to a disk

Put #1, miIndex, gEmployee

End Sub

   Private Sub Form_Activate()

   ‘Activate the data form and set focus to the LastName field

   Select Case gstFileAction

Case ”A”

ClearTextBoxes

NavigationDisabled

txtLastName.SetFocus

Case “D”

Readrecords

NavigationDisabled

Case “U”

 Readrecords

NavigationEnabled

Case “B”

  NavigationEnabled

  cmdFirst Click

  End Select

End Sub

Explanation

  1. On running the program, the main form is loaded that shows a list of employees as shown in Figure 5.32.
  2. When the user clicks the Add New button, a blank data form is displayed with focus set on the LastName text box. (See Figure 5.33). If you add a new employee record and then click the OK button, the employee’s name is added into the list box and saved into random file.
  3. On clicking the Delete, Update or Browse buttons, the records are displayed on the form for the user to perform the appropriate action. Figure 5.34 (a) shows a record that is just about to be deleted while Figure 5.34 (b) shows the main form display after deleting the selected record.

Binary files

A binary file is used to store graphics, sound or compiled files. Applications that make use of binary files are complicated and beyond the scope of this book. However, to manipulate a binary file the keywords Put, Get, EOF, Len, LOF, Seek, Loc (pointer location) are used.

To open a binary file we use the statement; OpenfileName for Binary As #n. Below is a skeletal listing of a Visual Basic program that read and writes the same data into a binary file.

Private Sub mnuCopy Click()

Dim FileLength As Integer, Index As Integer

Dim FileName As String

Dim FileByteO As Byte

FileName =……… ‘find out the file name

Open FileName For Binary As #1

FileLength = LOF(1)

ReDim FileByte(Filelength)

For index = 1 To FileLength                    ‘read the file

 Get # 1 “FileByte(Index)                        ‘the second field has no value

Next index

For Index = 1 To FileLength

Put #1, Index, FileByte(Index)                ‘the second field has a value

 Next Index

Close #1

End Sub

Explanation

The Get #n statement start reading the first byte in the file and then reads each successive byte until the end of the file. The Put #n statement has a value hence it will overwrite the contents of the file it is writing to. To avoid this, leave index empty so that the write operation simply appends the records to the end of the file.

  1. What is an array subscript?
  2. Differentiate between a record and’ an array.
  3. Differentiate between a sequential file and a random access file.
  4. State the function of each of the following file manipulation commands.

(a) Input #1 (b) Get#n (c) Put #n (d) Qpen

  1. Differentiate between (a) EOF and LOF
  2. An employee file has the following fields: First name, Second name, Employment number, Date of employment and Date of birth. Using the type declaration, create a user defined data type that will store ail this data for one employee.
  3. Declare a variable that can store the user defined data type in question 6 above.
  4. Assuming the user wants to access the DateofEmployment field in a record variable’employeeDetails, write a statement that can do this.

Linking Visual Basic forms to a database

In Visual Basic, it is possible to access an existing database. This is done by adding data controls on a form. For example assuming a database called library exists and it has a table called students, to access this table in Visual Basic, proceed as follows:

  1. Open your Visual Basic project. Click the Project Explorer icon on the toolbar to display the explorer window. Double click Form1(Form1.frm) in the project explorer window to display the blank form as in Figure 5.35.
  2. If the properties window is not displayed, right click the form then select Properties from the shortcut menu. Change the properties as indicated below:
Property Value
Name Studentform
Caption Enter or View Students
  1. Double click the Data control tool on the toolbox. A data control is placed on the form automatically. Now move and resize it as you wish. Change the following properties of the data control:
Property Value
Name StudentFormData
Caption ViewStudents
Connect Access 98/2000/2003 (Depends on the database

type and version installed in your computer).

DatabaseN am Provide the full directory path to the database

by clicking the… icon then browse to the database.

RecordSourct STUDENTS (select this table from a drop down

menu)

The last two properties link your form to the database that has the data source records. For example, in our case, the data source is the students table found in the Library database.

  1. To view the fields of each record, add text boxes in the form that would accommodate all fields from each record. To link each text to the data source, double click the text box and then change the following properties for each text box.

Textbox 1

Property value
Name Studentregistrationtxt
Data source Studentformdata (remember this is the name you gave to the data control on the form)
Datafield Registration number (select from dropdown menu)
Text Reg no

 

Textbox 2

Property Value
Name Studentfirstnametxt
DataSource Studentformdata
Datafield First name

Repeat the above for all the available textboxes then save the project. Figure 5.36 (a) shows three textboxes linked to the STUDENT table.

