Computer Studies Notes S.4
Computer Studies Notes S.4
Computer Literacy
This refers to having knowledge and understanding of computers and their uses.
1
TOPIC 7: COMPUTER COMMUNICATION AND NETWORKING
o Introduction to Networking
o Networking
TOPIC 8: SPREADSHEETS
o Introduction to Spreadsheets
o Microsoft Excel
COMPUTER SCIENCE
This is the study of computers including their design and how they are operated
Technically, a computer is an electronic device that receives, processes, stores data and outputs
information.
A computer can also be defined as a general purpose machine which can receive, store process data and
output information.
It is the processing machine or device made up of electronic and electro-mechanical components that can
perform computations including arithmetic and operations.
It is an electronic device capable of interpreting and executing programmed commands for input, output
computation and logical operations.
A computer is an electronic programmable device that receives, stores, processes data and output
information.
Note:
Data refers to the raw facts of input by the user (a person operating a computer) into the computer.
2
Information refers to the processed facts of output by the computer to the user for the purpose of decision
making or record keeping.
Others
To get employment opportunities in future
To get first hand information around the world
To answer questions about computer in an exam
ADVANTAGES OF COMPUTERS:
1. Speed: A Computer can perform a lot of work in a short time.
2. Accuracy and consistency: If a Computer is properly programmed, it can hardly make a mistake.
3. Reliability: Computers are very reliable as tools of data processing. They can do the same task
over and over again without making a machine processing error
4. Safe storage: Computers are equipped with a lot of memory that helps them to Store data safely.
5. Performs Variety of tasks: A Computer can do a variety of tasks like giving entertainment, film
shows, telephone, and Communication service etc.
6. A Computer makes data less bulky. Since large volumes of data can be stored on magnetic disks
as tinny Electromagnetic particles thus saving people from piling files and files of papers.
3
7. A Computer stores data for retrieval: (Receives) Stores and brings back). This enables one to use
data for future references.
8. A Computer prints out neat work.
9. A Computer is economical to use i.e. it requires less manpower.
10. They help in breaking boredom since one can access many games using computers.
Advantages of computers
It is a source of employment opportunities
It has simplified communication
Computers are a source of entertainment e.g. one can easily play computer games, music,
watch a movie online etc.
Computers simplify work since they operate at a very fast speed
Computers are accurate and reliable
Computers are a source of information e.g. a computer having internet services can provide
information about anything all over the world
Various research works can be done using computers connected to the internet
Computers store data for a long time which can be used in future
Computers have the ability to simply handle more than one task at a time (multitasking)
Running costs become lower in the long run
Computers are flexible i.e. they perform the tasks depending on the user’s interests
Computers are diligent i.e. they do not get tired unlike human beings
It is programmable i.e. you can give it instructions and it follows them
Etc.
Disadvantages of Computers
They are expensive to buy and maintain
Computers have led to unemployment
They do not favour the blind
It takes a lot of time and money to learn how to use the computer
Computers have led to moral decay i.e. there are a lot of pornographic images and literature
on the Internet
Etc
4
(i) Input: computers making inputting any data such as words, articles relatively easy. Examples of
input devices include keyboard, computer mouse, microphones, and scanners e.tc.
(ii) Processing: computer can rapidly solve all types of numerical problems. Solving numerical
problems can be considered as an example of computer processing. Computers are accurate and
error free, the can huge amount of information at the same time.
(iii) Storage: computers have a high storage capacity and are able to store all types of information
and graphics & retrieved when needed. Examples of computer storage include hard disk, CD-
ROM, DVD-ROM and others.
(iv) Output: computers can produce output in different formats. For example soft copy and hard
copy outputs
5
(b) Uses o f computers in Research
1. Computers are dispensable throughout the research process.
2. Data Storage: Data can be stored for immediate use or can be stored in auxiliary memories like
Compact disks, memory cards, so that they can be retrieved later.
3. The computers assist the researcher throughout different phases of the research process.
4. In scientific research they are used at all stages of study-from proposal/budget to
submission/presentation of findings.
5. They have made searching the literature and references easier through use of electronic
databases on the World Wide Web e.g. an online encyclopedia such as Wikipedia has over 15
times as many words as compared to printed Encyclopedia like Britannica.
6. Computers have tools such as Spell checking, cut-and-paste, etc., which make compiling and
editing research work easier.
7. A lot of statistical software is available for performing calculations and analyzing the collected
research data.
8. Research publishing: The research work can be converted to Portable Document Format (PDF)
and published to the World Wide Web.
6
Communication: Coworkers can easily communicate with each other through e-mail. Customer
service departments can also use e-mail and instant messaging services to communicate effectively
with customers.
Software Development: Software can only be made using computers for the purpose of helping
businesses to combine processes and carry out their work properly.
Seminars, conferences and meetings can be scheduled with bosses and big corporate giants through
web conferencing that can be heard by all the employees simultaneously.
Customer Interaction: Computers now assist human call centers with answering customer
questions, taking payments and providing general assistanceU
7
4. Computers are used for capturing data for Police National Computer Databases, Vehicle Number
Plates, Criminal finger prints etc.
5. Data storage: information about criminals under investigation by security organs like police, is
today more safely or securely stored in computers.
6. Closed- Circuit Television (CCTV) systems right from home, on the streets, in the work
places/offices like banking halls shopping malls, are indeed tightening security in those areas.
7. Gadget-tracking devices like car, laptop, mobile phone trackers, are also present today.
8. Computers are used to detect presence of illegal devices such as bombs.
9. Computers are also used for controlling dangerous weapons such as missiles.
10. Computers help design and test new systems
However, computers are not always the answer. In some areas human being may be better than computers.
8
Where human feelings need to be taken into account
When it comes to performing tasks that are different every time
In a situation where creativity is required
When reacting to unpredictable situations
In situations when human judgement is required or needed
This is a room that is specially designed and prepared to facilitate the installation of computers and
to provide a safe conducive environment for teaching and learning of computer studies.
Why must there be safety rules and precautions in the computer laboratory?
- To avoid accidental injuries to the users.
- To avoid damage of computers.
- To avoid lack of a conducive teaching-learning environment.
9
Speed Diligence Connectivity
Accuracy Artificial Intelligence (AI) Multitasking
Storage Automation
Speed
Computers are very fast in their operations in that their speed in measured in millions of instructions per
second (MIPS)
Accuracy
Computers are known to be so accurate that they hardly make any mistake. In fact computers are capable of
detecting and correcting wrong mistakes made. It follows therefore that if wrong data is fed into the
computer, wrong results are expected out. Hence the saying, “garbage in garbage out” (GIGO)
Storage
For a computer to be able to work, it must have some
work space where data is stored before being processed or where information is stored before being output
to particular devices. This storage space is called memory.
Diligence
Computers have the ability to perform the same task over and over without getting bored or tired. This is
seen in industrial robotics, like in car assembly lines.
Artificial Intelligence
Computers are artificially intelligent. They can respond to requests given to them and provide solutions.
This is accomplished by the power of the programs installed in them.
Note:
1. Installation is the term used to refer to the act of adding or improving a program on your computer
2. A computer program is a set of instructions written in computer language e.g. Microsoft word, Microsoft
excel, Microsoft Power point, Microsoft Access, Microsoft Publisher, Note pad, Word pad etc.
Automation
Computers work automatically. They do not need any supervision in order to perform programmed
routines.
Multitasking
Computers have the ability of handling different types of tasks at the same time. i.e. a user can instruct it to
print, scan for viruses, play music, search for the lost file, to mention but a few. All the above activities can
be done at the same time or even more. Hence the term multitasking.
Connectivity
If computers are joined together i.e. interconnected using a given network media, then connectivity
becomes another characteristic. This is aimed at sharing resources such as files, printers, programs, disk
drives, etc.
Computer classifications
Computing devices fall into various classes. The basic computer classifications include;
1. Classification by purpose 3. Classification by size
2. Classification by process 4. Classification by processor power
Classification by purpose
Here computers are classified according to the work they are designed for. This classification is further
divided into two sub-classes i.e.
10
Special purpose computers General purpose computers
Classification by process
1.6: Categories of Computers
Computers can be categorized according to the process they use to represent data. People
communicate through speech by combining words into sentences. Human speech is analog because
it uses continuous (wave form) signals that vary in strength and quality. Most Computers are
Digital.
Computers can generally be grouped under three (3) categories i.e.
a) Analog Computers
b) Digital Computers
c) Hybrid Computers
a) Analog Computers
An analog Computer is a computing device that uses continuously changing values to represent
information.
These computers that represent data or information as continuous variable quantities or Units! It
generally deals with physical variables such as temperatures, weight, voltage, pressure, speed, etc.
b) Digital Computers
Digital Computers are those, which represent data or information as numerical (binary) digits.
These are computers that use discrete (discontinuous) values, i.e. binary digits (0, 1) to represent
data.
Data entered is represented as a series of 0,s and 1’s, also kwon as binary notation or base two and
is handled by micro processors.
The binary digits simply mean the presence or absence of an electric pulse or voltage. The state of
being ON is represented by 1 and OFF is represented by 0.
11
Although digital representations are discrete, the information represented can be either
discontinuous, such as numbers, and letters, or continuous such as sounds, images, and other
measurements of continuous systems.
Digital computers are more accurate and work at a very fast rate.
Here general purpose computers are classified according to how data processed is presented. This
classification is further divided into 3 sub-classes i.e.
Digital computers Analog computers Hybrid computers
Digital computers
These are computers that process data that is presented in form of discrete values, i.e. discrete values are
numbers that can be defined like 1, 2, 3, 4, 5, etc. digital watches are an example
Analog computers
These are computers that process data that is in a continuous form or measurable quantities/units e.g.
pressure, temperature, electrical voltage are variable quantities. Examples of analog computers include
those used in applications like thermometers, voltmeters and speedometers.
12
Hybrid computers
These computers have the combined features of both digital and analog computers i.e. they deal with
analog signals and digital signals at the same time.
Note:
The transfer of digital signals to analog signals is called modulation and analog to digital is called
demodulation hence the term “Modem”.
Classification by size
Here hybrid computers are classified depending or according to the user capacity and size of the machine.
This classification is further classified into 3 sub-classes or categories i.e.
Super computers Mini frame computers
Mainframe computers Microcomputers/Personal computers
Supercomputer
An extremely fast computer, which can perform hundreds of millions of instructions per second
Main Frame
These are very large computers normally owned by the state and process data at high speed. Multi-user
computer system capable of supporting hundreds of users simultaneously. Software technology is different
from minicomputer.
13
Desktop computers
These are designed to be stationed in one place probably on top of a desk or table
Laptop computers
These are computers that are smaller than desktop computers and are designed for mobile computing. They have
all the facilities and system resources offered by desktop computers
Palmtop computers
These are smaller than laptop computers. They are designed for those people who are ever on the move. Like the
laptops, palmtops have all the facilities and the system resources offered by desktop computers.
REVISION QUESTIONS:
(a) What are the differences between a mainframe Computer and a microcomputer?
(b) Briefly comment on the various computer classifications used to identify the different types.
(c) List at least four main types of computer processors familiar to you.
(d) Explain four ways in which computers may be classified according to size.
(e) Briefly elucidate on the five advantages of personal computers over mainframes.
The IBM 360 is introduced in April of 1964 and quickly becomes the standard institutional mainframe
computer. By the mid-80s the 360 and its descendents have generated more than $100 billion in
revenue for IBM.
15
Intel introduces the 8008, the first 8-bit microprocessor in April of 1972.
Jonathan A. Titus designs the Mark-8 and is featured in the July 1974 Radio Electronics.
In January 1975 Popular Electronics features the MITS Altair 8800; it is hailed as the first
“personal” computer.
Paul Allen and Bill Gates develop BASIC for the Altair 8800. Microsoft is born!!!
Apple is selling its Apple II for $1,195, including 16K of RAM but no monitor by 1977.
Software Arts develops the first spreadsheet program, Visicalc by the spring of 1979. 500 copies
per month are shipped in 1979 and sales increase to 12,000 per month by 1981.
By 1980 Apple has captured 50% of the personal computer market.
In 1980 Microsoft is approached by IBM to develop BASIC for its personal computer project. The
IBM PC is released in August, 1981.
The Apple Macintosh, featuring a simple graphical interface using the 8-MHz, 32-bit Motorola
68000 CPU and a built-in 9-inch B/W screen, debuts in 1984.
Microsoft Windows 1.0 ships in November, 1985.
Microsoft’s sales for 1989 reach $1 billion.
WEBSITES
http://www.pbs.org/nerds/timeline
http://www.maxmon.com/history.htm
http://ei.cs.vt.edu/~history/
http://www.cybergeography.org/atlas/historical.html
http://www.computerhistory.org
COMPUTER GENERATIONS
The term computer generation refers to the various stages computers have under gone from the first computer,
present and the future computers.
There has been four (4) general computer generations in the history and evolution of computers. This is from
1640s to 1980s.
