Ict Notes Full Course Unit
Ict Notes Full Course Unit
Analogue computers.......................................................................................................... 13
Hybrid computers ............................................................................................................... 14
INFORMATION AND COMMUNICATION TECHNOLOGY ..................................................17
AREAS OF APPLICATION OF ICTS ............................................................................................... 18
Applications of ICTs in education.......................................................................................... 18
Applications of ICTs in business ............................................................................................ 19
Applications of ICTs in health ............................................................................................... 19
Application of ICT in Security ................................................................................................ 20
Application of ICT in Politics and governance....................................................................... 20
Applications of ICTs in entertainment .................................................................................. 20
Applications of ICTs in industry ............................................................................................ 20
Scientific and Research systems ........................................................................................... 21
ii
Application of ICTs in Transportation system ....................................................................... 21
Application of ICT in communication system ....................................................................... 22
Impacts of using ICTs on Society ....................................................................................................22
Future trends in computer, information and communication technology ....................................25
COMPUTER LABORATORY ..............................................................................................................26
Areas of laboratory security include ......................................................................................... 27
Safe use of the laboratory ......................................................................................................... 31
HANDLING OF MATERIALS & EQUIPMENTS.............................................................................. 32
Laboratory rules and regulations .............................................................................................. 32
File ............................................................................................................................................. 37
Folder ........................................................................................................................................ 38
MANAGING STORAGE DEVICES USING WINDOWS ........................................................................39
WORD PROCESSORS .......................................................................................................................42
FEATURES OF WORD PROCESSORS ............................................................................ 43
Uses of Word Processors .......................................................................................................... 43
Advantages of Word Processors ............................................................................................... 43
Mail merge ................................................................................................................................ 44
ELECTRONIC SPREADSHEETS ..........................................................................................................45
USES OF SPREADSHEETS ........................................................................................................... 45
Advantages of using electronic spreadsheets ........................................................................45
Advantages of using electronic spreadsheets ........................................................................45
iii
Disadvantages of using electronic spreadsheets ...................................................................... 46
Application of Electronic Spreadsheets .................................................................................... 46
Spreadsheet Features ............................................................................................................... 46
SPREADSHEET DATA TYPES ....................................................................................................... 47
Excel Cell Addressing or Cell Referencing ............................................................................ 48
PRESENTATION SOFTWARE ............................................................................................................53
Areas where presentations are used ........................................................................................ 53
Common features of presentation software ............................................................................ 53
Functions of presentation software .......................................................................................... 55
DATA COMMUNICATION..............................................................................................................142
Terms used in Data communication ....................................................................................... 142
Types (Modes) of Data Transmission ...................................................................................... 144
Data Communication Tools ..................................................................................................... 145
Uses of data communications ................................................................................................. 146
Functions of computer communications system .................................................................... 151
COMPUTER NETWORKS ...............................................................................................................152
Functions of Computer Networks (Why computer networks?) ...........................................152
Network Connection Methods (Common Transmission Media) ............................................ 152
PHYSICAL MEDIA ................................................................................................................. 153
WIRELESS MEDIA ................................................................................................................ 155
TYPES OF NETWORKS .............................................................................................................. 157
vii
NETWORK REQUIREMENTS..................................................................................................... 159
Basic hardware and software for a Network facility .............................................................159
ADVANTAGES OF COMPUTER NETWORKS ............................................................................. 161
DISADVANTAGES OF COMPUTER NETWORKS ........................................................................ 162
NETWORK TOPOLOGY ..................................................................................................................166
Bus topology or linear bus topology ....................................................................................... 166
Ring topology .......................................................................................................................... 167
Star topology ........................................................................................................................... 168
Hybrid Topology ...................................................................................................................... 169
ix
INTRODUCTION TO COMPUTER STUDIES
Definition of a computer
A computer is an electronic device (machine) that can processes a user’s input (data),
stores it and outputs meaningful information. The computer processes data by a set of
instructions called a computer program.
PARTS OF A COMPUTER
Physical Parts of a Personal Computer, PC
Physical and tangible parts of a computer are called computer hardware.
The physical parts of a computer are made of a collection of different components that
Speaker
Keyboard
Mouse
Fig.1.1 Desktop personal computer
Computer physical parts can be either internal or external.
External hardware components include keyboard, mouse, monitor, speakers, system unit.
System unit is a metallic case that houses the internal components/ parts.
1
Opening the System Unit
Downloaded by Ssebunya Amon ([email protected])
Internal hardware components/ parts housed inside system unit include:
1. The central processing unit (CPU) or processor; referred to as
lOMoARcPSD|12298616
Serial Port
Used for external modems and older computer mouse
o versions: 9 pin, 25 pin model
Parallel Port
Used to connect external devices that need to send or receive
a lot of data over a short distance.
5
PS/2 Port
Used for old computer keyboard and mouse
ers provide two PS/2 port, each for mouse and keyboard
Universal Serial Bus (or USB) Port
It can connect all kinds of external USB devices such as
external hard disk, printer, scanner, mouse, keyboard, etc.
a USB port
Universal serial bus supports hot plugging (ability to add or
remove devices when a computer is running) and plug and
play (a computer’s capability to a recognize any new device
attached to it and assist in its setup by loading necessary
An IrDA (Infrared Data Association) port allows wireless devices to transmit data via
infrared light waves.
The IrDA port on the computer and the IrDA port on the peripheral device must be aligned
so that nothing obstructs the path of the infrared light wave.
Devices that use IrDA ports include keyboards, mouse, and printer
MIDI (musical instrument digital interface) port
A MIDI (musical instrument digital interface) port is designed to connect the system unit to
a musical instrument, such as an electronic keyboard.
MIDI is a standard of the electronic music industry.
A system unit with a MIDI port has the capability of recording sounds that have been
created by a synthesizer and then processing the sounds to create new sounds.
7
THE CHARACTERISTIC OF A COMPUTER
Speed: Computers work at very high speeds and are much faster than humans. The time
used by a computer to perform an operation is called the processing speed. Computer
speed is measured in Mega Hertz (MHz) or Giga Hertz (GHz).
Accuracy: ability of a computer to work (process data) without making any error/ mistake.
Modern computers are capable of detecting mistakes and making corrections once made
by the user.
Diligence: Computer has the ability to perform the similar task repeatedly without getting
tired or bored e.g. in industrial robotics, like those in Car assembly lines.
They are used in defense, nuclear plants, climate and weather stations, scientific
research, and large manufacturing plants.
Areas where supercomputers are used:
Supercomputers are mainly used for complex scientific applications that involve many
calculations & require a lot of computational power. Some of the applications that use
supercomputers include;
Weather forecasting.
Petroleum research.
Defense and weapon analysis.
Aerodynamic design and simulation.
Note. These tasks use large amounts of data, which need to be manipulated within a very short time.
Mainframe Computers
Smaller than supercomputers.
Slower than supercomputers
Smaller memory capacity than supercomputers
Cheaper than supercomputers
They can support a large number of peripherals of different types (can support between
5–300 terminals).
9
They can handle hundreds of users at the same time, e.g., they can be operated by
200 users at a time.
Mainframe computers are general-purpose, and can handle all kinds of problems
whether scientific or commercial.
They are used in big large businesses as network servers. A typical application is
banking where they are used to provide online data of customer accounts to branch
offices across the geographical region. However, their high cost and inability to
upgrade has made them unpopular.
Areas where mainframe computers are used:
Mainframe computers are mostly found in government departments, big organizations
and companies which have large information processing needs, e.g., they are used;
In Banks & Hospitals for preparing bills, Payrolls, etc.
In communication networks such as the Internet where they act as Servers.
used to hold the instructions required to perform a task. If the RAM capacity is
large, the computer can be faster.
4) Storage capacity of the Hard disk.
The storage capacity is the amount of space that is available for storing the
instructions required to manipulate data.
Higher storage capacities store more information or programs than low storage
capacities.
5) Cost of the computer.
The cost of a computer is directly related to the processing speed and memory
capacity and size. Microcomputers are less costly compared to minicomputers,
mainframes or Supercomputers.
6) Number of users who can access the computer at the same time.
Most microcomputers can support only 1, 2 or 3 users at the same time. However,
they can be networked to share resources.
Larger computers can support hundreds of users at the same time.
15
DATA AND INFORMATION
DATA:
Data is a collection of raw facts, figures or instructions which do not have much meaning
to the user.
Data may be in form of numbers, alphabets/letters or symbols, and can be processed to
produce information.
TYPES OF DATA
There are two types/forms of data:
a) Digital (discrete) data:
Digital data is discrete in nature. It must be represented in form of numbers, alphabets or
symbols for it to be processed by a computer.
Digital data is obtained by counting. E.g. 1, 2, 3, …
Data Processing:
It is the process of collecting all items of data together & converting them into information.
Processing refers to the way data is manipulated (or handled) to turn it into information.
The processing may involve calculation, comparison or any other logic operation to
produce the required result. The processing of data usually results in some meaningful
information being produced.
INFORMATION:
Information is the processed data (i.e refined, summarized & manipulated) in the way you
want. They are meaningful to the user and provide basis for decision-making.
The information must be accurate, timely, complete and relevant.
COMPARISON BETWEEN DATA AND INFORMATION
Data Information
Unprocessed (raw) facts or figures. It is the end-product of data processing
(processed data)
Not arranged. Arranged into a meaningful format.
Does not have much meaning to the user. More meaningful to the user.
Cannot be used for decision-making. Can be used to make decisions.
16
INFORMATION PROCESSING CYCLE
The series of input, process, output, and storage activities is very often called the
information processing cycle.
The basic stages of information processing include:
Computer-assisted assessment (CAA), which may reduce the time and labour
to mark the answer scripts.
Electronic learning (e-learning) through computer-based training and Web-based
training.
Simulation of experiments or real-life situations that may be hazardous.
Electronic library system for searching, borrowing, and returning books.
School Administration and Management System (SAMS) for keeping records of
students and producing report cards or other related documents.
Advantages of using ICTs in learning and teaching include:
Computers are widely used in the teaching & learning process. Learning and
teaching using computers is referred to as Computer Aided Learning (CAL)
and Computer Aided Teaching (CAT).
CAI and CAL packages that usually contain multimedia effects make learning more
interesting and interactive.
Students can learn by themselves when teacher is not available.
Students can usually get their results or feedback immediately after they have
answered the question or taken an action.
18
There are rich educational resources on CD-ROMs and the Internet.
Teachers can present subject matter and explain abstract concepts more clearly
with multimedia.
Teachers can show experiments that are difficult to perform or dangerous in nature
through simulations software.
Assists in long distance learning in universities usually referred to as the Open
University Concept.
Disadvantages of using ICTs in teaching and learning include:
Face to face interaction between students and teachers may be reduced.
Students can only follow what the CAL packages are predefined to offer.
Computers are expensive to purchase and maintain.
Students can access pornography on the internet leading to moral degeneration.
administrative work.
Applications of ICTs in entertainment
Play computer games
Listen to music
Watch a video or a movie
Compose and edit a video
Used by disk jockeys (DJs) to play, store and select music.
Applications of ICTs in industry
Data sensing and logging.
Computer-aided design and computer-aided manufacturing.
For advertisement purposes, which enable an industry to attract more customers.
Quality control; computers are used to monitor and control industrial processes
by using robots.
A Robot is a machine that works like a human being, but performs tasks that are
unpleasant, dangerous, and tedious to be done by human beings.
20
Robots are best used for jobs that require:
Repetitive tasks.
Lifting heavy equipment.
High degrees of precision (accuracy).
Advantages of using robots
Can work in hazardous environment that is threat to human life.
Are used to lift very heavy objects
Robots do not take break; they can work for 24 hours a day, 7 days a week.
Robots produce the same standard every time
They do not need to be paid hence reduce cost of production.
Greater productivity, higher output quality and quantity.
Greater accuracy, outputs are in most cases error free.
