Ict Notes
Ict Notes
INTRODUCTION TO COMPUTERS
Definition of a Computer
It is an electronic device that transforms/processes data to information.
Data: Raw facts that have less meaning to the user.
Information: Processed data that has much meaning to the user.
Peripheral Devices
These are devices that are connected to the system unit using special cables called interface cables. They
include
a. Keyboard. Keying input device used to enter data and instructions to the computer.
b. Mouse. Pointing input device used to enter commands/instructions to the computer through clicking.
c. Monitor. Output device used to display information.
Classification of Computers
Computers can be classified according to:
1. Size and Memory
2. Purpose
3. Functionality
Development of Computers
Historical development of computers can be traced back to the time human beings were struggling to
invent non electronic tools that would simplify arithmetic such As Abacus and Napiers bones.
a. Abacus
Abacus was a Chinese counting instrument which dates back to 3000 BC. The Abacus has bead-like parts
that move along rods. Each bead above the middle bar stands for five units. Each bead below stands for
one unit.
b. Napiers bones.
Was developed by John Napier, a Scottish mathematician in the 17 th century. It help in multiplication and
division.
c. The analytical engine
This was designed by English mathematician, Charles Babbage in 1832. The engine is recognized as the
first real computer and Babbage as the father of computing.
d. Electronic computers
It took several years after Babbage designed the analytical engine to come up with an electronic
computer. The age of modern electronic computers can be traced back to 1951. The computers are
classified into five generations depending on the technology used to develop them. These are:
First Generation Computers (1940 - 1958)
Used thermionic valves or vacuum tubes
Advantages
• Vacuum tubes technology made it possible with advent of electronic digital computers It was
the fastest calculating device that time.
Disadvantages
• Too bulky
• Unreliable
• Had limited memory
• Generated a lot of heat
• Consumed a lot of power
Examples
IBM 650, UNIAC
Features of a Computer
▪ Automation: Computers work with minimum human intervention once supplied with data and
instructions.
▪ Accuracy: Computers are ever accurate but entirely depend on the data entered.
▪ Speed: Performs tasks in very short period.
▪ Storage: Computers can store large volumes of data and information.
▪ Versatile: Ability of doing different tasks as per instructions.
▪ Diligence: Work for a long period of time without getting bored
Disadvantages of Computers
• Computers are very expensive
• Cuts down on employment opportunities
• Needs expertise which is expensive to hire and maintain
• They create eye problems
• Loss of information if not well managed
Advantages of a Computer
• Stores large amount of information in a limited space
• Speed: performs tasks in very short periods.
Keyboard Layout
1. Alphanumeric Keys
Comprises of numbers and all alphabets, symbols like @,!,$,%,^,&,*,(,),?,>,< e.t.c. Other keys
include Caps lock, Enter key, Tab, Spacebar, Back space.
COMPUTER SYSTEM
Definition: Collection of entities that work together to process and manage data to information.
Hardware Configuration
CPU PERIPHERALS
b. Control Unit- Part that coordinates activities in the CPU as well as input, storage and output
operations.
1. Fetch phase-Access instruction in sequence
2. Decode phase-Interprets instructions
c. Main memory
It forms an integral element of the processor. It’s tasks are;
✓ Holds data awaiting processing
✓ Holds data being processed
✓ Holds data that has been processed awaiting to be output
Computer memory can be classified into:
a. Read Only Memory (ROM)
Its content can be read but cannot be changed during normal computer operations. It is
normally used for permanent storage of data and instructions that remains unchanged for a
long period of time.
Characteristics of random only memory are:
▪ One can only read its contents but cannot write in it.
▪ RAM is non-volatile storage because its contents does not disappears when the computer is switched off.
▪ Its content is programmer defined ie the programmer dictates what is to be contained in the ROM.
Types of ROMs
1. Mask Read Only Memory (MROM): contents cannot be changed once written on it
by manufacturers.
2. Programmable ROM (PROM): the user rather than the manufacturers can after store
data but once only.
3. Erasable Programmable ROM (EPROM): the content can be reprogrammed by
exposing it to ultraviolet light.
4. Electrically Erasable Programmable ROM (EEPROM): the content can be erased and
programmed using electricity. Characteristics of ROM
✓ The content cannot be changed unless written in a special type.
✓ Non-volatile: data cannot be lost when the computer is switched off.
Types of DRAM
1) Fast Page Mode (FPM)
2) Extended Data Out (EDO) : improvement on FPM
3) Extended Correcting Code (ECC): Special DRAM, corrects errors, and used on savers.
4) Synchronous Dynamic Random Access Memory (SDRAM): twice fast as EDO. Run at a
speed of system bus up to 100 – 133 MHz
5) Rhombus Dynamic RAM (RDRAM): has a data transfer rate of 800 MHz
6) Double-Data rate (DDR): fast DRAM with module speed at which SRAM can transfer data to
the processor.
Prepared and edited by Mugendi Patrick Ndaragwa TVC
ICT notes
7) Video RAM (VRAM): Special type of memory that is used only with video adapter.
8) Window RAM (WRAM): a faster version of video memory.
INPUT DEVICES
Devices that accept data from external environment and encode it into a form understandable
to the computer for processing.
SCANNING DEVICES
a. Optical scanners
1. Optical Mark Recognition (OMR): Detects marks made on a piece of paper using a
soft pen or pencil.
Advantages
• Low error rates
• Conspicuous (obvious/easy) errors are corrected
• Minimize manual work
Disadvantages
• Relatively slow
• Difficult verification of worked data
• Not widely used in business
Application
• Making of multiple choice exams
• Market research questionnaires
• Payroll entry
• Traffic surveys
2. Magnetic Strip Recognition (MSR): Read data coded onto a magnetic strip.
Advantages
• Simple to produce
• Not easily damaged
• Stores fairly large number of characters
Disadvantages
• Data can be changed or erased by magnetic fields
Applications
• On credit card
• On bank cards
• As tags on clothes
• As a phone card
KEYING DEVICES
These are devices that use keys whereby the user has to press/touch the keys during data entry. The
following are categories of keying devices.
1. Traditional Keyboard. It is the most common type of keying device. It is full sized rigid
keyboard.
2. Flexible keyboard: it is portable keyboard that can be folded and packed into s bag.
3. Ergonomic Keyboard: designed to provide comfort and allocate wrist strain.
4. Keypad: Miniature keyboard used in PDAs, laptops and mobile phones.
5. Braille keyboard: designed for the blind.
POINTING DEVICES
These are devices used for controlling a pointer/cursor on the screen.
Mouse
1. Standard mouse: has a ball underneath, two buttons and optional scroll button located
between left and right buttons.
2. Optical mouse. Uses digital camera to control cursor on the screen.
Trackball
It’s advantage over mouse is that it neither requires an extra space nor a flat surface for
movement. This is because its ball is located at the top which is rotated using a figure.
Joystick
An input device like a car gear that can be moved sideways, upwards or downwards to control the
position of the cursor. It is mainly used for playing computer games.
OUTPUT DEVICES
Devices that accept information from internal environment and then decodes it in a form
understandable to user.