First ()1940s – 1960s) Second (1960 – 1964) Third (1964 – 1970s) Fourth (1970s – 1980s)
Vacuum tubes Transistors Integrated Circuits Large Scale Integrated
(ICs) Circuits (LSICs)
Hundreds of computers Thousands of Ten thousand Millions of computers
16
in use computers in use computers in use in use
1000 circuits per cubic 100,000 circuits per 10 million circuits per Billions of circuits per
foot cubic foot cubic foot cubic foot
ENIAC, EDSAC, Minicomputers Microcomputer
“
EDVAC, UNIVAC developed developed
17
Examples of Second generation computers
NCR 501
IBM 7094
CDC 6600 (Mainframe computers)
IBM 1401
Etc.
18
Palmtops
Process
Collection of data
This involves capturing data from different sources such as text book, Internet, people, etc, and recording it onto
some media such as paper.
Preparation of data
19
This stage involves copying, grouping or arranging data in a more convenient way for input.
N.B
Checking and verifying the data collected are done at this stage.
Data verification is checking of mistakes or transmission errors when data is copied from one place to another.
Data validation: This is the checking of input data for errors before processing.
Data validation techniques
Presence check: This is to ensure that data is actually present.
Range check/character check/alphanumeric check: This is to ensure that entered data is of correct type like
numeric or alphabetic.
Consistence check: This is to compare new data with previous data e.g. current gas meter reading against past
readings.
Control total check: This is to compare the computer calculated total like the total value of all the invoices with
the manually calculated total.
Hash total check: Is to compare the computer calculated total with the manually calculated total
Input of data
It involves entering the data or sending the stored data into the processing system. Checking the accuracy and
validity of the input data are often done at this stage.
Output of information
This stage involves giving out the processed results in a readable form or report.
Data verification
This refers to the checking of input data for errors before brought out. E.g. is it of the correct data type.
20
Hard ware Human ware /Live ware
Soft ware Procedure.
Data /information
When one computer system is set out to communicate with another computer connectively becomes the
sixth system element.
N.B:
The two main parts of a computer system are hard ware and software.
1. Humanware:
People operate the computer hard ware. They create the computer software instruction present.
Human ware/Users/People –This is the most important component of a computer system.
Human ware refers to the people who operate and initialize instructions to the computer system
They design and develop computer systems, operate the computer hardware, create the software,
and establish procedures for carrying out tasks.
Kinds/types of users
There are two kinds of Computer Users:
Ordinary user - is someone without much technical knowledge of computers but uses computers to
produce information for professional or
personal tasks, enhance learning, or have fun. Ordinary users include Computer students, Typists
(Secretaries), etc.
Professional user -is a person in a profession involving computers who has had formal education in
the technical aspects of computers; Examples include Computer programmers, webmasters, etc.
2. Data/information:
Data is the raw material used to get information in other wards its un evaluated facts and figers or
instructions.
This raw material is processed into useful information. In other words information is a product of data
processing.
This processing involves refining, summarizing and categories etc.
3. Software:
This is a term used to describe the instructions that tell the hard ware how to perform tasks.
OR
These are intangible components of a computer.
Procedure;
These are various steps one uses to utilize the computer effectively e.g. to open any start button.
Click on the start button.
Move to All-Programs and click on it.
Select Microsoft office.
Finally select a program to use.
4. Hard ware:
These are physical, tangible components of a computer. There devices enable the user to enter data into the
computer, view the output on the screen, print, process, store the information etc.
N.B
Hard ware + Software = A working system
21
CLASSIFICATION OF HARDWARE COMPONENTS
These hard ware components can be classified as follows.
Input devices The Central Processing System (CPU)
Output devices Memory
Input Devices
Input devices are used to enter data or commands in a form that the computer can use.
They send the data or commands to the processing unit. According to the type of data they input,
they can be grouped into the following:
Text input devices
Pointing input devices
Imaging input devices
Gaming input devices
Audio input devices
Biometric input devices and
Other Specialized input devices
1. The Keyboard
Definition: A keyboard is an input device, consisting of a set of keys used to operate a computer.
A keyboard is the main and most reliable computer input device. The QWERTY is referred to as
the "Universal" keyboard layout. Other keyboard layouts include: Dvorak, ABCDE, GKOS,
QWERTZ and AZERTY
Advantages of Keyboard
Keyboards are very common (commonly supplied with computers)
Entering data and commands with keyboard is faster as compared to the mouse
Keyboards are more reliable
22
Demerits of Keyboard
It takes a lot of time to practice in order to type quickly
Keys can easily become faulty due to dust.
Some keyboards keys are very hard to press, causing fingers to hurt.
Advantages
No typing of data is necessary.
Voice recognition can be used by people whose hands are disabled.
Dictating text is faster than typing.
Voice Recognition systems are also ideal for the blind.
4. Barcode readers
A bar code reader is an optical reader that uses laser beams to read bar codes that are printed on
items usually in super markets.
6. MICR readers
Magnetic-ink character recognition (MICR) reader is used to read text printed with magnetized ink.
MICR readers are mainly used by the banking industry for processing checks.
7. RFID readers
Radio-Frequency Identification (RFID) is a technology that uses radio waves to transfer data from
an electronic tag, attached to an object, through a reader for the purpose of identifying and tracking
the object. An RFID tag can be affixed to cars, computer equipment, books, mobile phones, etc.
23
(b) Pointing Devices
A pointing device is an input device, which allows users to move a pointer and make selections on
the computer screen. A pointing device is any piece of hardware that is used to input spatial data
into a computer.
1. The Mouse
Mouse - The mouse is a hand held device that lets you point to and make selections of items on
your screen. In a PC mouse there are mostly 2-3 buttons.
2. Stylus pen & digitizing tablet
Stylus pen- The pen lets you draw on what is called a digitizing tablet that mirrors the surface area
of the computer screen. The pen can be used as a standard mouse (without wires connected to it) or
also as a free flowing drawing device.
3. Cordless Mouse
Cordless Mouse –is as a normal mouse, but has no wire that connects it to the system unit. Instead
it uses batteries to broadcast a radio signal to a sensor that is connected to the system unit usually
through the USB port
4. Trackball
The trackball is an upside-down mouse that remains stationary on your desk. It is the same
principle as the mouse except that the rollers are reversed and the ball is on top.
5. Touchpad
The touchpad has sensors that sense your touch. When they sense your touch they send a signal to
the computer to move the mouse pointer to that location on the screen. Common on laptop
computers
6. Joystick
Joystick- Consists of a stick that pivots on a base and reports its angle or direction to the device it is
controlling. Joysticks are often used to control video games, and usually have one or more push-
buttons whose state can also be read by the computer.
7. Light pen-
Light pen- is a form of a light-sensitive wand used in conjunction with a computer's CRT TV set or
monitor. It allows the user to point to displayed objects, or draw on the screen, in a similar way to a
touch screen but with greater positional accuracy.
8. Touch Screen-
Touch Screen- The touch screen lets the user touch the area to be activated by using the finger or
hand.
9. Track Point
A Track Point, also called a pointing stick, is a cursor control device located in the middle of the
keyboard between the G, H, and B keys. The control buttons are located in front of the keyboard
toward the user.
(c) Imaging Devices
24
Imaging input Devices are devices that input images such as still photos, motion pictures, graphics,
video etc. into the computer for processing.
1. Image scanner
A scanner is a light-sensing input device that converts hardcopy documents, drawings, or pictures
to an electronic version (softcopy), which can then be stored on a disk. The electronic version of
scanned material is in the form of rows and columns of dots called a bitmap. Each dot on a bitmap
consists of one or more bits of data.
2. Digital Camera
A digital camera allows users to take pictures and store the photographed images digitally instead
of storing on a traditional film. When you take pictures, the images are electronically stored in the
camera.
4. Camcorder
This is a light weight video camera that records data in digital form onto a storage device such as a
videotape.
5. Web Cam
A Web cam, also called a PC video camera, is a type of digital video camera that usually sits on top
of the monitor. Some laptop computers have built-in Web cams.
25
Gaming input devices are devices specifically designed to be used for playing computer games.
Examples Include:
Gaming keyboard
Gaming wheels
Joystick
Game pad
Light guns
Dance pad
Motion sensing game controllers
1. Gaming keyboard
Gaming keyboards typically include programmable keys so that gamers can customize the
keyboard to the game being played.
3. Gamepad
A gamepad controls the movement and actions of players or objects in video games or computer
games. On the gamepad, users press buttons with their thumbs or move sticks in various directions
to trigger events.
4. Light guns
A light gun is used to shoot targets and moving objects after you pull the trigger on the weapon.
Instead of emitting light, most light guns work by detecting light.
5. Dance pad
A dance pad is a flat electronic device divided into panels that users press with their feet in
response to instructions from a music video game.
1) Microphones
A microphone is an instrument for converting sound waves into electrical energy variations, which
may then input into the computer for processing, recording or audio playback.
Microphones are connected to the sound card in the system unit.
26
2) Sound Card
It is a device that can be slotted into a computer to allow the use of audio components for
multimedia applications. Without a sound card, Audio input and output is not possible.
3) MIDI devices
MIDI (musical instrument digital interface) is the standard that defines how digital musical devices
represent sound electronically.
4) Dictaphone
This the earliest device most commonly used to record speech for later playback or to be typed into
print. It was established by Alexander Graham Bell in Washington, D.C. in 1881.
1. Fingerprint scanner
A fingerprint scanner captures curves and indentations of a fingerprint.
27
Various sensors can be used to measure heat, light, temperature, acidity, oxygen concentration,
water flow, etc.
Alphanumerical/Character keys
These are keys on the main typing area having alphabetical letters i.e. marked from A – Z and are basically
used for keying words.
Numeric keys (0 - 9)
These are keys representing the numerals. They are marked from 0 – 9 and are used for keying numbers.
They are in two sets; a line of them runs just above the alphabetical keys and another collection on the far
right corner on an area called Numeric Key pad that sometimes works as an adding machine.
Function keys
These run across the top of a keyboard and are marked F1 – F12. They have different functions i-n different
application programs.
28
On Windows Explorer F2 lets you quickly rename the selected file or folder.
Alt + Ctrl + F2 opens the Documents Library while on MS Office suite.
F3
Whilst on desktop or Windows Explore press F3 to search for files and folders.
On most browsers (at least on Firefox, Chrome and IE) F3 is an instant way of finding something by
launching the Find bar.
Repeats the last command on MS Dos.
Shift + F3 toggles between capitalizing each word, lower case and upper case for selected text on MS Word.
F4
Known to all, Alt + F4 closes the current program. When no program is running it launches the Shutdown
dialog box.
On Windows Explorer it takes the focus or cursor to address bar. It does the same on Internet Explorer.
F5
Performs the refresh action on Windows and all common browsers that we know of.
Use it on PowerPoint to start a slide show.
Opens Find, Replace, Go to dialog on MS Office programs.
F6
On Windows desktop pressing F6 tabs from desktop files to the taskbar and the system tray icons.
Focuses on the address bar on most browsers.
Toggles between the menu items and workspace on MS Office suite.
F7
Could not figure out anything for Windows.
Turns on Caret browsing on Mozilla Firefox. This feature places a moveable cursor in web pages, allowing
you to select text with the keyboard.
F8
Enters the Windows Start Menu (commonly used to launch the safe mode) if pressed during boot process.
F9
Still looking for something significant.
If you are a programmer you would know its uses on Integrated Development Environments. Generally,
compiles and runs the code in combination with Ctrl key.
F10
Shows the Menu bar in Firefox and IE or highlights the same on most programs.
Shift + F10 is equivalent to right-click and pops out the context menu.
F11
Opens full screen mode in Windows Explorer and all browsers.
On MS Excel Shift + F11 adds a new sheet and Ctrl + F11 adds a new macro to the workbook.
F12
Conclusion
While we have tried our best to explore what we could, we might have missed out on some uses of function keys.
Well, that’s why we’ve got awesome readers like y’all, right? Share what you know and also tell us what you
discovered today through this article that you are likely to use frequently from now on.
Special keys
Enter key (Return key)
It confirms to the computer whatever is typed i.e. when a command is issued it can only be executed after
pressing enter key.
Delete key
Erases the character to the right of the cursor and moves the cursor one position to the right.
29
Escape key
It has many uses but it is most commonly used to cancel an action that is being under taken.
Escape key
It has many uses but it is commonly used to cancel an action that is being undertaken.
Shift key
The shift key performs two functions i.e.
1. Turn to upper case or lower case depending on the keyboard case mode. Holding down the shift key
and pressing any letter from A – Z, turns the particular letter to the case that is opposite to the
current one.
2. Activating characteristics on top of the buttons with two characters in the type writer area e.g. !, @,
#, $, %, *, ?, <, etc.
In all the above two functions, hold down the shift key and press the button in question when the shift key
is still down.
Space bar
This is the longest button on the keyboard. It is used for inserting spaces between words and characters.
2. Navigation/Arrow Keys
These are used for moving around in documents or web pages and editing text. They include the
arrow keys as well as the Home, End, Page Up, Page Down, Delete, and insert keys.
