Ict Notes - o' Level
Ict Notes - o' Level
A computer is a general purpose electronic machine that receives/accepts, processes stores, and output data
into meaningful information.
OR
A computer is an electronic machine capable of storing vast amount of data and carry out data processin g
extremely fast.
A Computer is an electronic device or programmable machine, operating under the control of instructions
(software) stored in its own memory unit that can accept data (input), manipulate data (process), and produce
information (output) from the processing.
Generally, the term is used to describe a collection of devices that function together as a system. Alternatively,
The operational speed of a computer is measured in millions of instructions per second (MIPS) measured in
megahertz (MHZ) or gigahertz (GHZ)
For example; A typical computer system is comprised of Input Components; (Keyboard, Microphone, Punch
cards and Mouse), Processing Components; (CPU), Storage Components; (Hard and Flash drives, Floppy disks,
Optical Media, Diskettes, Magnetic tapes), Peripherals; (Photocopiers, Scanners, Fax machines), Output
Components; (Monitor, Printer, audio speakers etc) and Communication Components (Network Interface
Card, Modem and wired cables).
A model illustrating parts of a typical Computer System
The computer comprises of electronic elements like transistors, resistors, disorders etc, with an internal
storage or memory for storing both the instructions and data being processed while using programs or set
of instructions with specific procedure of operation to be followed.
A computer system is a system of hardware devices and software components organized according to the
following system functions or basic activities which includes for instance; input, processing, output, storage
and control.
a) Input: Input into a computer may take the form of information and data provided to the computer by a
person, the environment, or another computer.
The input is converted into electronic machine readable form for direct entry or through a
telecommunications network into a computer system. For example Input inform of words and symbols,
numbers, pictures, audio signals from a microphone, signals from another computer, temperature, speed,
pressures, etc.
The typical input devices of a computer system include; sensors, keyboard, touch screens, light pens,
electric mice, optical scanners and voice input and so on.
b) Processing: Computer processing takes the format of manipulating data inputs; data are symbols that
represent facts, objects and symbols
The CPU is known to be the brain of a computer responsible for executing a given set of instructions both
arithmetic (-,/,+,* etc) and logical comparison between two or more statements plus controlling all other
hardware.
One of CPU’s major components is the arithmetic-logic unit (ALU) which performs the arithmetic and logic
functions and the control unit (CU) which controls all the processing functions and communicates with
other parts of the computer plus controlling the processing of all instructions and the movement of data with
in the CPU.
c) Output: These are converted electronic information and results produced by the computer system into
human-intelligible form for presentation to end-users. Examples of output include; images on the monitor,
printed documents, sounds, signals to device controllers. Examples of output devices include; video display,
units, audio response units, printers etc.
d) Storage: Memory is the area of the computer that temporarily hold data that is awaiting to be
processed, stored or output, while storage is the area where data can be left on a permanent basis while it
is not needed for processing. Storage devices include: firstly the primary storage unit (Main memory) and
secondly, the secondary storage devices (magnetic disk and tape units, optical disks).
e) Control: The control unit of a CPU interprets computer program instructions and transmits directions to
the other components of the computer system. One of CPU’s major components in charge of control is the
control unit (CU) which controls all the processing functions and communicates with other parts of the
computer plus controlling the processing of all instructions and the movement of data with in the CPU.
2. INFORMATION
Information is a processed data which is meaning full to the end user.
Examples of information
1. A students report
2. Payroll for employees
History of Computers
Abacus.
Slide rule.
The era of the mechanical computer, was between 1623 and 1942. The mechanical computers are
machines that are characterized with mechanical gears, wheels, moving parts, electro-mechanical relays, and
dials and could use punched cards and tapes for data storage.
Arithmetic Machine/Calculator.
In 1642, a French man Blaise Pascal was given a credit for the first
mechanical adding and subtracting machine that used
a system of gears and wheels. It had digits from one to nine (1-
9) arranged on wheels similar to odometer on moto r car.
Leibniz stepped/calculator
Analytical engine
Computer generation refers to the state of improvement in the development and advancement of
computer technology over years.
OR
In earliest general purpose computer, most input and output devices were punched cards and magnetic
tapes. They were mainly made up of loops of vacuum tubes and magnetic drum. They could run only one
program at a time.
By early 1960’s, computers were improved instead of using vacuum tubes they used transistors which were
much smaller than vacuum tubes therefore they reduced in size.
Characteristics of Second Generation Computers
1. They used transistors as their active element.
2. They were smaller in size than first generation computers.
3. They used less electricity and generated less heat.
4. They became less expensive than first generation computers.
5. They were speedy and reliable since used removable magnetic disc packs as their storage devices
6. They led to introduction of high programming language e.g. FORTRAN [formula translation], COBOL
[Common Business Oriented Language]
7. They led introduction of super computers e.g. Livermore Atomic Research Computer [LARC]
In the third generation, the integrated circuits *I.Cs’+ replaced the transistors which are small electronic
components. The IC is so effective because its components do not need to be wired directly to computer
system board. Magnetic discs were used for secondary storage and computers began to support multi
programming and time storing.
The fourth generation, Large Scale Integrated Circuits [LSIC] and Very Large Scale Integrated Circuit [VLSIC]
were developed whereby a special IC can contain a loop of up to 10,000,000 of transistors. In 1971 Ted Hoff
of Intel Company developed a micro processor which acted as CPU (Central Processing Unit).
1. They use micro processors as their active elements e.g. 386, 486 Pentium 1,2,3,4
2. They are small in size since were made by using LSIC and VLSIC
3. They are fast and reliable.
4. They have a high primary memory.
5. They led to introduction of wide variety of software e.g. windows, Jet audio e.t.c.
6. They led to the development of inter computer communication e.g. internet (is a global system of
interconnected computer networks)
7. The price of computers dropped considerably and affordable
FIFTH GENERATION
The fifth generation is under development whereby, they will be using very large scale micro processor
circuits in a parallel architecture and highly sophisticated operating system. In this generation, it is believed
that computer will be sophisticated to extent that it may be possible to talk to it in a human like manner.
Conclusion:
Computers are becoming increasingly smaller, more powerful and less expensive.
COMPUTERS TODAY
A computer can perform billions of calculations in a second. The time used by a computer to perform an
operation is called the processing speed. For example, operating speeds of computers are measured in a
number of ways for instance; Milliseconds, Microseconds, Nanoseconds, Picoseconds, Megahertz,
Gigahertz among others.
2. Accuracy: Computers are known to be so accurate that they hardly make mistakes. In fact they are able
to detect mistakes and correct them. It’s because they are programmed accurately and are not faulty in terms
of components. For example, a modern computer performs millions of operations in one second without any
error.
3. Automation: They work automatically. They do not need supervision to be able to perform since they
are programmed with the relevant software programs to perform various tasks.
4. Diligence: They have the capability to perform the same tasks over and over again for long hours
without getting tired or bored.
5. Reliability: Just as they are accurate, computers are reliable and consistent in the information produced
by it. Given the same program and the same data, the result produced should be the same at all times.
6. Versatility: Computers are versatile in that they can be used in many fields for example; exam marking,
military, teaching, medicine, designing, entertainment, airline seat reservation etc.
7. Artificial Intelligence: They are artificially intelligent. They can perform computations as well as making
logical decisions. They can respond to requests given to them and provide solutions. All this is accomplished
by the power of programs installed in them.
8. Storage: They have some kind of work space where data and information are stored. This storage area
is referred to as the computer memory. They can store very large amounts of data for long periods of time.
For example; Text, graphic, pictures, audio and video files can be stored easily.
9. Precision: Another basic feature of computers is precision, whereby it’s possible to represent
information and data especially in numerical quantities to any (reasonable) desired degree of magnitude.
This attribute is very useful in mathematical and scientific applications.
10. Security: Because data and information in computer systems are stored in machine readable forms,
they are protected to some extent from people who have no access to the computer by the use of
passwords or some other form of identification, thus we say that computers provide a measure of security
for data and information stored in it.
11. Processing: A computer can process the given instructions. It can perform different types of processing
like addition, subtraction, multiplication and division. It can also perform logical functions like comparing
two numbers to decide which one is the bigger etc.
12. Electronic or Digital: Modern computers are electronic and digital. They are actual machines with wires,
transistors, and circuits.
The smallest element of data, (binary digit) which can have a value of zero or one is called a bit. The
capacity of memory chips is usually expressed in terms of bits. One bit of information is so little that usually
computer memory is organized into groups of eight bits. Because we use very large numbers of bytes for
storage, abbreviations are used for large numbers.
These are based on powers of two and are set out in the following table.
Abbrv. Name Power of 2 Approximate Number of Bytes Alternatively
BIT 0 or 1 None 0 or 1
B Byte (8bits) approx. 1 byte 8 Bits
10
KB Kilobyte 2 = 1024 bytes approx. 1,000 bytes 1000 Bytes
20
MB Megabyte 2 = 1 048 576 bytes approx. 1,000,000 bytes 1000 Kilobytes
1000
GB Gigabyte 230 bytes approx. 1,000,000,000 bytes
Megabytes
TB Terabyte 240 bytes approx. 1,000,000,000,000 bytes 1000 Gigabytes
PB Petabyte 250 bytes approx. 1,000,000,000,000, 000 bytes 1000 Terabytes
EB Extrabyte 260 bytes approx. 1,000,000,000,000, 000, 000 bytes 1000 petabytes
ZB Zettabyte 270 bytes approx. 1,000,000,000,000, 000, 000, 000bytes 1000 Extrabytes
YT Yottabyte 280 bytes approx. 1,000,000,000,000, 000, 000, 000,000 bytes 1000 Zettabytes
COMPUTER CLASSIFICATION
Computers are classified as follows:
1. Classification by process
2. Classification by purpose.
3. Classification by size and capacity
4. Classification by processor power
CLASSIFICATION BY PROCESS:
In the classification by process, computers are categorized according to how data is processed and
represented. This classification has three main categorizes namely:
- Digital computers
- Analog computers
- Hybrid computers.
These process data that is in a continuous form or measurable quantities/units, e.g. voltage, current, length
and pressure.
Examples of Analog devices are;
- Hygrometer,
- Thermometer,
- Speedometer, and
- Pressure sensors.
These are computers that have the combined features of both the digital and analog computers. The hybrid
computers are further classified according to the purpose / the work that they were designed for.
CLASSIFICATION BY PURPOSE:
These are categorized in to two classes;
- Special purpose computers.
- General purpose computers.
These are designed to handle only a particular task. There form of operation is restricted in nature. They are
designed to perform a particular task and there no other tasks. E.g.
- Digital watches,
- Pocket calculators.
Currently special purpose computers are employed in devices like missiles; Lifts in tall buildings also employ
special purpose computers.
These are designed to solve a wide range of tasks/ problems. However, they can be adopted to perform a
particular task/solve specific problem by means of a special program.
In the past, computers used to be classified according to the use they were put to, e.g.
- Word processing computers were used for only word processing,
- Desktop publishing computers for desktop publishing and
- Rational database computer for a database management.
With a trend in technology, this has been reserved and now it is very common to have a single computer
with word processing, desktop publishing and database application capabilities.