Are peripheral devices that a computer uses to give out information produced after the processing
operations.
Classification of Output Devices
1. Soft copy: includes monitors/ VDU and the speakers
2. Hard copy: Printers and plotters
3. Microfiche: Computer Output on Microform (COM)
Printers
Are primarily used to produce information on a piece of paper. The quality of a hardcopy depends on
the printer’s printing mechanism. Printers are classified according to printing mechanisms.
How printers are classified
a) Speed
b) How the produce the print; character, line or page printers
c) How they provide prints on the stationery; impact or non-impact printers Types
a) Impact printers: Dot matrix, daisy wheel, golf ball and chain printers.
b) Non-impact printers: Thermal, inkjet, photo and laser printers
Impact Non-impact
Slow Fast
Use ink ribbon Thermal/electrostatic principle
Cheaper Costly due to technology involved
Noisy Quiet
Printers Consideration
1. Printers initial price. The cost of purchasing a printer.
2. Printing speed. Number of copies per minute
3. Running cost. Subsequent maintenance cost and cost of consumable items.
4. Print quality. Clarity of the printer’s printout.
5. Colour printing. Ability to print in colour.
Computer Bus
Communication medium within a computer that allow different elements of the computer to
communicate with one another.
1. Address bus: Pathway used to locate storage position in memory for the data to be
executed.
2. Data bus: Pathway where the actual data transfer takes place.
3. Control bus: Pathway for all timings and controlling functions sent by the control unit
to the parts of the system
Magnetic Tapes
These are sequential access devices. Implies that information is at the end of tape the
program will have to read almost entire tape which may take time to read. Data recorded as
series of magnetic dots across tracks on the tape cassette when characters are stored serially
down the length of the tape.
Sequential access medium: Data is stored across magnetic tape
Serial access medium: data is stored along the media
Advantages • Slow since they are sequential
• Light and easy to carry access media
• Effective for batch applications • Gaps between (called Inter
since they are cheaper Record Gap, IRG) waste
storage space.
Disadvantages
Magnetic Disks
Floppy Disks (Diskettes)
Information is recorded on number of concentric circles called tracks. Tracks are divided into
sectors. Sectors and tracks have same storage capacity because inner tracks have a high
density. Diskettes are direct access storage medium (DASM) and access time is made up of 3
parameters.
1. Seek time: Time taken by the read/write (R/W) head to locate right track that contains
content.
2. Rotational delay time: Time taken by drive mortar to spin the diskette past R/W head.
3. Data transfer time: Time taken by the R/W head to interpret content and send it as
computer input.
Advantages Disadvantages
1. Exchangeable and easy to carry 1. Slower than hard disk
2. Can be used with PCs with no hard disk 2. Less storage capacity
3. They are cheap 3. Damaged by light, magnet and
dirt
4. Used for back up
Zip Disks
Come with portable external drive and are slightly large and thicker in size and has a
capacity of up to 250MB
Jaz Disks
Come with portable external drive and have a capacity of 1GB to 2GB and have high access
speeds.
Examples
Super disk (SD) LS-120
They resemble 3 ¼ floppy disk but has a high capacity of 128 MB
Optical Tapes
They resemble magnetic tapes but they use optical technology
Optical Card
HARD DISK
Advantages
1. They offer cheap storage
2. They are well protected since they are housed in the system unit
3. Fast in terms of access retrieval and saving of data
PORTS
4. Small Computer System Interface (SCSI) - Use parallel method but faster than
parallel cables. The port connects up to 8 peripheral devices.
COMPUTER SOFTWARE
These programs installed in a computer or set of instructions that guide the computer on what to do.
Three ways of classifying computer software are:
A. Classification according to Purpose
1. System software
They perform a variety of fundamental operations that avails computer resources to the user.
They are:
Operating System
A set of complex programs that work together to control execution of user programs called applications.
Examples: MS Windows, UNIX, LINUX, Macintosh (Mac OS) and OS/2.
Importance of the operating systems:
➢ Platform for loading programs
➢ Acts as a link between applications and computer hardware
➢ Manages input and output and storage operations
Firmware (Store Logic)
A combination of both software and hardware recorded permanently on electronic chips mounted on the
motherboard. May hold operating system, utility programs, language processors etc.
Utility Software
A special program that performs commonly used services that make certain computing aspects go on
smoothly e.g. sorting, copying, disk management etc. There are two types:
1. System level: Help user to work with the operating system and its function. It tells whether the
command entered is wrong and give suggestion on how the error can be corrected.
2. Application level: Make use of an application program smoother and efficiently.
Functions of utility software
Reporting of errors which occur during program execution
➢ Control input and output devices
➢ Protest use hardware and data from misuse
➢ Provide program testing routines
Prepared and edited by Mugendi Patrick Ndaragwa TVC
ICT notes
➢ Provides communication between computer user and each program
➢ Memory management
➢ Maintenance of internal time clock and log of system usage by all users.
Network software
Establish communication between two or more computers by linking them using a communication
channel like cables to create a computer network e.g. Novell Netware
Translators
2. Application (packages) software
Programs that are designed to help user accomplish specific tasks.
Software Uses Examples
Word processors Typing long documents MS-Word, Word Pro
Spread sheet Calculating budgets MS-Excel, Quatropro
Desktop Publishing (DTP) Designing publications Adobe PageMaker, MSPublisher
Computer Aided Design (CAD)
Technical drawing AutoCAD
Database Keeping records and files MS-ACCESS, Dbase
Graphic Design Creating and manipulating graphics
Corel Draw, Adobe Photoshop
Internet Software
Used in communication and perusing the internet.
OPERATING SYSTEMS
Definition.
An Operating system is a set of programs that is used to manage the basic hardware resources of a
computer.
This is the main program that controls the execution of user applications, and enables the user to
access the hardware & software resources of the computer.
NB: When the computer is switched on, the OS programs run & check to ensure that all parts of the
computer are functioning properly.
In a data processing environment, the user sees a computer as a group of application programs that enable
him/her to accomplish specific tasks.
However, application programs do not use the hardware devices directly. They send messages through
the operating system which has the capability to give instructions to the hardware to perform a particular
task.
The user communicates his/her intentions to the OS through the use of a special instruction set known as
Commands.
User
(Runs Application programs)
Application software
(Send users requests to the OS)
Operating system
(Receives & controls execution of
Application programs)
Hardware
(Receives & executes OS commands)
As in this diagram, the OS is a layer of software on top of the bare hardware, and is used to manage all
parts of computer hardware & also act as an interface between the user & the computer.
The OS monitors & controls computer operations so that the user can do useful work on the computer,
and it also enables Application programs use the hardware in a proper, orderly and efficient way.
An OS consists of a special program called a Supervisor (Kernel/ Executive), which is stored in ROM
of the Main Memory. The Supervisor/Kernel contains the most necessary commands and procedures &
controls the running of all other programs, each performing a particular service.
NB. The programs that make up the Operating system are too large to fit in main memory at one time.
These programs are usually installed on a direct access backing storage device, such as the hard disk.
