Basic Computing B7-B9
Basic Computing B7-B9
FOR
JUNIOR HIGH SCHOOLS
BASIC 7 - 9
E. H. MANTEY
i
Achievers Computing for JHS Basic 7
© 2023 E. H. Mantey
All rights reserved. No part of this publication may be reproduced, stored in
any retrieval system or transmitted in any form or by any means, electronic,
mechanical, recording, or otherwise without prior permission of the author.
Contact us on:
Post Office Box 227
Asafo - Kumasi
Email: [email protected]
Mobile:
0547 252 297
0244 804 456
0203 864 789
WhatsApp Line: 0547 252 297
ii
Achievers Computing for JHS Basic 7
ACKNOWLEDGEMENT
The author is grateful to the Almighty God for the direction and the strength
and enablement for this task to be accomplished.
My sincere thanks go to Rev. J. K. Bempong for his advice and spiritual support.
Am also grateful to Mr. Awuni Samuel for his directions and encouragement
and Mr. Richard Mensah Gyapong for reading through the script and making
the necessary corrections.
Finally, I wish to thank my parents and the entire Mantey family.
DEDICATION
This book is dedicated to my late Grand Father T. S. Danquah and My children
Eden Danquah Mantey and Jason Jude Mantey.
iii
Achievers Computing for JHS Basic 7
CONTENT
BASIC 7
STRAND 1 : INTRODUCTION TO COMPUTING 1
SUB-STRAND 1 : Components of Computers And Computer Systems
SUB-STRAND 2 : Technology in the Community .............53
SUB-STRAND 3 : Health and Safety in Using ICT Tools . 61
iv
Achievers Computing for JHS Basic 7
BASIC 8
STRAND 1 : INTRODUCTION TO COMPUTING .197
SUB-STRAND 1 : Components of Computers And Computer Systems
SUB-STRAND 2 : Technology in the Community ............215
SUB-STRAND 3 : Health and Safety in Using ICT Tools .220
v
Achievers Computing for JHS Basic 7
BASIC 9
STR
SUB-STRAND 1 : Components of Computers And Computer Systems
SUB-STRAND 2 : Technology in the Community ..........344
SUB-STRAND 3 : Health and Safety in Using ICT Tools
.350
SUB-STRAND 1 : Introduction to Word Processing
SUB-STRAND 2 : Introduction to Presentation
SUB-STRAND 3 : Introduction to Desktop Publishing
SUB-STRAND 4 : Introduction to Electronic Spreadsheet .............372
.
SUB-STRAND 1 : Computer Networks .
SUB-STRAND 2 : Internet and Social Media ....395
SUB-STRAND 3 : Information Security .398
SUB-STRAND 4 : Web Technologies . .
....408
SUB-STRAND 1 : Introduction to Programming .... 408
SUB-STRAND 2 : Algorithm ...418
SUB-STRAND 3 : Robotics ..
SUB-STRAND 4 : Artificial Intelligence ...........................425
vi
Achievers Computing for JHS Basic 7
STRAND 1
INTRODUCTION TO COMPUTING
SUB-STRAND 1
COMPONENTS OF COMPUTERS AND COMPUTER SYSTEMS
CONTENT STANDARD 1
PARTS OF A COMPUTER AND TECHNOLOGY TOOLS AND THEIR USES
Indicators
At the end of this content, learners will be able to:
Discuss the fourth generation
Describe the types of input devices of a computer and their uses
Describe the types of output devices of a computer and their uses
Describe Storage devices
1
Achievers Computing for JHS Basic 7
2
Achievers Computing for JHS Basic 7
They were the computers made from 1964 to early 1970s. Third generation of
computers are also smaller and faster than the second generation of computers due
to the introduction of Integrated Circuits
made computers smaller, more reliable and more efficient. Integrated circuit consists
of a single chip (usually silicon) with many components such as transistors and
resistors fabricated on it. Integrated circuits replaced several individually wired
transistors.
3
Achievers Computing for JHS Basic 7
4. They were bigger in size compared to They were smaller in size due to the
third generation computer introduction of integrated circuits
5. They produce a lot of heat and therefor They produced less amount of heat and
require air condition always may not require air condition.
4
Achievers Computing for JHS Basic 7
Microchip
A microchip is also known as an integrated circuit (IC).
Microchips are used in all electronic devices - from small
flash drives to complex computers and even some
motorized vehicles.
After the transistor was invented, subsequent technology
allowed for a reduction in size and the creation of complex
circuits that can be placed on a small piece of
semiconductive material, usually silicon, known as a chip.
5
Achievers Computing for JHS Basic 7
Processor
The processor, also called the central processing unit (CPU), interprets and carries
out the basic instructions that operate a computer. The processor significantly affects
overall computing powe
personal computer, all functions of the processor usually are on a single chip. Some
computer and chip manufacturers use the term microprocessor to refer to a personal
computer processor chip.
Processors contain a control unit and an arithmetic logic unit (ALU). These two
components work together to perform processing operations.
Control Unit: The control unit is the component of the processor that directs and
coordinates the operations in the computer.
Arithmetic Logic Unit: The arithmetic logic unit (ALU) is the component of the
processor that performs arithmetic and logical operations. Arithmetic operations
include basic calculations such as addition, subtraction, multiplication, and division.
Processor Architecture
6
Achievers Computing for JHS Basic 7
Advantages of a processor
1. The microprocessor are general purpose electronics processing devices which
can be programmed to execute a number of tasks
2. High speed
3. Low power consumption
4. It is very reliable
5. Less heat generation
6. The microprocessor is very versatile
Disadvantages of a processor
components are connected to. It is a thin plate that holds the CPU, memory,
connectors for hard drive and optical drives. The motherboard connects directly or
indirectly to every part of the computer.
7
Achievers Computing for JHS Basic 7
Components USES
CPU slot The CPU slot or socket is a connector on the motherboard that
connects the CPU.
CPU Chip Central Processing Unit chip is a processor that performs all
the tasks that take place inside the computer system
RAM slot RAM slots are for attaching RAM. In desktop we can see two
slots of RAM but in server motherboard we can see 4 or more
slot of RAM. RAM comes in different size.
BIOS Basic Input-Output System is firmware that is used to perform
hardware initialization during the booting process. BIOS
provides basic input output functionality. BIOS control the
booting or startup process
BUS The bus connects the CPU to various internal components.
8
Achievers Computing for JHS Basic 7
PCI slot PCI stands for Peripheral Component Interface; PCI slot allows
you to insert expansion cards into your computer. PCI used to
connect additional PCI device like network cards, sound cards,
modems, video cards. Most computers today no longer come
with a PCI expansion slot.
Parallel port Parallel port is used to connect and transfer data through
multiple communication channels in parallel.
9
Achievers Computing for JHS Basic 7
INPUT DEVICES
Input device is any hardware component that allows you to send data and
instructions into a computer. Input devices take information obtained from outside
the computer system and send them into the computer. The widely used input
devices are the keyboard, mouse, microphone, scanner, digital camera, and webcam.
Mouse
Touch screen / monitor Barcode reader
Digital camera
Keyboard
Scanner
Signature pad
Touch pad
Fingerprint scanner
Microphone
Light pen
10
Achievers Computing for JHS Basic 7
MANUAL AND AUTOMATIC INPUT DEVICE
As discussed early, input device is hardware that allow data to be entered into a
computer. Input devices are usually grouped or categorized under manual or automatic.
11
Achievers Computing for JHS Basic 7
Differences between Manual and Automatic Input Device
Manual Input Device Automatic Input Device
Data is input into the computer by hand Data is input into the commuter by a
device or machine
They require human interaction. They require no or little human
interaction
MOUSE
The mouse is an input or pointing device used to select an item shown on the
computer screen. The mouse usually has two buttons and a small wheel.
TYPES OF MOUSE
Mechanical mouse
OPTICAL MOUSE
Optical mouse has no ball or roller
but uses light emitting diodes
(LED) sensors in place of ball to
detect movement.
Optical mouse
12
Achievers Computing for JHS Basic 7
WIRELESS OR CORDLESS MOUSE
The wireless or cordless mouse uses either Infrared or Bluetooth technology to
communicate with the computer. They can either be mechanical or optical but
requires power in a form of batteries before the can
be use.
Wireless mouse
Uses of mouse
1. To select an item on the monitor.
2. To direct the movement of the cursor
3. To open or launch application or program.
4. For playing computer game
KEYBOARD
A computer keyboard is an input device that allows users to enter data into the
computer. It contains keys that you press to enter data into the computer. Keyboard
allows the user to issue commands into the computer.
Keyboard layouts also include QWERTY, Dvorak, AZERTY, QWERTZ, and DaVinci
concept, each keyboard layout suits different environments. The most common used
keyboard layout is the QWERTY and the Dvorak keyboards.
TYPES OF KEYBOARDS
There are various types of keyboards. They include;
Wired keyboard means there is a wire or cord connecting your keyboard to your
computer. At the end of the wire is a USB connector that goes into a USB port on
your computer or PS/2 plug that goes into the PS/2 connector on your computer.
Wired keyboards are extremely reliable and hence the most widely used keyboard.
13
Achievers Computing for JHS Basic 7
Wireless Keyboard
A wireless keyboard is a computer keyboard that
allows the user to communicate with computers
with the help of radio frequency (RF), such as Wi-
Fi, Bluetooth and infrared (IR) technology. They do Wireless Keyboard
not require any cord or wired connection with the computer system.
DIGITAL CAMERA
A digital camera is an input device that captures photograph and stores the image in
a digital form or on a memory. Many digital cameras can also record videos with
sound.
Uses Digital Camera
1. To capture or take and store images digitally.
2. To record videos with sound.
14
Achievers Computing for JHS Basic 7
LIGHT PEN
It is a pen-liked instrument or device whose tip can be detected on the computer
monitor. It is used to draw or make selection by tapping. The stylus has the same
function as the mouse or touchpad. It is used on touchscreen devices such as
computers, mobile device, personal digital assistants (PDA), game consoles and
graphic tablet.
Uses of Light Pen
TOUCH SCREEN
A touch screen is a touch-sensitive display device. It is a display screen on which user
select options by touching the screen directly. Touchscreen enable the user to
interact directly with what is displayed on the screen rather than using mouse or
touchpad. Touch screen is an input device and at the same time an output device.
15
Achievers Computing for JHS Basic 7
SIGNATURE PAD
BARCODE READER
Barcode reader, also called a price scanner is a hand held or stationary input device
used to capture and read information contained in a bar code. It is a hardware input
device capable of reading a barcode and printing out the details of a product or log
information about that product into a database.
Uses of Barcode Reader
1. To capture information about a product into a database.
2. To read barcodes of products.
MICROPHONE
Microphone is a device that converts sound vibration in the air into electrical signals.
It used to send audio into the computer.
Uses of Microphone
SCANNER
A Scanner is an input device that converts documents (text and graphics) into an
electronic format that can be stored on a disk. A scanner converts printed material
(such as text and pictures) into a form the computer can use. The two most common
types of scanners are hand-held and flat-bed scanner.
Hand-held Scanner
Flat-bed scanner
16
Achievers Computing for JHS Basic 7
Uses of Scanner
1. To convert printed material into digital format.
2. To share hard copy photo with family and friends on the internet.
3. For copying of documents.
POINTING DEVICES
Pointing device is any device that is used to control the movement of the pointer or
cursor on the computer screen.