  1. Run the project to display the content of the underlying table. Figure 5.36 (b) shows the sample record from the underlying table. Notice that the fields on the form do not have labels. It is the high time we add labels and command buttons.

To add labels proceed as follows:

(a) Double click the label control on the toolbox. A label is placed on the form.

(b) Drag the label and place it above the Registration number field            on the form.

(c) Change the label name and caption appropriately.

(d) Set the labels properties appropriately as shown in the table below.

Labels 1

Name Caption
Labelregno Registration no:
LabelFirstName First name:
LabelSecName Second name:

To add a command button proceed as follows:

(a) Double click the button from the toolbox.

(b) Change the name and caption of the command button.

Name Caption
EnterNewRecord New record
SaveNewRecord Save

I

(c) Change the buttons properties as indicated below

Your form should now look as shown in Figure 5.37.

 

Project 5.11

Create a new project called SchoolLibrary that can be used to access a database called Biblio.mdb that conies with Visual Basic.

To create the project, proceed as follows:

  1. Start Microsoft Access and locate for the Biblio database. The path to the database may be C:IProgram FileslMicrosoft Visual

 Studio\VB98\Biblio. mdb. Figure 5.39 shows the tables in the database.

  1. Click the queries tab and open All Titles in design view. Note that the query has four fields namely: Titles, ISBN, Author and Year Published.
  2. Create a project that contains one form, large enough to hold the four fields. Click on the Data Control tool and draw a data control at the bottom of the form as shown in Figure 5.40.
  3. Add labels and text boxes that will be used as bound controls for the fields from the query. Set Name, Caption and Text Properties for the labels and textboxes accordingly.
  4. Change the Data control properties as follows:

(a) Set the Name property to datBooks and Caption to Display a book.

(b) Make sure the connect property is set to Access.

(c) Click the DatabaseName settings button (…) to display database name dialog box. From the dialog box, locate the database called Biblio using the path C: IProgram Files \Microsoft Visual

Studio\VB98\Biblio.mdb

  1. Scroll to RecordSource property and click the down arrow. From the list of tables and queries displayed, select All Titles. Figure 5.41 shows a section of the Data control properties settings.
  2. Click each textbox and set the DataFie1d appropriately. For example, click the txtISBN, then from the DataFie1d property, select ISBN.
  3. Write the code listed below for the command Close button.

Private sub cmdClose click()

, Exit from the project

End

End Sub

  1. Save the form as books and the project as VBBiblio. Figure 5.42 shows the complete form in design view.
  2. Run the project. Notice that the form bound controls are populated with data from the All Titles query as shown in Figure 5.43. Click the navigation arrows of the data control to view other records.

Using the Recordset object to manipulate a database

When you set the record source property of a data control to the name of a table or query, you are defining a new object called a Recordset. The recordset has its own set of properties and methods which you can use to move from record to record. Below is a summary of some methods used with Recordset.

Method                                                       Description

AddNew               Clears the bound controls for a new record entry

Update              Beginning of file. Updates the underlying table or query by adding the new field.

Delete               End of file. Used for deleting the currently selected record.

BOF                 Used to check for the beginning of a file.

EOF                 Used to test the end of a file.

Move             Used to navigate through the database. Other Move methods includes MoveNext, MoveLast and MovePrevious

Project 5.12

Using the Recordset object, modify the VBBiblio project by adding three more command buttons namely Add New, Save and Delete on the Books form. Using the three buttons, the user should be able to add a new record, automatically update the underlying data source or delete a selected record.

To create the project, proceed as follows:

  1. Open VBBiblio project and add the three buttons as shown in Figure5.44.
  2. Write the code for each of the buttons. Below is a sample code for the modified VBBiblio project.

Private Sub cmdAdd Click()

‘Add a new record

If cmdAdd. Caption = “&Add New” Then

datBooks.Recordset.AddNew ‘Clear the fields for new entry

txtISBN.SetFocus

DisableNavigations

cmdSave.Enabled = True ‘Enable the save button

cmdAdd.Caption = “&Cancel” ‘Allow a cancel option

Else

datBooks.Recordset. Cancel Update

EnableNavigations

cmdSave.Enabled = False

cmdAdd.Caption = “&Add New”