When the Supervisor needs a particular program, it is read from the disk & loaded into the RAM
memory, where it can be executed.
Reasons why an Operating system is needed in a computer (why operating systems were
developed).
i). Modern computer systems are so complex & fast such that they need internal control.
ii). To ensure that the full system software facilities are readily available.
iv). To increase the throughput, i.e., to increase the amount of data that can be processed through the
system in a given period of time.
vi). To make complex tasks very simple for the user to carry out.
vii). It helps the computer to correct any problem that might occur.
When an error occurs that can cause the computer to stop functioning, a diagnostic message is
displayed. The meaning of the message is then checked in the computer operations manual.
When one job is running, other programs can be read onto the job queue. The Input/Output devices
can also be made ready without delay.
ix). Most computers allow many programs to be run & also many users to use the system at the same
time.
A computer is composed of a set of software-controlled resources that enable movement, storage and
processing of data & information.
1. Processor.
2. Main memory (RAM).
3. Secondary storage devices.
4. Input/Output devices and their Ports.
5. Communication devices and their Ports.
6. Files.
The OS creates a working environment in which the user can run programs. The general functions of the
operating system are:
1. Processor management.
A Multi-tasking computer system can run several applications simultaneously. At times, several tasks
may require processing, hence creating competition. However, the CPU can only execute one
program at any one time.
Therefore, access to the CPU must be carefully controlled & monitored. The OS must decide, which
program will be allowed into the system, and for how long.
Programs must be loaded into memory before they can be executed, and moved out of memory
when they are no longer required. Therefore, before processing starts, the OS ensures that the
programs are transferred into the available memory location in the Main memory from the backing
store, e.g. a disk.
At any one given time, a number of tasks may require the memory so that they can be accessed &
processed by the computer. The computer memory is a scarce resource, and therefore, the OS
must determine which task will remain in memory awaiting for execution and which one will be
sent back to secondary storage to wait.
The OS keeps track of what parts of memory are in use and by which program, and what parts are
free.
The OS also handles the data files used by the programs that are being executed by the CPU.
In addition, the OS ensures that storage space is provided for data generated by programs & during
data transfer operations such as, disk copying or printing.
Every computer has many Input & Output (I/O) devices. The OS controls the input from &
output to the various devices. It also tries to monitor the state of each I/O device and signals any
faults detected.
During the course of their execution, programs will request the use of an Input or Output device.
In a multi-user system, conflicts are likely to occur when one program requests a device that is
being used by another program. Therefore, the OS will control allocation of I/O devices and
attempt to resolve any conflicts that arise.
Because most input/output devices are slower than the processor, the OS has to control the flow of
data from the time of input to the time the user receives it as information. It ensures that the right
data reaches the processor at the right time.
The OS also defines the various input/output ports found on the computer, e.g., printer port.
The OS manages the storage & retrieval of data on secondary storage devices. It also utilizes the free
space on hard disks to enhance the performance of the computer by temporarily holding tasks on it
that were in RAM ready for processing but have to wait for some time.
Communication refers to how the various devices and programs in & out of the computer system send
& receive messages from one another and from the processor.
The OS controls the communication process between the various tasks & the computer.
Prepared and edited by Mugendi Patrick Ndaragwa TVC
ICT notes
To achieve external communication, an external device is usually connected to a communication port
using cables or wireless communication media.
6. File management.
The OS is concerned with the logical organization of the information (the File System) and provides
a means through which files can be sorted, retrieved & shared.
It also provides a means of protecting data files & programs against unauthorized access and
corruption.
7. Job scheduling.
The OS arranges & loads programs in order to provide a continuous sequence of processing & also
provide the appropriate responses to events.
The processor can handle only one task at a time. Therefore, in a situation where more than one
application program is occupying the main storage, the OS has to determine which task will be
processed first and ensures that the one that is currently being processed is closely monitored to avoid
wasting time in the processor.
The jobs are allocated priorities so as to ensure that there is continuous processing until all the jobs
within the memory are executed. This ensures that the CPU does not remain idle at any given
instance.
NB: A Job is a group of tasks taken as a unit of work for a computer, e.g., one or more computer
programs, files, & instructions, to the operating system.
8. Job sequencing.
The OS keeps a list of jobs/tasks currently being run and monitors them as they move in & out of the
processor. It also arranges them in a particular order to make it easy for the processor to execute
them and to know how & when to fetch instructions & data for each task.
The OS controls the selection & operation of hardware devices used for input, output and storage.
The OS determines which task uses a particular resource and at what time. To do this, it gives each
resource a unique identification number called an Interrupt number so that, when two tasks request
to use a resource at the same time, the one with higher priority interrupt is granted control.
This prevents an undesirable situation called deadlock that occurs when a particular task holds a
needed resource & refuses to release it for use by other tasks.
When the user makes an error, the OS through the Kernel determines the cause of the error, and prints
diagnostic messages on the screen suggesting appropriate routines of how the error can be corrected.
In case of a fatal error that cannot be corrected, the program will be suspended permanently. E.g., the
user program will prematurely terminate when it encounters an illegal operation, such as, dividing a
no. by 0 or if it attempts to read a data file that had not been opened.
Each hardware device communicates to the processor using a special number called the Interrupt
Request number (IRQ). Therefore, when an interrupt occurs, control is passed to the Kernel, which
determines the cause of the interrupt. The processor stops executing the current program to wait for
the corrective response of the user. Control is returned to the program that was interrupted once
corrective action has been taken.
The Kernel saves vital information using the dying power supply so that it can be restarted
when power is returned.
When the ALU detects that an error has occurred, (e.g., the output may be requested to a non-
existent device) it generates a signal that causes an interrupt. Control is transferred to the
Kernel, which indicates the appropriate error correction routines.
The I/O control for each device & its associated hardware normally takes care of parity
checking. If a parity error is detected, the Kernel is notified by an interrupt.
Device driver - a software that the OS uses to control a specific piece of hardware.
The OS provides quick means of communication between the computer user & its programs.
The user requests the services of the OS by use of commands & the OS communicates the messages
regarding the processing to the user through, either the screen or printer. Thus, a form of
‘conversation’ is established between the OS & the computer user.
The OS keeps records (internal logs) on how the computer’s resources, e.g., CPU time, memory
usage, & the peripherals are being used. It also keeps a complete record of all that happens during
processing (usually in the form of a printed log).
Prepared and edited by Mugendi Patrick Ndaragwa TVC
ICT notes
14. The OS protects hardware, software & data from improper use. They ensure that application
programs use the hardware in an efficient way.
a). Reliable.
The OS should be at least as reliable as the hardware on which it runs. If a software or hardware
error occurs, the system should be able to detect the error and either try to correct the problem or try
to minimize the damage to the users of the system from the error.
b). Protected.
A user doesn’t want other users to interfere with him. Therefore, the system should protect users
from being affected both by errors of other users and by malicious attempts at tampering.
c). Efficient.
The OS is usually a complex program that uses a large part of the hardware resources for its own
functions. The resources consumed by the OS are not available for users.