Examples include;
1. Mouse All pointing devices are input devices but not all input
2. Trackball Note devices are pointing device. For example, keyboard is
3. Pointing stick an input device but it is not a pointing device.
4. Joystick
5. Touchpad
KEYBOARD
Advantages of Keyboard
1. Enables fast entry of new text into a document.
2. Most people find them easy to use.
3. Easy to do verification check as data is entered, as it appears on the screen
simultaneously.
Disadvantages of Keyboard
1. Users with limited arm/wrist use can find keyboards hard to use.
2. Entering data is slow when compared to direct data entry (e.g., OMR).
3. They use up desk space as they are quite large.
MOUSE
Advantages of Mouse
1. Faster to select an option by a mouse than a keyboard.
2. Enables easy navigation through applications and the internet.
3.
Disadvantages of Mouse
17
Achievers Computing for JHS Basic 7
1. People with restricted hand/wrist movement can find it hard to operate a mouse.
2. They are hard to use if there is no flat surface available
3. They are easily damage.
JOYSTICK
Advantages of Joystick
1. Easier to navigate round a screen compared to a keyboard.
2. Control is in three dimensions.
Disadvantages of Joystick
1. More difficult to control the on-screen pointer with a joystick than with
mouse.
TOUCHPAD
Advantages of Touchpad
WEBCAM
Advantages of Webcam
1. Allow people to keep in contact with each other without the need to travel
2. It is very useful in video and conference calling
Disadvantages of Webcam
1. Webcams have limited features and often poor picture quality.
2. They need to be connected to a computer.
DIGITAL CAMERA
Advantages of Digital Camera
1. They produce better quality photographs than traditional cameras.
2. Very easy to upload photographs to a computer.
3.
18
Achievers Computing for JHS Basic 7
Disadvantages of Digital Camera
1. The camera user needs to be computer literate to use the camera properly.
2. Images often need to be compressed to reduce the amount of memory used.
3. The resolution is not yet as good as traditional cameras.
SCANNER
Advantages of Scanner
1. Images can be stored for editing at a later time
2. It is possible to recover damaged documents and photographs by scanning
them again.
3. Scanners are much faster and more accurate than typing the whole
documents again
Disadvantages of Scanner
1. The quality can be limited depending on how good the scanner resolution is.
MICROPHONE
Advantages of Microphone
1. Faster to input text than to type it using a keyboard
2. Possible to manipulate sound using special software
Disadvantages of Microphone
1. Voice typing is not accurate as typing in manually using keyboard.
2. Sound files use up a lot of memory space.
BARCODE READER
Advantages of Barcode Reader
1. Faster than manually keying information.
2. Barcodes enable automatic stock control.
Disadvantages of Barcode Reader
1. Barcode scanning is an expensive system to use. since every item in the shops
needs a barcode and every barcode needs to be entered on the system.
2. Barcode can be swapped around on items this can affect the price.
3. Also, there is a need to invest in the computer technology and staff training
19
Achievers Computing for JHS Basic 7
Output devices are device that displays information on the computer to user. Output
device is any piece of computer hardware equipment which converts information
from machine-readable into human-readable form. It can be text, graphics, audio,
and video. Common output device includes monitor, printer, projector, plotter,
speaker and headphone. Computer output that are tangible are called hardcopy, and
those that are not tangible are called softcopy.
EXAMPLES OF OUTPUT DEVICES
Printer Speaker
Monitor
MONITOR
Monitor also called Visual Display Unit (VDU) is an output device or screen that
displays information on the computer to the user. The monitor is like the Television
screen. It displays the content of data processed by the computer to users. They are
available in screen sizes of 14, 15, 17, 19, 21, inches and so on.
Information display on the screen of the monitor is called Softcopy, while printed
materials are called Hardcopy. The two main type of monitor are Cathode-ray tube
(CRT) and light emitting diode (LED) monitors.
20
Achievers Computing for JHS Basic 7
21
Achievers Computing for JHS Basic 7
Resolution is the number of horizontal and vertical pixels in a display device. For
example, a monitor that has a 1600 x 1200 resolution displays up to 1600 pixels per
horizontal row and 1200 pixels per vertical row. A higher resolution uses a greater
number of pixels and thus provides a smoother, sharper, and clearer image.
Pixel refers to the dots that make up the image.
Dot pitch sometimes called pixel pitch, is the distance in millimeters between pixels
on a display device.
Response time of an LCD monitor or screen is the time in milliseconds (ms) that it
takes to
5 to 16 ms.
Brightness of an LCD monitor or LCD screen is measured in nits. A nit is a unit of
visible light intensity. The higher the nits, the brighter the images.
Contrast ratio describes the difference in light intensity between the brightest white
and darkest black that can be displayed on an LCD monitor. Contrast ratios today
range from 400:1 to 800:1. Higher contrast ratios represent colors better.
LED Monitors
LED short for light-emitting diode monitor, an LED monitor or LED display is a flat
screen, flat-panel computer monitor or television. It has a very short depth and is
light in terms of weight. The actual difference between LED and a typical LCD monitor
is the backlighting.
Advantages of LED Monitors
1. They are slim in design
2. Lower power consumption
3. Longer lifespan
4. Better colour and picture quality
22
Achievers Computing for JHS Basic 7
Uses of Monitor
1. Monitor displays information on the computer to the user.
2. It serves as an interface between the user and the computer.
3. It produces soft copies of information.
4. Allows the user interact with the computer using keyboard and mouse.
PRINTER
A printer is an output device that take data stored on the computer or other device
and produce a hard copy of it. It is an output device used to produce text and graphic
on a physical medium such as paper.
Printers are the most popular computer peripherals and are commonly used to print
texts and images or photos. Printed information is termed as hardcopy.
PROJECTOR
Projector is an output device that can take images generated by a computer or Blu-
ray player and reproduce them by projecting onto a screen. Projector can produce
either still images (slides) or moving images (video).
SPEAKERS / HEADPHONE
Headphones are output device that either plug into a computer line out or speaker.
Speaker or headphone is an output device used to produce sound from the
computer. They allow you to listen to audio from the computer.
PLOTTER
Plotter is an output device used to print vector graphics. Plotter uses pen, pencil, or
maker instead of toner to draw multiple and continues lines or images onto a paper.
They are used to print large images usually computer-aided designs (CAD). Plotters
differ from printers in that, plotters use continues lines to create images while
printers use a collection of dots
CRT Monitors
Advantages of CRT Monitor
1. Less expensive than other display technology.
2. Fast response time.
3. They produce more colors
4. CRT also suitable for use even in dim or dark light.
23
Achievers Computing for JHS Basic 7
Disadvantages of CRT Monitor
1. Very bulky and take up large space on a desk
2. Not suitable for very brightly environment because less bright than LCD
3. They are large, heavy and bulky
4. Consume a lot of electricity and also produce a lot of heat
LCD Monitors
Advantages LCD Monitor
1. No radiation emission from the screen
2. Better under brighter conditions because of anti-glare technology
3. Lighter in weight with respect to screen size
4. Energy efficient because of lower power consumption
Disadvantages of LCD Monitors
1. Slightly more expensive than CRT
2. Suffer from a motion blur effect
3. Restricted viewing angles
4. Slow response times
Speaker
Advantages of Speakers
1. Usually long lasting and durable
2. Usually provided with the computer/laptop although these may not be the
best quality.
Disadvantages of Speakers
1. Can take up a lot of desk space compared to headphones
2. High volume may cause hearing impairment
3. High volume can distract people around you.
24
Achievers Computing for JHS Basic 7
Projector
Advantages of Projector
1. Projected screen causes no damage to the eye as compared to other screens
2. They provide a large screen viewing
3. They are cheap than a large TV
4. They are easy to use and install.
Disadvantages of Projector
1. It needs dark room to get better result.
2. Needs maintenance regularly.
3. Installation cost is more.
PERIPHERAL DEVICES
Peripheral devices are computer hardware that is added to the computer to expand
it operation or functionality.
Peripheral devices can be external or internal. For example, a printer is an external
device that you connect using a cable, while an optical disc drive is typically located
inside the computer case. Internal peripheral devices are also referred to as
integrated peripherals.
Types of Peripheral Devices
There are many different peripheral devices, but they fall into three general
categories:
1. Input peripheral devices
o Mouse 3. Storage peripheral devices
o Keyboard o Hard disk or External disk
o Scanner o Floppy disk
o Webcam o CD/DVD
o Touchpad o Pen drive
2. Output peripheral devices o Flash memory cards
o Monitor
o Printer
o Speaker
o Projector
25
Achievers Computing for JHS Basic 7
STORAGE DEVICE
Storage devices are devices that are used to holds data and information for future
use. They are used to store data temporarily or permanently. Examples of storage
devices are hard disks, floppy disks, CDs and DVDs, flash memory cards, USB flash
drives
A storage medium (media is the plural), also called secondary storage, is the physical
material on which a computer keeps data, and information.
A storage device is the computer hardware that records and retrieves data to and
from storage media.
Writing is the process of transferring data, or information from memory to storage
medium.
Reading is the process of transferring data, or information from storage medium into
memory
Capacity is the number of bytes (characters) a storage medium can hold.
CD/DVD
Pen drive Memory card
Storage devices
26
Achievers Computing for JHS Basic 7
DATA REPRESENTATION ON THE COMPUTER
The computer uses binary digit to represents data and information. The binary
system is a number system that has just two unique digits, 0 and 1, called bits.
A bit is the short form for binary digit. A Bit is the smallest unit of data the computer
can process.
A group of 8 bits as a unit forms a byte.
A byte provides enough different combinations of 0s and 1s to represent 256
individual characters. A kilobyte (KB or K) is equal to exactly 1,024 bytes. To simplify
memory and storage definitions, computer users often round a kilobyte down to
1,000 bytes. For example, if a memory chip can store 100 KB, it can hold
approximately 100,000 bytes (characters). A megabyte (MB) is equal to
approximately 1 million bytes. A gigabyte (GB) equals approximately 1 billion bytes.
A terabyte (TB) is equal to approximately 1 trillion bytes
The capacity of a storage medium measured by the number of bytes it can hold.
27
Achievers Computing for JHS Basic 7
RAM
RAM (random access memory), also called main memory, consists of
memory chips that can be read from and written to by the processor.
It is the temporary working memory of the computer.
Most RAM is volatile, which means it loses its contents when the
power is removed from the computer. For this reason, you must save
any items you may need in the future. Saving is the process of copying
items from RAM to a permanent storage device such as hard disk.
ROM
Read Only Memory refers to memory chips for storing
permanent data and instructions. The data on most ROM chips
cannot be modified (hence, the name read-only). ROM is
nonvolatile, which means its contents are not lost when power
is removed from the computer. The ROM contains both Power-
On-Self-Test (POST) and Basic Input Output System (BIOS) instructions.
Differences between Random Access Memory and Read Only Memory
Random Access Memory (RAM) Read Only Memory (ROM)
1. It is volatile 1. It is nonvolatile
2. Easily accessible by the user 2. Not easily accessible by users
3. Can be upgraded 3. Not usually upgraded
4. Storage contents are temporal 4. Storage content are permanent
28
Achievers Computing for JHS Basic 7
medium. Magnetic storage is a form of non-volatile storage. This means that the data
is not lost when the storage device is not powered on.
Magnetic storage is widely used because it is relatively cheap in comparison with
other storage technologies. The storage capacity is also very large, making it
attractive for storing very large amounts of data.
Example magnetic storage device include, magnetic tape, floppy disk and hard disk.
A disk is the material that data is written on and a drive is the device for
Note reading data on a disk. For example, hard disk contains the data while
hard drive reads the data on the hard disk.