Need to be reprogrammed when there is a small change/ can’t think for themselves
Scientific and Research systems
Computers have a wide variety of applications in science, research and technology. Some
these include:
Weather forecasting
Medical research
Military and space exploration science
Application of ICTs in Transportation system
Automobile traffic control, e.g. to monitor vehicle traffic in a busy town.
Railway corporations to co-ordinate the movement of their goods & wagons.
Shipping control. The computers are used for efficient management of fleets &
communication.
Airports (Airline industry). The computers are used;
To control the movement of aircrafts, take off & landing through the use of
radar equipment.
Making reservations (online booking purposes).
Storing flight information.
21
Application of ICT in communication system
Facsimile machine (Fax) is a telecommunication device used to send documents
via telephone lines.
Radio communication used in radio broadcasting stations to record and manage
radio programmes.
Television sets (TV)
The Internet provides information transfer and efficient communication
Telecommuting is a situation where an employee works usually at home using a
computer connected to the workplace network.
Videoconferencing refers to use of computers, digital video camera, audio
capturing equipment and communication networks to enable people in different
locations to see and talk to one another.
Or videoconferencing is the conduct of videoconference by a set of
Computers increase productivity and overall quality leading to cheaper and better
products.
Negative
ICT led to replacement of computer illiterate workers and displacement of jobs that
were formerly manual.
Environmental (Green Computing or IT Computing)
Green computing can be defined as: “Green computing or green IT is the practice and
study of environmentally sustainable computing.”
In simple words, green computing is the practice of reducing environmental footprints
of technology by efficiently using the resources.
Positive
Provide paperless environment, hence conserving the environment.
Saving energy and resources saves money
Conserving resources means less energy is required to produce, use, and dispose
of products.
23
Negative
Environmental pollution. For example huge garbage damps of dead computer parts,
printers, ink/ toner cartridges, monitor and other computer accessories are disposed in
landfills hence causing environmental pollution.
Energy consumption and radiation. Initial computers consumed a lot of energy thereby
generating a lot of heat and emitting electromagnetic radiations.
Issues of workers’ health (Effects on health)
If we use a computer for many hours (as people often do at work), there are some health
issues that might affect us. These include:
1. Eye-Strain
Eye-strain (tiredness of the eyes) is caused by looking at a monitor at a constant
reasoning, communicating, seeing and hearing. Computer scientists and engineers are still
working harder and carrying out intensive research with the aim of coming up with smarter
computers which can almost simulate human thinking and learning instead of relying on
static programmed instructions.
Application areas of artificial intelligence:
1. Expert systems: a software designed to make a computer to operate at a level of
human expert in a specific area of specialization.
2. Natural language processing: aimed at coming up with programming languages
that would make computers recognize and understand natural languages such as
English, French, Kiswahili, Lugbara, etc
3. Artificial neural networks: is the use of electronic devices and software to
emulate the cognitive learning process of the human brain and how it recognizes
patterns.
4. Robotics/ perception systems: is a computer controlled device that emulates a
human being in carrying out tasks that would be otherwise dangerous and difficult.
5. Expanded information superhighway: this involves the integration of cabled and
wireless technologies for the purpose of data and information transmission. This
25
has given rise to video conferencing, distant learning and virtual learning centres,
virtual offices, etc.
Digital forensics
Digital forensic refers to the forensic science encompassing the recovery and investigation
of material found in digital devices often in relation to computer crime.
There are four main application areas of digital forensic namely:
1. Legal consideration- use of digital evidence in court
2. Branches- perception of the computer forensic, mobile device forensic, network forensic
3. Application of digital forensic such as electronic discovery, intrusion etc.
4. Forensic process- analysis and reporting
A person who attends, monitors, administers the safe use of computers in the computer
lab.
SAFETY PRECAUTIONS & PRACTICES IN A COMPUTER LABORATORY
After establishing the computer laboratory, a number of safety precautions, rules, and
practices need to be observed in order to avoid accidental injury to the users, damage of
computers or lack of a conducive environment for teaching and learning.
The safety precautions and practices include;
BEHAVIOUR IN THE COMPUTER LABORATORY.
The following rules must be followed in and around a computer laboratory.
a) Entering the computer room.
Only authorized people should enter the computer room.
Remove your shoes before entering the computer room to prevent dust.
Avoid smoking or exposing computers to dust. This is because; smoke & dust
contain small abrasive particles that can damage computer components and cause
wearing of the moving parts.
Do not carry foods such as Toffees, chocolates, chewing gums, &
drinks/beverages to the computer room.
26
Food particles may fall into the moving parts of the computer and damage
them. Liquids may spill into the computer parts causing rusting or electrical faults.
Collect any waste materials (e.g., paper bits) which might be lying in the computer
room & put them into the dustbin.
Avoid unnecessary movements, because you may accidentally knock down the
peripheral devices.
Computer illiterates should not be allowed to operate the computers.
Shut the door of the computer room properly.
b) Starting and shutting down the computer.
Always follow the proper procedure for starting & shutting down the computer to
avoid loss of data and damage to computer programs.
Avoid turning the computer on & off frequently as it is harmful. Every time a PC is
You should be able to maintain your proper arm position and place your feet firmly
flat on the floor.
Adopt a relaxed, upright working posture. Avoid slouching (bending) forward or
leaning far backwards.
The Chairs should have low back support & footrest and should also be adjustable.
Place frequently used work materials within easy reach.
For example;
The Keyboard, Mouse & other input devices should be positioned such that
your hands are in a relaxed, comfortable position.
Position the Keyboard directly in front of you. This makes it possible to type
with your shoulders relaxed and your upper arms hanging freely at your sides.
Position the Mouse at the same level as the keyboard.
LIGHTING & VISION CARE.
A computer room must be well lit to avoid eyestrain that eventually leads to
headaches, stress, and fatigue. Similarly, when you work at your computer for long
periods of time, your eyes may become irritated. Therefore, special care should
be given to your vision.
30
Tilt the computer so that the display faces away from the windows. This will
minimize glare (or bright reflections) on the screen.
Position the lighting equipment or sources of light such that glare (or bright
reflections) on the display are minimized. Where necessary, use indirect lighting
to avoid bright spots on the display.
Use/fit radiation filter screens (anti-glare filters) to reduce the light that reaches the
eye.
Avoid using a flickering monitor. This causes extreme eyestrain that can damage
your eyesight.
The wall paints used should not be very bright as they reflect too much light causing
eyestrain.
Use the brightness & contrast controls on the Monitor to adjust the brightness of
the computer monitor until the eyes feel comfortable, and also to improve image
You should have glasses that are specifically suited for working with the computer
display.
Keep your glasses and the display clean.
Have your eyes examined regularly by a vision care specialist.
The distance between the user & screen should be between 450 – 500mm.
Safe use of the laboratory
For the safe use of the laboratory, the measure that protects the user while in the computer
lab.
All cables should be insulated: to avoid the danger of electric shock to users.
Cables should be laid away: from user paths to avoid tripping on them.
Providing standard furniture: to avoid poor posture, this may lead to strain injury
and limb fatigue.
Providing antiglare screens: to avoid eye strain and fatigue caused by over bright
cathode ray tube (CRT) monitors. However, modern flat panel displays such as
liquid crystal display (LCD) should be used since they do not strain the eye.
The room should be properly ventilated: to avoid dizziness caused by lack of
enough oxygen and to allow computers to cool.
31
Overcrowding: in the computer room is not allowed. This may cause suffocation
HANDLING OF MATERIALS & EQUIPMENTS
Computer devices must be handled with a lot of care as they are extremely fragile and can
easily get damaged. Dropping or bumping can cause permanent damage on the device,
e.g. to transport the System unit; always handle it on its frame.
Do not place heavy objects on the computers.
Protect the computer devices especially the Monitor & the disks away from any
electrostatic discharge (keep them away from strong magnetic fields).
The computer devices should not be exposed to direct sunlight or warm
objects. This causes the internal components of the computer to get heated, and
as a result, affects the computer’s solder-joints.
Students should only perform operations on the computer that they are sure of and
4) The results of the POST are compared with the data in the CMOS chip.
5) The BIOS looks for the system files in the boot disk.
6) The boot program loads the kernel of the OS into RAM from storage.
7) The OS loads configuration information and displays the desktop on the screen.
Note:
ROM contains the basic input/output system (BIOS), which is a sequence of
instructions the computer follows to load the operating system and other files when
the computer is turned on.
The POST (Power-On Self-Test) checks the various system components such as
the buses, system clock, expansion cards, RAM chips, keyboard, floppy disk drive,
and hard disk.
The results of the POST are compared with data in a CMOS chip on the
motherboard.
CMOS (Complementary metal-oxide Semiconductor) is used to store configuration
information about the computer, which includes amount of memory, types of disk
drives, keyboard, monitor, current date and time, etc.
CMOS chips use battery power to retain information even when the computer is
turned off.
35
Unlike ROM, information stored in CMOS can be changed.
The CMOS chip is updated whenever new components are installed.
In Windows, system configuration information is contained in several files called
the registry
After booting a computer, the first screen you see is called a Desktop.
Desktop is large area on the screen, on which Icons, desktop application windows, dialog
box, etc appear.
Desktop Features
In a windows environment, desktop features are usually icons (small graphical images
representing information about something). There are some icons called Short cut icons
which are identified by the small arrows on the lower left corner of the image.
computer, add or remove programs, setup network connections and user accounts.
4. Recycle Bin: allows you to send files you wish to delete from your computer (keeps
temporary deleted files). A file accidentally deleted can be restored from the
Recycle Bin. However, if a file is deleted from the Recycle Bin, you cannot find it
anymore.
5. Taskbar: this where the Start button lies (usually to the extreme left), current time
and date are displayed (usually to the extreme right), displaying active programs
(programs opened).
6. Internet Explorer: a web browser (program) enabling access to internet.
36
FILE MANAGEMENT
A file manager is a program that performs functions related to storage and file
management.
Functions performed by a file manager include:
Formatting and copying disks.
Displaying a list of files on a storage medium.
Checking the amount of used or free space on a storage medium.
Copying, renaming, deleting, moving, save files and sorting files.
FILES AND FOLDERS
File
Other removable D, E, ..., Z If a computer does not have an optical dive, any
drives removable drive attached to it can take any letter
between D and Z
Network drive Logical drives In a networked environment, network drives can
D–Z take up letters D to Z depending on the number of
physical drives installed or attached
MANAGING STORAGE DEVICES USING WINDOWS
Microsoft Windows provides the user with storage media management utilities such as disk
formatting, scandisk, compression agent, disk defragmenter and backup utilities.
Formatting drives
Formatting means writing tracks and sectors on a disk to make it ready for data storage.
When a disk is formatted, data in it is lost.
To format a drive:
1. Double click My Computer icon
2. Right click the drive to format
3. On the Shortcut menu, click Format
4. Click start.
39
Scanning a drive for problems
Scan disk is a special utility that enables the user to scan a storage device for physical and
directory storage problems.
To scan and check a drive for errors:
1. Right click the device icon in My Computer window then select Properties
2. In the properties dialog box, select the Tools tab
3. Under the Tools tab, click Check now
4. In dialog box, select a fix disk option then click Start
Defragmenting a disk
A single file may have several pieces (fragments) scattered in several non-contiguous
sectors on a disk. These scattered parts are re-assembled on a contiguous part using the
defragmenter
Menu bar: this contains menu options (File, Edit, Insert, Format, Tools, Table, Help).
Tool bar: this is the bar containing a set of icons to perform different tasks.
Tool bars are of two types; Standard tool bar and Formatting tool bar.
Ruler: this displays the margins, indents, tab positions on a number scale.
Working area: this is where the typing is done.
View bar: this is displayed just below the working area containing four icons in it. They can
be used to display documents in Print layout view, Web layout view, Outline view and
Reading layout view
Scroll bars: Vertical and horizontal scroll bars for scrolling the page up and across the
word window.
Drawing tool bar: it is displayed at the bottom of the word window, just above the scroll
bar containing tools for drawing and inserting auto shapes.