Arrow Keys are four in number;
Up Arrow Key: Moves the cursor upwards line by line
Down Arrow: Used to move the cursor downwards line by line.
Left Arrow: Moves the cursor to the left one character.
Right Arrow: Moves the cursor to the right one character
30
d. Page Down: Displays on the screen the content of the following page(s).
e. Insert: The insert key is a toggle key that switches from insert to overstrike or write mode and
vice versa. Normally if you move the cursor to a place in your document and start typing, you
insert information without deleting existing characters.
Note:
When entering data into your computer, you should be aware that the zero (0) and letter O are not used
interchangeably.
Number 1 and small letter are also not used interchangeably.
NOTE
A key-pad is an electronic device that enables the linkage of characters labeled on the keys to the
computer system.
When a keyboard character is typed, it is pressed on a keypad which transfers it as an electronic
signal to a processor (Central Processing Unit)
A standard keyboard of a personal computer is made up of 102 - 105 keys. There is a wide variety
of keyboard designs including the full sized, immature and flexible ones.
31
p. Ctrl+P – initiates the print wizard for the currently open document/page.
q. Ctrl+S – allows you to save the current file or document.
r. Ctrl+Shift+Esc – immediately brings up the windows task manager.
s. Ctrl+X – completely cuts or moves the selected item or items to the clipboard.
t. Ctrl+V – pastes the previously selected item or items, from the clipboard. Alternatively, one can
press Shift+Insert.
u. Ctrl+Z – is used for Undoing a previously done action(s). However, one can press Ctrl+Y to Re-
do the previously undone action.
v. Shift+F10 – simulates the right click option on the selected item.
32
The control buttons are located in front of the keyboard toward the user.
The Mouse
It is a pointing device that acts as an electronic figure. It is used for selecting and issuing commands in
windows and software (application) packages. It is normally represented on the screen by an arrow called
Mouse Pointer. The mouse has 2 buttons on the top i.e. left and right hand click buttons.
3. Double clicking
This means clicking twice in a rapid succession i.e. pressing and releasing the left mouse button twice but
very fast or simultaneously. Double clicking is used for launching actions like opening icons, programs,
etc.
4. Dragging
This means moving an item on the screen i.e. moving an item from one position to another on the screen.
The item can be an icon or even a window.
Barcode reader:
Stripped barcode are bow found on most products in shops.
A barcode reader is a unique combination of vertical lines together with a numeric code that is printed onto
a small label on a product packaging.
Scanner:
It is an input device that leads images or text and converts the data into what we call digital signals.
Scanners are widely used in graphic studios but libraries to active volumes of paper basal information.
Light pen:
A light pen is an input device which uses light sensitive stylus to select items or draw directly it on the
screen or digitalizing label.
Digital:
Looks like a usual camera but it does not have a film but instead uses a memory to store photos. Its later
connected to the computer where all photos are copied and later printed.
Joystick:
A joy stick looks like a gear of a car which helps in controlling objects or pictures on the screen especially
when playing games.
33
Digitalizes:
It looks like a mouse except that it has a glass with across in the middle. It is mainly used in drawing maps
or architectural drawings to accurately trace out lines on the map.
Buses
The BUS is a common electrical path that enables data flow between the various system
components.
A bus allows the various devices inside and attached to the system unit to communicate with each
other. All buses consist of two parts:
The data bus which transfers actual data bits and
The address bus which transfers information about where the data should go in memory.
Ports
A port is the point at which a peripheral attaches the system unit.
Through a port, the peripheral can send data to or receive information from the computer. A
peripheral device, such as a keyboard, monitor, printer, mouse, digital camera, and microphone,
often attaches by a cable to a port on the system unit.
Common ports
A serial port is a type of interface that connects a device to the system unit by transmitting data one
bit at a time. A serial port has pin holes and usually connects devices such as mouse and keyboard.
USB (Universal Serial Bus) ports are used in high-speed device interfaces.
Bluetooth ports use radio waves to transmit data between two devices, without using cables.
Connectors
A connector joins a cable to a port. A connector at one end of a cable attaches to a port on the
system unit, and a connector at the other end of the cable attaches to a port on the peripheral. Most
connectors are available in one of two genders: male and female.
Male connectors have one or more exposed pins.
Female connectors have matching holes to accept the pins on a male connector.
34
The CPU
This is the electronic device that interprets and carries out instructions that tell the computer how to
work.
Output devices
These are hardware components that provide processed data (information) to the user. These devices
display the results of all the processed data.
- Display device - Data projector - Terminal
(monitor/screen) - Facsimile machine - Plotters
- Printer - Malfunction machine - Light emitting diode
- Audio output device (speaker)
Display device/monitor/screen.
The monitor is the primary output device
It holds information on a screen for temporary use.
Monitors can be monochrome means that information displays in one colour on a different colour
background e.g. black on white.
Disadvantage
- LCD monitors are usually more expensive than CRT monitors
- LCD monitors can only be viewed from a very narrow angle
CRT monitors use an analog signal to produce a picture while LCD monitors use a digital signal to produce
a picture.
35
- Screen displays can include text, graphics and colours
- Display devices are usually quiet
- No paper is wasted for obtaining output
- The display devices are the user’s work – place, hence making it easier to use
- Transmission to another device is faster e.g. on a LAN
- Output can be modified or changed easily, scrolling enables to focus on a particular or point of the
document.
Printers
A printer is an output device that produces text and graphics on a physical medium such as paper.
The information that has been printed is termed as “hard copy”
Categories of printers
Printers are grouped into two main categories i.e.
1. Impact printers
2. Non-impact printers
IMPACT PRINTERS
These are printers that form characters and graphics on a piece of paper by striking a mechanism against an
ink ribbon that physically contacts the paper.
An impact printer forms characters and graphics on a piece of paper by a striking mechanism
against an ink ribbon that physically contacts the paper. Impact printers are noisy because of this
striking activity.
36
o can withstand dusty environment
Disadvantages
- Generally noisy because of the striking activity
- Produce near letter quality NLQ print only which is just suitable for printing, making labels,
envelopes or invoices
- Cannot produce multipart forms
Note:
1. Most dot- matrix printers use continuous form paper
37
2. A higher number of pins on the printer head means more dots are printed, which results in higher
print quality i.e. a 24 pin printer has better print quality than a 9-pin printer
3. The spread of a dot – matrix printer is normally measured by the number of characters per second
(CPU) it can print.
Disadvantages
- Are generally noisy because of the striking mechanism
- Their print quality is not as good as those from ink jet printers and laser jet printers
Disadvantages
- Specialized papers are required to produce high quality colour output.
- The ink cartridge and specialized papers are expensive.
- The ink may smear when printing on ordinary paper
Advantages of printers
38
- Information produced is permanent
Disadvantages of printers
- The time to get the print out is slow, when compared with display devices
- Paper is wasted for obtaining the output
- Printers are generally noisier than display devices
Data projectors
A data projector takes the image that displays on a computer screen and projects it onto a longer screen so
that people can see the image clearly.
Facsimile machine
A facsimile (fax) machine is a device that transmits and receives documents over telephone lines.
Documents sent or received via a fax machine are known as faxes
A fax modern is a communication device that allows a user to send and receive electronic documents as
faxes
Advantages of fax
- Hard copies are available
Disadvantages of fax
- Sending a big document can be slow
- Wasteful of paper when junk faxes are sent
Multifunction
This device is a single piece of a printer, scanner, copy machine, and a facsimile machine.
39
Disadvantages
- If it breaks down, the user loses all its functionality
Terminal
A terminal is a device with a monitor and a keyboard. It can also refer to any device that sends and receives
computer data
Types of terminals
There are mainly two types of terminal i.e. dumb terminal and intelligent terminals
Dumb terminal
It is a kind of terminal which has no processing power, cannot act as a stand-alone computer, and must be
connected to a server to operate.
Intelligent terminal
It is a kind of terminal which has memory and a processor so that it can perform some functions
independent of the host computer
Speaker
This is an output device that produces information in form of sound. Most speakers have cone shaped
diaphragm to produce sound.
Spectacles:
These are common in modern computer games. The user wears the glasses like ordinary sun glasses except
that here instead of seeing through the glasses, one will be treated to a high quality three dimensional (3D)
pictures.
Data buses
These are high ways on which data travels in the computer.
Expansion slots
These are empty slots left on the main board / mother board of the computer where additional control
circuits can be added.
Mother board
This is the main circuit board in the system unit that connects all hardware together and helps to coordinate
devices.
DEVICE DRIVES
40
These are devices which work as interface between the computer and other devices connected to it.
MEMORY
Internal storage areas in the computer, the term memory identifies data storage that comes in the form of
chips, and the word storage is used for memory that exists on tapes or disks. Every computer comes with a
certain amount of physical memory, usually referred to as main memory or RAM.
Memory Terminology
Memory speed: Measured in nanoseconds, this is the time taken to access data that is stored in memory.
The lower the nanoseconds the faster the memory.
Parity: A simple error checking method used in memory correction.
ECC: Error correction code used in memory correction for newer computers.
Memory Banks: a socket where memory is installed for example 4 banks will have 8MB of memory ach
for a total of 32MB.
Types of memory:
The system unit contains two types of memory: volatile and nonvolatile. The contents of volatile
memory are lost when the computer power is turned off. The contents of nonvolatile memory are
not lost when power is turned off. RAM is the most common type of volatile memory. Examples of
nonvolatile memory include ROM, flash memory, and CMOS. Below, we discuss these types of
memory.
41
Virtual RAM (VRAM): Modern operating systems can use spare storage space on the hard disk as
if it is working memory and this is referred to as Virtual memory or Virtual RAM
Summary of the differences between ROM and RAM
ROM RAM
It is non volatile - It is volatile
It is read only - It is read and write
It is permanent - It is temporary
Normally not increasable - It can be increased
RAM
It is used to store programs apparently used by the user when the computer is working.
Memory cache
A cache is a relatively small block of very fast memory designed for the specific purpose of
speeding up the internal transfer of data and software instructions. Cache uses internal storage
technologies that are much faster than conventional RAM. Cache speeds up processing time
because it stores frequently used instructions and data. The processor first checks cache, then RAM
for needed data and instructions
Flash memory
Flash memory is a chip also that keeps its memory when the power is shut off. Flash memory can
be erased electronically and reprogrammed. Most computers use flash memory to hold their startup
instructions because it allows the computer easily to update its contents.
CMOS
42
Complementary Metal-Oxide Semiconductor (CMOS) technology provides high speeds and
consumes little power. CMOS technology uses battery power to retain information even when the
power to the computer is off. Battery-backed CMOS memory chips, for example, can keep the
calendar, date, and time current even when the computer is off.
Magnetic storage;
Magnetic tape Floppy disk Magnetic stripes on the
Hard disk Zip disk back of bank cards.
Magnetic storage devices store the data on a magnetically coated surface. They can generally be used
many times. They tend to have a large storage capacity when compared to optical media.
The main disadvantage is that the data held on these can be damaged if the device is put too close to a
strong magnetic field such as a loudspeaker.
Optical storage:
CD-ROM DVD
Optical storage devices are read by a laser beam. Generally they have a more limited storage capacity
when compared to magnetic devices. However, one advantage is that they are more hard wearing than
magnetic devices.
Magnetic storage:
43
Magnetic Tapes
Main disadvantages
Serial access – this means that in order to get to something on the tape, you have to go through
everything that comes before it. Slow – Because of serial access, it is relatively slow to find the data
that you need.
Specialist hardware is needed to read the tapes. Most standard PCs do not come with the hardware
required to use them.
Not suitable for heavy use – as you may realize from video tapes at home – they are a bit fragile
with tendency to stretch and tangle! Tape is best suited for back up purposes.
N.B. Data stored on a hard disk can be accessed much more quickly than data stored on a floppy disk.
Modern Hard drives are measured in gigabytes (GB). The most expensive computers will have the largest
hard drives. Standard systems come with hard drives between 40GB and 250GB.
44
Can have two hard disks in a machine, one can act as a mirror of the other and create a backup copy.
Floppy diskettes
The ‘floppy disk’ has been with us since the beginning of the personal computers in the 1980’s. The very
earliest ones were 8 inches across! Hence the word ‘Floppy’
Then came the 5.25 inch format which was popular for a few years. Finally the 3.5 inch floppy disk was
developed which offered a hard plastic case and sliding metal cover to protect the fragile magnetic sheet
inside.
A standard floppy disk can store up to 1.44 MB of data which is approximately equivalent to 300 pages of
A4 text.
Advantages
Portable – small and lightweight
Allows random access of data (unlike tape which is serial)
Can provide a valuable means of backing up data
Inexpensive
Useful for transferring files between computers or home and school
Private data can be stored securely on a floppy disk so that other users on a network cannot gain
access to it.
Security tab to stop data being written over.
Most computers have a floppy drive.
Can be written too many times.
Disadvantages
Not very strong – easy to damage
Data can be erased if the disk comes into contact with a magnetic field
Quite slow to access and retrieve data compared to a hard disk drive, but it is faster that tape.
Can transport viruses from one machine to another
Small storage capacity, especially if graphics need to be saved.