Therefore, the system itself should be very efficient, & should manage user’s resources to minimize
their idle time.
d). Convenient.
Therefore, an OS should be flexible & convenient to use. In addition, in order to allow the sharing
of resources, the OS must be in complete control of the allocation of the computer resources.
e). Predictable.
User demands on the system are generally unpredictable. At the same time, users prefer to get
service that does not vary widely over extended periods of time. An estimate as to when the user
will get his input should be given.
Revision Questions
1. Name two major reasons why it became necessary to use an Operating system.
2. (a). Identify FOUR resources that the Operating system should manage.
(b). What function should the Operating system perform to manage each of the resources
above?
3. List and explain any five general functions of an operating system.
Prepared and edited by Mugendi Patrick Ndaragwa TVC
ICT notes
4. What is meant by the term Job in computer studies?
5. Name four examples of operating systems.
The OS determines determine the type of processing that a computer system is able to perform, since it
controls the allocation & use of the computer resources.
3. Human Computer interface (i.e., how the user & the computer interact).
• Command line. Lets the user type a command at a command prompt window.
• Menu driven interface. Provides the user with a list of options to choose from.
• Graphical user interface (GUI). Provides the user with commands inform of Graphical objects
called icons and most commands are executed using a pointing device.
Single-tasking OS.
Single-tasking OS allows only one user-program in the main memory to be processed at a particular time.
This means that, the user can only run one interactive program at a time. The user must then exit from
the program before loading & running another program.
− MS-DOS.
A Multi-tasking OS allows a single CPU to execute/process more than one program, all of which are in
memory, at the same time.
Each program is allocated a time-slice. In this case, the programs take turns at short intervals of
processing time. The CPU switches its attention between programs as it receives requests for processing,
executing statements from one program, and then from another.
The programs to be run are loaded into the memory and the CPU begins execution of the first one. When
the request is satisfied, the second program is brought into memory and execution starts on the second
program, and so on.
Single-user OS.
A single-user OS is designed to be used by only one person. It allows only one user/person to operate the
machine at a time in an interactive, conversational mode, and runs only one user program at a time, e.g.
MS-DOS.
A multi-user OS allows more than one user ( many people) to interactively use/access the computer at the
same time.
Examples;
− UNIX,
− Novell Netware,
− Ms-Windows 2000,
− Ms-Windows NT,
− Linux, etc
The term Human Computer Interface (HCI) refers to the method of interaction between the computer &
the user, and determines how easily the user can operate the computer.
The HCI enables communication to & from between the user and the computer.
User-friendliness.
HCI is expected to be “user-friendly”, i.e., it should be one that the end-user finds helpful, and easy to
learn & use.
i). It should be relatively easy for the user to try to start using the system.
ii). The system should be self-contained, so that the user is not forced into accessing manuals.
iii). The amount of effort & the information required for the user to get the system complete required
tasks should be minimal.
iv). The system should be robust & reliable, i.e., the user should be protected from unexpected system
actions, including system failures.
v). The system should be able to adjust to different levels of expertise between users & also as users
grow in competence.
vi). The user should be made to feel in control of what is going on.
vii). The system should behave in a logical & consistent manner, enabling the user to reason about what
is going on and apply what has been learned.
This is an interaction between the user & the computer that requires the use of commands
The user types a command at the prompt found on a command line. The computer then reads instructions
from the command line and executes them.
Example;
To copy a file called Fruits.Dat from Hard disk C to Floppy disk A using MS-DOS; type
C:\ >COPY Fruits.Dat A:\ (press the Enter key for the command to be executed).
Commands enable the user to quickly instruct the computer what to do.
Command-driven software is more flexible, but it is more difficult to learn. The user must know what
commands are available, what they do & how they should be typed. For this reason, commands are most
popular with experienced technical persons, such as computer Operators, Programmers or in situations
where the end-user continually works with the same program and has therefore mastered the commands.
1. The command words used should be descriptive VERBS that clearly convey the intended action, e.g.,
PRINT, COPY, RENAME, DELETE, etc.
2. Unique abbreviations should be provided for more experienced users, e.g., PRI, COP, REN, DEL,
CHKDSK, etc.
3. Multiple items on a single command line should ALWAYS be separated by blank spaces.
− MS-DOS,
− Early versions of PC-DOS, OS/2, and UNIX.
This type of interface provides the user with a list of program commands displayed on the screen to
choose from & a simple means of selecting between them.
To activate a choice in the menu, one can use the Enter key, or move the cursor until it is positioned at
the desired choice & then press the activation key so that the system can start acting upon the information
given.
This interface is suitable for beginners and infrequent users who may have difficulties in remembering
commands.
(a) Pull-down menus – are special types of menu used mostly in Windows.
(b) Pop-up menus & Pop-down menus. These menus are made to appear above or below an item on
the screen in order to elicit/obtain a choice from a user.
Later versions of DOS have a menu driven interface called the DOS Shell or DOS Editor.
This is an interaction between the user & computer that involves issuing of commands to the computer by
activating certain small graphic images displayed on the screen called Icons.
To issue a command, the icons can be selected using a pointing device like a Mouse.
GUI is mostly found on Workstations or PCs fitted with graphic adapters able to support high-resolution
graphics.
Prepared and edited by Mugendi Patrick Ndaragwa TVC
ICT notes
Revision Questions
The following factors should be considered when choosing an operating system for a computer;
1. Hardware configuration of the computer, e.g., RAM memory size, hard disk capacity, type of
processor, etc.
2. Basic design of the computer, - i.e., is it an IBM or IBM compatible, or an Apple computer?
3. Hardware compatibility.
4. User needs (requirements), i.e., the applications intended for the computer.
5. User friendliness or Human computer interface, i.e., is it Command line based, Menu-driven or a
Graphical user interface?
6. Availability in the market, e.g. Microsoft Windows based OS are very common.
7. Portability.
10. The method of communication with the computer, e.g. the number of peripherals.
11. The method of operating the computer.
Windows operating system was developed as a Graphical User Interface (GUI) for PCs running on
MS-DOS.
It provides a friendly interface that allows the users to enter commands by pointing and clicking at
objects that appear on the screen using a pointing device, e.g., a Mouse or a trackball. These graphical
capabilities make a program easier to use.
Microsoft Windows takes its name from the on-screen “Window” that it uses to display information.
A Window is a rectangular portion/ area of the screen that Windows sets aside for a specific task.
A Window is a rectangular area on a display screen in which text and graphical images may be
displayed.
− Microsoft Windows 95, 98, 2000,7,8,10, Professional, 2003, NT, Millennium (Me), XP, and Vista.
− Linux,
− UNIX,
− MacOS.
− OS/2.
2). It is user-friendly. Windows is menu driven, hence easy to operate, because the options used in
particular applications are usually displayed on the screen in form of Icons.
3). All Windows operating system support multiple users & have the ability to Multi-task, i.e., they allow
one to run more than one program at the same time, each in its own window.
4). It is easy to exchange information between Windows applications, i.e., it is easy to transfer or copy
information from one program to another.