Status bar: it’s displayed at the bottom of word window and it displays the status of the
active window e.g current page number, number of pages, insertion point position, section,
etc.
NB: there are many tool bars to be used. Other tool bars can be made active from View –
Tool bars.
42
FEATURES OF WORD PROCESSORS
In addition to creating, saving, retrieving and modifying text, word processors offer many
features for making your work more attractive and more efficient. Some of the common
features include:
Delete text: deletes a character, a word or a block of text. Deleting can be done using
delete key or Backspace key.
Note: Delete key erases characters to the right of the cursor while the backspace key
erases characters to the left.
Spelling and grammar checker: automatically locates misspelled words and grammatical
mistakes.
Find/Search and Replace: used to locate a word or a phrase and replace it with another.
Thesaurus: allows the user to automatically find words or phrases with similar meanings
Below 40 Fail
To assign a grade use,
=IF(A3>=80, “A”, IF(A3>=60, “B”, IF(A3>=40,”C”,”Fail”)))
Using VLOOKUP function
Syntax: VLOOKUP (Value, Table-array, Index-number, [Not-exact-match])
Parameters or arguments:
Value: the value to search for in the first column of the table.
Table-array: two or more columns of data that is sorted in ascending order.
Index-number: the column in the table from which the matching value must be
returned. The 1st column is 1.
Not-exact-match: optional. It determines if you are looking for an exact match based
on value. Enter FALSE to find an exact match. Enter TRUE to find and approximate
match. If this parameter is omitted, it will return approximate match.
50
Example
You want to grade students in the following marks they scored.
Marks Grade
0 – 39 Fail
40 – 59 C
60 – 79 B
80 -100 A
Note: when entering this data into spreadsheet, consider the lower class limits for marks
ranges and ignore the upper class limit. Enter this table in another sheet, say sheet2.
= VLOOKUP(B2, Sheet2!$A$2:$B$5, 2)
Where B2 is the value to search, Sheet2! is the sheet where the table-array is, A2:B5 is
the range in the table-array, 2 is the column-index-number in the table-array for which the
matching value must be returned.
Revision Questions
Q1. Explain any five features of a spreadsheet application.
Insert text: Allows you to insert text anywhere in the spreadsheet.
Delete text: Allows you to erase characters, words, charts, or worksheets as easily as you
can cross them out on paper.
Cut and Paste: Allows you to remove (cut) a section of text from one place in a
spreadsheet and insert (paste) it somewhere else.
Copy: Allows you to duplicate a section of text.
Page layout: Allows you to define various page sizes and margins.
Search and Replace: Allows you to direct the spreadsheet to search for a particular word
or phrase. You can also direct the spreadsheet application to replace one group of
characters with another everywhere that the first group appears.
Headers, Footers, & Page Numbering: Allows you to specify customized headers and
footers that the spreadsheet file will put at the top and bottom of every worksheet. The
spreadsheet automatically keeps track of page numbers so that the correct number
appears on each page.
Merges: Allows you to merge text from one file into another file. This is particularly useful
for generating many files that have the same format but different data.
51
lOMoARcPSD|12298616
Spell Checker: A utility that allows you to check the spelling of words in a spreadsheet
file.
Print: Allows you to send a spreadsheet file to a printer to get a hardcopy or many
hardcopies as you would like.
Thesaurus: A built-in thesaurus that allows you to search for synonyms (words with similar
meaning) and antonyms (‘opposites”) without leaving the word processor.
Graphics: The spreadsheet application permits the addition of various types of graphics,
such as bar charts, line charts, clip art, and photographs. etc.
52
PRESENTATION SOFTWARE
Slide animations – effects allow the various elements on each slide to appear after a
certain amount of time or when a presenter presses a button. [Putting motion or sound to
various objects on your slides. This allows your text or graphics to appear on the slides
from different directions and in a various ways]
Text placeholder – This is an object on the slide usually a box that serves a place for text.
53
Graphics placeholder – space reserved on a slide usually a box for inserting graphics
like charts.
Slide layout - A slide layout uses a specific combination of placeholders to arrange your
information on the slide. For example, if you know you'll have text on the slide and you also
want a picture or graphic of some kind, choose a layout that has both text and content
placeholders. [This is the given design showing divisions/ areas/section of a slide where
work can be done eg title only, blank slide layout]
Design template - A template allows you to establish background, color schemes, style,
and decorative accents.
Slide master – this allows the style (font face, font size, background etc) to be set once
and then used throughout the presentation.
Slide Master – This is a single slide that controls all other slides in a given presentation.
Any changes made to it affect the rest, respectively.
Or Slide master is a slide which helps you to make uniform features inform of background
or objects to every slide in your presentation
[Slide masters allow you to make design decision that will affect each slide in the
presentation]
Types of masters:
Slide masters - This is a single slide that controls all other slides in a given presentation.
Any changes made to it affect the rest, respectively.
Handout masters – This holds for the formatting of the appearance of headers and footers
on handout pages.
Notes masters – This holds for the formatting of your notes page.
Note: To create a master slide, select view – master (select the master)
Slide transitions – this is how the presentation software “moves” the display of one slide
to another. Transitions usually include dissolving from one slide to the next or the current
slide being moved in some way to show the next slide as though it was underneath.
Transition looping – Is a facility which sets up the presentation to run continuously until
it is stopped by the presenter. In Ms. PowerPoint 2003, Go to slide show – setup show –
then loop continuously until Esc.
Slide notes – when these are used the presenter will see the current slide and any notes
associated with it on his/her display and the audience will see just the slide on another
screen or from a projector.
Slide show – a feature that enables to view show setup during presentations, setup the
slides to run continuous until ESC.
54
1. Use contrasting colours for the text and background so that the text will be easy to
read.
2. Use large font sizes to be seen from the back of the room where the presentation
will be held. A font size of 24 or larger is recommended.
3. Use short phases and sentences to convey your message.
4. Use simple slide transitions; too many different transitions will distract your
audience from the subject of the presentation.
Viewing a presentation
There are several ways of viewing a presentation, these include:
55
Slide view: this view shows how the slide will appear when presented or displayed.
Notes page view: allows you to enter text, graphics in a notes placeholder (located bellow
the image of the slide)
Slideshow view: displays computer based slideshow with animation, transition and timing
effects. It enables you to view your slides in a presentation
Handouts: it enables one to print multiple slides on a single page
Slide sorter view: is a view that enables you to view all your slides in a presentation and
organize them as desired.
Qn. Give two reasons why a slide show presentation would be better than just
printing out and distributing a newsletter.
(i) Slide show presentations do not waste paper
(ii) Audio, video, text and graphics can be presented while printed outputs cannot
display audio, video data types
(iii) Slide show presentations have entertainment values e.g. slide animations,
transitions.
56
COMPUTER SYSTEMS
COMPUTER HARDWARE
Processing Memory
Input Devices Storage Out Devices
Devices
Devices
Computer hardware are the parts of a computer that can be physically touched and felt.
Microcomputer system hardware consists of a System Unit, a Monitor, Keyboard, Mouse,
etc.
57
An input device is any hardware component that allows a user to enter data and
instructions into a computer.
Processing devices convert data into meaningful output form called information.
Processing is usually done in CPU (central processing unit).
An output device is any hardware component that can display information to a user.
A storage device records and retrieves items to and from a storage medium.
Communications devices enable two or more computers to exchange items such as
data, instructions, and information with each other.
The system unit is the rectangular case that houses the electronic components inside the
computer.
Input hardware
58
Scanner
Digital camera
Mouse
Trackball
Touchpad
Stylus and
Joystick/joy pad graphics
59
Bar codes
Bar cord readers
OMR
Scanner
60
38
The Keyboard
A keyboard is:
simply a set of buttons with assigned symbols.
a primary input device with a number of special keys which can initiate commands.
Types of keyboards
Keying devices include:
(i) Traditional keyboard – rigid with typing, navigation numerical keypad, function
and special PC keys.
(ii) Flexible keyboard – can be folded
(iii) Ergonomic – designed to provide comfort and alleviate wrist strain
(iv) Braille keyboard – used by the blind
(v) Keypad – miniature keying device (this is a small keyboard used with hand held
devices i.e. cell phones, calculators, notebooks etc)
(vi) Wireless keyboard
Parts of a Keyboard:
A standard keyboard consists of:
a) Function Keys (F1-F12) which are used to perform specific functions depending
on the applications packages being used e.g. most applications use F1 for help
b) The Numeric Keypad (0-9), usually located on the right side of the keyboard.
They are mainly used to enter data (numeric data) very fast into the computer.
c) Alphanumeric Keys/Typewriter Keyboard: these are used for normal
operations such as typing text an entering numeric data.
d) The Toggle/Control keys: these include shift, tab, Caps. Lock, Alt, Ctrl, Esc.
These are used in combination with other keys or on their own to perform
specific tasks. E.g. Shift + any letter → capital of that letter (Shift +a →A, shift + 5
→ %, ctrl +Alt + Del → Restarts computer (warm booting). The escape key is
used by most applications to exit from a program or to; move back one step to
the previous operation. Windows key activates the start-up menu for the
computer user to run, shutdown, search, etc using arrow keys. NUMLOCK key
activates and deactivates the numerical keypad
76
77
The OMR reader first reads the answer key sheet to record the correct answers
based on the patterns of light, and then reads the remaining documents and
matches their patterns of light against the answer key sheet.
OMR readers are often used for marking multiple choice answer sheets,
capturing data from questionnaires, enrolment forms, and lottery tickets.
78
OCR readers are often used for turnaround documents (e.g., electricity bills).
79
POINTING DEVICES
A pointing device is an input device that allows a user to control a pointer. A pointer is a
small symbol, on the screen.
Pointing devices include: Mouse, trackball, joystick, touch screen, touchpad, light pen,
graphics tablet, etc.
80
Touchpad
A pointing device found on most laptops. The user moves a finger across the touchpad
that can send data to the computer.
Trackball
A trackball is a stationary pointing device with a ball mechanism on its top.
81
They are easier to use than mouse, hence are often used by people with limited
movement (disabled) or by very young people.
Touch screen
A touch screen is a touch-sensitive display. The user selects items on the screen by
touching the surface of the screen.
Touch screens are often used for information kiosks located in department stores, hotels,
airports, and museums.
A kiosk is a freestanding computer, usually with a touch screen that serves as an input
device to provide information to the public.
Joystick
A joystick is a pointing device with a vertical lever mounted on a base.
The lever usually includes buttons called triggers, which activate certain events when
pressed.
Joysticks are mainly used for computer games and ultrasound scanners in hospitals.
82
Light pen
A light pen is a pointing device that can detect the presence of light. Light pens are used
to write on the screen of the computer.
Light pens are used by health care professionals (such as doctors and dentists) and design
work.
83
Scanner
A scanner is a light-sensing input device that converts printed text and graphics into a
digital form that can be further processed by the computer.
Scanners are mainly used for image processing, which consists of capturing, storing,
analyzing, displaying, printing, and manipulating images.
Many scanners also include optical character recognition (OCR) software, which can
convert an image of text into a text file that can be edited.
Optical character recognition (OCR) is a technology that involves reading typewritten,
computer-printed, or handwritten characters from source documents and translating the
images into an editable form.
Digital camera
A digital camera takes pictures and stores the images digitally, rather than on traditional
film.
Digital cameras use different media to store images, which include flash memory card,
floppy disk, compact disc, and micro drive.
The quality of a digital camera is determined by its resolution and color depth.
Optical resolution is the actual photographed resolution.
Enhanced resolution or interpolated resolution uses a special formula to add pixels
between those generated by the optical resolution.
87
Webcam
A Webcam is a video camera whose output displays on a Webpage.
A webcam is also called a PC video camera which usually sits on top of monitor. Some
laptops have built-in webcams.
Sound Card
A device that can be slotted into a computer to allow the use of audio components for
multimedia applications. Without sound card, audio input and output is not possible.
Microphone
A microphone is an input device that allows a user to speak to the computer to enter data
and instructions into the computer. It converts sound into a signal that can be fed into a
computer.