New computers are starting to be made without floppy drives.
This is a magnetic storage device.
CD – ROM
CR – ROM stands for Compact Disk Read Only Memory
Although we tend to talk about ‘CD – ROMS’, it is important to note that there are three types of CD –
ROMS;-
CDROM
These disks have been pre – recorded with data, for example
Music Compact Disks cannot be over written
45
Product Catalogues from suppliers
Computer games
Documentation such as technical manuals.
CD-R
These disks are blank but have been designed to be written onto once only. Disk.
CD-RW
Often described as ‘CD Read –Write’. This technology allows the same area of the disk to be over –
written many times (about a 1000 times).
In an exam questions, it is important that you can distinguish between the different types of CDs.
This is why they are known as optical storage devices. A laser beam also reads the information from the
disk. The same technique is used for CD music disks, which is why many computers with CD-ROM
drives can play audio CDs.
A typical CD-ROM can store approximately 650 megabytes of data which is equivalent to about 450
1.4MB floppy disks. The entire contents of a text based encyclopedia takes up only 25% of one standard
CD-ROM.
Advantages
Data cannot be erased from CD-ROMs CD-ROMS have a much larger storage
CD-ROMs are small and portable capacity than floppy disk.
Very cheap to produce Will usually work in a DVD drive.
Disadvantages
Fairly fragile – easy to break or scratch Smaller storage capacity than a hard disk
Because they are portable they can be lost Slower to access than the hard disk
46
DVDs stand for Digital Versatile Disk and is a relatively new technology. Like CD – ROMs, they are an
optical storage device.
These are becoming increasingly popular, and are expected to replace ordinary compact discs and video
tapes in the future. This is because a DVD disc can store between 5 – 17 gigabytes of data.
This amount of storage makes it possible to store complete movies along with special features and
multiple language tracks.
Advantages
Very large storage capacity
Sound and picture quality is excellent which makes them suitable for video and sound
Increasing availability
Price is dropping for both DVDs and DVD drives.
Does not transmit viruses.
DVD players can read CD-ROOMs
Disadvantages
Still a relatively new technology so still expensive compared to CD-ROMs
DVDs do not work in CD ROM drives.
DVD-RW
This new technology is only just becoming affordable to the general public. It is increasingly common to
have a DVD rewriter drive in a new personal computer. There are also stand – alone DVD-RW units that
allow you record television programs directly onto disk.
Advantages
Can store seven times more data than a CD-RW
Suitable for storing video and television programs
Disadvantages
There are many ‘standards’ in use, so you have to make sure you buy the correct disk for your drive.
Relatively expensive media compared to a CD-R, so you have to decide whether your data can be
stored on one or two 650 Meg disks.
47
Do not drop the disk to the ground
Don't bend the disk.
Zip drive
The zip drive is similar to a floppy drive but can store 100MB of data, at least 70 times more than a
floppy. Some zip disks store as much as 250MB.
The zip disk is slightly thicker than a floppy disk and needs a separate drive. Zip disks are particularly
useful for backing up important data or for moving data easily from one computer to another. Data is
compressed, thereby reducing the size of files that are too large to fit onto a floppy disk.
Advantages
Stores more than a floppy disk Portable
MEMORY MEASUREMENT
In memory, data is represented electronically by storage cells, which are either charged ON or
discharged OFF.
The computer memory can be represented as either, ON or OFF. Mathematically it is represented
as either 1 or 0 in the binary system or binary code.
Computers use the binary system of measurement as their basis of working, that is 0 & 1 therefore
computer memory is measured in terms of digits (BITS) which are lowest units of measurement.
To make up a single character in a computer, a group of up to eight bits will be needed; therefore
one character is equivalent to eight bits. And eight bits are equivalent to one byte.
The table below shows summary of memory measurements
Measurement
Equivalent in bytes
Actual bytes
1 binary digit (0 or 1)
1 bit
1 character, 8 bits
1 byte
20
1 KB (kilo byte)
1000 bytes
1024 (210)
48
1 MB (Mega byte)
1,000,000 bytes
1048576 (220)
1 GB (Giga byte)
1,000,000,000 bytes
1073741224 (230)
1 TB (Tera byte)
1,000,000,000,000 bytes
1,099,511,627,776 (240)
BINARY CODES
Various groups of binary codes have been developed to represent the 26 alphabetical letters and the
special keys in accordance with specific standards and codes.
PARITY BIT
This is a type of bit, which is normally added to data by the computer to ensure its accuracy.
Data may be stored in 8 bits, 16 bit or 32 bit, but if the memory on your computer is a parity
memory then an extra bit is added on the data to become 9 bit, 17 bit or 33 bit.
Parity Check
Refers to transmission process of moving data from one end/place to another while ensuring that no
bit of data is lost during the transmission
Central Processing Unit (CPU) also known as the heart or brain of the computer
The Central Processing Unit (CPU) is the portion of a computer system that carries out the instructions of a
computer program, to perform the basic arithmetical, logical and input/output operations of the system.
Components of a micro-processor
Arithmetic logic unit (ALU) Registers.
Control unit (CU)
49
To begin with, the arithmetic logic unit is the part of the CPU that as its name implies, carries out the
mathematical functions of addition, subtraction, multiplication and division.
Arithmetic operations
These include addition, subtraction, multiplication and division.
Comparison operations
These involve comparing one data item to another, and determine if the first item is greater than ( ¿ ¿ , equal
to (=), less than (¿) etc. the other item.
Logical operations
These work with conditions and logical operators such as AND, OR and NOT.
The Control Unit (CU)
The control unit is another fundamental part of the CPU. Essentially, it regulates the flow of information
through the processor. The functions that a control unit performs can vary based on what a particular CPU
was built to do.
For every instruction, the control unit repeats a set of four basic operations called the machine cycle or
instruction cycle.
The operations are;
1. Fetching 2. Decoding 3. Executing 4. Storing
Fetching
This is the process of obtaining a program instruction or data item from memory. The time taken to fetch is
called instruction time.
Decoding
This is the process of translating the instruction into commands that the computer understands.
The Registers
Registers
Registers are high-speed working storage areas that temporarily hold instructions and data.
Registers work under the direction of the control unit to accept, hold, and transfer instruction or
data and comparisons at high speed.
More components of a CPU that are vital to its operation are the registers, which are very small memory
locations that are responsible for holding the data that is to be processed.
Types of registers
Instruction register, which contains the instruction being executed;
Address register, which keeps track of where a given instruction or piece of data is stored in
memory;
Storage register, which temporarily holds data taken from or about to be sent to memory;
The Accumulator, which collects the result of computations;
General-purpose register, which is used for several functions, as assigned by the CPU
The system clock
50
The system clock is a small chip that is used by the CPU to synchronize the timing of all computer
operations. The system clock generates electronic pulse or ticks at a fixed rate, which set the
operating pace of components in the system unit. Each tick is called a clock cycle, which affects
machine cycle time.
The faster the clock, the more instructions the CPU can execute per second.
Clock speed
This refers to the speed at which a processor executes instructions. Clock speed is measured in
hertz. A hertz is one cycle or tick per second. A Megahertz (MHz) equates to one million ticks of
the system clock per second. Processor’s speed is sometimes measured according to the number of
MIPS (millions of instructions per second) it can process.
N.B
Not all computational systems rely on a central processing unit. An array processor or vector processor has
multiple parallel computing elements, with no one unit considered the “center”. In the distributed
computing model, problems are solved by a distributed interconnected set of processors.
Disadvantages
They are expensive and delicate
Installation and repair requires technical experts.
Operation requires energy/power i.e. electricity
The computer fully depends on it since it is the brain of the computer.
Technology keeps on changing, hence expensive to maintain
System unit
This is a box-like case that houses the electronic components of a computer used to process data. It protects
51
They are circuits on board that provide more memory space or peripheral devices.
Data buses: These are highways where data travels in the computer. They include data buses and address
lines
Disk drives: Computers use disk drives to transfer programs and data between memories and disks, they
work as input/output devices. There are many types of disk drives and these include; floppy drive, hard
drive, CD- ROM drive, zip drive among others.
Peripheral devices: These are devices interconnected to the system unit. Some are connected using wireless
technology and others use ports or peripheral device interfaces such as USB (Universal Serial Bus), Serial
and Parallel ports.
COMPUTER SOFTWARE
This refers to written programs or procedures with associated documentation that run on computer
hardware. When a computer processes data, it follows a particular sequence of instructions which is stored
in its memory with specific details. This sequence is called a program and the preparation of such
instructions is done by humans in a process called programming.
CATEGORIES OF SOFTWARE
Software is often divided into two categories:
1. Systems software: Includes the operating system and all the utilities that enable the computer to function.
2. Application software: Includes programs that do specific work for users. For example word processors,
spreadsheets, and database management systems fall under the categories of applications software,
SOFTWARE
Software is a collection of computer programs and related data that provides the instructions for telling the
computer what to do and when to do it. OR
This refers to a set of programs that controls the operations of the computer and its devices. It serves as the
interface between the user, the application software and hardware. They provide the facilities that enhance
the computer’s general performance.
52
4. Reliability: is the frequency and criticality of software failure. The criticality is measured by the
average time required for repair.
5. Efficiency: is the degree with which software fulfills its purpose without waste of resources (like
RAM, Storage, CPU & Network)
6. Portability: is the ease with which software can be used on computer configurations.
7. Robust or Stable: it should be stable even with unexpected conditions (like wrong input)
8. Data-protective: it should be able to protect information it is responsible.
9. Documentation: it should be accompanied by complete documentation
10. Speedy: it should be faster in accomplishing tasks (quick in processing)
Types of software
Software can be categorised in two (2) types:
System Software
Application software
System Software
System Software is computer software designed to operate the computer hardware and to provide a
platform for running application software and hardware.
The system software is installed on your computer when you install your operating system.
These programs are written by the computer manufacturers or professional programmers. Some of these
programs reside inside ROM are known as firmware. System software consists of:
1 .Operating System
2.Programming languages
3. Utility programs
53
Sorting data files
Multi-user
It allows multiple users to log on to the system at ago. Examples are UNIX and LINUX. It allows users to
access the same data at the same time. It is tised in networking. Each person on the network appears to be a
sole user of the computer by allocating each user on a network at a time and when the time elapses, the next
person is given a go ahead.
Multi-tasking
This allows the computer to do more than one job at the same time. There is no time lag between the
different tasks e.g. One can type a document as he is printing at the same time.
Networked
This is an operating system that contains components and programs that allow a computer on a network
o serve requests from other computers for data and provide access to other resources such as printer and file
systems. Examples are Ms-windows 2000 server, Ms Windows 2003 server, UNIX and LINUX.
Standalone
Stand alone are usually not connected to a network and thus cannot access resources. Examples of
operating systems include; Disk Operating System (DOS), UNIX. Windows like windows 95,98.2000,
2003, XP, Vista.
NB:
The operating system commonly used on micro computers are; Ms [ and windows.
DOS i s a command driven user interface which has been described by many as not being a user friendly
program. It has a set of programs which help one to work with a computer effectively, merge the
information on the external storage device and carry out all housekeeping routines. It is used to manage
devices, command processing, control programs and manages system resources and errors. Examples of
DOS include Personal Computer Disk Operating System (PC-DOS) and Microsoft Disk Operating System
(MS-DOS).
Windows is a GUI (Graphical User Interface) operating system .it combines a number features e.g. It is
easy to make programs, easy to use. Its main aim is reliability and manageability with the help of active
directory Common examples include windows 2000.
55
Differences between DOS and Windows
Network operating system was designed to be used on several computers that exist on a network although
at times they can be installed on standalone computers. Common examples include Windows NT 4.0,
UNIX and Linux.
PDA operating system is specifically designed for handheld computers. They are pen driven or touch
sensitive and come already loaded in the computer’s ROM-BIOS.
USER INTERFACES
When a computer is turned on, an interface is seen. This consists of the cursor, menus, icons etc. that allow
users to do things with the computer. A user interface can make a computer either easy or hard to use.
In the designing of a user interface, sound, colors, graphics, position of items on the screen and availability
of help are considered.
Types of interfaces
1. Command Line Interface (CLI)
These accept commands in the form of special words or letters. The user types keywords or presses special
keys on the keyboard to enter data and instructions, It provides a virtually empty screen with blinking
cursor (prompt) where commands are keyed in and the computer executes them on pressing the enter key.
DOS (CLI) WINDOWS (GUI)
Is a command — line interface that takes up little
Is a graphical user interface that needs more
memory and normally does not require a very fast
memory as well as a faster processor
processor.
Operations are fast because commands can be entered Operations in a windows environment
directly through the keyboard. depend on the powerfulness of the processor
Many commands can be grouped together as a It is difficult to automate, functions for expert
batch file so that repetitive tasks can be automated users
It is user friendly because it is easy to learn and
Commands have to be learnt
work with.
Commands need not be memorized because
Commands have to be memorized
they are represented in icons and pictures.