5). All Windows applications share a common set of commands. For example, Open, Save, Print, etc &
therefore, you don’t need to learn a different set of commands for each application.
6). Ability to handle long file names, e.g., Windows 95 and later versions accept file names of up to 255
characters including spaces.
7). Most Windows operating systems have Plug and play (PnP) features. They automatically accept a
new hardware once it is connected to the computer.
i). It is easy to open programs, find documents, and switch between programs.
ii). Windows provide facilities such as the Windows Explorer, which enable one to browse through &
manage you files, folders, and drives easily.
iii). Windows can support long file names, making it easier to find and organize files.
iv). Windows has improved Video, CD & sound capabilities, and can fully support MS-DOS-based
games.
v). Windows makes it easier to install new hardware devices onto the system. It is able to recognize
and sets up a certain Plug-and-Play hardware whose card has been inserted in the computer
automatically.
vi). Windows allows true Multitasking, i.e. it allows the user to run more than one (several) program at
the same time, each in its own window.
vii). Windows is user-friendly, i.e., it is menu driven, hence easy to operate, because the options used in
particular programs are usually displayed on the screen in form icons.
viii). Windows supports a wide choice of networks & transmission protocols. It also has facilities for
sharing files & devices.
ix). Windows has facilities that allow people to work with all types of electronic communications, e.g.,
it allows people to send text messages, transfer files, and also hold digital live face-to-face
conversations with family friends & business associates around the world.
x). Windows includes My Briefcase, a file synchronization tool & a utility for transferring files over a
direct cable link or dial-up networking.
xi). All Windows applications share a common set of commands. E.g., Open, Save, Print, etc &
therefore, there is no need to learn a different set of commands for each application.
xii). Windows allows movement of text or items from one program to another. i.e., it is easy to
exchange information between Windows applications.
xiv). Windows includes a Help system that makes your computer easier to use. It helps you find answers
to your questions easily, or get up-to date technical support from the WWW.
Ms-Windows MS-DOS
1. There are icons 1. No Icons
2. Uses both the Mouse & Keyboard as Input 2. Only the Keyboard is used as Input device.
devices.
3. There is use of Menus. 3. It is command-based.
4. User-friendly. 4. Not user-friendly.
5. Windows fully supports networking. 5. DOS cannot support networking.
6. Requires a computer with high memory size. 6. Uses less memory compared to Windows.
7. Windows can support DOS, i.e. it is possible to 7. DOS cannot support Windows, i.e. it is not
run DOS-based programs in Windows. possible to run Window-based programs in MS-
DOS.
8. Uses Multi-coloured screen. 8. Uses monochrome (1 coloured) screen.
9. It is a Multi-user OS. 9. It is a single-user OS.
10. It is a multi-tasking OS, i.e. can support more 10. It is a single-tasking OS, i.e. can only support one
than 1 program at a time. program at a time.
11. Comes in different versions. 11. MS-DOS is an operating system by itself.
12. Uses folders for storage of files. 12. Uses Directories to organize files.
➢ A folder also knows as a directory in some operating system, is a named storage location where
related files can be stored.
➢ Formatting is the process of preparing a new disk for use by imprinting empty sector and tracks on the surface
of the disk so that the operating system can recognize and make it accessible.
➢ Disk scanning Checking and repairing minor drive problems such as lost storage location or damaged surfaces.
➢ Defragmentation Bring scattered files together.
➢ Backing up data. Creating copies of data and programs on separate storage devices.
➢ Partitioning a disk. Refers to the process of dividing a large physical disk into two separate drive and is
assigned a drive letter.
Review Questions
1. Give FOUR advantages of which Windows based Operating system software has over Disk Operating
System software.
2. (a). List Four types of Windows versions.
(b). Why is Windows termed as a friendly Operating system?
3. List four key features of the Windows Operating environment.
Protocols
A set of rules that governs how two computers can send and receive data on the network. Types of
protocols are:
• Transmission Control Protocol (TCP): Governs how data is transferred from one
computer to the next.
• Internet Protocol (IP): Determines the addressing system on the internet.
Internet Architecture
2. Unauthorized Access
Types
1. Eavesdropping: Tapping into communication channels to get information.
2. Surveillance: Refers to monitoring use of computer system and networks using background
programs such as spyware and cookies in order to gather information and use it for illegal purpose
3. Industrial Espionage: Spying to get information to use it to counter or finish another
computer/competitor.
Control Measures against Unauthorized Access
• Data encryption during transmission
• Reinforce check access points
• Enforce network security measures
• Keep the computer room closed when nobody is using it
• Fingerprint identification strategies
4. Physical Theft
Control measures
• Employ guards
• Burglar proofing
• Reinforce weak access points
• Install backup storages preferably out of the computer room
5. Computer Crimes
1. Trespass: Gaining access to information without permission.
2. Cracking: Guess work till one discovers weakness in security inorder to gain unauthorized access
for malicious reasons.
3. Hacking: Intentional breaking of codes and passwords to gain access just for fun.
4. Tapping: Sending an intelligent program to the host computer to get information.
5. Piracy: Making illegal copies of copyrighted software.
Concerns related to collection and use of private and confidential data are:
✓ Spreading information without the owners consent or awareness
✓ Spreading inaccurate information
✓ Eavesdropping and taping of information from a communication line
✓ Secretly recording and reporting user activities by using normal recording devices, spyware and
copiers
WORD PROCESSING
Definition
This is the creation of long document, reports, memos etc.
Main types of Word Processors
1. Dedicated: This word processor is the only program in the computer.
2. Non-dedicated: the word processor is among other programs installed in that computer.
Hyphenation: The way the word processor detects if the last word on a certain line will fit if
not it adds hyphenation after the first words then part of word in argument is pushed at the
beginning of the next line.
Justification: Position of line according to the centre of the page, left and the right margin.
There are for ways
• Full: All lines in a paragraph start at the same point and end at the same point.
• Left: All lines in a paragraph start at the same point but end at different point.
• Right: All lines in a paragraph start at different points but end at the same point.
• Centre: All lines in a paragraph are centered along the page.
Indentation: Way lines(s) start and end from the normal starting or ending point by the use of
Tab key indent tools from format command in the main menu. Ways of indenting;
• Indenting a paragraph from the left margin
• Indenting the first line of a paragraph from the left margin
• Hanging indent
• Indenting a paragraph from the right margin
• Indenting from both margins
Bolding: Increasing the intensity of text such that when printed it appears darker than normal text.
Blocking: Separating part of text by highlighting so that any issued command affects the
highlighted text.
Orphan: The last line in the last paragraph of a page that becomes the first line on the next page
after the first page is filled up.
Widow: First line in the last paragraph of a page that becomes the last line on that page while
the other part is moved to the next page after the first page is filled up.
Softcopy: Document that is in computer memory or the screen where changes are applicable.
Soft return: Situation where the cursor automatically moves to the next line before it reaches
the end of the current line.
Hard return: Situation where the user forces the cursor to move to the beginning of the next
new line by pressing the enter key on the keyboard before it reaches the end of the current line.