88
Biometric Device
A Biometric Device is:
89
A voice recognition system might reject a legitimate user with a sore throat.
Remote Control
Sensors, etc.
A sensor is an input device that can detect external changes in an environment.
When the sensors are located at some distance from the computer system, they are known
as remote sensors.
Remote Control
Remote control devices emit a beam of infrared light, which carries data signals.
Remote control is commonly used with TVs but some laptop computers being produced
come with remotes and a form of input device, which allow you to operate the laptop from
a distance.
Input - Sensors
A sensor is a device that converts a real-world property (e.g. temperature) into data
that a computer can process.
90
EFTPOS (Electronic Fund Transfer Point of Sale) terminals are able to transfer
funds from a customer's bank account directly to a retail outlet's account after
reading the customer's debit card.
91
EFTPOS terminals are similar to EPOS terminals but are also able to transfer funds
from a customer's bank account direct to a retail outlet's account after reading the
customer's debit card.
OUTPUT DEVICE
Output is data that has been processed into a used form, called information.
An output device is any hardware component that can display information to a user.
Examples of output devices include:
Monitor
Printer
Audio Output Device
Data Projector
Facsimile Machine
Multifunction Machine
Terminal
Display devices
Display devices /Visual Display Unit (VDU)/ Monitor
Two main types of monitor display devices are:
CRT monitor as for most desktop computers.
92
LCD monitor as for Laptops, Notebook computers and other flat panels.
A display device is an output device that conveys text, graphics, and video information to
a user.
The monitor is sometimes called the Visual Display Unit.
Information on a display device is called a soft copy because it exists
electronically and displays only for a temporary period.
A video card is required to display color on a monitor.
The quality of a display device depends on its resolution, dot pitch, and refresh
rate.
(i) Pixels (picture elements): these are tiny dots of phosphor material that glow
when electrically charged to produce an image.
(ii) Resolution: describes the sharpness and clearness of image created on the
screen determined by number of pixels a monitor can display.
(iii) Dot pitch: a measure of image clarity, in terms of distance between each pixel on
a display. The smaller the distance between pixels (dot pitch), the sharper the
image.
(iv) Refresh rate: is the speed that a monitor redraws images on the screen
(v) Type of the monitor i.e. CRT or LCD.
CRT monitors
A Cathode Ray Tube (CRT) monitor works like a standard television because it also
contains a cathode ray tube (CRT).
The front of the CRT is the screen, which is coated with tiny dots of phosphor material.
93
Each dot consists of a red, a green, and a blue phosphor and the three dots combine to
make up each pixel.
A pixel (short for picture element, using the common abbreviation "pix" for “pictures") is a
single point in a graphic image. The more pixels used to represent an image, the closer
the result can resemble the original. The number of pixels in an image is sometimes called
the resolution.
PRINTERS
A printer is an output device that produces text and graphics on a physical media such as
paper.
Printed information is often called hard copy because the information exists physically
and is a more permanent form of output than that presented on a display device.
94
Dot-matrix printer
Ink-jet printer
Laser printer
The printing speed of a printer is usually expressed in pages per minute (ppm).
Printer resolution is often expressed in dpi (dots per inch). The larger the number, the
higher the resolution.
Impact printers
Impact printers are printers whose print head strike the printing media directly in order to
form characters, examples include
Dot Matrix printer
Daisy –Wheel printer
Thermal Printers
Line Printers
95
Dot-matrix printer
A dot-matrix printer is an impact printer that produces printed images with a print head
striking mechanism.
Most dot-matrix printers use continuous-form paper.
Line printer
A line printer is a high-speed impact printer that prints an entire line at a time.
The speed of a line printer is measured by the number of lines per minute (lpm) it can print.
Line printers are often used with mainframes, minicomputers, or with a network in
applications such as manufacturing, distribution, or shipping.
Non-impact printers
These are printers whose print heads do not directly touch the print media but instead they
form characters by use of strings or jet of ink heated up within.
They are less noisy compared to the impact printers and they are commercially fast hence
they are expensive.
Examples include, the LaserJet, Inkjet, Bubble Jet
Ink-jet printer
An ink-jet printer in a non-impact printer that forms characters and graphics by spraying
tiny drops of liquid ink onto a piece of paper.
96
Ink-jet printers can produce letter-quality (LQ) text and graphics in both black-and-white
and colors.
Some ink-jet printers can print photo-quality images on any type of paper.
Printer resolution is measured in dots per inch (dpi).
The speed of an ink-jet printer is measured in pages per minute (ppm).
Laser printer
Laser printer in a non-impact printer
The mechanism of how a laser printer works is similar to a photocopier.
Advantages of laser printers include:
Laser printers are generally quiet and fast.
Laser printers can produce high quality output on ordinary papers.
The cost of operation is low since it uses toner.
97
Data projector
A data projector takes the image that displays on a computer screen and projects it onto a
larger screen so that people can see the image clearly.
An LCD projector, which uses liquid crystal display technology, can produce lower-quality
images only.
A DLP (digital light processing) projector, which uses tiny mirrors to reflect light, can
produce much better images even in a well-lit room.
Advantages of Fax
Hard copies are available.
Disadvantages of Fax
Sending a big document can be slow.
Wasteful of paper when junk faxes are sent.
Multifunction devices:
A multifunction device is a single piece of equipment that provides the functionality of a
printer, scanner, copy machine, and a facsimile machine.
Plotters
Plotters are mainly used for printing large engineering and architectural drawings. The
largest paper size that can be used to print on is A1’s size paper. Plotters use pens to plot.
98
OUTPUT DIVES:
Softcopy Output Devices
99
STORAGE DEVICES
When we talk about storage, we refer to memory.
Memory is a temporary area for holding data, instructions, and information.
Or it is the ability of a computer to store and remember data or information given to it.
A computer usually loads the data and instructions from storage into memory and then
executes them.
ROM Chips
Chip or microchip is a small piece of semi conducting material containing electric circuit.
Programmable Read Only Memory (PROM) is memory which can only be programmed
once after it has been manufactured (written once). It can never be altered eg compact
disk writable (CD-R).
100
1. RAM is volatile memory (memory that loses its contents when power is switched
off)
2. RAM is a part of memory that stores temporary instructions, information when
computer is running i.e. RAM is used to hold data or programs that the user is
currently working on.
3. Data can be read and written to RAM.
4. When a computer is in use, its RAM will contain;
a. The operating system software.
b. The application software currently being used.
c. Any data that is being processed.
5. The more RAM a computer has, the more instructions/data it will manipulate
(process).
Differences between RAM and ROM
RAM ROM
RAM is volatile (loses its contents when ROM is non-volatile (does not lose its
power goes off) contents when power goes off)
RAM size or capacity can be increased on ROM capability cannot be increased on
a computer the motherboard
Stores current instructions and data being Stores BIOS and firmware programs to be
worked upon by CPU read by CPU
Data access is faster on RAM Data access is slow compared to RAM
RAM can both be read and write ROM can only be read but not written to
101
A storage device records and retrieves items to and from a storage medium.
Storage devices act as input devices when they read and act as output devices when they
write.
102
Reading is the process of transferring data, instructions, and information from a storage
medium into memory.
Writing is the process of transferring these items from memory to a storage medium.
The speed of a storage device is defined by its access time, which is the amount of time it
takes to locate an item on a medium.
103
A floppy disk drive (FDD) is a device that can read from and write to a floppy disk.
If a computer has only one floppy disk drive, the drive is usually designated drive A
(i.e. A :).
If the computer has two floppy disk drives, the second one is usually designated drive B (i.e.
B :).
A tape drive is used to read from and write data and information onto a tape. Three common
types of tape drives are QIC (Quarter-inch cartridge), DAT (Digital audio tape), and DLT
(Digital linear tape).
Hard disk
A hard disk is also known as a hard disk drive.
A hard disk usually consists of several inflexible, circular disks, called platters, on which items
are stored electronically.
The hard disk in most desktop and laptop computers is housed inside the system unit, and is
considered fixed disks because being not portable.
Hard disks are sealed tightly to keep out of contaminants (e.g., dust and smoke particles),
which may result in head crash.
Head crash is a hard-disk failure in which a read/write head collides with the surface of the
platter on which information is stored.
Data is stored inside a hard-drive on rotating metal or glass discs (called ‘platters’).
104
Magnetic tape
Magnetic tape is a magnetically coated ribbon of plastic capable of storing large amounts of
data and information at a low cost.
It is one of the first storage media used with mainframe computers.
Tape storage requires sequential access, which refers to reading or writing data
consecutively.
Floppy disks, hard disks, and compact discs all use direct access, or random access, which
means that a particular data item or file can be located immediately, without having to move
consecutively through items stored in front of it.
Tapes are used most often for long-term storage and backup.
Tapes are also used and in some batch-processing applications (e.g. to hold the list of data
that will be processed).
To care for a floppy disk, it should not be exposed to heat, cold, magnetic fields, and
contaminants such as dust, smoke, or salt air.
105
106
DVD-RAM is the recordable and rewritable versions of DVD-ROM, which allows items to be
erased and recorded on it multiple times.
107
DVD-R is the recordable and rewritable versions of DVD-ROM, which can be written once and
read (play) for many times.
DVD+RW is the recordable and rewritable versions of DVD-ROM, which can be written and
read (play) for many times.
A DVD+RW is similar to a CD-RW, except it has higher storage capacity than CD-RW.
Pay attention to the following points for taking care of compact discs.
1. Always store the compact disc in a disc container or box when not in use.
2. Always hold a compact disc by its edges.
3. Never touch the underside (shinny surface) of the compact disc.
4. Never stack discs on top of each other.
5. Never expose the disc to excessive heat or sunlight.
Solid-state storage devices store data using a special type of memory called flash memory.
Memory Cards
Many of our digital devices (cameras, mobile phones, MP3 players, etc.) require compact,
non-volatile data storage. Flash memory cards provide this and come in a variety of shapes
and sizes.
Mobile phones contain a Subscriber Identity Module (SIM) card that contains the phone’s
number, the phonebook numbers, text messages, etc.
Smart Cards
Many credit cards, door entry cards, satellite TV cards, etc. have replaced the very limited
storage of the magnetic strip with flash memory.
108
Disk portioning means dividing a disk into two or more regions or portions. The regions
appear as separate disks on the operating system.
Flash memory can be found in many data storage devices; used to store programs and data
on personal computers, cellular phones, printers, digital cameras, pagers, and personal
digital assistants (PDA).
(ii) Buffers
Are special memories that are found in input/output devices. Input data is held in input buffer
while processed data is held in output buffer. For example, data in computer printers is placed
in the buffer before being sent to the printer.
(iii) Registers
Registers are special types of memory inside the CPU for temporary storage.
With virtual memory (VM), the operating system allocates a portion of a storage medium,
usually the hard disk, to function as additional RAM.
The area of the hard disk used for virtual memory is called a swap file.
The amount of data and program instructions swapped or exchanged at a given time is called
a page.
109
BACKINGUP DATA
What is a Backup?
A backup simply means making one or more copies of your data.
Why Backup Your Data?
When you delete a file by accident
Your computer breaks
Your laptop is stolen
Your business burns to the ground;
Having a backup copy means that you have not lost your precious data.
You can recover your lost files and continue working.
110
Measurement of memory
Data storage capacity is measured in bytes (B) although the data is actually stored in binary
digits (bits).
A bit (Binary digit) is the smallest unit of computer measurement (0 or 1). It represents
(On) and (Off) states of a component in an electric circuit.
Nibble is a group of four (4) bits.
A byte is a group/set of 8bits. Is a unit which represents a character.
To store the word EXAM, 4bytes are required because there are four characters in the word
EXAM. Since a byte is a group of 8bits, therefore 4x8bits = 32bits are required.
Modern hard drives can store a terabyte of data or more - that's more words than you could
type even if you started now, and typed until your old age!
111
112
Note: Tapes are very slow if you want to read files out of order, since the tape has to be
rewound and fast-forwarded.