The commands are accepted and executed by a part of the operating system called the command processor
or command line interpreter. Command line software is more flexible but more difficult to learn. Users
must have knowledge of the available commands, what they do and the rules governing how they should be
typed. It is more suited for experienced users. Examples include: DOS, UNIX, LINUX
2. Menu driven
There are many different menu forms that provide the user with a list of program commands displayed on
the screen and a simple means of selecting between them. It presents the user with a choice and does not
need one to remember the commands. It is suitable for beginners and infrequent users.
Components of GUI
Pointer: Is a symbol that appears on the display screen that is moved to select objects and commands. It
usually appears like a small angled arrow. A pointing device is a device such as a mouse that enables the
user to select objects on the display screen.
Icons: These are small pictures which represent commands, files or windows. A command can be executed
or turned into a window by moving the pointer to the icon and pressing the mouse button.
56
Window: Is a visual area containing a user interface that displays output and allows input to one or more
processes. The screen can be divided into different areas running different programs or displaying a
different file. Windows can be moved around the display screen and their shape and size at will.
Desktop: This is the area on the display screen where icons are grouped.
Menus: This is a program’s list of user choices or possible actions usually shown on the screen. These help
in execution of commands by selecting a choice from the menu
PROGRAMMING LANGUAGES
This refers to the means of communicating with the processor or Programming languages are medium used
by man to write instructions that command the computer hardware to perform certain tasks. They involve
definition of a list of words and symbols according to a particular predetermined rule of grammar (syntax)
into a logical manner to form a computer program.
MACHINE CODE
This is a low level language in which systems of impartibly instructions ara executed directly by a
computers CPU. Each instruction performs a very special task. This s a first generation language and
unfamiliar to humans it is not user-friendly at all. All instructions in machine code are represented in the
binary format e.g. 100100100010001 on a 16 bit machine. Machine code language is highly efficient and
allows direct control of each operation though it is difficult to read and debug, tedious, time consuming,
error prone and designed for a specific machine and microprocessor.
ASSEMBLY CODE
Assembly languages have the same structure and set of commands as machine
languages, but they enable a programmer to use names instead of numbers.
This is a low level language in which each statement corresponds to a single machine language instruction.
They are always specific to certain computer architecture and allow the use of systematic representation of
machine codes. This was invented to assist machine code programmers. It is more easily understood and
remembered by humans e.g. SUB for subtract. FNO for first number. It has a closer control over the
hardware and executes efficiently but it is designed for a specific machine and microprocessor.
57
Low level languages are closer to the hardware than are high level languages which are closerto humans.
Advantages
The language is widely used
It is machine independent
Its English-like statements are easy to understand
It can handle many files
It has a pool of skilled programmers
It can easily handle input/output operations
It is portable
Disadvantages
Its structure makes even simple programs long
Since it is readable, it is wordy
It cannot handle mathematical processing
58
JAVA: This is an object oriented programming language that displays graphics, accesses the network and
interfaces with users via classes that define similar states and common methods for an object’s behavior.
LANGUAGE PROCESSORS
A language processor is a hardware device designed or used to process program code to machine code.
Language processors are mainly used with high level programming to work backwards to the processor.
Their main work is to translate high-level language codes into low-level language codes that the processor
can understand.
A translator on the other hand is a program that accepts text expressed in one language pd generates
semantically equivalent text expressed in another language.
Language processors include: Compilers, assemblers, interpreters and Linkers
Compilers
These translate a program written in high level language into machine code or into assembly code program.
The entire program is translated into machine code at compilation time. They do the following:
• Allocate areas of main storage.
• Generates the object program on cards, tapes, or disc as required.
• Produces a print listing of the source and object programs when required.
• Tabulates a list of errors found during compilation e g the use of Words or statements not included in the
language vocabulary.
Assemblers
An assembly is a program that translates assembly language/instructions into binary code or machine code,
a format that is understood by the processor. They normal begin from where compilers stop. They do the
following:
Assemblers allocate areas of storage.
Detects and indicates invalid sources-language instructions
Produces the object program on cards, tapes, or disc as required
Produces a print listing of the source and object projects with comments
Data may be added to tell which program may be executed when the assembly process is
completed
This program can only be executed when the assembly process is completed
59
Translates mnemonic operation codes into machine code, and symbolic addresses into
machine code
Interpreter
An interpreter translates high level instructions into an intermediate form which it then executes. The
source program is translated line by line while the program is running. As a result, a program running under
an interpreter runs very slowly as compared to a compiled program.
It does not need to go through the compilation stage, the interpreter immediately executes high level
programs and thus it is faster.
Linkers
These programs combine compiled programs and determine where the program will be located in memory.
When the linker has transformed an object code, an executable file is generated. This normally results in
files with the extension.
UTILITIES
A utility is a program that performs a specific task related to the management of computer functions,
resources or files like virus protection, memory management, password protection and file compression.
Utilities are also called service programs and they are used to enhance the performance of the operating
system. These programs are part of system software used to support, enhance and expand existing programs
in a computer system and make’ it more and more user friendly. The most common utilities include:
i. Debuggers: are used during the testing of programs and locating errors.
ii. Sorting utility: used for sorting data.
iii. Editors: for making changes, used for word processing.
iv. Resource: used in networks
v. Disk scanner utility: detects and corrects both physical and non-logical problems on storage devices.
vi. Disk defragmenter: it recognizes the files whose contents are broken and spread across several locations
on the hard disk and moves fragments to one location for efficiency.
vii. File compression utility: shrinks the size of the file which takes up less storage space. Compressed files
are sometimes called zipped files with a .zip extension.
viii. Cryptographic utilities: encrypt and decrypt streams and files.
ix. Spy ware remover: detects and deletes spy ware. Spy ware is a program placed on a computer to secretly
collect information without the user’s knowledge.
x. Internet filters: remove or block certain items from being displayed.
xi. Merge utility: for merging or combining different files into one.
xii. A personal firewall: detects and protects a personal computer from unauthorized intrusions.
xiii. An installer utility: removes an application as well as any associated entries in the file system.
xiv. A backup utility: it allows a user to copy or back up selected files on to another storage disk.
xv. Data recovery utility: recovers accidental deleted files from your computer.
xvi. An antivirus utility: It prevents, detects and removes viruses from a computer memory or storage
device.
xvii. Screen saver utility: is a utility that causes the monitor’s screen to display a moving image or blank
screen if no keyboard or mouse activity occurs for a specified period of time.
Screen savers were originally developed to prevent a problem called ghosting, in which images could be
permanently etched on a monitor’s screen.
Screen savers can be used for reasons of security, prevent unwanted onlookers from accessing data or
information from your computer, for advertisements on the screen, for entertainment and also prevent burn
in.
60
- To detect errors from hard disk and fix them.
- Takes in data and re-arrange it using sorting utility.
- backup data (safe keeping) by storing it on other facilities
- To recover the lost data due to power going off by using data recovery
APPLICATION SOFTWARE
Application software refers to related programs designed to perform a specific task to
solve a particular problem for the user. They are designed to solve practical problems experienced
in life.
Application package
This is a user software program designed to accomplish a given task.
Characteristics
Targeted to wide range of users
Easy to use-user friendly
Designed for power and flexibility
Machine independent
Software suite
This refers to the collection of individual applications sold as a single package.
Application is software that enables a computer to perform a specific task or carry out a specific job. The
job is called an application. These programs make a computer perform different activities like or uses like
word processing, accounting, and graphics etc. They are called application programs because they direct the
61
processing required for the particular task of the computer. They include: word processing, spreadsheets,
databases, presentations, desktop publishing, graphics processing and communication software.
Application software needs a particular hardware and operating system for their application. It is divided
into two categories:
Packaged/Off-the-shelf software
This is an application program which is copyrighted and designed to meet needs of a wide variety of users.
These are of general nature and solve needs which are common in nature.
They are already made programs designed to suite any environment and are bought from the shops and then
installed in a computer.
62
booklets, business cards etc. they include adobe PageMaker, Microsoft publisher, Quark press, Adobe
InDesign, Serif PagePlus, Apple Page 2 among others. etc.
f) Graphics processing: These are used in the creation and editing of graphics ranging from charts,
representation graphs, paint and drawing. They include Photoshop, Microsoft photo draw, adobe illustrator,
Corel draw, etc.
g) Communication software: This is used in exchange of messages by sending and receiving data via
computers to different areas of the world, They include software browsers like Netscape, Microsoft
navigator, internet explorer etc.
2. Freeware
This is copyrighted software provided at no cost to users e.g. games like solitaire and Dave, antivirus
software like
AVG.
3. Shareware
This is copyrighted software distributed free for the trial period and payment is required for continued use
after the trial period e.g. Motorbikes, computer car driving simulations, VS NET, antivirus software like
MacAfee.
Word processing
Word processing software also known as a word processor is used to create, edit, format , save, and print
documents that contains text and graphics.
Others include;
MultiMate Professional writer Word star
Perfect writer Word perfect
63
A word processor automatically moves the cursor to the beginning of the next line when text
extends beyond the right page margin while the user needs to advance the lever manually
when using an ordinary typewriter.
Text editors
These are simple word processors which are generally used to type without any special formatting .
Text editors are mainly used to write small notes, memos and programs.
Creating a document involves entering text or number or symbols, inserting graphics, and performing other
task using an input device such as keyboard or mouse
Editing
This is the process of making changes to the existing content of the document.
Formatting;
Formatting involves changing the appearance of a document. There are four different levels of formatting;
Character formatting Section formatting
Paragraph formatting Document formatting (formatting page)
Character formatting;
Involves changing the font type, font size or font style. The most common way to emphasize text is to
apply bold face, italic or underline character forming styles.
Paragraph formatting;
This involves text alignment, lines spacing, indentation s, tab settings, and borders.
A paragraph can be a single line of text or an entire page, and may be formatted independently from the rest
of the document.
Section formatting;
This lets you specify page numbers, headers and footers for different sections or computers of a document.
Undo;
This one allows actions that have been performed to be reversed such that if some text was accidently
deleted, then the action can be undone.
Saving;
This is the process of copying a document from the memory to a storage medium such as floppy disk or
hard disk.
NOTE:
64
Any document can be saved and exist as a new file, which is a named as collection of data, instructions or
information.
Printing;
This is the process of sending a file to a printer to generate output on a medium such as a paper.
Popular features of word processing software includes (characteristics)
Word wrap;
This is the term used to describe a situation where the cursor automatically jumps to the next line. It allows
a user to type continually without pressing the enter key at the end of each line.
Replace;
This feature allows the user to substitute existing characteristics, word, or phrases with new ones.
Spelling checker;
This allows the user to check the spelling of a whole document at one time or to check and even correct the
spelling of individual words as they are typed (ie Auto correct)
Grammar checker;
Reports grammatical errors and suggest ways to correct them.
Thesaurus;
This suggests alternative words with same meaning (ie synonyms for use in the documents).
Mail merge;
Create form letters, mailing labels, and envelopes’. Used when similar letters have to be sent to several
people. The names and addresses of each person can be merged with one single document and then printed
out.
Tables;
Allows a user to organise information into rows and columns.
Macros;
Allows a user to record or save frequently used key strokes and instructions, which can be executed later by
running the corresponding macros.
Multi-columns;
This arranges text in two or more columns that look similar to a newspaper or magazine.
Template;
Allows a user to create documents, which are frequently used.
Printing ;
Allows a user to print single or multiple copies, fully or part of a document.
65
PRESENTATION SOFTWARE
This is an application program that allows users to create a variety of visually appealing slides that are used
to help further communication ideas. OR
It is an application software that enables users to create computer – based slide shows using sophisticated
graphics and animations to enhance images.
A presentation is the collection of slides handouts, speakers note and outlines in a single file.
These applications are also able to create slide shows are normally employed during meetings or seminars
to enhance speakers or presenters’ ideas graphically.
Presentation software (sometimes called "presentation graphics") is a category of application programs that
are used to create visual presentations. These presentations are usually delivered in a slide show format, and
can be created with a variety of programs. The programs make it possible to combine text and graphic
elements to convey important information to a group of people all at once.
Each presentation software allows users to develop a slide show presentation; however, the methods for
viewing the presentation may vary from program to program. Both the PowerPoint® presentation software
and the Impress programs allow for the presentation to be viewed full screen on a computer monitor, where
the presenter can either have slide changes timed, or click through them. The presentation can be moved to
a larger screen by connecting the monitor to another screen.
Handouts:
A handout consists of two to six slide images on a single page. Handouts help to support your presentation
by keeping the audience focused on what you are saying.
Outline:
For brain storming and organizing your thoughts. The text of your presentation i.e. headings and main body
text appears without the slide’s background, colours and graphics.
Transitional looping:
It is a facility which sets up the presentation to run continuously until is stopped by the presenter.
Templates:
66
A template is a pre – designed presentation that defines what your presentation will look like, where text
and other objects will appear and which foreground and background colours will be used.
Auto features.
These features make it easier for you to perform your work e.g. the auto clip art command.
Wizards.
Power point employs many wizards which make short order of the tasks that might otherwise be repetitive,
time consuming or difficult.
Place holders
These are boxes with dotted borders that one part of most slide layouts.