Soft page: Automatic page ending as per the settings that comes when one page is filled up.
Hard page: Forced page ending before the current page is filled up.
Continuous stationery: Situation where the printer uses rolls of papers therefore one does not
need to keep on inserting a paper after the other.
Preprinted stationery: One needs to insert a paper after the other is printed.
Toggle switch: How word processor behaves depending whether certain keys are on or off like
Insert and the Caps Lock keys.
Paper Orientation
Portrait
Landscape
Editing a Document
Deleting text
There are many ways to accomplish this operation
• Highlighting the text then right click the highlighted text and
choose delete or press delete key.
• Backspace Key: Deletes text on the left side of the cursor
position. Delete key: Deletes text on the right side
of the cursor position.
Find and replace: Fast way to search for a word in the document and if necessary replacing it
with another word.
Spelling and grammar: Press F7 or go to Spell checker to correct wrongly spelled words and
incorrect grammar
Thesaurus: Used to search for words with similar meaning (synonyms) or with opposite meaning
(antonyms).
Autocorrect and autotext: Autocorrect automatically corrects wrongly spelled word during
data entry while autotext completes words when the user types in the first letters of a word.
Undo and Redo: Undo (CTRL+Z) automatically cancels the last action done by the user while
Redo (CTRL+Y) automatically reverses the last command or action undone by the user.
Formatting Document
Text Formatting
Changing the font type, size and colour
Changing the case
• Uppercase: automatically changes the highlighted text into capital letters.
• Lowercase: automatically changes the highlighted text into small letters.
Prepared and edited by Mugendi Patrick Ndaragwa TVC
ICT notes
• Sentence case: automatically makes the fast letter of a sentence to a capital letter.
• Toggle case: automatically changes capitalized letters to small letters and vice versa.
Superscript and subscript
Press (CTRL+SHIFT++) for superscript option or (CTRL+=) for subscript option.
Paragraph Formatting
Alignment or Justification
• Full: All lines in a paragraph start at the same point and end at the same point.
• Left: All lines in a paragraph start at the same point but end at different point.
• Right: All lines in a paragraph start at different points but end at the same point.
• Centres: All lines in a paragraph are centered along the page. Line spacing
Tab setting and Indents
• Indenting a paragraph from the left margin
• Indenting the first line of a paragraph from the left margin
• Hanging indent
• Indenting a paragraph from the right margin
• Indenting from both margins
Drop cap: Formatting the first letter of a paragraph to appear bigger and occupy several lines.
Bullet and numbering
Column
Page and column breaks
Formatting the entire document
Page setup
Page numbering
Headers and footers
Footnotes and endnotes
.
SPREADSHEET
Definition
An essentially large sheet that lets you enter, edit and manipulate numerical data.
Types of Spreadsheet
Manual
Electronic
Examples of Spreadsheet
Lotus 123 VisiCalc
MS-Excel
VP Planner
Components of a Spreadsheet
1. Worksheet: where data is entered. It consists of cells, columns and rows.
2. Database: Does the actual management of data e.g. filtering records, using forms, calculating
subtotals, data validation, pivot tables, pivot charts and reports.
3. Graph and charts: Pictorial representation of the base data in a worksheet.
Types of charts
Line, bar, column, pie, scattered, histogram,
Legend: A key that explain what each colour or pattern of data representation in a chart means.
Worksheet Layout
✓ Cell: Intersection between a row and column.
✓ Rows: Horizontal arrangement of cells.
✓ Columns: Vertical arrangement of cells.
✓ Range: A group of rectangular cells that can be manipulated as a block.
Cell Referencing
Identifies a cell or range of cells on the worksheet and shows MS-Excel where to look for the
values or data needed to be used in a formula.
1. Relative cell referencing: The formula keeps on changing automatically depending on
the position on the worksheet.
2. Absolute: Cell reference that is always referring to a cell in a specified location of the
worksheet even if they are copied from one cell to another.
✓ A1 referencing style: A cell can be identified by its column label followed by the
row number.
✓ R1CI referencing style: A cell is referred by its row number followed by its column
number.
A1 style R1C1
B2 R2C2
C2 R10C3
E20 R20C5
Data Management
1. Sorting
2. Filtering data: Quick and efficient method of finding and working with a subset of data
in a list. 3. Auto filter: Uses simple criteria and include filter by selection
4. Advanced filter: Uses more complex criteria.
5. Subtotal
6. Total function
7. Forms: Special prepared templates that the user can use to make data entry fast.
Logical Functions
1. If: Returns a specified value if a condition is executed and found to be true and another
value if it is false.
2. Count if: Counts a number of cells within a specified range that meet the given
condition of criteria. Example A10:E10 contain eggs, in cell 6, 5 and 2 =COUNTIF
(A10:E10,”eggs”) will return 3.
3. Sum If: Adds values in the specified cells by giving a condition or criteria. Example
A10:E10 contain 10, 50, 60, 30, 70 sum all values greater than 50 =SUMIF
(A10:E10,”50”) returns 180.
Order of Execution
Operator Name Precedence
- Negative as in -1 1
% Percentage 2
^ Exponential 3
*and/ Multiplication and 4
Division
+and - Addition and Subtraction 5
=,<>,<,>,<=,=> Relation 6
DATABASES
Definition of Database
Collection of structured and related data items organized to produce a consistent and controlled
access to the items.
4. User:
a) Application programmer: Write programs that use databases.
b) End users: Interact with the database from a terminal.
c) Database administrator: Functions
• Overall in charge of the system
• Determine the information content of a database
• Define unauthorized checks and validation procedures
• Monitor performance and respond to changes in user requirement
• Define a strategy for backup strategy
Database Models
1. Flat files: They hold only one set of data and is not any different from the manual files.
Example is the library catalog.
2. Hierarchical models: Arranged in hierarchical (text) form i.e. To access level two data
one has to first access level one data items.
3. Networking models: Links or paths are used to express the relation between different data
items forming a network of items.
4. Relational model: Related data items are stored together in structures called relations or
tables. Relationships created between records of different tables.
5. Object Oriented Model: Database is a complete program built to hold a collection of
objects which have both properties and behavior.
Field Properties
1. Field size: Allows user to set the number of characters in a field.
2. Format: Determines how information appears on screen and when printed.
3. Decimal places: Used for number or currency fields, and to specify the number of decimal
places.
4. Input Mask: Automatically formats field entry into specified format.
5. Caption: A more descriptive name for a field to be used in a table.
6. Default value: A value that will automatically appear in datasheet if nothing is entered.
7. Validation rule: Logical expression that restricts the value to be entered in a field.
8. Validation text: Message that appears when the validation rule is violated.
9. Required: Determines if an entry must be made in a field before you proceed to the next
field.
10. Allow zero length: Allows the users to proceed without making any entry in fields set as zero
length.
11. Indexed: Facilitates the organization of records for easy search.
12. Primary key: Enforces uniqueness in a table so that one record isn’t entered twice.
13. Index: Used to speed up search and sort operations in a table.
14. Foreign Key: A key in a child table which is a primary key in a parent table.
Query Criteria
• Relational operations: >, <, <=, >=, <>, and =.