Control unit
The control unit directs and coordinates most of the operations in the computer.
For every instruction, the control unit repeats a set of four basic operations called the machine
cycle or instruction cycle.
Most processors used by personal computers today support pipelining.
Pipelining means that the CPU begins executing a second instruction before the first
instruction is completed, and the result is faster processing.
113
Registers
Registers are high-speed temporary storage locations used to hold data and instructions.
A microprocessor contains many different types of registers, and each performs a specific
function.
System clock
The system clock controls how fast all the operations within a computer take place.
The system clock generates regular electronic pulses, or ticks, that set the operating pace of
components in the system unit.
The faster the clock, the more instructions the CPU can execute in a second.
The speed at which a processor executes instructions is called clock speed, or clock rate.
Revision questions
1. Describe briefly the functions of the control unit and the arithmetic/logic unit inside
the CPU.
The control unit directs and coordinates most of the operations in the computer.
The arithmetic and logic unit (ALU) performs arithmetic, comparison, and logical
operations.
2. Describe briefly the four basic operations of the machine cycle in the control unit.
The four basic operations of the machine cycle are:
114
Examples:
1) Program counter, which holds the address of the next instruction to be
fetched from the memory.
2) Accumulator, which holds the data item to be processed and the results
of arithmetic and logic operations.
5. Name four home appliances that contain a microcontroller.
1) Washing machine
2) Microwave oven
3) Refrigerator
4) Video Cassette Recorder
6. How is parallel processing different from pipelining?
Parallel processing speeds up processing time by using multiple processors
simultaneously to execute a program.
Pipelining means that the CPU begins executing a second instruction before the first
instruction is completed, and the result is faster processing.
7. State three factors that determine the processing speed of a computer.
115
Memory capacity
Processor
Bus width
8. Explain five types of registers located in the CPU.
Program counter – holds the memory address of the next instruction to be fetched
Instruction register – holds the instructions currently being processed
Accumulator – holds results of last processing step in the ALM
Address register – holds address of the next piece of data to be processed
Storage register – holds data to the process or information processed result onward
to the main memory
9. State three factors you would consider before replacing or upgrading a
computer memory.
Type of processor package
Available memory banks
Capacity per module
Maximum capacity
Architecture of the system board
116
7. Others include portability, special needs for users who are physically challenged
etc.
Qn. (a) Study the sample advert below and explain the specifications in details.
HP NOTEBOOK PC Sale!
Intel Duo, 2.0GHz, 1GB RAM, 80GB
HDP, TrueBrite TFT, DVD-Writer at
Shs. 750,000
(i) Which computer would you recommend to buy basing on the above details?
Computer B
(ii) Give two reasons to support your answer
Higher processor speed
Higher amount of RAM
(iii) What is the most important computer specification one would base his/her final
decision of which computer to buy?
Processor speed
117
COMPUTER SOFTWARE
Software is the series of instructions that tell the hardware how to work.
Software is often called a computer program.
A program is a set of instructions that command a computer to perform a specific task
The preparation of such instructions is called programming/coding, and is done by
programmers.
Most software needs to be installed onto the hard disk before it can be used, but some can be
loaded into memory directly from the storage media.
Software Categories
Computer software is broadly categorized into two:
System software
Application software
118
SOFTWARE
System Application
languages languages
System software:
Assembly Machine Pascal BASIC C++,...
is a set of programs that control operations of a computer and its devices.
Code Code
is a set of programs that control the operations of a computer and other types of
software that run it.
System software programs are usually provided by the Manufacturer of the computer.
System Software
System software consists of:
Operating system (OS).
Programming Languages.
Utility Programs/ System Utilities/ Services.
119
Print jobs are placed in a buffer instead of being sent immediately to the printer.
A buffer is an area of memory or storage in which data and information is placed while waiting
to be transferred to or from an input or output device.
Multiple print jobs are queued, or lineup, in the buffer and the program that manages and
intercepts print jobs and places them in the queue is called the print spooler.
120
Configuring Devices
Recognizes peripheral devices such as external hard disks, pen/flash disk drives, webcam
etc and makes sure that software needed for the hardware to run is installed.
Most of the operating systems today support Plug and Play and can configure devices
automatically.
Plug and Play is the computer's capability of recognizing any new device and assisting in the
installation of the device by loading the necessary drivers automatically and checking for
conflicts with other devices.
Administering Security
Maintains security and access rights of users. For example - allows passwords to be added /
changed.
121
A device driver is a program that controls a particular type of device that is attached to
computer.
Or a device driver is a small program that tells the operating system how to communicate
with a device.
USER INTERFACE
The user interface controls how users enter data and instructions into the computer, and how
information is displayed on the screen.
Command-line interface
Command-line interface allows a user to type keywords or press special keys on the keyboard
to enter data and instructions.
The set of commands a user uses to interact with the computer is called the command
language.
Operating systems that use command-line interface are Disk Operating System e.g. IBM DOS,
UNIX.
Microsoft Disk Operating System (Ms-DOS) is a single user and a single tasking operating
system. DOS is used for starting the microcomputer and managing computer resources such
as I/O device, the hard disk (HDD), files and Memory.
122
Windows
A window is a separate viewing area on a computer display screen in a system that allows
multiple viewing areas as part of a graphical user interface ( GUI ). Windows are managed
by a windows manager. They can be resized
These windows can be anything from folders to software applications.
Windows allow you to work on several tasks at the same time.
Icons
Icons are 'symbols' or small images / graphics that are used to represent files and
commands. Icons can be clicked to carry out a function or open a file, etc.
Menus
These allow users to select functions from a list. Each item in the list will perform a
different function.
Menus are usually either 'pop-up' or 'drop-down' used to select an option from the list.
Pointers
Pointers are little arrows that you move across the screen by directing your mouse.
Pointers can be used to:
Select and use Icons
Select options found in Menus
Reposition folders and icons on your screen
123
Operating systems that use Graphical User Interface (GUI) include LINUX, Windows
(Windows XP, Windows7, Windows 8, etc)
124
SYSTEM UTILITY
(UTILITY PROGRAMS/SERVICE PROGRAMS)
A utility program is:
a type of system software that performs a specific task, usually related to managing a
computer, its devices, or its programs.
a computer program designed for general support of the processes of a computer.
1. Antivirus utility
An antivirus utility is a program that scans storage media to detect, prevent and remove
viruses from a computer’s memory or storage devices e.g. Norton Antivirus.
2. Disk defragmenter utility
It organizes files and unused space on computer’s hard disk so that data can be accessed
more easily and programs can run faster.
125
Defragmentation is the process of reorganizing the disk so the files are stored in contiguous
sectors.
3. File compression utility
It compresses or reduces the size of a file. A compressed file takes up less storage space on
the hard disk or floppy disk and improves system performance.
Compressed files sometimes are called zipped files because they usually have a .ZIP
extension.
Two popular file compression utilities are PKZIP and WinZip
4. Backup utility
Allows the user to copy or backup selected files or the entire hard disk onto another disk for
reference in case the original copy is destroyed.
5. Data recovery utility
Used to recover a file or information that has been accidentally deleted eg Recycle bin for
Windows.
6. File viewer
A file viewer is a utility that displays and copies the contents of a file.
An operating system's file manager often includes a file viewer.
7. Diagnostic utility
A diagnostic utility compiles technical information about a computer's hardware and certain
system software programs and then prepares a report outlining any identified problems.
Windows XP includes Dr. Watson as a diagnostic utility.
8. Disk scanner
A disk scanner is a utility that detects and corrects both physical and logical problems on a
hard disk or floppy disk, and searches for and removes unwanted files.
A physical problem is one with the media, such as a scratch on the surface of the disk.
A logical problem is one with the data, such as a corrupted file allocation table (FAT).
Two disk scanner utilities included with Windows are Scandisk and Disk Cleanup.
9. Uninstaller
An uninstaller is a utility that removes an application, as well as any associated entries in the
system files.
One of the popular stand-alone uninstallers is McAfee's Uninstaller.
10. Screen saver
A screen saver is a utility that causes the monitor's screen to display a moving image or
blank screen if no keyboard or mouse activity occurs for a specified time period.
126
PROGRAMMING LANGUAGES
Terminologies:-
A program: Is a set of instructions that allow a computer to process data into information.
Programming: Is a multi-steps process for creating computer instructions.
Programming language: Is a set of commands or instructions used to write computer
software.
Syntax: Is the spelling and grammar of a programming language.
A computer programmer: Is a computer specialist who writes codes and instruction using
programming languages to develop new software and controlling computers.
Code generation/coding: This is the process of making a program or designing instructions.
Execution: The process of carrying out instructions given to the CPU to turn data into
meaningful format.
Source code (code) is the program instructions written in a computer programming language
to specify the actions to be performed by a computer.
The program that you run is called the object code.
An error in a program is known as a bugs and the process of finding bugs is known as
debugging
There are basically two categories of programming languages and these include low level
and high level languages.
127
b) Assemblers
Assemblers are programs that change Assembly programs / instruction into binary codes that
can be understood by the processor. Assembler normally begins from where compliers stop.
128
d) Linkers
These are programs which combine complied programs and determine where the programs
will be located in the memory.
Advantages of programming
Helps in making of customized programs.
Leads to solving of day to day problems.
Ensures that application programs are readily available.
Disadvantages of programming
Requires a lot of time in making programs.
Some programming languages consume a lot of space.
Less user friendly.
A lot of skilled labour is required.
Application software:
is a program that is written to meet the end user’s problems.
is software that allows end users to accomplish one or more specific tasks.
129
130
131
132
Software suite
A software suite, also known as application suite or productivity suite, is a software package
that has several applications that work together because they have related functions, features
and user interfaces, and are able to interact with each other.
Business applications often come in suites, e.g. Microsoft Office, OpenOffice.org, and iWork,
which bundle together a word processor application, a spreadsheet application, presentation
graphics, database and e-mail applications, etc.
133
The OSS free software license/copyright permits users to use, change, and improve the
software, and to redistribute it in modified or unmodified forms.
It is very often developed in a public, collaborative manner.
Freeware
Freeware is copyrighted software that is offered at no cost but whose source code is not
provided.
Software that is not freeware is referred to as commercial software or payware.
Shareware
Shareware is copyrighted software that is distributed free for a trial period, and payment is
required for using the software beyond that trial period.
Software Piracy
Software Piracy is unauthorized/illegal duplication and use of computer software/programs.
134
Program installer
A program installer is a specialized program which automates most of the work required for a
program installation.
Operating systems are normally supplied with program installers that run when a new
installation is required. Many programs are supplied with a dedicated installer that must be run
in order to set up the program because the installation process requirements vary for each
application.
Installation may include unpacking of files supplied in a compressed form, copying them to
suitable locations, tailoring the software to suit the hardware and the user's preferences,
providing information about the program to the operating system, and so on. The installer also
tests for system suitability and available mass storage space, such tests are necessary to
determine the compatibility of the computer in relation to the program being installed.
135
The automatic installation process offers the user minimal interaction with the system; to
choose the location on the drive where you wish to install the program, and changing the
installation language and choosing whether to install additional licensed programs.
136
137
the drivers for your new hardware device, at this point direct Windows to the directory
containing the drivers for your device.
Once drivers have been installed reboot.
138
Locate the .inf for the progam you want to install then right-click that file and choose the option
for install. Once you have right-clicked and installed the driver, reboot the computer.
Many software programs, games, and utilities have an AutoPlay feature that will
automatically start the setup screen for the software program when the software
CD/DVD is placed in the computer. If this is the case, run the installation through the
screen that appears after inserting the disk in the CD/DVD ROM drive.
Otherwise you need to open the folder where the setup executable file resides to be
able to select and run it.
For example;
Open My Computer.
Within My Computer window, open the drive that contains the installation files. It may
be on a CD or DVD, in that case, open the D: drive or the letter of the disk drive.
Within the drive that contains the files, locate either a setup or install file. The setup
executable file must have the .exe extension. Double-clicking on this file should start
the installation for the program, game, or utility.