End If

End Sub

Private Sub DisableNavigations()

 cmdFirst.Enabled = False

cmdNext.Enabled = False

cmdPrevious.Enabled = False

cmdLast.Enabled = False

cmdDelete.Enabled = False

End Sub

Private Sub EnableNavigations()

 cmdFirst.Enabled = True

cmdNext.Enabled = True

cmdPrevious.Enabled = True

cmdLast.Enabled = True

cmdDelete.Enabled = True

End Sub

Private Sub

cmdClose Click()       ‘Close the form

End

End Sub

Private Sub cmdDelete Click()          ‘Delete the selected record

  With datBooks.Recordset

  .Delete

  .MoveNext

If.EOF Then

      .MovePrevious

    If.BOF Then

    MsgBox The record set is empty”, vblnformation, “No

  Records”

      End If

    End If

End With End Sub Private Sub cmdFirst Click()

    ‘Move to the first record

    datBooks.Recordset.MoveFirst

End Sub

Private Sub cmdLast Click()

   ‘Move to the Last record

datBooks.Recordset

.MoveLast

End Sub

Private Sub cmdNext_Click()    ‘Move to the next record

With datBooks.Recordset

.MoveNext

    If.EOF Then

    .MoveFirst

End If

End With

End Sub

Private Sub cmdPrevious Click()   ‘Move to the previous record

With datBooks.Recordset

.MovePrevious

     If.BOF Then

        .MoveLast

    End If

  End With

End Sub

Private Sub cmdSave Click()

‘Save the current record

datBooks.Recordset.Update

EnableNavigations

cmdSave.Enabled = False

cmdAdd.Caption = “&Add New”

End Sub

Explanation

On running the program, the form is loaded that shows each record from All Titles query. The user can navigate to view other records using the navigation buttons. This project also allows the user to add, save and delete a record as shown in Figure 5.45.

 

Practical activity 5.3

Using an existing database called Hospital, write a project that access the employees Table that has at least five fields i.e. First Name, LastName, Dateofbirth, Department and Status. The project form should have Navigation, Add, save and Delete buttons

  1. Assuming you have a database containing the following fields:

(a) Names

(b) Contact numbers

(c) Town

Explain how you can access these fields in the database from Visual Basic environment.

  1. Explain the difference between a data control and a databound control.
  2. Explain how you would link up a form in Visual Basic to a database called Biblio that comes with VisualBasic located in a folder VB98. VB98 is accessed through the path C:/Program File/Microsoft Visual Studio VB98.

Creating a Visual Basic executable file

You can convert your project into an executable (.EXE) file that can be run on Microsoft Windows desktop. The EXE file contains the information for all your project files including the form files and modules. After you create the EXE file, the other files are not affected. However anytime you make changes to the source code, you must recreate the EXE file.

To create the EXE file Proceed as follows:

  1. From the:Filemenu, select Make xxxx.exewhere xxxx stands for the currently open project.
  2. In the make project dialog box, type the name of your executable file then click OK.
  3. You can then place your EXE file in the programs menu or on the desktop.

Conclusion

Therefore with knowledge in Visual Basic programming and system development discussed in Chapter 4, you can be able to create versatile information systems. This being an introduction there is a lot in Visual Basic programming. You can learn more on Visual Basic Programming from Microsoft Visual studio on-line help known as MSDN collection.

 

APPENDIX I

Introduction to database design

Most systems will involve storage of data in a database and then having different users accessing the data in their own unique way. Sometimes the data may be stored in a file that is created on the disk. This appendix demonstrates how to construct system files or tables, using Microsoft Access and finally automate your database to make it a fully-pledged application.

Remember that in system analysis, we said that for a library system, we will need to store data about books and students as entities of the system. These records have to be stored in a database. These entities have a relationship which needs to be defined during database design. For example, because a student can borrow many books, this can be represented in the database design as a “one-to-many relationship”. Figure App. 1.1 represents this relationship using a simple relationship diagram. The line that joins the two entities divides into three on the Books side to show that one student can borrow many books.

Other relationships that are possible between entities are “one-to-one” and “many-to-many”. In Figure App. 1.2. for example, one student can only have one registration number.

Student has a Registration

number

 

Fig. App. 1.2: One-to-one relationship

Similarly, in a school environment, one course unit can be done by many

students and one student can do many course units (Figure App. 1.3).

Course unit can be

\taken by /

Student
/               \  

Fig. App. 1.3: Many-to-many relationship

 

It is therefore possible to have a database design that has all the three entity relationships. However, when designing your database, best practice demands one to develop one-to-many relationships between entities. The diagram that shows the logical relationship between data entities is called the entity relationship diagram (ERD).