MAGNETIC TAPE
Magnetic tape is a thin plastic with magnetic coating on one side on which data or
information is stored. Magnetic tape is a medium for magnetic recording, made of a thin,
magnetized coating on a long, narrow strip of plastic film.
Magnetic tape is one of the older types of magnetic storage media. The magnetic
tape recorder was invented in 1928 and was primarily used for analog audio
recordings. Before music CDs were introduced in the 1980s, portable music devices
used magnetic tape in the form of music cassettes. Early computers adapted this
technology to store digital information.
One of the major weaknesses is that information on a tape can only be accessed in a
sequential or serial fashion. This is fine if you want to listen to a whole music album
in sequence, but computer systems typically need to access data in a non-sequential
manner. For magnetic tape, this means you may need to fast forward through a lot
of tape to get to a specific piece of data. While magnetic tape is a very cheap way to
store data, the very slow access to the data meant that it was primarily used for
creating backups of data.
29
Achievers Computing for JHS Basic 7
Properties of Magnetic Tape
Property Explanation
Space or capacity Large storage capacity (terabyte or more)
Speed The slowest of all of the storage media
Data access Serial or sequential access
Cost Cheap compared to other storage devices.
30
Achievers Computing for JHS Basic 7
Characteristics or Properties of Floppy disk
Property Explanation
Space or capacity The less storage capacity (up to 1.44MB)
Speed The slower compared to hard disk
Data access Direct access (not serial access like tape)
Cost Very cheap.
31
Achievers Computing for JHS Basic 7
Functions of the Parts
Platter: The platters are the circular discs inside the hard drive where data is stored.
Spindle: For spinning or rotating the platters. It keeps the platters in position and
rotates them.
Read/Write(R/W) head: For reading and writing of data from the platter.
Actuator arm: Controls the movement of the read/write heads.
Actuator: For controlling the actions of the Actuator arm.
32
Achievers Computing for JHS Basic 7
EXTERNAL HARD DISK
External hard drive is a storage device located outside the computer
that is connected through a USB cable or wireless connection. They
are mostly used for backups. They also called removable hard drive.
External hard disk is enclosed in an airtight, sealed case.
CACHE DISK
Disk cache is a cache memory that is used to speed up the process of storing and
accessing data from the host hard disk. It acts as a temporary storage area that the
comput can retrieve data from easily and faster even more than RAM.
Cache memory is a small-sized type of volatile computer memory that provides high-
speed data access to a processor and stores frequently used computer programs, and
data. It is the fastest memory in a computer, and is typically integrated onto the
motherboard and directly embedded in the processor or main RAM.
OPTICAL DISC
An optical disc or media is a type of storage media that consists of a flat, round,
portable disc made of metal, plastic, and lacquer that is written and read by a laser.
(The spelling, disk, is used for magnetic and flash memory media, and disc is used for
optical media.) Optical discs used in personal computers are 4.75 inches in diameter.
Smaller computers, game consoles, and mobile devices, however, often use mini
discs that have a diameter of 3 inches or less.
33
Achievers Computing for JHS Basic 7
Some optical disc formats are read only, meaning users cannot write or save on the
media. Others are read/write, which allows users to save on the disc just as they save
on a hard disk. The three main types of optical discs are compact disc (CD), digital
versatile disc (DVD) and Blu-ray disc (BD).
34
Achievers Computing for JHS Basic 7
A DVD-ROM (digital versatile disc-read-only memory or digital video disc-read-only
memory) is a high-capacity optical disc on which users can read but not write or
erase. Manufacturers write the contents of DVD-ROMs and distribute them to
consumers. DVD-ROMs store movies, music, music videos, huge databases, and
complex software.
Recordable disc formats include CD-R, DVD-R, DVD+R and BD-R discs.
Rewritable Optical Discs
35
Achievers Computing for JHS Basic 7
Rewritable disc is an erasable multisession disc you can write on multiple times. CD-
RW overcomes the major disadvantage of CD-R because it allows users to write and
rewrite data, instructions, and information on the CD-RW disc multiple times -
instead of just once. Rewritable disc can be written on multiple times and also
erased. Rewritable disc formats include CD-RW, DVD-RW, DVD+RW and BD-RE discs.
Summary of disc formats
Optical Disc Read Write Erase
Read Only Memory Optical Disc Yes No No
CD-ROM, DVD-ROM, and BD-ROM
Recordable Optical Disc Yes Yes No
CD-R, DVD-R, DVD+R and BD-R
Rewritable Optical Disc Yes Yes Yes
CD-RW, DVD-RW, DVD+RW and BD-RE
36
Achievers Computing for JHS Basic 7
ASSESSMENT TASK
MULTIPLE CHOICE
5. Which processor was used by third
1. The generation of computers that uses generation computers?
the vacuum tube as its pr A. Transistors
A. First generation B. Vacuum tube
B. Second generation C. Integrated Circuit
C. Third generation
6. Which of the following devices
2. Computers made from 1964 to early displays information on the computer
1970s can be found under which to the user in a softcopy?
generation? A. Mouse
A. First generation B. Monitor
B. Second generation C. Printer
C. Third generation
7. The number of horizontal and vertical
3. The type of mouse that uses a hard pixels in a display device is called
rubber ball to cont A. Resolution
A. Mechanical Mouse B. Pixel
B. Wireless Mouse C. Dot pitch
C. Optical Mouse
8. The smallest unit of data the computer
4. Mouse that requires power in a form of can process is called.
batteries is called? A. Bit
A. Mechanical Mouse B. Byte
B. Optical Mouse C. Kilobyte
C. Wireless or cordless Mouse
37
Achievers Computing for JHS Basic 7
9. The fastest memory in the computer 7. Identify two (2) input devices that
convert hard copy pictures or images
A. Read Only Memory into a digital format.
B. Random Access Memory 8. Explain the following terms
C. Cache Memory i. Read only optical disc
10. The largest storage device of the ii. Recordable optical disc
iii. Rewritable optical disc
A. Hard disk
B. Floppy disk 9. State four (4) characteristics of fourth
C. Pen drive generation-computers.
11. Which of the following has the lowest 10. State two (2) differences between
storage capacity? manual input device and automatic
A. Hard disk input device.
B. Floppy disk
C. Pen drive 11. Identify any four (4) ways of
12. Large icons that populate the right- protecting your optical disc from
hand side of windows 10 start menu is damage.
known as
A. Icons 12. State two uses each of the following
B. Tiles devices
C. Thumbnail a. Mouse
b. Keyboard
STRUCTURED QUESTIONS c. Monitor
5. State three difference between second 15. List the parts of the computer hard
and third generations of computers disk and state their functions.
16. Mention three difference between
6. Explain the following terms; hard disk and pen drive
a. Input device
b. Output device 17. Give four uses of storage devices
c. Storage device 20. Write three differences between
RAM and ROM
38
Achievers Computing for JHS Basic 7
CONTENT STANDARD 2
DEMONSTRATE THE USE OF THE FEATURES OF THE WINDOWS DESKTOP
Indicators
At the end of this content, learners will be able to:
Discover the new Windows Operating System (Start screen, Use of tiles, Taskbar
buttons, Preview thumbnails)
Practice file management techniques (file and folder management)
The desktop is a graphical user interface that appears after booting the computer. It
can also be seen as a graphical user interface that provides quick access to programs
and information.
The desktop is the screen where all icons are arranged on the computer. Like the top
of an actual desk, it serves as the surface for your work. All your icons, files, open
programs and folders appears on the desktop.
39
Achievers Computing for JHS Basic 7
TASKBAR
The taskbar is a bar located at the bottom of the desktop. It contains the start button,
icons of running application, pinned programs, Cortana and notification area.
ICONS
Icons are small pictures that represent files, folders, programs and other items on the
computer. Icons provide quick access to specific programs. To open a program on the
desktop, just double-click on the icon that represent the program that you want to open.
40
Achievers Computing for JHS Basic 7
Note that by default only the recycle bin will appear on the desktop. You can add the
other icons anytime you want.
This PC (My Computer)
This PC opens window, which displays all local and network drives on your computer.
It also displays all peripheral devices currently connected to the computer. This PC is
also referred to as My Computer on older windows.
Recycle Bin
The recycle bin contains deleted files and folders from the computer hard disk. All
deleted items on the computer are stored temporarily in the recycle bin. Items in the
recycle bin may be restore to its original location or remove completely from the
computer.
Control Panel
The control panel displays all the available settings that you can change on your
computer system.
This icon is where all your files and folders are stored. Folders such as Desktop,
Downloads, Documents, Pictures, Music, Video, links etc. are kept here.
IMPORTANCE OF ICONS
1. For easy identification of item on your computer
2. To access installed programs quickly
3. It serves as a shortcut to access programs or data.
41
Achievers Computing for JHS Basic 7
TASKBAR
The taskbar is a long horizontal bar located at the bottom of the desktop. It contains the
start button, icons of running applications, pinned applications, Cortana and notification
area. The major function of the taskbar in allowing users to locate and launch programs
through Start and the Start menu, or view any program that is currently open.
The taskbar has been divided into three main sections. These are;
1. Start button
2. Pinned applications
3. Notification area / system tray
Notification area
This area displays small icons that notify you about things that happening on your
computer. It also displays the time and date, volume, and network connections of
the computer system.
Pinned Program
Frequently used applications can be pinned to the taskbar for easy access. Users can
also pin the favorite programs on the taskbar for quick access. When you open any
activity, a small window of that activity appears on the taskbar. This is called the tab.
Cortana: The Cortana is a new intelligent personal assistant. It is an upgrade of the
old windows help system. To get started with the Cortana, type a question in the
search box on the taskbar or simply select the microphone icon and talk to Cortana.
42
Achievers Computing for JHS Basic 7
START BUTTON
The start button is located at the lower left corner of the taskbar. The start button
provides access to all commands and programs on the computer. It can be used to
open or start a program, find and open files, and shut down the computer.
Functions of Start Button
1. To launch applications or programs
2. Fast access to frequently used programs
3. To shut down the computer.
43
Achievers Computing for JHS Basic 7
Tiles
Tiles are shortcuts for Windows 10 Apps available in the Microsoft Store. Tiles are
the large icons that populate the right-hand side of the start menu. It contains icons
such as Calendar, Mail, weather, Calculator, Photos, Microsoft Edge browser,
Microsoft store and more.
Functions of windows tiles
Thumbnail shows a preview of a folder or pictures and videos for users to easily find
what they are looking for. It is a small image that is used to identify a file or folder by
its contents. It gives a brief description of a file or folder by showing a small image of
the file or items contain in that folder.
44
Achievers Computing for JHS Basic 7
FILES
A File is a collection of related information save on a disk. The information can be of
different types such as text, data or images. Similar to the way you keep files or
documents in file folders for easy reference. An icon of a file normally shows the type
of program used to create that file. Files are open or launch by double clicking on its
icon.
FOLDER
A folder is an electronic container for storing documents, files and other folders. A
folder may contain other folders known as Sub folder. Most folder icons appear as
yellow colour. Folders that contain information about the operating system is called
system folder. This type of folders is created by the operating system and not the
user. Folders that contain information about all installed programs are called
program folders.
A folder within another folder is called a sub-folder.
The main folder is called the parent folder.
USES OF FOLDERS
1. It helps users to locate important file quickly
2. For keeping related files together
3. For organizing files on the computer.
45
Achievers Computing for JHS Basic 7
RENAMING A FOLDER ON THE DESKTOP
Renaming is the process of changing the name of a folder or giving folder a new
name. Folders are renamed for easily identification. A file or folder maybe renamed
when the name of that file or folder exist already or when the content of the folder
has changed. There are some characters or symbols that cannot be used for renaming
a folder. Examples include: *, :, , /, \, |, >, <, ?.