The alternative method of starting an installation in Windows is the following;
Click Start then Run. In case of windows 7, find run in accessories
In the Run Window, type x:\setup or x:\install where x is the letter of the drive you wish
to start the installation from. For example, if you want to install a program from a CD
would type D:\setup or D:\install.if your CD drive is designated with the letter D
139
Most proprietary software requires that a registration code or serial number is entered
before the software is entered. If you are getting stopped at the CD-KEY or Serial
Number verification, verify you are entering your correct number. If you lost your
number or key or it does not work, you will need to contact the developer of the
program
Uninstalling software
Software uninstallation is the process of removing part or all of a given software from the
computer. There are several reasons why one may wish to uninstall software from the
computer;
The software may not be working properly due to corrupt files, or improper installation,
hence the need for a clean reinstallation of the program which requires that the
program must be uninstalled first.
It could be that the software is no longer being used and is unnecessarily taking up
valuable disk space.
The software may be conflicting with other programs installed on the computer.
The software may not be meeting your expectations, that is, it's not functioning as
expected.
You may be running out of disk space, therefore you just want to free up some space
on your computer's hard drive.
It is always necessary to carry out a proper uninstallation through proper program
uninstall procedure instead of merely deleting the program folder and shortcuts
If you are using windows, get to Programs and Features control panel, then choose
uninstall program to properly uninstall the program;
Go to the Control Panel and double-click on the "Add or Remove Programs" icon.
Scroll down the list until you find the software you wish to uninstall, then click the
program icon and hit the "Remove" button. This should begin the uninstall process.
The uninstaller
An uninstaller, also called a de-installer, is utility software which is designed to remove
all or parts of a specific other application software. It is always recommended to use
an uninstaller to uninstall a program.
It is recommended to run the disk defragmenter when you have finished uninstalling a
program because, removing software leaves gaps in the hard drive where the software
files used to be which may slow the system's performance. The defragmenter
140
eliminates these gaps, which helps to improve the computer's performance. The
defragmenter can be found in the "System Tools" folder within the "Start" menu.
Revision questions:
1. (a) Explain five factors one needs to consider before acquiring a computer system.
Processor type and speed Compatibility
Memory capacity Display type
Portability Interoperability
Warranty Colour
Storage capacity and design
141
(b) Highlight four factors one needs to consider before acquiring computer software
Documentation User-friendliness
Warranty Portability
Reliability Authenticity
DATA COMMUNICATION
Data Communication is a process of exchanging data or information between two devices over
a transmission medium through a network. Data communication is usually regarded as
computer communication.
Data signal: is the voltage level in the circuit which represents the flow of data. Data signal
can be either analog or digital in nature.
Analog signals are continuous signals that vary in strength. Sound is an example of
an analog signal.
Digital signals are discrete/discontinuous. Either there is a signal or there isn't a
signal. Discrete signals are represented by on (1) and off (0) pulses
Signal modulation and demodulation: this is the process of converting data signals to and
from a form that is suitable for transmission over a transmission medium e.g modem.
Multiplexing: is the process of sending multiple data signals over the same medium e.g a
wire conductor can be made to carry several data signals either simultaneously or at different
times.
142
De-multiplexing is the process of separating the multiplexed signals at the receiving end.
Bandwidth: is the maximum amount of data that a transmission medium can carry at one
time. Or bandwidth is the amount of signals that can travel over a communications channel.
The higher the bandwidth, the more data and information the channel can transmit.
Baseband: is a digital signal that is generated and applied to the transmission medium directly
without modulation. The signal takes the form of voltages of different magnitudes as applied
to the medium.
Broadband transmission: this is where an analog signal is sent over the transmission
medium using a particular frequency. This means that several data signals can be sent
simultaneously through the same medium but at different frequencies. Frequency bands
between these data signals prevent them from overlapping.
Attenuation: this is the decrease in amplitude and energy as signal progressively moves
along the way and may never reach the destination. Attenuation or signal loss is usually
corrected by placing signal amplifiers and also called repeaters stations along the medium at
appropriate distances in order to receive the weak signals, clean it, amplify it then retransmit
it.
Components of Data Communication system
143
1. Serial transmission
Serial transmission is the sequential transmission of one bit of signal at a time sent over a
single wire. Low data transfer rates are possible, but can be used to transfer data over longer
distances.
2. Parallel transmission
Parallel transmission is the simultaneous transmission of the signal elements of a character
or other entity of data over two or more separate paths. Multiple electrical wires are used
which can transmit multiple bits simultaneously, which allows for higher data transfer rates
than can be achieved with serial transmission
144
145
voice mail, fax, e-mail, BBS, instant messaging, chat rooms, newsgroups, Internet
telephony, videoconferencing, groupware, telecommuting, and global positioning system.
Voice mail
Voice mail functions like an answering machine and allows a caller to leave a voice message,
which is stored in a voice mailbox, for the called party.
A called party can listen to the message, add comments to a message, and reply or forward a
message to another voice mailbox in the voice mail system.
E-mail
E-mail, or electronic mail, is the transmission of messages via a computer network such as
a local area network or the Internet.
The message can be simple text, or can include an attachment such as a word processing
document, a graphical image, an audio clip, or a video clip.
E-mail software creates, sends, receives, forwards, stores, prints, and deletes e-mail
messages.
An e-mail address is a combination of a user name and a domain name that identifies a user
who sends or receives e-mail. (e.g., For the e-mail address [email protected], tswong is
the user name, and wong-sir.com is the domain name.)
Most e-mail programs allow users to create an address book, which contains a list of names
and e-mail addresses. Most ISPs provide their users with a mailbox, which stores their e-
mails, on a special server called a mail server.
When an e-mail arrives at the recipient's mail server, the e-mail transfers to a POP or
POP3 server, until the recipient retrieves it with his or her e-mail software.
Popular e-mail software includes Microsoft Outlook Express and Endora.
Some Web sites provide e-mail services called Webmail, which can be accessed by a Web
browser.
146
equipment.
Can be picked up anywhere in the world. Packets and parcels can be sent
Computer files can be attached to an email.
Records and copies is kept automatically.
Can be sent at any time to suit the sender.
A computer and other hardware (e.g., a It can be expensive.
Disadvantages
modem) is required.
It is not secure. It is slow.
It is easy to get on junk mail lists.
There is always a risk of virus.
.
Instant messaging (IM) is a real-time communications service that notifies a user when one or
more people are online and then allows the user to exchange messages or files with them.
An instant messenger program from an instant messaging service must be installed in order
to use instant messaging.
No standards exist currently for instant messaging. All those individuals involved need to use
the same instant messenger to guarantee successful communications.
Chat room
A chat room is a location on an Internet server that permits users to chat with each other by
typing lines of text on the computer.
Some chat rooms support voice chats and video chats.
To start a chat session, a user must connect to a chat server through a chat client program
on his or her computer.
Most Web browsers also include a chat client.
Internet telephony
147
A microphone, a sound card, and special Internet telephony software are required for
conducting Internet telephony.
Videoconferencing
Videoconferencing
148
Advantages of videoconferencing
Do not have to pay for conference room/hall; less expensive than hiring larger
accommodation.
No time wasted in travelling to a venue
Do not have to pay for employee travelling expenses
Do not have to pay for hotel rooms/ overnight stays
Conference can be called at a short notice
Can ensure safety of employees (no travelling accidents)
Several people can take part in the conference regardless of their localities
People who speak can be hard/seen by all other people on the conference
Backup data can be stored for future reference
Disadvantages of videoconferencing
Groupware
Groupware is a software application that helps groups of people work together and share
information over a network.
Groupware enables members of a workgroup to communicate, manage projects, schedule
meetings, and make group decisions.
149
Telecommuting
Telecommuting is a work arrangement so that employees may work away from the standard
workplace of a company, but communicate with the office using some kinds of communications
technology.
A global positioning system (GPS) consists of one or more earth-based receivers that
accept and analyze signals sent by satellites in order to determine the receiver's geographic
location.
Create a map
Many cars and ships also use GPS to provide directions to a destination and weather
information.
150
151
COMPUTER NETWORKS
A computer network is:
a connection of two or more computers together to share resources such as hardware,
software and data.
a connection of two or more computers together so that they can exchange data.
152
PHYSICAL MEDIA
These are metallic connecting wires. They are typical of the following characteristics;
These are nonmetallic transmission media carrying signals in form of light beams. They
provide very fast transmission, not easily disturbed by weather but relatively more expensive.
153
Services offered by data communication tools are E-mail, News groups and instant messaging.
154
WIRELESS MEDIA
Wireless communication technology, is one where the transfer of information over a distance
is done without the use of cables (wires) as a medium.
Wireless technology is applied in Local area networks (WLANs), extended local area network,
and connecting a network to another network.
Wireless technology overcomes the inconvenience of using too many wires for
communication.
Wireless is appropriate to use in places where cabling is practically impossible.
Microwave transmission
Microwave transmission refers to the technology of conveying information or energy
by the use of radio waves whose wavelengths between one metre and one millimeter.
155
Limitations of Microwave
Microwave signals are highly subjected to atmospheric interference.
Microwave can be exposed to electronic eavesdropping.
Communications Satellites
Satellites are communication devices stationed in space and use microwave radio as
their telecommunications medium to communicate with the earth based
communication facilities.
Satellites are capable of receiving and relaying voice, data, and TV signals to and from
earth based communication facilities (earth stations) that use parabolic antennas
(satellite dishes) to communicate with the satellites.
Satellite microwave communication is flexible and possible with most remote sites and
with mobile devices, because no cables are required, which enables transmission with
ships at sea and motor vehicles.
Radio transmission
Radio is the transmission of signals, by converting them into electromagnetic waves.
The electromagnetic waves are transmitted in space towards the destination.
Electromagnetic waves are intercepted by the receiving Antenna. The signal power is
collected at the receiving antenna.
Radio waves are not a line of sight transmission, therefore not affected by presence of
objects between the transmitter and receiver.
Infrared transmission
Infrared (IR) light is electromagnetic radiation with longer wavelengths than those of
visible light.
Infrared signal is usually transmitted across relatively short distances to transmit data
between personal devices for example, between a computer and a cell phone.
156
Infrared can be either beamed between two points or broadcast from one point to many
receivers.
Bluetooth: Bluetooth is an open wireless technology/protocol for data exchange over short
distances.
TYPES OF NETWORKS
Local Area Network (LAN)
This is an inter-connection of computers which are in a relatively very close proximity. E.g. a
network on a building
157
158
If the page is not in the cache, the proxy server, acting as a client on behalf of the
user, uses its own IP addresses to request the page from the server out on the
Internet. When the page is returned, the proxy server forwards it on to the user.
NETWORK REQUIREMENTS
Basic hardware and software for a Network facility include;
1. Network Operating System
Master control program/ instructions that manage basic network operations like data
and file transmissions, etc. e.g.
Windows (2000, NT, XP …)
Novell Netware
Apple Talk
IBM’s LAN, etc
159
As a signal travels over a long distance, the signal undergoes a reduction in strength, an
occurrence called attenuation.
Note:
A network can either be stand alone or be connected to other different network configurations
which can be either similar or not, hence need to have bridge, gateway, router.
The most common network faults necessitating hubs and repeaters include;
Distortion – where information is confused at the source
Attenuation i.e. loss of signal strength
Shared peripherals e.g. Network printers, scanners, fax machine, etc
Client computers – computers sharing resources and capable for sending and receiving
data signals to and from the server.
Server – very fast processor computer dedicated to providing specific services for other
computers connected on the network i.e. a computer which services and administers other
computers (Clients) on a network.
Prerequisites of a server
Very strong processor e.g. Motorola G4 and Pentium V, IV, etc
High RAM capacity – DIMMs for RAM 500+MBs
Very powerful storage abilities
Enhanced Network through-put
Expansion abilities
Functions of a server
Administration of client computers
security of files and applications
Managing printer jobs
Data bank
Software and applications handling
MODEM (Modulator/Demodulator)
A hardware device that transforms digital signals into wave form (analog modulation) to
facilitate their transmission into air space, and vice versa (demodulation).