CLASSIFICATION BY SIZE
Computer systems can be classified according to their size as follows:
- Micro computers
- Mini computers
- Main frame computers
- Super frame computers
Micro Computers
A micro computer is a single user general purpose computer that can perform all inputs, process, output, and
then storage activities by itself. They can be used by one person at a time and they are also known as personal
computers (P.Cs)
(i) Laptop
A Laptop is also referred to as a notebook computer. It is a personal computer small enough to fit on the
lap. It has features that are being incorporated.
Characteristics of laptop
- It fast in processing data.
- It consumes less compared to desktop computers.
- It is portable and mainly used for mobility.
- It has limited support of peripheral devices.
Note: A peripheral is any device that can be connected to the computer system unit, like mouse, keyboard,
projector etc.
They are designed for those users that are always on the move (travelers).
They can easily be put in the shirt pocket and any time one can check on e-mails, take few notes and keep
schedules and appointments with these palmtop computers.
They are also referred to as personal digital assistant (PDA). Modern PDA’s have been integrated with
cellular phones.
MINI COMPUTERS
A mini computer is larger than a micro computer which is powerful enough and widely used in real time
applications e.g. air traffic, factory automation. A mini computer is multi user computer that support many
users at time. It falls in the range of 50-500 users at a time depending on the model.
E.g. DECS VAX range and IBM AS400 range.
Terminals
Server.
Characteristics of Mini Computers
- It is physically bigger than the micro computer but smaller than the main frame.
- They can support moderate range of peripherals.
- They are more powerful than micro computers.
- They can support 50 to 500 users at time model.
- They have a large storage than micro computers.
- They cost less to buy, operate and maintain than the mainframe computers.
- Have become popular as powerful network servers to help manage internet websites, corporate
intranets and extranets plus client-server networks.
- They can function in an ordinary operating environment for example; they don’t require air
conditioning or electrical wiring.
This is a largest and it’s as big as a closet and expensive computer that is capable of simultaneously process
data for hundreds and thousands of connected users at the same time. Mainframes are very large, colossal
and powerful computers often filling an entire room with very large primary storage capabilities normally
from 64 megabytes to several gigabytes of RAM-(Random Access Memory) which helps mainframes process
information very quickly at 10 to 200 MIPS.
The main frame computers are used in banks, airlines, and insurance companies. Each user works
separately with a separate keyboard and monitor but they all use the same processor/ Central Processing
Unit (CPU) E.g. IBM4381, ICL39 series, CDC cyber series.
Characteristics of Main Frame Computers
APPLICATIONS OF MAINFRAMES
The mainframes with its strong security, connectivity and data management capabilities can provide these
services;
1. Mainframes (often colloquially referred to as Big Iron) are computers used mainly by large organizations
for critical applications, typically bulk data processing such as census, industry and consumer statistics,
enterprise resource planning, and financial transaction processing.
2. Batch processing: systems that require large amounts of data and processing such as corporate payroll,
process on the mainframe.
3. Data management: The corporate repository, a directory of what data is stored where data definitions
and standards plus other various data and systems models resides on the mainframe.
4. Network management: the mainframe provides central services for monitoring and controlling the
corporate network.
5. Security: The mainframe controls corporate security and user authentication services. It monitors and
permits users to access the resources on the corporate network.
6. Enterprise wide back up: The mainframe provides prodigious amounts of storage capacity for use in
backing up files and data bases.
SUPER COMPUTER
These are the fastest, largest, most powerful and most expensive computer systems in the world. They are
designed specifically for high-speed numeric and mathematical computations needed in very complex
applications such as for example; weather prediction, engineering, designing nuclear weapons and other
business applications requiring quick processing of lots of data, it uses 12,000 microprocessors to operate
at over 30 trillion operations per second and can perform hundreds of millions of instructions per second
(MIPS).
They require a special air conditioned room. They are often used for research, among other uses are
Worldwide weather forecasting and analysis of weather, oil exploitation, air craft design, Invasion of nuclear
weapon system, predications of the spread of epidemic e.t.c. Unlike a micro computer a super computer has
several processors hence too powerful.
Because of rapid changes in technology, processor power is also rapidly increasing. Computers are getting
faster and faster each year. The higher the processor power, the faster the computer. Previous computers
had a processing power of less than 0.4 MIPS but today 15 MIPS is the minimum.
Therefore computers with high processing power require more system resources such as system memory,
hard disk space including modern programs. All these put together makes computers with higher
processing power better productive tools.
COMPUTER SYSTEM
A computer system is a complete apparatus for handling all aspects of information/data within an
organization.
OR
A computer system is a set of independent parts/device that work together to manage and process data
and information.
SYSTEM
A system is a group of many inter related parts which work together to achieve a common goal.
A COMPUTER SYSTEM
A computer system is mainly composed of the following components:
- Computer Hard ware.
- Computer Soft ware.
- Human ware.
1. KEY BOARD
This is an input hard ware/ device that is used to type and enter instructions into a computer. It looks like
the keyboard of an ordinary typewriter but with some special keys like:-The control key (CTRL), the Alter
key (ALT), the Escape key (ESC), the Arrow keys, and the function keys ranging from F 1 to F12 and each key
has its function.
A mouse is an input device that acts as an electronic finger that is used to select icons and applications on a
computer screen (monitor). It complements the keyboard as regards input of data.
The mouse employs the principle of moving a ball in which turn moves rollers adjacent to it. The rollers
then translate the electrical codes that relocate the pointer or cursor on the different points or parts of the
screen, to select icons.
Icons are graphics or pictures that represent a program or folder or a file on a computer.
Click
It is to press and quick release the left mouse button. A click often selects an item on screen
Double click
It is to press and release the left mouse button twice as quickly as possible. Double click often opens a
document or it starts a program.
Drag
It is to press and hold down the left mouse button and move it in different locations on the screen.
Drop
It is to release the mouse button after drag therefore drag and drop is an activity that moves item on
different positions on the screen.
Right click
It is to press the right mouse bottom and release which brings up popup menu with oppositions to chose
from.
ADVANTAGES OF USING A MOUSE
1. A mouse is user friendly for computer beginners.
2. A mouse is easy and convenient to use with a graphical user interface.
3. Using a mouse to select items or move to a particular position on the screen is faster than using a
keyboard.
4. A mouse can be operated by one hand.
WAYS THROUGH WHICH MOUSE CAN BE PROTECTED FROM THE ABOVE PROBLEMS
3. TRACK BALL
This is another pointing device that functions like a mouse. A track ball has a movable ball on top of stationary
device that is rotated with finger or palm of a hand. A track ball is in built into the key board especially on
some portable devices like laptop, phones e.t.c.
3. TOUCH PAD
A touch pad is a flat rectangular device that has weak electric fields to sense the touch as the users moves
the finger tips. It used to control the pointer with a finger. The Cursor follows the movement of the finger
on the pad. You can click by tapping the pad surface.
4. JOYSTICK
This is a pointing device that consists of a vertical handle which looks like a gear shift lever mounted on a
base with two buttons. It mainly used in video games in some computer aided design system and in
accomplished robot system.
5. LIGHT PEN
This is a pointing device that can detect the presence of light. These are used in high technological designs.
They have a beam of light that is radiated into different parts of a specialized screen to input data. These
beams of light are very small and sharp and therefore much précised. They are used in the designing of
integrated circuits (I Cs), also used by health care professionals e.g. doctors and dentists work
6. TOUCH SCREENS
A touch screen is an electronic visual display that can detect the presence and location of a touch within
the display area. The term generally refers to touch or contact to the display of the device by a finger or hand.
Touch screens can also sense other passive objects, such as a pen.
7. DIGITIZER:
This looks like the mouse except that it has a glass with a cross hair in the middle. The cross hair acts as a
guide during the input of data. It is used in conjunction with a digitizing tablet. It is mainly used in
cartography (map making and architectural drawing to accurately trace the outlines on a map.
8. STYLUS AND GRAPHIC TABLET
A stylus is a pen like pointing device which uses pressure to write texts and drawing.
Graphic Tablet is a flat rectangular electronic plastic board on which a stylus writes and draws.
A graphic tablet corresponds to a specific location on screen. A graphic tablet can be used to digitize
drawing with great accuracy. Styles and graphics tablet are mainly used for computer aided design and
drafting by architects, map maker, artists and designers.
DISADVANTAGES
- A stylus and graphics tablet normally has to work together and can it work separately.
These are hard ware that capture images of hard copy and converts them into a digital form for a co mputer
processing.
9. OPTICAL SCANNERS
This is a device that can read text or illustrations printed on paper and translate the information into a form
the computer can use (digital form). It uses a laser beam and reflected light to translate hard copy image of
text, drawings, and photos in to the computer in a digital form. The image can then be processed into the
computer, displayed on the monitor and then stored on the storage devices like a flash disk.
10. BAR CODE READER
Bar codes are vertical strips or line marks or striped marks printed on retail products and other items.
A barcode reader is a photo electric scanner that translates the barcode symbols into digital form of which
the corresponding information about the items is relived from store computer and printed out for a
customer as a receipt.
Barcodes
Records of sales are easily input into a computer which in return may be used for accounting and
restocking.
Places where Barcode readers are mainly used
1. medical stores,
2. book shops,
3. departmental stores and
4. supermarkets
Pre-printed
Characters
ADVANTAGES OF OCR
- Written and printed data can be read but some time
- Documents can be read directly in computer without reprinting it
- The input character can be edited by word processing soft ware
DISAVANTAGES OF OCR
- It doesn’t work well with hand written character or those unusual fonts.
Special font
Used on the cheques
- The error rate for the magnetic scanning of a typical cheque is smaller than with optical character
recognition system.
- The use of magnetic printing allows the characters to be read reliably even if they have been
overprinted or obscured by other marks, such as cancellation stamps.
- The "can't read" rate is usually less than 1% while the substitution rate (misread rate) is in the order of
1 per 100,000 characters.
DISADVANTAGES OF MICR READER
- M I C R reader is very expensive.
- The system only accepts few character sets
ADVANTAGES
- Reading accurate and fast
DISADVANTAGES
- The amount of data that can be stored on strips is limited.
- The magnetic strips can be damaged by exposal to a strong magnetic field
15. VOICE RECONITIION DEVICE
Voice recognition, speech recognition is a computer capability to distinguish spoken words. Voice recognition
programs don’t actually understand speech; they only recognize vocabulary of reprogrammed words. Voice
recognition programs are speaker dependent or speaker independent.
Voice recognition on
Samsung
phone
A digital camera is an input device that takes video or still photographs, or both, digitally by recording
images via an electronic image sensor. It stores the images on a flash memory card or compact disc (C.D) or
micro drive
ADVANTAGES OF DIGITAL CAMERA
- It saves money and time since it doesn’t require a film and time to develop the film.
- The image taken can be viewed and even edited
- unwanted image taken can be deleted quickly
- Photographic images can be digitized directly without using a scanner
- Digital cameras are best for 3 dimensional objects while scanners are best for dimensional objects
18. MICROPHONE
A microphone is an input device that allow user to speak to the computer to enter data and instructions
into the computer
Remote sensor
Examples of sensor application include;
- Freezers and chiller cabinets which are used in supermarkets to monitor temperature.
- Smoke sensors that are used in builds to detect any fire outbreak.
▪ Physiological Traits are related to the shape of the body. Examples include, but are not limited
to fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, which has largely
replaced retina, and scent.