Defining attributes

Attributes need to be identified for each of the entities identified in the entity relationship diagram. The attributes will become the fields of the database table that will store data for each entity. A complete set of

attributes in a table will form a record. Each entity will have one attribute that will hold a unique value for each of the records entered in the database. This unique attribute is called the key attribute or the primary key (PK). To create a relationship between two tables, include the primary key of one table in the second table i.e. create a field in the second table that has the same data type as the primary key of the first table. This field created in the second table is called the foreign key (FK). Table App. 1.1 shows the attributes for two entities in a library management system.

Table App. 1.1

Entities and their attributes
Entity Attribute
Books Book number (PK)

ISBN number

Author

Publisher

Purchase price

Student Registration number

First name

Middle name.

Class

Stream

A careful study of the two tables will reveal that some of the attributes need to be separated and used to develop other entities. This is because they will encourage duplicate storage of data in the database. For example, one “Publisher” may have published many books. Hence, if you have one hundred different books in the library done by the same publisher, you will have to enter the same name a hundred times in the database!

 

Table App.I.2 shows this anomaly. This data duplication is not allowed and hence we can create an entity called “Publishers” that will have the name of a publisher entered once in the database then allow you to keep on referring to it when the need arises. The process of trying to eliminate storage of duplicate values in the database is called normalization. It is governed by some rules that are outside the scope of this book. However, the simple principle is that you try to separate off any attributes that may eventually carry repeating values in the database to form their own tables.

 

Table App. 1.2

ISBN Title Publisher Date

published

Date

issued

Return

date

09625063xx

08765432xx

GIS Data

Form 1 Geog.

Jets book

Jets book

2000

2001

1/3/2005

3/4/2005

8/3/2005

10/4/2005

To avoid repetition, Table App. 1.2 can be broken down into two, one for the books and another for publishers as shown in Table App. 1.3.

Table App. 1.3

Entities and their attributes
Entity Attribute
Book Book Number (PK)

ISBN

Title.

Date of publication.

Year published

Purchase price

Student number (FK)

Publisher ID (FK)

Student Registration number (PK).

First name.

Middle name.

Class

Stream

Publisher Publisher ID (PK).

Publisher name.

Address

City

Phone number

 

The entity relationship diagram of the system will now look as shown in Figure App. lA.

This entity relationship diagram shows that a student can borrow many books. Likewise a publisher can publish many books.

Creating the database

This section presumes that you have covered the Form 2 syllabus on databases. To create a database, proceed as follows:

  1. From the start menu, select Microsoft Access. The dialog box of Figure.App. 1.5 appears.

 

Fig.App. 1.5:

  1. Select BlankAccess Database option then click the OK button. The File New Database dialog box appears. In the File name box, type the name of the new database to be created as shown in Figure App. 1.6.

­

 

 

  1. In the Save in box select the folder where you want to save your database, then click the Create Database button.
  2. The database as shown in Figure App. 1.7 appears on the screen allowing you to create the various tables.

 

Defining a file/table structure

To define the file/table structure:

  1. Click the Tables tab in the database window and then double click Create table in Design view command.
  2. Create the three tables i.e. students, books and publisher using the attributes defined earlier in Table App. 1.3. Figure App. 1.8 shows a students table in design view.

 

Setting the primary key and foreign key

A primary key can be defined as a unique field that identifies each record in a database table. This means that the primary key in a database table holds unique values for each record and cannot accept duplicate, null or empty values. For example, if one student has the registration number 2000, no other student can be assigned the same number and a value must be entered into the field before proceeding to another record.

On the other hand, the foreign key is included as an attribute of an entity in order to create a relationship with another entity in the database. For example, the Student registration number field in the BOOKS entity creates a relationship between the STUDENT entity and the BOOKS entity. The entity with the foreign key is usually on the many side of a relationship. Values in a foreign key field of a table in a database are unique but are allowed to repeat as long as they appear in the primary key of the primary table.

To define table relationships:

  1. From the tools menu, click relationship. Show table dialog box appears as shown in Figure App. 1.9.
  2. Select the tables and click add so that they are displayed on the relationship window.
  3. To create a relationship, drag the primary key of the parent table to the foreign key of the “child” table. For example to create a relationship between Students table and Books table, drag the Fig. App. 1.10: Defining relationships registration number of the students table to the registration number of the books table. Eventually, you will get a relationship such as the one shown in Figure App. 1.10.