160
161
6. Better access to databases and files for sharing through uploading and downloading/
receipt of files from host computer.
7. Software is easily upgraded on the network since it is done at ago on the server.
8. Computer networks enable centralized administration, control and monitoring of
individual users on the network.
9. Computer networks enable workgroup Computing. Workgroup software allows many
users to work on a document or project concurrently.
10. Networks provide a very rapid method for sharing and transferring files instead of using
a time consuming method of using movable disks to transfer data from one computer
to the other.
11. It enables flexible access. Users can log on and access their work from any workstation
on the network.
Access to Breakdown of
pornography server leads
leading to network failure
immorali
of Computer
Networks
1. Initial cost of installing a network on Cables, network cards, and software are
expensive, and the installation may require the services of a technician.
2. Networks require administrative time and expertise for proper maintenance of a
network which leads to additional cost.
3. Time can be wasted on social networks instead of doing meaningful work.
162
4. The entire network fails if the server crashes, when this happens, the entire
organization loses access to necessary programs and files.
5. There is increased risk of data corruption, since many users will be using the system
to access the same documents, some of whom may be careless or deliberately tamper
with it.
6. Increased exposure to hackers which puts private data at risk
7. There is a greater risk from viruses, because they are easily spread between the
computers that are part of the LAN.
8. A break in the communication channel can stop the entire network.
9. Information theft refers to someone stealing personal or confidential information from
others.
10. Access to pornography through networks leads to immorality.
11. Phishing, is a mail where a user is tricked into entering his/her username and password
to a fake website.
12. Pharming, is the term where hackers redirect Internet traffic from one website to
different identical-looking site in order to trick you into entering your username and
password into their database of their fake site.
13. E-mail spam, unsolicited e-mails (ones sent without being asked for).
163
Clients communicate with the access point using a wireless network adapter similar
in function to a traditional Ethernet adapter.
A wireless local area network (WLAN) links two or more devices using a wireless
distribution method (spread-spectrum).
The wireless LAN network devices include; Wireless network adaptors, wireless
access points, wireless bridges, wireless routers, and antennae.
Wi-Fi or WiFi (Wireless Fidelity) is a technology that allows electronic devices to connect to a
wireless LAN (WLAN) network. You can use WiFi to access the internet on your phone, tablet
or laptop, rather than your 4G or mobile connection.
The term hotspot is used to define an area where WiFi access is available.
164
Revision Questions
Qn. What are differences between WAN and LAN, WLAN and LAN
Differences between WAN and LAN
LAN stands for Local Area Network and WAN stands for Wide Area Network
LAN covers a small area while WAN covers a significantly larger area
LAN speeds are also significantly faster than WAN.
LAN is more secure than WAN due to fear of viruses or hacking.
WAN is much more expensive to implement than a LAN.
A WAN consists of more than one LANs.
165
NETWORK TOPOLOGY
Topology is the physical and logical arrangement of a local area network.
The physical topology of a network refers to the physical arrangement of cables,
computers, and other peripheral devices in relation to each other on a network.
Logical topology is the method used to pass information between workstations on a
network.
166
Ring topology
This is a topology where all devices on the network are connected to one another in
the shape of a closed loop, so that each device is connected directly to two other
devices, one on either side of it to form a ring. Each data packet is sent around the
ring until it reaches its final destination.
167
Each computer must wait for the token to stop at its node before it can send data
over the network so as to avoid collision of data packets on the network.
It performs better than a star topology under heavy network load.
Can create much larger network using Token Ring.
It is Cheaper to install than star network as there is only one cable between each
workstation.
High speed can be achieved as each workstation can boast the signal.
Star topology
A star topology is designed with each device/node (file server, workstations, and peripherals)
connected directly to a central network hub or switch.
Data on a star network passes through the hub or switch before continuing to its destination.
The hub or switch manages and controls all functions of the network. It also acts as a
repeater for the data flow.
168
Hybrid Topology
Hybrid Topology is a network that has two or more different types of physical
topologies connected to each other to form a complete network. There are many
different combinations that can be created such as bus plus Star.
A hybrid topology is easier to connect to other computers than some other
topologies.
Also the hybrid topology has a faster connection.
169
Mesh topology
This is a network where each device has its own connections to all other devices on
the network. It provides each device with a point-to-point connection to every other
device in the network.
Summary chart
Physical Topology Common Cable Common Protocol
170
Internet is:
a global connection of computers and Local Area Networks (LAN) sharing resources,
data and information.
a network of computers connected by telephone lines, cables, or satellite radio links,
sharing resources and data globally
a worldwide system of interconnected computer network.
Intranet
An intranet is:
a network that works like the Internet but is only available within a particular
organisation, not to the public.
a network within an organization used to share company resources and information
amongst employees and departments.
An intranet may have web pages used to share company’s specific data within that company,
such as internal telephone numbers or details of employee benefits.
Extranet
An extranet is a private network that uses internet protocols to share data of a particular
organisation with selected outside users such as the clients of the company or subsidiaries of
a company.
171
172
A hot spot is a wireless network that provides Internet connections to mobile computers and
other devices e.g. Bluetooth. Bluetooth is a communications technology that uses radio waves
to transmit data between two devices. Many devices such as phones are Bluetooth-enabled,
which means they contain a small chip that allow them to communicate with other Bluetooth-
enabled computers and devices.
Mobile wireless networks provide users with high-speed wireless Internet connections as long
as they are in the network's range and have built-in wireless capabilities.
A cybercafe, or Internet cafe, is a building or room that provides personal computers with
Internet access to its customers.
173
11. Telecommunication; through Internet connectivity and interactivity, one can now work
from home and communicate with the office through networked computers and
telephone facilities
12. A tool for transacting business though E-commerce or E-business where products can
be marketed (procured or shopped)
NB: E-Business needs a very secure, efficient and effective banking system.
174
175
176
E-mail
Electronic mail (email) is the transmission of messages and files via computer networks.
Companies, individuals and institutions use it to facilitate communication among them.
An email program (software) is used to create, send, receive, forward, reply, print, delete and
store messages.
177
4. Secured by passwords
5. E-mails can be conveniently sent to multiple recipients
6. By providing a list of senders and subjects one can prioritize on which messages to
read first
7. Sending is cheaper
8. There is a possibility of multimedia mails where they can be received as voice mails
and read aloud
Mailing lists
List of names and addresses; also called distribution list, is a typically computerized list of
names and addresses to which advertising material or information can be mailed.
When a message is sent to a mailing list, every member on the list receives a copy of the
message in his/her mailbox.
Instant messaging
Internet text Messaging (IM): Instant messaging enables people to exchange text messages;
share digital photo, video, and audio files; and play games in real time.
178
Chat Rooms: a chat is a real-time typed conversation that takes place on a computer. Real-
time means that you and the people with whom you are conversing are online at the same
time.
Internet Relay Chatting (IRC), is a virtual meeting place where people from all over the world
can meet and talk; you will find the diversity of human interests, ideas, etc and you will be able
to participate in group discussions on IRC channels.
VoIP
Voice over Internet Protocol (VoIP), also called Internet telephony is a method for making
telephone calls over the Internet by sending voice data in separate packets, just as e-mail is
sent. To place an Internet telephone call, you need a high-speed Internet connection (e.g., via
DSL or cable modem); Internet telephone service; a microphone or telephone, depending on
the Internet telephone service; and Internet telephone software.
Newsgroups
Internet discussion group; also called Usenet, Newsgroups are ongoing discussion groups
among people on the Internet who share information and ideas on a defined topic through
electronic bulletin boards.
Message boards
Bulletin Board System is an electronic message centre, an online service that enables users
to post and read messages, converse, play games with one another, and copy, or download,
programs to their personal computers. Most bulletin boards serve specific interest groups.
Netiquette, which is short for Internet etiquette, is the code of acceptable behaviors users
should follow while communicating on the Internet. This includes respecting others, limiting
the use of capital letters (the online equivalent of shouting), keeping messages concise,
observing customs in newsgroups. People who do not behave properly may receive angry
messages called flames.
179
IT CODE OF CONDUCT
1. Computers may not be used to harm other people
2. Employees may not interfere with others’ computer work
3. Employees may not meddle (interfere) in others’ computer files
4. Computers may not be used to steal
5. Computers may not be used to bear false witness
6. Employees may not copy or use software illegally
7. Employees may not use others’ computer resources without authorization
8. Employees may not use others’ intellectual property as their own
9. Employees shall consider the social impact of programs and systems they design
10. Employees always should use computers in a way that demonstrates consideration
and respect for fellow humans
Web publishing is the process involved in making information available on the World-Wide
Web.
Terminologies
1) Webpage
A web page is a unit of information often called a document that is available over the World
Wide Web. Web pages are created using HTML language. A web page can contain text,
hypertext link, images, video, audio, animation and sound.
2) Website
This is a collection of related documents or hyperlinked WebPages. e.g. Yahoo.com,
Bbc.com, Manu.com, Google.com etc.
The first page on a website is called homepage
180
Functions of a website:
- Sharing of knowledge or information globally
- Presentation of information of interest
- Enhance communication and collaboration
- Skills building e.g. writing, editing, designing etc
- Trade purposes
- Pride of ownership/ improved corporate image
- Used for secure data and information storage
- Tool for research
- A source for great entertainment and leisure
181
7. The website can provide a forum for students and teachers to collaborate with others
elsewhere.
8. The site can provide a forum for parents and alumni feedback.
9. It can work as a depository (store) where students’ achievement data is posted for easy
access by the stakeholders.
10. It can help teachers to collaborate with other teachers worldwide.
11. The site can be used to publish students and teachers work.
Types of websites:
The following are some of the types of websites:
a. Web portal: A portal is a web site which brings information together from various sources
in a uniform way. Usually, each information source gets its dedicated area on the page for
displaying information; it also offers different services like search, e-mail, online shopping
and others. Examples Yahoo, MSN, AOL etc.
b. Blog: A blog is a website that contains personal information which can easily be uploaded.
The word 'blog' is an abbreviation of 'web log'. A 'log' is a place where a list of information
is written down. Some blogs act as resumes, diary and may be used for business,
advocacy and campaigning purposes
c. Wiki: A wiki is a website that allows users to collaborate (work together) to create the
content. The pages of a wiki can be edited by everyone (or those who have the
password).
d. Multimedia sites e.g YouTube
Websites that allow users to create, upload and share photos, movies, videos, music, web
TV and internet radio. They are meant for entertainment
e. Social websites e.g Facebook, Twitter, Skype, Google Plus, etc
A social network website is a site that allows user to connect with other users who are
friends / relatives, or who share similar interests. Connected users can then share
information / pictures / files with each other, send messages, chat, etc.
182
Misinterpretation: One has to be careful while posting any kind of information on social
networks. If typed in a hurry, the matter could be misinterpreted.
Junk Messages: Social Networks are used to send a lot of unsolicited messages and
unwanted advertisements.
3) Web Server: Is a high speed and storage computer whose primary purpose is to provide
required information to computers on the World Wide Web.
4) Web Browser or Browser
A program (software) which makes it possible for computers to share resources or data
globally. To browse is also referred to as surfing the net (to explore or surf from one website
to another)
183
184
(c) Top-level domain (TLD) – designation for the site, usually separated by “dot” e.g
.com, .org, etc.
E.g. for URL: http://www.yahoo.com
Note: all URLs must be entered on a single line without spaces. This is entered in the
Address Text Box labeled Address on the location bar of the web Browser being used
In order for one to send and receive E-mail, he/she must have an E-mail account or
address.
Domain Name System (DNS)
Domain Name System (DNS) is a method of translating Internet addresses so that
computers connected in the Internet can find each other. A DNS name is written in
lowercase letters with words separated by periods, (e.g. [email protected]).
majid: is the Username or account number used to logon.
gmail: is the hostname (domain address) which is the name of the web server/computer
or Internet provider; it may consist of several parts.