▪ Behavioral traits are related to the behavior of a person. Examples include, but are not limited
to typing rhythm, gait, and voice. Some researchers[1] have coined the term behaviometrics for this class
of biometrics
COPMUTER OUTPUT DEVICES
These are computer hardware that converts processed data into a usable form. The outputs are mainly
categorized as printed output. (By use of Printers and plotters) examples of outputs include; screen
displays, speech output e.t.c.
i) MONITIORS
These are devices which are used to display the computer output. Information on a display device is called
a “soft copy” because it exists electronically. There are two types/kinds of monitors which include
- Monochrome (One color)
- Color monitors
LCD of flat panel screen use liquid and crystals to create images on the screen normally used on portable
computers such as Laptops, digital watches, Calculators, phones e.t.c
A PLASMA DISPLAY
A plasma display is an emissive flat panel display where light is created by phosphors excited by a plasma
discharge between two flat panels of glass. The gas discharge contains no mercury a mixture of noble gases
(neon and xenon) is used instead. This gas mixture is inert and entirely harmless.
ii) PROJECTORS
A projector is an output device that takes the image on a computer screen and cast it on to a large screen
for audience to see it clearly.
OR
Is a device that receives a signals from the computer and projects the corresponding data signal on a
projection screen using a lens system.
3. PRINTERS
A printer is an output device that produces texts and graphics on a physical medium such as paper. The printer
information output on a physical medium is called hard copy which is more permanent than screen display
(soft copy)
PRINTING MECHANISM
i) CHARACTER PRINTER
These are low speed printers that mimic the action of type writers by printing one character at a time. The
characters are output on the print heads directly. This means the character font type cannot easily be
modified e.g.
- Daisy wheel printer
- Thimble printer
They are relatively cheap and are commonly found in small business systems
These also use the same principle during printing just like the characters except that these are much faster
unlike character printers. Line printers print the whole line of characters at once i.e. they print on one end
of the paper to the other end of the line hence line printers.
IMPACT PRINTERS
These are printers that produce a hard copy output with the print mechanism/heads physically touching
the print media.
DOT MATRIX
A dot matrix printer is an impact printer that produces printed images which a print head striking
mechanisms
DIASY WHEEL
BALL PRINTER
This is an impact printer that uses a rotating ball as a printer as a print head.
Impact printers have direct contact with the paper and non impact printers don’t have direct contact with
the paper.
They use techniques such as ink spray, heat, xerography or laser to form printed copy.
INK JET
An inkjet printer is a non impact printer that forms characters and graphics by spreading tiny drops of liquid
ink on to a piece of paper
LASER PRINTER
The mechanism of a laser printer is similar to that of photo copier. Laser printers are also known as page
printers because they process and store the entire page before they actually print it.
1. The initial cost of buying laser printers is high compared to other printers
2. They are more expensive than dot matrix printers and ink jet printers.
THERMAL PRINTERS
It generates images by posting electrically heated pins against a heat sensitive paper.
DISADVANTAGES OF PLOTTER
1. The time to get the print output is slow when compared with display devices
2. Paper is wastage for obtaining out put
3. They are generally nosier than displays devices
1. I t saves paper.
2. It allows the user to store received faxes on a computer received faxes can be emailed to others.
This is a single piece of equipments that provides the functioning of printer, screen, photo coping machines
and fax mail
ADVANTAGES
1. A multi functioning device takes up less space than having a separate printer, scanner , copy machines
and fax machines
2. It is also significantly less expensive than purchasing each device separately
DISADVANTAGES
1. If a malfunctioning machine breaks down it loses all its functions
7. TERMINAL
A terminal is a device with a monitor and key board. The term terminal can also refer to any device that
sends and receives computer data.
1. DUMB TERMINAL
It has no processing power and cannot act as a standalone computer and must be connected to server
to operate
2. INTELLIGENT TERMINAL
It has memory and processor so it can perform some functions independent of host computer.
Uses of terminals
i) An EPOS (electronic point of sell)
Terminal is used to lead purchase at the point where the consumer purchases the produce or services
8. HEADPHONES.
These are a pair of small speakers, or a single small speaker, used to output sound from the computer. They
are similar to speakers, except they are worn on the ears, so only one person can hear the output at a time.
9. SPEAKERS.
These are output used to output sound from the computer. Most of PCs have small internal speaker that
output only low quality sound. Users who need high quality sound out put may use a pair of speakers for
example Sub woofer connected to parts on so card
ADVANTAGES
1. They are ideal for visually impaired people
DISAVANTAGES
1. They are not suitable for use in noisy environment
2. No permanent copy is produce
Storage refers to a med lo[pl[pla on which data, instructions and information are kept.
STORAGE DEVICES
These are physical materials on which a computer keeps data, instructions for later retrieval or for future
references
UNITS OF DATA
Summary;
1 Character = 8 bits
1 byte = 8 bits
1 Kilobyte = 1024 bytes
1 Megabyte = 1024 kilobytes
1 Gigabyte = 1024 Megabytes
1 Terabyte = 1024 Gigabytes
Example3
Example1. How many bytes are in name NUSIFAH?
Convert 128bytes to kilobytes
Solution
Solution
From; 1 character = 8 bits
1kilobyte (KB) = 1000bytes
A name NUSIFAH has 7 characters
1
Therefore; 1byte = KB
1000 Therefore; 7 characters = (7 X 8) bits
1 = 56 bits
128bytes = x 128 KB
100
Then we have to convert the bits to
128 bytes
128bytes = KB
100
But 1byte = 8 bits
= 1.28KB 1
1bit = bytes
8
Therefore 128bytes = 1.28kilobytes. 1
Then 56bits = x 56 bytes
8
= 7bytes
Example2
Convert 128byte to Megabytes Therefore; from the above example
1character is equal to 1 byte.
Solution
Example 4
1,000,000 Bytes = 1 Megabyte Convert 0.000127 MB to bytes (KB)
1
Therefore; 1byte = MB Solution
1000000
1 Megabyte = 1,000,000 Bytes
1
128bytes = x 128 MB
1000000 0.000127 MB = (0.000127 X 1,000,000)
Bytes
= 0.000128MB
= 127 Bytes
Therefore 128bytes = 0.000128 MB
CONVERING DATA UNITS TO BINARY BASE
Exampel1
Convert 128 to binary base
Solution
Base Number Reminder
2 128 0
2 64 0
2 32 0
2 16 0
2 8 0
2 4 0
2 2 0
1
Example 1
Convert 10000000two to base ten
Solution
= 128 + 0 + 0 + 0 + 0 + 0 + 0 + 0
= 128ten
Example 1
Convert 10000000two to base ten
Solution
Here you have to convert the binary base to decimal base then to a desired base in this case base four
= 128 + 0 + 0 + 0 + 0 + 0 + 0 + 0
= 128ten
Base Number Reminder
4 128 0
4 32 0
4 8 0
2
128ten = 2000four
Therefore 10000000two = 2000four
There are two types of storage devices namely primary storage devices, secondary storage devices
Primary storage is the main memory which is also referred to as the internal memory.
This is a type of memory/ storage on a computer which can immediately be accessed by the computer’s CPU.
RAM is the working area during the processing of data. The data and instructions are temporally held in RAM
during processing and after processing and it disappears when you turn off the power of computer hence RAM
is volatile.
NB: You always save regularly to avoid your work \ data to be wiped off when power is off
Saving is process of transferring data\information from RAM to a secondary storage device. Execution is the
process of carrying out the interpreted commands.
TYPES OF RAM
ROM CHIP
Examples of data in ROM include:-
• The date when the computer was manufactured
• Manufacturer of the computer.
• Model name and model number of the computer,
• Predetermined configurations for some of the hardware that will be added onto the computer.
ROM CHIPS
it is also called firm ware which is a term used for software permanently stored on a chip.
ROM chips in micro computer contain instructions used to transfer information between keyboard, screen,
printer, and other peripherals and the processor. These instructions are called ROM BIOS (Basic Input Output
System)
It is a blank chip on which the user/buyer can write a program on it with a special equipment once is written it
can’t be modified or changed.
This is a chip or a content that can be written on it and erased once using special equipment.
These are ROM chips that are designed to be modified by the user for more than one time.
Note: Volatile means that it is not permanent and can be change. It needs power supply to keep the data stored
in it
READING
Is the process of transferring information, data instructions from device into RAM
OR
Reading is the process of transferring information from memory (RAM) to storage media i.e. using a save
command.
SECONDARY STORAGE (auxiliary storage)
This is also known as auxiliary storage which are designed to retain data and instructions and programs in a
relatively permanent form.
1. Floppy disks.
2. Hard disks.
3. Magnetic tapes.
4. Flash memory.
5. Punched cards.
6. MP3 player and MPEG player.
7. Zip disk.
8. iPod.
9. Compact disks.
EXAMPLES OF OPTICAL STORAGE DISKS
Compact disks e.g. CD-ROM, CD-R, CD- RW, DVD-ROM, DVD-R, DVD-RW.
There are two methods of which information is transferred from the computer and written to a storage
device namely;
These are secondary storage devices that have magnetic writing on the disc surface (tapes) for storing data as
magnetic spots.
MAGNETIC TAPE.
This is a thin plastic tape that has been magnetically waiting for storing data as magnetic spot and large
computer tapes are used only in a cartilage. Since tapes use a sequential access media using them is a slow
process.
FLOPPY DISKATTE.
This is also called a diskette. It is a removable secondary storage medium that consists of a thin, circular
flexible plastic disc with a magnetic coating enclosed in a square shape plastic shell.
A diskette is called a floppy because the plastic disc is flexible and not rigged. There are mostly four types of
diskettes but the common ones are;
Each size works only with a device made for its size.
Some diskettes are referred to as low density (single sided version). The single sided are designed such that
the data can be only recorded on one side.
Some diskettes are referred to as high density (Double sided version). The high density diskettes are double
sided and data can be recorded or stored on both sides hence high density accommodates or stores more data.
A floppy disc drive is a slot (an opening) on the computer system unit where a diskette is inserted in order to
read from and write to it. The drive is labeled “A:”
If the computer has two floppy disc drives, the second one becomes “Drive B:”
Tracks are concentric rings which are invisible. Each track is divided into sectors under intersection of tracks
and sectors setup the file allocation table (FAT) where data is located.
Diskettes have features to prevent someone from accidentally write, erase or making changes to the program
files. To right protect the diskette press or push towards the edged of the diskette and the hole opens.
Data capacity,
Not all diskettes hold the same amount of data, diskettes capacity depends on its recording density e.g. the
bytes per inch that can be written on the surface of the diskette e.g. High density (HD) diskette can store
1.44MB
Formatted Diskettes,
Unformatted diskettes are manufactured without tracks and a sector therefore “Formatting” is a process of
preparing a diskette so that the operating system can write information on it. This process includes defining the
tracks and sectors on the disk as well as setting up FAT (File Allocation Table)
NOTE: If you reformate a diskette with data already written on it, all the data will be lost during the
reformatting.
Step 1:
Insert 3½ inch floppy diskette into the drive
Step 2:
Click on Start and select My Computer
Step 3:
In the Window which appears, right click on
3½” floppy (A)
Step 4:
From the shortcut menu which appears, select Format
Step 5:
- Don’t touch the diskette surface; don’t touch anything visible through the protective case such as the
data, accessed area on the disc surface.