These boxes hold title and body text or objects such as charts, tables and pictures.
Action buttons:
These are buttons that is used in presentation software as hyperlinks to navigate the presentation.
Slide master;
This is a single slide that controls all other slides in a given presentation.
Any change made to it affects the rest respectively.
Multimedia:
Refers to audio, video, charts, pictures that are used in slide presentation.
NB:
Slide mode of printing involves:
Printing each slide on its separate page while handout mode of printing, lets you print your desired number
of slides on one page.
67
Starting Microsoft power point 2007
Just like all the application programs Microsoft power point is started or launched as follows;
- After your computer has been started. - Select Microsoft office
- Click on the start button - Choose Microsoft Office power point
- Move to all programs 2007.
Note:
Power point starts running on your screen once you click on it, with a title slide as the default slide layout.
But one can easily change to any other layout depending on the question.
Types of views in Microsoft Power Point provide different layouts for constructing and viewing your
presentation. These include;
- Normal view - Outline view - Slide show view
- Slide view - Slide sorter view - Notes pages view
Normal view;
Here the screen is split into three sections, showing presentation outline on the left, the active slide in the
main window and the notes at the button.
Slide view:
The slide view displays each slide on a screen and is helpful for adding images, formatting text and adding
background styles.
Outline view;
The presentation outline is displayed on the majority of the screen with small windows for the slide and
notes. This enables one to edit and display all presentations text in one location instead of one slide at a
time.
ii. Timing;
Refers to the technique by which slides or text appear on screen during a presentation. (Mouse click
or automatic)
68
Slide master layout;
This is a term used/applied to a presentation’s overall design.
i.e. it is a single slide that controls all other slides in a given presentation. Any change made to it affects the
rest respectively.
Slide layout.
This is a given design of slide showing divisions or areas or sections of a slide where work can be done.
Examples of layouts in Ms. Power Point presentation software such as Microsoft power point provides a
number of slide designs that one can use to come up with him or her presentation. These include;
- Title slide - Comparison - Content with caption.
- Title and content/bulleted - Title only - Picture with caption.
list - Section header
- Two content/two column - Blank
Allows you to face your audience and make eye contact rather than facing the screen.
Disadvantages
It is difficult for the audience to take notes while the presentation is taking place, otherwise
they lose concentration
Audiences are often happy to sit placidly and not interact with the presenter
Not good for presenting certain kinds of information such as complex math equations
It is all too easy to make a very bad presentation with too many animation effects and too
much text, images
Presenters often just read from the presentation which is boring for the audience.
69
SPREAD SHEET APPLICATIONS
These programs can be applied in the following financial applications.
Budget planning Interest schedules.
Analysis of financial data Non-financial applications
Production of invoice and statements Recording students marks
Tax tables Mathematical evaluations
Spreadsheet Terms
Like all other areas of computer technology, Microsoft Excel worksheets have their own "language." This
list of common terms is provided to serve as a reference for you as you work in Excel.
Cell
The intersection of a column and row. Information is stored in cells.
Cell Pointer
The cell pointer is similar to Word's insertion point. It selects or marks the current cell (where the next
activity is going to take place). The Excel pointer changes shape depending on location and corresponding
function. For more information, refer to Pointer Shapes above.
Cell References
The address, consisting of the column and row IDs, of a specific cell. The current cell location is displayed
in the upper left corner of the worksheet.
Column
A vertical group of cells within a worksheet.
Formula
A set of instructions which perform a calculation based on numbers entered in the cell or numbers entered
in other cells (referred to by cell references). All formulas begin with the equal sign (=).
Function
A pre-programmed formula. The function performs the calculation based on the cells referenced in the
function. All functions begin with the equal sign (=).
Range
A group of cells. Ranges are often referenced for formulas, printing, and designating information to be
copied or cut. Ranges can be selected by clicking and dragging over the cells.
70
Row
A horizontal group of cells within a worksheet.
Value
A number that can be used in an Excel calculation.
Workbook
A collection of worksheets contained within a single file.
Worksheet
A single layer or single sheet within the workbook. A worksheet can contain data, charts, or both. Instead
of compiling all of your information into one worksheet, you can create several worksheets within the one
workbook file. With this organization, similar information is grouped together to make it easier to locate
and use. The worksheets for your workbook will vary based on its content and purpose.
EXAMPLE: If you want one file containing the grade books for all sections you teach, each section can be
on a separate sheet.
NOTE:
The terms worksheet and spreadsheet are often used interchangeably.
Error values
Microsoft excel displays an error value in a cell when it cannot calculate the formula for that cell
Error values Meaning
#Div/0! The formula is trying to divide by zero (0)
#N/A! No value is available
#Name? Microsoft excel does not recognize a name used in the formula
#Null! You specified an intersection of two areas that don’t intersect
Num! There is a problem with the number
#REF! The formula refers to a cell that is not valid
#VALUE! An argument or operator is on the wrong type
71
My sql
Database Functions
There are several functions that a DBMS performs to ensure data integrity and consistency of data in the
database. These include the following;
Data dictionary management
Data transformation and presentation
Security management
Multiuser access management
Data integrity management
Database access languages and application programming interface
Backup and recovery management
Database communication interfaces,
Transaction management
Data storage management.
MS. ACCESS
MS. Access is one of the most common database programs on market. Ms. Access which comes as part of
MS. Office first appeared as Ms.access 2.0. With the up grading of various applications programs Ms.
Access was up graded to Ms. Access 97, Ms. Access 2000, MS. Access XP, MS. Access 2007, MS. Access
2010 and MS. Access 2013.
Data base:
This is a collection of related information stored for a particular purpose. The data in the data base is
arranged in column and rows.
Field:
This is the entire column that contains similar data items. e.g. the names column in the table above contains
each individual name.
Record:
It is asset of the entire data items in the row. In other words a record is a collection of different fields in
particular table .e.g. . If you are to consider the data item in the second row in the table above this contains
all the information concerning Richard.
Field Name:
A field name is a file of particular column (field) e.g. sex, District, Names, and allowances are field names.
Field Properties:
72
A field property is a characteristic of a particular field. The field properties are normally specified from
the general tab of the data table structure.
This specifies the specific, data item stored i.e. field can either be text, Number, Date/time, currency, Auto
number, OLE object, hyper link.
Data Tables:
There are the fundamental structures in Ms. Access data base.
Queries:
These are tools used to manipulate data in t5he data tables i.e. they do operation tasks like how many
people are male and live in Kampala.
Macros:
This is an automated procedure of action in a computer. It is also called a main program because it has short
automated procedures which consist of simple commands.
Modules:
These are Microsoft access objects that enable the users to work processes. Just like macros they provide
work process von the specific commands.
Unlike macros, modules need one to have a good back ground in the programming languages and
preferably in Ms. Visual BASIC.
REPORT:
These are tools in access that enables one to preview and print data in a meaning full format.
Forms:
These are tools in MS. Access that enables one to enter and display records from the data base tables
registration forms, data words, receipts.
Foreign Key
This is a field in a relational database record that points to a key field in another table or a column in a table
that match the primary key in another table within the same data store.
Primary Key
This is a feature in database programs that uniquely identify a record. In other words,
73
Categories/Types of Databases that can be created
There basically two (2) types of databases that can be created i.e.
Flat Database
Relational Database
Flat Database
This is one that only contains a single table of data. In other words, all of the data in database is stored in
this one place.
Relational Database
A relational database is one that contains two or more tables of data, connected by links called
relationships.
Advantages
Reduced data redundancy
Reduced updating errors and increased consistency
Greater data integrity and independence from applications programs
Improved data access to users through use of host and query languages
Improved data security
Reduced data entry, storage, and retrieval costs
Facilitated development of new applications program
Disadvantages
Database systems are complex, difficult, and time-consuming to design
Substantial hardware and software start-up costs
Damage to database affects virtually all applications programs
Extensive conversion costs in moving form a file-based system to a database system
Initial training required for all programmers and users
RELATIONAL DATABASE MANAGEMENT SYSTEM:
A RDMS is a type of software that enables one to create manipulate and query a data base. i.e. a program
that enables you to manage data. These programs enable the user to store large amount of data that can be
easily retrieved and processed with great flexibility to produce meaningful managements report.
Database Functions
There are several functions that a DBMS performs to ensure data integrity and consistency of data in the
database. These include the following;
Data dictionary management
Data transformation and presentation
Security management
Multiuser access management
Data integrity management
Database access languages and application programming interface
Backup and recovery management
74
Database communication interfaces,
Transaction management
Data storage management.
MS. ACCESS
MS. Access is one of the most common database programs on market. Ms. Access which comes as part of
MS. Office first appeared as Ms.access 2.0. With the up grading of various applications programs Ms.
Access was up graded to Ms. Access 97, Ms. Access 2000, MS. Access XP, MS. Access 2007, MS. Access
2010 and MS. Access 2013.
Data base:
This is a collection of related information stored for a particular purpose. The data in the data base is
arranged in column and rows.
Field:
This is the entire column that contains similar data items. e.g. the names column in the table above contains
each individual name.
Record:
It is asset of the entire data items in the row. In other words a record is a collection of different fields in
particular table .e.g. . If you are to consider the data item in the second row in the table above this contains
all the information concerning Richard.
Field Name:
A field name is a file of particular column (field) e.g. sex, District, Names, and allowances are field names.
Field Properties:
A field property is a characteristic of a particular field. The field properties are normally specified from
the general tab of the data table structure.
This specifies the specific, data item stored i.e. field can either be text, Number, Date/time, currency, Auto
number, OLE object, hyper link.
Data Tables:
There are the fundamental structures in Ms. Access data base.
Queries:
75
These are tools used to manipulate data in t5he data tables i.e. they do operation tasks like how many
people are male and live in Kampala.
Macros:
This is an automated procedure of action in a computer. It is also called a main program because it has short
automated procedures which consist of simple commands.
Modules:
These are Microsoft access objects that enable the users to work processes. Just like macros they provide
work process von the specific commands.
Unlike macros, modules need one to have a good back ground in the programming languages and
preferably in Ms. Visual BASIC.
REPORT:
These are tools in access that enables one to preview and print data in a meaning full format.
Forms:
These are tools in MS. Access that enables one to enter and display records from the data base tables
registration forms, data words, receipts.
Foreign Key
This is a field in a relational database record that points to a key field in another table or a column in a table
that match the primary key in another table within the same data store.
Primary Key
This is a feature in database programs that uniquely identify a record. In other words,
Flat Database
This is one that only contains a single table of data. In other words, all of the data in database is stored in
this one place.
Relational Database
A relational database is one that contains two or more tables of data, connected by links called
relationships.
76
OBJECTS IN DATA BASE PROGRAM (MS.ACCESS)
These are tools that are used to manipulate data in data base programs.
They include the following;
Queries Report Macros
Forms Pages Modules
Advantages
Reduced data redundancy
Reduced updating errors and increased consistency
Greater data integrity and independence from applications programs
Improved data access to users through use of host and query languages
Improved data security
Reduced data entry, storage, and retrieval costs
Facilitated development of new applications program
Disadvantages
Database systems are complex, difficult, and time-consuming to design
Substantial hardware and software start-up costs
Damage to database affects virtually all applications programs
Extensive conversion costs in moving form a file-based system to a database system
Initial training required for all programmers and users
77
the receiving device.
Telecommunication: Refers to the transmission of data and information over a long distance e.g. Television
Teleprocessing: Refers to the access and modification of computer files located elsewhere.
Downloading: Is to transfer a file to your computer from another computer.
Uploading: Is to transfer a file from your computer to another computer.
Data encryption: This is the process of converting data into coded form (cipher text) to prevent it from
being read or understood by un authorized people.
Communications software: Refers to software needed by a computer before it starts sending and receiving
data from other computers.
Network protocol: It is a set of rules and procedures governing the transmission of data between two
computers. .,
Disadvantages of TP.
There are high chances of losing and corrupting data.
It’s susceptible to Electro-magnetic interference.
It can only transfer data at speeds of up to 155 mbps although theoretically, it can support
much higher rates.
COAXIAL CABLES.
These consist of single copper wire surrounded by at least three layers: -an insulating material, a
woven or braided material and a plastic outer coating.
Cable TV wiring often uses coaxial cables because it can be cabled over long distances than twisted
pair cables. They are categorized into two: - the Thick Ethernet cable (Thicknet) and thin Ethernet
cable (Thinnet).
The thicknet requires a hole to be drilled into the cable through a device called the vampire. The
network tab contains a transceiver to receive and handle the signals on the network.
The thinnet can be cut at the position at which you want to attach a device to it. It can be attached to
BNC connector at both ends of the cable. A T-piece is used to reconnect two pieces of cables while the
remaining connector on the T-piece is used for connecting the media to another computer.
78
more difficult.
They theoretically support higher bandwidth than twisted pair.
The thin coaxial cable is relatively cheap and in the same price range of twisted pair.
They resist electro-magnetic interference better than the twisted pair.
It is used for longer distances (300 — 600 meters).
Transmits faster than UTP.