@ (means at) sign: separates the username and hostname
185
.com: (Top Level Domain) separated by a period “.” and indicates the type of
organization. For this case is a commercial organization
186
CLOUD COMPUTING
The concept of cloud computing is to provide easy, scalable access to computing resources
and IT services.
It involves the sharing of resources, services and infrastructure and can often be very cost
effective.
187
A computer security risk is any event or action that could cause a loss or damage to computer
hardware, software, data, or information.
Any illegal act involving a computer is generally referred to as a computer crime.
Cybercrime refers to online or Internet-based illegal acts.
Computer viruses
A virus is a program that copies itself into other programs and spreads through multiple
computers.
Viruses are often designed to affect, or infect, a computer negatively by altering the way it
normally works without the knowledge or permission of the owner.
188
The spread of computer viruses is accelerated by the increased use of networks, Internet, and
e-mail.
189
Computer worms
A computer worm is a self-replicating computer program. It uses a network to send copies of
itself to other nodes (computer terminals on the network) without any user intervention.
Unlike a virus, it does not need to attach itself to an existing program. Worms always cause
harm to the network by consuming bandwidth and memory.
Unauthorized access
Access control
An access control is a security measure that defines who can access a computer, when the
users can access the computer, and what actions the users can take while accessing the
computer.
Most multi-user operating systems require a user to enter the correct user name and password
before accessing the data, information, and programs stored on a computer or network. Many
190
other systems that maintain financial, personal, and other confidential information also require
a user name and password as part of their logon procedure.
Some systems assign the user names and even passwords to their users, but some systems
allow their users to choose their own user names and passwords.
Biometric devices
A biometric device authenticates a person's identity by verifying personal
characteristics (e.g., fingerprints).
It translates a personal characteristic into a digital code that is compared with a digital
code stored in the computer.
Hardware theft
Hardware theft is the act of stealing computer equipment.
The act of defacing or destroying computer equipment is known as hardware vandalism.
191
Software piracy
Software piracy refers to the unauthorized and illegal duplication of copyrighted software.
Software piracy is the most common form of software theft.
Purchasing software only provides a consumer with a license agreement, or the right to use
the software.
Information theft
Information theft refers to someone who steals personal or confidential information from
others.
Reasons for information theft include:
A company wants to learn about a competitor.
An individual steals credit card numbers to make fraudulent purchases.
192
An encryption key is a formula that the recipient of the data uses to decrypt ciphertext.
Two basic types of encryption are private key and public key.
Information privacy refers to the right of individuals or organizations to deny or restrict
the collection and use of information about them.
System failure
A system failure is a prolonged malfunction of a computer that can also cause hardware,
software, data, or information loss.
Common causes of system failure include
Old hardware
Natural disaster (e.g., fires, floods, storms, or earthquakes)
Electrical power variation
Computer ethics
Computer ethics are the moral guidelines that govern the use of computers and information
systems.
Frequently concerned areas of computer ethics are:
Unauthorized access and use of computer systems
Software piracy
Information privacy
Information accuracy
Intellectual property rights
Codes of conduct
193
Code of conduct
A code of conduct is a written guideline that helps determine whether a specific action is ethical
or unethical.
Sample IT Codes of Conduct
Computers may not be used to harm other people.
Users may not interfere with other's computer work.
Users may not meddle in other's computer files.
Computers may not be used to steal.
Computers may not be used to bear false witness.
Users may not copy or use software illegally.
Users may not use other's computer resources without authorization.
Users may not use other's output.
Users shall consider the social impact of programs and systems they design.
Users should always use computers in a way that demonstrates consideration and
respect for other people.
Computer Trainer
1. Train people on how to use a computer and the various application programs
2. Developing training reference materials
3. Guiding learners on how to acquire knowledge through carrying out research
4. Advising the learners on the best career opportunities in ICT
5. Preparing learners for ICT examinations
Webmaster
1. Developing and testing websites
2. Maintaining, updating and modifying information on websites
3. Monitoring access and use of the internet connection
194
Computer Operator
1. Entering data into a computer for processing
2. Keeping up-to-date records of all information processing activities
Computer Technician
1. Troubleshooting computer hardware and software related problems
2. Assembling and upgrading computers and their components
3. Ensuring that computer accessories like printers are in good condition
4. Help engineers to develop some computer components such as motherboards
Systems Analyst
A computer system analyst is a person who is responsible for examining company needs or
problems then designs and develops a computer based information system.
Does the following:
1. Reviews the current manual system
2. Works with programmers to construct and test the system
3. Coordinating training for the new system
Computer programmer
1. Writes in house applications or system programs.
2. Customize commercial application package to suit the needs.
3. Test, debug, install and maintain programs developed.
Software Engineer
1. Developing system and application software.
2. Developing user and technical documentations for the new software.
3. Maintaining and updating the software to meet day to day requirements while overcoming
challenges.
Computer Engineer
1. Design and develop computer components like storage devices.
2. Determine the electrical power requirements of each computer component.
3. Re-engineer computer components to enhance their functionality and efficiency.
4. Design and develop engineering and manufacturing computer controlled devices.
195
Database Administrator
1. Designs and develops database applications for the organization.
2. Sets up security measures needed to control access to data and information.
3. Keeps the database up-to-date by adding new records, modifying or deleting unnecessary
records.
Network Administrator
1. Setting up computer networks
2. Maintaining and enforcing security measures on the networks
3. Monitoring the use of network resources
4. Maintaining and troubleshooting network related problems
196
Revision Questions
197
Disadvantages:
1) The hardware, software, and expertise required to set up a network can be
expensive.
2) Networks are vulnerable to security problems.
Floppy disk or other removable media can be used to transfer files between computers
without using a network.
9. Describe briefly the difference between a local area network (LAN) and a wide area
network (WAN). Give one example application for each of these networks.
A local area network (LAN) is a network that connects computers in a limited
geographic area. e.g., A network inside a school computer laboratory.
A wide area network (WAN) is a network that covers a large geographic area. e.g.,
A network that connects the district offices of an enterprise across the country or
across several counties in the world.
10. How is peer-to-peer network different from client/server network, considering how
data and information are accessed?
Each computer on a peer-to-peer network can share the hardware, data, or information
located on any other computer on the network.
A client/server network has one or more computers acting as a server while the other
computers (i.e., clients) on the network can request services (e.g., access hardware,
data, or information) from the server.
11. State four tasks that are normally carried out by a network operating system (NOS).
1) Administration of system users and monitoring security on network resources.
2) System maintenance tasks such as files backup.
3) File management tasks such as deleting files.
198
199
Advantages Disadvantages
Dial-up line Costs no more than making a regular The user cannot control the quality of the
telephone call. connection company's switching office
randomly selects the line for connection.
Leased line Better quality and consistency of More expensive.
connection.
18. Describe briefly how broadband transmission is different from base band
transmission. Give two examples of broadband transmission applications.
Base band transmission transmits only one signal at a time while broadband
transmission can transmit multiple signals simultaneously.
Example applications of broadband transmission:
1) Download music and movies from the Internet.
2) Play online games.
19. Describe briefly the functions for each of the following communication devices:
a) Hub e) Bridge
b) Switch f) Gateway
c) Multiplexer g)Router
d) Repeater
200
201
Advantage:
Internet telephony allows a user to talk to others for just the cost of the Internet
connection.
202
The domain name system (DNS) is the system on the Internet that stores the
domain names and their corresponding IP address.
The DNS server translates the domain name into its associated IP address, so that
data can route to the correct computer.
33. What is HTML? How does it related to the Internet technology?
HTML stands for Hypertext Markup Language, which is a set of special codes that
format a file for use as a Web page on the Internet. The codes, also known as tags,
specify how text and other elements display in a browser and where the links lead.
34. What is URL? How does it related to the Internet technology?
The Uniform Resource Locator (URL) is the unique address of a Web page. It tells the
browser where to locate the Web page on the Internet.
35. How is HTTP different from FTP?
HTTP stands for hypertext transfer protocol, which is the standard that enables
pages to transfer on the Web.
FTP (File Transfer Protocol) is an Internet standard that allows users to upload and
download files with other computers.
36. How is Internet different from WWW?
The Internet is a worldwide collection of networks linked together. It is the largest
wide area network (WAN) in the world.
The World Wide Web (WWW) is only one of the most popular services available
on the Internet.
37. For the URL http://www.aringass.com/it/notes.htm,
a) What does http represent?
b) What is the domain name?
c) What is the top-level domain (TLD)?
d) What is the path?
a) HTTP stands for hypertext transfer protocol, which is the standard that enables
pages to transfer on the Web.
b) www.aringass.com is the domain name.
c) .com is the top-level domain.
d) it/notes.htm is the path.
203
204
Revision Questions
1 (a) Mention three problems of data security on networked computers:
a) Unauthorized access by hackers; hacking into private, personal files with criminal
intent.
b) Spread of computer virus via Internet
c) Internet/electronic fraud; fraudent websites taking credit card details from customers
d) Identity theft, data being used to impersonate someone e.g applying for a bank loan in
someone’s name.
e) Information theft refers to someone who steals personal or confidential information
from others.
f) Phishing, a mail where a user is tricked into entering his/her username and password
to a fake website. (The website looks like their bank/ eBay/ paypal website but belongs
to a hacker)
g) Pharming, the term where hackers redirect Internet traffic from one website to different
identical-looking site in order to trick you into entering your username and password
into their database of their fake site.
h) Spyware, software designed to collect information about what you are doing on the
computer.
(b) How to increase security of data on networked computers:
a) Install antivirus software/program
b) Use a username and have a good password
A username identifies the person to the network
A password confirms that the person is the real owner of the username
c) Data encryption for sensitive data. Encryption is the process of converting readable
data into unreadable characters to prevent unauthorized access. This is done by
using a password or an encryption key.
d) Use Firewall, a special hardware or software that prevents unauthorized users
from accessing the computers on a network.
e) Anti-spyware, to remove spyware from your computer
205
Hacking.
Software piracy.
Spamming other users.
Carrying out fraud activities.
Obscene or offensive content
Using a computer to pose threats to other users.
Carrying out cyber terrorism
(b). (i) Mention any two ways of controlling effects of computer crime
By using passwords.
By using biometric devices for access control.
Installing a strong firewall.
Installing a copy of latest antivirus software programs.
By using data encryption techniques.
By backing up data regularly.
By physically locking computers to tables to avoid their movement.
206
Recipients need relevant software to download it well and open e.g. Winrar,
Winzip, e.t.c
4. (a) Who is a systems administrator?
A person who plans and directs the activities of the entire information services for an
organization.
(b) The mention five job careers in computer industry:
Database administrator, a person who designs and maintains the database of
the organization, prepares and enforces standards for the use and security of
information in databases.
Computer analyst, a person who checks for the correctness of data and programs
on the computer
Computer programmer, a person who designs computer applications by the use
of programming languages
Hardware engineer/ technician, a person responsible for the maintenance and
repair of the computer equipments
Computer teacher/ instructor, someone who helps students to acquire a level of
computer literacy
Computer operator, a person who controls operations of the computer from input
the input of data and instructions to the output
Data entry clerk, a person whose main responsibility is to enter data into computer
for processing.
Network administrator, a person in charge of/ responsible for managing network
traffic.
Revision questions:
Mention one practical activity carried out by the following personnel in the computing
environment.
(a) Network Administrator.
Network administrators are responsible for building, maintaining, managing, and
repairing an organization's computer networks.
Network administrators handle a company's Local Area Networks (LANs), Wide Area
Networks (WANs) and network segments, as well as manage the company's Internet
and intranet systems.
They must install and maintain hardware and software that supports an organization's
networks, making sure everything is working the way it is supposed to be.
207
208
Develop course syllabus, assess, supervise, and motivate high school students.
Have basic computer knowledge of software, MSOffice, and assist program students
with program presentation.
Promote safe, effective, and ethical learning environment.
Use professional discretion and judgment in managing students in classroom setting.
209