- Handle the disc gently, i.e. don’t throw diskettes into your pockets or back pocket because the protective
plate can easily slide away from the plastic case.
- Don’t put weights on floppy diskettes.
- Don’t try to bend them.
- Don’t use floppy diskettes for coffee and soft wastes because moisture can spoil and damage the disc
surface.
- Avoid risks with physical environment e.g. heat
- Don’t expose the disc in to direct sunlight
- Don’t expose the floppy diskettes to chemical substances such as cleaning solvents and alcohol
- Always keep the floppy diskette in its jacket.
- Do not expose it to an X- RAY.
- Do not insert or remove it from its drive when the drive active light is on.
- Do not force it into its drive. It should slip in with little or no resistance.
- Do not scrub a diskette to label it
- Don’t leave a floppy diskette into the drive. Take the diskette from the drive because if you leave it in the
drive, the read and write head remains resting on the surface.
- Keep diskettes away from magnetic fields i.e. near radio speakers, on top of the system unit case, near
electric motor etc-
- Store the disks in their boxes after use.
It’s made up of inflexible material and consists of several rigged metal discs called platters. Platters are
covered with substance that allows data to be held in form of magnetized spot. Data can be recorded on both
sides of the disc platters.
The hard disc is also tightly sealed and enclosed in the system unit to prevent any foreign matter which may
result into head crush
- Hard disc is not portable accept removable hard disc which is very expensive.
- Data becomes less secure if left on the hard disc
- Hard disc can easily crush due to extreme shock contaminators.
- The disk is fixed inside the computer and cannot easily be transferred to another computer.
OPTICAL DISCS
This is a removable disc on which data is written and read by means of a laser beam. The most optical discs are
CD-ROM. Examples of optical disks include;
DISADVANTAGES OF A CD
- A mere crack can easily fail the CD from writing or reading
- Some kinds of CDs are read only hence the user cannot change or add data on it.
- The access time of a CD is slower compared to the hard disc.
This combines the basic features of magnetic and optical disk technology. MO disk has a high storage capacity
like an optical disk and can be written on over and over like a magnetic disk.
SMART CARD
It is similar in size to ATM or credit cards, it stores data on a thin micro processor embedded in the card. When
it inserted in the card reader the information on it can be read and up to date.
ZIP DISK.
It is slightly larger and about twice as thick as a floppy disk. A Zip disk can be of 100MB, 250MB, and 700MB of
storage capacity.
ONLINE STORAGE
It is also called internet hard drive. It is a service on the web that provides the user with storage for free or for
minimal monthly fee.
FLASH DISK (MEMORY STICK)
It is also a USB (Universal Serial Bus) flash drive typically a removable and a rewritable disk. It has a high
storage capacity to several gigabytes (GB). The capacity of a flash disk is always indicated on it.
The computer control centre is made up of processing and main memory devices which are housed in a
computer system unit or system cabinet.
A system unit contains a CPU, Motherboard e.g. adaptors like network card, VGA card.
PROCESSOR
A processor consists of two main parts which include the following;
1. Control Unit (CU)
2. Arithmetic Logic Unit (ALU)
The two components are connected by a kind of electronic path called a BUS.
STRUCTURE OF A PROCESSOR (CPU)
1. Data to be processed is input from input devices or secondary storage in RAM
2. Data to be processed goes to the registers(Main tore) in ALU from RAM
3. The control unit tells the ALU which logic or arithmetic operation to perform.
4. Processed results Arrives in RAM and then output or stored to the storage device.
Control Unit
This is a part of the CPU that tells the rest of the computer system how to carry out programs instruction, i.e.
directs the movement of electronic signals between RAM and input and output devices.
It performs arithmetic operation e.g. addition, subtraction, multiplication and division and logic operations
ALU compares two data items to see whether one is equal to, greater than, or less than the other. The other
includes;
>= Greater than or Equal to
<= Less than or equal to
< > Less or Equal
NOTE: ALU & CU contain register that connects to the main memory (RAM) by the bus. Registers are
temporary storage holding processed and unprocessed data. It also provides working area for processing.
RAM CAPACITY
The main memory capacity is stated in bytes i.e. megabytes (MB) however, the RAM capacity of the main
frame computers and super computers is measured in gigabytes (GB) and Terabytes (TB)
10
1KB – 2
1MB – 220
1GB - 230
1TB – 240
WORD SIZE
This refers to the numbers of bytes a processor can hold in its register during the processing; therefore a 64
byte word processor is faster than a 32bit can process a byte in the same given time.
PROCESSING SPEED
Computers with large word size can process more data in each instruction cycle, micro computer speed are
measured in megahertz. The speed of large computers are measured in millions of instruction per second (MIPS)
and Floating Point Operation Per Second (FLOP)
1. Intel Chips; Intel makes chips for personal computers such as Compaq, Dell, Gateway, Toshiba. INTEL used
to identify its chips by numbers 8086, 8088, 8286, 8386, 8486, 8086 family series
2. Motorola Chips; Motorola produces the family of apple, Macintosh computers.
3. The Intel succession to x86 chips is the Pentium family. The list of Pentium family from the slowest to the
fastest from Intel are Pentium1, Pentium MMX, Pentium Pro, Pentium 2, Pentium 3, Pentium 4
4. Today the most popular micro processers are CORE 2 DUE & DUAL2CORE.
SYSTEM UNIT
This is a box or cabinet containing the electrical component that carry out computer’s processing, it contains
the following;
i) Power Supply
It is a device that converts power from Alternating Current (AC) to Direct current DC to run the computer.
ii) Motherboard
It is a system board which is the main socket board that can hold chips such as processor, ROM, RAM and
expansion slot. OR it is a circuit board where all computer peripherals (input/output/communication/Memory
and storage devices) are connected.
Ports
These are connecting sockets outside a computer processing unit that are connected to the main board
(motherboard). Ports are of several types and they include the following;
1. Parallel Ports.
They are also called female ports.
They transmit 8 bits simultaneously. They
are mainly used to connect printers.
2. Serial Ports
4. SCSI
(Small Computer System Interface)
It is used to transfer data at high speed especially for external hard disk, magnetic tapes, CD-ROM, Scanner.
5. Game Port
It is used to connect a game playing device such as joy stick on system unit.
SOFTWARE
Software is made up of group of related programs written in a special code called programming language.
Therefore software is a set of programs in a computer system.
NOTE; the software acquired to perform a general business function is often referred to as software package.
System software
This is the software designed to allow the computer to manage its own resources and run the hardware and
basic operations of the computer.
Application software
This is software designed to perform specific tasks which benefit or assist the end user. Examples of
application programs include word processing, desktop publisher.
COMPUTER SOTWARE CLASSIFICATION
SYSTEM SOFTWARE
1. UTILITY PROGRAMS
These are system software component which are used to support, enhance or expand the existing programs in
a computer system.
OR
Utility programs are referred to as service programs which improve the performance of a computer.
Many operating system have utility programs built in for a common purposes. However, some utility programs
are available separately and the common examples of utility programs include the following;
Note: When a file is stored on a disk, usually the data elements are put next to one another, after the user has
saved but due to deletion of many files in different locations there remain many scattered areas of deleted data
which are too small to be used efficiently. This is called fragmentation.
Note: It is always important to update the anti-virus software frequently in order to detect new viruses.
(ix) Debuggers
These are used during testing of the program. They are able to trace the flow of the program and display
various values as requested; therefore errors are traced and removed from a program.
Other utilities
A physical problem is on the media such as a scratch on the surface of the disk while the logical problem is on
the computer, such as corrupted FAT (File Allocation Table).
(xii) Uninstaller
Uninstaller is a utility that removes an application as well as any associated entries in the system file e.g.
MCAfee’s Uninstaller.
(xiii) Screen saver
A screen saver is a utility that causes the monitor’s screen to display a moving image or blank screen if no
keyboard or mouse activity occurs for a specific period of time. Screen savers were originally developed to
prevent a problem called ghosting.
2. OPERATING SYSTEM:
This is the most important system software component that contains master programs called the supervisor
that manages the basic operations of computer.
Note: -
An OS can be classified as a single user system which acts as an interface for only one user e.g. DOS (Disk
Operating System) and it can also be classified as a multiple user system which acts as an interface of more than
one user, this implies more than one person can use the computer at the same time e.g. NOS (Network Operating
System)
Kernel is the piece or pieces of software that is responsible for servicing resource requests from applications
and the management of resources.
OR
Kernel is the main component of most computer operating systems; it is a bridge between applications and
the actual data processing done at the hardware level.
Note: Kernel's responsibilities include managing the system's resources (the communication between
hardware and software components)
A kernel is also referred to as memory resident because it is responsible for deciding which memory each
process can use.
SOFTWARE INTERFACE
This where a user and computer have to get together to communicate. Therefore user interface controls how
the user uses data and instruction and how information is displayed on the screen.
MENU INTERFACE
This is an interface where commands are issued through menus. A menu is on screen list of options where a
user can choose from by the use of either a mouse or a keyboard. The menu driven interface is the one which
was improved to a graphical user interface.
It doesn’t offer a graphical user interface It offers modern improved graphical user
interface
Cannot take full advantage of modern It takes full advantage of modern 32bit
32bit micro processor micro processor
Uses command line interface Uses graphical user interface
DOS is stable cannot easily corrupted or Windows is unstable and can easily be
damaged corrupted or damaged
There are two types of DOS currently in use in micro computers and they include
- PC DOS which was by the IBM Corporation and
- MS DOS which were developed by Microsoft Corporation to complete the desktop applications
environment.
Earlier versions of DOS used a command line interface while the later versions of DOS included a menu driven
user interface as well as improved memory and disk management. DOS is not widely used today because it
does not offer a graphical user interface and cannot take full advantage of modern 32-bit micro processors.
2. Window 3x
Windows 3x refers to the three earlier versions of Microsoft windows i.e. windows 3.0, windows 3.1, windows
3.11. These versions of windows 3x were not actually operating systems but operating environments. An
operating environment is a graphical user interface that works in combination with an operating system e.g.
DOS
The Microsoft corporation developed these new operating systems as a result of technological advancement
over the windows 3x. The 32 bit operating system provided better multi-tasking (working with various
applications at the same time) and faster video displays for games. Their ability for plug and play provided a
better way of installing new peripherals (general term that refers to other parts connected to the computer
e.g. keyboard and the mouse.)
They also entail improved network support, power management and file management. They also offered
improved power battery life and productivity for the laptop computers.
This is another desktop operating system which offers multi tasking abilities. It was initially created by
Microsoft and IBM, and then later developed by IBM exclusively. OS/2 is no longer marketed by IBM, and IBM
standard support for OS/2 was discontinued on 31 December 2006.
This is one of the most recent developments in operating systems. It was built due to the increased demands
in the multi-media industry for large file handling abilities. Its 64 bit system can handle files up to Million
terabytes. This makes it ideal to handle files that include videos, sound and other three dimensional images
(3D-Images.)
These are designed to be used on several computers that exist on a network. At times they can be installed on
stand-alone computers. Examples include
1. NOVEL NETWARE.
Is a network operating system developed by Novell, It initially used cooperative multitasking to run various
services on a personal computer. It was designed for client server network.