• Wildcards: *(asterisk) and #.
• Logical operators: AND, OR and NOT.
• LIKE and BETWEEN: relate or display values within a range.
DATA PROCESSING
Definition
This is the process of transforming data into a meaningful output i.e. information.
Data Processing Cycle
Data Collection
Processing
Data Integrity
The accuracy and completeness of data intended in a computer or received from the information
system. Data integrity is determined by;
1. Accuracy: whether the data is true or false.
2. Timeliness: This relays the availability of data in time or whether it is already outdated.
3. Relevance: Consider whether the expected output meets the processing cycle
requirements, the daily operations and the decision making.
4. Audibility (Verifiability): Ability of the user to check the accuracy and completeness of
information.
Minimizing threats to data integrity
▪ Using error detection and correction software when transmitting data.
▪ Using devices that capture data directly from source e.g. cameras
▪ Controlling the access to data by enforcing security measures.
▪ Back-up data preferably on external storage media.
▪ Design user interface that minimize chances of invalid data entry.
Disadvantages
• Entire file must be accessed even when the activity rate is very low.
• Random enquiries are impossible to handle.
• Data redundancy is typically high.
Computer Network: Collection of computers linked together using transmission media for the
purpose of communication and resource sharing.
Modes of Communication
1. Simplex- Communication in only one direction e.g. television and radio
broadcasting
2. Half duplex- Communication in both directions, one at a time e.g. Walkie
Talkie
3. Full duplex- Communication in both directions simultaneously.
Server: This is computer dedicated to serving requests for resources from other computers
(workstations) on network.
Advantages of LAN
1. Enables many users share expensive resources like printers and data.
2. Enables communication- sending messages and open chat sessions.
3. Capable of transmitting data very fast.
✓ Roaming of officers who by virtue of their work cover long distance away from
their work place.
✓ Time wastages in accessing organization information.
Remote communication is the process of transmission of data signals between
communications devices located at different geographical locations. Components
of remote communication are:
▪ Remote Client- Computer that tries to access resources from another
computer on network.
▪ Remote host- Computer being accessed on network
4. Cost effectiveness- Although the initial installation cost is high it cuts down most
expenses and adds value to service delivery. Advantages
(i) Daily communication- paperless communication environment.
(ii) Reduces transport cost for executive meetings.
(iii) Resource sharing e.g. printers, fax machine, optical drives, files and applications.
Limitations of Networking/disadvantages
1. Security issues- Data is prone to more illegal access threat in the
network
2. High initial cost for software and hardware.
3. Moral and cultural effect- chartrooms and pornography.
4. Spread of terrorism and drug trafficking.
5. Overreliance on network thus network failure may halt the system or bring down the
organization.
Elements of Networking
A. Data Communication Media
This is the pathway where the actual data transfer take place
1. Bounded (cabled) Media
Two line open cable
Insulator between the two wire help reduce interline interference. They capture environmental
frequencies e.g. radio waves hence causing noise in the transmission medium/pathway.
Prepared and edited by Mugendi Patrick Ndaragwa TVC
ICT notes
Insulator Wire
Advantages
• Used in the telephone systems
• Cheap installation equipments
• Cheap due to mass production of telephone
Disadvantages
• Suffer a high attenuation rate.
• Sensitive to EMI and eavesdropping
• Low data transmission but more than
• two line
Coaxial cables
Has a central copper core surrounded by a dielectric material (insulator) that is then
surrounded by a hollow mesh conductor covered by a shield. The braid (mesh conductor) is
made of copper/ aluminum and serves as the ground for the carrier wire. The braid protects
radio and electromagnetic interference. The thinner the conductor determines the attenuation
rate. Thinner have a high attenuation rate. Used in network blockade- A link that connects
two separate LAN’s
(ii) Thin coaxial cables (Thinnet)- has no dielectric insulator
(iii) Thick coaxial cables (Thicket)- has two dielectric insulators.
Copper core
Core insulator
Aluminum foil
Braided shielding
Outer layering
(b) Thicknet
Prepared and edited by Mugendi Patrick Ndaragwa TVC
ICT notes
Advantages
• Stable even under high loads
• Large bandwidth than twisted pair
• Carry voice, data and video signals simultaneously
• Resistant to radio and EMI than twisted pair cables.
Disadvantages
• Thicket is hard to work with
• Are relatively expensive to buy and install compared to twisted pare
Jacket
Light rays
Core
Cladding
Advantages
• Immune to EMI and eavesdropping.
• Fast and support high bandwidth.
• Large distance can be covered- low attenuation
• Used in hazardous places- Don’t generate electric signals.
• Smaller and lighter than copper- Ideal for space limited situation
Disadvantages
• Difficult installation since it must be carefully be handled
• Expensive connectivity devices and media are required
• Relatively complex to configure
Prepared and edited by Mugendi Patrick Ndaragwa TVC
ICT notes
• Difficult and expensive to repair
Have a high frequency of 3 GHz to 4 GHz. It suitable for point to point transmission (line of
sight): Signal is directed through a focused beam from transmitter to receiver.
Advantages
• It is less prone to transmission errors.
• It is capable of operating on both digital and analog data Operates at a high speed.
Disadvantages
• Signals affected by atmospheric conductors e.g. lightening
• Additional numbers of repeaters are added after every few kilometers.
Satellite Transmission
Satellite footprint: Area on earth where line of site can easily be located. Transmission of signals
to many recipients’ earth stations forms a point to multipoint transmission.
Very Small Aperture Terminal (VSAT): This technology refers to very small satellite dish
used in radio, data and TV communications. It enables direct access to satellite communication
instead of having to go through satellite owned or licensed satellite gateway.
Prepared and edited by Mugendi Patrick Ndaragwa TVC
ICT notes
Advantages
• Has a high band width.
• Earth station can be installed on a customer property than layering extensive cables.
• Cheap since cost is not dependent on the distance.
Disadvantages
• Expensive to install ground stations.
• Heavy rains or bad weather increases loss of signals. Any station can receive the signals.
Radio Communication
(i) High Frequency (HF) - Propagated by directing it to ionosphere on earth. Then
the ionosphere will reflect back to earth surface and the receiver will pick it up.
(ii) Very High Frequency (VHF) - Transmitted over the earths surface.
Stationeries are place strategically to maintain the line of sight from one
another.
(iii) Ultra-High Frequency (UHF)- It is the same as VHF but require smaller aerial
because they can be made to follow even narrow and direct path to the receiver
than VHF
(iv) Bluetooth- Enables people to use hand-held communication devices e.g. phones
PDA’s to access the internet. Network Bluetooth enabled devices is called a
wireless personal are network (WPAN) or piconet.
Infrared Transmission
Infrared transceivers must be within the line of sight in the same room because unlike radio
signals they cannot penetrate objects.
Network Software
Classifications of Network Software
a) Network operating system
b) Network protocols
Network Protocols
They are a set of rules and procedures that govern communication between two different two
devices or people.