 

  1. Enforce referential integrity: Referential integrity governs the nature of records in a “one-to-many relationship”. This means that all foreign keys in the child table must have a matching record in the parent table. Therefore you cannot add a record in the child table if it does not have a related record in the parent table.

Check the ‘Cascade Update Related Fields’ if you want your database to update the child tables once the parent record is updated. This means that if the student’s registration number is changed, all the records in the related tables will automatically be updated. FigureApp. 1.11 shows an edit relationship for the two tables i.e. students and books.

 

Once you have created your database tables and related them accordingly, you can then enter data into the tables using forms which you create. Since database forms design was covered in Form 2 the rest of this appendix illustrates only data entry into the system.

 

Figure App. 1.15 shows a sample report generated from the database showing a summary report indicating which student has which book. The report has been generated from a query that is created using the three related tables.

 

Automating your database application

Once you finish creating the basic database objects i.e. tables, forms, reports and queries, you may wish to automate operations such as data entry, printing reports and making the user interface more user friendly.

In Microsoft Access, some of the tools used to automate a database are:

  1. Switchboard: This is a special purpose form used to automatically access to other database objects such as forms and reports.
  2. Macros: This is a set of one or more actions used to automate commonly performed tasks such as opening and closing forms and printing reports.
  3. Visual Basic for application (VBA) module: The module object in Microsoft Access is a program coding widow for a subset of Visual Basic programming language called Visual Basic for Application (VBA). VBA is similar to Visual Basic only that you cannot create a new program (project) within.

Creating a switchboard To create a switchboard;

  1. From the Tools menu, point to Database utilities then click Switchboard manager.
  2. If no switchboards are available, Microsoft Access will prompt you whether you want to create one. Click Yes.
  3. From the switchboard manager dialog box click Edit.
  4. From the Edit switchboard dialog box, click Edit. The Edit switchboard Item dialog box appears in which you can specify the menu items to be included on the switchboard. Figure App. 1.16 shows an illustration of switchboard editing dialog box for the library system.
  5. In the “Edit switchboard item” text box, enter the name of the menu. From the command list box, select the object to be accessed e.g.

“Open form in Edit mode”. In the Form list box, select the name of the object e.g. StudentsForm user click OK.

  1. Finally click Close buttons to close the switchboard dialog boxes. Figure App. 1.17 below shows a switchboard for the library management system.

Creating macros

To create a macro in Microsoft Access:

  1. Click the Macros tab then New. The macros design grid appears.
  2.  In the macros design window, Action column, click the down arrow to select an action that you want to be executed directly every time you run the macro. For example, scroll downwards and click OpenForm.
  3. In the lower part of the macro design window specify the action arguments. For example, for the action OpenForm select the name of the form e.g. switchboard, view mode.

Creating Visual Basic for application (VBA) module

Since in chapter 5 we introduced you to Visual Basic programming, you can transfer the same skills to coding using Visual Basic for Application. You will realise that the only difference between the two is that Microsoft Access modules are only limited to particular objects and that you can not create a new project using this. For more on Visual Basic for Application coding, you can get help that comes with Microsoft Access. However, it is important to note that Visual Basic for application is also available as an independent programming language which you can use just like Visual Basic.

There are two approaches for creating VBA codes:

  1. Adding a code to form and report using event procedure. To add a code in this way, open the form or report in design view and then double click the form icon located at the meeting point of the vertical and the horizontal ruler.
  2. From the objects properties list, click the events tab then click the build button from the resulting dialog box, choose Code Builder.

The coding window for the object you chose is displayed as shown in Figure App. 1.18.

Enter the VBA code between the private sub object name event and the end sub.

Securing your database from unauthorised access

There are a number of security options that can be used to set security. However the simplest methods is the use of a password.

To setup a database password in Microsoft Access,

  1. Open the database file in exclusive mode as shown in Figure App. 1.19.
  2. From Tools menu, point to Security then click Set password.
  3. Enter the password in the password text box and re-enter the same password in verify box then click: OK

When a user opens the database, he/she will be prompted to enter the password as show in Figure App. 1.20.

 

Setting up the startup options

You can finally customise your application workplace by specifying the startup options. Start up options lets you customise your database in order to make it more presentable to the users. Such a database will always be starting as an application instead of loading it from Microsoft Access application window.

To set up the start up options for your application, from Tools menu, click<start up then specify the following

  1. Applications title: The title that will appear on the title bar instead of the default Microsoft Access title.
  2. Application icon: You can choose an icon that goes together with your application title.
  3. Menu bar: You can specify the menu options that should appear when running the application.
  4. Display form: Choose the form you want automatically displayed once you start the application e.g. the switchboard.
  5. Uncheck “Display Database Window” to limit the users from viewing the objects created in your database. .