2. WINDOWS NT4.0.
This has all the features, which were conceived from 32bit Operating system of Windows 95 & windows 98
but with integral security and networking abilities thereby offering a more stable and secure platform, which is
ideal for corporate enterprises.
3. UNIX.
This is multi-user, multi-tasking, time sharing operating system which was developed by the bell laboratories
for the mini and main frame computers.
4. LINUX:
This is UNIX everywhere except for the name. It encompasses free software foundation; currently it is
increasing being used as a back end server. Companies support it like bell and IBM making it an industrial
strength operating system.
These are operating systems, which are specifically designed for hand held computers (PDA). Normally these
operating systems, which are pen-driven, or touch sensitive, come when they are already loaded in the
computer ROM-BIOS. Common examples include window CE (computer edition). It has a familiar interface
similar to the normal windows environment with a task bar, icons and many recently have come with version
for the keyboard PDA.
Originally called Windows NT 5, it is an operating system from Microsoft. It’s a desktop as well as a network
operating system for both the small and big corporate organizations. It has many features than earlier
Microsoft operating systems.
WINDOWS ME
Windows millennium is an updated version of windows 98 for consumers that uses a computer to surf the
internet or for entertainment. Windows Me is designed for home users.
This was the first commercially successfully graphical user interface. It was released with Apple’s Macintosh
computers. Mac o/s has the capability of opening, editing, and saving files created by windows and DOS
platform.
System 7 operating system for Macintosh computers was developed by digital researchers for use on the 8 bit
micro computers. These have now been over taken by the 16 bit and 32 bit microprocessor.
3. Windows XP
Windows XP is an operating system that was produced by Microsoft for use on personal computers, including
home and business desktops, laptops, and media centers. It was first released to computer manufacturers on
August 24, 2001, and is the most popular version of Windows, based on installed user base. The name "XP" is
short for "eXPerience”.
4. Windows Vista
Windows Vista is an operating system released in several variations developed by Microsoft for use
on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs.
5. Windows 7.
Windows 7 is the latest release of Microsoft Windows, a series of operating systems produced
by Microsoft for use on personal computers, including home and business
desktops, laptops, notebooks, tablet PCs, and media center PCs.
3. PROGRAMING LANGUAGES
The computer language is a mean of communication used in designing a computer program.
This program is accomplished by designing a list of words and symbols according to a particular syntax
(Grammatical rules related to use of a command or programming language). It can be a pre-determined rule of
grammar into logical manner to form a computer program.
These are called low level languages because they are associated with the processor than high level languages
which are nearer to the programmers.
It is very difficult to learn and very unfamiliar to humans. It is not user friendly at all. Programming in machine
code is very tiresome and very many errors are likely to occur, all instructions in machine code language are
represented in binary format and an example of machine code instruction would look like this
1010000000001001 – 16bits machine.
Assembly language
It was invented to assist machine code programmers. However much as it looks like a machine code language
at least for it, it is more easily understood and remembered by human. An example of the assembly language
instruction looks like;
These were produced as a further refinement in the assembly language. They made programming much easier
to user and shielded programmers from knowing the natural registers and memory addresses which are vital
in the assembly language.
In high level language, fewer instructions are written and therefore a lot is done in less time. They are
classified as 3 generation language (3GLS), they were originally built for specific operations that is say scientific
or business purpose e.g. FORTRAN & COBOL.
They are problem oriented languages and have a wide vocabulary of valid words, symbols and sentences.
PROGRAM TRANSLATION.
Translation of a high level program into the machine code is equivalently done by compilers and interpreters.
COMPILERS
These translate a program written in a high level language into machine code or into an assembly language or
program. The entire program is translated into machine code at compilation time.
INTERPRETERS.
An interpreter translates the source program line by line while the program is running. This is done each time
the program is executed; as a result a program running under an interpreter runs very slowly as compared to
the compiled program.
LINKERS.
These programs combine compiled programs and determine where the program will be located in memory.
The linker has transformed an object code, an executable file is generated. These normally result in to the file
with the extension “.exe”.
Most modern compilers automatically link the object code generated from the source program therefore one
may fail to note the linking process.
Common types of programming languages include FORTRAN, COBOL, PASCAL, ALGOL, and C++.
TERMINOLOGIES USED UNDER SOFTWARE
1. File:
A file is a collection of related information that is given a name. it is stored on a disk so that it can be
retrieved when needed.
Types of Files
Filename. Extension File type
***.doc Word document
***.xls Excel file
***.mdb Access file
***.ppt Power point file
***.sys System file
***.exe Executable file
***.ini Object file
***.bak Backup file
***.gif OR ***.jpg OR ***.Jpeg Image file
2. Folders:
A folder is a named storage area in a windows operating system. A folder can be either opened or closed. A
group of files can be kept in one folder.
In MS-DOS, folders are referred to as directories and the directories hierarchy is called directory tree or
directory structure.
3. Directory:
This is a way of arranging files on a machine e.g. all marketing files put together in a marketing file therefore
a directory is a collection of files. It has another directory referred to as sub directory.
OR
A directory is a named storage area in a non windows operating system e.g. DOS. A group of files and sub
directories can be kept in a directory, therefore a directory is the arrangement of files on a given storage
device.
4. Path:
A path is a route taken to a particular direction or a file. A path statement may include
A drive letter, the main directory and any of the sub directories. For the path to
KABOWA you write C:\kampala\lubaga\kabowa.
The path statement means that a file named KABOWA is a folder named LUBAGA (sub directory) and in a
folder named KAMPALA on drive C:\.
5. Desktop:
A desktop is a work area on which you see your programs. The desktop can contain windows, icons, and the
taskbar.
6. Icons:
An icon is a little picture on a computer screen (Monitor). Icons on the desktop that have a small white box
in the lower left corner of the icons are shortcuts and represent files and programs on the computer.
Typical icons on the desktop include;
1. My computer: -
It shows the disk drives and hardware connected to the computer
2. Recycle bin :-
It contains file and folders that you have deleted
3. Network Neighborhood:-
It provides access to the computers and devices connected to the network.
7. Taskbar:
A taskbar is a row of buttons and icons that usually appear along the bottom of the screen. The taskbar has
several parts namely: -
1. The start button: - Is usually at the left end of the taskbar.
2. The task manager: - Contains buttons for each window that is open on the desktop.
3. The system tray: - Contains items for some windows 95 programs and folders, including system
clock.
8. Start menu:
Lists commands and additional menus that list most or all the programs that you can run on your computer.
You can use the start menu to run almost any program installed on the computer.
9. Task manager:
Is a part of the taskbar that shows a button(s) for each program that is running if a program displays more
than one window, number of buttons will appear on the task manager.
POWERING ON A COMPUTER
Most micro computers are switched on or powered on by the switch on the system unit and the monitor.
As the system unit is switched on, it does the “POST” (Power on Self Test) before it starts. The POST consists of
RAM check, the disk drive controller check and the keyboard check.
If any of the checks is impossible (fails) then an appropriate error message is displayed on the screen.
Sometimes an error code is displayed with the message or an abnormal number of beeps are sounded and this
is called Booting.
The process of turning on the system (computer) and loading operating systems in memory (RAM) is known as
“booting”.
Booting refers to the starting and restarting of a computer system. Booting is of two types namely;
- Cold booting.
- Warm booting.
Cold booting is the starting of the computer from the power socket while warm booting is the restarting of
the computer.
Warm booting is restarting of the computer system using the keyboard by pressing a combination of buttons
or keys “CTRL+ALT+DEL” or pressing the RESET button/switch on a computer system unit.
There are two ways of booting a computer loaded with DOS or windows:-
Today, computers boot from windows loaded on to your hard disc. The booting process is complete under
windows when a stable desktop is attained with a task bar.
DOS or windows systems diskette contain the DOS or window’s commands is needed to start and use the
computer.
Insert the system’s diskette in a drive and then switch on the computer. The sequence of operations on boot
up is:-
1. The computer performs Power on Self Test (POST). The POST consists of the Ram check (memory), the
hard disk controller, the keyboard check etc.
2. Default drive A: checks for disk operating system (DOS) followed by loading of the DOS from drive A to
RAM.
3. Display of information from auto executable file (Auto exec) and windows logon screen appears if the
computer is using windows operating system otherwise you go to DOS command prompt.
Computers can be booted up from the hard disk if DOS has already been installed on the hard disk.
In this case you simply switch on the computer to start it up after making sure that there is no diskette in the
drive A. The sequence of operation on boot up is as follows:-
1. The computer performs Power On Self Test (POST). The POST consists of the RAM check, Keyboard
check, the hard disk check controllers etc.
2. Drive C check for the DOS followed by loading of DOS from drive C to the memory (RAM).
3. Display of information from auto exec batch file and the windows logon appears if the computer is using
windows otherwise you go to DOS command prompt.
Users whose computers have a hard disk always prefer to boot their computers using the C: drive (Hard disk).
Booting of two types which include:-
The main cause of power disruptions are amplitude fluctuations, low voltage, high voltage, power frequency
variation etc.
All power defects are largely eliminated by the use of power correction equipment known as the
uninterrupted power supply and other utility power conditioning equipments.
Line conditioners
These consist of surge suppressors, voltage stabilizers etc. Surge suppressors are only able to reduce power
line noise. Voltage stabilizers are capable of correcting voltage surges. They are purposely meant for reducing
the amount of current that is supplied to the system.
Stand By UPS
This is a power conditioner with ability to generate its own battery. The stand by UPS has time limitations and
this is referred to as “Transfer time”.
Online UPS
This operates like a Standby UPS, The online UPS is ideal for environments where electrical isolation is
necessary or for equipment that is very sensitive to power fluctuations.
The online UPS is generally more expensive but may be necessary when the power environment is "noisy"
such as in industrial settings, for larger equipment loads like data centers, or when operation from an
extended-run backup generator is necessary.
A true online UPS also has an isolating transfer for eliminating power line noise. These are available with
ratings of varying kilo watts. However, the big ones are expensive and bulky, for that matter therefore power
systems such as computers, a small UPS is sufficient.
The period of time that the UPS can provide backup also varies from a few minutes to half an hour. The online
UPS are more expensive than others.
1. Brown out.
Is the lowered output voltage (power) from the wall socket.
2. Black out.
Is the total loss of electrical power from the wall socket.
3. Power transients.
Is the large and potentially dangerous voltage spikes appearing on the wire e.g. due to lightening, loose
connections e.t.c.
PC CONFIGURATION
The hardware and software specification required for a PC or any other type of computer is termed as
computer configuration.
Like all electronic components, micro computers need to be serviced regularly to maintain their normal
operation. Below are some of the measures that should be taken:-
1) Before you Switch on your computer, make sure that other components are switched on e.g. UPS,
stabilizers, Hub, the computer peripherals etc.
2) Avoid making connections when the computer is already on e.g. keyboard, mouse, printer etc
3) Avoid abrupt switching on and off the computer system. Follow the right procedures when switching
on the computer.
4) Place the micro computer in a dust free environment with good ventilation.
5) Dust covers should be used to protect the micro computer from moisture and when you are using
polyethylene covers, then do not cover the computer immediately after shutting down because it will
trap heat.
6) The computers should regularly be serviced at least twice a year or more often if the environment is
dusty.
The service should normally include;
- Blowing the dust from the system unit,
- Cleaning the keyboard including all keys.