Concept behind network protocols
In order to transmit data over the network it has to be broken into discrete systematic steps. Each
step has its own rule and procedures i.e. protocols that must be coordinated so that there are no
conflicts or incomplete operations. Achieved through protocol layering .Network protocols are
designed after the Open System Interprocess (OSI) model. The open system interconnection
model is not a protocol as such but is meant to help designers to come up with high quality
layered protocols.
Layer Function
7. Application layer User application run here and generate request for data
transmission or open received files.
6. Presentation layer Adds formatting, display and encryption on information
to data being presented.
5. Session layer Sets up data transmission session between two
communication devices.
4. Transport layer Manages data transfer over the network to ensure
reliability.
3. Network layer Address information is added to the data packet and
routed to destination.
2. Data link layer Adds error checking information and prepares data for
going into the physical connections.
1. Physical layer Data packets are finally transmitted via the network and
through transmission media in form of bits.
Network Topologies
This refers to the way in which computers and other devices have been arranged or how data is
passed from one computer to another in the network.
Classifications of Network Topologies
1. Logical topology
2. Physical topology
Star Topology
All the devices are connected to the central hub (concentrator).
Computer
Central Computer
Computer computer
Computer Computer
Disadvantages
• It requires more cables to install hence it is more expensive.
• Failure of the central hub puts the entire network at a standstill.
• Installing this type of network is time consuming.
Ring Topology
All the components in this topology are connected to a single transmission cable forming a ring styled
connection of computers
Computer
Computer Computer
Computer
Computer
Mesh Topology
Device in this topology are connected with repeating (redundant) cables between the
workstations. Each node is connected to one another.
Disadvantages
• Expensive: Costly to provide the redundant cables.
Tree/Hierarchical Topology
All the nodes are connected in form of a tree with nodes as leaves and links as branches. The
branches are connected to one another by the means of devices called hubs.
Advantages of Hierarchical topology
• If the node below the main node fails, the network does not fail.
Disadvantages
• If the top node fails the entire network fails because it controls the other
nodes. Expensive to install since it is complex.
Printer
Hub
Bus/backbone
Network Security
Classification of Network Security
(i.) Share level security
(ii.) User level security
Other networks
Intranets and Extranets.
1. Intranet
What is an Intranet?
An Intranet is an internal corporate network used in organizations to enable the sharing of documents
among coworkers. It supports users inside one organization (usually on a LAN).
Intranet - A private network within an organization. It can connect all types of computers within an
organization.
Intranet has a private Web Server, which can be made available to the entire organization, individual
department or to specific departmental workgroups.
An Intranet uses the infrastructure and standards of the Internet and can be connected to the Internet.
Note. Intranet applications are usually combined with the normal Web application of other organizations,
but are hidden from those outside the organization.
BENEFITS of intranets
• Workforce productivity: Intranets can help users to locate and view information faster and use applications
relevant to their roles and responsibilities. With the help of a web browser interface, users can access data held
in any database the organization wants to make available, anytime and — subject to security provisions — from
anywhere within the company workstations, increasing the employees ability to perform their jobs faster, more
accurately, and with confidence that they have the right information. It also helps to improve the services
provided to the users.
• Time: Intranets allow organizations to distribute information to employees on an as-needed basis; Employees
may link to relevant information at their convenience, rather than being distracted indiscriminately by email.
• Communication: Intranets can serve as powerful tools for communication within an organization, vertically
strategic initiatives that have a global reach throughout the organization. The type of information that can easily
be conveyed is the purpose of the initiative and what the initiative is aiming to achieve, who is driving the
initiative, results achieved to date, and who to speak to for more information. By providing this information on
the intranet, staff have the opportunity to keep up-to-date with the strategic focus of the organization. Some
examples of communication would be chat, email, and/or blogs. A great real-world example of where an
intranet helped a company communicate is when Nestle had a number of food processing plants in Scandinavia.
Their central support system had to deal with a number of queries every day.[7] When Nestle decided to invest
in an intranet, they quickly realized the savings. McGovern says the savings from the reduction in query calls
was substantially greater than the investment in the intranet.
• Web publishing allows cumbersome corporate knowledge to be maintained and easily accessed throughout the
company using hypermedia and Web technologies.[8] Examples include: employee manuals, benefits
documents, company policies, business standards, news feeds, and even training, can be accessed using
common Internet standards (Acrobat files, Flash files, CGI applications). Because each business unit can update
the online copy of a document, the most recent version is usually available to employees using the intranet.
• Business operations and management: Intranets are also being used as a platform for developing and
deploying applications to support business operations and decisions across the internetworked enterprise.[8]
• Cost-effective: Users can view information and data via web-browser rather than maintaining physical
documents such as procedure manuals, internal phone list and requisition forms. This can potentially save the
business money on printing, duplicating documents, and the environment as well as document maintenance
overhead.
• Enhance collaboration: Information is easily accessible by all authorised users, which enables teamwork.[8]
• Cross-platform capability: Standards-compliant web browsers are available for Windows, Mac, and UNIX.
• Built for one audience: Many companies dictate computer specifications which, in turn, may allow Intranet
developers to write applications that only have to work on one browser (no cross-browser compatibility issues).
Being able to specifically address your "viewer" is a great advantage. Since Intranets are user-specific
(requiring database/network authentication prior to access), you know exactly who you are interfacing with and
2. Extranet:
An Extranet works in much the same manner as an Intranet, but provides information to selected users
outside the organization.
E.g., a certain university can have an Internet library containing millions of articles, but only make it
available to staff and students at colleges and universities within the country. To access the library, you
must provide a password when you connect to the Internet site.
Home Page.
Home page is the Web page loaded when Internet Explorer is first started, i.e., when you access the Web.
E.g., the Internet address of the Windows home page is http://www.Microsoft.com /Windows
Home page can also the first page of a company or an individual’s Website on the Web.
Those who offer information through the Web must first establish a Home page – a www text and
graphical screen that welcomes the user and explains the organization that has established the page.
Home page – is the introductory page of a Web site. The home page contains links to other pages in the
site.
Notes.
You can set any Web page as your Home page.
Do not confuse your home page with the home page of the Websites you visit. Your home page is set
through Internet Explorer. The home page of a Website is the introductory page for the site.
If you click a hyperlink such as Home on a Web page, you will jump to the home page of the Website,
not yours. To access your home page, click the Home button on the Explorer toolbar.
ADVANTAGES of EXTRANET
➢ Exchange large volumes of data using Electronic Data Interchange (EDI)
➢ Share product catalogs exclusively with trade partners
➢ Collaborate with other companies on joint development efforts
➢ Jointly develop and use training programs with other companies
➢ Provide or access services provided by one company to a group of other companies, such as an online banking
application managed by one company on behalf of affiliated banks
DISADVANTAGES
➢ Extranets can be expensive to implement and maintain within an organization (e.g., hardware, software,
employee training costs), if hosted internally rather than by an application service provider.
➢ Security of extranets can be a concern when hosting valuable or proprietary information.
The End
Prepared and edited by Mugendi Patrick Ndaragwa TVC