Steps involved in renaming a folder
1. Right-click on the folder
2. Select Rename from the popup menu
3. Type the new name in the textbox provided
4. Press Enter on the keyboard
2
3
46
Achievers Computing for JHS Basic 7
File-naming conventions when saving files
1. Case sensitivity upper and lower case are different
2. Maximum length is 260 characters (for Windows)
3. Spaces allowed
4. Digits allowed
5. \
6. File names not allowed (con, nul, prn). You cannot use any of them as file
name; windows will not allow you to use them.
FILE EXTENSION
File extension or file name extension is suffix at the end of a filename that indicates
what type of file it is. A file extension is a three or four-letter abbreviation found at
the end of a file name after a period or full stop. In Microsoft Windows, the file name
extension is a period that is often followed three or four characters but may also be
one or two long.
47
Achievers Computing for JHS Basic 7
USER ACCOUNT
A user account allows you to sign in to Windows 10 computer. By default, your
computer already has one user account, which you created during setting up
Windows for the first time. But if you plan to share your computer with others, you
can create a separate user account for each member of your home or office.
Windows requires at least one user account. You specify that account when you are
completing the installation processes, or the first time the computer starts after
Windows has been installed. Windows assigns this first account as an administrator
account so that the account can be used to manage the computer. It is not possible
to sign on to the computer without a user account.
48
Achievers Computing for JHS Basic 7
Administrator account is necessary to do things such as:
Create, change, and delete accounts.
The User Account Control message box varies depending on your account and the action
administrator accounts on the computer. To continue the operation, you click one of the
administrator accounts, enter its password if any in the box that appears, and then click
Yes.
operation by simply clicking that account and then clicking Yes. This is one of the reasons
rator account on the computer has a password.
49
Achievers Computing for JHS Basic 7
Creating a local user account on windows 10
1. Click on the Start button
2. Select Settings
3. Select Accounts
4. Then select Family & other users. (In some versions of Windows, you will
see Other Users.)
5. Select Add someone else to this PC.
6. Select I don't have this person's sign-in information, and on the next page,
select Add a user without a Microsoft account
7. Enter a user name, password, or password hint or choose security questions
and then select Next to complete your account.
50
Achievers Computing for JHS Basic 7
some permissions.
Before you can edit any permissions, you must to have ownership of the file or folder be
an administrator. If the owner is another user account or a system account like Local
Here are the steps to modify the permissions of folders and files:
51
Achievers Computing for JHS Basic 7
ASSESSMENT TASK A. .docx
B. .wod
MULTIPLE CHOICE C. .txt
1. The screen that appears after turning 9. Which of the following is not an
extension for image file?
A. Wallpaper A. .Jpg
B. Monitor screen B. .Png
C. Desktop C. .img
2. All the following are features of
computer desktop except STRUCTURED QUESTIONS
A. Taskbar 1. What is desktop? Out the main features
B. Title bar of a desktop.
C. Icons 2. Discuss the functions of the taskbar,
D. Wallpaper thumbnails, start screen, and tiles.
3. The long horizontal bar located at the
bottom of the desktop is called 3.a. What is file naming convention?
A. Taskbar b. Outline three importance of file
B. Title bar naming convention.
C. Start bar
4. Small picture that represents installed 4. a. What is file extension?
program is termed as b. state three importance of file
A. File extension
B. Folders
C. Icons 5. List the steps involved in creating folder
5. Deleted items on the computer can on the desktop.
52
Achievers Computing for JHS Basic 7
SUB-STRAND 2
TECHNOLOGY IN THE COMMUNITY
CONTENT STANDARD
DEMONSTRATE THE USE OF TECHNOLOGY IN THE COMMUNITY
Indicators
At the end of this content, learners will be able to:
Describe and give examples of at least five technology tools for learning.
Demonstrate the use of at least three technology tools identified.
Discuss the benefits of using technology tools in learning.
Examine the negative impact of computers and computer use on the environment
Propose environmentally responsible practices that can be used to reduce the negative
impact of computers and computer use on the environment
53
Achievers Computing for JHS Basic 7
Encarta
Microsoft Encarta was a digital multimedia encyclopedia publish by Microsoft
Corporation from 1993 to 2009. Encarta was a multimedia product, with text,
pictures, sound, short videos and more used for leaning various subjects. It discusses
knowledge about science, history, arts, animal life, environment, and more. It helps
student to access information on various subjects or topic with a single click.
Uses of Encarta
1. For improving learners reading skills in English.
2. It provides step-by-step instruction for solving math problems
3. It helps students to learn on their own.
Scratch
Scratch is a free visual programming language that allows students to create their
own interactive stories, games and aminations. As student design scratch projects,
they learn to think creatively and reason systematically.
Uses of Scratch
1. It helps children develop their logical thinking
2. It improves social skills
3. Scratch help children to lean coding concept.
Mavis Beacon
Mavis beacon is an application software program design to teach touch typing".
How to use Mavis beacon
1. Open the program by double clicking on the Mavis beacon icon.
2.
3. If this is your first time, sign in by tying your first name and last name and
select your age. If not your first time, click on your name on the class list.
4.
54
Achievers Computing for JHS Basic 7
Google Classroom
Google Classroom is a free web based social tool for leaning. It allows students to
post questions and receive answers from their teachers and fellow students. Teacher
can post question and lesson materials to student at home. Teachers can create,
distribute, and mark assignments all in google classroom.
Spreadsheet
Spreadsheet is a software that is used to organize and calculate numerical data.
Spreadsheet is made up of rows and columns that stores numerical data, perform
calculations, and organize the data into meaningful information.
Uses of Spreadsheet
1. For entering, sorting and storing of data.
2. For performing calculations
3. For data collections
Virtual Museum
Virtual museum is a collection of digitally recorded images, sounds, text and other
data of historical, scientific or cultural interest that can be accessed through
electronic media or web. As with a traditional museum, virtual museum can be
designed around specific objects such as art museum or natural history museum or
can consists of online exhibitions
55
Achievers Computing for JHS Basic 7
people using them for various purposes on a daily basis. While computers have certainly
brought numerous benefits and improvements, they also have a negative impact on the
environment. In this lesson, we will discuss some of the ways in which computers harm
the environment and the steps that can be taken to reduce these impacts.
1. Energy Consumption
One of the biggest environmental impacts of computers is their energy consumption.
The production and use of computers require a significant amount of energy, which
often comes from non-renewable sources such as coal and natural gas. This energy
consumption contributes to greenhouse gas emissions, which are a major contributor to
climate change. People who use computers never turn the actual device off which
wastes a large amount of electricity that could have been potentially saved and reduce
the amount of electricity produced by burning fossil fuels.
2. E-waste
Another major negative impact of computers on the environment is the generation of
electronic waste, or e-waste. E-waste refers to electronic devices that are no longer
wanted or needed, and can include computers, laptops, printers, smartphones, and
other electronic devices.
When electronic devices are discarded, they often end up in landfills where they can
release harmful chemicals into the environment. These chemicals can contaminate soil
and water, posing a threat to plants, animals, and even humans. In addition, the
extraction of the materials used in electronic devices, such as metals and plastics, can
also have negative environmental impacts. Agbogbloshie in Ghanan is one of the largest
e-waste dumping site in the world
56
Achievers Computing for JHS Basic 7
3. Air Pollution
The production of computers also contributes to air pollution. The manufacturing of
computers involves the use of various chemicals and materials, many of which can
release harmful pollutants into the air. These pollutants can include carbon dioxide,
nitrogen oxides, and other greenhouse gases, which can contribute to air pollution and
climate change. Also, Electronic waste contains gold, silver and cooper, and people in
developing countries attempt to extract these materials by burning the substance which
releases hazardous smoke into the air and creates a poor air quality with so much
pollution.
4. Water Pollution
In addition to air pollution, the production of computers can also lead to water pollution.
The manufacturing process for computers uses large amounts of water, and this water
can become contaminated with chemicals and other pollutants. This contaminated
water poses a risk to human health when it is dumped into rivers and other bodies of
water since it can harm aquatic life and potentially get into the water supply.
Water pollution can have a variety of negative impacts on the environment, including
the destruction of ecosystems and the loss of biodiversity. It can also have economic
consequences, such as the loss of fishing and other industries that rely on clean water.
57
Achievers Computing for JHS Basic 7
5. Deforestation
The production of computers can also contribute to deforestation. Many of the materials
used in the production of computers, such as plastics and metals, are derived from trees
and other natural resources. The demand for these materials can lead to the destruction
of forests, which can have negative impacts on the environment, including soil erosion
and loss of habitat for plants and animals. Computers also cause unnecessary waste of
paper by printing files and emails; most office waste is made out of paper and paper are
made from trees which also contribute to deforestation.
Computers have a negative impact on the health of its user such as the following
diseases: arthritis, sleeping disorders such as frequently waking up during the night or
having insomnia, back pain for staying in the same sitting position, headaches and poor
attention spam in which you regard single tasks as boring and makes you anxious.
Watching the screen of the computer that contains lights can burn your retina and cause
blindness.
The use of computers has numerous benefits and has brought significant advancements
to our society. However, it is important to recognize the negative environmental impacts
of computers, including energy consumption, the generation of e-waste, air and water
pollution, and deforestation.
There are steps that can be taken to reduce the negative environmental impacts of
computers. Some of these steps include:
Energy-efficient computers: Choosing computers that are designed to be energy-
efficient can help reduce their overall energy consumption and greenhouse gas
emissions. Look for computers with the ENERGY STAR label, which indicates that
they meet strict energy-efficiency standards set by the Environmental Protection
Agency (EPA). We have to try to reduce the amount of power the computer uses
by using the computer only when it's needed and turning the computer off when
we are not using it. Some other small things we can do is adjusting the computer
brightness, setting, and using LCD monitors instead of CRT.
E-waste recycling: Properly disposing of e-waste is crucial for reducing its
environmental impact. Many communities offer e-waste recycling programs,
58
Achievers Computing for JHS Basic 7
where old electronic devices can be safely and responsibly recycled. This helps to
prevent e-waste from ending up in landfills and reduces the demand for the
extraction of new materials.
Green Manufacturing: Consumers can also support companies that are
committed to environmentally-friendly manufacturing practices. These
companies often use sustainable materials and employ eco-friendly production
Paper Waste recycle: Computers produce a large amount of paper waste, mostly
by printing. To reduce paper waste, we must recycle the paper that can be re-
used.
Many countries contain facilities in which electronic waste is recycled such as: Australia,
UK, the United States and Canada. Many developing countries contain vast landfills like
Ghana, Nigeria, and India. Continents like Africa are known to contain many landfills of
electronic waste, in which is hazardous to the environment and the entire population.
Taking steps to reduce these impacts, such as choosing energy-efficient computers,
recycling e-waste, supporting companies that use eco-friendly manufacturing practices,
and reducing our overall consumption of computers, can help to safeguard the
environment and make sure our world has a viable future. It is up to each of us to take
responsibility for the environmental impact of our actions and make choices that are
better for the environment.