- Cleaning the monitor.
- Cleaning the mouse.
- Externally, also clean your computer equipment regularly with wet rug or cloth.
Note: Make sure you don’t drop water in a computer system, if water drops in accidentally, do not use the
computer immediately. Wait until water dries completely.
8) Floppy disks used for installation of programs and backups should be safely kept in disk banks and
safely kept away from sunlight and magnetic media.
9) Floppy diskettes should be right protected all the time especially for installation diskettes (using the
protection tab) and remove the right protect tab when writing on the diskette if they are used for
backups.
10) In areas where power fluctuates, it is vital to use a stabilizer, UPS to ensure a steady input of power to
a computer system.
COMPUTER VIRUSES
Computer Viruses are destructive programs designed to affect, or infect a computer negatively by altering the
way it normally works without the knowledge or permission of the owner.
Partial destruction:- modifies a specific portion of disk affecting any files stored in that location.
Random havoc: - randomly changing data or data in memory during normal program execution, or changing
key stroke values, or data from other input/output devices.
Network saturation: - It systematically uses up memory or space to impede performance or cause the system
to crash.
CLUSTER VIRUSES
This type of virus makes changes to a disk file system. If any program is run from the infected disk, the
program causes the virus to run as well. This technique creates the illusion that the virus has infected every
program on the disk.
E-MAIL VIRUSES
These types of viruses can be transmitted via e-mail messages sent across private networks or the internet.
Some e-mail viruses are transmitted as an infected attachment (a document file or program that is attached to
the message). This type of virus is run when the victim opens the file that is attached to the message.
PDA VIRUSES
The increasing power of PDAs has spawned a new breed of viruses. Maliciously creative programmers have
leveraged the PDA's ability to communicate with other devices and run programs, to cause digital mayhem.
Their effects vary from the harmless flashing of an unwanted message or an increase in power consumption,
to the deletion of all installed programs. But the threat is growing, and the destructiveness of these viruses is
expected to parallel the development of the devices they attack.
MULTIPARTITE VIRUSES
A virus that combines two or more different infection methods is called a multipartite virus. This type of virus
can infect both files and boot sector of a disk. Multi-partite viruses share some of the characteristics of boot
sector viruses and file viruses: They can infect .com files, .exe files, and the boot sector of the computer’s hard
drive.
BOMBS
The two most prevalent types of bombs are time bombs and logic bombs. A time bomb hides on the victim’s
disk and waits until a specific date before running. A logic bomb may be activated by a date, a change to a file,
or a particular action taken by a user or a program. Bombs are treated as viruses because they can cause
damage or disruption to a system.
PARASITIC VIRUSES
These viruses attach themselves to executables without substantially changing the contents of the host
program. They attach by adding their code to the beginning, end, or even middle of the file and divert
program flow so that the virus is executed first. When the virus has finished its job, control is passed on to the
host. Execution of the host is a little delayed but this is usually not noticeable.
MACRO VIRUSES
Many older applications had simple macro systems that allowed the user to record a sequence of operations
within the application and associate them with a specific keystroke. Later, the user could perform the same
sequence of operations by merely hitting the specified key.
POLYMORPHIC VIRUSES
This type of virus can change itself each time it is copied, making it difficult to isolate. Most simple viruses
attach identical copies of themselves to the files they infect. An anti-virus program can detect the virus’s code
(or signature) because it is always the same and quickly ferret out the virus.
STEALTH VIRUSES
Stealth viruses actively seek to conceal themselves from attempts to detect or remove them. They also can
conceal changes they make to other files, hiding the damage from the user and the operating system.
COMPANION VIRUSES
A companion virus is the exception to the rule that a virus must attach itself to a file. The companion virus
instead creates a new file and relies on a behavior of DOS to execute it instead of the program file that is
normally executed. These viruses target EXE programs. They create another file of the same name but with a
COM extension containing the virus code.
PROGRAM VIRUSES
Like normal programs, program viruses must be written for a specific operating system. The vast majority of
viruses are written for DOS but some have been written for Windows 3.x, Windows 95/98, and even UNIX. All
versions of Windows are compatible with DOS and can host DOS viruses with varying degrees of success.
Program viruses infect program files, which commonly have extensions such as .COM, .EXE, .SYS, .DLL, .OVL, or
.SCR.
TROJAN HORSES
Trojans, another form of malware, are generally agreed upon as doing something other than the user
expected, with that “something” defined as malicious.
WORM
A worm is a computer program that has the ability to copy itself from machine to machine. Worms normally
move around and infect other machines through computer networks. An entire LAN or corporate e-mail
system can become totally clogged with copies of a worm, rendering it useless. Worms are commonly spread
over the internet via e-mail message attachments and through internet relay chat channels.
In today's increasingly interconnected workplace (Internet, intranet, shared drives, removable drives, and
email), virus outbreaks now can spread faster and wider than ever before.
Contact with contaminated systems; any diskettes used on a contaminated system could become
contaminated. If the diskettes are used on another system, then the virus will spread.
Pirated software- the use of pirated software introduces the risk that the software may be contaminated by
virus code.
Fake games- many people like playing games on computers and for the same reason games programs spread
virus very fast.
Freeware and shareware- Both freeware and shareware programs are commonly available from bulletin
Board systems (BBS)
A macro virus: uses the macro language of an application (e.g. word processor or spreadsheet) to hide the
virus code
A worm: copies itself repeatedly in memory or a disk drive until no memory or disk space remains, which
makes a certain condition or action is triggered.
A polymorphic virus: modifies its program code each time it attaches itself to another program or file, so that
even an anti virus utility has difficulty in detecting it.
ANTIVIRUS UTILITY
Is a program that prevents, detects, and removes viruses from a computer’s memory or storage devices. One
of the popular antivirus is Norton Antivirus.
Antivirus utilities normally look for various signatures to identify a virus. Examples of antivirus utilities include
the following:
- MacAfee antivirus.
- Dr. Solomon
- Norton
- Node32
- Penicillin antivirus.
- Avira antivirus
COMMUNICATION
Communication or Telecommunication
Refer to transfer of data from a transmitter (sender/source) to the receiver across a distance.
Data communication:-
This is the process of transmitting data signal from one point to another through a network
Data signal
Data signal is an electromagnetic energy which represents the data flow. Data transmitted can be voice, text,
video, sound, image or a combination of these (Multimedia).
Simplex transmission refers to communication in only one direction. An example is a traditional radio or
television broadcast. The viewer or listener cannot communicate back through the radio or television receiver
back to the broadcaster.
Half-duplex transmission refers to communication in both directions but one direction at a time. A sender
must first send the data before the recipient can reply. An example, if two police officers are communicating
using a ‘walkie talkie’ radio, one has to say “over” to mark the end of every statement in order for other to
respond.
Full duplex transmission refers to communication occurs in both direction simultaneously. An example of full
duplex can be found in computers that are sending and receiving data on a network.
Mode of transmission
Asynchronous transmission
In asynchronous transmission data is sent one byte (or character) at a time. It is also called start-stop
transmission, where “start” bit represents the beginning of a character, and a “stop” bit represents its end. At
rate of only one byte at a time, with start and stop pulses, this is relatively slow method and it is not used
when great amounts of data must be sent rapidly.
Synchronous transmission
Synchronous transmission sends data in blocks. Start and stop bit patterns called sync bytes, are transmitted
at the beginning and end of the blocks.
Bandwidth:- This is the maximum amount of data that a transmission medium (network cables) can carry at
given period of time per second OR this is the measure of how much information/bits that can flow from one
place to another per second.
Modem short for modulator/demodulator: A device that converts the data signal from one form to another.
The process of converting digital signal into analog form for transmission over phone lines is called
Modulation. A receiving modem converts the analog signal back to digital signal in a process known as
Demodulation.
Figure below shows how an external modem is used in data transmission over telephone lines. An internal
modem performs the same function and is built on the motherboard inside the system unit.
Narrowband describes a channel in which the bandwidth of the message does not significantly exceed the
channel's coherence bandwidth.
Coherence bandwidth is a statistical measurement of the range of frequencies over which the channel can be
considered "flat", or in other words the approximate maximum bandwidth
A baud is a data transmission speed of a bit per second over telephone line using a modem.
ISDN line
ISDN stands for Integrated Services Digital Network, which is hardware and software that allow voice, video
and data Transmission digital signals over ordinary telephone copper wire.
It is five time faster than phone modem.
It also supports two phone lines so that you can talk on the phone on one line while connection on the
internet on the other. Many telephone companies provide ISDN line which perhaps 2 or 3 times costly
compared to a regular monthly phone service.
Broadband is used to refer to data transmission using ADSL (Asymmetric Digital Subscriber Line)
ADSL is a means of transmitting digital signals using telephone lines and can be faster than narrowband.
Coaxial cables, fibre optic cables, microwaves and satellites are commonly used to provide broadband. ADSL is
considered to be the successor to ISDN
Baseband signal:- is a digital signal that is generated and applied to the transmission medium directly without
modulation.
Attenuation: - This is the decrease in magnitude and energy as a signal progressively moves along a
transmission medium. Or refer to as signal loss in strength as it is transmitted along the media. If the signal is
not boosted (amplified), it will be lost along the way and may never reach the destination. Attenuation or
signal loss is corrected by placing a signal amplifier called a Repeater.
Packet is a maximum-fixed length block of data for transmission. A packet also contains instructions about its
destination.
Packet switching: - Packet Switching is a technique for dividing electronic messages into packets for
transmission over a wide area network to their destination through the most expedient routes.
The benefits of packet switching are
-It can handle high volume, traffic in a network. it is used in large networks such Tele net.
-It also allows more users to share a network.
-Messages are sent over a long distance, E.g
COMPUTER NETWORK
Computer Network can be defined as the interconnection of computers using transmission media for the
purpose of communication and resource sharing. Some of the shared resources include; programs, printers,
fax machines, modems, storage devices, communication links etc.
The term Transmission media refers to the physical or non-physical link between two or more computers in
which a signal can be made to flow from source to destination.
o A WAN covers a wide geographical area than a LAN users are within confined geographical area
o WANs unlike LANs usually send data over telecommunication links.
o In the recent past, WANs often used larger computers as file servers well as LANs used typical file servers
o WANs are often larger than LANs and have more terminals or computers liked to the network.
o A WAN can link two or more LANs using gate ways and bridges. A gate way or bridge is a device that is
used to connect two separate networks e.g. two LANs in separate buildings.
Intranet:
An intranet is a local version of internet within a company or organization. It offers same features as global
internet (www, TCP/IP), but in a localized environment such as factory site or university campus whereby the
authorized users are employee of the company.
Extranets:
If a company has an intranet and allows limited access to it by people outside the company, then the intranet
is referred to as an extranet.
Resource sharing
A resource in the network environment means any component that can be attached to the network for access
by users. This includes
- Hardware sharing: sharing of expensive peripheral devices such as laser printers, scanner, and fax machine
among many users of company.
- Program and data sharing: in most organizations, people use the same software and need access to the
same information, which could expensive to a copy of software for each employee
- Access of same data on a shared storage device hence updates are easily made nd accurately,
- Network links all employees using groupware hence work together online on shared project.