WIRELESS COMMUNICATION
Wireless communication technologies transport digital communications without cables between
communication devices. They include broadcast radio, cellular radio, micro waves, communications
satellite, infrared and Bluetooth.
1. MICROWAVES
These are high frequency radio waves that are sent through the atmosphere and space to deliver
telecommunications services including TV distribution. It is dependent on line of sight.
Advantages of microwaves.
They transmit large quantities of data.
Low construction costs, since they do not require physical cables.
Speed of light.
Disadvantages of microwaves.
79
Microwave systems are a line of sight technologies where signals will not pass through objects such
as mountains, buildings. There is need for radio transmitters in networks using air interface (radio waves) to
be positioned free of obstacles.
They are subject to electro-magnetic interference i.e. any disturbance that degrades, interrupts or
obstructs performance of microwave signals.
2. SATELLITE
This is a microwave station placed in outer space. The satellite receives a signal from the earth, amplifies it
and then rebroadcasts it at a different frequency to any number of earth based stations. Satellites are placed
about 22300 miles above the earth‘s equator and moves at the same rate as the earth.
Advantages of satellites.
Lots of data can be sent simultaneously.
They allow high quality broad band communication across continents.
Disadvantages of satellite.
It is expensive to launch.
Infrastructure needed to access satellite is so expensive.
3. BLUETOOTH
It is a kind of short range (about 10 meters) broadcast radio communication which can transmit data at a
rate of 1 Mbps among Bluetooth enabled devices. Many computers, peripherals, smart phones, PDAs, cars
etc. are Bluetooth enabled; which means they contain a small chip that allow them to communicate with
Bluetooth enabled devices.
Advantages of Bluetooth.
It is widely used.
It has simple features; you do not need to know much technology.
It’s free of charge.
There is privacy.
Disadvantages of Bluetooth.
It requires more battery.
Bluetooth internet is sometimes very slow.
4. INFRA-RED COMMUNICATION
IrDA(Infra-red Data Association) ports transmit data via infra-red light waves. As long as the devices are
within a few feet and nothing obstructs the path of the light wave, data will be transferred.
5. CELLULAR RADIO.
This is a form of broadcast radio used for mobile communication.
80
Faster connections.
Readily available everywhere you go.
Immediate contact is available.
It saves time.
There is instant communication.
It is cheaper to users.
Mobile telephones are easy to carry i.e. portability.
DATA TRANSMISSION
This refers to the process through which data signals are broadcast or sent out through the medium to the
receiving device.
81
Therefore digital device processes data that is presented in form of discrete values such as 1,2,3e.g.digital
watches, digital cameras, calculators among others.
TRANSMISSION MODES
When two devices exchange data, it flows between the devices as a continuous stream of bits. There are
two basic transmission modes/techniques for separating the groups of bits:
1. Asynchronous transmission
2. Synchronous transmission
Asynchronous transmission
This transmits one bit at a time over a line at irregular intervals. Each bit is framed by controls; a start bit
for marking the beginning of the byte, a stop bit for marking the end of the byte and a parity bit for error
checking. It’s possible for low quantities of data like conversation over telephone lines.
Synchronous transmission
This transmits groups of bytes simultaneously at regular intervals. The beginning and ending of a block of
bytes is determined by the timing of the sending device and receiving device. This method is more common
with data transmission at high baud rate. The rate at which the data can be transmitted is measured in baud.
This mode provides much higher speeds and greater accuracy than asynchronous.
TRANSMISSION DIRECTION
This is the direction in which data flows along transmission media. It is categorised as;
- Simplex
- Half duplex
- Full duplex
- Multiplex
Simplex transmission sends data in one direction only. It is used only when the sending device doesn’t
require a response from the receiving device e.g. TV broadcasting.
Half duplex transmission allows data transmission in either direction but only one way at a time. E.g. police
radio calls, credit cards verification systems, fax machines and Automated Teller Machines.
Full duplex transmission allows data to flow in both directions at the same time e.g. a regular telephone line
allows both parties to talk at the same time.
Multiplex transmission allows several types of signals to be carried at once through the same line. E.g.
during video calls involving images.
Networking hardware: This includes all computers, a server, computer peripherals and
communication devices that enable two or more computers to exchange items such as data, instructions and
information with each other. Examples include: a server computer, clients/work stations, network interface
cards, modems, Hub/switch, repeater, router among others.
82
analog one to send data out over the phone line. Then for an incoming signal, it demodulates the analog
signal into a digital one.
A Router: This connects multiple networks and routs communications traffic to the
appropriate network using the fastest path available. It allows multiple computers to share
a single high speed internet connection such as through a cable
modem.
Hubs and switches: A hub (multi-station Access Unit (MAU)) is a device that provides a central point for
cables in a network. It directs information around the network.
A switch sends the data packets only to the destined computer but doesn’t broadcast data to all the
computers.
Network bridge: This is a device that connects two networks making each accessible to the other. E.g it can
connects two LANs.
Repeater: This is a device that accepts a signal from a transmission medium, amplifies it and retransmits it
over the medium.
Multiplexer: Is a device that combines two or more input signals from various devices into
a single stream of data and then transmits it over a single transmission medium. It increases the efficiency
of communications and reduces the need for multiple separate transmission media when it combines the
separate data streams into one.
Bus topology
A bus or linear network topology consists of a single central cable that connects all
computers and devices together.
The physical cable that connects the computers and other devices is known as the bus or the backbone.
83
Cable faults are easily identified.
Ring topology
Ring network consists of a cable forming a closed ring, or loop, with all the computers and devices in a
network. A ring network links all nodes together in a circular chain.
The node examines any data that passes by to see if it is the addressee; if not, the data is passed on to the
next node in the ring.
STAR TOPOLOGY
On a star network, all of the computers and devices (nodes) on the network connect to a central hub or
switch. The central resources for the network would be located at the centre of the star. All data that is
transferred from one computer to another passes through the hub.
84
Network size is limited by the number of connections that can be made to the hub.
Performance for the entire network depends on the capabilities of the hub.
Set up of the system can be very complex.
MESH TOPOLOGY
This is the type of network topology in which each of the nodes of the network is connected to each of the
other nodes in the network.
Fully connected Mesh topology makes it possible for data to be simultaneously transmitted from any single
node to all of the other nodes.
TREE TOPOLOGY
Tree network topology is also known as a hierarchical network topology. This is because it contains
different levels of hierarchy.
The type of network topology in which a central ‘root’ node (the top level of the hierarchy) is connected to
one or more other nodes that are one level lower in the hierarchy (i.e., the second level). Each of the second
level nodes will also have one or more other nodes that are one level lower in the hierarchy (i.e., the third
level) connected to it. The hierarchy of the tree is symmetrical - Each node in the network having a specific
fixed number, of nodes connected to it at the next lower level in the hierarchy.
It usually has three layers: the core layer, the distribution layer and the Access layer.
NB: The FDDI (Fibre Distributed Data Interface) backbone is a high speed communication link used to
provide the basis for a network consisting of small sub-networks. In other words, it links sub-networks.
INTERNET
Internet
This is the biggest area of WAN. It is accessed by means of software browsers such as Internet Explorer,
Netscape, Microsoft Navigator, Mozilla Firefox among others.
85
The more technology grows, the bigger, better and faster Internet connections come up. The Methods of
connecting to Internet are only two:
- The Dial Up/Analog access; which uses normal telephone lines
- Wireless connectivity; which requires no telephone lines
The common Example of the wireless type is Broadband,a high speed Internet connection. Others include;
ISDN, DSL, Cable, 3G phones and satellite.
INTERNET SERVICES
After connecting to the internet, the following are the services that we can utilize online.
1. Telnet: One of the amazing features of the Internet that lets you use the resources of another computer in
another part of the world. This is done by remotely logging to the distant computer which is called the host.
2.Email: It allows the transfer of messages, documents, and pictures among others, across the Internet.
3. Mailing list: This is based on the email protocol. As an electronic mailing list it is very convenient when
somebody wants to send a message or newsletter, for example, to many people in one go.
4. Internet Relay Chat (IRC): Allows people to converse in real time by typing questions and responses.
Chats are usually organized in what we call chat rooms.
5. File Transfer Protocol: The standard method for transferring files, whether downloading or uploading, to
and from your computer with another computer on the Internet.
6. Newsgroups: This is an Internet equivalent of a discussion group or an electronic bulletin board. There
are newsgroups for every conceivable topic and more, e.g. educational technology.
7. World Wide Web: This refers to the global collection of electronic documents called WebPages stored
on computers all over the world. As it is the most exciting feature that has revolutionized the Internet,
people use this service to surf or browse for information.
NB:
Gateways allow different types of computers to communicate with one another even if
they use different communications protocols or transfer data at different speeds.
86
Hardware problems: A poor network card, video card or signal receiver can seriously reduce the speed of
the data being processed by your system, slowing down the speed at which your computer can take the
information coming in. If your Internet service comes over the phone line and you have a faulty filter
attached, the speed will be compromised.
Software problems: You need good updated web browser software to display the web pages efficiently.
Currently Internet explorer version 6 is unable to display some WebPages with advanced features. It is also
good to have updated software and device drivers to newer versions for optimum performance.
Available memory: With each program you open on your computer, you are using up more RAM memory.
Your computer has to write this data to the disk, and the more memory you are using up on open programs,
the less memory there is available to receive the data. Data will slow down if your computer cannot receive
it fast enough, making the Internet speed seem slow.
Computer internet settings: Improper computer settings can also affect the speed of your internet
connection. Setting your firewall, safe search and other options properly will improve the speed as well.
Technological circumstances: Slow speed of an internet connection can be due to technical causes such as
loose connections of cables or maintenance works being done by an your ISP.
Cookies: When surfing, the browser collects information, such as passwords and stores it on your local hard
drive in a file known as a cookie. Over time, these cookies can compromise the speed of your Internet
connection, particularly if you visit many websites during a browsing session.
Quality or type of internet connection; some of them are slow but some are faster.
87
Moral decay due to pornographic materials, increased crime through piracy, forgeries and scam
(conmen)
Continued isolation of man
Unemployment as the unskilled get retrenched
E-MAIL COMMUNICATION
Email (Electronic Mail) Communications refers to the transmission of messages via a computer network
such as; a local area network or internet. The email can be simple text, or include an attachment such as a
word processing document, a graphic, an audio clip or video clip.
Components of an e-mail
Headers: The message headers contain information concerning the sender and recipients. The exact content
of mail headers can vary depending on the email system that generated the message.
Subject: The theme of the email message
Sender (From): This is the senders Internet email address.
Date and time received (On): The time the message was received.
Recipient (To :): First/last name of email recipient, as configured by the sender.
CC (Carbon copy): enables copies of the email message to be sent to third party while acknowledging other
recipients
Bcc (Blind Carbon Copy): Enables copies of the mail message to be sent to the third party without
acknowledging nay other recipients.
Reply-to: This is the Internet email address that will become the recipient of your reply if you click the
Reply button.
Body: The body of a message contains text that is the actual content, The message body also may include
signatures or automatically generated text that is inserted by the sender’s email system.
Attachments: Attachments are optional and include any separate files that may be part of the message.
Signature: Personalized information about sender.
E-mail software
This refers to the programs that are used to manage email account messages.
They are in two categories: Application packages locally installed on the computer (email clients), and
Online email programs hosted by a website on the www (webmail).
Examples of email clients include: Microsoft Outlook, Thunderbird
The most popular webmail software: Yahoo, Hotmail, Gmail, Excite, Mail.com, Netscape,
web mail, AOL, Eudora mail etc.
88
Email software has a good degree of security features such as username and password before
sign in
Email applications have inbuilt English dictionary which safeguards the sender from incorrect
spelling and grammar.
Email is a relatively cheap means of communication since there are no printing or postage
expenses involved.
There is flexibility in time of opening the e-mail for any time access. At any time of the day or
night, one can communicate with friends, relatives, professors and business associates.
Messages remain permanent for future and frequent accessing from anywhere.
Use of graphics such as colorful greeting cards and interesting pictures can be sent through e-
mails.
Advertising tool: many individuals and companies are using e-mails to advertise their products,
services, etc.
89
V es
Un authorized access and use of computer systems
Hardware theft and software theft
Information theft and information piracy
Internet based fraud
COMPUTER VIRUS
This is a program that copies itself into other programs and spreads through multiple computers. Viruses
are often designed to affect or infect a computer negatively by altering the way it normally works without
the user’s knowledge.
Types of viruses
A boot sector virus executes when a computer starts up because it resides knowledge or permission of the
owner. In the boot sector of a floppy disk or the master boot record of a hard disk.
A file virus attaches itself to program files and is loaded into memory when the infected file is running.
A macro virus uses the macro language of an application (e.g. word processor or spreadsheet) to hide the
virus code.
A logic bomb is a virus that activates when it detects a certain condition.
A time bomb is a kind of logic bomb that activates on a particular date.
A worm copies itself in the memory or on a disk drive until no memory or disk space remains, which
makes the computer stop working or crash.
A Trojan horse is a program that hides within or looks like a legitimate program but executes when a
certain condition or action is triggered.