59
Achievers Computing for JHS Basic 7
ASSESSMENT QUESTIONS
MULTIPLE CHOICE 7. All the following can help reduce the
negative impact of computers on the
1. The practical use of scientific
environment except
knowledge to solve problems in our
everyday life is termed as A. Green manufacturing
A. Educational technology B. E-waste recycling
B. Technology C. Use of energy efficient computers
C. Scientific knowledge D. Do not switch of the computer
2. The introduction of technology in the after use.
classroom to improve teaching and 8. Software used to organize and
learning is known as calculate numerical data is a form of
A. Educational technology rows and columns is called?
B. Technology
A. Encarta
C. Scientific knowledge
3. All the following are examples of B. Word processors
technology tools in the classroom C. Spreadsheet
except 9. Which the following is not a negative
A. Google classroom effect of computers on the
B. Encarta environment?
C. One drive A. E-waste
D. Mavis Beacon B. Deforestation
4. Which of the following tool help C. Air pollution
students improve their typing skills D. Energy saving
A. Encarta
B. Spreadsheet STRUCTURED QUESTIONS
C. Scratch 1. Explain the term technology tools
D. Mavis Beacon 2. What is Educational Technology?
5. Electronic devices that are no longer
3. Identifying any four (4) technology
wanted or needed and disposed of are
tools that aid learning.
termed as
A. Water waste 4. State the use of the tools identified in
B. E-waste question 3 above.
C. Metal waste 5. Outline four (4) benefits of using
6. The most common landfill site in Ghana technology in learning
is located in
6. Identify any four negative impacts of
A. Kejetia
computer on the environment
B. Agbogbloshie
C. Nima 7. Propose any four ways to reduce these
D. Kasoa negative impacts identified in (7)
60
Achievers Computing for JHS Basic 7
SUB-STRAND 3
HEALTH AND SAFETY IN USING ICT TOOLS
CONTENT STANDARD
HOW TO APPLY HEALTH AND SAFETY MEASURES IN USING ICT TOOLS
Indicators
At the end of this content, learners will be able to:
Describe Current Regulatory Requirements and Potential Computing-Related
Disorders.
Describe Safety measures in using ICT tools
Examine workstation health risk assessment methods
Explore safety measures at workstations
61
Achievers Computing for JHS Basic 7
HEALTH HAZARDS ASSOCIATED WITH ICT DEVICES
HEALTH HAZARDS OF COMPUTER
1. Long term exposure to the monitor affects vision also known as vision impairment.
2. Improper sitting posture can cause waist, back, and neck pains.
3. Long-term usage of non-ergonomics keyboard causes wrist pains.
4. Radiation from the monitor causes eye and skin irritation.
62
Achievers Computing for JHS Basic 7
Computer users are a key component in any computer system. Protecting users is
just as important as protecting hardware, software, and data. The widespread use of
computers has led to some important user health concerns. Users should be
proactive and minimize their chance of risk. The following sections discuss health
risks and preventions, along with measures users can take to keep the environment
healthy. The long-term use of computers has been linked to a range of potential
health problems, or "computing related disorders" (CRDs).
Computers and health risk
1. Upper and lower back pain due to bad posture
2. Long term exposure to the monitor affects the eye.
3. Back and neck pains.
4. Strain in Legs and Feet.
5. Wrist pains.
6. Eye and skin irritation.
7. Repetitive strain injury (prolonged and improper use of mouse and keyboard)
8. Plugging all your system into one socket
9. Using damage socket
10. Faulty electrical connections,
The following measures will help reduce the various health risk associated with the use
of workstations.
To reduce back and neck pains:
Adjusting the chair for comfort
Re-positioning of devices,
Stand up and walk around every hour or so.
Slowly lean your torso over to one side of the chair and then the other to stretch
your sides and spine.
Stand up and put your hands together, elbows out, then slowly twist to the left and
then to the right.
Keep your neck straight as much as possible.
Move your shoulders around in small circles, first in one direction and then the
other.
Slowly bring your chin down to your chest, hold for 3 seconds, and then release.
63
Achievers Computing for JHS Basic 7
Keeping the arm and wrist free from pain:
Reach your arms out in front of you and draw big circles with your wrists, first in one
direction and then the other.
Stretch your arms out to the side as far as you can and then above your head as high
as you can to stretch your arms, wrists and back.
Interlock your fingers and then push them out in front of you, with palms facing out.
64
Achievers Computing for JHS Basic 7
ASSESSMENT TASK 7. All the following are possible
measures to protect eye except.
MULTIPLE CHOICE A. Blink your eyes every five
seconds.
1. All the following are health hazards
B. Use large fonts
of using the computer except C. Wash your eyes frequently
A. Neck pain D. Every 10 to 15 minutes, take an
B. Backache eye break.
C. Toothache
D. Wrist pain 8. Which of the following devices can
2. Which of the following is an effect of leads to eye problem and skin
laud ringing tone of mobile phone irritation
A. Hearing impairment A. Keyboard
B. Vision impairment B. Mouse
C. Headache C. Monitor
3. To avoid wrist pain, one must us D. Printer
A. Ergonomics keyboard
B. QWERTY keyboard STRUCTURED QUESTION
C. Dvorak keyboard
4. All the following can cause hearing 1. Give five examples of ICT tools
impairment except 2. Mention two health hazards or
A. Mobile phone effects associated with the use of
B. Computer computer and mobile phone
C. Public address system 3. Define the term health hazards.
D. Radio 4. Identify any five (5) possible health
5. The following are possible hazards hazards of prolonged use of
of prolonged use of the computer computing devices.
system except 5. Suggest five (5) preventive
A. Neck and wrist pain measures to reduce health and
B. Backache safety risks associated with the use
C. Tuberculosis of computers.
D. Eye strain
6. Which of the following is not a safety 6. Identify any five measures to
measure to consider in ICT reduce visual problems when using
environment? a computer.
A. Not overloading the socket
B. Proper sitting position
C. Always charge your battery
65
Achievers Computing for JHS Basic 8
196
Achievers Computing for JHS Basic 8
STRAND 1
INTRODUCTION TO COMPUTING
SUB-STRAND 1
COMPONENTS OF COMPUTERS AND COMPUTER SYSTEMS
CONTENT STANDARD 1
PARTS OF A COMPUTER AND TECHNOLOGY TOOLS AND THEIR USES
Indicators
At the end of this content, learners will be able to:
FIFTH-GENERATIONS OF COMPUTERS
The period of fifth generation started from 1980-till date. The process of developing
fifth generation of computers is still in the development stage.
This generation is based on parallel processing hardware and AI (Artificial
Intelligence) software. Two main characteristics can be identified with the fifth-
generation computers, which are:
Parallel Processing: Most computers today access and execute only one instruction
at a time. This is called serial processing. However, a computer using parallel
processing accesses several instructions at once and works on them at the same
time through the use of multiple central processing units.
Artificial Intelligence (AI): It refers to a series of related technologies that tries to
simulate and reproduce human behaviour, including thinking, speaking and
reasoning. AI comprises of a group of related technologies: expert systems (ES),
natural language processing (NLP), speech recognition, vision recognition, and
robotics.
197
Achievers Computing for JHS Basic 8
Quantum Computing
Quantum computing is an area of computer science that uses the principles of
quantum theory. Quantum theory explains the behavior of energy and material on
the atomic and subatomic levels.
Quantum computing uses subatomic particles, such as electrons or photons.
Quantum bits, or qubits, allow these particles to exist in more than one state (i.e., 1
and 0) at the same time. Where classical computers store information as bits with
either 0s or 1s, quantum computers use qubits. Qubits carry information in a
quantum state that engages 0 and 1 in a multidimensional way.
Google Sycamore is a quantum computer developed by Google AI Quantum. Google
Sycamore chip is based on a type of quantum computing called superconducting
qubits, which uses electric currents flowing through superconducting materials to
store and process information. Syca
processor comprising 54 qubits (quantum bits).
198
Achievers Computing for JHS Basic 8
strip reader. This is known as Swiping. The magnetic strip reader then sends data
from the card into the computer for processing.
The strip on the card holds information such as:
Bank account number
Name of card holder
Expiry date of membership
Uses of a Magnetic Strip Readers
1. ATM use these readers to process the information on bank cards
2. Electronic fund transfers point of sale (EFTPOS) uses the readers to transfer
3. Hotel rooms sometimes uses magnetic strip readers in place of door keys.
2. Chip and Pin Reader These allow people to pay for goods and services
electronically at EFTPOS terminals. The chip and pin
reader works by inserting a bank / credit card into a slot
and then entering a PIN (personal identification number).
If the correct PIN is entered, the cost of the goods or
199
Achievers Computing for JHS Basic 8
Uses of Chip and Pin Readers
They are used to make payments for goods or services in places such as:
Supermarkets
Filling station
Restaurants
Cafes
3. Barcode Scanners Used to rea
barcodes. The barcode scanner reads the information stored on the barcode
using a visible red light which is reflected and translated into digital information.
The barcode holds information about each
product including;
Product Id
Manufacturer
Country of origin
Note that the barcode does not store the price of the product. The price and other
information about the product are held in a computer database and access using
the product Id. The barcodes hold information about the product which is linked to
a computer database. This enables automatic fast billing to take place.
Once the barcode has been scanned, a computer can read the information stored
on the barcode and access details about the product that are stored in the database.
200
Achievers Computing for JHS Basic 8
Uses of Optical Mark Reader (OMR)
They are used to read the shaded areas of documents such as:
6. Graphic Tablet
A graphics tablet (also known as a digitizer, pen
tablet, drawing tablet or external drawing pad) is
a computer input device that enables a user to
hand-draw images, animations and graphics, with
a special pen-like stylus, similar to the way a
person draws images with a pencil and paper.
201
Achievers Computing for JHS Basic 8
202
Achievers Computing for JHS Basic 8
Impact Printer
Braille Printer
Inkjet Printer
3D Printer
Thermal Printer
203
Achievers Computing for JHS Basic 8
BRAILLE PRINTER
A braille printer (also called a braille embosser) is an impact printer that creates
tangible dots on a braille paper, making written documents readable to the visually
impaired individuals.
A Braille printer is a system that enables people who are blind to read using a sense
of touch. The utilization of the Braille printer allows individuals who are visually
impaired and blind to access information quickly and perform tasks that involve
reading and writing more efficiently using the Braille printer. In braille, each letter is
represented by a different dot pattern of up to six raised dots.
Benefits or Advantages of using braille
1. It enables the visually impaired to read.
2. Reading in the dark is possible.
3. Reading while stuck in traffic while keeping your eyes on the road.
204
Achievers Computing for JHS Basic 8
Advantages and Disadvantages of impact Printers
Advantages Disadvantages
Impact printers are less expensive They produce low quality prints
They are reliable printers They make a lot of noise while printing
They are character or line printers They are very slow in printing
They use cartridges and ink ribbons. Refilling of the cartridge is expensive.
Very useful for larger output prints They are not able to print in colour
NON-IMPACT PRINTERS
Non-impact printer form characters and images without any direct physical contact
between the printing mechanism and the paper. Non-impact printers use laser,
spray of special ink or heat and pressure to print graphics and characters onto the
paper. The quality of print produced by a non-impact printer is higher than that of
the impact printer.
Examples of non- impact printers
1. Laser printer 3. Thermal printer
2. Ink-jet printer 4. Plotter
Characteristics of Non-Impact Printers
1. They are quiet in nature
2. They produce high quality print
3. They are expensive compared to impact printers
4. They are page printers.
205
Achievers Computing for JHS Basic 8
Thermal Printer
A thermal printer is a printer that makes use of heat in order to produce the image
on paper. Thermal printers use heated pins to "burn" images onto heat-sensitive
paper.
Thermal printers are increasingly becoming popular and are mostly used in airline,
banking, entertainment, retail, grocery, and healthcare industries. Thermal printing
does not make use of ink or toner unlike many other printing forms but largely
depends on thermal papers for producing the images.