Better communication
- Remote communication refers to transmission of data signals between two communication devices at
different geographical locations, through remote communication people can share ideas and gives freedom
to network users who can work from home just if they were in their offices(Telecommuting)
- One of the greatest features of networks is electronic mails which cheap, fast and convenient means of
communication.
Access to databases
Networks also enable users to tap into many databases whether private or public databases of on line
services, hence making research simple.
Security of information
Today data backed up on a networked storage device shared by users to avoid data loss.
Computer network is reliable because data is transferred with minimum error from source to destination
- Access to pornographic and other bad material has made the fight against social problems such HIV/AIDS,
bad sexual behavior and drug abuse more complicated.
- There is greater risk from viruses. Because they are easily spread between computers are part of a network.
- Organization finds it very challenging to guard information system from constant threats of illegal access.
A computer network is made up of several standard components which are classified into three categories
namely:
DATACOMMUNICATIONS MEDIA
A data communication medium is a pathway used to for carrying data/information from one point to another,
which is from source to destination. Various devices on the network are linked together by means of
communications media (channels / paths).
Data communication media can be divided into two namely:-
1. Communication Using Cables.
2. Wireless Communication.
This is a data communication media where data signals are transmitted through physical pathway.
There are several types of network cables but the most common ones are:-
Twisted pair cables
Coaxial cable
Fibre Optic Cables
The difference between the UTP and STP is that STP has a brand shield which is wrapped around the wires to
protect them from electromagnetic interferences called ‘Electric Noise’.
Twisted pair
Brand shield
Coaxial Cable
Coaxial cable has a central inner copper core and an outer sheath of copper mesh that are insulated from
each other. It resembles a cable which connects a TV to an antenna. Coaxial cable is more expensive than
twisted pair and is used to transmit voice, video and data.
Advantages of coaxial cable
• It is very stable even when under high loads.
• It has a large bandwidth (up to 1Gbps) compared twisted pair.
• It is more resistant to radio and electromagnetic interference than the twisted pair cable.
• It can carry voice, data and video signal simultaneously.
WIRELESS COMMUNICATION
This is type of communication medium that is used to transport data signals from one point to another
without physical connections.
COMMUNICATION DEVICES
These are devices used as interfaces or junctions between terminal devices. Terminal equipments are devices
at both ends of the communication link such as a computer.
Hubs
A hub is a hardware that connects a large number of computers and broadcasts received data to all the
computers or other devices attached on the same network. That is, a hub consists of multiple ports. When a
packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.
Bridges
Bridges connect one LAN to another. A bridge can forward data from one LAN to another, and can filter out
data not intended for the destination LAN.
The purpose of using a bridge therefore is to:
• Extend the length and number of stations
• Reduce overall traffic flow by allowing broadcasts only in destination LAN.
Switches
A network switch can perform similar functions to hubs and bridges. Unlike hub, a switch forwards a packet
directly to the address of network device it is intended for without broadcasting.
Repeaters
A repeater receives signal from one segment of network, cleans it to remove any distortion, boosts or
amplifies it to another segment of LAN.
The repeater enables the network to eliminate attenuation problems.
Router
The router interconnects different networks and directs the transfer of data packets from source to
destination. Each network has a unique identifier or address called the network address or IP address.
Gateways
A gateway is any device that can be configured to provide access to wide Area Network (WAN) or internet.
One of the devices is router. However a gateway may not be necessarily a router, it may be a computer
configured to provide access to the internet.
Connector: The RJ45 are attached to the terminals of the twisted pair cables.
NETWORK SOFTWARE
It is communication software that manages the transmission of data between computers and other devices
attached on the network. Network software can be classified in two main groups namely: -
1. Network Operating system (NOS).
2. Network Protocol
FUNCTIONS OF NOS
• It provides access to network resource e.g. printer and all folders.
• It enables nodes on the network to communicate with each other more efficiently.
• It supports inter-process communication i.e. enables the various processes of the network to
communicate with one another.
• It responds to request from application programs running on the network.
• It supports network services like network card drivers and protocols
• It used to implement security features.
• It monitors the operation of the network. It is possible for the network administrator to tell who is using
what and when.
• It records and fixes errors in the networks communication.
Network protocols
Protocols are set of rules and procedures that govern communication between two different devices or
computers on the network.
For instance, protocol in your communication software, for example, will specify how receiving devices will
acknowledge sending devices, a matter called hand shaking.
Protocols will also specify the type of electrical connections used the timing of message exchange, error-
detection techniques, and so on.
Examples of protocols include:
Simple mail transfer protocol (SMTP)- An internet protocol for transferring e-mail
File transfer protocol (FTP) - an internet protocol for file transfer.
Transmission control protocol (TCP)-This is responsible for delivery of sequenced data over the network.
NetBEUI- A local area network protocol that establishes communication sessions between computers. It
is for Microsoft or IBM networks only.
Internet protocol (IP) and Netware protocols are for packet forwarding and routing.
Sequential Packet exchange (SPX), is a part of Novel internet work packet exchange for sequenced data.
NETWORK TOPOLOGY.
This refers to the way in which computers and other devices have been arranged OR how data is passed from
one computer to another on the network. A network topology can either be logical or Physical
LOGICAL TOPOLOGY.
This is also called signal topology. It refers the way data is passed from one device to another on the network.
Logical topology is divided into two categories:
Ethernet topology; is when all the computers listen to the network media when one computer is
sending data.
Token ring topology; this uses a token which is used to exchange data from one PC to another. Token
is viewed as an envelope where data is placed in it and it is addressed to a particular PC on the
network, and then returns in the ring.
PHYSICAL TOPOLOGY
This is the physical layout or arrangement of components on the network.
For example
● Ring topology
● Bus topology
● Star topology
● Hierarchical topology.
● Mesh topology.
1. Bus Topology
This is a single line or cable with nodes at different points. i.e. all devices are connected to a central cable
called bus or backbone cable.
Data is transmitted in any direction along the central cable. As one sends, the rest listen (medium access
control address).
2. Star topology
A star topology is a topology for a Local Area Network (LAN) in which all nodes are individually connected to a
central connection point, like a hub or a switch. A star takes more cable than e.g. a bus, but the benefit is that
if a cable fails, only one node will be brought down.
Ring topology
A ring topology, all the devices are connected to one another in a shape of a closed loop. There is no central
host computer in the ring network though one node may control overall access to the network
4. Hierarchical/Tree Topology
This is a hybrid topology. Groups of star-configured networks are connected to a linear bus back-bone.
5.Mesh Topology
This is the most common type of topology used in wide area network, where there many paths between
different locations.
A SERVER
A server is a powerful computer that runs the network operating system and allows resources shared over the
network.
OR
Servers are dedicated computers on a network that perform one or more functions on behalf of the other
computers.
WORK STATION
A workstation is simply a personal computer connected to a LAN. The basic difference between a stand alone
computer and a workstation is that the latter has communications capabilities added to enable it to exchange
information with other computers and devices on network (nodes).
WLAN
Wireless local area network (WLAN) differs from a cabled LAN in that computers use wireless link to connect
to network instead of using a cable. The wireless connection is made possible by two set of components:
wireless access points and wireless NICs
Wireless LAN can be used in places that are difficult or impractical to use a cabled LAN for examples building
with many rooms or a large hall. Hence it more flexible; users can be in any location in a building or outside
still accessing the internet services.
Types of LAN
LAN can be divided into two categories based on how the computers communicate with one another:
Client/Server network
Peer-to-peer network
a) File server:
A file server is a computer that stores the programs and data files shared by users on LAN. It acts like a disk
drive but in a remote location, whereby network users store files or retrieve files on the server as if they were
using their own hard disk.
b) Print servers:
A print server coordinates the printing on the network. However, in small networks both file and print
management functions are performed by the file server.
c) Database server is a computer on a LAN that stores data. Unlike file server, it does not store program files.
d) Other servers:
All kinds of servers can be installed on the network e.g. the fax service i.e. connected to a shared facsimile
machine. A LAN user can create a document to a fax server which in turn facilitates transmission of the
document via the fax machine.
.
Peer-to-peer LAN
It allows every computer to communicate directly with every other computer on the network without relying
on the server. A user can access data from any computer on the network and vice versa. Peer-to-peer LANs
are limited to about ten machines, after which the performance drops and the system becomes cumbersome.
They are mainly in small businesses and departments.
INTERNET
The Internet is an international network of networks that connects computers worldwide.
It connects universities, research facilities, governmental organizations, businesses, non-profit making
organizations and individuals, allowing them to access, share and exchange information.
HISTORY OF INTERNENT.
In 1969, a research body in USA called Advanced Research Project Agency (ARPA) setup a computer network
and named it ARPA net.
It was built to serve two purposes; the first was to share research among military, industry, and university
sources.
It was to provide communication among military units in event of nuclear attacks. By 1980’s many people had
seen the importance of computer networking and internet.
Therefore, American government decided to access the internet.
By 1990’s 3,000,000 million computers were connected, today the internet has grown and covered the whole
world whereby the governments, private organizations and individuals are using the internet in all spheres of
daily life like sending massages and conducting business.
This is a company that provides direct connection and access to the internet services for a monthly fee. Some
of the ISP in East Africa are: Uganda Telecom, MTN, Warid Uganda, Broad band company, Africa online, Afsat,
Swiftkenya, etc
DIAL-UP CONNECTION.
A computer dials a phone number to connect to your internet service provider (IPS) using telephone line
Dedicated connection: This is means that a user has permanent connection of internet services at all times.
2. BUSINESS: Internet provides various business facilities such as E-commerce where by many companies
today use internet to sell and buy goods and services on .
3. E-LEARNING: Internet provides a distance education and home schooling through a process known as
virtual reality. Learning through interaction with special programs on the computer is called electronic
learning.
4. MASS MEDIA: with internet you can expect to get latest news where by most of the major root sites are
updated throughout the day. Some of the news sites include BBC, CNN, Aljazeera, Sports zone, Bukedde,
New Vision e.t.c.
5. HEALTH: Internet provides latest medical news and research; it provides the patient with medical
information about the different diseases.
6. ENTERTAIMENT: it’s also possible to listen to music on the web and to watch video clips if your computer
is multimedia.
7. DOWN LOADING: It is possible for a user to download software, pictures, music files, video clips from the
web and this is possible for the computers connected to the internet.
INTERNET SERVICES
ONLINE BANKING
it now possible to bank your money in the bank by the use of computers without you going physical to the
bank and this has helped to avoid congestion.
Online banking is a banking service via internet whereby the customers of the bank can access their accounts
using the web instead of visiting the bank’s branches.
Main disadvantage
Thieves may obtain your banking details by phishing, which is sending a customer an e- mail asking for
his/her bank details as if it has been sent by the bank.
ON LINE SHOPPING
Online shopping is increasingly popular in some developed countries, where one can order goods online and
pay for them using a credit or debit card. The goods will be delivered to the address specified by the customer.
Mailing list is a group of people using e- mail to communicate their views on common issues or interest by
subscribing to be a member.
Newsgroup or bulletin board enables group of people to discuss on specific topics, where by the subscribers
of newsgroup can post the messages on the internet for all users to access.
GOPHER
Gopher is an old browsing tool or Internet program that allows users to use a system of menus to browse
through and retrieve (open) files stored on different computers.
INTERNET ADDRESSES
Internet addresses are used to identify an individual or resource on the network. Each internet address must
be unique; therefore the internet’s addressing scheme was developed in 1984 and is called Domain Name
Scheme (DNS).