A polymorphic virus modifies its program code each time it attaches itself to another program or file, so
that an antivirus utility has difficulty in detecting it.
Random havoc randomly changes data during normal program execution or changing key
stroke values or data from other input/output.
Network saturation viruses systematically use up memory or space to impede performance or cause the
system to crash.
Non destructive viruses
These do not cause any destruction but are annoying. They change display colors, display messages.
Change key board values e.g changing the effect of the shift/un shift keys and delete characters displayed or
visual display.
SYMPTOMS OF VIRUSES
The presence of viruses can be indicated if one or more of the following symptoms appear on your
computer:
- Unfamiliar graphics or quizzical messages appearing on screens
- Programs taking longer than usual to load
- Disk accesses seeming excessive for simple tasks
- Unusual error messages occurring more frequently
- Less memory available than the usual
- Access lights turning on for non referred devices
90
HOW VIRUSES ARE ACTIVATED
There are three basic ways:
1. Opening an infected file
2. Running an infected program
3. Starting up the computer with an infected disk
SOURCES OF VIRUSES
1. Contact with contaminated systems: Any diskettes used on a contaminated system could become
contaminated. If the same disks are used on another computer system, the virus will be spread.
2. Pirated software: The use of pirated is a risk in that this software may be contaminated by virus code or
amended to perform some other destructive function which may affect your system.
3. Infected proprietary software: Some viruses were introduced to contaminate software which is under
development in laboratories and then being installed on to disks containing the finished show software
products.
4. Fake games: Many people play games and so games programs spread very fast. These games keep
infecting systems as they are installed. Games such as HOT SEX.EXE
5. Freeware and shareware: These are programs commonly available from Bulletin Board System (BBS).
These terms are used to mean offering software copyright-free. Such programs should be treated with
caution until they are found virus free or without destructive codes.
6. Updates of software distributed via internet or other networks: Software distributed via the net in most
cases targets virus programmers as they provide a built-in method for widespread and anonymous
propaganda.
NB:
An Antivirus utility is a program that prevents, detects and removes viruses from a computer’s memory or
storage devices e.g. Norton, F-secure, Mac-café, AVG, Kaspersky, Avira
91
2. Authentication-verifies that the user is really the one he or she claims to be.
92
A password is a combination of characters associated with a user name that allows a user to access a
computer or network.
A possessed object is any item that a user must carry to gain access to a computer or computer facility.
A personal Identification Number (PIN) is a numeric password, either assigned by a company or selected
by a user.
A Biometric device authenticates a person’s identity by verifying personal characteristics such as finger
prints.
A biometric device translates a personal characteristic into a digital code that is compared with a digital
code stored in the computer.
COMPUTER PROTECTION
Computer protection mechanisms are built into the computer to support the enforcement of security
policies.
NB:
Hash code is a digital signature generated by taking a mathematical summary of the document.
2. Virus detection: This is done by use of antivirus software to detect and get rid of viruses.
3. Security and the law: Under the Data Protection Act, personal data must be kept secure and one has right
over their data.
4. Social and cultural issues: The net is not a totally risk-free environment and so unwanted pornographic
material can come to your computer. To combat such dangers, blocking software can be installed which
sensors unacceptable material. Examples of such software include: Net Nanny http://www.netnanny.com,
Surf watch http://www.surfwatch.com
5. Data encryption: This is the translation of data into a secret code. It’s meaningless to those who don’t
know how to code it.
Encrypted data is called cipher text.
Unencrypted data is called plain text.
93
- To avoid hackers from hacking important information
- Maintaining confidentiality of information
- To avoid information altering
Types of firewalls
i) Network firewall: This protects the perimeter of a network by watching traffic.
ii) Host-based firewall: This protects individual computers regardless of the network its connected to.
iii) Hardware firewall: Is a device connected to your network
iv) Software firewall: Is a software program installed to protect the computer from unauthorized incoming
and outgoing data.
Uses of firewalls
They help keep networked computers secure and safe
They help filter incoming and outgoing traffic that flows through your computer system
They protect the applications, services, machines of the network from unwanted traffic from public
internet
They limit or disable access from hosts to the network
COOKI ES
Acomputer cookie is a string of text that websites place into a browser’s memory. It tells the website
information about the user and keeps the user from having to repeatedly enter this information.
They identify users and possibly prepare customized websites for them. When you enter a website using
cookies, you may be asked to fill a form providing your name and interests. This information is put into a
cookie and sent to your web browser for later use.
Advantages of cookies
They ease browsing since it is responsible for making personalized services such as Google mail or
yahoo function correctly.
They keep users logged into websites, save personal preferences and make online sales significantly
easier.
Ease of control due to their storage in text format, users can examine them individually. Most
browsers allow users block some or all cookies and to delete unwanted cookies.
They don’t require any server resources since they are stored on the client.
You can configure cookies to expire when the browser session ends (these are referred to as session
cookies) or they can exist for a specified period of time on the client computer (referred to as persistent
cookies).
The data becomes attached to the customer. If she/he starts to an order and then jumps to a different
HTML documents and returns later, the items that had been selected earlier are still selected.
94
The order form could be on several screens with each adding information to the cookie.
Disadvantages of cookies
Limited duration: The browser keeps the cookie only until a certain date and so the website can only
track information stored in the cookie for a limited time.
Privacy concerns: Cookies allow websites keep track of more than just user names, passwords and
similar data yet some marketers use this information to advertise without permission.
Cookies exist in plain text on the client machine which may pose a security risk as anyone can open
them.
A user with an old browser that doesn’t support cookies, the application will not
work.
Cookies can be disabled on user browsers.
There is no security for sensitive data.
GREEN COMPUTING
This is the environmentally responsible use of computers and related resources. It involves implementation
of energy efficient CPUs, servers and peripherals as well as reduced resource consumption and proper
disposal of electronic waste (e-waste).
CLOUD COMPUTING
This refers to the use and access of multiple server-based computational resources via a digital network e.g.
WAN, Internet connection using the World Wide Web.
Cloud users may accept the server resources using a computer notebook, smart computer or other device.
The cloud server manages and provides application and data is also stored remotely in the cloud
configuration.
All processing and storage are maintained by the cloud server. Users do not down load and install
95
applications on their own device/computer.
96
It’s prone to attacks: storing information in the cloud could make your company vulnerable to
external hack attacks and threats. Nothing on the internet is completely secure.
Security in the cloud: in cloud computing, you are surrendering all your company’s sensitive
information to a third party cloud service provider.
Technical issues: Much as you can access information from anywhere any time, there are sometimes
when the system is not functioning due to technical problems.
There is long term dependence on host for maintenance and confidentiality of your
information and data.
There is less control over your information and data when handing it over.
EMERGING TECHNOLOGIES
These are new technologies that are currently developing or will be developed over the next five years. Or
These are technical innovations which represent progressive developments within a field for competitive
advantages.
They include Artificial Intelligence, Digital Forensics, Information Technology, Wireless data
communication, man-machine communication, on-demand printing, bio-technologies and advanced
robotics.
ARTIFICIAL INTELLIGENCE
This is a branch of computer science concerned with making computers behave like humans. It uses high
level languages such as LISP AND Prolog.
Examples of Al
Games playing: Programming computers to play games such as chess and checkers.
Expert systems: Programming computers to make decisions in real life situations e.g. those that help
diagnose diseases.
Natural language: Programming computers to understand natural languages. Some translation systems exist
but not as good as human translation.
Neural networks: Systems that simulate intelligence by attempting to reproduce the types of physical
connections that occur in animal brains.
Voice recognition: Systems can convert spoken sound into, words but they do not understand what they are
writing.
Robotics: Programming computers to see, hear and react to other sensory stimuli. Application of Al
Al is used in medical diagnosis, stock trading, robotic control, law, scientific discovery and toys, finance,
etc.
97
Finance: Used to organize operations, invest in stock and manage properties.
Medicine: In the medical field, Al is used in the following:
Image recognition and interpretation where many medical images can now be automatically
interpreted from x-ray.
Generating alerts and reminders on expert systems attached to a monitor can warn on patients’
conditions.
Diagnostic assistance especially if the person making the diagnosis is inexperienced.
Artificial neural works are used as clinical decision support systems for medical diagnosis.
Make staff rotation
Organize the bed schedule
Heavy industry: - Robots are considered for jobs which dangerous for humans. e.g.
Robots are used in repetitive jobs which may lead to mistakes or accidents due to mistakes or
accidents clue to lapse in concentration.
On-line and telephone customer service
Answering machines of call centers use speech recognition to allow computers handle 1st level
customer support.
Automated on-line assistant providing customer service.
Transportation: Fuzzy logic controllers have been developed for automatic gear boxes in
automobiles.
Aviation: - Air plane simulators are using Al in order to process the data taken from simulated
flights.
Simulated aircraft warfare: computers are able to come up with the best success scenarios in these
situations.
Pilots can be given assistance in the air during combat by computers. Al programs can sort information.
Computer simulated pilots can be used to simulate data.
Computer simulated pilots can also be used to train future aircraft controllers.
Advantages of Al
Machines take of complex and stressful work which would be performed by humans.
Machines can complete tasks faster than humans
Robotics discover unexplored landscapes and outer space
Less danger, injury and stress to humans as machines do work.
It aids mentally, visually and hearing impaired individuals
It is used for games — you do not feel as if you are with the machine
Understanding complex software is made easy.
Machines make less errors and defects
98
Using Al minimizes time and resources
Disadvantages of Al
The ability to replace human jobs has created un employment
Machines lack human touch. Human qualities are sometimes ignored e.g. caring behavior of
hospital nurses
Al can malfunction and do the opposite
Al may corrupt young generation
It can be used to cause mass scale destruction
Unemployed people will be mentally depressed, in poverty and increase crime in society.
Human beings are deprived of their work life and left with empty time
Intelligent machines may not be the right choice for customer service
Machines can’t be humans; we may make them think but can’t feel
Machines may enslave human beings and start ruling the world. This means Al can take over human
intellect.
Intelligent machines won’t work whole heartedly because they don’t have a heart.
Intelligent machines won’t be able to work for long hours without total dedication
DIGITAL FORENSICS
This is a branch of emerging technologies that involves the recovery and investigation of material found in
digital devices, often in relation to computer crime.
99
Data corruption: Sometimes the investigator can alter the original data in the process of attempting
to acquire it or it can even be lost. Even in analysis, the data can be modified.
Costs: costs may be high for computer analysis tools, software and security.
Some data may be encrypted so it needs a lot to decrypt it.
Some malicious programs may be introduced in the computer systems which may corrupt data at a
later stage. A virus may be released during analysis.
Physically extracted and relevant evidence may be destroyed or lost. Therefore the computer
forensic team is responsible for the custody of data.
2. Mobile device forensics: This is a sub branch of digital forensics relating to discovery of digital evidence
or data from a mobile device. Unlike the computer forensics, this one has an in-built communication system
and usually a storage mechanism. Here investigations focus on simple data such as a call data and
communications
(SMS/email) rather than in-depth recovery and related data. Mobile devices are also
useful for providing location information.
3. Network forensics: This is concerned with the monitoring and analysis of computer network traffic both
local and WAN/Internet for purposes of information gathering, evidence collection or intrusion detection.
4. Database forensics: Database forensics is a branch of digital forensics relating to the basic study of
databases and their metadata (information about the web page that is currently on). Investigations use
database contents, log files and in-RAM data to build a time line or recover relevant information.
EXPERT SYSTEMS
(INTELLIGENT KNOWLEDGE BASED SYSTEMS (IKBS/KBS)
It is an application of artificial intelligence where traditional human expert knowledge and experience are
made available through a computer package.
COMPUTER MAINTENANCE
This refers to caring, catering of a computer with a purpose of preserving, keeping it in good working order
and to prevent any damage.
TYPES OF MAINTENANCE
Hardware and software maintenance
Preventive maintenance
Routine/regular/frequent maintenance (it is time tabled e.g. weekly, monthly, annually)
Prompted/unprompted maintenance (if there is problem)
101
Operator/user, is it personal or shared computer.
Whether the system is networked or not
Type of software; operating system, type of packages (applications) it has.
Type of room where the computer is kept; is it air conditioned or not.
Physical security
Computer equipment and its data need to be protected from physical harm. These include natural ones such
as fire, lightening, water damage, theft, etc.
Computer theft
There are many ways of making sure that unauthorized people are denied access to the system
through use of keyboard locks and passwords. It is more difficult to prevent a thief from icking up a
system and stealing it.
Burglar proof doors and windows should be put on computer laboratories.
Locks alarmed on circuit board and tags are methods of hardware protection.
Preventing theft
Note the serial numbers of computers and peripherals
Lock the computers in case and keys should safely be saved
Data should be backed up regularly
All staff should be aware of computer security
All staff should wear security budges that contain their photographs to identify them
102
Software security
Data is a vital part of a computer and so it suffers from a number of risks. Such risks include:
Accidental loss of data
Accidental damage or corruption
Theft
Deliberate damage or corruption
Authorized disclosure
103