Advantages of Thermal Printers
1. Thermal printer saves money, since there is no use of cartridge or toner.
2. More durable compared to other printers.
3. More efficient and fast in printing
4. Largely inexpensive and come in various models and sizes.
Disadvantages of Thermal Printer
1. Poor color printing compared to other printers
2. Printhead could be damaged by the high heat used while printing.
3. They consume more ink when the printhead becomes hot.
3D Printer
A 3D printer is a type of material design printer that designs and builds 3D models from
Computer Aided Design (CAD) using an additive manufacturing process.
3D printing is a process that uses computer-aided design, or CAD, to create objects layer
by layer. 3D printing is commonly used in manufacturing and automotive industries,
where tools and parts are made using 3D printers.
3D printing is an additive process whereby layers of material are built up to create a 3D
part. This is the opposite of subtractive manufacturing processes, where a final design
is cut from a larger block of material. As a result, 3D printing creates less material
wastage.
Uses or Application of 3D Printing
1. For creating product models and prototypes
2. For printing shoe designs
3. For creating wax casting for jewelry
4. Printing 3D foods.
5. For printing personal protective equipment (PPE)
6. For manufacturing replacement parts and spare parts.
206
Achievers Computing for JHS Basic 8
Advantages of 3D Printer
1. 3D printers are affordable
2. Wastage is minimal during production.
3. 3D printers are very fast in production
4. Environmentally friendly
Disadvantages of 3D Printers
1. 3D Printers may not provide enough strength
2. May lead to high rate of unemployment
3. Limited material
4. Restricted Build Size.
Inkjet Printer
Inkjet Printer is a printer that blows ink onto paper using very small jets to produce
characters on the paper. Inkjet printers uses ink to print text, graphics, and images
onto various types of paper. They are mostly used in home and small offices.
Inkjet printer works by spraying droplets of ink onto a paper to from an image or
character. The ink is stored in disposable ink cartridges, and often a separate
cartridge is used for each of the major colours which are CMYK. CMYK stands for
Cyan, Magenta, Yellow, and Key. K' stands for Key, Key Color, or Key Plate, which
actually refers to the color Black.
Most inkjet printer can perform multiple functions like printing, scanning and
ed and black
& white.
Advantages of inkjet Printer Disadvantages of Inkjet Printer
Good for photo and image printing High maintenance cost
Cartridges can be refilled and reused. Less printing speed compare to laser
printer.
Inkjet printers are smaller, lighter and Refiling and replacing of cartridges are
easier to maintain than laser printers. very expensive.
Inkjet printers have a low start-up cost Performance reduces with high volume
printing.
They are quieter in operation
207
Achievers Computing for JHS Basic 8
STORAGE DEVICE
In addition to the previously discussed types of storage device in basic 7, other
options are available for specific uses and applications. These include Flash Memory
Storage Systems, Embedded Flash Memory Cards and Readers, USB Flash Drives,
Solid State Drives and Hybrid hard drives.
Flash Memory Storage Systems
Flash Memory is a type of nonvolatile memory that can be erased electronically and
rewritten. Flash memory chips are a type of solid-state media, which means they
consist entirely of electronic components, such as integrated circuits, and contain
no moving parts. The lack of moving parts makes flash memory storage more
durable and shock resistant than other types of media such as magnetic hard disks
or optical discs. Types of flash memory storage include Memory Cards and Readers,
USB Flash Drives, Solid State Drives and Hybrid hard drives.
Memory Cards
Memory cards enable mobile users to easily transport digital photos, music, or files
to and from mobile devices and computers or other devices. Memory card is a
removable flash memory device, usually no bigger than 1.5 inches in height or width,
that you insert and remove from a slot in a computer, mobile device, or card
reader/writer.
Common types of memory cards include CompactFlash (CF), Secure Digital (SD),
Secure Digital High Capacity (SDHC), microSD, xD Picture Card, and Memory Stick.
CompactFlash
Memory Stick
Secure Digital Secure Digital
High Capacity
208
Achievers Computing for JHS Basic 8
USB Flash Drive
USB flash drive, sometimes called a thumb drive, is a flash
memory storage device that plugs in a USB port on a computer
or mobile device. USB flash drives are convenient for mobile
users because they are small and lightweight enough to be
transported on a keychain or in a pocket. With a USB flash drive,
users can easily transfer documents, photos, music, and videos
from one computer to another.
209
Achievers Computing for JHS Basic 8
Disadvantages of Solid-state drives
1. They are more expensive than hard disk drive
2. SSDs have smaller storage capacity compare to Hard drives
3. SSDs decrease in performance over time.
4. Data recovery process is time-consuming and can be expensive, as the data
on damaged chips may not be recoverable.
component SSD has no moving components HDD structure has moving parts
210
Achievers Computing for JHS Basic 8
CONTENT STANDARD 2
Demonstrate the use of the Desktop features.
Indicators
At the end of this content, learners will be able to:
Explore the use of the Charms bar
Practise file management techniques (Drive Management)
The Charms bar is a systems toolbar available in Windows 8 Graphical User Interface
or screen. The Charms bar is a vertical toolbar, found on the right-hand side of the
screen, and includes search, share, start, devices and settings icons or buttons. The
menu appears when the mouse cursor is positioned at the top-right or bottom-right
corner of the Windows 8 GUI.
Search
Share
Start
Device
Settings
211
Achievers Computing for JHS Basic 8
Drive or disk management is a utility software or tool used to manage data on disk
by performing various functions on it. It enables users to view and manage the disk
drives installed in their computer and the partitions associated with those drives.
Some basic functions that disk management utility tools performs includes:
Disk partitioning
Disk defragmentation
File compression
Defragmentation
Defragmentation, also known as defragging or defrag, is the process of rearranging
the data on a storage medium, such as a hard disk drive (HDD), for efficient storage
and access. Defragmenting is the process of scanning your hard drive and joining the
different file fragments stored on the disk. Defragmentation increases the speed
and performance of a hard disk.
How to perform a disk defragment on windows 10
1. Select the search bar on the taskbar and enter defrag.
2. Select Defragment and Optimize Drives.
212
Achievers Computing for JHS Basic 8
Disk Partitioning
Disk Partitioning is the process of dividing a disk into one or more regions
called partitions. Disk partition, is a logical division on a hard disk drive (HDD) that
enables a PC to have different drives. A partition divides the hard drive into several
logical storage units on one drive but functions as multiple drives.
Reasons or importance of disk partition
1. For better data organisation on your PC
2. Run different operating systems on one PC
3. Partitions make data recovery convenient and efficient.
4. Windows can easily be reinstalled without affecting the installed programs.
Partition a Hard Drive with Disk Management on Windows 10/11
1. Right-click the Windows icon, then click Disk Management.
2. Right-click the hard disk partition that you want to shrink, and select "Shrink
Volume.
3. Enter the amount of space you want to shrink in MB, then click on the "Shrink"
button. Wait for the process to complete, you'll get an unallocated volume.
4. Right-click on the unallocated space on your hard disk, and then select "New
Simple Volume".
5. In the New Simple Volume Wizard interface, click "Next".
6. Enter the size of the volume you want to create in MB or accept the default
size, and then select "Next".
7. Accept the default drive letter or choose a different letter for the partition, and
then select "Next".
8. Set the default file system as NTFS and click "Next" to format the volume.
9. Click "Finish" to complete creating a new partition in Windows 11/10.
File compression
File compression is the process of reducing or squeezing the size of files to save
storage space. File compression is the act of reducing the size of data while
maintaining the integrity of the information. This is useful because it allows us to
store smaller files on storage disks, as well as making file transfer over the internet
more efficient.
213
Achievers Computing for JHS Basic 8
ASSESSMENT QUESTIONS
MULTIPLE CHOICE A. Device
B. Search
1. Which generation of computers uses
C. Toolbar
parallel processing and artificial
9. Dividing a hard disk into one or more
intelligence?
regions is called?
A. Third generation
A. Compression
B. Fourth generation
B. Partition
C. Fifth generation
C. Defragmentation
2. When a computer is able to process or
execute more than one instruction at a 10. The process of reducing the size of
time, it refers to as files to reduced storage space is
A. Serial processing known as
B. Parallel processing
A. Compression
C. Multi-processing
B. Partition
2. Which of the following device can be
C. Defragmentation
used to mark multiple choice
examination? STRUCTURED QUESTION
A. Chip and Pin Reader
B. Optical Mark Reader 1. Explain the term direct data entry
C. Barcode Reader device and give four examples
3. The best printer for the visually 2. State three (3) uses of barcode
impaired or blind people is reader.
A. Laser printer 3. What are the advantages and
B. Thermal printer disadvantages of direct data entry
C. Braille printer device.
4. Which of the following is not an 4. Explain the following and give 2
example of non- impact printer? examples each.
A. Dot Matrix
I. Impact printer
B. Plotter
II. Non-Impact printer
C. Thermal printer
5. State 3 applications of 3D printer
7. Another name for USB flash drive is
6. identify any three advantages of
A. Memory card SSD over HDD
B. thumb drive 7. Explain the following terms
C. Memory stick i. Defragmentation
8. All the following are features of the ii. File compression
windows charm bar except iii. Disk partition
214
Achievers Computing for JHS Basic 8
SUB-STRAND 2
TECHNOLOGY IN THE COMMUNITY
CONTENT STANDARD
DEMONSTRATE THE USE OF TECHNOLOGY IN THE COMMUNITY
Indicators
215
Achievers Computing for JHS Basic 8
Category of people with disability
People with disability can be categorize into different group, which includes;
1. Sensory Disability (blindness or vision impaired and deaf or hearing impaired)
2. Locomotive or mobility disability (including cerebral palsy and leprosy)
3. Mental Disability
4. Intellectual disability
5. Learning disability
Technologies that can be used to help people with special need.
The following are both adaptive and assistive equipment and technology that can
be used to help or assist people with disabilities.
Large monitors Braille embossers
Software to adjust screen colors Screen enlargement applications,
Computers with voice output On-screen keyboards
Computers with visual output Electronic pointing devices
Screen readers Joysticks
Text-to-speech software Trackballs
Portable computing devices have affected our everyday life in both positive and
negative ways. With the increase in usage of mobile devices such as smartphones,
laptops, smart watches, and GPS, access to information and communication has
never been more easily accessible.
You can have music in your pocket and make life more enjoyable. you can keep up
with people the latest trends, the latest sports, whatever you want. you don't need
to see your friends you can text them when you are not able to hang out with them.
216
Achievers Computing for JHS Basic 8
communicate with people on the various social media platforms and many more.
These small devices are everywhere and have an increasing role in the lives of
everyone.
Effects of using mobile or smart phone
Positive Effects Negative Effects
1. Help people stay connected 1. Affects student's studies
2. Helps people to communicate with 2. Distracted driving due to cellphones
each other is becoming a big problem
3. Help businesses run smoother 3. The radiation of cellphones
4. Really useful in emergencies negatively affects our health
5. Many different opportunities to learn 4. Blue light emitted from phone
6. Creates jobs in the technology world screens affects our vision
Smart watches
Smart watch is a wearable computing device that look like a wristwatch or other
time-keeping device. Smart watches have many features that smartphones have,
but it is much more compact.
In addition to telling time, many smartwatches are capable of extending the
capabilities of th smartphone to the watch through Bluetooth transmission.
The user can use the watch's interface to initiate and answer phone calls from their
mobile phone, read email and text messages, get weather reports, listen to music,
access GPS location and health data.