E-MAIL ADDRESS
An e-mail address directs the computer on the internet to the destination of the e-mail message. A typical e-
mail should look like this:
[email protected]
1. kuulemuda2 is a user name or user ID, it is created by the user during e-mail account registration.
2. @ is a symbol for “at”, it separates the user name from Domain name.
3. Yahoo.com is a domain name of the host computer i.e. the computer on which the e-mail account is
hosted or located.
4. The period “.” Is read as dot and it separates the domain name components
5. com is a domain type that identifies the type of institution offering a particular service, meaning
commercial institution
1. HTTP stands for Hypertext Transfer Protocol which is a protocol for transferring web files.
2. WWW is a portion of the address that stands for World Wide Web which is the interconnected system of
sites on the internet that store information in a multimedia form.
3.The last part of the address is google.com is a Domain name of host computer, .com being the root domain
ACCESSING INTERNET
The internet is accessed through application software called web browser.
Web Browser: Is software that enables a person to access information available on the web. OR it is software
that translates HTML documents and allows you view web pages on the screen.
Examples of popular web browser are:
Microsoft Internet Explorer,
Netscape Navigator
others
Mozilla fire fox
Opera
Google chrom
Web page
Layout
Hyper links: These are underlined or highlighted texts on the website page that indicate links to other sites.
Hyper link can be identified by the fact that the mouse pointer changes to hand icon when it passes over it. A
picture that used as hyper link is called Hotspot.
• Expensive: Incase of initial cost setting up the network and internet. It is more expensive than
traditional mail which requires buying a stamp for postage.
• Needs a media to be delivered: E-mail can only be accessed through a computer device that is
connected to a network or internet.
• E- mail may be corrupted by a computer virus hence it may not open
• It doesn’t support the sending of parcels. Physical items can’t be sent with e-mail while with post, one
can.
• E-mail favors one who knows how to use the computer while post favors only those who can write.
E-mail facilities
E-mail server: This is the computer that receives incoming messages and delivers outgoing messages. It
allocates a certain amount of storage to hold mail for registered user called mailbox.
Mail client: This is a program that enables the user to read and compose e-mail messages, send and
access e-mail from the server, e.g. Ms Outlook Express.
Forwarded messages can be read and sent to other people. Most of such messages are fun pages,
poems, e-cards, gifts etc after reading you further forward to people by simply click forward button and
then provide the addresses of the recipients. Then click Send button to send.
File attachment
You can also send attachments along with the original e-mail. An attachment can be a word processed
document, spreadsheet file, a database file, picture, sound or video file
To attach a file
in the mail client window i.e. Ms outlook express
click New or compose button
specify the recipient’s address and the subject
click the attach files button then a dialog box appears, where files are browsed from their
location and scanned for attachment
WEB DESIGN
Web design is the process of planning and creating a website.
Text, images, digital media and interactive elements are used by web designers to produce the page seen on
the web browser.
A Web design program is a computer program used to create, edit, and update web pages and websites.
A web page can be made up of one or several separate documents. A web page is usually a collection of
documents that make up a web site.
A home page is usually the main or cover page of a web document that contain and index or table of contents
to the rest of the document.
What makes a good web page?
1. Using the right combination of text, links and multimedia
2. Making the page accessible and useful to as many users as possible.
What is URL?
URL in full is Uniform resource Locator previously known as Universal resource Locator.
A Uniform resource Locator is the unique address for a file that is accessible on the Internet.
A common way to get to a Web site is to enter the URL of its home page file in your Web browser's address
line e.g. www.facebook.com
Steps followed;
- Click start on you task bar
- Select All Programs then accessories
- Click on Notepad.
The first tag in your HTML document is <html>. This tag tells your browser that this is the start of an HTML
document.
The last tag in in your document is </html>. This tag tells your browser that this is the end of the HTML
document.
The text between the <head> tag and </head> tag is the header information. Header information is not
displayed in the browser window.
The text between the <title> tag and </title> tag is the title of your document. The title is displayed in your
browser’s caption (title bar)
The text between the <body> tag and </body> tag is the text that will be displayed in your browser.
Example;
<html>
<head>
<title>Title of the page</title>
</head>
<body>
This is my first homepage. <b>This text is bold</b>
</body>
</html>
In the above example <b> tag and </b> tag make the text between bold.
Open the file you have just created by using any browser on your computer (internet explorer, Firefox, Opera),
Now you should see an address in the dialog box for example “C:/desktop/homepage.htm” if you are using
windows XP and “file:///C:/users/Username/Desktop/ homepage.htm” if you are using windows 7.
The above address will always specify where that file is located on a computer or server.
Qn.1
After I have edited an HTML file, I cannot view the result in my browser. Why?
Answer:
Make sure that you have saved the file with a proper name and extension.
Qn.2
I have edited an HTML file, but the changes don’t show in the browser. Why?
Answer:
When you have modified a page, the browser doesn’t know that. Use the browser’s refresh/reload button/
press F5 on the keyboard to force the browser to load the page again.
HTML ELEMENTS
HTML documents are text files made up of HTML elements. HTML elements are defined using HTML tags.
HTML tags are used to mark-up HTML elements.
HTML tags are surrounded by the two characters < and >, the surrounded characters are called angle brackets.
HTML tags normally come in pairs like <b> and </b>.
The first tag in a pair is the start tag; the second tag is the end tag.
The text between the start tag and the end tag is the Element content.
The HTML tags are not case sensitive; <b> means the same as <B>
The most important tags in HTML are tags that define headings, Paragraphs and line breaks.
HEADINGS
Headings are defined with the <h1> up to any number.
PARAGRAPHS
Paragraphs are defined with the <P> tag
<p> This is a paragraph</p>
<p> This is another paragraph</p>
HTML automatically adds an extra blank line before and after a paragraph.
COMPUTER ETHICS
Computer Ethics is a branch of practical philosophy which deals with how computing professionals should
make decisions regarding professional and social conduct.
Information security means protecting information and systems from unauthorized access, use, disclosure,
disruption, modification, perusal, inspection, recording or destruction.
Private data or information is that which belongs to an individual and must not be accessed by any person
unless with direct permission from the owner.
Data and information is always under constant threat from people who may want to access it without
permission. Such people will usually have either to commit fraud, steal the information and corrupt or destroy
data. Unauthorized access may take the following forms
i. Eavesdropping
Note: - Hackers mainly use eavesdropping e.g. to obtain numbers of credit cards. A hacker is a person who
breaks into computers and computer networks for profit, in protest, or because they are motivated by the
challenge
Control Measures
1. Use authentication mechanisms that do not transmit the password over the network such as Kerberos
protocol or Windows authentication.
2. Make sure passwords are encrypted (if you must transmit passwords over the network) or use an
encrypted communication channel, for example with SSL (Secure Sockets Layer). SSL is the standard
security technology for establishing an encrypted link between a web server and a browser.
ii. Surveillance (Monitoring)
This is where a person may keep a profile of all computer activities done by another person or people.
The information gathered may be used for one reason or the other e.g. spreading propaganda or
sabotage.
Spying on your competitor to get information that you can use to counter or finish the competitor. This is
mostly done with an aim to get ideas on how to counter by developing similar approach or sabotage.
4. Theft
The threat of theft to data and information is real. Some data and information is so valuable the business
competitor or some governments can pay a fortune to somebody who can steal the information for them to
use.
Control measures.
1. Reinforce weak access points to the computer lab like windows and doors with metallic grills and strong
padlocks.
2. Create backups in locations away from the main computing centre.
3. Employ guards to keep watch over data and information centre and backups.
4. Burglar proof the computer room.
5. Install security cameras for surveillance 24 hours.
COMPUTER CRIMES
Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or
an unauthorized access to a computer system with intent of damaging, deleting or altering computer data.
OR
Computer crime or super crime refers to any crime that that involve the use of a computer and a network.
1. Hacking
A hacker is a person who intentionally breaks codes and passwords to gain unauthorized entry to computer
system and information.
The most vulnerable computers to this crime are the networked computers face with hackers working
remotely.
2. Cracking.
Cracking refers to the use of guesswork over and over again by a person until he\she finally discovers a
weakness I the security policies or codes of the software.
Cracking is usually done by people who have some idea of passwords or user names of authorized staff.
3. Trespass
Trespass is of two types namely
i) Illegal physical entry to restricted places where computer hardware, software and backed up data is kept.
ii) Accessing information illegally on a local or remote computer over a network.
4. Tapping.
This involves the sending of an intelligent program on a host computer that sends him information from the
computer.
Another way is to “Spy” on a network using special programs that are able to intercept messages being sent
and received by the unsuspecting computer.
5. Piracy.
Piracy means making illegal copies of the copyrighted software, information or data. Software, information or
data are protected by the copyright law.
There are several ways of reducing piracy which include the following;
i. Use license and certificates to identify originals.
ii. Make software cheap enough to increase affordability.
iii. Set installation passwords or key that deters illegal installation of the software.
iv. Enact laws that protect the owners of data and information against piracy.
6. Fraud
Computer fraud is the use of computers to conceal information or cheat other people with the intention of
gaining money or information.
Fraudsters can be either employees in the company or outsiders who are smart enough to defraud
unsuspecting people.
Some fraud may involve production and use of fake documents.
7. Sabotage
This is the illegal destruction of data and information with the aim of crippling service delivery or causing great
loss to an organization.
Sabotage is usually carried out by disgruntled employees or those sent by competitors to cause harm to the
organization.
8. Alteration.
This is the illegal changing of data and information without permission with the aim of gaining or misinforming
the authorized users.
Alteration is usually done by people who wish to hide truth. To avoid this, do not give data editing capabilities
to just anybody without vetting.
The person altering data may be forced to sign in order for the system to accept altering the information.
Alteration of data compromises the qualities of good data like reliability, relevance and integrity.
9. Phishing
Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card
details by disguising as a trustworthy source.
Phishing is carried out through emails or by luring the users to enter personal information through fake
websites.
1. Data encryption
Encryption is the conversion of data into a form, called a cipher text, which cannot be easily understood by
unauthorized people.
The massage to be encrypted is called plain text document, after encryption it is sent as cipher text on the net
work up to its destination and then decrypted.
Decryption is the process of converting encrypted data back into its original form, so it can be understood.
The massage is encrypted using a particular order called algorithm or key and it sent to the receiver as cipher
text. The recipient receives it and decrypts it using a reverse algorithm to the one used during encryption
called a decryption key to get the original plain text document.
Hence without a decryption key nobody can be able to reconstruct the initial message.
2. Firewalls
A firewall is a set of related programs, located at a network gateway server that protects the resources of a
private network from users from other networks.
OR
A firewall is a device or software system that filters the data and information exchanged between different
networks by enforcing the host network access control policy.
The main aim of a firewall is to monitor and control access to or from protected networks. People who do not
have permission cannot access the network.
3. Log files
A log file is a recording of everything that goes in and out of a particular server/computer. This is because each
user is assigned a user name and password or account.
The information system administrator can therefore easily track ho accessed the system, when and what they
did on the system.
4. Audit trial
A record showing who has accessed a computer system and what operations he or she has performed during a
given period of time.
Audit trails are useful both for maintaining security and for recovering lost transactions.