Conclusion

Although this Appendix has tried to open you to a lot of utilities, tools and commands you can use to come up with a fully fledged application, it is important to note that Microsoft Access has a lot of potential which would take hundreds of pages to explain. However, you can use this Appendix to help you explore further on skills and concepts that can help you develop information systems through customisation approach.

 

 

APPENDIX II

Coding schemes

Binary Coded Decimal (BCD)

Decimal number 0 1 2 3 4 5
Binary equivalent 0000 0001 0010 0011 0100 0101
Decimal number 6 7 8 9    
Binary equivalent 0110 0111 1000 1001    

Standard Binary Coded Decimal

Letter Binary Letter Binary Letter Binary Letter Binary
A 11 000 1 H 111 000 0 10011 0 V 010101
B 11 00 10 I 111001 P 100111 W 010110
C 11 00 11 J 100001 Q 10 1000 X 010111
D 110100 K 100010 R 10100 I Y 011000
E 110101 L 100011 S 010010 Z 011 00 1
F 110110 M 100100 T 010011    
G 110111 N 100101 U 010100    

ASCII and EBCDIC

Character 7 -bit ASCII 8-bit EBCDIC
0 0110000 1111 0000
1 0110001 1111 000 1
2 0110010 11110010
3 0110011 11110011
4 0110100 11110100
5 0110101 11110101
6 0110110 11110110
7 0110111 11110111
8 0111000 11111000
9 0111001 11111001
Character 7 -bit ASCII 8-bit EBCDIC  
A 1000001 11000001  
B 1000010 11000010  
C 1000011 11000011  
D 1000100 11000100  
E 1000101 11000101  
F 1000110 11000110  
G 1000111 11000111  
H 1001000 11001000  
I 1001001 11001001  
J 1001110 11010001  
K 1001011 11010010  
L 1001100 11010011  
M 1001101 11010100  
N 1001110 11010101  
0 1001111 11010110  
P 1010000 11010111  
Q 1010001 11011000  
R 1010010 11011001  
S 1010011 11100010  
T 1010100 11100011  
U 1010101 11100100  
V 1010110 11100101  
W 1010111 11100110  
X 1011000 11100111  
Y 1011001 11101000  
Z 1011010 11101001  
Character 7 -bit ASCII 8-bit EBCDIC  
blank 0100000 01000000  
  0101110 01001011  
, 0101100 01101011  
+ 0101011 01001110  
0101010 01100000  
/ 0101111 01011100  
= 0111101 01100001  
( 0101000 01111110  
$ 0100100 01011011  
) 0101001 01011101  

NB: Alphabetic lower case characters have their symbolic representation too but not included in this scheme

List of all Private Universities in Kenya, Courses List and Fees

List of all Private Universities in Kenya, Courses List and Fees

Private Universities

  1. Africa International University
  2. African Leadership University
  3. Africa Nazarene University
  4. Amref International University
  5. Catholic University of Eastern Africa
  6. Daystar University
  7. Great Lakes University Of Kisumu
  8. Gretsa University
  9. Inoorero University
  10. International Leadership University
  11. Islamic University of Kenya
  12. Kabarak University
  13. KAG East University
  14. KCA University
  15. Kenya Highlands Evangelical University
  16. Kenya Methodist University
  17. Kiriri Women’s University of Science & Technology
  18. Lukenya University
  19. Marist International University College
  20. Mount Kenya University
  21. Pan Africa Christian University
  22. Pioneer International University
  23. Regina Pacis University College
  24. Riara University
  25. Scott Christian University
  26. St Paul’s University
  27. Tangaza University College
  28. The East Africa University
  29. The Management Univesity Of Africa
  30. The Presbyterian University Of East Africa
  31. United States International University
  32. University Of Eastern Africa, Baraton
  33. Uzima University College
  34. Umma University
  35. Zetech University

Co-operative University of Kenya Student Portal, E-learning Portal Login and Link

Co-operative University of Kenya Student Portal, E-learning Portal Login and Link

Student Portal

Our connections are underpinned by vibrant partnerships we maintain particularly the cross-border co-operative and research partnerships of our academics.

____________________________________________________________________
E – Learning Portal

True E-Learning is HERE where time and distance have been bridged to give you a digital experience like no other.

Get the mobile app

Login here

Your Prime Online News Magazine.

Exit mobile version