Useful features of smartwatches
1. Health information, such as heart rate, blood oxygen level, blood pressure and
temperature monitoring;
2. Messaging and calling features, similar to those on a smartphone.
3. Emergency calls for assistance if the watch detects the user has fallen.
4. Location features, such as maps, a compass and GPS tracking.
Laptop
Laptops are very common in the modern-day society. Like smartphones, they are
lightweight, portable, and can be used on the go. Laptops allow us to feel like we
are working on a desktop but with the convenience of being able to work wherever
217
Achievers Computing for JHS Basic 8
and whenever we want. They also consume eighty percent less electricity than
desktop computers being particularly beneficial for students and businessmen.
People use laptops on a daily basis as they provide many advantages over desktops
and smartphones.
PDA
PDA is short for personal digital assistant, and it is a handheld device that combines
computing, telephone, Internet and networking features. A typical PDA can function
as a cellular phone, fax sender, Web browser and personal organizer. PDAs may also
be referred to as a palmtop, hand-held computer or pocket computer. Basically,
what a PDA does is to combined the features of a laptop and a cell phone on same
device.
GPS
Global Positioning System (GPS) has made the lives of many people safer by reliably
transmitting maps to unfamiliar locations through portable GPS navigational devices
that speak to the user rather than requiring the user to read a map. These devices
can save a great deal of time and fuel costs by preventing a user or driver from
becoming lost in an unfamiliar location.
For people who are traveling alone, GPS technology can direct them to the exact
location or to a specific address without any assistance from anyone.
Every day, regardless of your age or the website you use, you are at risk of being
hacked and having your information stolen. It might be your accounts on social
networking sites, bank websites, or even information on your personal computer.
218
Achievers Computing for JHS Basic 8
Example of these issues include
Reliability of passwords
Network Security
Identity Theft
Reliability of Password
Passwords are hard to choose, especially choosing the right one that is easy to
remember for yourself yet hard to guess by others. Many people tend to use very
easy passwords for many of their accounts because they find it much easier to
remember. These simple passwords can put their computer or mobile device at risk,
and allow for hackers to access their financial and personal information.
Here is a list of some of the world's most popular passwords that are very easy to
be hacked:
1. Password
2. Password1
3. 123456
Security experts suggest that people use a different password for each service or
website they have an account with. For this way if one of your accounts is hacked,
the others will remain safe. The way to create a password that will be hard for others
to guess is by using characters that nobody could think of. Your password should
contain UPPERCASE and lowercase letters, numbers and symbols.
Network Security
Network security are software and hardware that protects you from threats.
Components of Network Security include:
Anti-virus and anti-spyware
Firewall, blocks unauthorized access to your network
Virtual Private Networks (VPN), to provide secure network access.
Identity Theft
Identity theft can also be known as identity fraud, which is a crime in which an
imposter obtains key pieces of personally identifiable information, such as Social
Security or account details, in order to impersonate someone else for financial or
legal purposes. Some of the ways that identity can be stolen are listed below:
Stealing your mail.
Looking for personal documents in your trash.
Tampering with ATMs to steal your banking information.
219
Achievers Computing for JHS Basic 8
SUB-STRAND 3
HEALTH AND SAFETY IN THE USE OF ICT TOOLS
CONTENT STANDARD
DEMONSTRATE HOW TO APPLY HEALTH AND SAFETY MEASURES IN USING ICT TOOLS
Indicators
At the end of this content, learners will be able to:
Discuss health issues at workstations
Discuss safety measures in risk reduction at workstations
Individuals who use computers for long periods of time may experience discomfort
or pain as a result of poor posture, improper adjustment or use of workstation
components and other factors. In most cases, there are relatively simple and
inexpensive corrective measures which can be employed to reduce the likelihood of
discomfort or injury. Companies must put measures in place or train computer users
on how to adjust their computer workstations in order to work safely. We will
discuss the importance of taking regular break, adopting good sitting posture and
using document holders as a safety measure at the workstation.
220
Achievers Computing for JHS Basic 8
Adopting a good posture position at work
Posture is the position of your body when you are standing or sitting. It describes
how your spine is aligned with your head, shoulders, and hips. Good posture is an
essential part of staying healthy, and fit. It helps you to maintain proper alignment
of your spine, shoulders and hips. To prevent chronic health issues and enhance
your wellbeing, it is important to implement healthy workplace habits that improve
your posture at work and anywhere you find yourself.
the right amount of support from muscle tension. The following guidelines can help
improve your sitting posture.
1. Sit with a back straight (no hunching), your shoulders pulled back and buttock
touching the end of the seat.
2. Keep your neck and head in an upright angle with your ears aligned with your
shoulders.
3. Avoid leaning on any side. Keep hips even to distribute weight of body.
4. Bend your knees at a 90-degree angle, and keep your knees even with or
slightly lower than hips.
5. Leave a 2 3-inch small gap between the bottom of your thighs and the edge of
the seat. This helps reduce pressure build up in the underside of your thighs.
6.
7.
8. Avoid sitting for longer than 30 minutes at a time.
221
Achievers Computing for JHS Basic 8
Sitting Positions That Must be Avoided
222
Achievers Computing for JHS Basic 8
ASSESSMENT TASKS
MULTIPLE CHOICE
1. Which of the following is classified as STRUCTURED QUESTIONS
sensory impairment or disability
A. Mental illness 1. Briefly explain the following terms;
B. Leprosy i. Adaptive technology
C. Blindness ii. Assistive Technology
2. Cerebral palsy belongs to which 2. Identify any three devices that can be
category of disabilities? used to assist someone who is
A. Sensory disability visually impaired or blind to use a
B. Locomotive disability computing device
C. Learning disability 3. State four ways in which mobile
3. Braille embossers or printers are phone affects our daily life.
4. Mention any three uses or
A. Hearing impairment applications of smart watches
B. Vision impairment 5. What are the major issues associated
C. Learning impairment in online services
4. Computers with voice output is best 6. Write the Following abbreviation in
full
A. Hearing impairment i. PDA
B. Vision impairment ii. GPS
C. Voice impairment iii. VPN
5. All the following are positive impact of 7. Identify any four safety measures to
mobile phone except reduce back pains at the workplace.
A. For communication 8. State four (4) ways to reduce eye
B. For entertainment problem when using the computer.
C. Distracted driving 9. How can you reduce wrist pains when
6. Which of the following is not a safety using the computer.
measure to consider in ICT 10. As a student, what are some of the
environment? effects of playing computer game for
long hours
A. Not overloading the socket 11. State three benefits of using
B. Proper sitting position document holder.
C. Avoid using damage socket 12. Identify any three importance of
D. Always charge your battery taking regular breaks at the
workplace
223
Achievers Computing for JHS Basic 9
331
Achievers Computing for JHS Basic 9
STRAND 1
INTRODUCTION TO COMPUTING
SUB-STRAND 1
COMPONENTS OF COMPUTERS AND COMPUTER SYSTEMS
CONTENT STANDARD 1
PARTS OF A COMPUTER AND TECHNOLOGY TOOLS AND THEIR USES
Indicators
At the end of this content, learners will be able to:
Discuss the trends in the next generation of computers.
Examine the concept of Perceptual Computing.
Discuss the uses of Output devices such as Wearable Displays, E-Paper, E-Books, Kindle
Describe Storage Systems: Network and Cloud Storage Systems, Smart Cards,
Holographic Storage, Storage Systems for Large Computer Systems
Computers are found in every aspect of our daily lives, and this digital
transformation is creating a trend of new business models and innovations. As the
number of application usage increases, so too do the demands we place on software
and hardware.
The key trends of next-generation computing are computers and digitization. In the
coming decades, the digital world will experience immense technological
advancement. But, why is it important for you to know? Having certain knowledge
about the upcoming development will help prevent various shocks. The
development can either be good or bad for businesses and the society as a whole.
However, it is upon you to take advantage of it and get the best benefit out of it.
Features expected to be seen in the next generation of computers include:
1. Neuromorphic Computing: Neuromorphic computing uses the human brain as a
model for hardware and computing platforms, semiconductor technologies, chip
design, architectures and algorithms in order to increase the performance and
energy efficiency of computing systems, including mobile and edge applications.
332
Achievers Computing for JHS Basic 9
2. Quantum Computers: Quantum computers can tackle highly complex
calculations that would be almost impossible to perform even with conventional
supercomputers. This makes the development of corresponding technologies and
algorithms essential for the next generation of computers.
3. Artificial Intelligence: There is no doubt that artificial intelligence will be one of
the biggest trends. We are still in the initial phase of development in artificial
intelligence. With modern technology, companies are focusing on integrating AI
with various technological tools. Along with that, speech generation with AI will
improve the interaction between humans and computers.
4. Facial Recognition and Computer Vision: Artificial intelligence is promoting
computers to interact with humans. But in the upcoming years, we expect these
machines to see as well. This feature is also available in various security systems
and mobile phones. Hence, this section will improve more in the future with rapid
development.
5. Increased Connectivity: Improvement in digital connections with 5G connectivity
will improve economic structure significantly. Also, the increase in wireless
control of machines and mobile tools can cause a drastic shift in digitalization.
Quantum Computing
Quantum computing is an area of computer science that uses the principles of
quantum theory. Quantum theory explains the behavior of energy and material on
the atomic and subatomic levels.
Quantum computing uses subatomic particles, such as electrons or photons.
Quantum bits, or qubits, allow these particles to exist in more than one state (i.e., 1
and 0) at the same time. Where classical computers store information as bits with
either 0s or 1s, quantum computers use qubits. Qubits carry information in a
quantum state that engages 0 and 1 in a multidimensional way.
Google Sycamore is a quantum computer developed by Google AI Quantum. Google
Sycamore chip is based on a type of quantum computing called superconducting
qubits, which uses electric currents flowing through superconducting materials to
store and process information.
Sycamore
(quantum bits). Sycamore achieved its results using exactly 53 qubits.
333
Achievers Computing for JHS Basic 9
PERCEPTUAL COMPUTING
Perceptual computing maybe defined as a technology advancement in which
computers are able to sense or analyze the environment around them and respond
accordingly.
In simple terms, perceptual computing is the ability for a computer to recognize
what is going on around it. The computer then can determine what user might need,
as well as react to those needs without giving or receiving any additional information
from the user.
Passwords are no longer needed. When your computer is able to recognize you,
there is no need for a password. You are your password with perceptual computing.
computer can guess at a how a person is feeling. With this technology the computer
can tell that a person is getting happy, angry or sad and respond accordingly.
Features of perceptual computing includes;
1. Speech and Voice Recognition
2. Controlling application using gestures
3. Hand, Finger and Head tracking
4. Gesture and pose recognition
5. Face tracking and recognition
6. Emotion detection
334
Achievers Computing for JHS Basic 9
Google Glass
Google Glass is a wearable, voice- and motion-controlled Android device that
resembles a pair of eyeglasses and displays information directly in the user's field of
vision. Google Glass offers an
augmented reality (AR) experience
by using visual, audio and location-
based inputs to provide relevant
information to users.
The glasses have built-in Wi-Fi and Bluetooth connectivity and a camera for taking
photographs and videos.
335
Achievers Computing for JHS Basic 9
Disadvantages of E-Paper Display
1. Display is slow to update
2. Not suitable for animation or fast-changing displays
3. It is expensive as compared to LCD and other similar size displays.
4. It has less memory
E-Book Reader
An e-reader, also called an e-book reader or e-book device, is a device that is
specially designed for reading electronic books. It is an electronic version of a
physical book that can be read on a screen or a handheld device specifically designed
for reading (known as e-book reader).
Kindle is the first portable hardware computer released in the U.S. for reading e-
books by Amazon.
Any device that can display text on a screen may act as an e-reader; however,
specialized e-reader devices may improve portability, readability, and battery life for
this purpose.
Examples of e-book readers Examples of E-Reader Apps or software
336
Achievers Computing for JHS Basic 9
Disadvantages of using E-Books
1. Piracy is the number one concern for both publishers and authors of e-book.
2. There are health issues while reading during night time mostly on tablets.
3. E-books require power source. As a result, if battery is not charged and power
source is not available, reader cannot have access their e-books.
STORAGE SYSTEMS
Storage System holds data, instructions, and information for future use. Every
computer system store system software, application software and user files. As we
have already discussed the various storage devices and their uses in basic 7 and 8,
we will look at other types of storage systems such as cloud storage, smart cards,
holographic storage and server storage systems in this section.
Cloud Storage
Cloud storage is the technology of saving data in a remote physical location that can
be accessed through the Internet from any device. Cloud storage is an Internet
service that provides storage to computer users.
Types of services offered by cloud storage providers vary. Some provide storage for
specific types of files, such as photos or e-mail messages, whereas others store any
type of file.
Examples of Common Cloud Storage (Cloud Storage Providers)
1. Google Drive
2. One Drive
3. Dropbox
4. iCloud
5. Amazon cloud drive
Most of the storage providers provide free storage space and extra storage at a fee
with monthly subscription.
Advantages (Pros) of Using Cloud Storage
1. Backup your data to the cloud
2. No more external hard drive is needed.
3. Remotely update and sync your files
4. Keep your files encrypted
5. Stores your data for a lifetime.
337
Achievers Computing for JHS Basic 9
Disadvantages (Cons) of Using Cloud Storage
1. You need an internet connection to access your data.
2. Extra storage space comes at a cost.
3. Security and privacy concerns with some providers.
Smart Cards
Smart card is a plastic card with a built-in microprocessor, used typically to perform
financial transactions. A smart card is a card that is embedded with either a
microprocessor and a memory chip or only a memory chip. The microprocessor card
can add, delete, and otherwise manipulate information on the card, while a
memory-chip card (for example, pre-paid cards) can only undertake a pre-defined
operation.
Smart card can be used to store and process information and to control access,
either to a physical location or to data.
Examples of Smart Cards Includes:
1. ATM cards (debit and credit cards)
2. ID cards (Ghana card and SSNIT card)
3. Passports
4. SIM cards
5. Pre-paid cards
Uses or Application of Smart Cards
1. Banking & Retail
2. Healthcare
3. Transportation.
4. ID verification and access control
5. Mobile communications
6. Computer and network security
Holographic Storage
Holographic Storage It is a computer storage device that uses beams of light to store
three-dimensional digitally created data.
Holography is the use of light, typically two distinct beams of light or energy, to
rough the
use of light at a later time. Holographic storage can access the bits of data in a
parallel manner, through the beam of light, rather than one bit at a time, making
data recording and retrieval significantly faster than other media.
338
Achievers Computing for JHS Basic 9
CONTENT STANDARD 2
DEMONSTRATE THE USE OF THE DESKTOP
Indicators
At the end of this content, learners will be able to:
DESKTOP PERSONALISATION
339
Achievers Computing for JHS Basic 9
340
Achievers Computing for JHS Basic 9
How to Change the Mouse Pointer
1. Right-click on the desktop
and select Properties
2. Click on Themes at the left
pane of the window.
3. Locate and select Mouse
Cursor at right pane of the
window.
4. In the Mouse Properties
dialog, select the Pointers
tab,
5. Select your desired mouse
pointer size and color from
the drop-down list under
Scheme.
6. Click Apply and then Ok to
apply the changes.
To change the mouse pointer's size and color back to its default state, just click the
Use Default button.
341
Achievers Computing for JHS Basic 9
Kernel-mode Device Driver: Kernel-mode device driver includes some basic
hardware that loads with an operating system as part of the OS. These are BIOS,
motherboard, processor, RAM and some other hardware that are part of the
operating system.
User-mode Device Driver: They refer to device drivers that users may install and
use on their system. When using a system, users may have their own external
devices that they bring to use, such as mouse, keyboard, sound card, printer and
mobile phones. These devices also require drivers to function.
Common Device Drivers and Their Functions
1. Sound Drivers - Audio driver is the software that helps your operating system to
communicate with audio devices such as internal sound cards, speakers,
headsets, and microphones.
2. Graphic Drivers - The software that links the operating system to a particular
graphics card. Aside higher resolution graphics, graphics driver can also speed up
your PC and boost your computer's performance, not only for gaming but for any
multimedia application.
3. Network (LAN) Drivers - A network driver is a software program that controls a
device used to connect a computer to a network.
Plug-and-Paly Device
Plug and play (PnP) refers to a computer's ability to detect and configure hardware
automatically without requiring the user to install any device drivers.
Drivers are required for plug and play devices to work, but they are automatically
installed when the device connects to a computer. The operating system detects the
device and installs the necessary drivers. There is no need to manually install
separate drivers for a plug and play device.
Examples of plug and play devices
There are many different plug and play devices available for computers. Below is a
list of common ones.
1. External hard drive 4. Mouse
2. Gamepad or joystick 5. USB flash drive
3. Keyboard 6. Webcam
342
Achievers Computing for JHS Basic 9
How to Install, Update and Delete Drivers
Driver installation or updates for devices, such as network adapters, monitors,
printers, and video cards, are automatically downloaded and installed through
Windows Update. But if you want to manually install, update or reinstall (delete) a
driver, here is how to do it.
To Install, Update or Delete (uninstall) Driers on windows 10:
1. Right-click on the Start menu
2. Locate and select Device Manager
Note: Some drivers may require you to restart your computer after an
installation, update or uninstallation of drivers.
343
Achievers Computing for JHS Basic 9
SUB-STRAND 2
TECHNOLOGY INT HE COMMUNITY (COMMUNICATION)
CONTENT STANDARD
Demonstrate the Use of Technology in the Community
Indicators
At the end of this content, learners will be able to:
Students are to discuss problems in the community that can be solved using
technology. Work in pairs.
344
Achievers Computing for JHS Basic 9
SUB-STRAND 3
HEALTH AND SAFETY IN THE USE OF ICT TOOLS
CONTENT STANDARD
Demonstrate How to Apply Health and Safety Measures in the
Use ICT Tools
Indicators
At the end of this content, learners will be able to:
Evaluate health issues at workstations
Evaluate Safety Risk Reduction at issues at workstations
Chair
Chairs selected should meet the following requirements:
1. Easy-to-use control mechanisms
2. 5-point base to prevent tipping or slipping
3. Castors for carpet; braked castors for hard surfaces
4. Fully adjustable to accommodate different size
workers
5. Conform to the lower back curve of the user
6. No arms, or if necessary, arms must be adjustable in
height and direction so that they do not prevent you
from getting as close to the desk as possible.
345
Achievers Computing for JHS Basic 9
Keyboard
1. Place directly in front of the body to avoid twisting the neck or torso
2. Position yourself in front of the computer monitor with the letters G and H
approximately in line with your navel. This is particularly good positioning when
doing a lot of keyboard work
3. Position yourself so that you can reach the keyboard with your elbows in a
neutral position by the side of the body
4. Arms should be parallel to the floor when fingers are placed gently on the
keyboard. The seated elbow height should be a little higher than the height of
the keyboard. Raise or lower your chair to achieve this position
Mouse
wrist and forearm muscles. Ensure the mouse is not too large so that the wrist is in
a neutral position during use.
1. Take the hand off the mouse at frequent intervals
2. Use keyboard shortcuts where possible.
3. Position the mouse directly to the right or left-hand side of the keyboard
4. Mouse operation can alternate from left-handed to right-handed to minimize
strain on one hand.
Laptop
Laptops are not designed to be used for long periods. The
monitor and keyboard are so close together that they
cannot both, be in good positions at the same time. If you
are using a laptop for long periods, it is best to add a
separate monitor and keyboard use an adjustable stand so
you can view the screen at eye level.
Headset
If you use a telephone frequently or use your computer when on
the telephone:
1. Consider using a headset to prevent awkward neck postures
2. Position the telephone on your non-dominant side within easy
reach.
346
Achievers Computing for JHS Basic 9
Paper / Document Holders
If you read from documents whilst typing, consider using a document
holder/stand, located either in line with the keyboard or to the side of the
monitor on an angle.
Good lighting System
A crucial component to setting up your workstation is your
lighting, which can be associated with vision problems
(eyestrain, dry eyes, itchy/irritated eyes), health problems,
and reduced work performance. Computer work can be
particularly visually demanding. Ergonomics experts
recommend good lighting to reduce eye strain and avoid
stretching out your neck at an unnatural angle.
Best Lighting for Your Work Space
1. The ambient lighting you use should be low or
glare free.
2. Your light level should be appropriate for your tasks.
3. Use blinds or drapes to control the light from windows.
4. Fluorescent lighting is preferable to other types of office lighting.
347
Achievers Computing for JHS Basic 9
is similar to a light bulb, where current runs
through a wire and gets hot, glowing from the heat. As expected, a lightbulb is hot
to the touch after you have had it on for a while.
1. Allow for Airflow: Make sure there is enough space around your devices; about
2-3 inches, and make sure the vents are clear and that there are no loose items
that could obstruct airflow around your electronic devices.
Most printers, computers, routers and other electronic devices have vents
located on the back or on the side. This configuration allows cool air to be pulled
in to the device from the front or from the sides and for the hot air to be forced
out through the back or to the sides.
2. Position Electronics Away from Heat: Never place your computer by a window
under direct sunlight. Move the computer to a cooler and cleaner area. It is best
to position it along the path of airflow from a fan or air conditioner
3. Do not Stack Them: Electronic devices get hot enough on their own. Stacking
them on top of each other produces and conducts even higher temperatures.
Keep your devices spread out and use shelves whenever possible.
4. Keep It Clean: Dirt in the form of dust, human or pet hair, etc. may slow down
the fan and eventually cause it to stop. Blow the dust away from all of your
gadgets. Remember to keep all of the vents clean and unobstructed.
devices, and keep the area clear to allow for proper airflow.
348
Achievers Computing for JHS Basic 9
ASSESSMENT TASK
Multiple choice
1. All the following are examples of A. Hard drive
wearable devices except B. Google drive
A. Mobile Phone C. One drive
B. Google glass D. iCloud
C. Smart watch
2. The digital form of printed book is
Structured Questions
well known as 1. What is cloud storage?
A. Digital book 2. State two advantages and
B. E- book disadvantages of cloud storage
C. E-paper 3. List four (4) examples of e-book
3. Saving your files in a remote location reader
and access them later through the 4. Identify any three (3) uses of google
internet is called? glasses.
A. Cloud storage 5. Explain the following terms
B. Internet storage i. E-paper
C. Remote storage ii. E-book
4. All the following are examples of iii. Smart card
smart card except iv. Plug and play
A. Ghana card 6. Identify any three (3) ways to reduce
B. ATM card excess heat caused by computers
C. Voters ID card and printers.
D. SSNIT card 7. State three (3) ergonomics each of
5. Which of the following is not an using the following devices.
example of plug and play device? i. Mouse
A. Printer ii. Keyboard
B. Mouse iii. Chair
C. Keyboard 8. List the steps involved in changing
6. Which drivers control the proper the desktop icon.
functioning of audio devices 9. Mention any four (4) examples of
connected to the computer system plug and play device
A. LAN drivers 10. State three (3) disadvantages of e-
B. Sound drivers book over printed book.
C. Graphic drivers 11. Explain the term perceptual
7. Which amongst the following is computing.
not an example of cloud storage
349